WO2022134352A1 - 服务器硬件状态监控方法、装置、电子设备及介质 - Google Patents

服务器硬件状态监控方法、装置、电子设备及介质 Download PDF

Info

Publication number
WO2022134352A1
WO2022134352A1 PCT/CN2021/083720 CN2021083720W WO2022134352A1 WO 2022134352 A1 WO2022134352 A1 WO 2022134352A1 CN 2021083720 W CN2021083720 W CN 2021083720W WO 2022134352 A1 WO2022134352 A1 WO 2022134352A1
Authority
WO
WIPO (PCT)
Prior art keywords
server
hardware
service
fault
trap notification
Prior art date
Application number
PCT/CN2021/083720
Other languages
English (en)
French (fr)
Inventor
胡俊文
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022134352A1 publication Critical patent/WO2022134352A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3055Monitoring arrangements for monitoring the status of the computing system or of the computing system component, e.g. monitoring if the computing system is on, off, available, not available
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0751Error or fault detection not based on redundancy
    • G06F11/0754Error or fault detection not based on redundancy by exceeding limits
    • G06F11/076Error or fault detection not based on redundancy by exceeding limits by exceeding a count or rate limit, e.g. word- or bit count limit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Definitions

  • the present application relates to the technical field of security monitoring, and in particular, to a method, apparatus, electronic device, and computer-readable storage medium for monitoring server hardware status.
  • Server hardware often fails, and it is necessary to monitor the hardware status of the server.
  • the existing server monitoring methods generally use a distributed framework when the number of servers is large, but the distributed monitoring framework has high requirements for the follow-up maintenance costs of servers and operation and maintenance engineers. In this case, most companies or enterprises will choose Self-developed server framework.
  • the existing self-developed server framework modes are generally active polling mode or passive reporting mode.
  • the concurrency of the server framework using the active polling mode will increase with the number of servers, and the server framework using the passive reporting mode will increase. It will be difficult to analyze the difference between different reported information, and the server frameworks of these two modes obtain the fault hardware information of the server through log information, and the log information is often very complex, which makes it difficult to improve the processing efficiency of the server frameworks of these two modes. .
  • a server hardware status monitoring method comprising:
  • a server hardware state monitoring device comprising:
  • a setting module used for enabling the trap notification service of the Simple Network Management Protocol in the server according to the hardware state monitoring instruction of the server, and setting the trap receiver of the server;
  • a trap notification sending module configured to trigger the trap notification service to obtain a trap notification message when a hardware failure of the server is monitored, and use the trap receiver to receive the trap notification information sent by the trap notification service;
  • An IP address obtaining module configured to parse the trap notification message, obtain the out-of-band IP of the server, and send the out-of-band IP to the fault alarm management platform of the server;
  • an inspection service initiating module configured to retrieve fault information of the server through the out-of-band IP, and use the fault alarm management platform to initiate an inspection service for managing the server;
  • a hardware alarm monitoring module is configured to use the inspection service to inspect the hardware state of the server according to the fault information, and perform alarm monitoring according to the hardware state.
  • An electronic device comprising:
  • the processor executes the computer program stored in the memory to realize the following steps:
  • a computer-readable storage medium comprising a storage data area and a storage program area, the storage data area stores data created, and the storage program area stores a computer program; wherein, the computer program is executed by a processor The following steps are implemented:
  • the present application avoids the problem that the log information is used to obtain the failure information of the server being too complicated, so that the purpose of efficiently monitoring the hardware state of the server can be achieved.
  • FIG. 1 is a schematic flowchart of a method for monitoring server hardware status according to an embodiment of the present application
  • FIG. 2 is a schematic diagram of a module of a server hardware state monitoring device provided by an embodiment of the present application
  • FIG. 3 is a schematic diagram of an internal structure of an electronic device for implementing a method for monitoring server hardware status provided by an embodiment of the present application;
  • Embodiments of the present application provide a method for monitoring server hardware status.
  • the execution body of the server hardware state monitoring method includes, but is not limited to, at least one of electronic devices that can be configured to execute the method provided by the embodiments of the present application, such as a server and a terminal.
  • the server hardware status monitoring method may be executed by software or hardware installed in a terminal device or a server device, and the software may be a blockchain platform.
  • the server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
  • the server hardware status monitoring method includes:
  • the Simple Network Management Protocol (Simple Network Management Protocol, SNMP) is used to manage and monitor abnormal conditions of network devices (such as servers, workstations, routers, switches, and HUBS, etc.).
  • the trap notification (trap) service is used to notify the abnormal situation.
  • the trap receiver (snmptrapd) is used to receive and record notifications sent by the trap notification service.
  • the enabling of the trap notification service of the Simple Network Management Protocol in the server includes:
  • BMC Baseboard Management Controller
  • the baseboard management controller Based on the instruction for enabling the trap notification service, the baseboard management controller is used to obtain the trap notification file of the simple network management, and the trap notification service is enabled.
  • the integrated manager initiates a trap notification service start instruction to the baseboard management controller according to the hardware status monitoring instruction.
  • the server is monitored by using a simple network management protocol, and when a hardware failure of the server is monitored, the trap notification service is triggered to obtain a trap notification message.
  • the trap notification service (SNMP Trap) is a passive service, which is driven by the failure of the hardware of the server, and sets traps in the monitored server. When the hardware of the server fails , triggering the trap notification service to obtain a trap notification message.
  • a fault threshold is first set in the baseboard management controller through the trap notification service, when any hardware of the server fails, the fault value is increased by one, and when the fault value is When the failure threshold is reached, it is determined that the hardware of the server is faulty.
  • the trap notification information is obtained by triggering the trap notification service when a hardware failure occurs on the server.
  • the trap notification message includes information of the server in failure, such as the IP address of the server in failure, the service life of the server in failure, and the like.
  • parsing the trap notification message to obtain the out-of-band IP of the server includes:
  • the out-of-band IP of the server is obtained by querying the path information.
  • the out-of-band IP of the server is used for internal debugging of the server, and is not used for external communication, nor does the network outside the server need to access the IP.
  • the fault alarm management platform is a pre-built platform for centralized management of the fault alarm.
  • the retrieval of the fault information of the server through the out-of-band IP includes:
  • the fault information of the server is obtained by querying the private mapping table.
  • the private mapping table of the server includes IP address information such as the mapping relationship between the out-of-band IP and the fault information.
  • the inspection service (Redfish) is an open industry standard issued by the Distributed Management Task Force (DMTF), which is used for modern and secure management of the platform hardware. , which can be used for hardware management of the server.
  • DMTF Distributed Management Task Force
  • S5. Use the inspection service to inspect the hardware status of the server according to the fault information, and perform alarm monitoring according to the hardware status.
  • using the inspection service to inspect the hardware status of the server according to the fault information includes:
  • the Representational State Transfer ful api (Representational State Transfer ful api) is an API interface for acquiring the flag string.
  • the flag string (Uniform Resource Identifier, URI) contains the information of the faulty server
  • the inspection of all hardware states of the server according to the inspection service is obtained by inspecting the hardware states of the server through the inspection service. For example, using the inspection service to inspect the rotational speed of the fan of the server, and using the inspection service to inspect the hard disk temperature and remaining life of the server hard disk.
  • the inspection of all hardware states of the server according to the inspection service includes:
  • the performing alarm monitoring according to the hardware state includes:
  • the fault alarm management platform uses the fault alarm management platform to obtain the server information and hardware information record, and notify the operation and maintenance personnel of the server information and hardware information record in a preset way .
  • the hardware of the server includes a temperature sensor, a fan, a power supply, a GPU card, etc.
  • the alarm threshold is set to 4, and the initial alarm value is 0.
  • the initial alarm value is increased by 2 to obtain an alarm. value A; when the fan fails, the alarm value A is increased by 1 to obtain the alarm value B; when the power supply fails, the alarm value B is increased by 2 to obtain the alarm value C; when the GPU card fails, the The alarm value C is increased by 2 to obtain an alarm value D; when the alarm value D is lower than the alarm threshold, the hardware state of the server is lower than the threshold.
  • the method, device, electronic device, and computer-readable storage medium for monitoring the hardware status of the server described in the embodiments of the present application obtain the information for obtaining the server by enabling the trap notification service of the Simple Network Management Protocol in the server and setting the trap receiver of the server.
  • FIG. 2 it is a schematic diagram of a module of a server hardware state monitoring device of the present application.
  • the server hardware status monitoring apparatus 100 described in this application may be installed in an electronic device. According to the implemented functions, the server hardware status monitoring apparatus may include a setting module 101 , a trap notification sending module 102 , an IP address obtaining module 103 , a patrol service initiating module 104 and a hardware alarm monitoring module 105 .
  • the modules described in this application may also be referred to as units, which refer to a series of computer program segments that can be executed by the processor of an electronic device and can perform fixed functions, and are stored in the memory of the electronic device.
  • each module/unit is as follows:
  • the setting module 101 is configured to enable the trap notification service of the Simple Network Management Protocol in the server according to the hardware state monitoring instruction of the server, and set the trap receiver of the server.
  • the Simple Network Management Protocol (Simple Network Management Protocol, SNMP) is used to manage and monitor abnormal conditions of network devices (such as servers, workstations, routers, switches, and HUBS, etc.).
  • the trap notification (trap) service is used to notify the abnormal situation.
  • the trap receiver (snmptrapd) is configured to receive and record notifications sent by the trap notification service.
  • the enabling of the trap notification service of the Simple Network Management Protocol in the server includes:
  • BMC Baseboard Management Controller
  • the baseboard management controller Based on the instruction for enabling the trap notification service, the baseboard management controller is used to obtain the trap notification file of the simple network management, and the trap notification service is enabled.
  • the integrated manager initiates a trap notification service start instruction to the baseboard management controller according to the hardware status monitoring instruction.
  • the trap notification sending module 102 is configured to trigger the trap notification service to obtain a trap notification message when a hardware failure of the server is monitored, and use the trap receiver to receive the trap notification sent by the trap notification service information.
  • the server is monitored by using a simple network management protocol, and when a hardware failure of the server is monitored, the trap notification service is triggered to obtain a trap notification message.
  • the trap notification service (SNMP Trap) is a passive service, which is driven by the failure of the hardware of the server, and sets traps in the monitored server. When the hardware of the server fails , triggering the trap notification service to obtain a trap notification message.
  • a fault threshold is first set in the baseboard management controller through the trap notification service, when any hardware of the server fails, the fault value is increased by one, and when the fault value is When the failure threshold is reached, it is determined that the hardware of the server is faulty.
  • the trap notification information is obtained by triggering the trap notification service when a hardware failure occurs on the server.
  • the trap notification message includes information of the server in failure, such as the IP address of the server in failure, the service life of the server in failure, and the like.
  • the IP address obtaining module 103 is configured to parse the trap notification message, obtain the out-of-band IP of the server, and send the out-of-band IP to the fault alarm management platform of the server.
  • parsing the trap notification message to obtain the out-of-band IP of the server includes:
  • the out-of-band IP of the server is obtained by querying the path information.
  • the out-of-band IP of the server is used for internal debugging of the server, and is not used for external communication, nor does the network outside the server need to access the IP.
  • the fault alarm management platform is a pre-built platform for centralized management of the fault alarm.
  • the inspection service initiating module 104 is configured to retrieve fault information of the server through the out-of-band IP, and use the fault alarm management platform to initiate an inspection service for managing the server.
  • the retrieval of the fault information of the server through the out-of-band IP includes:
  • the fault information of the server is obtained by querying the private mapping table.
  • the private mapping table of the server includes IP address information such as the mapping relationship between the out-of-band IP and the fault information.
  • the inspection service (Redfish) is an open industry standard issued by the Distributed Management Task Force (DMTF), which is used for modern and secure management of the platform hardware. , which can be used for hardware management of the server.
  • DMTF Distributed Management Task Force
  • the hardware alarm monitoring module 105 is configured to use the inspection service to inspect the hardware state of the server according to the fault information, and perform alarm monitoring according to the hardware state.
  • using the inspection service to inspect the hardware status of the server according to the fault information includes:
  • the Representational State Transfer ful api (Representational State Transfer ful api) is an API interface for acquiring the flag string.
  • the flag string (Uniform Resource Identifier, URI) contains the information of the faulty server
  • the inspection of all hardware states of the server according to the inspection service is obtained by inspecting the hardware states of the server through the inspection service. For example, using the inspection service to inspect the rotational speed of the fan of the server, and using the inspection service to inspect the hard disk temperature and remaining life of the server hard disk.
  • the inspection of all hardware states of the server according to the inspection service includes:
  • the performing alarm monitoring according to the hardware state includes:
  • the fault alarm management platform uses the fault alarm management platform to obtain the server information and hardware information record, and notify the operation and maintenance personnel of the server information and hardware information record in a preset way .
  • the hardware of the server includes a temperature sensor, a fan, a power supply, a GPU card, etc.
  • the alarm threshold is set to 4, and the initial alarm value is 0.
  • the initial alarm value is increased by 2 to obtain an alarm. value A; when the fan fails, the alarm value A is increased by 1 to obtain the alarm value B; when the power supply fails, the alarm value B is increased by 2 to obtain the alarm value; when the GPU card fails, the The alarm value C is increased by 2 to obtain the alarm value D; when the alarm value D is lower than the alarm threshold, the hardware state of the server is lower than the threshold.
  • FIG. 3 it is a schematic structural diagram of an electronic device for implementing the server hardware state monitoring method according to the present application.
  • the electronic device 1 may include a processor 10, a memory 11 and a bus, and may also include a computer program stored in the memory 11 and executable on the processor 10, such as a server hardware status monitoring program 12.
  • the memory 11 includes at least one type of readable storage medium, and the readable storage medium includes flash memory, mobile hard disk, multimedia card, card-type memory (for example: SD or DX memory, etc.), magnetic memory, magnetic disk, CD etc.
  • the memory 11 may be an internal storage unit of the electronic device 1 in some embodiments, such as a mobile hard disk of the electronic device 1 .
  • the memory 11 may also be an external storage device of the electronic device 1, such as a pluggable mobile hard disk, a smart memory card (Smart Media Card, SMC), a secure digital (Secure Digital) device equipped on the electronic device 1. , SD) card, flash card (Flash Card) and so on.
  • the memory 11 may also include both an internal storage unit of the electronic device 1 and an external storage device.
  • the memory 11 can not only be used to store application software and various data installed in the electronic device 1, such as the code of the server hardware status monitoring program 12, etc., but also can be used to temporarily store data that has been output or will be output.
  • the processor 10 may be composed of integrated circuits, for example, may be composed of a single packaged integrated circuit, or may be composed of multiple integrated circuits packaged with the same function or different functions, including one or more integrated circuits.
  • Central Processing Unit CPU
  • microprocessor digital processing chip
  • graphics processor and combination of various control chips, etc.
  • the processor 10 is the control core (Control Unit) of the electronic device, and uses various interfaces and lines to connect various components of the entire electronic device, and by running or executing the program or module (for example, executing the program) stored in the memory 11. Server hardware status monitoring program, etc.), and call the data stored in the memory 11 to execute various functions of the electronic device 1 and process data.
  • the bus may be a peripheral component interconnect standard (peripheral component interconnect, referred to as PCI) bus or extended industry standard structure (extended industry standard architecture, referred to as EISA) bus, etc.
  • PCI peripheral component interconnect
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus and so on.
  • the bus is configured to implement connection communication between the memory 11 and at least one processor 10 and the like.
  • FIG. 3 only shows an electronic device with components. Those skilled in the art can understand that the structure shown in FIG. 3 does not constitute a limitation on the electronic device 1, and may include fewer or more components than those shown in the figure. components, or a combination of certain components, or a different arrangement of components.
  • the electronic device 1 may also include a power source (such as a battery) for powering the various components, preferably, the power source may be logically connected to the at least one processor 10 through a power management device, so that the power source can be managed by the power source.
  • the device implements functions such as charge management, discharge management, and power consumption management.
  • the power source may also include one or more DC or AC power sources, recharging devices, power failure detection circuits, power converters or inverters, power status indicators, and any other components.
  • the electronic device 1 may further include various sensors, Bluetooth modules, Wi-Fi modules, etc., which will not be repeated here.
  • the electronic device 1 may also include a network interface.
  • the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a Bluetooth interface, etc.), which is usually used in the electronic device. 1 Establish a communication connection with other electronic devices.
  • the electronic device 1 may further include a user interface, and the user interface may be a display (Display), an input unit (such as a keyboard (Keyboard)), optionally, the user interface may also be a standard wired interface or a wireless interface.
  • the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode, organic light-emitting diode) touch device, and the like.
  • the display may also be appropriately called a display screen or a display unit, which is used for displaying information processed in the electronic device 1 and for displaying a visualized user interface.
  • the server hardware status monitoring program 12 stored in the memory 11 in the electronic device 1 is a combination of multiple computer programs. When running in the processor 10, it can realize:
  • the integrated modules/units of the electronic device 1 are implemented in the form of software functional units and sold or used as independent products, they can be stored in a computer-readable storage medium, and the computer-readable storage medium can be Volatile and can also be non-volatile.
  • the computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, U disk, removable hard disk, magnetic disk, optical disk, computer memory, read-only memory (ROM, Read-Only Memory) .
  • the computer-usable storage medium may mainly include a stored program area and a stored data area, wherein the stored program area may store an operating system, an application program required for at least one function, and the like; Using the created data, etc., the application program may implement the following steps when executed by the processor:
  • modules described as separate components may or may not be physically separated, and components shown as modules may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
  • each functional module in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
  • the above-mentioned integrated units can be implemented in the form of hardware, or can be implemented in the form of hardware plus software function modules.
  • the blockchain referred to in this application is a new application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify its Validity of information (anti-counterfeiting) and generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

一种服务器硬件状态监控方法,包括:在服务器中开启陷阱通知服务,并设置陷阱接收器;当监控到服务器的硬件发生故障时,触发陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知信息;解析所述陷阱通知消息,得到服务器的带外IP;通过所述带外IP检索所述服务器的故障信息,并发起用于管理所述服务器的巡检服务;利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。还提出一种服务器硬件状态监控装置、设备及存储介质。还涉及区块链技术,所述服务器的故障信息可存储于区块链节点中。本方法可以高效的对服务器进行硬件状态监控。

Description

服务器硬件状态监控方法、装置、电子设备及介质
本申请要求于2020年12月25日提交中国专利局、申请号为CN202011564397.9,发明名称为“服务器硬件状态监控方法、装置、电子设备及介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及安全监控技术领域,尤其涉及一种服务器硬件状态监控方法、装置、电子设备及计算机可读存储介质。
背景技术
服务器硬件经常出现故障,需要对服务器进行硬件状态监控。现有的服务器监控方法在服务器数目较多时一般采用分布式框架,但分布式的监控框架对服务器后续维护成本和运维工程师的要求都很高,这种情况下大部分公司或企业都会选择自研服务器框架。
技术问题
发明人意识到现有的自研服务器框架模式一般都是主动轮询模式或者被动上报模式,采用主动轮询模式的服务器框架并发量会随着服务器数量规模而增长,采用被动上报模式的服务器框架会难以解析不同上报信息的差异,并且这两种模式的服务器框架都是通过日志信息得到服务器的故障硬件信息,而日志信息往往又十分复杂,导致这两种模式的服务器框架处理效率都难以提升。
技术解决方案
一种服务器硬件状态监控方法,包括:
根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
一种服务器硬件状态监控装置,所述装置包括:
设置模块,用于根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
陷阱通知发送模块,用于当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
IP地址获取模块,用于解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
巡检服务发起模块,用于通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
硬件告警监控模块,用于利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
一种电子设备,所述电子设备包括:
存储器,存储至少一个计算机程序;及
处理器,执行所述存储器中存储的计算机程序以实现如下步骤:
根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
一种计算机可读存储介质,包括存储数据区和存储程序区,存储数据区存储创建的数据,存储程序区存储有计算机程序;其中,所述计算机程序被处理器执行时实现如下步骤:
根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
本申请避免了利用日志信息获取所述服务器的故障信息过于复杂的问题,从而能够实现高效的对服务器的硬件状态进行监控的目的。
附图说明
图1为本申请一实施例提供的一种服务器硬件状态监控方法的流程示意图;
图2为本申请一实施例提供的服务器硬件状态监控装置的模块示意图;
图3为本申请一实施例提供的实现服务器硬件状态监控方法的电子设备的内部结构示意图;
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
本发明的实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请实施例提供一种服务器硬件状态监控方法。所述服务器硬件状态监控方法的执行主体包括但不限于服务端、终端等能够被配置为执行本申请实施例提供的该方法的电子设备中的至少一种。换言之,所述服务器硬件状态监控方法可以由安装在终端设备或服务端设备的软件或硬件来执行,所述软件可以是区块链平台。所述服务端包括但不限于:单台服务器、服务器集群、云端服务器或云端服务器集群等。
参照图1所示,为本申请一实施例提供的一种服务器硬件状态监控方法的流程示意图。在本实施例中,所述服务器硬件状态监控方法包括:
S1、根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器。
本申请实施例中,所述简单网络管理协议(Simple Network Management Protocol,SNMP)用于管理和监控网络设备(如服务器、工作站、路由器、交换机及HUBS等)的异常情况。所述陷阱通知(trap)服务用于对所述异常情况进行通知。所述陷阱接收器(snmptrapd)用于接收并记录所述陷阱通知服务发送的通知。
详细地,本申请实施例中,所述在所述服务器中开启简单网络管理协议的陷阱通知服务,包括:
查询所述服务器的基板控制器(Baseboard Management Controller,BMC),并在所述基板控制器中创建集成管理器;
当所述服务器获取硬件状态监控指令时,通过所述集成管理器向所述基板管理控制器发起陷阱通知服务开启指令;
基于所述陷阱通知服务开启指令,利用所述基板管理控制器获取所述简单网络管理的陷阱通知文件,开启所述陷阱通知服务。
详细地,所述集成管理器根据所述硬件状态监控指令向所述基板管理控制器发起陷阱通知服务开启指令。
S2、当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息。
本申请实施例中,利用简单网络管理协议对所述服务器进行监控,并在监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息。详细地,所述陷阱通知服务(SNMP Trap)属于被动形式的服务,是以所述服务器的硬件发生故障为驱动,在被监控的所述服务器中设置陷阱,当所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息。
进一步地,本申请实施例首先通过所述陷阱通知服务在所述基板管理控制器中设置故障阈值,当所述服务器的任一硬件发生故障时,故障值加一,并在当所述故障值到达所述故障阈值时,判断所述服务器的硬件发生故障。
进一步地,所述陷阱通知信息是由所述服务器发生硬件故障,触发所述陷阱通知服务得到的。本申请实施例中,所述陷阱通知消息包括发生故障的服务器的信息,例如发生故障的服务器的IP地址,发生故障的服务器的使用年限等。
S3、解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台。
详细地,所述解析所述陷阱通知消息,得到所述服务器的带外IP包括:
通过所述陷阱接收器获取所述陷阱通知消息的统一资源定位符;
根据已知的统一资源服务协议将所述统一资源定位符进行划分,得到所述陷阱通知消息的路径信息;
查询所述路径信息得到所述服务器的带外IP。
其中,所述服务器的带外IP用于所述服务器内部调试使用,不用于对外通信,也不需要服务器外部的网络访问此IP。
本申请实施例中,所述故障告警管理平台为一种预构建的对所述故障告警进行集中管理的平台。
S4、通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务。
详细地,所述通过所述带外IP检索所述服务器的故障信息,包括:
获取所述服务器的预设私有映射表;
根据所述服务器的带外IP,在所述私有映射表中查询得到所述服务器的故障信息。
其中,所述服务器的私有映射表中包含所述带外IP与故障信息的映射关系等IP地址信息。
进一步地,所述巡检服务(Redfish)为分布式管理任务组(Distributed Management Task Force,DMTF)发布的开放式行业规范标准,用于对平台硬件进行现代化和安全的管理,在本申请实施例中,可用于对所述服务器进行硬件管理。
S5、利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
详细地,所述利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,包括:
利用所述巡检服务调用表现层状态转换API接口;
通过所述表现层状态转换API接口获取包含服务器硬件信息的标志字符串,得到所述服务器的所有硬件状态;
利用所述故障信息对所述服务器进行检索,得到所述服务器的故障硬件;
基于所述服务器的故障硬件对所述所有硬件状态进行筛选,得到所述服务器故障硬件的硬件状态。
详细地,所述表现层状态转换API(Representational State Transfer ful api)是用于获取所述标志字符串的API接口。所述标志字符串(Uniform Resource Identifier,URI)包含所述故障服务器的信息
详细地,所述根据巡检服务巡检所述服务器的所有硬件状态是通过所述巡检服务巡检所述服务器中各个硬件状态得到。例如;利用巡检服务巡检所述服务器风扇的转速,利用所述巡检服务巡检所述服务器硬盘的硬盘温度、剩余寿命等。
具体的,所述根据所述巡检服务巡检所述服务器的所有硬件状态,包括:
利用所述巡检服务发起巡检请求;根据所述巡检请求的HTTP统一资源定位符,向所述基板管理控制器中的Web服务进程发送带有所述HTTP统一资源定位符的资源调用请求;所述Web服务进程根据所述HTTP统一资源定位符,从所述基板管理控制器中获取所述服务器的所有硬件状态,并将所述服务器的所有硬件状态发送至所述巡检服务。
进一步地,所述根据所述硬件状态进行告警监控包括:
预设告警阈值,并通过所述服务器的硬件状态获取服务器的故障硬件;
为所述故障硬件设置权重,计算所有所述故障硬件的故障值得到故障总值;
若所述故障总值低于阈值,不执行告警;
若所述故障总值不低于阈值,利用所述故障告警管理平台获取所述服务器的信息及硬件信息记表,并将所述服务器的信息及硬件信息记表通过预设方式通知运维人员。
进一步地,例如所述服务器的硬件包括温度传感器、风扇、电源、GPU卡等,设置告警阈值为4,初始告警值为0,当所述温度传感器发生故障时所述初始告警值加2得到告警值A;当所述风扇发生故障时所述告警值A增加1得到告警值B;当所述电源发生故障时所述告警值B增加2得到告警值C;当所述GPU卡发生故障时所述告警值C增加2得到告警值D;当所述告警值D低于所述告警阈值时,所述服务器的硬件状态低于阈值。
本申请实施例所述服务器硬件状态监控方法、装置、电子设备及计算机可读存储介质通过在服务器中开启简单网络管理协议的陷阱通知服务和设置服务器的陷阱接收器,获取用于得到所述服务器故障信息的带外IP,并在所述服务器的故障告警管理平台中利用服务器的故障信息进行服务器的硬件状态告警监控,避免了利用日志信息获取所述服务器的故障信息过于复杂的问题,从而能够实现高效的对服务器的硬件状态进行监控的目的。
如图2所示,是本申请服务器硬件状态监控装置的模块示意图。
本申请所述服务器硬件状态监控装置100可以安装于电子设备中。根据实现的功能,所述服务器硬件状态监控装置可以包括设置模块101、陷阱通知发送模块102、IP地址获取模块103、巡检服务发起模块104和硬件告警监控模块105。本申请所述模块也可以称之为单元,是指一种能够被电子设备处理器所执行,并且能够完成固定功能的一系列计算机程序段,其存储在电子设备的存储器中。
在本实施例中,关于各模块/单元的功能如下:
所述设置模块101,用于根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器。
本申请实施例中,所述简单网络管理协议(Simple Network Management Protocol,SNMP)用于管理和监控网络设备(如服务器、工作站、路由器、交换机及HUBS等)的异常情况。所述陷阱通知(trap)服务用于对所述异常情况进行通知。所述所述陷阱接收器(snmptrapd)用于接收并记录所述陷阱通知服务发送的通知。
详细地,本申请实施例中,所述在所述服务器中开启简单网络管理协议的陷阱通知服务,包括:
查询所述服务器的基板控制器(Baseboard Management Controller,BMC),并在所述基板控制器中创建集成管理器;
当所述服务器获取硬件状态监控指令时,通过所述集成管理器向所述基板管理控制器发起陷阱通知服务开启指令;
基于所述陷阱通知服务开启指令,利用所述基板管理控制器获取所述简单网络管理的陷阱通知文件,开启所述陷阱通知服务。
详细地,所述集成管理器根据所述硬件状态监控指令向所述基板管理控制器发起陷阱通知服务开启指令。
所述陷阱通知发送模块102,用于当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息。
本申请实施例中,利用简单网络管理协议对所述服务器进行监控,并在监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息。详细地,所述陷阱通知服务(SNMP Trap)属于被动形式的服务,是以所述服务器的硬件发生故障为驱动,在被监控的所述服务器中设置陷阱,当所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息。
进一步地,本申请实施例首先通过所述陷阱通知服务在所述基板管理控制器中设置故障阈值,当所述服务器的任一硬件发生故障时,故障值加一,并在当所述故障值到达所述故障阈值时,判断所述服务器的硬件发生故障。
进一步地,所述陷阱通知信息是由所述服务器发生硬件故障,触发所述陷阱通知服务得到的。本申请实施例中,所述陷阱通知消息包括发生故障的服务器的信息,例如发生故障的服务器的IP地址,发生故障的服务器的使用年限等。
所述IP地址获取模块103,用于解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台。
详细地,所述解析所述陷阱通知消息,得到所述服务器的带外IP包括:
通过所述陷阱接收器获取所述陷阱通知消息的统一资源定位符;
根据已知的统一资源服务协议将所述统一资源定位符进行划分,得到所述陷阱通知消息的路径信息;
查询所述路径信息得到所述服务器的带外IP。
其中,所述服务器的带外IP用于所述服务器内部调试使用,不用于对外通信,也不需要服务器外部的网络访问此IP。
本申请实施例中,所述故障告警管理平台为一种预构建的对所述故障告警进行集中管理的平台。
所述巡检服务发起模块104,用于通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务。
详细地,所述通过所述带外IP检索所述服务器的故障信息,包括:
获取所述服务器的预设私有映射表;
根据所述服务器的带外IP,在所述私有映射表中查询得到所述服务器的故障信息。
其中,所述服务器的私有映射表中包含所述带外IP与故障信息的映射关系等IP地址信息。
进一步地,所述巡检服务(Redfish)为分布式管理任务组(Distributed Management Task Force,DMTF)发布的开放式行业规范标准,用于对平台硬件进行现代化和安全的管理,在本申请实施例中,可用于对所述服务器进行硬件管理。
所述硬件告警监控模块105,用于利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
详细地,所述利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,包括:
利用所述巡检服务调用表现层状态转换API接口;
通过所述表现层状态转换API接口获取包含服务器状态信息的标志字符串,得到所述服务器的所有硬件状态;
利用所述故障消息对所述服务器进行检索,得到所述服务器的故障硬件;
利用所述服务器的故障硬件对所述所有硬件状态进行筛选,得到所述服务器故障硬件的硬件状态。
详细地,所述表现层状态转换API(Representational State Transfer ful api)是用于获取所述标志字符串的API接口。所述标志字符串(Uniform Resource Identifier,URI)包含所述故障服务器的信息
详细地,所述根据巡检服务巡检所述服务器的所有硬件状态是通过所述巡检服务巡检所述服务器中各个硬件状态得到。例如;利用巡检服务巡检所述服务器风扇的转速,利用所述巡检服务巡检所述服务器硬盘的硬盘温度、剩余寿命等。
具体的,所述根据所述巡检服务巡检所述服务器的所有硬件状态,包括:
利用所述巡检服务发起巡检请求;根据所述巡检请求的HTTP统一资源定位符,向所述基板管理控制器中的Web服务进程发送带有所述HTTP统一资源定位符的资源调用请求;所述Web服务进程根据所述HTTP统一资源定位符,从所述基板管理控制器中获取所述服务器的所有硬件状态,并将所述服务器的所有硬件状态发送至所述巡检服务。
进一步地,所述根据所述硬件状态进行告警监控包括:
预设告警阈值,并通过所述服务器的硬件状态获取服务器的故障硬件;
为所述故障硬件设置权重,计算所有所述故障硬件的故障值得到故障总值;
若所述故障总值低于阈值,不执行告警;
若所述故障总值不低于阈值,利用所述故障告警管理平台获取所述服务器的信息及硬件信息记表,并将所述服务器的信息及硬件信息记表通过预设方式通知运维人员。
进一步地,例如所述服务器的硬件包括温度传感器、风扇、电源、GPU卡等,设置告警阈值为4,初始告警值为0,当所述温度传感器发生故障时所述初始告警值加2得到告警值A;当所述风扇发生故障时所述告警值A增加1得到告警值B;当所述电源发生故障时所述告警值B增加2得到告警值;当所述GPU卡发生故障时所述告警值C增加2得到告警值D;当所述告警值D低于所述告警阈值时,所述服务器的硬件状态低于阈值。
如图3所示,是本申请实现服务器硬件状态监控方法的电子设备的结构示意图。
所述电子设备1可以包括处理器10、存储器11和总线,还可以包括存储在所述存储器11中并可在所述处理器10上运行的计算机程序,如服务器硬件状态监控程序12。
其中,所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、移动硬盘、多媒体卡、卡型存储器(例如:SD或DX存储器等)、磁性存储器、磁盘、光盘等。所述存储器11在一些实施例中可以是电子设备1的内部存储单元,例如该电子设备1的移动硬盘。所述存储器11在另一些实施例中也可以是电子设备1的外部存储设备,例如电子设备1上配备的插接式移动硬盘、智能存储卡(Smart Media Card, SMC)、安全数字(Secure Digital, SD)卡、闪存卡(Flash Card)等。进一步的,所述存储器11还可以既包括电子设备1的内部存储单元也包括外部存储设备。所述存储器11不仅可以用于存储安装于电子设备1的应用软件及各类数据,例如服务器硬件状态监控程序12的代码等,还可以用于暂时地存储已经输出或者将要输出的数据。
所述处理器10在一些实施例中可以由集成电路组成,例如可以由单个封装的集成电路所组成,也可以是由多个相同功能或不同功能封装的集成电路所组成,包括一个或者多个中央处理器(Central Processing unit,CPU)、微处理器、数字处理芯片、图形处理器及各种控制芯片的组合等。所述处理器10是所述电子设备的控制核心(Control Unit),利用各种接口和线路连接整个电子设备的各个部件,通过运行或执行存储在所述存储器11内的程序或者模块(例如执行服务器硬件状态监控程序等),以及调用存储在所述存储器11内的数据,以执行电子设备1的各种功能和处理数据。
所述总线可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。该总线可以分为地址总线、数据总线、控制总线等。所述总线被设置为实现所述存储器11以及至少一个处理器10等之间的连接通信。
图3仅示出了具有部件的电子设备,本领域技术人员可以理解的是,图3示出的结构并不构成对所述电子设备1的限定,可以包括比图示更少或者更多的部件,或者组合某些部件,或者不同的部件布置。
例如,尽管未示出,所述电子设备1还可以包括给各个部件供电的电源(比如电池),优选地,电源可以通过电源管理装置与所述至少一个处理器10逻辑相连,从而通过电源管理装置实现充电管理、放电管理、以及功耗管理等功能。电源还可以包括一个或一个以上的直流或交流电源、再充电装置、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。所述电子设备1还可以包括多种传感器、蓝牙模块、Wi-Fi模块等,在此不再赘述。
进一步的,所述电子设备1还可以包括网络接口,可选地,所述网络接口可以包括有线接口和/或无线接口(如WI-FI接口、蓝牙接口等),通常用于在该电子设备1与其他电子设备之间建立通信连接。
可选地,该电子设备1还可以包括用户接口,用户接口可以是显示器(Display)、输入单元(比如键盘(Keyboard)),可选地,用户接口还可以是标准的有线接口、无线接口。可选地,在一些实施例中,显示器可以是LED显示器、液晶显示器、触控式液晶显示器以及OLED(Organic Light-Emitting Diode,有机发光二极管)触摸器等。其中,显示器也可以适当的称为显示屏或显示单元,用于显示在电子设备1中处理的信息以及用于显示可视化的用户界面。
应该了解,所述实施例仅为说明之用,在专利申请范围上并不受此结构的限制。
所述电子设备1中的所述存储器11存储的服务器硬件状态监控程序12是多个计算机程序的组合,在所述处理器10中运行时,可以实现:
根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
进一步的,所述电子设备1集成的模块/单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中,计算机可读存储介质可以是易失性的,也可以是非易失性的。所述计算机可读介质可以包括:能够携带所述计算机程序代码的任何实体或装置、记录介质、U盘、移动硬盘、磁碟、光盘、计算机存储器、只读存储器(ROM,Read-Only Memory)。
进一步的,所述计算机可用存储介质可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序等;存储数据区可存储根据区块链节点的使用所创建的数据等,所述应用程序被处理器执行时可实现如下步骤:
根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
在本申请所提供的几个实施例中,应该理解到,所揭露的设备,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述模块的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能模块可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能模块的形式实现。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。
因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附关联图表记视为限制所涉及的权利要求。
本申请所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。
最后应说明的是,以上实施例仅用以说明本申请的技术方案而非限制,尽管参照较佳实施例对本申请进行了详细说明,本领域的普通技术人员应当理解,可以对本申请的技术方案进行修改或等同替换,而不脱离本申请技术方案的精神和范围。

Claims (20)

  1. 一种服务器硬件状态监控方法,其中,所述方法包括:
    根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
    当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
    解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
    通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
    利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
  2. 如权利要求1所述的服务器硬件状态监控方法,其中,所述在所述服务器中开启简单网络管理协议的陷阱通知服务,包括:
    获取所述简单网络管理协议的陷阱通知文件,查询所述服务器的基板管理控制器;
    在所述基板管理控制器中加载所述简单网络管理协议的陷阱通知文件,以开启所述简单网络管理协议的陷阱通知服务。
  3. 如权利要求1所述的服务器硬件状态监控方法,其中,所述当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息之前还包括:
    根据所述陷阱通知服务在所述基板管理控制器中设置故障阈值;
    当所述服务器的任一硬件发生故障时,故障值加一;
    当所述故障值到达所述故障阈值时,判断所述服务器的硬件发生故障。
  4. 如权利要求1所述的服务器硬件状态监控方法,其中,所述通过所述带外IP检索所述服务器的故障信息,包括:
    获取所述服务器的预设私有映射表,其中,所述私有映射表中包含带外IP与故障信息的映射关系;
    根据所述服务器的带外IP,在所述私有映射表中查询得到所述服务器的故障信息。
  5. 如权利要求1所述的服务器硬件状态监控方法,其中,所述利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,包括:
    利用所述巡检服务调用表现层状态转换API接口;
    通过所述表现层状态转换API接口获取包含服务器硬件信息的标志字符串,得到所述服务器的所有硬件状态;
    利用所述故障信息对所述服务器进行检索,得到所述服务器的故障硬件;
    基于所述服务器的故障硬件对所述所有硬件状态进行筛选,得到所述服务器故障硬件的硬件状态。
  6. 如权利要求5所述的服务器硬件状态监控方法,其中,所述根据所述巡检服务巡检所述服务器的所有硬件状态,包括:
    利用所述巡检服务发起巡检请求;
    根据所述巡检请求的HTTP统一资源定位符,向所述基板管理控制器中的Web服务进程发送带有所述HTTP统一资源定位符的资源调用请求;
    所述Web服务进程根据所述HTTP统一资源定位符,从所述基板管理控制器中获取所述服务器的所有硬件状态,并将所述服务器的所有硬件状态发送至所述巡检服务。
  7. 如权利要求1至6中任意一项所述的服务器硬件状态监控方法,其中,所述根据所述硬件状态进行告警监控包括,包括:
    预设告警阈值,并通过所述服务器的硬件状态获取服务器的故障硬件;
    为所述故障硬件设置权重,计算所有所述故障硬件的故障值得到故障总值;
    若所述故障总值低于阈值,不执行告警;
    若所述故障总值不低于阈值,利用所述故障告警管理平台获取所述服务器的信息及硬件信息记表,并将所述服务器的信息及硬件信息记表通过预设方式通知运维人员。
  8. 一种服务器硬件状态监控装置,其中,所述装置包括:
    设置模块,用于根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
    陷阱通知发送模块,用于当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
    IP地址获取模块,用于解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
    巡检服务发起模块,用于通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
    硬件告警监控模块,用于利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
  9. 一种电子设备,其中,所述电子设备包括:
    至少一个处理器;以及
    与所述至少一个处理器通信连接的存储器;其中,
    所述存储器存储有可被所述至少一个处理器执行的计算机程序指令,所述计算机程序指令被所述至少一个处理器执行,以使所述至少一个处理器执行如下步骤:
    根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
    当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
    解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
    通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
    利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
  10. 如权利要求9所述的电子设备,其中,所述在所述服务器中开启简单网络管理协议的陷阱通知服务,包括:
    获取所述简单网络管理协议的陷阱通知文件,查询所述服务器的基板管理控制器;
    在所述基板管理控制器中加载所述简单网络管理协议的陷阱通知文件,以开启所述简单网络管理协议的陷阱通知服务。
  11. 如权利要求9所述的电子设备,其中,所述当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息之前,所述至少一个处理器还执行如下步骤:
    根据所述陷阱通知服务在所述基板管理控制器中设置故障阈值;
    当所述服务器的任一硬件发生故障时,故障值加一;
    当所述故障值到达所述故障阈值时,判断所述服务器的硬件发生故障。
  12. 如权利要求9所述的电子设备,其中,所述通过所述带外IP检索所述服务器的故障信息,包括:
    获取所述服务器的预设私有映射表,其中,所述私有映射表中包含带外IP与故障信息的映射关系;
    根据所述服务器的带外IP,在所述私有映射表中查询得到所述服务器的故障信息。
  13. 如权利要求9所述的电子设备,其中,所述利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,包括:
    利用所述巡检服务调用表现层状态转换API接口;
    通过所述表现层状态转换API接口获取包含服务器硬件信息的标志字符串,得到所述服务器的所有硬件状态;
    利用所述故障信息对所述服务器进行检索,得到所述服务器的故障硬件;
    基于所述服务器的故障硬件对所述所有硬件状态进行筛选,得到所述服务器故障硬件的硬件状态。
  14. 如权利要求13所述的电子设备,其中,所述根据所述巡检服务巡检所述服务器的所有硬件状态,包括:
    利用所述巡检服务发起巡检请求;
    根据所述巡检请求的HTTP统一资源定位符,向所述基板管理控制器中的Web服务进程发送带有所述HTTP统一资源定位符的资源调用请求;
    所述Web服务进程根据所述HTTP统一资源定位符,从所述基板管理控制器中获取所述服务器的所有硬件状态,并将所述服务器的所有硬件状态发送至所述巡检服务。
  15. 如权利要求9至14中任意一项所述的电子设备,其中,所述根据所述硬件状态进行告警监控包括,包括:
    预设告警阈值,并通过所述服务器的硬件状态获取服务器的故障硬件;
    为所述故障硬件设置权重,计算所有所述故障硬件的故障值得到故障总值;
    若所述故障总值低于阈值,不执行告警;
    若所述故障总值不低于阈值,利用所述故障告警管理平台获取所述服务器的信息及硬件信息记表,并将所述服务器的信息及硬件信息记表通过预设方式通知运维人员。
  16. 一种计算机可读存储介质,包括存储数据区和存储程序区,存储数据区存储创建的数据,存储程序区存储有计算机程序;其中,所述计算机程序被处理器执行时实现如下步骤:
    根据服务器的硬件状态监控指令,在所述服务器中开启简单网络管理协议的陷阱通知服务,并设置服务器的陷阱接收器;
    当监控到所述服务器的硬件发生故障时,触发所述陷阱通知服务得到陷阱通知消息,并利用所述陷阱接收器接收所述陷阱通知服务发送的陷阱通知信息;
    解析所述陷阱通知消息,得到所述服务器的带外IP,并将所述带外IP发送至所述服务器的故障告警管理平台;
    通过所述带外IP检索所述服务器的故障信息,并利用所述故障告警管理平台,发起用于管理所述服务器的巡检服务;
    利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,并根据所述硬件状态进行告警监控。
  17. 如权利要求16所述的计算机可读存储介质,其中,所述在所述服务器中开启简单网络管理协议的陷阱通知服务,包括:
    获取所述简单网络管理协议的陷阱通知文件,查询所述服务器的基板管理控制器;
    在所述基板管理控制器中加载所述简单网络管理协议的陷阱通知文件,以开启所述简单网络管理协议的陷阱通知服务。
  18. 如权利要求16所述的计算机可读存储介质,其中,所述通过所述带外IP检索所述服务器的故障信息,包括:
    获取所述服务器的预设私有映射表,其中,所述私有映射表中包含带外IP与故障信息的映射关系;
    根据所述服务器的带外IP,在所述私有映射表中查询得到所述服务器的故障信息。
  19. 如权利要求16所述的计算机可读存储介质,其中,所述利用所述巡检服务根据所述故障信息巡检所述服务器的硬件状态,包括:
    利用所述巡检服务调用表现层状态转换API接口;
    通过所述表现层状态转换API接口获取包含服务器硬件信息的标志字符串,得到所述服务器的所有硬件状态;
    利用所述故障信息对所述服务器进行检索,得到所述服务器的故障硬件;
    基于所述服务器的故障硬件对所述所有硬件状态进行筛选,得到所述服务器故障硬件的硬件状态。
  20. 如权利要求19所述的计算机可读存储介质,其中,所述根据所述巡检服务巡检所述服务器的所有硬件状态,包括:
    利用所述巡检服务发起巡检请求;
    根据所述巡检请求的HTTP统一资源定位符,向所述基板管理控制器中的Web服务进程发送带有所述HTTP统一资源定位符的资源调用请求;
    所述Web服务进程根据所述HTTP统一资源定位符,从所述基板管理控制器中获取所述服务器的所有硬件状态,并将所述服务器的所有硬件状态发送至所述巡检服务。
PCT/CN2021/083720 2020-12-25 2021-03-30 服务器硬件状态监控方法、装置、电子设备及介质 WO2022134352A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011564397.9 2020-12-25
CN202011564397.9A CN112631866A (zh) 2020-12-25 2020-12-25 服务器硬件状态监控方法、装置、电子设备及介质

Publications (1)

Publication Number Publication Date
WO2022134352A1 true WO2022134352A1 (zh) 2022-06-30

Family

ID=75325056

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/083720 WO2022134352A1 (zh) 2020-12-25 2021-03-30 服务器硬件状态监控方法、装置、电子设备及介质

Country Status (2)

Country Link
CN (1) CN112631866A (zh)
WO (1) WO2022134352A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115883416A (zh) * 2022-11-25 2023-03-31 东信和平科技股份有限公司 服务终端监控方法、系统及可读存储介质
CN115913872A (zh) * 2022-11-30 2023-04-04 浪潮(山东)计算机科技有限公司 一种服务器监控运维方法、装置、设备及介质
CN115941437A (zh) * 2022-09-30 2023-04-07 中国建设银行股份有限公司 一种裸金属服务器监控方法及装置、存储介质及电子设备

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114911670A (zh) * 2022-04-13 2022-08-16 北京云集智造科技有限公司 一种服务器磁盘监控及故障预测的方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104543A (zh) * 2014-07-17 2014-10-15 浪潮集团有限公司 一种基于snmp和ipmi协议的服务器管理系统及方法
CN107124315A (zh) * 2017-05-19 2017-09-01 国网安徽省电力公司淮南供电公司 基于snmp及ipmi协议的多服务器监测系统及监测方法
CN108763037A (zh) * 2018-06-07 2018-11-06 郑州云海信息技术有限公司 一种服务器监控管理方法及装置
CN109684176A (zh) * 2018-12-26 2019-04-26 广东浪潮大数据研究有限公司 一种告警信息的上报方法、系统及相关组件
CN111010287A (zh) * 2018-10-04 2020-04-14 T移动美国公司 虚拟snmp陷阱接收器
CN111694719A (zh) * 2020-06-10 2020-09-22 腾讯科技(深圳)有限公司 服务器故障处理方法、装置、存储介质及电子设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104104543A (zh) * 2014-07-17 2014-10-15 浪潮集团有限公司 一种基于snmp和ipmi协议的服务器管理系统及方法
CN107124315A (zh) * 2017-05-19 2017-09-01 国网安徽省电力公司淮南供电公司 基于snmp及ipmi协议的多服务器监测系统及监测方法
CN108763037A (zh) * 2018-06-07 2018-11-06 郑州云海信息技术有限公司 一种服务器监控管理方法及装置
CN111010287A (zh) * 2018-10-04 2020-04-14 T移动美国公司 虚拟snmp陷阱接收器
CN109684176A (zh) * 2018-12-26 2019-04-26 广东浪潮大数据研究有限公司 一种告警信息的上报方法、系统及相关组件
CN111694719A (zh) * 2020-06-10 2020-09-22 腾讯科技(深圳)有限公司 服务器故障处理方法、装置、存储介质及电子设备

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115941437A (zh) * 2022-09-30 2023-04-07 中国建设银行股份有限公司 一种裸金属服务器监控方法及装置、存储介质及电子设备
CN115883416A (zh) * 2022-11-25 2023-03-31 东信和平科技股份有限公司 服务终端监控方法、系统及可读存储介质
CN115913872A (zh) * 2022-11-30 2023-04-04 浪潮(山东)计算机科技有限公司 一种服务器监控运维方法、装置、设备及介质

Also Published As

Publication number Publication date
CN112631866A (zh) 2021-04-09

Similar Documents

Publication Publication Date Title
WO2022134352A1 (zh) 服务器硬件状态监控方法、装置、电子设备及介质
US11153184B2 (en) Technologies for annotating process and user information for network flows
US11296960B2 (en) Monitoring distributed applications
US10860311B2 (en) Method and apparatus for drift management in clustered environments
CN107612748B (zh) 一种多节点服务器功耗管理系统
US7788520B2 (en) Administering a system dump on a redundant node controller in a computer system
US20150127814A1 (en) Monitoring Server Method
TW201714432A (zh) 管理方法、服務控制器裝置以及非暫態電腦可讀取媒體
WO2021115350A1 (zh) 多容器集群监控数据的采集方法、装置及电子设备
TW201732622A (zh) 可擴充集中式非揮發性記憶體儲存盒、電腦實施方法以及非暫態電腦可讀取儲存裝置
WO2020062674A1 (zh) 一种更新数据包的推送方法及服务器
TWI647993B (zh) 控制伺服器機櫃中氣流之系統及方法
US8966067B2 (en) Automatically addressing performance issues in a distributed database
US8782462B2 (en) Rack system
WO2020000760A1 (zh) 服务器的管理方法、装置、计算机设备及存储介质
US9654421B2 (en) Providing real-time interrupts over ethernet
CN103607314A (zh) 一种使用snmp协议对服务器监控管理的系统
WO2016197737A1 (zh) 自检处理方法、装置及系统
WO2020024369A1 (zh) 一种基于私有云的配置运维告警模板的方法及设备
EP3014817B1 (en) Hardware management communication protocol
US20180262407A1 (en) Telemetry Architecture for Integrated Circuits and Cloud Infrastructure
TW201428487A (zh) 監測系統及監測方法
US9906604B2 (en) System and method for dynamic discovery of web services for a management console
US8812900B2 (en) Managing storage providers in a clustered appliance environment
US8769088B2 (en) Managing stability of a link coupling an adapter of a computing system to a port of a networking device for in-band data communications

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21908364

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21908364

Country of ref document: EP

Kind code of ref document: A1