CN115499292B - Alarm method, device, equipment and storage medium - Google Patents

Alarm method, device, equipment and storage medium Download PDF

Info

Publication number
CN115499292B
CN115499292B CN202211134721.2A CN202211134721A CN115499292B CN 115499292 B CN115499292 B CN 115499292B CN 202211134721 A CN202211134721 A CN 202211134721A CN 115499292 B CN115499292 B CN 115499292B
Authority
CN
China
Prior art keywords
information
alarm event
data center
responding
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211134721.2A
Other languages
Chinese (zh)
Other versions
CN115499292A (en
Inventor
王琰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CCB Finetech Co Ltd
Original Assignee
CCB Finetech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CCB Finetech Co Ltd filed Critical CCB Finetech Co Ltd
Priority to CN202211134721.2A priority Critical patent/CN115499292B/en
Publication of CN115499292A publication Critical patent/CN115499292A/en
Application granted granted Critical
Publication of CN115499292B publication Critical patent/CN115499292B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5061Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
    • H04L41/5074Handling of user complaints or trouble tickets
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Alarm Systems (AREA)

Abstract

The disclosure provides an alarm method, an alarm device, alarm equipment and an alarm storage medium, relates to the technical field of computers, and can be applied to the financial field. The method comprises the following steps: monitoring the data center to obtain first information for indicating whether an alarm event exists in the data center; responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information for indicating whether the data center has the alarm event; responding to the first information and the second information to indicate that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information; responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have the alarm event, and acquiring first information corresponding to the next moment; and responding to the first information corresponding to the next time to indicate that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next time.

Description

Alarm method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of finance and computer technology, and in particular, to an alarm method, apparatus, device, medium, and program product.
Background
Nowadays, with the popularization and application of cloud computing technology, in order to solve the related works of daily automatic inspection, alarming and the like of a data center, more and more cloud computing manufacturers adopt some modes and systems to monitor daily events of the data center to a certain extent, and use manual or script modes to automatically inspect, and meanwhile, an ITSM system is introduced, so that operation and maintenance personnel can record and manage daily events conveniently. However, in the actual operation process of the data center, the automatic inspection system often generates some false alarms, the false alarms, and operation and maintenance personnel need to conduct event inspection and false screening according to the comprehensive operation and maintenance results of the automatic inspection. Meanwhile, a certain effort is required to record the event on the ITSM, sort and sort the event types, so that the efficiency is relatively low and the management is not facilitated.
Disclosure of Invention
In view of the foregoing, the present disclosure provides an alert method, apparatus, device, medium, and program product.
According to a first aspect of the present disclosure, there is provided an alarm method, comprising:
monitoring the data center to obtain first information, wherein the first information is used for indicating whether an alarm event exists in the data center;
Responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event;
responding to the first information to indicate that the data center has an alarm event and the second information to indicate that the data center has an alarm event, determining that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a certificate for operation and maintenance personnel to process the alarm event;
responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have the alarm event, and acquiring the first information corresponding to the next moment of the data center;
and responding to the first information corresponding to the next moment to indicate that the data center has the alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment.
According to an embodiment of the present disclosure, further comprising:
responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, and judging whether the number of times that the second information indicates that the data center does not have the alarm event exceeds a preset threshold value;
Responding to the second information to indicate that the number of times that the data center does not have the alarm event exceeds a preset threshold value, determining that the data center has the alarm event, and generating a second work order corresponding to the alarm event according to the first information and the second information corresponding to the next time;
and responding to the second information to indicate that the number of times that the data center does not have the alarm event does not exceed a preset threshold value, determining that the data center does not have the alarm event, and continuously executing the operation of automatically inspecting the data center to obtain the second information.
According to an embodiment of the disclosure, generating a work order corresponding to an alarm event according to first information and second information specifically includes:
acquiring preset monitoring information screening rules and automatic inspection information screening rules;
screening the first information by using a preset monitoring information screening rule to obtain first bill construction data, wherein the first bill construction data comprises keywords related to an alarm event;
screening the second information by using a preset automatic inspection information screening rule to obtain second building order data, wherein the second building order data comprises keywords related to an alarm event;
acquiring a preset work order generation rule;
generating a work order corresponding to the alarm event according to a preset work order generation rule by using the first construction order data and the second construction order data.
According to an embodiment of the present disclosure, screening first information using a preset monitoring information screening rule, obtaining first construction data includes:
analyzing the first information by using a preset information screening rule to obtain first work order data;
assembling the first worksheet data by using a preset information screening rule to obtain first worksheet data;
screening the second information by using a preset automatic inspection information screening rule, wherein the obtaining of the second construction data comprises the following steps:
analyzing the second information by using a preset automatic inspection information screening rule to obtain second work order data;
and assembling the second worksheet data by using a preset information screening rule to obtain second worksheet data.
According to an embodiment of the present disclosure, further comprising:
the worksheets comprise a confident worksheet and a suspicious worksheet, and the suspicious worksheet is inspected by operation and maintenance personnel;
responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center has an alarm event, determining that the data center has an alarm event, and generating a confident work order corresponding to the alarm event according to the first information and the second information;
responding to the first information corresponding to the next moment to indicate that the data center has the alarm event, determining that the data center has the alarm event, generating a suspicious work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment, and sending the suspicious work order to operation and maintenance personnel for investigation.
According to an embodiment of the present disclosure, further comprising:
and responding to the first information corresponding to the next moment to indicate that the data center does not have an alarm event, determining that the data center does not have the alarm event, and continuously executing the operation of monitoring the data center to obtain the first information.
A second aspect of the present disclosure provides an alarm device, comprising:
the monitoring module is used for monitoring the data center to obtain first information, and the first information is used for indicating whether an alarm event exists in the data center or not;
the inspection module is used for responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event;
the first generation module is used for responding to the first information indicating that the data center has the alarm event and the second information indicating that the data center has the alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a certificate for operation and maintenance personnel to process the alarm event;
the acquisition module is used for responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have the alarm event, and acquiring the first information corresponding to the next moment of the data center;
The second generation module is used for responding to the first information corresponding to the next time to indicate that the data center has the alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next time.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the alarm method, the alarm device, the alarm equipment, the alarm medium and the alarm program product provided by the disclosure, the data center is monitored to obtain first information, and the first information is used for indicating whether an alarm event exists in the data center; responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event; responding to the first information to indicate that the data center has an alarm event and the second information to indicate that the data center has an alarm event, determining that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a certificate for operation and maintenance personnel to process the alarm event; responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have the alarm event, and acquiring the first information corresponding to the next moment of the data center; and responding to the first information corresponding to the next moment to indicate that the data center has the alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment. The first information obtained by monitoring and the second information obtained by automatic inspection are combined to judge whether the alarm event exists in the data center, and meanwhile, the work order corresponding to the alarm event is generated by combining the first information obtained by monitoring and the second information obtained by automatic inspection, so that the problem of low alarm event processing efficiency caused by the fact that the alarm event and the like are inspected and screened manually is at least partially solved, and the technical effect of improving the processing efficiency of the alarm event is achieved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of an alert method, apparatus, device, medium and program product according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an alert method according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates a flow chart of another alert method according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow chart of a method of generating a work order corresponding to an alarm event from first information and second information according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates an overall flow chart of an alert method according to an embodiment of the present disclosure;
FIG. 6 schematically illustrates a block diagram of an alert device according to an embodiment of the present disclosure; and
fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement an alert method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing, applying and the like of the personal information of the user all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public order harmony is not violated.
In the technical scheme of the disclosure, the processes of acquiring, collecting, storing, using, processing, transmitting, providing, disclosing, applying and the like of the data all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public order harmony is not violated.
In order to facilitate a clearer understanding of the technical solutions of the present disclosure by those skilled in the art, some terms related to the present disclosure are explained in detail herein.
Automated inspection refers to automated daily health inspection of the various machines/components of the system through scripting/orchestration in a data center. The inspection items are overlapped with the alarms generated by the monitoring alarm panel, but the contents of the alarms generated by the monitoring alarm panel are more abundant and detailed.
At present, in order to solve the related works of daily inspection, event management and the like of a data center, the daily events of the data center are generally monitored to a certain extent, inspection is performed in a manual or script mode, and meanwhile, an ITSM system is introduced, so that operation and maintenance personnel can record and manage the daily events conveniently.
However, the inventor finds that the monitoring alarm frequently generates false alarms and false alarms in the actual operation in the process of realizing the conception of the disclosure, so that operation and maintenance personnel are required to spend a great deal of effort to check the generated false alarms and false alarms, meanwhile, automatic inspection and monitoring alarms are often not matched, the alarm content is required to be checked manually, the operation and maintenance personnel are required to check the event generated by the alarm manually and perform the bill construction operation, a great deal of characters are required to be recorded, and the efficiency is low.
Embodiments of the present disclosure provide an alert method, apparatus, electronic device, storage medium, and computer program product, which may be used in the financial or other fields, without limitation. The alarm method comprises the following steps: monitoring the data center to obtain first information, wherein the first information is used for indicating whether an alarm event exists in the data center; responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event; responding to the first information to indicate that the data center has an alarm event and the second information to indicate that the data center has an alarm event, determining that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a certificate for operation and maintenance personnel to process the alarm event; responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have the alarm event, and acquiring the first information corresponding to the next moment of the data center; and responding to the first information corresponding to the next moment to indicate that the data center has the alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment.
FIG. 1 schematically illustrates an application scenario diagram of an alert according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server/server cluster 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that, the alarm method provided by the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the alert devices provided by embodiments of the present disclosure may be generally disposed in the server 105. The alerting methods provided by the embodiments of the present disclosure may also be performed by a server or server cluster that is different from the server 105 and that is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the alarm device provided by the embodiments of the present disclosure may also be provided in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The following describes the alarm method of the disclosed embodiment in detail through fig. 2 to 5 based on the scenario described in fig. 1, so that those skilled in the art can more clearly understand the technical solution of the disclosure. It should be understood that the following description is only exemplary to assist those skilled in the art in understanding the aspects of the present disclosure and is not intended to limit the scope of the present disclosure.
In view of the above technical problems, the present disclosure provides an alarm method, fig. 2 schematically shows a flowchart of the alarm method according to an embodiment of the present disclosure, and fig. 5 schematically shows an overall flowchart of the alarm method according to an embodiment of the present disclosure. As shown in fig. 2, the alarm method of this embodiment includes operations S210 to S250.
In operation S210, the data center is monitored to obtain first information.
In operation S220, in response to the first information indicating that the data center has an alarm event, an automated inspection is performed on the data center to obtain second information.
In operation S230, in response to the first information indicating that the data center has an alarm event and the second information indicating that the data center has an alarm event, it is determined that the data center has an alarm event, and a work order corresponding to the alarm event is generated according to the first information and the second information.
In operation S240, in response to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have an alarm event, the first information corresponding to the next time of the data center is acquired.
In operation S250, in response to the first information corresponding to the next time indicating that the data center has the alarm event, the data center is determined to have the alarm event, and a work order corresponding to the alarm event is generated according to the first information and the second information corresponding to the next time.
Referring to fig. 2 and 5, according to an embodiment of the present disclosure, the first information and the second information in the present embodiment are both used to indicate whether an alarm event exists in the data center, and the work order is used to provide credentials for operation and maintenance personnel to process the alarm event. In the alarm method provided by the embodiment of the disclosure, the data center is monitored, and automatic inspection is performed on the data center to obtain second information under the condition that the monitored first information indicates that the alarm event exists in the data center, and whether the alarm event exists in the data center is judged by combining the monitored first information and the second information obtained by automatic inspection.
Referring to fig. 2 and 5, in the case that the first information indicates that the data center has an alarm event and the second information also indicates that the data center has an alarm event, it may be determined that the data center has an alarm event, and a work order corresponding to the alarm event is generated by combining the first information obtained by monitoring and the second information obtained by automatic inspection. When the first information obtained through monitoring indicates that an alarm event exists in the data center and the second information obtained through automatic inspection indicates that the alarm event does not exist in the data center, the first information corresponding to the next moment of the data center needs to be obtained, when the first information corresponding to the next moment indicates that the alarm event exists in the data center, the alarm event exists in the data center is determined, and a work order corresponding to the alarm event is generated according to the first information corresponding to the next moment and the second information obtained through automatic inspection. In addition, under the condition that the first information corresponding to the next moment indicates that the data center does not have the alarm event, the data center can be determined that the data center does not have the alarm event, and at the moment, the operation of monitoring the data center to obtain the first information is continuously executed.
The alarm method provided by the disclosure not only combines the first information obtained by monitoring and the second information obtained by automatic inspection to judge whether the alarm event exists in the data center, but also can judge whether the alarm event exists in the data center by combining the first information corresponding to the next moment when the indication result of the first information obtained by monitoring and the indication result of the second information obtained by automatic inspection are different, thereby avoiding the situation that the alarm event is still generated by monitoring false alarm, and generating the work order corresponding to the alarm event by combining the first information obtained by monitoring and the second information obtained by automatic inspection, so that the accuracy of judging whether the alarm event exists in the data center and the reliability of the generated work order are improved, and the efficiency of processing the alarm event according to the work order is improved.
Fig. 3 schematically illustrates a flow chart of another alert method according to an embodiment of the present disclosure. As shown in fig. 3, the method of this embodiment includes operations S310 to S370. The operations S310 to S340 may be implemented in the same or similar manner as the operations S210 to S240, and the repeated parts will not be described in detail.
In operation S310, the data center is monitored to obtain first information, where the first information is used to indicate whether an alarm event exists in the data center.
In operation S320, in response to the first information indicating that the data center has an alarm event, an automated inspection is performed on the data center to obtain second information, where the second information is used to indicate whether the data center has an alarm event.
In operation S330, in response to the first information indicating that the data center has the alarm event and the second information indicating that the data center has the alarm event, the data center is determined to have the alarm event, and a work order corresponding to the alarm event is generated according to the first information and the second information, the work order being used for providing credentials for operation and maintenance personnel to process the alarm event.
In operation S340, in response to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have an alarm event, the first information corresponding to the next time of the data center is acquired.
In operation S350, in response to the first information corresponding to the next time indicating that the data center has an alarm event, it is determined whether the number of times that the second information indicates that the data center does not have an alarm event exceeds a preset threshold.
In operation S360, in response to the second information indicating that the number of times the data center does not have the alarm event exceeds the preset threshold, it is determined that the data center has the alarm event, and a work order corresponding to the alarm event is generated according to the first information and the second information corresponding to the next time.
In operation S370, in response to the second information indicating that the number of times that the data center does not have the alarm event does not exceed the preset threshold, it is determined that the data center does not have the alarm event, and the operation of performing automatic inspection on the data center to obtain the second information is continuously performed.
Referring to fig. 3 and 5, according to an embodiment of the present disclosure, the second information obtained by the automated inspection and the first information corresponding to the next time are combined to determine whether an alarm event exists in the data center, because the monitoring may have a false alarm condition, and thus the first information obtained by the monitoring needs to be confirmed again. When the first information obtained by monitoring indicates that an alarm event exists in the data center and the second information obtained by automatic inspection indicates that the data center does not have the alarm event, the data center is indicated to have the possibility of the alarm event, but the automatic inspection does not find the alarm event, so that the first information corresponding to the next moment needs to be acquired. In this embodiment, when the first information corresponding to the next moment indicates that the data center has an alarm event, the number of times that the second information obtained by automatic inspection indicates that the data center does not have an alarm event may be counted, and the number of times is compared with a preset threshold value.
Referring to fig. 3 and 5, when the first information corresponding to the next moment indicates that the data center has an alarm event, judging whether the number of times that the second information indicates that the data center does not have the alarm event exceeds a preset threshold, generating a work order corresponding to the alarm event when the number of times that the second information indicates that the data center does not have the alarm event exceeds the preset threshold, and continuously executing automatic inspection on the data center to obtain the operation of the second information when the number of times that the second information indicates that the data center does not have the alarm event does not exceed the preset threshold. The threshold may be set according to actual requirements, for example, if the importance of the data center is high, and the alarm event of the data center is detected as much as possible, so as to reduce the influence caused by the existence of the alarm event in the data center, the threshold may be set relatively small, for example, may be 3. Specifically, the threshold may be set in conjunction with actual needs, which is not limited by the present disclosure.
According to the embodiment of the disclosure, not only the first information obtained by monitoring and the second information obtained by automatic inspection and the first information corresponding to the next moment are combined, but also the times of indicating that the data center does not have the alarm event by the second information obtained by automatic inspection are counted and compared with the preset threshold value, and whether the data center has the alarm event or not is judged according to the comparison result, so that the judgment accuracy of the alarm event of the data center is improved, and the processing efficiency of the alarm event of the data center is improved.
According to the embodiment of the disclosure, the first information obtained through monitoring can be converted into a message queue. Screening and filtering the alarm keywords in the first information obtained by monitoring through a preset rule, and constructing the alarm keywords obtained by screening into a message queue, wherein the message queue can be realized by adopting the kafka message queue.
Fig. 4 schematically illustrates a flowchart of a method of generating a work order corresponding to an alarm event from first information and second information according to an embodiment of the present disclosure. An example implementation of the above operation S230 is described in detail below with reference to fig. 4.
As shown in fig. 4, the method of this embodiment includes operations S410 to S450.
In operation S410, a preset monitoring information screening rule and an automatic inspection information screening rule are acquired.
In operation S420, the first information is filtered by using a preset monitoring information filtering rule, so as to obtain first bill data.
In this embodiment, the first information is parsed by using a preset information screening rule to obtain first worksheet data, and the first worksheet data is assembled by using the preset information screening rule to obtain first worksheet data.
In operation S430, the second information is screened by using a preset automatic inspection information screening rule, so as to obtain second bill data.
In this embodiment, the second information is parsed by using a preset automatic inspection information screening rule to obtain second work order data, and the second work order data is assembled by using the preset information screening rule to obtain second work order data.
In operation S440, a preset work order generation rule is acquired.
In operation S450, a work order corresponding to the alarm event is generated according to a preset work order generation rule using the first and second construction data.
According to an embodiment of the present disclosure, the first bill data and the second bill data in the present embodiment each include keywords related to an alarm event. In order to generate a work order corresponding to the alarm event more quickly and accurately, screening rules can be preset, the explanation of the terms above clearly shows that the information obtained by monitoring and automatic inspection is different, wherein the information obtained by automatic inspection is more detailed and deep, and therefore, the information screening rules need to be respectively set for the first information obtained by monitoring and the second information obtained by automatic inspection. Screening the first information obtained by monitoring by using a preset first information screening rule to obtain first bill construction data, screening the second information obtained by automatic inspection by using a preset second information screening rule to obtain second bill construction data, wherein the first bill construction data and the second bill construction data can comprise alarm event starting time, alarm event type, alarm event ending time and the like, and finally generating a work bill corresponding to the alarm event according to a preset work bill generation rule. The work order can comprise the work order number, and the work order number generated according to the monitoring result and the automatic inspection result can be distinguished from the work order number of the manually filled work order, so that the follow-up distinguishing of the sources of the work orders is facilitated.
In one embodiment of the present disclosure, the worksheets include a confident worksheet and a suspicious worksheet, the suspicious worksheet being inspected by an operation and maintenance person; responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center has an alarm event, determining that the data center has an alarm event, and generating a confident work order corresponding to the alarm event according to the first information and the second information; responding to the first information corresponding to the next moment to indicate that the data center has the alarm event, determining that the data center has the alarm event, generating a suspicious work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment, and sending the suspicious work order to operation and maintenance personnel for investigation.
According to the embodiment of the disclosure, the generated worksheets can be classified, different types of worksheets can be generated under different conditions, for example, the worksheets can be classified into a confident worksheets and suspicious worksheets, wherein the confident worksheets are directly delivered to operation and maintenance personnel for processing after being generated, and the operation and maintenance personnel are required to be sent to the operation and maintenance personnel for checking after being generated, for example, the operation and maintenance personnel confirm the alarm events corresponding to the suspicious worksheets, confirm whether the alarm events corresponding to the suspicious worksheets exist in a data center or not, and the related information of the alarm events recorded in the suspicious worksheets is correct or not, and then process the alarm events according to the suspicious worksheets under the condition that the suspicious worksheets are confirmed to be correct.
In the embodiment, the generated worksheets are classified, and different types of worksheets have corresponding processing methods, particularly, the suspicious worksheets are firstly checked and then the corresponding alarm events are processed when the suspicious worksheets are confirmed to be correct, so that the processing efficiency of the alarm events of the data center can be effectively improved.
Based on the alarming method, the disclosure further provides an alarming device. The device will be described in detail below in connection with fig. 6.
Fig. 6 schematically illustrates a block diagram of an alert device according to an embodiment of the present disclosure.
As shown in fig. 6, the alarm device 600 of this embodiment includes a monitoring module 610, a patrol module 620, a first generating module 630, an obtaining module 640, and a second generating module 650.
The monitoring module 610 is configured to monitor the data center to obtain first information, where the first information is used to indicate whether an alarm event exists in the data center. In an embodiment, the monitoring module 610 may be configured to perform the operation S210 described above, which is not described herein.
The inspection module 620 is configured to perform automated inspection on the data center in response to the first information indicating that the data center has an alarm event, and obtain second information, where the second information is used to indicate whether the data center has the alarm event. In an embodiment, the inspection module 620 may be configured to perform the operation S220 described above, which is not described herein.
The first generating module 630 is configured to determine that the data center has an alarm event in response to the first information indicating that the data center has the alarm event and the second information indicating that the data center has the alarm event, and generate a work order corresponding to the alarm event according to the first information and the second information, where the work order is configured to provide credentials for operation and maintenance personnel to process the alarm event. In an embodiment, the first generating module 630 may be used to perform the operation S230 described above, which is not described herein.
The acquiring module 640 is configured to acquire first information corresponding to a next time of the data center in response to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have an alarm event. In an embodiment, the obtaining module 640 may be configured to perform the operation S240 described above, which is not described herein.
The second generating module 650 is configured to determine that the data center has an alarm event in response to the first information corresponding to the next time indicating that the data center has the alarm event, and generate a work order corresponding to the alarm event according to the first information and the second information corresponding to the next time. In an embodiment, the second generating module 650 may be configured to perform the operation S250 described above, which is not described herein.
It should be noted that, in the embodiment of the apparatus portion, the implementation manner, the solved technical problem, the realized function, and the achieved technical effect of each module/unit/subunit and the like are the same as or similar to the implementation manner, the solved technical problem, the realized function, and the achieved technical effect of each corresponding step in the embodiment of the method portion, and are not described herein again.
Any of the monitoring module 610, the inspection module 620, the first generation module 630, the acquisition module 640, and the second generation module 650 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules, according to embodiments of the present disclosure. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the monitoring module 610, the inspection module 620, the first generation module 630, the acquisition module 640, and the second generation module 650 may be implemented at least in part as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of any of the three. Alternatively, at least one of the monitoring module 610, the inspection module 620, the first generation module 630, the acquisition module 640, and the second generation module 650 may be at least partially implemented as computer program modules that, when executed, perform the corresponding functions.
Fig. 7 schematically illustrates a block diagram of an electronic device adapted to implement an alert method according to an embodiment of the disclosure.
As shown in fig. 7, an electronic device 700 according to an embodiment of the present disclosure includes a processor 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 703, various programs and data necessary for the operation of the electronic apparatus 700 are stored. The processor 701, the ROM702, and the RAM 703 are connected to each other through a bus 704. The processor 701 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM702 and/or the RAM 703. Note that the program may be stored in one or more memories other than the ROM702 and the RAM 703. The processor 701 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 700 may further include an input/output (I/O) interface 705, the input/output (I/O) interface 705 also being connected to the bus 704. The electronic device 700 may also include one or more of the following components connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 702 and/or RAM 703 and/or one or more memories other than ROM 702 and RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the alert method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (8)

1. An alert method, comprising:
monitoring a data center to obtain first information, wherein the first information is used for indicating whether an alarm event exists in the data center;
Responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event;
responding to the first information to indicate that the data center has an alarm event and the second information to indicate that the data center has an alarm event, determining that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a credential for operation and maintenance personnel to process the alarm event;
responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have an alarm event, and acquiring the first information corresponding to the next moment of the data center;
responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment;
the method further comprises the steps of:
Responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, and judging whether the number of times that the second information indicates that the data center does not have the alarm event exceeds a preset threshold value;
responding to the second information to indicate that the number of times that the data center does not have the alarm event exceeds the preset threshold value, determining that the data center has the alarm event, and generating a second work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment;
and responding to the second information to indicate that the number of times that the data center does not have the alarm event does not exceed the preset threshold value, determining that the data center does not have the alarm event, and continuing to execute the operation of automatically inspecting the data center to obtain the second information.
2. The method according to claim 1, wherein the generating a work order corresponding to the alarm event according to the first information and the second information specifically includes:
acquiring preset monitoring information screening rules and automatic inspection information screening rules;
screening the first information by using the preset monitoring information screening rule to obtain first building order data, wherein the first building order data comprises keywords related to the alarm event;
Screening the second information by using the preset automatic inspection information screening rule to obtain second building order data, wherein the second building order data comprises keywords related to the alarm event;
acquiring a preset work order generation rule;
and generating a work order corresponding to the alarm event according to the preset work order generation rule by utilizing the first construction order data and the second construction order data.
3. The method of claim 2, wherein,
the step of screening the first information by using the preset monitoring information screening rule, and the step of obtaining the first construction data comprises the following steps:
analyzing the first information by utilizing the preset information screening rule to obtain first worksheet data;
assembling the first worksheet data by utilizing the preset information screening rule to obtain the first worksheet data;
screening the second information by using the preset automatic inspection information screening rule, wherein the obtaining the second construction data comprises the following steps:
analyzing the second information by utilizing the preset automatic inspection information screening rule to obtain second work order data;
and assembling the second worksheet data by utilizing the preset information screening rule to obtain the second worksheet data.
4. The alert method according to claim 1, wherein the method further comprises:
the worksheets comprise a confident worksheet and a suspicious worksheet, and the suspicious worksheet is inspected by the operation and maintenance personnel;
responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center has an alarm event, determining that the data center has an alarm event, and generating a confident work order corresponding to the alarm event according to the first information and the second information;
responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, determining that the data center has the alarm event, generating a suspicious work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment, and sending the suspicious work order to the operation and maintenance personnel for investigation.
5. The alert method according to claim 1, wherein the method further comprises:
and responding to the first information corresponding to the next moment to indicate that the data center does not have an alarm event, determining that the data center does not have the alarm event, and continuing to execute the operation of monitoring the data center to obtain the first information.
6. An alert device, comprising:
the monitoring module is used for monitoring the data center to obtain first information, and the first information is used for indicating whether an alarm event exists in the data center or not;
the inspection module is used for responding to the first information to indicate that the data center has an alarm event, and automatically inspecting the data center to obtain second information, wherein the second information is used for indicating whether the data center has the alarm event;
the first generation module is used for responding to the first information to indicate that the data center has an alarm event and the second information to indicate that the data center has an alarm event, determining that the data center has an alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information, wherein the work order is used for providing a certificate for operation and maintenance personnel to process the alarm event;
the acquisition module is used for responding to the first information indicating that the data center has an alarm event and the second information indicating that the data center does not have an alarm event, and acquiring the first information corresponding to the next moment of the data center;
The second generation module is used for responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, determining that the data center has the alarm event, and generating a work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment;
the alarm device is also used for:
responding to the first information corresponding to the next moment to indicate that the data center has an alarm event, and judging whether the number of times that the second information indicates that the data center does not have the alarm event exceeds a preset threshold value;
responding to the second information to indicate that the number of times that the data center does not have the alarm event exceeds the preset threshold value, determining that the data center has the alarm event, and generating a second work order corresponding to the alarm event according to the first information and the second information corresponding to the next moment;
and responding to the second information to indicate that the number of times that the data center does not have the alarm event does not exceed the preset threshold value, determining that the data center does not have the alarm event, and continuing to execute the operation of automatically inspecting the data center to obtain the second information.
7. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-5.
8. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-5.
CN202211134721.2A 2022-09-16 2022-09-16 Alarm method, device, equipment and storage medium Active CN115499292B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211134721.2A CN115499292B (en) 2022-09-16 2022-09-16 Alarm method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211134721.2A CN115499292B (en) 2022-09-16 2022-09-16 Alarm method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115499292A CN115499292A (en) 2022-12-20
CN115499292B true CN115499292B (en) 2023-07-14

Family

ID=84470611

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211134721.2A Active CN115499292B (en) 2022-09-16 2022-09-16 Alarm method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115499292B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888785A (en) * 2018-09-11 2020-03-17 福建天晴数码有限公司 Method and device for monitoring alarm

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113225212A (en) * 2021-04-30 2021-08-06 中国联合网络通信集团有限公司 Data center monitoring system, method and server

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110888785A (en) * 2018-09-11 2020-03-17 福建天晴数码有限公司 Method and device for monitoring alarm

Also Published As

Publication number Publication date
CN115499292A (en) 2022-12-20

Similar Documents

Publication Publication Date Title
CN113495820B (en) Anomaly information collecting and processing method and device and anomaly monitoring system
CN115174353A (en) Fault root cause determination method, device, equipment and medium
CN116760638B (en) Information processing method, system, electronic device and storage medium
CN112256548A (en) Abnormal data monitoring method and device, server and storage medium
CN115499292B (en) Alarm method, device, equipment and storage medium
CN111784176A (en) Data processing method, device, server and medium
CN115203178A (en) Data quality inspection method and device, electronic equipment and storage medium
CN115202973A (en) Application running state determining method and device, electronic equipment and medium
CN114218283A (en) Abnormality detection method, apparatus, device, and medium
CN113900905A (en) Log monitoring method and device, electronic equipment and storage medium
CN113419887A (en) Method and device for processing abnormal online transaction of host
CN113961441A (en) Alarm event processing method, auditing method, device, equipment, medium and product
CN114938341B (en) Environment detection method and device, electronic equipment and storage medium
CN114996119B (en) Fault diagnosis method, fault diagnosis device, electronic device and storage medium
CN114024867B (en) Network anomaly detection method and device
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN113094268B (en) Test method, test device, test equipment and test medium
CN116664307A (en) Transaction data detection method, apparatus, device, medium and program product
CN118260160A (en) Index monitoring method, device, equipment, medium and program product
CN117130812A (en) System fault detection method, apparatus, device, medium and program product
CN116484436A (en) Webpage tampering monitoring method and device, electronic equipment and medium
CN117493207A (en) Page processing method, device, electronic equipment and storage medium
CN117076267A (en) Monitoring method and device based on alarm automatic diagnosis, electronic equipment and medium
CN114022123A (en) Information prompting method, device, equipment, storage medium and program product
CN116701123A (en) Task early warning method, device, equipment, medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant