CN115878427A - Monitoring alarm method, device, electronic equipment and storage medium - Google Patents

Monitoring alarm method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115878427A
CN115878427A CN202211649117.3A CN202211649117A CN115878427A CN 115878427 A CN115878427 A CN 115878427A CN 202211649117 A CN202211649117 A CN 202211649117A CN 115878427 A CN115878427 A CN 115878427A
Authority
CN
China
Prior art keywords
alarm
monitoring
instruction
rule
monitored object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211649117.3A
Other languages
Chinese (zh)
Inventor
王兆宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Communication Information System Co Ltd
Original Assignee
Inspur Communication Information System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Communication Information System Co Ltd filed Critical Inspur Communication Information System Co Ltd
Priority to CN202211649117.3A priority Critical patent/CN115878427A/en
Publication of CN115878427A publication Critical patent/CN115878427A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention provides a monitoring alarm method, a monitoring alarm device, electronic equipment and a storage medium, wherein a configuration file of a monitored object is obtained, and the configuration file comprises performance index information of the monitored object; then, generating an alarm rule corresponding to the monitoring object according to the configuration file; subsequently, loading the alarm rule to establish a monitoring rule corresponding to the monitoring object; and when the performance index of the monitored object accords with the monitoring rule, giving an alarm. The method realizes real-time monitoring on the target equipment in a high-concurrency scene by acquiring the configuration file of the monitored object and extracting the performance parameters contained in the configuration file.

Description

Monitoring alarm method, device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data monitoring technologies, and in particular, to a monitoring alarm method and apparatus, an electronic device, and a storage medium.
Background
With the rapid development of the internet, the scale of software, hardware and software systems of computers is also rapidly increasing. The rapidly increasing software scale and data scale bring new challenges to the expandability and real-time performance of system monitoring.
With the continuous expansion of the scale of the k8s cluster, and the problem of monitoring deficiency of the existing monitoring program, the bottleneck of the monitoring program in a high-concurrency scene is more prominent, and the local storage mode and the acquisition mode of the monitoring program cannot completely meet the concurrency requirement of reading and writing of large-scale monitoring.
Disclosure of Invention
The invention provides a monitoring alarm method, a monitoring alarm device, electronic equipment and a storage medium, which are used for overcoming the defect that monitoring in the prior art cannot meet a high-concurrency scene and realizing real-time monitoring on the equipment.
In a first aspect, the present invention provides a monitoring alarm method, including:
acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
generating an alarm rule corresponding to the monitoring object according to the configuration file;
loading the alarm rule to establish a monitoring rule corresponding to the monitoring object;
and when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
According to the monitoring alarm method provided by the invention, when the performance index of the monitored object accords with the monitoring rule, the alarm is carried out through the monitoring program, and the method comprises the following steps:
when the performance index of the monitored object is larger than a preset alarm threshold value in the monitoring rule, generating an alarm instruction;
and alarming according to the alarm instruction.
According to the monitoring alarm method provided by the invention, the alarm is performed according to the alarm instruction, and the method specifically comprises the following steps:
generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
According to the monitoring alarm method provided by the invention, the generating of the corresponding alarm information according to the alarm instruction specifically comprises the following steps:
acquiring the generation times of the alarm instruction;
when the generation times of the alarm instruction are larger than the preset alarm times, generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
According to the monitoring alarm method provided by the invention, the monitoring rule comprises an alarm type, and the alarm type comprises a first alarm instruction and a second alarm instruction;
the sending of the alarm information to a preset terminal specifically includes:
when the first performance index of the monitored object is larger than a first preset alarm threshold value, generating a first alarm instruction, sending the alarm information to a preset terminal according to the first alarm instruction, and uploading the first alarm instruction to a historical alarm database;
and when the second performance index of the monitored object is larger than a second preset alarm threshold value, generating the second alarm instruction, and clearing the second alarm instruction.
According to the monitoring alarm method provided by the invention, after the alarm is performed by the monitoring program and the first alarm instruction is uploaded to a historical alarm database, the method further comprises the following steps:
and when the first performance index of the monitored object is smaller than a first preset alarm threshold value, generating alarm ending time, and uploading the alarm ending time to a historical alarm database.
