CN116089226A - Information alarm method, device, computer equipment and storage medium - Google Patents

Information alarm method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN116089226A
CN116089226A CN202211543113.7A CN202211543113A CN116089226A CN 116089226 A CN116089226 A CN 116089226A CN 202211543113 A CN202211543113 A CN 202211543113A CN 116089226 A CN116089226 A CN 116089226A
Authority
CN
China
Prior art keywords
alarm
result
performance data
analysis result
virtual machine
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211543113.7A
Other languages
Chinese (zh)
Inventor
杨书龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211543113.7A priority Critical patent/CN116089226A/en
Publication of CN116089226A publication Critical patent/CN116089226A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3452Performance evaluation by statistical analysis
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the application discloses an information alarming method, an information alarming device, computer equipment and a storage medium, wherein a resource list corresponding to a first acquisition component in an alarming platform is obtained, and the resource list comprises an interface identifier of a virtual machine; collecting first performance data of a host machine of the virtual machine according to the interface identification through the first collecting component; collecting second performance data of a host of the private cloud through a second collecting component on the private cloud; performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result; if the alarm analysis result is an alarm result, executing a plurality of preset prompting operations, thereby improving the operation and maintenance efficiency of the staff.

Description

Information alarm method, device, computer equipment and storage medium
Technical Field
The application relates to the technical field of internet, in particular to an information alarming method, an information alarming device, computer equipment and a storage medium.
Background
With the development of science and technology, a Virtual Machine (Virtual Machine) is increasingly widely used, and the Virtual Machine refers to a complete computer system which has a complete hardware system function and is simulated by software and operates in a completely isolated environment.
At present, when an enterprise has a private cloud developed by the enterprise and a virtual machine purchased from a third party manufacturer, because the alarm mechanism of the virtual machine is inconsistent with that of the private cloud, workers need to check the alarm information of the virtual machine and the alarm information of the private cloud respectively, and the operation and maintenance efficiency of the workers is reduced.
Disclosure of Invention
The embodiment of the application provides an information alarming method, an information alarming device, computer equipment and a storage medium which can be used in the financial science and technology or other related fields, and can improve the operation and maintenance efficiency of staff.
The embodiment of the application provides an information alarming method, which comprises the following steps:
acquiring a resource list corresponding to a first acquisition component in the alarm platform, wherein the resource list comprises an interface identifier of a virtual machine;
collecting first performance data of a host machine of the virtual machine according to the interface identification through the first collecting component;
collecting second performance data of a host of the private cloud through a second collecting component on the private cloud;
performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
and if the alarm analysis result is an alarm result, executing various preset prompting operations.
Correspondingly, the embodiment of the application also provides an information alarm device, which comprises:
the list acquisition module is used for acquiring a resource list corresponding to the first acquisition component in the alarm platform, wherein the resource list comprises an interface identifier of the virtual machine;
the first acquisition module is used for acquiring first performance data of the host machine of the virtual machine according to the interface identifier through the first acquisition component;
the second acquisition module is used for acquiring second performance data of the host machine of the private cloud through a second acquisition component on the private cloud;
the alarm analysis module is used for carrying out alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
and the operation execution module is used for executing various preset prompting operations if the alarm analysis result is an alarm result.
Correspondingly, the embodiment of the application also provides computer equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor executes the information alarming method provided by any one of the embodiments of the application.
Correspondingly, the embodiment of the application also provides a storage medium, wherein the storage medium stores a plurality of instructions, and the instructions are suitable for being loaded by a processor to execute the information alarming method.
According to the method and the device for alarming the user, a resource list corresponding to the first acquisition component in the alarming platform is obtained, the resource list comprises an interface identification of a virtual machine, first performance data of a host machine of the virtual machine are acquired according to the interface identification through the first acquisition component, second performance data of the host machine of the private cloud are acquired through the second acquisition component on the private cloud, alarming analysis is conducted on the first performance data and the second performance data, alarming analysis results are obtained, if the alarming analysis results are alarming results, multiple preset prompting operations are executed, a unified multi-dimensional three-dimensional alarming mode is achieved, and operation and maintenance efficiency of workers is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of an information alarm method according to an embodiment of the present application.
Fig. 2 is a schematic structural diagram of an information alert platform according to an embodiment of the present application.
Fig. 3 is a block diagram of an information alarm device according to an embodiment of the present application.
Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
The embodiment of the application provides an information alarming method, an information alarming device, a storage medium and computer equipment. Specifically, the information warning method in the embodiment of the present application may be executed by a computer device, where the computer device may be a server or a device such as a terminal.
