CN114202354A - Virtualized product alarm shielding method, device, equipment and medium - Google Patents

Virtualized product alarm shielding method, device, equipment and medium Download PDF

Info

Publication number
CN114202354A
CN114202354A CN202111360030.XA CN202111360030A CN114202354A CN 114202354 A CN114202354 A CN 114202354A CN 202111360030 A CN202111360030 A CN 202111360030A CN 114202354 A CN114202354 A CN 114202354A
Authority
CN
China
Prior art keywords
alarm
shielding
item
shielded
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111360030.XA
Other languages
Chinese (zh)
Inventor
苏道恒
朱道昌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111360030.XA priority Critical patent/CN114202354A/en
Publication of CN114202354A publication Critical patent/CN114202354A/en
Priority to PCT/CN2022/123190 priority patent/WO2023087956A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Computer Interaction (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a method, a device, equipment and a medium for shielding alarms of a virtualized product, and relates to the technical field of computers. The method comprises the following steps: acquiring alarm shielding configuration information of a virtualized product; according to the configuration information, selecting an alarm item to be shielded and at least one alarm object associated with the alarm item; and sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data. The method and the device can flexibly configure display and shielding of all alarms, so that the alarm information is clear and definite, and a user can customize display or shielding configuration of the alarm information of various resources according to needs, thereby improving the user experience.

Description

Virtualized product alarm shielding method, device, equipment and medium
Technical Field
The application relates to the technical field of computers, in particular to a method, a device, equipment and a medium for shielding alarms of a virtualized product.
Background
The benefits of an enterprise brought by a mature server virtualization platform are very much, when problems occur in the system and the webpage, the benefits of the enterprise are the most affected, and the user experience is poor, so that the product can not be used any more, and therefore the loss of customers is caused. At the moment, the alarm system of the platform is very important, and timely and reasonable alarm prompt can enable a user to quickly find and locate problems and also enable the user to give an alarm to appointed operation and maintenance personnel so as to quickly solve the problems. However, the server virtualization product resources are more, a lot of irrelevant alarm information can be generated, the alarm information is more refuted, the alarm information cannot be ignored completely, and at the moment, the shielding and the display of the alarm information need to be configured.
Disclosure of Invention
In order to solve at least one problem mentioned in the background art, the application provides a method, a device, equipment and a medium for shielding alarms of a virtualized product, which can flexibly configure display and shielding of all alarms, so that alarm information is clear and definite, and a user can customize display or shielding configuration of the alarm information of various resources according to needs, thereby improving user experience.
The embodiment of the application provides the following specific technical scheme:
in a first aspect, a virtualized product alarm shielding method is provided, and the method includes:
acquiring alarm shielding configuration information of a virtualized product;
according to the configuration information, selecting an alarm item to be shielded and at least one alarm object associated with the alarm item;
and sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data.
Further, the method further comprises:
and creating a visual page, wherein the visual page is used for displaying the configuration information.
Further, the method further comprises:
the visual page is further used for displaying an alarm list after the alarm item and the alarm object are shielded, so that a user can obtain the alarm condition after the alarm item and the alarm object are shielded according to the alarm list.
Further, the method further comprises:
creating one or more buttons in the visualization page, the buttons for controlling the shielding and/or display of the alert items and the alert objects.
Further, after the obtaining of the alarm shielding configuration information of the virtualized product, the method further includes:
acquiring user requirements, and displaying alarm shielding configuration conditions of system resources according to the user requirements and the configuration information;
the selecting an alarm item and at least one alarm object associated with the alarm item according to the configuration information further includes:
and selecting an alarm item and at least one alarm object associated with the alarm item according to the alarm shielding configuration condition.
Further, the alarm mask configuration may include at least one of:
the name of the system resource, the type of the system resource, the alarm item shielded by the system resource, the operation condition of the alarm item shielded by the system resource and the configuration time of the alarm item shielded by the system resource.
Further, the method further comprises:
storing the alarm item and the alarm information of the alarm object;
and inquiring the associated alarm information in the background in response to the detection that the alarm information associated with the system fault is shielded, and processing the system fault according to the associated alarm information.
In a second aspect, a virtualized product alert shielding apparatus is provided, comprising:
the acquisition module is used for acquiring alarm shielding configuration information of a virtualized product;
the configuration module is used for selecting an alarm item needing shielding and at least one alarm object associated with the alarm item according to the configuration information;
and the control module is used for sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data.
In a third aspect, an electronic device is provided, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, and the processor implements the virtualized product alarm shielding method when executing the computer program.
In a fourth aspect, a computer-readable storage medium is provided that stores computer-executable instructions for performing the virtualized product alert screening method.
The embodiment of the application has the following beneficial effects:
according to the method, the device, the equipment and the medium for shielding the alarms of the virtualized product, provided by the embodiment of the application, the redundant alarm items and the associated alarm objects can be selected for shielding by acquiring alarm shielding configuration information, so that the alarm information is clear and definite; the user can also customize the alarm information display or shielding configuration of various resources according to the requirement, flexibly configure the display and shielding of all alarms of the system, and improve the use experience of the user; and the shielded alarm items and the alarm information of the alarm object can be stored, so that the problem that the system fault is not timely processed due to shielding of the alarm information is avoided.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a general flowchart illustrating a method for alarm shielding of a virtualized product according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of a virtualized product alarm shielding apparatus according to an embodiment of the present application;
FIG. 3 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
Detailed Description
In order to make the purpose, technical solutions and advantages of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be understood that throughout the description and claims of this application, unless the context clearly requires otherwise, the words "comprise", "comprising", and the like, are to be construed in an inclusive sense as opposed to an exclusive or exhaustive sense; that is, what is meant is "including, but not limited to".
It will be further understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In addition, in the description of the present application, "a plurality" means two or more unless otherwise specified.
It should be noted that the terms "S1", "S2", etc. are used for descriptive purposes only, are not intended to be used in a specific sense to refer to an order or sequence, and are not intended to limit the present application, but are merely used for convenience in describing the methods of the present application and are not to be construed as indicating the order of the steps. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
Example one
The application provides a virtualized product alarm shielding method, referring to fig. 1, the method comprises the following steps:
and S1, acquiring alarm shielding configuration information of the virtualized product.
Specifically, the server virtualization product has more resources, and generates a lot of irrelevant alarm information, so that the alarm information is more disadvantaged, and there are alarm information applicable to various scenes, including what the user pays attention to, what the user does not pay attention to, important, minor, and the like. At this time, partial alarms need to be shielded, and important alarms concerned by the user are displayed, so that the user experience is improved, and the alarm processing efficiency is improved. Firstly, alarm shielding configuration information of a server virtualization product needs to be acquired, wherein the configuration information comprises an alarm item and information of an alarm object related to the alarm item.
S2, according to the configuration information, selecting the alarm item needing shielding and at least one alarm object of the associated alarm item.
Specifically, the alarm items are artificially determined, and the user selects the alarm items to be shielded according to the configuration information. Illustratively, the CPU utilization rate of the virtual machine is taken as an alarm item, and if the CPU utilization rate of the virtual machine exceeds 80%, the background pushes alarm information to the front end, and the user receives the alarm information to process the alarm. The alarm items can be classified according to the types of server resources, for example, the CPU utilization rate of the virtual machine, the memory utilization rate of the virtual machine, the disk utilization rate of the virtual machine and the like can be classified as virtual machine resource alarms; the CPU utilization rate of the host, the memory utilization rate of the host, the disk utilization rate of the host and the like can be classified as host resource alarm. For example, the alarm item selects the CPU utilization of the virtual machine, the alarm item belongs to a virtual machine alarm, the corresponding associated alarm object is a virtual machine in the system, at this time, a system virtual machine list is obtained, and a virtual machine which wants to shield the alarm is selected. Similarly, the alarm item selects the CPU utilization rate of the host, the alarm item belongs to the host resource alarm, the corresponding associated alarm object is the host, at this time, the host list is obtained, and the host which wants to shield the alarm is selected. The alarm object here may be a system resource object. It should be noted that, in which only one alarm item is selected, there may be one or more associated alarm objects (system resource objects).
In some embodiments, after performing S1, the method further comprises:
and acquiring user requirements, and displaying alarm shielding configuration conditions of system resources according to the user requirements and configuration information. Wherein, S2 further includes: and selecting the alarm item and at least one alarm object of the associated alarm item according to the alarm shielding configuration condition.
Specifically, only relevant information concerned by the user can be displayed according to the requirements of the user, the alarm shielding configuration condition of the system resource is obtained by taking the system resource as a unit, and the visualization display is performed through a list or a text description and the like. The system resources may include resources such as a host, a virtual machine, a network card, and storage of the virtualization system. For example, taking a virtual machine as an example, the alarm mask configuration condition may include a name of the virtual machine, a type of the virtual machine, a masked alarm item, an operation condition of the masked alarm item (an enabling or disabling condition of the masked alarm item), a time of configuration, and the like. The alarm shielding configuration may include one or more of the above situations, and may be specifically displayed according to the actual needs of the user.
And S3, sending the data of the alarm item and the alarm object to the background so that the background can shield the alarm item and the alarm object according to the data.
Specifically, the background receives the alarm items to be shielded and the data of the alarm object, intercepts the alarms of the related alarm object (system resource object) according to the data information, and performs silent processing on the alarms which are set to be shielded, so as to prevent the alarm information table of the alarms from reaching the front-end page, and further realize shielding processing on the alarms.
In some embodiments, the method further comprises:
and creating a visual page, wherein the visual page is used for showing the configuration information.
In some embodiments, the method further comprises:
the visualization page is also used for displaying an alarm list after the alarm items and the alarm objects are shielded, so that a user can obtain the alarm condition after the alarm items and the alarm objects are shielded according to the alarm list.
In some embodiments, the method further comprises:
one or more buttons are created in the visualization page for controlling the shielding and/or display of the alert items and alert objects.
Specifically, the user can browse the displayed alarm list and alarm shielding configuration information in the visual page, and can know the alarm configuration condition, the system resource information and the like in the visual page; alarm items and associated alarm objects may be selected for display and/or masking in the visualization page. Different alarm shielding configuration combinations can be deployed through the buttons, shielding/alarm displaying is carried out according to the different alarm shielding configuration combinations by clicking the buttons, the flexibility of alarm shielding configuration is high, and the experience of a user is good.
In some embodiments, the method further comprises:
and S4, storing the alarm item and the alarm information of the alarm object.
And S5, responding to the fact that the alarm information associated with the system fault is detected to be shielded, inquiring the associated alarm information in a background, and processing the system fault according to the associated alarm information.
Specifically, in order to prevent the omission of important alarm information, the shielded alarm items and the alarm information of the alarm object are stored at the server side. If the system has faults and the alarm information for recording the faults is set and shielded, the user can also inquire the corresponding alarm record in the background and process the sent faults according to the information of the alarm record.
In the embodiment, the alarm shielding configuration information is obtained, and redundant alarm items and associated alarm objects are selected for shielding, so that the alarm information is clear and definite; the user can also customize the alarm information display or shielding configuration of various resources according to the requirement, flexibly configure the display and shielding of all alarms of the system, and improve the use experience of the user; and the shielded alarm items and the alarm information of the alarm object can be stored, so that the problem that the system fault is not timely processed due to shielding of the alarm information is avoided.
Example two
Corresponding to the above embodiment, the present application further provides a virtualized product alarm shielding device, referring to fig. 2, including: the device comprises an acquisition module, a configuration module and a control module. The system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring alarm shielding configuration information of a virtualized product; the configuration module is used for selecting an alarm item needing shielding and at least one alarm object associated with the alarm item according to the configuration information; and the control module is used for sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data.
Further, the obtaining module is further configured to create a visualization page, where the visualization page is used to display the configuration information.
Further, the visual page is further configured to display an alarm list after the alarm item and the alarm object are shielded, so that a user can obtain an alarm condition after the alarm item and the alarm object are shielded according to the alarm list.
Further, the configuration module is further configured to create one or more buttons in the visualization page, where the buttons are configured to control the shielding and/or display of the alert items and the alert objects.
Further, the obtaining module is further configured to obtain a user requirement, and display an alarm shielding configuration condition of the system resource according to the user requirement and the configuration information; the configuration module is also used for selecting an alarm item and at least one alarm object associated with the alarm item according to the alarm shielding configuration condition.
Wherein the alarm mask configuration condition may include at least one of:
the name of the system resource, the type of the system resource, the alarm item shielded by the system resource, the operation condition of the alarm item shielded by the system resource and the configuration time of the alarm item shielded by the system resource.
Further, the control module is also used for storing the alarm item and the alarm information of the alarm object; and if the alarm information associated with the system fault is detected to be shielded, the control module is also used for inquiring the associated alarm information in the background and processing the system fault according to the associated alarm information.
Specifically, the acquisition module is also provided with an entry button, the configuration module can be accessed through the entry button, and a user can select an alarm item to be shielded in the configuration module, and then associate an alarm object (system resource object) of the alarm item according to the selected alarm item to perform corresponding alarm shielding. Only one alarm item is selected, and a plurality of related system resource objects can be provided.
In this embodiment, a virtualized product warning shielding device is provided, which can provide display and shielding functions for flexibly configuring all warnings of a system, so that warning information is clear and clear, shielded warning items and warning information of warning objects can be stored, the problem that system faults are not timely processed due to shielding of the warning information is avoided, the device is strong in practicability and high in flexibility, a visual interface is provided for users to display or shield warning information of various resources according to needs, and user experience is good.
EXAMPLE III
Corresponding to the foregoing embodiments, the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and running on the processor, where the processor may implement the above virtualized product alarm shielding method when executing the program.
As shown in FIG. 3, in some embodiments, the system is capable of operating as the electronic device described above in any of the embodiments for a method for virtualizing product alarm masks. In some embodiments, a system may include one or more computer-readable media (e.g., system memory or NVM/storage) having instructions and one or more processors (e.g., processor (s)) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform actions described herein.
For one embodiment, the system control module may include any suitable interface controller to provide any suitable interface to at least one of the processor(s) and/or any suitable device or component in communication with the system control module.
The system control module may include a memory controller module to provide an interface to the system memory. The memory controller module may be a hardware module, a software module, and/or a firmware module.
System memory may be used, for example, to load and store data and/or instructions for the system. For one embodiment, the system memory may comprise any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, the system control module may include one or more input/output (I/O) controllers to provide an interface to the NVM/storage and communication interface(s).
For example, the NVM/storage may be used to store data and/or instructions. The NVM/storage may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
The NVM/storage may include storage resources that are physically part of the device on which the system is installed, or it may be accessible by the device and not necessarily part of the device. For example, the NVM/storage may be accessible over a network via the communication interface(s).
The communication interface(s) may provide an interface for the system to communicate over one or more networks and/or with any other suitable device. The system may wirelessly communicate with one or more components of the wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) may be packaged together with logic for one or more controllers (e.g., memory controller modules) of the system control module. For one embodiment, at least one of the processor(s) may be packaged together with logic for one or more controllers of the system control module to form a System In Package (SiP). For one embodiment, at least one of the processor(s) may be integrated on the same die with logic for one or more controllers of the system control module. For one embodiment, at least one of the processor(s) may be integrated on the same die with logic of one or more controllers of a system control module to form a system on a chip (SoC).
In various embodiments, the system may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, the system may have more or fewer components and/or different architectures. For example, in some embodiments, a system includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including touch screen displays), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
Example four
Corresponding to the above embodiment, the present application further provides a computer-readable storage medium storing computer-executable instructions for executing the virtualized product alarm shielding method.
In the present embodiment, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information, such as computer-readable instructions, data structures, program modules, or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the true scope of the embodiments of the present application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A virtualized product alarm shielding method is characterized by comprising the following steps:
acquiring alarm shielding configuration information of a virtualized product;
according to the configuration information, selecting an alarm item to be shielded and at least one alarm object associated with the alarm item;
and sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data.
2. The virtualization product alarm masking method of claim 1, wherein the method further comprises:
and creating a visual page, wherein the visual page is used for displaying the configuration information.
3. The virtualization product alarm masking method of claim 2, wherein the method further comprises:
the visual page is further used for displaying an alarm list after the alarm item and the alarm object are shielded, so that a user can obtain the alarm condition after the alarm item and the alarm object are shielded according to the alarm list.
4. The virtualization product alarm masking method of claim 2, wherein the method further comprises:
creating one or more buttons in the visualization page, the buttons for controlling the shielding and/or display of the alert items and the alert objects.
5. The virtualization product alarm shielding method according to claim 1, wherein after the obtaining of the alarm shielding configuration information of the virtualization product, the method further comprises:
acquiring user requirements, and displaying alarm shielding configuration conditions of system resources according to the user requirements and the configuration information;
the selecting an alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information further includes:
and selecting the alarm item to be shielded and at least one alarm object associated with the alarm item according to the alarm shielding configuration condition.
6. The method for shielding alarms of virtualized products according to claim 5, wherein the alarm shielding configuration can include at least one of:
the name of the system resource, the type of the system resource, the alarm item shielded by the system resource, the operation condition of the alarm item shielded by the system resource and the configuration time of the alarm item shielded by the system resource.
7. The virtualization product alarm masking method of claim 1, wherein the method further comprises:
storing the alarm item and the alarm information of the alarm object;
and inquiring the associated alarm information in the background in response to the detection that the alarm information associated with the system fault is shielded, and processing the system fault according to the associated alarm information.
8. A virtualized product alert masking apparatus, comprising:
the acquisition module is used for acquiring alarm shielding configuration information of a virtualized product;
the configuration module is used for selecting an alarm item needing shielding and at least one alarm object associated with the alarm item according to the configuration information;
and the control module is used for sending the data of the alarm item and the alarm object to a background so that the background can shield the alarm item and the alarm object according to the data.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for shielding alarms in a virtualized product according to any of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium storing computer-executable instructions for performing the method for shielding alarms in a virtualized product according to any of claims 1 to 7.
CN202111360030.XA 2021-11-17 2021-11-17 Virtualized product alarm shielding method, device, equipment and medium Pending CN114202354A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111360030.XA CN114202354A (en) 2021-11-17 2021-11-17 Virtualized product alarm shielding method, device, equipment and medium
PCT/CN2022/123190 WO2023087956A1 (en) 2021-11-17 2022-09-30 Alarm shielding method and apparatus for virtualized product, and device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111360030.XA CN114202354A (en) 2021-11-17 2021-11-17 Virtualized product alarm shielding method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN114202354A true CN114202354A (en) 2022-03-18

Family

ID=80647757

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111360030.XA Pending CN114202354A (en) 2021-11-17 2021-11-17 Virtualized product alarm shielding method, device, equipment and medium

Country Status (2)

Country Link
CN (1) CN114202354A (en)
WO (1) WO2023087956A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023087956A1 (en) * 2021-11-17 2023-05-25 苏州浪潮智能科技有限公司 Alarm shielding method and apparatus for virtualized product, and device and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (en) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 Method for shielding alarm generated by base station
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104683155A (en) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 Alarm shielding mechanism in network management system
CN107358300A (en) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 A kind of intelligent O&M alarm filtering method and system based on multi-platform Autonomic prediction
CN109039740A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 A kind of method and apparatus handling O&M monitoring alarm
CN111585785A (en) * 2020-03-27 2020-08-25 中国平安人寿保险股份有限公司 Method and device for shielding alarm information, computer equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114202354A (en) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 Virtualized product alarm shielding method, device, equipment and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (en) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 Method for shielding alarm generated by base station
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104683155A (en) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 Alarm shielding mechanism in network management system
CN107358300A (en) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 A kind of intelligent O&M alarm filtering method and system based on multi-platform Autonomic prediction
CN109039740A (en) * 2018-08-01 2018-12-18 平安科技(深圳)有限公司 A kind of method and apparatus handling O&M monitoring alarm
CN111585785A (en) * 2020-03-27 2020-08-25 中国平安人寿保险股份有限公司 Method and device for shielding alarm information, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023087956A1 (en) * 2021-11-17 2023-05-25 苏州浪潮智能科技有限公司 Alarm shielding method and apparatus for virtualized product, and device and medium

Also Published As

Publication number Publication date
WO2023087956A1 (en) 2023-05-25

Similar Documents

Publication Publication Date Title
CN110333918B (en) Method and equipment for managing boarder programs
CN110321189B (en) Method and equipment for presenting hosted program in hosted program
CN112148700A (en) Log data processing method and device, computer equipment and storage medium
CN108984234B (en) Calling prompt method for mobile terminal and camera device
CN110377341B (en) Method, device, medium and electronic equipment for monitoring no-response exception
CN109582317B (en) Method and apparatus for debugging hosted applications
CN111049904A (en) Method and equipment for monitoring multiple public cloud resources
CN114816393B (en) Information generation method, device, equipment and storage medium
CN111125562B (en) Method and equipment for switching display tag pages
CN114202354A (en) Virtualized product alarm shielding method, device, equipment and medium
US20130339835A1 (en) Dynamic presentation of a results set by a form-based software application
US20150067139A1 (en) Agentless monitoring of computer systems
CN113515462A (en) Method, device, equipment and storage medium for testing
US20170324640A1 (en) Notifying original state listeners of events in a domain model
CN109284101A (en) Method and device for changing association of object attributes
US8719704B2 (en) Seamless integration of additional functionality into enterprise software without customization or apparent alteration of same
US11157590B2 (en) Script logging for markup language elements
CN112579664A (en) Processing method and device for chart linkage
US9384120B2 (en) Testing of transaction tracking software
CN115499327A (en) Method, apparatus, medium, and program product for three-dimensional visualization data center management
CN113157162A (en) Method, apparatus, medium and program product for revoking session messages
CN110888583B (en) Page display method, system and device and electronic equipment
CN114372003A (en) Test environment monitoring method and device and electronic equipment
US9858164B1 (en) Providing an information technology management prescription
CN105808468B (en) Control method, video controller and control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination