WO2021147481A1 - 监控方法、装置及电子设备 - Google Patents
监控方法、装置及电子设备 Download PDFInfo
- Publication number
- WO2021147481A1 WO2021147481A1 PCT/CN2020/128819 CN2020128819W WO2021147481A1 WO 2021147481 A1 WO2021147481 A1 WO 2021147481A1 CN 2020128819 W CN2020128819 W CN 2020128819W WO 2021147481 A1 WO2021147481 A1 WO 2021147481A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- monitoring
- service system
- interface
- dimension
- target dimension
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3055—Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
Definitions
- This application relates to the field of computer application technology, and more specifically, to a monitoring method, device, and electronic equipment.
- the service system carries access requests from tens of thousands of terminals, and the operating status of the network service system has a huge impact.
- the purpose of this application is to provide a monitoring method, device and electronic equipment. By determining and selecting a monitoring plan that matches the target dimension to monitor the service system, monitoring of different dimensions of the service system can be realized, the comprehensiveness and accuracy of the service system monitoring can be improved, and the monitoring efficiency of the service system can be improved.
- this application discloses a monitoring method, including: determining a target dimension to be monitored in a service system, wherein the target dimension includes any of the infrastructure dimension, interface dimension, and user dimension of the service system Choose a monitoring plan that matches the target dimension; execute a monitoring plan that matches the target dimension to obtain a monitoring result corresponding to the target dimension, wherein the monitoring result is either normal or abnormal; When the monitoring result is abnormal, output alarm information that the monitoring result of the target dimension of the service system is abnormal.
- the monitoring result corresponding to the target dimension is obtained, and the service is output when the monitoring result is abnormal
- the target dimension is the infrastructure dimension of the service system; the execution of a monitoring solution that matches the target dimension includes: collecting the number of correct return request data of the basic framework and all received data The number of requests; according to a preset algorithm, the number of correctly returned request data and the number of all requests received are used to calculate the monitoring value of the infrastructure stability; if the monitoring value of the infrastructure stability is greater than or If it is equal to the first threshold, it is determined that the monitoring result of the infrastructure stability is normal; if the monitoring value of the infrastructure stability is less than the first threshold, it is determined that the monitoring result of the infrastructure stability is abnormal.
- the monitoring value of the stability of the infrastructure is calculated by collecting the number of correct return request data of the basic framework and the number of all requests received, and the monitoring value and the first threshold value are used to realize Implement a monitoring plan that matches the dimensions of the infrastructure of the service system to further improve the accuracy of monitoring the operating status of the infrastructure of the service system.
- the calculation of the monitoring value of the stability of the infrastructure by using the number of correctly returned request data and the number of all requests received according to a preset algorithm includes: calculating the correct return of requested data The ratio of the number of times to the number of all requests received is used as a monitoring value of the stability of the infrastructure.
- the target dimension is the interface dimension of the service system
- the execution of a monitoring solution that matches the target dimension includes: collecting interface parameters of the service system; using the interface according to a preset algorithm
- the parameter calculates the interface monitoring value of the service system; if the interface monitoring value is greater than or equal to the second threshold, it is determined that the monitoring result of the interface of the service system is normal; if the interface monitoring value is less than the second threshold, It is determined that the monitoring result of the interface of the service system is abnormal.
- the matched monitoring plan further improves the monitoring accuracy of the operation status of the interface dimension of the service system.
- the monitoring type of the interface dimension includes any one of the interface access rate and the average delay of the interface.
- the monitoring type of the interface dimension is the interface access rate
- the collecting the interface parameters of the service system includes: collecting the total access volume of the interface of the service system at the current time
- the interface parameter calculation of the interface monitoring value of the service system includes: deriving the total access volume at the current time to obtain the interface access rate of the service system.
- the interface access rate of the service system is obtained, and the interface access rate is used to monitor the interface dimension of the service system
- the operating status of the service system further improves the monitoring accuracy of the operating status of the interface dimension of the service system.
- the monitoring type of the interface dimension is the average delay of the interface;
- the collecting the interface parameters of the service system includes: collecting the request exit time and the request entrance time corresponding to the interface of the service system; the basis
- the preset algorithm, using the interface parameters to calculate the interface monitoring value of the service system includes: subtracting the request entry time from the request exit time to obtain the average delay of the interface of the service system.
- the target dimension is the user dimension: the execution of a monitoring solution that matches the target dimension to obtain a monitoring result corresponding to the target dimension includes: collecting a user's access rate according to a unique identifier of the user; if If the access rate of the user is less than or equal to the third threshold, it is determined that the monitoring result of the user dimension is normal; if the access rate of the user is greater than the third threshold, it is determined that the monitoring result of the user dimension is abnormal.
- the user's access rate is collected based on the user's unique identification, and the user-dimensional monitoring result is determined based on the relationship between the access rate and the third threshold.
- the access rate of the user is the real-time access rate of the user or the total access rate of the user in a preset time period.
- the target dimension further includes the computer room cluster dimension of the service system; the executing a monitoring solution that matches the target dimension to obtain the monitoring result corresponding to the target dimension includes: collecting data of the computer room cluster Access rate; if the access rate balance state of the computer room cluster meets the preset requirements, it is determined that the load balance of the computer room cluster of the service system is normal; if the access rate balance state of the computer room cluster does not meet the preset requirements, it is determined The load balance of the computer room cluster of the service system is abnormal.
- this application discloses a monitoring device.
- the determining module is used to determine the target dimension to be monitored in the service system, where the target dimension includes any one of the infrastructure dimension, interface dimension, and user dimension of the service system;
- the selection module is used to select a monitoring plan that matches the target dimension
- the execution module is configured to execute a monitoring plan that matches the target dimension, and obtain a monitoring result corresponding to the target dimension, wherein the monitoring result is any one of normal and abnormal;
- the output module is used for outputting alarm information that the monitoring result of the target dimension of the service system is abnormal when the monitoring result is abnormal.
- the target dimension is the infrastructure dimension of the service system; the execution module is specifically configured to: collect the number of times that the basic framework correctly returns request data and the number of all requests received; Suppose an algorithm is used to calculate the monitoring value of the stability of the infrastructure by using the number of correctly returned request data and the number of all requests received; if the monitoring value of the stability of the infrastructure is greater than or equal to the first threshold, then It is determined that the monitoring result of the stability of the infrastructure is normal; if the monitoring value of the stability of the infrastructure is less than the first threshold, it is determined that the monitoring result of the stability of the infrastructure is abnormal.
- the execution module is specifically used to calculate the monitoring value of the stability of the infrastructure by using the number of correctly returned request data and the number of all requests received according to a preset algorithm: The ratio of the number of times that the requested data is correctly returned to the number of all requests received is used as a monitoring value of the stability of the infrastructure.
- the target dimension is the interface dimension of the service system;
- the execution module is specifically configured to: collect interface parameters of the service system; use the interface parameters to calculate the interface parameters of the service system according to a preset algorithm Interface monitoring value; if the interface monitoring value is greater than or equal to the second threshold value, it is determined that the monitoring result of the interface of the service system is normal; if the interface monitoring value is less than the second threshold value, it is determined that the service system The monitoring result of the interface is abnormal.
- the monitoring type of the interface dimension includes any one of the interface access rate and the average delay of the interface.
- the monitoring type of the interface dimension is the interface access rate; when the execution module collects the interface parameters of the service system, it is specifically used to: collect the total interface access volume of the service system at the current time; When the execution module uses the interface parameters to calculate the interface monitoring value of the service system according to a preset algorithm, it is specifically used to: derive the total access volume at the current time to obtain the interface access rate of the service system.
- the monitoring type of the interface dimension is interface average delay; when the execution module collects the interface parameters of the service system, it is specifically used to: collect the request exit time and request corresponding to the interface of the service system Entry time; when the execution module uses the interface parameters to calculate the interface monitoring value of the service system according to a preset algorithm, it is specifically used to: subtract the request entry time from the request exit time to obtain the interface of the service system Average delay.
- the target dimension is the user dimension
- the execution module is specifically configured to: collect the user's access rate according to the user's unique identification; if the user's access rate is less than or equal to a third threshold, determine the The monitoring result of the user dimension is normal; if the access rate of the user is greater than the third threshold, it is determined that the monitoring result of the user dimension is abnormal.
- the access rate of the user is the real-time access rate of the user or the total access rate of the user in a preset time period.
- the target dimension also includes the computer room cluster dimension of the service system; the execution module is specifically configured to: collect the access rate of the computer room cluster; if the access rate equilibrium state of the computer room cluster meets a preset requirement , It is determined that the load balance of the computer room cluster of the service system is normal; if the access rate balance state of the computer room cluster does not meet the preset requirement, it is determined that the load balance of the computer room cluster of the service system is abnormal.
- an embodiment of the present application also provides an electronic device, which includes:
- At least one processor and a memory communicatively connected with the at least one processor; wherein the memory stores an instruction executable by the at least one processor, and the instruction is executed by the at least one processor so that the at least one processor
- the processor can execute the foregoing first aspect or the monitoring method in any implementation manner of the first aspect.
- an embodiment of the present application also provides a computer-readable storage medium that stores computer instructions, and the computer instructions are used to make the computer execute the foregoing first aspect or any implementation of the first aspect The monitoring method in the mode.
- the embodiments of the present application also provide a computer program product.
- the computer program product includes a calculation program stored on a computer-readable storage medium.
- the computer program includes program instructions. When the program instructions are executed by a computer, The computer is caused to execute the monitoring method in the foregoing first aspect or any implementation manner of the first aspect.
- this application determines the target dimension to be monitored in the service system, and selects a monitoring solution that matches the target dimension for monitoring, obtains the monitoring result corresponding to the target dimension, and outputs the monitoring result when the monitoring result is abnormal. Describes the alarm information of abnormal monitoring results in the target dimension of the service system.
- the target dimension includes any of the infrastructure dimension, interface dimension, and user dimension of the service system. Therefore, the operation of the service system in different dimensions can be realized. Status monitoring improves the comprehensiveness and accuracy of service system monitoring. Through the solution of this application, a comprehensive and automatic monitoring program for the service system is realized, which improves the monitoring efficiency of the service system and ensures normal operation and timely repair of abnormalities. Function.
- an embodiment of the present application also provides a service system, which includes the electronic device described in the foregoing third aspect.
- FIG. 1 is a schematic flowchart of a monitoring method provided by an embodiment of this application.
- FIG. 2 is a schematic structural diagram of a monitoring device provided by an embodiment of the application.
- FIG. 3 is a schematic diagram of an electronic device provided by an embodiment of the application.
- the embodiment of the present application provides a monitoring method.
- the monitoring method provided in this embodiment can be executed by a computing device, and the computing device can be implemented as software, or as a combination of software and hardware, and the computing device can be integrated in a server, a terminal device, and the like.
- a monitoring method provided by an embodiment of the present application includes:
- S101 Determine a target dimension to be monitored in the service system, where the target dimension includes any one of the infrastructure dimension, interface dimension, and user dimension of the service system.
- the monitoring method provided in this embodiment is used to implement multi-dimensional monitoring of the service system.
- the method can be applied to a built-in monitoring module of the service system, and can also be applied to an electronic device external to the service system to perform monitoring operations on the service system.
- the applied service system may be an open account service system. In specific implementation, you can bury points at the key entrances and exits of the service system. Other monitoring parameters can also be counted through statistical tools such as Remote Dictionary Service (Remote Dictionary Server, Redis for short).
- the final data display can be visualized Tools for data presentation.
- the monitoring dimensions of the service system can be divided into multiple types, and the monitoring levels are also different. For example, from the infrastructure dimension of the service system to monitor the stability of the overall level of the system, from the interface dimension or user dimension to monitor the stability of the system's local operation level.
- the electronic device has pre-stored monitoring programs for different dimensions, and each monitoring program may include the initial parameters that need to be collected for the monitoring of the dimension, the calculation rules on which they are based, and the evaluation rules for the calculation results. After determining the current target dimension to be monitored, you can select a monitoring plan that matches the target dimension.
- S103 Execute a monitoring solution matching the target dimension to obtain a monitoring result corresponding to the target dimension, where the monitoring result is either normal or abnormal.
- the electronic device After the electronic device selects a monitoring plan that matches the currently monitored target dimension, it can execute the matched monitoring plan, and obtain a monitoring result corresponding to the target dimension, and use the monitoring result to indicate the normal or abnormal operating status of the target dimension.
- the monitoring result of the target dimension is normal, it can be determined that the operation status of the target dimension is normal, and there is no need for fault repair processing. If the monitoring result of the target dimension is abnormal, it can be determined that the operation status of the target dimension is abnormal, and the electronic device can output an alarm message that the monitoring result of the target dimension of the service system is abnormal to remind the relevant maintenance personnel to perform fault repair processing on the target dimension .
- the monitoring method provided by the above embodiment of the present invention includes: determining the target dimension to be monitored in the service system, where the target dimension includes any one of the infrastructure dimension, interface dimension, and user dimension of the service system; selecting to match the target dimension Execute the monitoring program that matches the target dimension, and obtain the monitoring result of the corresponding target dimension, where the monitoring result is either normal or abnormal; when the monitoring result is abnormal, output the monitoring of the target dimension of the service system The result is abnormal alarm information.
- the target dimension is the infrastructure dimension of the service system.
- the monitoring value of the stability of the infrastructure is calculated by using the number of correctly returned request data and the number of all requests received.
- the monitoring value of the stability of the infrastructure is greater than or equal to the first threshold, it is determined that the monitoring result of the stability of the infrastructure is normal.
- the monitoring value of the stability of the infrastructure is less than the first threshold, it is determined that the monitoring result of the stability of the infrastructure is abnormal.
- the number of times that the requested data is correctly returned and the number of all requests received are used to calculate the monitoring value of the stability of the infrastructure, including:
- the overall stability index of the service can be used to determine whether the infrastructure has a problem.
- possible problems include network connection problems, database stability problems, and so on. Once such a problem occurs, the most intuitive manifestation is the decline in service stability. Through this indicator, it can be known for the first time that there is a problem with the infrastructure.
- the calculation method of service stability is the total number of correct returns of the service framework divided by the total number of requests. If it is the first 10 minutes that the stability has decreased, it can be determined that the stability of a certain type of basic service has decreased in the current state.
- the target dimension is the interface dimension of the service system
- the interface parameter is used to calculate the interface monitoring value of the service system.
- the monitoring type of the interface dimension includes any one of the interface access rate and the average delay of the interface.
- the monitoring type of the interface dimension is the interface access rate
- the interface parameters of the collection service system include:
- the interface access rate of the service system can be used to judge the logical correctness of each interface and the real-time access rate. If the real-time error rate of a single interface is too high, it indicates that there is an error in the service logic. If there is an increase in traffic on an interface, it indicates that there is an inflow of abnormal traffic. If the overall access rate of the service fluctuates, it indicates that there is a disconnection from the upstream service, and it may be an abnormal upstream service.
- the method for calculating the access rate of each interface is to obtain the derivation of the total access volume at the current time. Of course, other monitoring indicators for the interface can also be set, which is not limited.
- the monitoring type of the interface dimension is the average delay of the interface
- the interface parameters of the collection service system include:
- the average delay of the interface can be used to judge the rationality of the processing logic.
- the average delay of each interface is calculated by subtracting the request entry time from the request exit time. If the average delay of a certain type of interface is too high, it indicates that the internal processing logic is unreasonable. Many problems were not effectively exposed when the system was just generated because the amount of data was too low. However, as the system usage time increases and the amount of data continues to increase, various slow queries will appear in the database, and the batch acquisition interface will increase delays due to circular calls downstream. If it is not handled in time, it may overwhelm the database or downstream problems, leading to a service avalanche.
- the target dimension is the user dimension:
- the access rate of the user is collected.
- the third threshold If the user's access rate is less than or equal to the third threshold, it is determined that the monitoring result of the user dimension is normal.
- the user's access rate is the user's real-time access rate or the user's total access rate in a preset time period.
- the user access rate can be used to determine whether a user has malicious access.
- the method for calculating the number of visits by a single user is to count and count the unique identification of the user. If the total number of visits of a single user throughout the day exceeds the threshold, it means that the user may have crawled the service. Need to check the current user's access chain to prevent users from crawling unreasonable data. If the real-time access rate of a single user is too high, it means that the user may have maliciously accessed the interface, and maliciously obtained certain resources that need to be competed.
- the target dimension also includes the computer room cluster dimension of the service system
- the calculation of the access rate of the computer room cluster is based on the statistics of the geographical location of the computer room. This type of service indicator can be used to judge whether the load balancing is reasonable.
- a cluster In order to monitor access to a certain area in China, a cluster has been established in this area. There are also overseas clusters overseas. The traffic is not shared with each other, and the destination of the traffic can be visually observed.
- the monitoring method provided by the above embodiment of the present invention ranges from the overall stability of the service, the access rate of each interface, the access accuracy rate of each interface, the access error rate of each interface, the average delay of each interface, the number of visits of a single user, and the single Dimensions such as user access rate and computer room cluster access rate realize comprehensive monitoring of the service system.
- the abnormal situation should be notified as soon as possible, the possible cause of the abnormality can be obtained as soon as possible, and the effect after repair should be observed as soon as possible.
- an embodiment of the present application also provides a monitoring device 20, including:
- the determining module 201 is used to determine the target dimension to be monitored in the service system, where the target dimension includes any one of the infrastructure dimension, interface dimension, and user dimension of the service system.
- the selection module 201 is used to select a monitoring solution that matches the target dimension.
- the execution module 203 is configured to execute a monitoring solution matching the target dimension to obtain a monitoring result corresponding to the target dimension, where the monitoring result is either normal or abnormal.
- the output module 204 is used for outputting the alarm information of the abnormal monitoring result of the target dimension of the service system when the monitoring result is abnormal.
- the target dimension is the infrastructure dimension of the service system;
- the execution module 204 is specifically used to: collect the number of correct return request data of the basic framework and the number of all requests received; use the correct return request according to a preset algorithm The number of data and the number of all requests received are used to calculate the monitoring value of infrastructure stability; if the monitoring value of infrastructure stability is greater than or equal to the first threshold, it is determined that the monitoring result of infrastructure stability is normal; If the monitoring value of the architecture stability is less than the first threshold, it is determined that the monitoring result of the infrastructure stability is abnormal.
- the execution module 204 calculates the monitoring value of the stability of the infrastructure by using the number of correctly returned request data and the number of all requests received according to a preset algorithm, it is specifically used to: calculate the number of times the requested data is correctly returned The ratio of the number of total requests received is used as a monitoring value for the stability of the infrastructure.
- the target dimension is the interface dimension of the service system; the execution module 204 is specifically used to: collect interface parameters of the service system; use the interface parameters to calculate the interface monitoring value of the service system according to a preset algorithm; if the interface monitoring value is greater than or equal to The second threshold value determines that the monitoring result of the interface of the service system is normal; if the interface monitoring value is less than the second threshold value, it is determined that the monitoring result of the interface of the service system is abnormal.
- the monitoring type of the interface dimension includes any one of the interface access rate and the average delay of the interface.
- the monitoring type of the interface dimension is the interface access rate; when the execution module 204 collects the interface parameters of the service system, it is specifically used to: collect the total interface access volume of the service system at the current time; the execution module 204 is based on a preset algorithm, When the interface parameter is used to calculate the interface monitoring value of the service system, it is specifically used to: derive the total access volume at the current time to obtain the interface access rate of the service system.
- the monitoring type of the interface dimension is the average delay of the interface; when the execution module 204 collects the interface parameters of the service system, it is specifically used to: collect the request exit time and request entry time corresponding to the interface of the service system; the execution module 204 is in According to the preset algorithm, when the interface parameter is used to calculate the interface monitoring value of the service system, it is specifically used to: subtract the request entry time from the request exit time to obtain the average delay of the interface of the service system.
- the target dimension is the user dimension
- the execution module 204 is specifically configured to: collect the user's access rate according to the unique identifier of the user; if the user's access rate is less than or equal to the third threshold, determine that the monitoring result of the user dimension is normal; If the user's access rate is greater than the third threshold, it is determined that the monitoring result of the user dimension is abnormal.
- the user's access rate is the user's real-time access rate or the user's total access rate in a preset time period.
- the target dimension also includes the computer room cluster dimension of the service system; the execution module 204 is specifically used to: collect the access rate of the computer room cluster; if the access rate equilibrium state of the computer room cluster meets the preset requirements, determine the computer room cluster of the service system The load balance is normal; if the access rate balance state of the computer room cluster does not meet the preset requirements, it is determined that the load balance of the computer room cluster of the service system is abnormal.
- the device shown in FIG. 2 can correspondingly execute the content in the foregoing method embodiment.
- At least one processor and a memory communicatively connected with the at least one processor; wherein the memory stores an instruction executable by the at least one processor, and the instruction is executed by the at least one processor so that the at least one processor
- the processor can execute the monitoring method in the foregoing method embodiment.
- the embodiments of the present application also provide a computer-readable storage medium that stores computer instructions, and the computer instructions are used to make the computer execute the monitoring method in the foregoing method embodiments.
- the embodiments of the present application also provide a computer program product.
- the computer program product includes a calculation program stored on a computer-readable storage medium.
- the computer program includes program instructions that, when executed by a computer, cause the computer to execute The monitoring method in the foregoing method embodiment.
- FIG. 3 shows a schematic structural diagram of an electronic device 30 suitable for implementing the embodiments of the present application.
- the electronic devices in the embodiments of this application may include, but are not limited to, mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), vehicle terminals (e.g. Mobile terminals such as car navigation terminals) and fixed terminals such as digital TVs, desktop computers, etc.
- the electronic device shown in FIG. 3 is only an example, and should not bring any limitation to the function and scope of use of the embodiments of the present application.
- the electronic device 30 may include a processing device (such as a central processing unit, a graphics processor, etc.) 301, which may be loaded into a random access device according to a program stored in a read-only memory (ROM) 302 or from a storage device 308
- the program in the memory (RAM) 303 executes various appropriate actions and processing.
- various programs and data required for the operation of the electronic device 30 are also stored.
- the processing device 301, the ROM 302, and the RAM 303 are connected to each other through a bus 304.
- An input/output (I/O) interface 305 is also connected to the bus 304.
- the following devices can be connected to the I/O interface 305: including input devices 306 such as touch screens, touch pads, keyboards, mice, image sensors, microphones, accelerometers, gyroscopes, etc.; including, for example, liquid crystal displays (LCD), speakers, An output device 307 such as a vibrator; a storage device 308 such as a magnetic tape, a hard disk, etc.; and a communication device 309.
- the communication device 309 may allow the electronic device 30 to perform wireless or wired communication with other devices to exchange data.
- the figure shows the electronic device 30 with various devices, it should be understood that it is not required to implement or have all the devices shown. It may be implemented alternatively or provided with more or fewer devices.
- the process described above with reference to the flowchart can be implemented as a computer software program.
- the embodiments of the present application include a computer program product, which includes a computer program carried on a computer-readable medium, and the computer program includes program code for executing the method shown in the flowchart.
- the computer program may be downloaded and installed from the network through the communication device 309, or installed from the storage device 308, or installed from the ROM 302.
- the processing device 301 the above-mentioned functions defined in the method of the embodiment of the present application are executed.
- the above-mentioned computer-readable medium in the present application may be a computer-readable signal medium or a computer-readable storage medium or any combination of the two.
- the computer-readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or device, or a combination of any of the above. More specific examples of computer-readable storage media may include, but are not limited to: electrical connections with one or more wires, portable computer disks, hard disks, random access memory (RAM), read-only memory (ROM), erasable removable Programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the above.
- the computer-readable storage medium may be any tangible medium that contains or stores a program, and the program may be used by or in combination with an instruction execution system, apparatus, or device.
- the computer-readable signal medium may include a data signal propagated in baseband or as a part of a carrier wave, and computer-readable program code is carried therein. This propagated data signal can take many forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination of the foregoing.
- the computer-readable signal medium may also be any computer-readable medium other than the computer-readable storage medium.
- the computer-readable signal medium may send, propagate, or transmit the program for use by or in combination with the instruction execution system, apparatus, or device .
- the program code contained on the computer-readable medium can be transmitted by any suitable medium, including but not limited to: wire, optical cable, RF (Radio Frequency), etc., or any suitable combination of the above.
- the above-mentioned computer-readable medium may be included in the above-mentioned electronic device; or it may exist alone without being assembled into the electronic device.
- the foregoing computer-readable medium carries one or more programs, and when the foregoing one or more programs are executed by the electronic device, the electronic device can implement the solutions provided by the foregoing method embodiments.
- the aforementioned computer-readable medium carries one or more programs, and when the aforementioned one or more programs are executed by the electronic device, the electronic device can implement the solutions provided by the aforementioned method embodiments.
- the computer program code used to perform the operations of the present application can be written in one or more programming languages or a combination thereof.
- the above-mentioned programming languages include object-oriented programming languages—such as Java, Smalltalk, C++, and also conventional Procedural programming language-such as "C" language or similar programming language.
- the program code can be executed entirely on the user's computer, partly on the user's computer, executed as an independent software package, partly on the user's computer and partly executed on a remote computer, or entirely executed on the remote computer or server.
- the remote computer can be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or it can be connected to an external computer (for example, using an Internet service provider to pass Internet connection).
- LAN local area network
- WAN wide area network
- each block in the flowchart or block diagram may represent a module, program segment, or part of code, and the module, program segment, or part of code contains one or more for realizing the specified logical function Executable instructions.
- the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown one after another can actually be executed substantially in parallel, and they can sometimes be executed in the reverse order, depending on the functions involved.
- each block in the block diagram and/or flowchart, and the combination of the blocks in the block diagram and/or flowchart can be implemented by a dedicated hardware-based system that performs the specified functions or operations Or it can be realized by a combination of dedicated hardware and computer instructions.
- the units involved in the embodiments described in this application can be implemented in software or hardware. Wherein, the name of the unit does not constitute a limitation on the unit itself under certain circumstances.
- the first obtaining unit can also be described as "a unit for obtaining at least two Internet Protocol addresses.”
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims (15)
- 一种监控方法的方法,其特征在于,包括:确定服务系统中待监控的目标维度,其中,所述目标维度包括所述服务系统的基础架构维度、接口维度和用户维度中的任一种;选择与所述目标维度匹配的监控方案;执行与所述目标维度匹配的监控方案,获得对应所述目标维度的监控结果,其中,所述监控结果为正常和异常中的任一种;在所述监控结果为异常时,输出所述服务系统的目标维度的监控结果异常的报警信息。
- 根据权利要求1所述的方法,其特征在于,所述目标维度为所述服务系统的基础架构维度;所述执行与所述目标维度匹配的监控方案,包括:采集基础框架的正确返回请求数据的次数和所接收的全部请求的次数;依据预设算法,利用所述正确返回请求数据的次数和所接收的全部请求的次数,计算所述基础架构稳定性的监控值;若所述基础架构稳定性的监控值大于或者等于第一阈值,则确定所述基础架构稳定性的监控结果为正常;若所述基础架构稳定性的监控值小于所述第一阈值,则确定所述基础架构稳定性的监控结果为异常。
- 根据权利要求2所述的方法,其特征在于,所述依据预设算法,利用所述正确返回请求数据的次数和所接收的全部请求的次数,计算所述基础架构稳定性的监控值,包括:计算所述正确返回请求数据的次数和所接收的全部请求的次数的比值,作为所述基础架构稳定性的监控值。
- 根据权利要求1所述的方法,其特征在于,所述目标维度为所述服务系统的接口维度;所述执行与所述目标维度匹配的监控方案,包括:采集所述服务系统的接口参数;依据预设算法,利用所述接口参数计算所述服务系统的接口监控值;若所述接口监控值大于或者等于第二阈值,则确定所述服务系统的接口的监控结果正常;若所述接口监控值小于所述第二阈值,则确定所述服务系统的接口的监控结果异常。
- 根据权利要求4所述的方法,其特征在于,所述接口维度的监控类型包括接口访问率和接口平均延时中的任一种。
- 根据权利要求5所述的方法,其特征在于,所述接口维度的监控类型为接口访问率;所述采集所述服务系统的接口参数,包括:采集所述服务系统当前时间的接口总访问量;所述依据预设算法,利用所述接口参数计算所述服务系统的接口监控值,包括:对所述当前时间总访问量求导,得到所述服务系统的接口访问率。
- 根据权利要求5所述的方法,其特征在于,所述接口维度的监控类型为接口平均延时;所述采集所述服务系统的接口参数,包括:采集所述服务系统的接口对应的请求出口时间和请求入口时间;所述依据预设算法,利用所述接口参数计算所述服务系统的接口监控值,包括:将请求出口时间减去请求入口时间,得到所述服务系统的接口平均延时。
- 根据权利要求1所述的方法,其特征在于,所述目标维度为用户维度:所述执行与所述目标维度匹配的监控方案,获得对应所述目标维度的监控结果,包括:依据用户的唯一标识,采集用户的访问率;若所述用户的访问率小于或者等于第三阈值,则确定所述用户维度的监控结果正常;若所述用户的访问率大于所述第三阈值,则确定所述用户维度的监控结果异常。
- 根据权利要求8所述的方法,其特征在于,所述用户的访问率为所述用户的实时访问率或者所述用户在预设时段内的总访问率。
- 根据权利要求1所述的方法,其特征在于,所述目标维度还包括所述服务系统的机房集群维度;所述执行与所述目标维度匹配的监控方案,获得对应所述目标维度的监控结果,包括:采集所述机房集群的访问率;若所述机房集群的访问率均衡状态满足预设要求,则确定所述服务系统的机房集群的负载均衡正常;若所述机房集群的访问率均衡状态不满足预设要求,则确定所述服务系统的机房集群的负载均衡异常。
- 一种监控装置,其特征在于,包括:确定模块,用于确定服务系统中待监控的目标维度,其中,所述目标维度包括所述服务系统的基础架构维度、接口维度和用户维度中的任一种;选择模块,用于选择与所述目标维度匹配的监控方案;执行模块,用于执行与所述目标维度匹配的监控方案,获得对应所述目标维度的监控结果,其中,所述监控结果为正常和异常中的任一种;输出模块,用于在所述监控结果为异常时,输出所述服务系统的目标维度的监控结果异常的报警信息。
- 一种电子设备,其特征在于,所述电子设备包括:至少一个处理器;以及,与所述至少一个处理器通信连接的存储器;其中,所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器能够执行前述权利要求1-10中任一项所述的监控方法。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质中存储有指令,当该指令在计算机上运行时,使得计算机执行权利要求1-10中任一项所述的监控方法。
- 一种计算机程序,其特征在于,包括程序代码,当计算机运行所述计算机程序时,所述程序代码执行如权利要求1-10中任一项所述的方法。
- 一种服务系统,其特征在于,包括如权利要求12所述的电子设备。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010073543.1A CN111290924B (zh) | 2020-01-22 | 2020-01-22 | 监控方法、装置及电子设备 |
CN202010073543.1 | 2020-01-22 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021147481A1 true WO2021147481A1 (zh) | 2021-07-29 |
Family
ID=71030700
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2020/128819 WO2021147481A1 (zh) | 2020-01-22 | 2020-11-13 | 监控方法、装置及电子设备 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN111290924B (zh) |
WO (1) | WO2021147481A1 (zh) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113472080A (zh) * | 2021-07-30 | 2021-10-01 | 王雪梅 | 一种配电自动化监控方法、装置及电子设备 |
CN113626289A (zh) * | 2021-08-27 | 2021-11-09 | 中国银行股份有限公司 | 一种用户活跃度监控方法及装置 |
CN113904951A (zh) * | 2021-09-28 | 2022-01-07 | 济南浪潮数据技术有限公司 | 一种网关设备的数据监控方法、装置及相关设备 |
CN114760233A (zh) * | 2022-03-22 | 2022-07-15 | 中国工商银行股份有限公司 | 业务处理方法、装置、电子设备及存储介质 |
CN115174358A (zh) * | 2022-09-08 | 2022-10-11 | 浪潮电子信息产业股份有限公司 | 存储集群接口的监测处理方法、系统、设备及存储介质 |
CN116055496A (zh) * | 2022-12-30 | 2023-05-02 | 广州趣研网络科技有限公司 | 一种监控数据采集方法、装置、电子设备及存储介质 |
CN116126521A (zh) * | 2022-12-20 | 2023-05-16 | 北京海致星图科技有限公司 | 服务内存信息的负载均衡方法、装置、存储介质和设备 |
CN116647572A (zh) * | 2023-07-26 | 2023-08-25 | 腾讯科技(深圳)有限公司 | 访问端点切换方法、装置、电子设备及存储介质 |
CN117333981A (zh) * | 2023-10-31 | 2024-01-02 | 浙江泰源科技有限公司 | 一种机房集成监控管理方法与系统 |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111290924B (zh) * | 2020-01-22 | 2022-05-10 | 北京字节跳动网络技术有限公司 | 监控方法、装置及电子设备 |
CN113760635A (zh) * | 2020-09-21 | 2021-12-07 | 北京沃东天骏信息技术有限公司 | 连接异常的确定方法、装置、电子设备和存储介质 |
CN113762693A (zh) * | 2021-01-18 | 2021-12-07 | 北京京东拓先科技有限公司 | 用于展示信息的方法和装置 |
CN114461502B (zh) * | 2022-02-16 | 2023-11-14 | 北京百度网讯科技有限公司 | 模型的监控方法和装置 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104750585A (zh) * | 2013-12-30 | 2015-07-01 | 腾讯科技(深圳)有限公司 | 终端检测的方法及装置 |
US20160194666A1 (en) * | 2011-09-28 | 2016-07-07 | Rheinkalk Gmbh | Process for Production of Biogas |
CN106789398A (zh) * | 2016-11-25 | 2017-05-31 | 中国传媒大学 | 一种媒体大数据hadoop集群监控的方法 |
CN107391336A (zh) * | 2017-06-21 | 2017-11-24 | 华迪计算机集团有限公司 | 一种用于对服务器的运行状态进行监控的系统及方法 |
CN108289033A (zh) * | 2017-01-10 | 2018-07-17 | 湖南易分销电子商务有限公司 | 一种云计算对监控系统方法 |
CN111290924A (zh) * | 2020-01-22 | 2020-06-16 | 北京字节跳动网络技术有限公司 | 监控方法、装置及电子设备 |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8510430B2 (en) * | 2006-08-03 | 2013-08-13 | International Business Machines Corporation | Intelligent performance monitoring based on resource threshold |
CN103391299B (zh) * | 2012-05-08 | 2016-09-28 | 深圳市腾讯计算机系统有限公司 | 负载均衡方法和负载均衡系统 |
CN106547848A (zh) * | 2016-10-18 | 2017-03-29 | 广州酷狗计算机科技有限公司 | 数据存储方法及装置 |
CN106971254A (zh) * | 2017-02-13 | 2017-07-21 | 上海瀚之友信息技术服务有限公司 | 一种业务监控系统及方法 |
US20180241644A1 (en) * | 2017-02-21 | 2018-08-23 | Microsoft Technology Licensing, Llc | Server performance evaluation through single value server performance index |
CN107741955B (zh) * | 2017-09-15 | 2020-06-23 | 平安科技(深圳)有限公司 | 业务数据监控方法、装置、终端设备及存储介质 |
CN108845910B (zh) * | 2018-05-31 | 2024-02-06 | 康键信息技术(深圳)有限公司 | 大规模微服务系统的监控方法、装置及存储介质 |
CN109067780B (zh) * | 2018-09-17 | 2023-02-28 | 平安科技(深圳)有限公司 | 爬虫用户的检测方法、装置、计算机设备和存储介质 |
-
2020
- 2020-01-22 CN CN202010073543.1A patent/CN111290924B/zh active Active
- 2020-11-13 WO PCT/CN2020/128819 patent/WO2021147481A1/zh active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160194666A1 (en) * | 2011-09-28 | 2016-07-07 | Rheinkalk Gmbh | Process for Production of Biogas |
CN104750585A (zh) * | 2013-12-30 | 2015-07-01 | 腾讯科技(深圳)有限公司 | 终端检测的方法及装置 |
CN106789398A (zh) * | 2016-11-25 | 2017-05-31 | 中国传媒大学 | 一种媒体大数据hadoop集群监控的方法 |
CN108289033A (zh) * | 2017-01-10 | 2018-07-17 | 湖南易分销电子商务有限公司 | 一种云计算对监控系统方法 |
CN107391336A (zh) * | 2017-06-21 | 2017-11-24 | 华迪计算机集团有限公司 | 一种用于对服务器的运行状态进行监控的系统及方法 |
CN111290924A (zh) * | 2020-01-22 | 2020-06-16 | 北京字节跳动网络技术有限公司 | 监控方法、装置及电子设备 |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113472080A (zh) * | 2021-07-30 | 2021-10-01 | 王雪梅 | 一种配电自动化监控方法、装置及电子设备 |
CN113472080B (zh) * | 2021-07-30 | 2023-10-20 | 北京中芯标准科技有限公司 | 一种配电自动化监控方法、装置及电子设备 |
CN113626289A (zh) * | 2021-08-27 | 2021-11-09 | 中国银行股份有限公司 | 一种用户活跃度监控方法及装置 |
CN113904951B (zh) * | 2021-09-28 | 2023-07-25 | 济南浪潮数据技术有限公司 | 一种网关设备的数据监控方法、装置及相关设备 |
CN113904951A (zh) * | 2021-09-28 | 2022-01-07 | 济南浪潮数据技术有限公司 | 一种网关设备的数据监控方法、装置及相关设备 |
CN114760233A (zh) * | 2022-03-22 | 2022-07-15 | 中国工商银行股份有限公司 | 业务处理方法、装置、电子设备及存储介质 |
CN114760233B (zh) * | 2022-03-22 | 2024-05-28 | 中国工商银行股份有限公司 | 业务处理方法、装置、电子设备及存储介质 |
CN115174358A (zh) * | 2022-09-08 | 2022-10-11 | 浪潮电子信息产业股份有限公司 | 存储集群接口的监测处理方法、系统、设备及存储介质 |
CN115174358B (zh) * | 2022-09-08 | 2023-01-17 | 浪潮电子信息产业股份有限公司 | 存储集群接口的监测处理方法、系统、设备及存储介质 |
CN116126521A (zh) * | 2022-12-20 | 2023-05-16 | 北京海致星图科技有限公司 | 服务内存信息的负载均衡方法、装置、存储介质和设备 |
CN116126521B (zh) * | 2022-12-20 | 2023-10-31 | 北京海致星图科技有限公司 | 服务内存信息的负载均衡方法、装置、存储介质和设备 |
CN116055496A (zh) * | 2022-12-30 | 2023-05-02 | 广州趣研网络科技有限公司 | 一种监控数据采集方法、装置、电子设备及存储介质 |
CN116055496B (zh) * | 2022-12-30 | 2024-04-05 | 广州趣研网络科技有限公司 | 一种监控数据采集方法、装置、电子设备及存储介质 |
CN116647572A (zh) * | 2023-07-26 | 2023-08-25 | 腾讯科技(深圳)有限公司 | 访问端点切换方法、装置、电子设备及存储介质 |
CN116647572B (zh) * | 2023-07-26 | 2023-11-14 | 腾讯科技(深圳)有限公司 | 访问端点切换方法、装置、电子设备及存储介质 |
CN117333981A (zh) * | 2023-10-31 | 2024-01-02 | 浙江泰源科技有限公司 | 一种机房集成监控管理方法与系统 |
CN117333981B (zh) * | 2023-10-31 | 2024-03-22 | 浙江泰源科技有限公司 | 一种机房集成监控管理方法与系统 |
Also Published As
Publication number | Publication date |
---|---|
CN111290924A (zh) | 2020-06-16 |
CN111290924B (zh) | 2022-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021147481A1 (zh) | 监控方法、装置及电子设备 | |
WO2020140649A1 (zh) | 区块链智能合约管理方法与装置、电子设备、存储介质 | |
CN111459783B (zh) | 应用程序优化方法、装置、电子设备及存储介质 | |
CN109241343A (zh) | 一种刷量用户识别系统、方法及装置 | |
CN106844165A (zh) | 告警方法及装置 | |
WO2017083022A1 (en) | Performance monitoring in a distributed storage system | |
CN111767202A (zh) | 异常检测方法、装置、电子设备和介质 | |
CN102298542A (zh) | 一种应用程序的质量确定方法和系统 | |
CN110059939A (zh) | 一种风险检测方法及装置 | |
CN112270998A (zh) | 区域内感染人员分布的评估方法及装置 | |
WO2020135886A1 (zh) | 空气污染物预报方法、装置及电子设备 | |
CN113986564A (zh) | 应用数据的流量监控方法、装置、计算机设备及介质 | |
CN115409283A (zh) | 设备故障预测方法、设备故障预测装置、设备及存储介质 | |
CN113420935A (zh) | 故障定位方法、装置、设备和介质 | |
CN112150033A (zh) | 一种快递柜系统管理方法、装置及电子设备 | |
CN115174353B (zh) | 故障根因确定方法、装置、设备及介质 | |
WO2023273539A1 (zh) | 航班查询系统业务监控方法、装置、设备及存储介质 | |
CN110727558A (zh) | 信息提示方法、装置、存储介质及电子设备 | |
CN112019406B (zh) | 流量监控方法、装置、电子设备和计算机可读介质 | |
CN113132431B (zh) | 服务监控方法、服务监控装置、电子设备及介质 | |
CN115033456A (zh) | 一种内网前端性能监控方法、装置、计算机设备及存储介质 | |
CN114443663A (zh) | 数据表处理方法、装置、设备及介质 | |
CN113946493A (zh) | 一种监控阈值确定及监控报警方法、装置、设备和介质 | |
CN109522133B (zh) | 一种数据拼接方法、装置、电子设备及存储介质 | |
WO2023138572A1 (zh) | 用户标签检测方法、装置、电子设备及可读存储介质 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 20914826 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20914826 Country of ref document: EP Kind code of ref document: A1 |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 06.02.2023) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 20914826 Country of ref document: EP Kind code of ref document: A1 |