The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms. The terminal may be, but is not limited to, a smart phone, a desktop computer, a notebook computer, a tablet computer, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
For example, the computer device may be a terminal, where the terminal may obtain a resource list corresponding to a first acquisition component in the alert platform, where the resource list includes an interface identifier of a virtual machine, collect, by the first acquisition component, first performance data of a host of the virtual machine according to the interface identifier, collect, by a second acquisition component on the private cloud, second performance data of the host of the private cloud, perform alert analysis on the first performance data and the second performance data, obtain an alert analysis result, and if the alert analysis result is an alert result, perform multiple preset prompting operations.
In the embodiment of the present invention, "first" and "second" are merely for distinguishing corresponding relationships, and have no other special meaning, and "a plurality of" means two or more.
The following will describe in detail. The following description of the embodiments is not intended to limit the preferred embodiments.
The embodiment of the application provides an information alarming method which can be executed by a terminal or a server, and the embodiment of the application is described by taking the information alarming method executed by the terminal as an example.
Referring to fig. 1, fig. 1 is a flow chart of an information alarm method according to an embodiment of the present application. The specific flow of the information alarming method can be as follows:
101. And acquiring a resource list corresponding to the first acquisition component in the alarm platform, wherein the resource list comprises an interface identifier of the virtual machine.
The alarm platform may refer to a collection of alarm programs, in which a first acquisition component is embedded, and a resource list corresponding to the first acquisition component includes an initial interface identifier of an object to be monitored of the alarm platform, where the object to be monitored includes a virtual machine.
Alternatively, since the virtual machine typically has an http interface and a Libvirt interface, the interface identifier of the virtual machine may be an interface identifier of the Libvirt interface of the virtual machine or an interface identifier of the http interface of the virtual machine.
102. And acquiring first performance data of a host of the virtual machine according to the interface identifier through the first acquisition component.
The first performance data refers to data representing the nature and function of the host of the virtual machine, which may be composed of hardware data and software data of the host of the virtual machine, and the hardware data may include at least one of CPU data, memory data, network IO, and disk IO.
The host machine of the virtual machine refers to the physical device that installs the virtual machine. Alternatively, the host of the virtual machine may be a database server or a server implementing a dedicated service (a dedicated service may be a dedicated service for a certain region, for example).
Because the virtual machine is a program of a third party manufacturer, a unified monitoring program cannot be implanted in the virtual machine, for example, when the virtual machine is a VMware virtual machine, a vcenter alarm monitoring management function is built in the VMware virtual machine, which is different from a monitoring management mechanism of a private cloud.
Wherein, through the first collection subassembly, according to the interface sign, the process of gathering the first performance data of the host computer of virtual machine can be:
sending an acquisition request to an interface corresponding to the interface identifier through a first acquisition component so that a host machine of the virtual machine receives the acquisition request through the interface and acquires first performance data based on the acquisition request;
the host machine receiving the virtual machine returns first performance data based on the acquisition request through the interface.
103. And acquiring second performance data of a host of the private cloud through a second acquisition component on the private cloud.
The second performance data refers to data representing the nature and function of the host of the private cloud, which may be composed of hardware data and software data of the host of the private cloud, and the hardware data may include at least one of CPU data, memory data, network IO, and disk IO.
The host of the private cloud refers to entity equipment for installing the private cloud, and the host of the private cloud can be an application server or a server for realizing a general service (for example, a credit card service is a general service).
Because the private cloud refers to a cloud system developed by an enterprise, a second acquisition component can be deployed on the private cloud so as to acquire second performance data of a host of the private cloud through the second acquisition component. It should be understood that after the private cloud collects the second performance data of the host of the private cloud through the second collection component, the second performance data may be stored first, and when the acquisition information sent by the terminal through the alarm platform is received, the second performance data is sent to the alarm platform.
104. And carrying out alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result.
The alarm analysis refers to analyzing the first performance data and the second performance data to determine whether the first performance data and the second performance data are abnormal. If the abnormality exists, the alarm analysis result is determined to be an alarm result, and if the abnormality does not exist, the alarm analysis result is determined to be an alarm-unnecessary result.
And carrying out alarm analysis on the first performance data and the second performance data to obtain alarm analysis results, which can refer to carrying out alarm analysis on the first performance data to obtain alarm analysis results corresponding to the first performance data and carrying out alarm analysis on the second performance data to obtain alarm analysis results corresponding to the second performance data.
The terminal can carry out alarm analysis on the first performance data and the second performance data through the neural network model to obtain an alarm analysis result, or the terminal can also carry out alarm analysis on the keywords in the first performance data and the keywords in the second performance data according to a preset rule by extracting the keywords in the first performance data and the keywords in the second performance data, so as to obtain the alarm analysis result.
It should be noted that when the alarm analysis result is an alarm result, a false alarm phenomenon may occur, where the false alarm phenomenon refers to that the host has no fault, but the alarm analysis result is an alarm result, so as to increase the operation and maintenance cost and time cost of the staff.
In order to reduce the occurrence of false alarm, in some embodiments, performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result, including:
Performing alarm analysis on the first performance data and the second performance data through a first neural network model to obtain a first alarm analysis result;
performing alarm analysis on the first performance data and the second performance data through a second neural network model to obtain a second alarm analysis result;
and determining an alarm analysis result according to the first alarm analysis result and the second alarm analysis result.
The structure of the first neural network model and the structure of the second neural network model may be the same, but the model parameters of the first neural network model and the model parameters of the second neural network model may be different, or the structure of the first neural network model and the structure of the second neural network model may be different.
In this embodiment, a first alarm analysis result and a second alarm analysis result corresponding to the first performance data are obtained through two kinds of neural network models, a first alarm analysis result and a second alarm analysis result corresponding to the second performance data are obtained through two kinds of neural network models, and then the alarm analysis result is determined according to the first alarm analysis result and the second alarm analysis result, so that when one kind of neural network model makes an error in judging the alarm analysis result, the other kind of neural network model can correct the alarm analysis result, thereby reducing the occurrence of a false alarm phenomenon.
The process of determining the alarm analysis result according to the first alarm analysis result and the second alarm analysis result may be:
acquiring a first type probability corresponding to a first alarm analysis result;
acquiring a second type probability corresponding to a second alarm analysis result;
if the first alarm analysis result is inconsistent with the second alarm analysis result, comparing the first type probability with the second type probability;
if the first type probability is larger than the second type probability, the first alarm analysis result is used as an alarm analysis result;
and if the second type probability is larger than the first type probability, taking the second alarm analysis result as an alarm analysis result.
The first type probability can be obtained through a first neural network model, the second type probability can be obtained through a second neural network model, the first type probability refers to the class probability of the first alarm analysis result, namely, when the first alarm analysis result is an alarm result, the first type probability refers to the probability corresponding to the alarm result, and when the first alarm analysis result is a no-alarm result, the first type probability refers to the probability corresponding to the no-alarm result. The concept of the second type probability may refer to the concept of the first type probability, and this embodiment is not described herein.
In this embodiment, the final alarm analysis result is selected from multiple alarm analysis results according to the type probability corresponding to each alarm analysis result, so that when one neural network model makes an error in judging the alarm analysis result, the other neural network model can correct the alarm analysis result, thereby reducing the occurrence of false alarm.
Alternatively, the process of determining the alarm analysis result according to the first alarm analysis result and the second alarm analysis result may also be:
acquiring a first weight parameter corresponding to a first neural network model and a second weight parameter corresponding to a second neural network model;
adjusting the first alarm analysis result according to the first weight parameter to obtain an adjusted first alarm analysis result, and adjusting the second alarm analysis result according to the second weight parameter to obtain an adjusted second alarm analysis result;
and adding the adjusted first alarm analysis result and the adjusted second alarm analysis result to obtain an alarm analysis result.
The terminal may convert the first alarm analysis result and the second alarm analysis result into corresponding target values, so that the first alarm analysis result and the second alarm analysis result may be adjusted according to the first weight parameter and the second weight parameter. For example, when the first alarm analysis result and the second alarm analysis result are alarm results, the first alarm analysis result and the second alarm analysis result are converted into the first target values, and when the first alarm analysis result and the second alarm analysis result are alarm-unnecessary results, the first alarm analysis result and the second alarm analysis result are converted into the second target values.
In this embodiment, the alarm analysis result obtained by the neural network model is adjusted according to the weight parameter of the neural network model, and then the adjustment results are added to obtain the alarm analysis result, so that when one neural network model makes an error in judging the alarm analysis result, the other neural network model can correct the alarm analysis result, thereby reducing the occurrence of the false alarm phenomenon.
105. If the alarm analysis result is an alarm result, executing various preset prompting operations.
When the alarm analysis result is an alarm result, the host machine of the virtual machine or the host machine of the private cloud is proved to have faults, and then various preset prompting operations are executed through the alarm platform. The various preset prompting operations can include displaying the alarming result on an interface of the alarming platform and informing the alarming result to staff in an instant messaging mode. The instant messaging mode may include at least one of a sms, a mail, a sms, or a QQ.
Because the virtual machine is a cloud product of an outsourcing third party manufacturer, the private cloud is a cloud product developed by the private cloud, and two alarm monitoring mechanisms are different, so that the problems of non-uniform data sources, scattered alarms and non-uniform formats are faced, two different alarm monitoring systems are faced by staff, and great inconvenience is brought to daily operation and maintenance.
In this embodiment, the first performance data of the host of the virtual machine is collected through the first collection component in the alarm platform, the second performance data of the host of the virtual machine is collected through the second collection component in the private cloud, so that the first performance data and the second performance data can be obtained through the alarm platform at the same time, the alarm information of the virtual machine and the alarm information of the private cloud can be displayed on the interface of the alarm platform at the same time, a unified multi-dimensional three-dimensional alarm mode is realized, workers can receive alarms in time, faults can be rapidly detected, normal operation of the service can be recovered, operation and maintenance efficiency of the workers can be improved, and stable operation of the virtual machine and the private cloud can be ensured.
In some embodiments, if the alarm analysis result is an alarm result, a plurality of preset prompting operations are performed, including:
if the alarm analysis result is an alarm result, acquiring historical performance data of a preset time interval before the alarm result;
and executing various preset prompting operations, and displaying the historical performance data on an interface of the alarm platform.
The preset time interval may be set according to practical situations, for example, the preset time interval may be one hour or one half hour, which is not limited herein.
In this embodiment, when the alarm analysis result is an alarm result, historical performance data is displayed, so that a worker can analyze the alarm result and more quickly troubleshoot the host.
In other embodiments, if the alarm analysis result is an alarm result, a plurality of preset prompting operations are performed, including:
if the alarm analysis result is an alarm result and the alarm result is a downtime alarm result, acquiring connectivity between the virtual machine and a host machine of the virtual machine;
if connectivity is disconnected and hardware alarm information of the virtual machine exists in a message queue in the alarm platform, determining the reason of the downtime alarm result as hardware damage;
and executing various preset prompting operations according to the downtime alarm result and the reason of the downtime alarm result.
The method comprises the steps that a connectivity detection component can be arranged in an alarm platform, connectivity between a virtual machine and a host machine of the virtual machine is detected through the connectivity detection component, the virtual machine is triggered to send detection information to the host machine of the virtual machine through the connectivity detection component, and if the host machine which receives the virtual machine returns reply information based on the detection information within a preset time length, the virtual machine and the host machine of the virtual machine are determined to be not communicated.
In this embodiment, when a downtime occurs, connectivity between the virtual machine and the host machine of the virtual machine is detected, if the virtual machine is not connected and hardware alarm information of the virtual machine exists, it is indicated that the reason for the downtime is caused by hardware damage, and workers are notified of the reason for the downtime, so that the workers can quickly remove a fault corresponding to the downtime.
In other embodiments, after performing the plurality of preset prompting operations if the alarm analysis result is the alarm result, the method further includes:
acquiring current performance data, and carrying out alarm analysis on the current performance data to obtain a current alarm analysis result;
and if the current alarm analysis result is the alarm-free result, executing the prompting operation of which the alarm result is solved.
The current performance data may refer to performance data acquired after the terminal returns to execute the first performance data of the host machine of the virtual machine through the first acquisition component according to the interface identifier.
Since the staff can check the faults corresponding to the alarm result after executing the various preset prompting operations, but the staff cannot guarantee that the checked faults are correct, in this embodiment, after executing the various preset prompting operations, the current performance data is obtained, the alarm analysis is performed on the current performance data to obtain the current alarm analysis result, and if the current alarm analysis result is the alarm result not needed, the prompting operation with solved alarm result is executed, so as to realize the alarm recovery mechanism.
In other embodiments, if the alarm analysis result is an alarm result, a plurality of preset prompting operations are performed, including:
if the alarm analysis result is an alarm result, acquiring a priority corresponding to the alarm result;
and executing various preset prompting operations according to the priority corresponding to the alarm result.
When the alarm result is displayed on the interface of the alarm platform, the operator usually first looks at the alarm result displayed in front of the interface of the alarm platform, so in this embodiment, the priority of the alarm result may be set in advance according to the severity of the alarm result, and then the alarm result with high priority is displayed in front of the interface of the alarm platform, so that the operator can preferentially see the alarm result with higher severity, so as to preferentially eliminate the fault with higher severity.
In other embodiments, if the alert analysis result is an alert result, then searching for a target historical alert result that matches the alert result;
acquiring a solution corresponding to the target historical alarm result, and solving a fault corresponding to the alarm result according to the solution;
if the alarm result still exists, executing various preset prompting operations.
In this embodiment, after the staff removes the fault corresponding to the historical alarm result, the terminal may store the solution corresponding to the historical alarm into the alarm platform, so that after the terminal obtains the alarm result, the terminal may obtain the solution corresponding to the target historical alarm result, and solve the fault corresponding to the alarm result according to the solution, and if the alarm result still exists, execute multiple preset prompting operations, thereby reducing the workload of the staff.
In other embodiments, if the alarm analysis result is an alarm result, a plurality of preset prompting operations are performed, including:
if the alarm analysis result is an alarm result, determining an association relationship between alarm results;
screening a source alarm result from the alarm results according to the association relation;
and executing various preset prompting operations according to the source alarming result.
Because the fault corresponding to the derivative alarm result is caused by the fault corresponding to the source alarm result, when the fault corresponding to the source alarm result is removed, the fault corresponding to the derivative alarm result is also removed, so that only the source alarm result can be informed to the staff, and the workload of the staff is further reduced.
In other embodiments, the first acquisition component and the second acquisition component may be different, for example, the first acquisition component may be a proxy-less in-Prometaus monitoring acquisition component and the second acquisition component may be an Argus alarm monitoring management component.
In other embodiments, after the terminal acquires the first performance data and the second performance data through the alarm platform, the format of the first performance data and the format of the second performance data may be converted into the data format of a general monitoring system inside the enterprise, so that the first performance data and the second performance data are sent to the general monitoring system (the general monitoring system may be a proxy's promethaus monitoring system, and the general monitoring system may be used for monitoring all devices in the enterprise), so that even in face of three different alarm monitoring, it is not necessary to look at the three systems, and great convenience is brought to daily operation and maintenance.
For example, as shown in fig. 2, the terminal obtains an interface identifier of the virtual machine from the ura list resource list through the condul cluster discovery service c2, and then the terminal sends an acquisition request to a vwmare_exporter interface of the virtual machine through a first acquisition component Exporter according to the interface identifier so as to acquire first performance data through the vwmare_exporter interface.
The terminal then forwards the first performance data to the Thanos Sidecar cluster (which is used to Store the first performance data and historical performance data within a preset time interval before the first performance data) via the Uranus Prometheus cluster, and forwards the first performance data to the object storage service (all performance data of the object storage virtual machine) via the Thanos Sidecar cluster, and sends the first performance data to the Thanos Store cache component via the object storage service and the Thanos compact component for caching.
When the terminal detects that the alarm analysis result is an alarm result, sending, by the Urans monitor system, an acquisition request of historical performance data of the virtual machine in a preset time interval before the first performance data to the Urans grafana, and forwarding the acquisition request to the Thanos Querier query component by the Urans grafana, so as to acquire the historical performance data in the preset time interval before the first performance data from the Thanos Sidecar cluster by the Thanos Querier query component, or acquiring the historical performance data in the preset time interval before the first performance data from the Thanos Store cache component by the Thanos Querier query component.
And the terminal can send the first performance data to the ALert manager cluster through the Uranus Prometheus cluster to perform alarm analysis, so as to obtain an alarm analysis result, and if the alarm analysis result is an alarm result, the alarm result is sent to the Urans monitor system, so that the alarm result is sent to an interface of the alarm platform through the Urans monitor system to be displayed.
In addition, the terminal may also send the first performance data to the master monitoring system Prometheus, and send the first performance data to the master monitoring system grafana through the master monitoring system Prometheus.
If the alarm analysis result is an alarm result, executing a plurality of preset prompting operations, wherein the plurality of preset prompting operations can be shown in the following table:
Figure BDA0003978659680000121
the embodiment of the application discloses an information alarming method, which comprises the following steps: the method comprises the steps of obtaining a resource list corresponding to a first acquisition component in an alarm platform, wherein the resource list comprises an interface identifier of a virtual machine, acquiring first performance data of a host of the virtual machine according to the interface identifier through the first acquisition component, acquiring second performance data of the host of the private cloud through a second acquisition component on the private cloud, carrying out alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result, and executing various preset prompt operations if the alarm analysis result is the alarm result, so that a unified multi-dimensional three-dimensional alarm mode is realized, and the operation and maintenance efficiency of staff is improved.
In order to facilitate better implementation of the information warning method provided by the embodiment of the application, the embodiment of the application also provides an information warning device based on the information warning method. The meaning of the nouns is the same as that of the information alarming method, and specific implementation details and corresponding beneficial effects can be referred to the description in the method embodiment.
Referring to fig. 3, fig. 3 is a block diagram of an information alarm device according to an embodiment of the present application, where the device includes:
the list obtaining module 301 is configured to obtain a resource list corresponding to the first acquisition component in the alert platform, where the resource list includes an interface identifier of the virtual machine.
The first collection module 302 is configured to collect, by using the first collection component, first performance data of a host of the virtual machine according to the interface identifier.
And the second acquisition module 303 is configured to acquire second performance data of a host of the private cloud through a second acquisition component on the private cloud.
The alarm analysis module 304 is configured to perform alarm analysis on the first performance data and the second performance data, so as to obtain an alarm analysis result.
The operation execution module 305 is configured to execute a plurality of preset prompting operations if the alarm analysis result is an alarm result.
In some embodiments, the preset prompting operation includes displaying the alert results on an interface of the alert platform. The operation execution module 305 is specifically configured to execute:
if the alarm analysis result is an alarm result, acquiring historical performance data of a preset time interval before the alarm result;
and executing various preset prompting operations, and displaying the historical performance data on an interface of the alarm platform.
In some embodiments, the operation execution module 305 is specifically configured to execute:
if the alarm analysis result is an alarm result and the alarm result is a downtime alarm result, acquiring connectivity between the virtual machine and a host machine of the virtual machine;
if connectivity is disconnected and hardware alarm information of the virtual machine exists in a message queue in the alarm platform, determining the reason of the downtime alarm result as hardware damage;
and executing various preset prompting operations according to the downtime alarm result and the reason of the downtime alarm result.
In some embodiments, the information alert device further includes:
the return execution module is used for executing:
acquiring current performance data, and carrying out alarm analysis on the current performance data to obtain a current alarm analysis result;
and if the current alarm analysis result is the alarm-free result, executing the prompting operation of which the alarm result is solved.
In some embodiments, the operation execution module 305 is specifically configured to execute:
if the alarm analysis result is an alarm result, searching a target historical alarm result matched with the alarm result;
acquiring a solution corresponding to the target historical alarm result, and solving a fault corresponding to the alarm result according to the solution;
if the alarm result still exists, executing various preset prompting operations.
In some embodiments, the operation execution module 305 is specifically configured to execute:
if the alarm analysis result is an alarm result, determining an association relationship between alarm results;
screening a source alarm result from the alarm results according to the association relation;
and executing various preset prompting operations according to the source alarming result.
In some embodiments, the first acquisition module 302 is specifically configured to perform:
sending an acquisition request to an interface corresponding to the interface identifier through a first acquisition component so that a host machine of the virtual machine receives the acquisition request through the interface and acquires first performance data based on the acquisition request;
the host machine receiving the virtual machine returns first performance data based on the acquisition request through the interface.
Correspondingly, the embodiment of the application also provides computer equipment, which can be a terminal. Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present application, as shown in fig. 4. The computer apparatus 400 includes a processor 401 having one or more processing cores, a memory 402 having one or more computer readable storage media, and a computer program stored on the memory 402 and executable on the processor. The processor 401 is electrically connected to the memory 402. It will be appreciated by those skilled in the art that the computer device structure shown in the figures is not limiting of the computer device and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
Processor 401 is a control center of computer device 400 and connects the various portions of the entire computer device 400 using various interfaces and lines to perform various functions of computer device 400 and process data by running or loading software programs and/or modules stored in memory 402 and invoking data stored in memory 402, thereby performing overall monitoring of computer device 400.
In the embodiment of the present application, the processor 401 in the computer device 400 loads the instructions corresponding to the processes of one or more application programs into the memory 402 according to the following steps, and the processor 401 executes the application programs stored in the memory 402, so as to implement various functions:
acquiring a resource list corresponding to a first acquisition component in an alarm platform, wherein the resource list comprises an interface identifier of a virtual machine;
collecting first performance data of a host machine of the virtual machine according to the interface identification through a first collecting component;
collecting second performance data of a host of the private cloud through a second collecting component on the private cloud;
performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
if the alarm analysis result is an alarm result, executing various preset prompting operations.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Optionally, as shown in fig. 4, the computer device 400 further includes: a touch display 403, a radio frequency circuit 404, an audio circuit 405, an input unit 406, and a power supply 407. The processor 401 is electrically connected to the touch display 403, the radio frequency circuit 404, the audio circuit 405, the input unit 406, and the power supply 407, respectively. Those skilled in the art will appreciate that the computer device structure shown in FIG. 4 is not limiting of the computer device and may include more or fewer components than shown, or may be combined with certain components, or a different arrangement of components.
The touch display 403 may be used to display a graphical user interface and receive operation instructions generated by a user acting on the graphical user interface. The touch display screen 403 may include a display panel and a touch panel. Wherein the display panel may be used to display messages entered by a user or provided to a user as well as various graphical user interfaces of a computer device, which may be composed of graphics, text, icons, video, and any combination thereof. Alternatively, the display panel may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light Emitting Diode (OLED), or the like. The touch panel may be used to collect touch operations on or near the user (such as operations on or near the touch panel by the user using any suitable object or accessory such as a finger, stylus, etc.), and generate corresponding operation instructions, and the operation instructions execute corresponding programs. Alternatively, the touch panel may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch azimuth of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives a touch message from the touch detection device and converts it into touch point coordinates, which are then sent to the processor 401, and can receive commands from the processor 401 and execute them. The touch panel may overlay the display panel, and upon detection of a touch operation thereon or thereabout, the touch panel is passed to the processor 401 to determine the type of touch event, and the processor 401 then provides a corresponding visual output on the display panel in accordance with the type of touch event. In the embodiment of the present application, the touch panel and the display panel may be integrated into the touch display screen 403 to implement the input and output functions. In some embodiments, however, the touch panel and the touch panel may be implemented as two separate components to perform the input and output functions. I.e. the touch-sensitive display 403 may also implement an input function as part of the input unit 406.
The radio frequency circuitry 404 may be used to transceive radio frequency signals to establish wireless communications with a network device or other computer device via wireless communications.
The audio circuitry 405 may be used to provide an audio interface between a user and a computer device through speakers, microphones, and so on. The audio circuit 405 may transmit the received electrical signal after audio data conversion to a speaker, where the electrical signal is converted into a sound signal for output; on the other hand, the microphone converts the collected sound signals into electrical signals, which are received by the audio circuit 405 and converted into audio data, which are processed by the audio data output processor 401 and sent via the radio frequency circuit 404 to, for example, another computer device, or which are output to the memory 402 for further processing. The audio circuit 405 may also include an ear bud jack to provide communication of the peripheral ear bud with the computer device.
The input unit 406 may be used to receive input numbers, character messages, or user characteristic messages (e.g., fingerprints, irises, facial messages, etc.), as well as to generate keyboard, mouse, joystick, optical, or trackball signal inputs related to user settings and function control.
The power supply 407 is used to power the various components of the computer device 400. Alternatively, the power supply 407 may be logically connected to the processor 401 through a power management system, so as to implement functions of managing charging, discharging, and power consumption management through the power management system. The power supply 407 may also include one or more of any of a direct current or alternating current power supply, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown in fig. 4, the computer device 400 may further include a camera, a sensor, a wireless fidelity module, a bluetooth module, etc., and will not be described herein.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
As can be seen from the foregoing, in the computer device provided in this embodiment, by obtaining the resource list corresponding to the first acquisition component in the alert platform, where the resource list includes the interface identifier of the virtual machine, through the first acquisition component, according to the interface identifier, the first performance data of the host machine of the virtual machine is acquired, through the second acquisition component on the private cloud, the second performance data of the host machine of the private cloud is acquired, the alert analysis is performed on the first performance data and the second performance data, an alert analysis result is obtained, and if the alert analysis result is an alert result, then multiple preset prompt operations are executed, so that a unified multi-dimensional three-dimensional alert mode is implemented, and the operation and maintenance efficiency of staff is improved.
Those of ordinary skill in the art will appreciate that all or a portion of the steps of the various methods of the above embodiments may be performed by instructions, or by instructions controlling associated hardware, which may be stored in a computer-readable storage medium and loaded and executed by a processor.
To this end, embodiments of the present application provide a computer readable storage medium having stored therein a plurality of computer programs that can be loaded by a processor to perform steps in any of the information alert methods provided by embodiments of the present application. For example, the computer program may perform the steps of:
acquiring a resource list corresponding to a first acquisition component in an alarm platform, wherein the resource list comprises an interface identifier of a virtual machine;
collecting first performance data of a host machine of the virtual machine according to the interface identification through a first collecting component;
collecting second performance data of a host of the private cloud through a second collecting component on the private cloud;
performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
if the alarm analysis result is an alarm result, executing various preset prompting operations.
The specific implementation of each operation above may be referred to the previous embodiments, and will not be described herein.
Wherein the storage medium may include: a Read Only Memory (ROM), a random access Memory (R client account M, R client account from client account access Memory), a magnetic disk or an optical disk, and the like.
The steps in any information alarming method provided by the embodiment of the present application may be executed by the computer program stored in the storage medium, so that the beneficial effects that any information alarming method provided by the embodiment of the present application may be achieved, which are detailed in the previous embodiments and are not repeated herein.
The foregoing has described in detail the methods, apparatuses, computer devices and storage medium for information alert provided by the embodiments of the present application, and specific examples have been applied to illustrate the principles and embodiments of the present application, where the foregoing description of the embodiments is only for aiding in understanding the methods and core ideas of the present application; meanwhile, those skilled in the art will have variations in the specific embodiments and application scope in light of the ideas of the present application, and the present description should not be construed as limiting the present application in view of the above.

Claims (10)

1. An information alert method, the method comprising:
acquiring a resource list corresponding to a first acquisition component in an alarm platform, wherein the resource list comprises an interface identifier of a virtual machine;
collecting first performance data of a host machine of the virtual machine according to the interface identification through the first collecting component;
collecting second performance data of a host of the private cloud through a second collecting component on the private cloud;
performing alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
and if the alarm analysis result is an alarm result, executing various preset prompting operations.
2. The method of claim 1, wherein the preset prompting operation includes displaying the alert result on an interface of the alert platform;
and if the alarm analysis result is an alarm result, executing a plurality of preset prompting operations, including:
if the alarm analysis result is an alarm result, acquiring historical performance data of a preset time interval before the alarm result;
and executing various preset prompting operations, and displaying the historical performance data on an interface of the alarm platform.
3. The method according to claim 1, wherein if the alarm analysis result is an alarm result, performing a plurality of preset prompting operations, including:
if the alarm analysis result is an alarm result and the alarm result is a downtime alarm result, acquiring connectivity between the virtual machine and a host machine of the virtual machine;
if the connectivity is not communicated and the hardware alarm information of the virtual machine exists in the message queue in the alarm platform, determining the reason of the downtime alarm result as hardware damage;
and executing various preset prompting operations according to the downtime alarm result and the reason of the downtime alarm result.
4. The method according to claim 1, further comprising, after the performing a plurality of preset prompting operations if the alarm analysis result is an alarm result:
acquiring current performance data, and carrying out alarm analysis on the current performance data to obtain a current alarm analysis result;
and if the current alarm analysis result is the alarm-free result, executing the prompting operation of which the alarm result is solved.
5. The method according to claim 1, wherein if the alarm analysis result is an alarm result, performing a plurality of preset prompting operations, including:
If the alarm analysis result is an alarm result, searching a target historical alarm result matched with the alarm result;
acquiring a solution corresponding to the target historical alarm result, and solving a fault corresponding to the alarm result according to the solution;
and if the alarm result still exists, executing various preset prompting operations.
6. The method according to claim 1, wherein if the alarm analysis result is an alarm result, performing a plurality of preset prompting operations, including:
if the alarm analysis result is an alarm result, determining an association relation between the alarm results;
screening a source alarm result from the alarm results according to the association relation;
and executing various preset prompting operations according to the source alarm result.
7. The method according to any one of claims 1 to 6, wherein the collecting, by the first collecting component, first performance data of a host of the virtual machine according to the interface identifier includes:
sending an acquisition request to an interface corresponding to the interface identifier through the first acquisition component, so that a host machine of the virtual machine receives the acquisition request through the interface, and acquiring first performance data based on the acquisition request;
And the host machine receiving the virtual machine returns first performance data based on the acquisition request through the interface.
8. An information alert device, the device comprising:
the list acquisition module is used for acquiring a resource list corresponding to the first acquisition component in the alarm platform, wherein the resource list comprises an interface identifier of the virtual machine;
the first acquisition module is used for acquiring first performance data of a host machine of the virtual machine according to the interface identifier through the first acquisition component;
the second acquisition module is used for acquiring second performance data of a host of the private cloud through a second acquisition component on the private cloud;
the alarm analysis module is used for carrying out alarm analysis on the first performance data and the second performance data to obtain an alarm analysis result;
and the operation execution module is used for executing various preset prompting operations if the alarm analysis result is an alarm result.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the processor implements the information alert method according to any one of claims 1 to 7 when the program is executed by the processor.
10. A storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the information alert method of any one of claims 1 to 7.
CN202211543113.7A 2022-12-02 2022-12-02 Information alarm method, device, computer equipment and storage medium Pending CN116089226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211543113.7A CN116089226A (en) 2022-12-02 2022-12-02 Information alarm method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211543113.7A CN116089226A (en) 2022-12-02 2022-12-02 Information alarm method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116089226A true CN116089226A (en) 2023-05-09

Family

ID=86200111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211543113.7A Pending CN116089226A (en) 2022-12-02 2022-12-02 Information alarm method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116089226A (en)

Similar Documents

Publication Publication Date Title
US11126523B1 (en) Agent-based monitoring of network resources
CN106161060B (en) Data monitoring method and device
CN117280327B (en) Detecting data center large scale interruptions through near real time/offline data using machine learning models
CN112860343B (en) Configuration changing method, system, device, electronic equipment and storage medium
CN112313627A (en) Mapping mechanism of events to serverless function workflow instances
CN115987852A (en) Interface service state detection method and device, computer equipment and storage medium
CN112100239A (en) Portrait generation method and apparatus for vehicle detection device, server and readable storage medium
CN112910733A (en) Full link monitoring system and method based on big data
CN117370053A (en) Information system service operation-oriented panoramic monitoring method and system
CN115171222B (en) Behavior detection method and device, computer equipment and storage medium
CN116089226A (en) Information alarm method, device, computer equipment and storage medium
CN115981713A (en) Business system management method, device, equipment and storage medium
CN115633195A (en) Data security protection method and device, computer equipment and storage medium
CN114756301A (en) Log processing method, device and system
CN111382035A (en) Global matching device and method for alarm triggering rules of operation and maintenance system
CN115378803B (en) Log management method, device, blockchain node and storage medium
CN117097599B (en) Network service detection method, device, computer equipment and storage medium
CN115858652A (en) Data conversion method and device, computer equipment and storage medium
CN115098328A (en) Data transmission state monitoring method and device, electronic equipment and storage medium
CN115098024A (en) Disk file cleaning method and device, electronic equipment and storage medium
CN115622968A (en) Black product behavior blocking method and device, computer equipment and storage medium
CN115061880A (en) Dynamic risk monitoring method, equipment and computer readable medium
CN116974846A (en) Abnormal data processing method and device, electronic equipment and storage medium
CN115640081A (en) Business case decision method and device, electronic equipment and storage medium
CN117875924A (en) Service alarm system optimization method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination