WO2023087956A1 - Alarm shielding method and apparatus for virtualized product, and device and medium - Google Patents

Alarm shielding method and apparatus for virtualized product, and device and medium Download PDF

Info

Publication number
WO2023087956A1
WO2023087956A1 PCT/CN2022/123190 CN2022123190W WO2023087956A1 WO 2023087956 A1 WO2023087956 A1 WO 2023087956A1 CN 2022123190 W CN2022123190 W CN 2022123190W WO 2023087956 A1 WO2023087956 A1 WO 2023087956A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
item
shielding
virtualization
configuration information
Prior art date
Application number
PCT/CN2022/123190
Other languages
French (fr)
Chinese (zh)
Inventor
苏道恒
朱道昌
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Publication of WO2023087956A1 publication Critical patent/WO2023087956A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Definitions

  • the present application relates to the field of computer technology, and in particular to a method, device, device and medium for shielding alarms of virtualization products.
  • a mature server virtualization platform brings many benefits to the enterprise, and when there is a problem with our system or webpage, the biggest impact is on the interests of the enterprise. If the user experience is poor, they may no longer use the product, thus lead to loss of customers. At this time, the alarm system of the platform is particularly important. Timely and reasonable alarm prompts can enable users to quickly discover and locate problems, and can also notify the designated operation and maintenance personnel of the alarm, so as to quickly solve the problem.
  • server virtualization products have many resources, which will generate a lot of irrelevant alarm information. The alarm information is complicated, and these alarm information cannot be completely ignored. In this case, it is necessary to configure the shielding and display of alarm information.
  • this application provides a method, device, device and medium for virtualized product alarm shielding, which can flexibly configure the display and shielding of all alarms, so that the alarm information is clear and clear, and users can Customize the alarm information display or shield configuration of various resources according to requirements, which improves the user experience.
  • a method for shielding an alarm of a virtualization product includes:
  • Obtain the alarm shielding configuration information of the virtualization product select the alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information; send the data of the alarm item and the alarm object to the background, so that the background can analyze the alarm according to the data Items and alarm objects are shielded.
  • the above method further includes: creating a visualization page, and the visualization page is used to display configuration information.
  • the above method also includes: the visualization page is also used to display the alarm list after the alarm item and the alarm object are shielded, so that the user can obtain the alarm situation after the alarm item and the alarm object are shielded according to the alarm list.
  • the above method further includes: creating one or more buttons on the visualization page, and the buttons are used to control the shielding and/or displaying of alarm items and alarm objects.
  • the above method further includes: obtaining user requirements, displaying the alarm shielding configuration of system resources according to user requirements and configuration information; selecting alarm items and associated alarms according to the configuration information
  • the at least one alarm object of the item also includes: selecting the alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
  • the alarm masking configuration situation may include at least one of the following: the name of the system resource, the type of the system resource, the alarm item masked by the system resource, the operation status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource .
  • the above method also includes: storing the alarm information of the alarm item and the alarm object; in response to detecting that the alarm information associated with the system failure is masked, querying the associated alarm information in the background, and processing the system failure according to the associated alarm information .
  • an alarm shielding device for virtualized products including: an acquisition module configured to obtain alarm shielding configuration information of virtualized products; a configuration module configured to select alarm items to be shielded and associated alarm items according to the configuration information at least one alarm object; the control module is configured to send the data of the alarm item and the alarm object to the background, so that the background can shield the alarm item and the alarm object according to the data.
  • an electronic device including a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the computer program, an alarm shielding method for a virtualization product is implemented.
  • a computer non-volatile readable storage medium which stores computer-executable instructions, and the computer-executable instructions are used to execute a method for shielding an alarm of a virtualization product.
  • the embodiments of the present application have the following beneficial effects:
  • the method, device, device and medium for virtualized product alarm shielding provided by the embodiments of the present application can obtain alarm shielding configuration information, select redundant alarm items and associated alarm objects to perform Shielding makes the alarm information clear; users can also customize the alarm information display or shielding configuration of various resources according to their needs, and flexibly configure the display and shielding of all alarms in the system to improve the user experience; it is also possible to edit the shielded alarm items and The alarm information of the alarm object is stored to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
  • Fig. 1 shows the overall flowchart of the virtualization product alarm shielding method provided by the embodiment of the present application
  • FIG. 2 shows a schematic structural diagram of a virtualization product alarm shielding device provided by an embodiment of the present application
  • FIG. 3 illustrates an exemplary system that may be used to implement various embodiments described in this application.
  • the present application provides a virtualization product alarm shielding method, referring to Figure 1, the method includes the following steps:
  • server virtualization products have many resources, which will generate a lot of irrelevant alarm information, which makes the alarm information more complicated.
  • alarm information applicable to various scenarios, including those that users pay attention to, those that users do not pay attention to, and important ones. , secondary, etc.
  • the configuration information includes information about the alarm item and the alarm object associated with the alarm item.