According to the monitoring alarm method provided by the invention, after the alarm rule is loaded to establish the monitoring rule corresponding to the monitored object, the method further comprises the following steps:
acquiring a query instruction, wherein the query instruction indicates query information;
acquiring target performance index information corresponding to the query information in the configuration file based on the query instruction;
and visually displaying the target performance index information.
In a second aspect, the present invention further provides a monitoring alarm device, including:
the file acquisition module is used for acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
the rule generating module is used for generating an alarm rule corresponding to the monitoring object according to the configuration file;
the rule loading module is used for loading the alarm rule so as to establish a monitoring rule corresponding to the monitored object;
and the alarm module is used for giving an alarm when the performance index of the monitored object conforms to the monitoring rule.
In a third aspect, the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the computer program to implement any of the monitoring and warning methods described above.
In a fourth aspect, the present invention also provides a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a monitoring alarm method as described in any of the above.
According to the monitoring alarm method, the monitoring alarm device, the electronic equipment and the storage medium, the configuration file of the monitored object is obtained, and the configuration file comprises the performance index information of the monitored object; generating an alarm rule corresponding to the monitoring object according to the configuration file; loading the alarm rule to establish a monitoring rule corresponding to the monitoring object; and when the performance index of the monitored object accords with the monitoring rule, giving an alarm. By acquiring the configuration file of the monitored object in real time and extracting the performance parameters contained in the configuration file, the health condition of the equipment of the monitored object can be acquired by using smaller running resources, so that the target equipment can be monitored in real time under a high concurrency scene.
Drawings
In order to more clearly illustrate the technical solutions of the present invention or the prior art, the drawings needed for the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flow chart of a monitoring alarm method provided by the present invention;
FIG. 2 is a schematic structural diagram of a monitoring alarm device provided by the present invention;
fig. 3 is a schematic structural diagram of an electronic device provided in the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Before further detailed description of the embodiments of the present application, terms and expressions referred to in the embodiments of the present application will be described, and the terms and expressions referred to in the embodiments of the present application will be used for the following explanation.
1) VictoriaMetrics, is a fast, cost effective and scalable monitoring solution and time series database.
2) Valert, which implements a list of given alerts or logging rules according to configuration. The logging rule results are retained by the remote write protocol and need to be configured.
The invention is illustrated below on the basis of VictoriaMetrics and vmaert.
In order to effectively meet the equipment monitoring requirement in a high concurrency scene, the embodiment of the invention provides a monitoring alarm method which is used for solving the defect that the monitoring in the prior art cannot meet the high concurrency scene and realizing the real-time monitoring on equipment. The monitoring and warning method, as shown in fig. 1, includes, but is not limited to, the following steps:
step 110, obtaining a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
step 120, generating an alarm rule corresponding to the monitoring object according to the configuration file;
step 130, loading the alarm rule to establish a monitoring rule corresponding to the monitored object;
and 140, when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
Specifically, a configuration file of an object to be monitored is obtained, one or more monitoring objects may be obtained, and the obtained configuration file includes performance index information of the monitoring object, such as: dominant frequency, word length, memory capacity, access cycle, and operation speed. Then according to the object and performance index to be monitored, generating an alarm rule file, and then loading the alarm rule file to establish the monitoring rule corresponding to the monitored object.
In step S1, the configuration file of the monitoring object mainly includes various performance indexes of the monitoring object. Specifically, in this embodiment, there is no limitation on an acquisition channel of the configuration file of the monitoring object, and the configuration file of the monitoring object may be directly acquired from the target device, or may be acquired from other electronic devices and computer systems through a data transmission interface or remote communication transmission.
Further, in order to reduce the operating pressure of the monitoring program, the configuration file of the monitored object may be acquired every other preset period. The preset period can be determined by a technician according to the characteristics of the service, and the monitoring program can periodically detect whether the time interval between the current time and the last threshold updating time reaches the preset period or not, and when the preset period is reached, obtain the configuration file of the monitored object before the current time point, so that the data of the monitored object is updated based on the configuration file of the monitored object, the real-time performance and the accuracy of monitoring are improved, and the accuracy of threshold alarming is improved.
Further, the configuration files may be grouped according to the types of the monitoring objects, and after the grouping, the configuration files may be sent to a monitoring directory of VictoriaMetrics, and the configuration files are reloaded by hot loading of the VictoriaMetrics, so as to store the performance indexes of the monitoring objects.
In step S2, because different monitored objects have different performance index requirements, corresponding alarm rules need to be formulated according to the monitored objects. Specifically, a corresponding alarm rule file is generated according to the configuration file obtained in the step S1. The monitoring objects comprise a Linux server, a windows server, a redis, a springboot, a nacos, a springclosed, an sftp, an api, a process, a mysql, an oracle and the like. The alarm rules can be generated by default through a monitoring program, and can also be modified in a personalized manner according to the requirements of users.
In step S3, the alarm rule generated in step S2 is loaded to establish a monitoring rule corresponding to the monitored object. The monitoring rule may include parameters such as a target performance index threshold value, preset alarm times, an alarm mode and the like corresponding to the monitored object. The monitoring program can perform monitoring operation according to the monitoring rule so as to realize real-time monitoring on the monitored object. For example, the monitoring program may alarm when the target of the monitored object does not meet the target performance indicator threshold; when the alarm times of the monitoring program are larger than the preset alarm times, the related personnel can be notified, and the notification mode comprises mails, short messages, social software and the like; the alarm mode comprises one or more contact modes of the alarm personnel, and the monitoring program can send alarm information by searching the contact modes of the alarm personnel.
Furthermore, the alarm rule files can be grouped according to the types of the monitoring objects, the configuration files can be sent to a Vmean monitoring directory after grouping, and the configuration files are hot-loaded through Vmean to realize real-time monitoring on the monitoring objects.
In step S4, when it is detected that the performance index of the monitored object meets the monitoring rule, an alarm is given. The monitoring rule may be a plurality of target performance indicators for one monitoring object, such as: and when the CPU utilization rate of the Linux server is detected to be greater than 80% and the disk utilization rate is detected to be greater than 80%, an alarm is given. The target performance index may also be a target performance index for a plurality of monitored objects, and the embodiment is not particularly limited.
As a further optional embodiment, when the performance index of the monitored object meets the monitoring rule, the step of giving an alarm through the monitoring program includes:
when the performance index of the monitored object is larger than a preset alarm threshold value in the monitoring rule, generating an alarm instruction;
and alarming according to the alarm instruction.
In this embodiment, in order to ensure normal operation of the monitored object, a preset alarm threshold may be set, and when one or more performance indexes of the monitored object exceed the preset alarm threshold, the monitoring program generates an alarm instruction and performs an alarm according to the alarm instruction. The preset alarm threshold value can be determined by technical personnel according to the characteristics of the service, and the monitoring program can periodically acquire a target performance index from the configuration file of the monitored object and detect whether the target performance index reaches the preset alarm threshold value, so that the data of the monitored object is updated based on the configuration file of the monitored object, the real-time performance and the accuracy of monitoring are improved, and the accuracy of threshold value alarm is improved.
As a further optional embodiment, the step of performing an alarm according to the alarm instruction specifically includes:
generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
In this embodiment, in order to ensure that the technician is notified at the first time when the alarm occurs, corresponding alarm information needs to be sent to the technician. The contact information of the technical personnel includes but is not limited to short messages, enterprise WeChat, mailbox and other alarm information. Specifically, the monitoring program searches the contact information of the technical staff and sends corresponding warning information to the technical staff according to the established monitoring rule. Illustratively, when detecting that the CPU utilization of the Linux server is greater than 80%, the monitoring program may find the contact information of the technician and remind the technician, for example, the monitoring program may send a mail "lei fei he, the CPU utilization of the Linux server now exceeds 80%, and please solve in time" to the technician.
Further, in the case of sending the alarm message, the setting of the encoding information may be performed for each monitored object. For example, the monitored object is numbered according to the information such as the object type and the position, such as: a201-001, where a is used to indicate that the monitored object is a Linux server, 201 is used to indicate that the server is located in the machine room No. 201, and 001 is used to indicate that the server is located in the 001 column, and in this embodiment, how to perform the setting of the encoding information is not specifically limited. Through the setting of the coding information of the monitored object, a technician can quickly determine the abnormal monitored object according to the coding information and realize accurate positioning.
As a further optional embodiment, the generating, according to the alarm instruction, corresponding alarm information specifically includes:
acquiring the generation times of the alarm instruction;
when the generation times of the alarm instruction are larger than the preset alarm times, generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
In this embodiment, in order to avoid the occurrence of false alarm or repeated alarm, while generating an alarm instruction, the monitoring program may obtain corresponding historical alarm times from the historical alarm database, and when the generation times of the alarm instruction is greater than a preset alarm time, generate corresponding alarm information according to the alarm instruction. Specifically, the alarm instruction generated by the monitoring program may be uploaded to a historical alarm database, so that a technician may perform equipment maintenance subsequently. When the monitoring program generates an alarm instruction, the alarm instruction is not given at the first time, but the data in the historical alarm database is called, the historical alarm frequency of the target performance index corresponding to the alarm instruction is checked, and when the historical alarm frequency is greater than the preset alarm frequency, the alarm is given, corresponding alarm information is generated and sent to a terminal reserved by a technician. It can be understood that the performance index data in the historical alarm database called by the alarm information and the monitoring program correspond to the same performance index of the same monitoring object. In addition, the generated alarm information can be adaptively adjusted according to different monitoring objects and different performance indexes, for example, the alarm information of the Linux server and the windows server is different, and the alarm information of the CPU utilization rate and the disk utilization rate is also different.
Further, in order to avoid multiple alarms in a short time, the alarms in the short time may be merged, specifically, an alarm receiving http interface may be configured by vmaert, index data stored by victoria metrics is obtained, and compared with a monitoring rule, if an alarm condition is met, the alarm is sent to an alarm cache module through the http interface, and the alarm cache module may cache the alarms within one minute, merge and repeat the alarms, and then send the alarms.
As a further optional embodiment, the monitoring rule includes an alarm type, and the alarm type includes a first alarm instruction and a second alarm instruction;
the sending of the alarm information to a preset terminal specifically includes:
when the first performance index of the monitored object is larger than a first preset alarm threshold value, generating a first alarm instruction, sending the alarm information to a preset terminal according to the first alarm instruction, and uploading the first alarm instruction to a historical alarm database;
and when the second performance index of the monitored object is larger than a second preset alarm threshold value, generating the second alarm instruction, and clearing the second alarm instruction.
In this embodiment, in order to distinguish a target performance index that needs to be monitored from a non-target performance index that does not need to be monitored, specifically, the target performance index that needs to be monitored is used as a first performance index, the non-target performance index that does not need to be monitored is used as a second performance index, for the first performance index, if the first performance index of the monitored object is greater than a first preset alarm threshold, a first alarm instruction will be generated, and the first alarm instruction is entered into a historical alarm database, and a technician is notified by a short message to solve an alarm. And for the second performance index, the alarm which is not concerned about is selected to be recorded into the database, or not to be recorded into the database, and technical personnel do not need to be informed. For which performance indexes in the monitored object belong to the first performance index and which performance indexes belong to the second performance index, a technician may specifically set the performance indexes according to the service requirement, which is not specifically limited in this embodiment.
As a further optional embodiment, after the performing the alarm by the monitoring program and uploading the first alarm instruction to the historical alarm database, the method further includes:
and when the first performance index of the monitored object is smaller than a first preset alarm threshold value, generating alarm ending time, and uploading the alarm ending time to a historical alarm database.
In this embodiment, after the technician finishes processing the alarm, and when the next detection period of the monitoring program comes, it is detected that the first performance index of the monitored object is smaller than the first preset alarm threshold, which indicates that the alarm is processed, the alarm-solving time is used as the alarm end time, and the alarm end time is uploaded to the historical alarm database, so that the technician can perform subsequent equipment maintenance.
As a further optional embodiment, after the loading the alarm rule to establish the monitoring rule corresponding to the monitoring object, the method further includes:
acquiring a query instruction, wherein the query instruction indicates query information;
acquiring target performance index information corresponding to the query information in the configuration file based on the query instruction;
and visually displaying the target performance index information.
In this embodiment, in order to facilitate a technician to query the health status of the device of the monitored object in real time, the query instruction sent by the user terminal may be acquired, where the query instruction indicates query information for representing information that the user wants to query, and then the monitoring program may access the configuration file of the monitored object, query the target performance index information according to the query information, and visually display the queried target performance index information.
Further, the monitoring alarm method provided by the embodiment of the present invention may assist the user in performing the equipment maintenance work by using the equipment monitoring APP by loading a set of information management system on the mobile end device. Illustratively, the device monitoring APP may present three interfaces, which are a map display interface, a summary interface, and a device information interface. The above-mentioned several surfaces can be displayed in one main interface, and different sub-interfaces can be entered by clicking different areas to acquire each information given to the sub-interfaces.
The following describes the monitoring and warning device provided by the present invention, and the monitoring and warning device described below and the monitoring and warning method described above may be referred to correspondingly. As shown in fig. 2, the monitoring and warning device includes:
the file acquisition module is used for acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
the rule generating module is used for generating an alarm rule corresponding to the monitoring object according to the configuration file;
the rule loading module is used for loading the alarm rule so as to establish a monitoring rule corresponding to the monitored object;
and the alarm module is used for giving an alarm when the performance index of the monitored object conforms to the monitoring rule.
The monitoring alarm device provided by the invention acquires a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object; then, generating an alarm rule corresponding to the monitoring object according to the configuration file; subsequently, loading the alarm rule to establish a monitoring rule corresponding to the monitoring object; and when the performance index of the monitored object accords with the monitoring rule, giving an alarm. The method realizes real-time monitoring on the target equipment in a high-concurrency scene by acquiring the configuration file of the monitored object and extracting the performance parameters contained in the configuration file.
Fig. 3 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 3: a processor (processor) 310, a communication Interface (communication Interface) 320, a memory (memory) 330 and a communication bus 340, wherein the processor 310, the communication Interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may invoke logic instructions in the memory 330 to perform a monitoring alarm method comprising:
acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
generating an alarm rule corresponding to the monitoring object according to the configuration file;
loading the alarm rule to establish a monitoring rule corresponding to the monitoring object;
and when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, the present invention also provides a computer program product, the computer program product including a computer program, the computer program being stored on a non-transitory computer readable storage medium, wherein when the computer program is executed by a processor, a computer is capable of executing the monitoring alarm method provided by the above methods, and the method includes:
acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
generating an alarm rule corresponding to the monitoring object according to the configuration file;
loading the alarm rule to establish a monitoring rule corresponding to the monitoring object;
and when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
In yet another aspect, the present invention also provides a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method for monitoring alarms provided by the above methods, the method comprising:
acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
generating an alarm rule corresponding to the monitoring object according to the configuration file;
loading the alarm rule to establish a monitoring rule corresponding to the monitoring object;
and when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A monitoring alarm method is characterized by comprising the following steps:
acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
generating an alarm rule corresponding to the monitoring object according to the configuration file;
loading the alarm rule to establish a monitoring rule corresponding to the monitoring object;
and when the performance index of the monitored object accords with the monitoring rule, giving an alarm.
2. The monitoring alarm method according to claim 1, wherein when the performance index of the monitored object meets the monitoring rule, performing an alarm includes:
when the performance index of the monitored object is larger than a preset alarm threshold value in the monitoring rule, generating an alarm instruction;
and alarming according to the alarm instruction.
3. The monitoring and warning method according to claim 2, wherein the warning according to the warning instruction specifically includes:
generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
4. The monitoring alarm method according to claim 3, wherein the generating corresponding alarm information according to the alarm instruction specifically includes:
acquiring the generation times of the alarm instruction;
when the generation times of the alarm instruction are larger than the preset alarm times, generating corresponding alarm information according to the alarm instruction;
and sending the alarm information to a preset terminal.
5. The monitoring alarm method according to claim 3, wherein the monitoring rule includes an alarm type, the alarm type including a first alarm instruction and a second alarm instruction;
the sending of the alarm information to a preset terminal specifically includes:
when the first performance index of the monitored object is larger than a first preset alarm threshold value, generating a first alarm instruction, sending the alarm information to a preset terminal according to the first alarm instruction, and uploading the first alarm instruction to a historical alarm database;
and when the second performance index of the monitored object is larger than a second preset alarm threshold value, generating the second alarm instruction, and clearing the second alarm instruction.
6. The monitoring alarm method according to claim 5, further comprising, after the sending the alarm information to a preset terminal and uploading the first alarm instruction to a historical alarm database:
and when the first performance index of the monitored object is smaller than a first preset alarm threshold value, generating alarm ending time, and uploading the alarm ending time to a historical alarm database.
7. The monitoring alarm method according to claim 1, wherein after the loading the alarm rule to establish the monitoring rule corresponding to the monitoring object, further comprising:
acquiring a query instruction, wherein the query instruction indicates query information;
acquiring target performance index information corresponding to the query information in the configuration file based on the query instruction;
and visually displaying the target performance index information.
8. A monitoring and alarm device, comprising:
the file acquisition module is used for acquiring a configuration file of a monitored object, wherein the configuration file comprises performance index information of the monitored object;
the rule generating module is used for generating an alarm rule corresponding to the monitoring object according to the configuration file;
the rule loading module is used for loading the alarm rule so as to establish a monitoring rule corresponding to the monitored object;
and the alarm module is used for giving an alarm when the performance index of the monitored object conforms to the monitoring rule.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the monitoring alarm method according to any of claims 1 to 7 when executing the program.
10. A non-transitory computer-readable storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the monitoring and alarm method according to any one of claims 1 to 7.
CN202211649117.3A 2022-12-20 2022-12-20 Monitoring alarm method, device, electronic equipment and storage medium Pending CN115878427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211649117.3A CN115878427A (en) 2022-12-20 2022-12-20 Monitoring alarm method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211649117.3A CN115878427A (en) 2022-12-20 2022-12-20 Monitoring alarm method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115878427A true CN115878427A (en) 2023-03-31

Family

ID=85754212

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211649117.3A Pending CN115878427A (en) 2022-12-20 2022-12-20 Monitoring alarm method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115878427A (en)

Similar Documents

Publication Publication Date Title
CN110661659B (en) Alarm method, device and system and electronic equipment
CN109088775B (en) Abnormity monitoring method and device and server
CN109976971B (en) Hard disk state monitoring method and device
CN116049146B (en) Database fault processing method, device, equipment and storage medium
CN112532435B (en) Operation and maintenance method, operation and maintenance management platform, equipment and medium
CN111130867B (en) Intelligent household equipment alarm method and device based on Internet of things
CN116010220A (en) Alarm diagnosis method, device, equipment and storage medium
CN112100239A (en) Portrait generation method and apparatus for vehicle detection device, server and readable storage medium
CN112948223A (en) Method and device for monitoring operation condition
CN114064402A (en) Server system monitoring method
CN110737655A (en) Method and device for reporting data
CN109687999A (en) A kind of association analysis method of alarm failure, device and equipment
CN113342608A (en) Method and device for monitoring streaming computing engine task
CN114661562A (en) Data warning method, device, equipment and medium
CN110752972A (en) Network card state monitoring method, device, equipment and medium
CN115878427A (en) Monitoring alarm method, device, electronic equipment and storage medium
CN110677271B (en) Big data alarm method, device, equipment and storage medium based on ELK
CN114371980A (en) Call link performance monitoring method and device, computer equipment and storage medium
CN109388546B (en) Method, device and system for processing faults of application program
CN106878101B (en) Method and device for processing alarm information in monitoring system
CN116991683B (en) Alarm information processing method, device, equipment and medium
CN116991620B (en) Solution determining method, device, equipment and medium
CN114844761B (en) Monitoring alarm system
CN116781757B (en) Data monitoring method, device, platform, electronic equipment and storage medium
CN116991684B (en) Alarm information processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination