CN1642103A - Platform event filtering system and method - Google Patents
Platform event filtering system and method Download PDFInfo
- Publication number
- CN1642103A CN1642103A CN 200410001970 CN200410001970A CN1642103A CN 1642103 A CN1642103 A CN 1642103A CN 200410001970 CN200410001970 CN 200410001970 CN 200410001970 A CN200410001970 A CN 200410001970A CN 1642103 A CN1642103 A CN 1642103A
- Authority
- CN
- China
- Prior art keywords
- incident
- event
- untreated
- module
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention is a platform even filtering system and method, and the system includes initializing module, event receiving module, system event log, log inquiry module, unprocessed event buffer region, matching module and task executing module, and the method firstly initializes parameters and windows, receives and analyzes event data, then writes it into the system event log and the unprocessed event buffer region, then inquires event record in the unprocessed event buffer region, sends the inquired result to the matching module of a task analyzing module for matched analysis, and finally executes corresponding event action according to the analysis result, and the invention conforms to the IPMI standard to implement platform event filtering function.
Description
Technical field
The present invention relates to a kind of platform events filtration system and its implementation, particularly relate to a kind of platform events filtration system and its implementation that meets intelligent platform management interface (IPMI) standard.
Background technology
The subject matter that New Economy Era enterprise faces is to guarantee that application system runs without interruption, and constantly reduces operating cost again.Who is the Control Network management cost better, and who just might stand in the prostatitis in competition.
The demand in market is determining the developing direction of technology and industry.Some leading firms of industry connected hand since 1997, stepped into the road of the intelligentized research and development of server admin.Their starting point is the low problem of settlement server hardware management ability.Through the several years effort, released IPMI (Intelligent Platform Management Interface, intelligent platform management interface) standard in calendar year 2001.
IPMI makes hardware management possess intelligentized universal interface standard of new generation.The user can utilize the physical health feature of IPMI monitor server, as temperature, voltage, electric fan operating state, power supply supply and cabinet invasion etc., for system management, recovery and asset management provide information.
" intellectuality " of IPMI technology comes from a management microcontroller.In a host computer system, this controller is called as BMC (Baseboard Management Controller, baseboard management controller).BMC is power autonomous, and supervisory control system health status automatically.If find any controlled unit exception, it can take an immediate action, and for example recording events, warning, shuts down automatically or restarts.What be associated with BMC is one group of passive internal memory, be used for storage sensor data (Sensor Data Records, SDR), system event log file and some unit informations such as sequence number and part number information etc.IPMI by specify general, simplify, message based interface, message transmission to the management microcontroller, is realized separating of software and hardware information.
In the IPMI standard, the effect of PEF (Platform Event Filter, platform events is filtered) is exactly the processing of being correlated with for the incident that the BMC cycle produces or receives.In BMC, comprise event filtering forms (Event Filter Table), can be used for writing down the action (Action) that can trigger for which type of incident.As for triggering what kind of action, also can be in the event filtering forms predefined.Like this, when BMC receives incident, can enter in these event filtering forms and inquire about, if obtain event matches (Event Match), the so just specified action of corresponding these filter forms of execution.
Platform events is filtered performed action, can be divided into two classes substantially:
(1) power supply control action (Power Control Action), the action of this class can comprise shutdown (Power Off), shutdown start (Power Cycle) more again, main frame replacement (Reset) or the like; These actions make when emergency (Critical Event) produces, and can protect server (Server) to preserve from rapidly;
(2) alarm action (Alert Action), the action of this class can send alert news, and like this, by receiving platform incident trap (Platform Event Trap), the user just can understand certain or certain the several incidents that take place on server.Platform events is a kind of alarm or particular condition, and directly BIOS or the nextport hardware component NextPort (for example microprocessor or chip) by computer produces.The generation of incident and operating system or the system management software and hardware independent.
Yet, although the IPMI standard has proposed the correlation function that platform events is filtered, how to realize this function, do not make any guidance or regulation, therefore, how can become industry problem anxious to be solved according to the correlation function of IPMI standard implementation platform event filtering.
Summary of the invention
The present invention carries out corresponding action for a kind of platform events filtration system and the method for providing is provided in order to abide by when the setting of IPMI (intelligent platform management interface) standard in new events and event filtering forms is complementary.
The invention provides a kind of platform events filtration system, comprise initialization module, in order to initialization parameter and the forms relevant with platform events; The incident receiver module is in order to receive event; System Event Log is in order to write down untreated incident; The log query module is in order to the satisfactory incident of inquiry in this System Event Log; The event buffer that is untreated, the satisfactory incident that is untreated that is inquired in order to this log query module of buffer memory; Matching module is in order to carry out the matching analysis to the incident of being untreated that will carry out; Task execution module is in order to finish the incident corresponding action of mating with this matching module according to event argument.
The present invention and then a kind of platform events filter method is provided, at first initialization is filtered relevant parameter and forms with platform, receive institute's event then and with untreated incident writing system event log, inquire about the incident in this System Event Log and satisfactory incident write the event buffer that is untreated, inquire about the logout in this event buffer that is untreated, Query Result is carried out the matching analysis, carry out the action corresponding with incident according to analysis result.
The present invention passes through reception and the analysis to incident, and the incident of being untreated is stored in buffering area, is waken up the back in task execution module and carries out corresponding action, thereby realized the function that platform events is filtered in accordance with the IPMI standard.
Description of drawings
Fig. 1 is a platform events filtration system Organization Chart of the present invention;
Fig. 2 is a platform events filter method flow chart of the present invention;
Fig. 3 is incident receiver module operation workflow figure provided by the present invention;
Fig. 4 is log query module operation workflow figure provided by the present invention; And
Fig. 5 is task execution module operation workflow figure provided by the present invention.
The number in the figure explanation:
101 initialization modules
102 incident receiver modules
103 System Event Logs
104 log query modules
105 event buffers that are untreated
106 matching modules
107 task execution module
Incident in this System Event Log of step 203 inquiry also writes the event buffer that is untreated with satisfactory incident
Logout in this event buffer that is untreated of step 204 inquiry
In the step 303 writing system event log
Step 401 inquiry system event log
Step 402 obtains event id that last event id of being handled by SMS number and last handled by BMC number
Step 403 obtains bigger in above-mentioned two values one
Step 404 is inquired about ID number of each bar incident one by one
Whether step 405 has ID number greater than above-mentioned higher value
Step 406 obtains this incident that is untreated
Step 407 writes the event buffer that is untreated with this incident of being untreated
Step 408 is waken task execution module up
Step 501 judges whether this module is waken up
Step 502 is inquired about the event buffer that is untreated
Step 503 judges whether to obtain not processed incident
Step 504 need to judge whether delay timing
Step 505 is carried out delay process
Step 506 obtains last event id of being handled by SMS number
Step 507 judges that whether the ID of the incident that is received is greater than above-mentioned last processing ID number
The analysis of step 508 matching
Step 509 judges whether coupling
Step 510 is carried out corresponding action
Embodiment
As shown in Figure 1, this figure is a platform events filtration system Organization Chart of the present invention, comprises initialization module 101, incident receiver module 102, System Event Log (System Event Log) 103, log query module 104, the event buffer 105 that is untreated, matching module 106, task execution module 107.
Wherein, initialization module 101 is in order to initialization parameter and the forms relevant with platform events, and incident receiver module 102 is in order to receive event; System Event Log 103 is in order to the record incident that is untreated; Log query module 104 is in order to the satisfactory incident of inquiry in this System Event Log; The satisfactory incident that the event buffer 105 that is untreated is inquired in order to this log query module 104 of buffer memory; Matching module 106 is in order to carry out the matching analysis to the Query Result of delivering to task execution module 107; Task execution module 107 is in order to finish according to event argument and this incident corresponding action.
Consider when an incident takes place, the platform events filtration system can be carried out the action corresponding with this incident immediately, also can postpone a period of time earlier, handle this incident by SMS (System ManagementSoftware, the system management software), therefore, a delay timer can also be set, when this timer then after (Timeout), if SMS handles this incident, then by platform temporal filtering system handles.
Wherein the search request of this log query module 104 comprises that the delay timing of verifying this incident is full, if satisfy this requirement then this incident is write this event buffer 105 that is untreated.
This task execution module 107 these event buffers 105 that are untreated of inquiry wherein, the matching module 106 of Query Result being delivered to the task analysis module carries out the matching analysis, if coupling then carry out the action of this incident correspondence.
See also Fig. 2, this figure is a platform events filter method flow chart of the present invention, and at first initialization is filtered relevant parameter and forms (step 201) with platform; Receive institute's event and with untreated incident writing system event log (step 202); Inquire about the incident in this System Event Log and satisfactory incident write the event buffer (step 203) that is untreated; Inquire about the logout (step 204) in this event buffer that is untreated; Query Result is carried out matching analysis (step 205); Carry out the action (step 206) corresponding according to analysis result at last with incident.
See also Fig. 3, this figure is the operation workflow figure of incident receiver module provided by the present invention, at first receives incident (step 301); Then event data is analyzed (step 302), this is based on transducer class (Sensor Class); If this incident is waken task execution module then up and is finished this flow process for the incident of being untreated then with in its writing system event log (step 303).
See also Fig. 4, this figure is the operation workflow figure of log query module provided by the present invention, the inquiry system event log (step 401) that this module is not stopped; Obtain last event id of handling by SMS number and last event id number (step 402) of handling by BMC; Then through relatively obtaining one (step 403) bigger in above-mentioned two values; Inquire about ID number (step 404) of each bar incident then one by one; Judge whether ID number (step 405) greater than above-mentioned higher value, if not then continue inquiry, if having then obtain this incident (step 406) that is untreated; This incident of being untreated is write the event buffer (step 407) that is untreated; Wake task execution module (step 408) at last up.
See also Fig. 5, this figure is the operation workflow figure of task execution module provided by the present invention, judge at first whether this module is waken up (step 501), inquire about the event buffer (step 502) that is untreated, then judge whether to obtain not processed incident (step 503), if obtain then need then to judge whether delay timing (step 504), then carry out delay process (step 505) if desired, obtain the event id number (step 506) that last is handled by SMS again, whether the ID that judges the incident that is received is greater than above-mentioned last processing ID number (step 507), if greater than the explanation be not processed incident, this incident is carried out matching analysis (step 508) by the event filtering forms in matching module, judge whether coupling (step 509), if with the content match in the forms, then carry out corresponding action (step 510).
The above only is the present invention's preferred embodiment wherein, is not to be used for limiting practical range of the present invention; Be that all equalizations of being done according to the present patent application claim change and modification, be all scope of patent protection of the present invention and contain.
Claims (9)
1, a kind of platform events filtration system is carried out corresponding action in order to abide by when the setting of intelligent platform management interface specification in new events and event filtering forms is complementary, and wherein this system comprises:
One initialization module is in order to initialization parameter and the forms relevant with platform events;
One incident receiver module is in order to receive event;
One System Event Log is in order to write down untreated incident;
One log query module is in order to the satisfactory incident of inquiry in this System Event Log;
One event buffer that is untreated, the satisfactory incident that is untreated that is inquired in order to this log query module of buffer memory;
One matching module is in order to carry out the matching analysis to the incident of being untreated that will carry out; And
One task execution module is in order to finish the incident corresponding action of mating with this matching module according to event argument.
2, platform events filtration system as claimed in claim 1 wherein also comprises a delay timer, in order to monitor the delay process time of reception incident.
3, platform events filtration system as claimed in claim 1 is wherein given an ID value for incident after this incident receiver module reception incident in regular turn.
4, platform events filtration system as claimed in claim 1, wherein this log query module is to judge whether to meet untreated requirement by the ID value of inquiring about each incident.
5, platform events filtration system as claimed in claim 1, wherein this task execution module obtains untreated incident from this event buffer that is untreated.
6, a kind of platform events filter method is carried out corresponding action in order to abide by when the setting of intelligent platform management interface specification in new events and event filtering forms is complementary, and wherein this method comprises:
Initialization is filtered relevant parameter and forms with platform;
Receive institute's event and with untreated incident writing system event log;
Inquire about the incident in this System Event Log and satisfactory incident write the event buffer that is untreated;
Inquire about the logout in this event buffer that is untreated;
Query Result is carried out matching analyses; And
Carry out the action corresponding according to analysis result with incident.
7, platform events filter method as claimed in claim 6, step that wherein should the reception incident also is included as the event sequence of new reception and gives an ID value.
8, platform events filter method as claimed in claim 6, wherein the step of this inquiry system event log is to judge whether to meet untreated requirement by the ID value of inquiring about each incident.
9, platform events filter method as claimed in claim 6, wherein the step of this The matching analysis is that institute's reception incident is carried out the matching analysis in the event filtering forms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410001970XA CN100353709C (en) | 2004-01-16 | 2004-01-16 | Platform event filtering system and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNB200410001970XA CN100353709C (en) | 2004-01-16 | 2004-01-16 | Platform event filtering system and method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN1642103A true CN1642103A (en) | 2005-07-20 |
CN100353709C CN100353709C (en) | 2007-12-05 |
Family
ID=34867237
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNB200410001970XA Expired - Fee Related CN100353709C (en) | 2004-01-16 | 2004-01-16 | Platform event filtering system and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN100353709C (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100431304C (en) * | 2005-09-09 | 2008-11-05 | 环达电脑(上海)有限公司 | Remote based intellectual platform management interface testing system and method |
CN101800663B (en) * | 2010-02-09 | 2011-12-21 | 中国电信股份有限公司 | interface buffering method and system |
CN102468994A (en) * | 2010-11-15 | 2012-05-23 | 英业达股份有限公司 | Test method for platform event filtering function |
CN102467435A (en) * | 2010-11-10 | 2012-05-23 | 英业达股份有限公司 | Control method of baseboard management controller with customized sensor data records |
CN103905566A (en) * | 2014-04-22 | 2014-07-02 | 浪潮电子信息产业股份有限公司 | Server starting information remote checking and leading-out method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1474762A2 (en) * | 2002-01-18 | 2004-11-10 | Idetic, Inc. | A highly redundant, high-reliability and high-performance platform logging/billing generation and collection subsystem |
CN1447263A (en) * | 2003-03-17 | 2003-10-08 | 上海金诺网络安全技术发展股份有限公司 | Method for handling computer network information security events |
-
2004
- 2004-01-16 CN CNB200410001970XA patent/CN100353709C/en not_active Expired - Fee Related
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100431304C (en) * | 2005-09-09 | 2008-11-05 | 环达电脑(上海)有限公司 | Remote based intellectual platform management interface testing system and method |
CN101800663B (en) * | 2010-02-09 | 2011-12-21 | 中国电信股份有限公司 | interface buffering method and system |
CN102467435A (en) * | 2010-11-10 | 2012-05-23 | 英业达股份有限公司 | Control method of baseboard management controller with customized sensor data records |
CN102468994A (en) * | 2010-11-15 | 2012-05-23 | 英业达股份有限公司 | Test method for platform event filtering function |
CN103905566A (en) * | 2014-04-22 | 2014-07-02 | 浪潮电子信息产业股份有限公司 | Server starting information remote checking and leading-out method |
Also Published As
Publication number | Publication date |
---|---|
CN100353709C (en) | 2007-12-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN1304941C (en) | Apparatus and method for autonomic hardware assisted thread stack tracking | |
WO2016145888A1 (en) | Display screen processing method and device | |
CN1725187A (en) | Method and device for storing user data on computer when software crashing | |
CN1151449C (en) | System and method allowing server remote access to assets information in computer system | |
CN111046011B (en) | Log collection method, system, device, electronic equipment and readable storage medium | |
CN1662901A (en) | Method and system for monitoring performance of application in a distributed environment | |
US7849072B2 (en) | Local terminal search system, filtering method used for the same, and recording medium storing program for performing the method | |
JP2008500619A5 (en) | ||
CN1549131A (en) | Repair method for computer operation system | |
CN111930882A (en) | Server abnormity tracing method, system and storage medium | |
CN100346283C (en) | Information processing system, storage unit,and computer-readable recording medium | |
CN1940884A (en) | Computer system, computer network and method | |
WO2020232871A1 (en) | Method and device for microservice dependency analysis | |
CN1878322A (en) | Fault positioning method and device | |
WO2012075757A1 (en) | Dust removing method and system of equipment | |
CN1642103A (en) | Platform event filtering system and method | |
CN110661808A (en) | Asset detection-based host vulnerability rapid scanning method and device | |
CN110162563B (en) | Data warehousing method and system, electronic equipment and storage medium | |
CN111782431A (en) | Exception processing method, exception processing device, terminal and storage medium | |
CN1991776A (en) | Protection method for caching data of memory system | |
CA2523427A1 (en) | Joined front end and back end document processing | |
CN1940889A (en) | Method, apparatus and program for management of access history, storage unit, and information processing apparatus | |
CN104156669A (en) | Computer information evidence obtaining system | |
CN102521339A (en) | System and method for dynamic access of data sources | |
CN112543127A (en) | Monitoring method and device of micro-service architecture |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20071205 Termination date: 20110116 |