  • S2 select an alarm item to be shielded and at least one alarm object associated with the alarm item.
  • the alarm items are determined manually, and the user selects the alarm items to be shielded according to the configuration information.
  • the CPU usage of the virtual machine is used as an alarm item, and it is stipulated that if the CPU usage of the virtual machine exceeds 80%, the background pushes the alarm information to the front end, and the user receives the alarm information to process the alarm.
  • These alarm items can be classified according to the type of server resources. For example, the CPU usage of the virtual machine, the memory usage of the virtual machine, and the disk usage of the virtual machine can be divided into virtual machine resource alarms; the CPU usage of the host, the host Memory usage, host disk usage, etc. can be divided into host resource alarms.
  • the alarm item selects the CPU usage of a virtual machine.
  • This alarm item belongs to a virtual machine alarm, and the corresponding alarm object is a virtual machine in the system. At this time, obtain the system virtual machine list and select the virtual machine that you want to block the alarm. Similarly, the alarm item selects the CPU usage of the host.
  • This alarm item belongs to the host resource alarm, and the corresponding alarm object is the host. At this time, obtain the host list and select the host that you want to block the alarm.
  • the alarm object here may be a system resource object. It should be noted that there can only be one selected alarm item, and there can be one or more associated alarm objects (system resource objects).
  • the above method further includes:
  • S2 further includes: selecting an alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
  • the alarm shielding configuration of the system resource can be obtained in units of system resources, and can be displayed visually through lists or textual descriptions.
  • the system resources may include resources such as hosts, virtual machines, network cards, and storage of the virtualization system.
  • the alarm masking configuration may include the name of the virtual machine, the type of the virtual machine, the masked alarm item, and the operation status of the masked alarm item (the enabling or disabling status of the masked alarm item ), configuration time, and so on.
  • the configuration of alarm shielding may include one or more of the above, which may be displayed according to the actual needs of the user.
  • the background receives the data of these alarm items and alarm objects that need to be shielded, and intercepts the alarms of related alarm objects (system resource objects) based on these data information, and silently processes these alarms that have been set to be shielded to prevent these alarms
  • the alarm information is expressed to the front-end page, and then these alarms are shielded and processed.
  • the above method also includes:
  • the above method also includes:
  • the visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
  • the above method also includes:
  • buttons are used to control the shielding and/or display of alarm items and alarm objects.
  • users can browse the displayed alarm list and alarm shielding configuration information on the visualization page, and learn about the configuration of alarms, system resource information, etc. on the visualization page; they can select alarm items and associated Alarm objects are displayed and/or masked.
  • Different alarm masking configuration combinations can be deployed through the buttons, and alarms can be masked/displayed according to different alarm masking configuration combinations by clicking the button.
  • the flexibility of the alarm masking configuration is high, and the user experience is good.
  • the above method also includes:
  • the masked alarm items and alarm information of alarm objects are also stored on the server side. If the system fails and it is detected that the alarm information recording these failures has been blocked, the user can also query the corresponding alarm records in the background, and process the transmitted failures according to the information in the alarm records.
  • redundant alarm items and associated alarm objects are selected for masking, so that the alarm information is clear; users can also customize the alarm information display or masking configuration of various resources according to requirements , and flexibly configure the display and shielding of all alarms in the system to improve user experience; it can also store the alarm information of the shielded alarm items and alarm objects, so as to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
  • the present application also provides a virtualization product alarm shielding device, referring to FIG. 2 , including: an acquisition module, a configuration module, and a control module.
  • the acquisition module is set to obtain the alarm shielding configuration information of the virtualization product
  • the configuration module is set to select the alarm item to be shielded and at least one alarm object of the associated alarm item according to the configuration information
  • the control module is set to set the alarm item
  • the data of the alarm object is sent to the background, so that the background can shield the alarm item and the alarm object according to the data.
  • the acquisition module is also configured to create a visualization page, wherein the visualization page is used to display configuration information.
  • the visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
  • the configuration module is also configured to create one or more buttons on the visualization page, and the buttons are used to control the shielding and/or display of alarm items and alarm objects.
  • the acquisition module is also set to acquire user requirements, and display the alarm shielding configuration of system resources according to user requirements and configuration information;
  • the configuration module is also set to select an alarm item and at least one alarm of the associated alarm item according to the alarm mask configuration object.
  • the alarm shielding configuration conditions may include at least one of the following:
  • the name of the system resource The name of the system resource, the type of the system resource, the alarm item masked by the system resource, the running status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource.
  • control module is also configured to store the alarm information of the alarm item and the alarm object; if it is detected that the alarm information associated with the system failure is shielded, the control module is also configured to query the associated alarm information in the background, and according to the associated alarm information Information processing system failure.
  • an entry button is also deployed in the acquisition module, and the configuration module can be entered through the entry button.
  • the user can select the alarm item to be shielded in the configuration module, and then associate the alarm object of the alarm item according to the selected alarm item (system resource object) to perform corresponding alarm shielding.
  • the selected alarm item system resource object
  • a virtualized product alarm shielding device which can flexibly configure the display and shielding functions of all alarms in the system, so that the alarm information is clear and clear, and can also store the alarm information of the masked alarm items and alarm objects to avoid The problem of system failure not being dealt with in time due to the shielding of alarm information occurs. It has strong practicability and high flexibility. It provides a visual interface for users to customize the alarm information display or shielding configuration of various resources according to their needs, and the user experience is good.
  • the present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and operable on the processor.
  • the processor executes the program, the above-mentioned virtualization product alarm shielding method can be realized. .
  • a system can be used as the above-mentioned electronic device in any one of the above-mentioned embodiments for the method for shielding an alarm of a virtualized product.
  • a system may include one or more computer-readable media (e.g., system memory or NVM/storage devices) having instructions and coupled to the one or more computer-readable media and configured to execute the instructions to One or more processors that implement a module to perform the actions described in this application.
  • the system control module may include any suitable interface controller to provide any suitable interface.
  • the system control module may include a memory controller module to provide an interface to the system memory.
  • a memory controller module may be a hardware module, a software module and/or a firmware module.
  • System memory may be used, for example, to load and store data and/or instructions for the system.
  • system memory may include any suitable volatile memory, such as suitable DRAM.
  • the system memory may include Double Data Rate Type Quad Synchronous Dynamic Random Access Memory (DDR4 SDRAM).
  • DDR4 SDRAM Double Data Rate Type Quad Synchronous Dynamic Random Access Memory
  • system control module may include one or more input/output (I/O) controllers to provide interfaces to NVM/storage devices and communication interface(s).
  • I/O input/output
  • NVM/storage devices may be used to store data and/or instructions.
  • the NVM/storage device may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drives (HDD ), one or more compact disc (CD) drives, and/or one or more digital versatile disc (DVD) drives).
  • suitable non-volatile memory e.g., flash memory
  • suitable non-volatile storage device(s) e.g., one or more hard disk drives (HDD ), one or more compact disc (CD) drives, and/or one or more digital versatile disc (DVD) drives.
  • HDD hard disk drives
  • CD compact disc
  • DVD digital versatile disc
  • NVM/storage devices may include storage resources that are physically part of the device on which the system is installed, or may be accessed by the device without necessarily being part of the device. For example, NVM/storage devices may be accessed over a network via communication interface(s).
  • the communication interface(s) may provide the system with an interface to communicate over one or more networks and/or with any other suitable device.
  • the system may communicate wirelessly with one or more components of the wireless network according to any of one or more wireless network standards and/or protocols.
  • At least one of the processor(s) may be packaged with logic of one or more controllers of the system control module (eg, a memory controller module).
  • at least one of the processor(s) may be packaged with the logic of the one or more controllers of the system control module to form a system-in-package (SiP).
  • SiP system-in-package
  • at least one of the processor(s) may be integrated on the same die as the logic of the one or more controllers of the system control module.
  • at least one of the processor(s) may be integrated on the same die with the logic of the one or more controllers of the system control module to form a system on chip (SoC).
  • SoC system on chip
  • a system may be, but is not limited to, a server, workstation, desktop computing device, or mobile computing device (eg, laptop computing device, handheld computing device, tablet computer, netbook, etc.).
  • the system may have more or fewer components and/or a different architecture.
  • a system includes one or more cameras, a keyboard, a liquid crystal display (LCD) screen (including a touchscreen display), a non-volatile memory port, multiple antennas, a graphics chip, an application-specific integrated circuit (ASIC) ) and speakers.
  • LCD liquid crystal display
  • ASIC application-specific integrated circuit
  • the present application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by using an application specific integrated circuit (ASIC), a general purpose computer or any other similar hardware devices.
  • ASIC application specific integrated circuit
  • the software program of the present application can be executed by a processor to realize the steps or functions described above.
  • the software program (including associated data structures) of the present application can be stored in a computer-readable recording medium such as RAM memory, magnetic or optical drive or floppy disk and the like.
  • some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
  • a part of the present application can be applied as a computer program product, such as a computer program instruction.
  • a computer program product such as a computer program instruction.
  • the method and/or technical solution according to the present application can be invoked or provided through the operation of the computer.
  • computer program instructions exist in computer-readable media in forms including but not limited to source files, executable files, installation package files, etc. Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding post-installation program program.
  • a computer readable medium may be any available computer non-volatile readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes the media whereby communication signals embodying, for example, computer readable instructions, data structures, program modules or other data are transmitted from one system to another.
  • Communication media can include guided transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating waves of energy, such as acoustic, electromagnetic, RF, microwave, and infrared .
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology.
  • modulated data signal means a signal that has one or more of its characteristics changed or set in such a manner as to encode information in the signal. Modulation can be analog, digital or mixed modulation techniques.
  • an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the operation of the device is based on the foregoing methods and/or technical solutions according to multiple embodiments of the present application.
  • the present application also provides a non-volatile computer-readable storage medium storing computer-executable instructions, and the computer-executable instructions are used to execute the method for shielding an alarm of a virtualization product.
  • computer non-volatile readable storage media may include volatile and non-volatile media implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules, or other data. volatile, removable and non-removable media.
  • computer non-volatile readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memory (ROM) , PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other media now known or developed in the future capable of Store computer readable information/data for use by computer systems.
  • volatile memory such as random access memory (RAM, DRAM, SRAM
  • non-volatile memory such as flash memory, various read-only memory (ROM) , PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferro

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Human Computer Interaction (AREA)
  • Game Theory and Decision Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Debugging And Monitoring (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

An alarm shielding method and apparatus for a virtualized product, and a device and a medium. The method comprises: acquiring alarm shielding configuration information of a virtualized product (S1); according to the configuration information, selecting an alarm item that needs to be shielded and at least one alarm object associated with the alarm item (S2); and issuing data of the alarm item and the alarm object to a background, such that the background performs shielding processing on the alarm item and the alarm object according to the data (S3). The display and shielding of all alarms can be flexibly configured, such that alarm information is clear and definite, and a user can customize a display or shielding configuration of the alarm information of various resources according to demands, thereby improving the user experience.

Description

一种虚拟化产品告警屏蔽方法、装置、设备和介质A virtualization product alarm shielding method, device, equipment and medium
相关申请的交叉引用Cross References to Related Applications
本申请要求于2021年11月17日提交中国专利局,申请号为202111360030.X,申请名称为“一种虚拟化产品告警屏蔽方法、装置、设备和介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application submitted to the China Patent Office on November 17, 2021, with the application number 202111360030.X, and the title of the application is "A method, device, device and medium for alarm shielding of virtualized products". The entire contents are incorporated by reference in this application.
技术领域technical field
本申请涉及计算机技术领域,具体涉及一种虚拟化产品告警屏蔽方法、装置、设备和介质。The present application relates to the field of computer technology, and in particular to a method, device, device and medium for shielding alarms of virtualization products.
背景技术Background technique
一个成熟的服务器虚拟化平台给企业带来的好处是非常多的,而当我们的系统、网页出现问题时,影响最大的就是企业的利益,用户的体验差就可能会不再使用产品,从而导致客户流失。此时平台的告警系统就显得尤为重要,及时合理的告警提示可以使用户迅速地发现、定位问题,也可以使得告警通知到指定的运维人员,进而迅速地解决问题。但是服务器虚拟化产品资源较多,会产生很多无关紧要的告警信息,告警信息较为驳杂,这些告警信息又无法完全忽视掉,此时就需要配置告警信息的屏蔽与显示。A mature server virtualization platform brings many benefits to the enterprise, and when there is a problem with our system or webpage, the biggest impact is on the interests of the enterprise. If the user experience is poor, they may no longer use the product, thus lead to loss of customers. At this time, the alarm system of the platform is particularly important. Timely and reasonable alarm prompts can enable users to quickly discover and locate problems, and can also notify the designated operation and maintenance personnel of the alarm, so as to quickly solve the problem. However, server virtualization products have many resources, which will generate a lot of irrelevant alarm information. The alarm information is complicated, and these alarm information cannot be completely ignored. In this case, it is necessary to configure the shielding and display of alarm information.
发明内容Contents of the invention
为了解决上述背景技术中提到的至少一个问题,本申请提供了一种虚拟化产品告警屏蔽方法、装置、设备和介质,能够灵活配置所有告警的显示与屏蔽,使告警信息清晰明确,用户可以根据需求自定义各种资源的告警信息显示或者屏蔽配置,提高了用户的体验。In order to solve at least one of the problems mentioned in the above-mentioned background technology, this application provides a method, device, device and medium for virtualized product alarm shielding, which can flexibly configure the display and shielding of all alarms, so that the alarm information is clear and clear, and users can Customize the alarm information display or shield configuration of various resources according to requirements, which improves the user experience.
本申请实施例提供的具体技术方案如下:The specific technical scheme that the embodiment of the present application provides is as follows:
第一方面,提供一种虚拟化产品告警屏蔽方法,上述方法包括:In the first aspect, a method for shielding an alarm of a virtualization product is provided, and the method includes:
获取虚拟化产品的告警屏蔽配置信息;根据配置信息,选择需要屏蔽的告警项以及关联告警项的至少一个告警对象;将告警项以及告警对象的数据下发到后台,以供后台根据数据对告警项以及告警对象进行屏蔽处理。Obtain the alarm shielding configuration information of the virtualization product; select the alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information; send the data of the alarm item and the alarm object to the background, so that the background can analyze the alarm according to the data Items and alarm objects are shielded.
进一步的,上述方法还包括:创建可视化页面,可视化页面用于展示配置信息。Further, the above method further includes: creating a visualization page, and the visualization page is used to display configuration information.
进一步的,上述方法还包括:可视化页面还用于展示屏蔽了告警项以及告警对象之后的 告警列表,以供用户根据告警列表获取屏蔽了告警项以及告警对象之后的告警情况。Further, the above method also includes: the visualization page is also used to display the alarm list after the alarm item and the alarm object are shielded, so that the user can obtain the alarm situation after the alarm item and the alarm object are shielded according to the alarm list.
进一步的,上述方法还包括:在可视化页面中创建一个或多个按钮,按钮用于控制告警项以及告警对象的屏蔽和/或显示。Further, the above method further includes: creating one or more buttons on the visualization page, and the buttons are used to control the shielding and/or displaying of alarm items and alarm objects.
进一步的,在获取虚拟化产品的告警屏蔽配置信息之后,上述方法还包括:获取用户需求,根据用户需求以及配置信息,展示系统资源的告警屏蔽配置情况;根据配置信息,选择告警项以及关联告警项的至少一个告警对象,还包括:根据告警屏蔽配置情况,选择告警项以及关联告警项的至少一个告警对象。Further, after obtaining the alarm shielding configuration information of the virtualization product, the above method further includes: obtaining user requirements, displaying the alarm shielding configuration of system resources according to user requirements and configuration information; selecting alarm items and associated alarms according to the configuration information The at least one alarm object of the item also includes: selecting the alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
进一步的,告警屏蔽配置情况可以包括以下至少一种:系统资源的名称、系统资源的类型、系统资源屏蔽的告警项、系统资源屏蔽的告警项的运行情况以及系统资源屏蔽的告警项的配置时间。Further, the alarm masking configuration situation may include at least one of the following: the name of the system resource, the type of the system resource, the alarm item masked by the system resource, the operation status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource .
进一步的,上述方法还包括:将告警项以及告警对象的告警信息进行存储;响应于检测到系统故障关联的告警信息被屏蔽,在后台中查询关联的告警信息,根据关联的告警信息处理系统故障。Further, the above method also includes: storing the alarm information of the alarm item and the alarm object; in response to detecting that the alarm information associated with the system failure is masked, querying the associated alarm information in the background, and processing the system failure according to the associated alarm information .
第二方面,提供一种虚拟化产品告警屏蔽装置,包括:获取模块,设置为获取虚拟化产品的告警屏蔽配置信息;配置模块,设置为根据配置信息,选择需要屏蔽的告警项以及关联告警项的至少一个告警对象;控制模块,设置为将告警项以及告警对象的数据下发到后台,以供后台根据数据对告警项以及告警对象进行屏蔽处理。In the second aspect, an alarm shielding device for virtualized products is provided, including: an acquisition module configured to obtain alarm shielding configuration information of virtualized products; a configuration module configured to select alarm items to be shielded and associated alarm items according to the configuration information at least one alarm object; the control module is configured to send the data of the alarm item and the alarm object to the background, so that the background can shield the alarm item and the alarm object according to the data.
第三方面,提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行计算机程序时实现虚拟化产品告警屏蔽方法。In a third aspect, an electronic device is provided, including a memory, a processor, and a computer program stored on the memory and operable on the processor. When the processor executes the computer program, an alarm shielding method for a virtualization product is implemented.
第四方面,提供一种计算机非易失性可读存储介质,存储有计算机可执行指令,计算机可执行指令用于执行虚拟化产品告警屏蔽方法。In a fourth aspect, a computer non-volatile readable storage medium is provided, which stores computer-executable instructions, and the computer-executable instructions are used to execute a method for shielding an alarm of a virtualization product.
本申请实施例具有如下有益效果:本申请实施例提供的一种虚拟化产品告警屏蔽方法、装置、设备和介质,能够通过获取告警屏蔽配置信息,选取冗余的告警项以及关联的告警对象进行屏蔽,使告警信息清晰明确;用户还可以根据需求自定义各种资源的告警信息显示或者屏蔽配置,灵活配置系统所有告警的显示与屏蔽,提高用户的使用体验;还能够对屏蔽的告警项以及告警对象的告警信息进行存储,避免因告警信息的屏蔽导致的系统故障不及时处理的问题出现。The embodiments of the present application have the following beneficial effects: The method, device, device and medium for virtualized product alarm shielding provided by the embodiments of the present application can obtain alarm shielding configuration information, select redundant alarm items and associated alarm objects to perform Shielding makes the alarm information clear; users can also customize the alarm information display or shielding configuration of various resources according to their needs, and flexibly configure the display and shielding of all alarms in the system to improve the user experience; it is also possible to edit the shielded alarm items and The alarm information of the alarm object is stored to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
附图说明Description of drawings
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例描述中所需要使用的附 图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings that need to be used in the description of the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present application. For those skilled in the art, other drawings can also be obtained based on these drawings without creative effort.
图1示出本申请实施例提供的虚拟化产品告警屏蔽方法的总流程图;Fig. 1 shows the overall flowchart of the virtualization product alarm shielding method provided by the embodiment of the present application;
图2示出本申请实施例提供的虚拟化产品告警屏蔽装置的结构示意图;FIG. 2 shows a schematic structural diagram of a virtualization product alarm shielding device provided by an embodiment of the present application;
图3示出可被用于实施本申请中所述的各个实施例的示例性系统。FIG. 3 illustrates an exemplary system that may be used to implement various embodiments described in this application.
具体实施方式Detailed ways
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。In order to make the purpose, technical solutions and advantages of the application clearer, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the drawings in the embodiments of the application. Obviously, the described embodiments are only Some embodiments of this application are not all embodiments. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
应当理解,在本申请的描述中,除非上下文明确要求,否则整个说明书和权利要求书中的“包括”、“包含”等类似词语应当解释为包含的含义而不是排他或穷举的含义;也就是说,是“包括但不限于”的含义。It should be understood that in the description of the present application, unless the context clearly requires it, the words "comprising", "comprising" and other similar words in the entire specification and claims should be interpreted as an inclusive meaning rather than an exclusive or exhaustive meaning; That is to say, the meaning of "including but not limited to".
还应当理解,术语“第一”、“第二”等仅用于描述目的,而不能理解为指示或暗示相对重要性。此外,在本申请的描述中,除非另有说明,“多个”的含义是两个或两个以上。It should also be understood that the terms "first", "second", etc. are used for descriptive purposes only and should not be construed as indicating or implying relative importance. In addition, in the description of the present application, unless otherwise specified, "plurality" means two or more.
需要注意的是,术语“S1”、“S2”等仅用于步骤的描述目的,并非特别指称次序或顺位的意思,亦非用以限定本申请,其仅仅是为了方便描述本申请的方法,而不能理解为指示步骤的先后顺序。另外,各个实施例之间的技术方案可以相互结合,但是必须是以本领域普通技术人员能够实现为基础,当技术方案的结合出现相互矛盾或无法实现时应当认为这种技术方案的结合不存在,也不在本申请要求的保护范围之内。It should be noted that the terms "S1", "S2" and so on are only used for the description purpose of the steps, and do not specifically refer to the order or order, nor are they used to limit the application, but are only for the convenience of describing the method of the application , and cannot be understood as indicating the sequence of steps. In addition, the technical solutions of the various embodiments can be combined with each other, but it must be based on the realization of those skilled in the art. When the combination of technical solutions is contradictory or cannot be realized, it should be considered that the combination of technical solutions does not exist , nor within the scope of protection required by the present application.
实施例一Embodiment one
本申请提供了一种虚拟化产品告警屏蔽方法,参照图1,方法包括如下步骤:The present application provides a virtualization product alarm shielding method, referring to Figure 1, the method includes the following steps:
S1、获取虚拟化产品的告警屏蔽配置信息。S1. Obtain alarm shielding configuration information of a virtualization product.
具体的,服务器虚拟化产品的资源较多,会产生很多无关紧要的告警信息,从而使得告警信息较为驳杂,存在着适用于各种场景的告警信息,包括用户关注的、用户不关注的、重要的、次要的等等。此时,就需要屏蔽部分告警,显示用户关心的、重要的告警,以提升用户体验感,处理告警的效率。首先需要获取服务器虚拟化产品的告警屏蔽配置信息,配置信息中包含告警项以及关联该告警项的告警对象的信息。Specifically, server virtualization products have many resources, which will generate a lot of irrelevant alarm information, which makes the alarm information more complicated. There are alarm information applicable to various scenarios, including those that users pay attention to, those that users do not pay attention to, and important ones. , secondary, etc. At this time, it is necessary to block some alarms and display the important alarms that the user cares about, so as to improve the user experience and the efficiency of alarm processing. First, you need to obtain the alarm shielding configuration information of the server virtualization product. The configuration information includes information about the alarm item and the alarm object associated with the alarm item.
S2、根据配置信息,选择需要屏蔽的告警项以及关联告警项的至少一个告警对象。S2. According to the configuration information, select an alarm item to be shielded and at least one alarm object associated with the alarm item.
具体的,告警项是人为确定的,用户根据配置信息,选择需要屏蔽的告警项。示例性的,虚拟机CPU使用率作为一个告警项,规定如果虚拟机CPU使用率超过80%,则后台推送告警信息到前端,用户接收到告警信息来处理告警。这些告警项可以根据服务器资源的类型进行分类,例如虚拟机的CPU使用率、虚拟机的内存使用率、虚拟机的磁盘使用率等可以分为虚拟机资源告警;主机的CPU使用率、主机的内存使用率、主机的磁盘使用率等可以分为主机资源告警。例如告警项选择虚拟机的CPU使用率,该告警项属于虚拟机告警,对应关联的告警对象为系统中的虚拟机,此时获取系统虚拟机列表,并选择想要屏蔽告警的虚拟机。同样的,告警项选择主机的CPU使用率,该告警项属于主机资源告警,对应关联的告警对象为主机,此时获取主机列表,并选择想要屏蔽告警的主机。这里的告警对象可以是系统资源对象。需要注意的是,其中选择的告警项只能有一个,关联的告警对象(系统资源对象)可以有一个或多个。Specifically, the alarm items are determined manually, and the user selects the alarm items to be shielded according to the configuration information. Exemplarily, the CPU usage of the virtual machine is used as an alarm item, and it is stipulated that if the CPU usage of the virtual machine exceeds 80%, the background pushes the alarm information to the front end, and the user receives the alarm information to process the alarm. These alarm items can be classified according to the type of server resources. For example, the CPU usage of the virtual machine, the memory usage of the virtual machine, and the disk usage of the virtual machine can be divided into virtual machine resource alarms; the CPU usage of the host, the host Memory usage, host disk usage, etc. can be divided into host resource alarms. For example, the alarm item selects the CPU usage of a virtual machine. This alarm item belongs to a virtual machine alarm, and the corresponding alarm object is a virtual machine in the system. At this time, obtain the system virtual machine list and select the virtual machine that you want to block the alarm. Similarly, the alarm item selects the CPU usage of the host. This alarm item belongs to the host resource alarm, and the corresponding alarm object is the host. At this time, obtain the host list and select the host that you want to block the alarm. The alarm object here may be a system resource object. It should be noted that there can only be one selected alarm item, and there can be one or more associated alarm objects (system resource objects).
在一些实施例中,在执行S1之后,上述方法还包括:In some embodiments, after performing S1, the above method further includes:
获取用户需求,根据用户需求以及配置信息,展示系统资源的告警屏蔽配置情况。其中,S2还包括:根据告警屏蔽配置情况,选择告警项以及关联告警项的至少一个告警对象。Obtain user requirements, and display the alarm shielding configuration of system resources according to user requirements and configuration information. Wherein, S2 further includes: selecting an alarm item and at least one alarm object associated with the alarm item according to the configuration of the alarm mask.
具体的,可以根据用户的需求,仅展示用户关心的相关信息,并以系统资源为单位,获取该系统资源的告警屏蔽配置情况,通过列表或者文字性描述等方式进行可视化展示。其中,系统资源可以包括虚拟化系统的主机、虚拟机、网卡、存储等资源。示例性的,以虚拟机为例进行说明,告警屏蔽配置情况可以包括虚拟机的名称、虚拟机的类型、屏蔽的告警项、屏蔽的告警项的运行情况(屏蔽的告警项的启用或禁用情况)、配置的时间等等。告警屏蔽配置情况可以包括上述的一种或多种,具体可以根据用户的实际需要来进行展示。Specifically, according to the user's needs, only the relevant information that the user cares about can be displayed, and the alarm shielding configuration of the system resource can be obtained in units of system resources, and can be displayed visually through lists or textual descriptions. Wherein, the system resources may include resources such as hosts, virtual machines, network cards, and storage of the virtualization system. Exemplarily, taking a virtual machine as an example, the alarm masking configuration may include the name of the virtual machine, the type of the virtual machine, the masked alarm item, and the operation status of the masked alarm item (the enabling or disabling status of the masked alarm item ), configuration time, and so on. The configuration of alarm shielding may include one or more of the above, which may be displayed according to the actual needs of the user.
S3、将告警项以及告警对象的数据下发到后台,以供后台根据数据对告警项以及告警对象进行屏蔽处理。S3. Send the data of the alarm item and the alarm object to the background, so that the background can shield the alarm item and the alarm object according to the data.
具体的,后台接收到需要屏蔽的这些告警项以及告警对象的数据,会根据这些数据信息,拦截相关告警对象(系统资源对象)的告警,对这些已经设置屏蔽的告警进行静默处理,防止这些告警的告警信息表达到前端页面,进而实现对这些告警屏蔽处理。Specifically, the background receives the data of these alarm items and alarm objects that need to be shielded, and intercepts the alarms of related alarm objects (system resource objects) based on these data information, and silently processes these alarms that have been set to be shielded to prevent these alarms The alarm information is expressed to the front-end page, and then these alarms are shielded and processed.
在一些实施例中,上述方法还包括:In some embodiments, the above method also includes:
创建可视化页面,其中,可视化页面用于展示配置信息。Create a visualization page, where the visualization page is used to display configuration information.
在一些实施例中,上述方法还包括:In some embodiments, the above method also includes:
可视化页面还用于展示屏蔽了告警项以及告警对象之后的告警列表,以供用户根据告警 列表获取屏蔽了告警项以及告警对象之后的告警情况。The visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
在一些实施例中,上述方法还包括:In some embodiments, the above method also includes:
在可视化页面中创建一个或多个按钮,按钮用于控制告警项以及告警对象的屏蔽和/或显示。Create one or more buttons on the visualization page, and the buttons are used to control the shielding and/or display of alarm items and alarm objects.
具体的,用户可以在可视化页面中浏览展示出的告警列表、告警屏蔽配置信息,可以在可视化页面中了解告警的配置情况、系统的资源信息等等;可以在可视化页面中选择告警项以及关联的告警对象进行显示和/或屏蔽。通过按钮可以部署不同的告警屏蔽配置组合,通过点击按钮根据不同的告警屏蔽配置组合进行屏蔽/显示告警,告警屏蔽配置的灵活性高,用户的体验感好。Specifically, users can browse the displayed alarm list and alarm shielding configuration information on the visualization page, and learn about the configuration of alarms, system resource information, etc. on the visualization page; they can select alarm items and associated Alarm objects are displayed and/or masked. Different alarm masking configuration combinations can be deployed through the buttons, and alarms can be masked/displayed according to different alarm masking configuration combinations by clicking the button. The flexibility of the alarm masking configuration is high, and the user experience is good.
在一些实施例中,上述方法还包括:In some embodiments, the above method also includes:
S4、将告警项以及告警对象的告警信息进行存储。S4. Store the alarm information of the alarm item and the alarm object.
S5、响应于检测到系统故障关联的告警信息被屏蔽,在后台中查询关联的告警信息,根据关联的告警信息处理系统故障。S5. In response to detecting that the alarm information associated with the system failure is masked, query the associated alarm information in the background, and process the system failure according to the associated alarm information.
具体的,为了防止重要告警信息的遗漏,还会在服务器端对屏蔽的告警项以及告警对象的告警信息进行存储。如果系统发生故障,并且检测到记录这些故障的告警信息被设置屏蔽了,用户还可以在后台中查询到对应的告警记录,根据告警记录的信息,对发送的故障进行处理。Specifically, in order to prevent omission of important alarm information, the masked alarm items and alarm information of alarm objects are also stored on the server side. If the system fails and it is detected that the alarm information recording these failures has been blocked, the user can also query the corresponding alarm records in the background, and process the transmitted failures according to the information in the alarm records.
在本实施例中,通过获取告警屏蔽配置信息,选取冗余的告警项以及关联的告警对象进行屏蔽,使告警信息清晰明确;用户还可以根据需求自定义各种资源的告警信息显示或者屏蔽配置,灵活配置系统所有告警的显示与屏蔽,提高用户的使用体验;还能够对屏蔽的告警项以及告警对象的告警信息进行存储,避免因告警信息的屏蔽导致的系统故障不及时处理的问题出现。In this embodiment, by obtaining the alarm masking configuration information, redundant alarm items and associated alarm objects are selected for masking, so that the alarm information is clear; users can also customize the alarm information display or masking configuration of various resources according to requirements , and flexibly configure the display and shielding of all alarms in the system to improve user experience; it can also store the alarm information of the shielded alarm items and alarm objects, so as to avoid the problem of untimely processing of system failures caused by the shielding of alarm information.
实施例二Embodiment two
对应上述实施例,本申请还提供了一种虚拟化产品告警屏蔽装置,参照图2,包括:获取模块、配置模块以及控制模块。其中,获取模块,设置为获取虚拟化产品的告警屏蔽配置信息;配置模块,设置为根据配置信息,选择需要屏蔽的告警项以及关联告警项的至少一个告警对象;控制模块,设置为将告警项以及告警对象的数据下发到后台,以供后台根据数据对告警项以及告警对象进行屏蔽处理。Corresponding to the above-mentioned embodiments, the present application also provides a virtualization product alarm shielding device, referring to FIG. 2 , including: an acquisition module, a configuration module, and a control module. Among them, the acquisition module is set to obtain the alarm shielding configuration information of the virtualization product; the configuration module is set to select the alarm item to be shielded and at least one alarm object of the associated alarm item according to the configuration information; the control module is set to set the alarm item And the data of the alarm object is sent to the background, so that the background can shield the alarm item and the alarm object according to the data.
进一步的,获取模块还设置为创建可视化页面,其中,可视化页面用于展示配置信息。Further, the acquisition module is also configured to create a visualization page, wherein the visualization page is used to display configuration information.
进一步的,可视化页面还用于展示屏蔽了告警项以及告警对象之后的告警列表,以供用 户根据告警列表获取屏蔽了告警项以及告警对象之后的告警情况。Furthermore, the visualization page is also used to display the alarm list after the alarm items and alarm objects are masked, so that the user can obtain the alarm situation after the alarm items and alarm objects are masked according to the alarm list.
进一步的,配置模块还设置为在可视化页面中创建一个或多个按钮,按钮用于控制告警项以及告警对象的屏蔽和/或显示。Further, the configuration module is also configured to create one or more buttons on the visualization page, and the buttons are used to control the shielding and/or display of alarm items and alarm objects.
进一步的,获取模块还设置为获取用户需求,根据用户需求以及配置信息,展示系统资源的告警屏蔽配置情况;配置模块还设置为根据告警屏蔽配置情况,选择告警项以及关联告警项的至少一个告警对象。Further, the acquisition module is also set to acquire user requirements, and display the alarm shielding configuration of system resources according to user requirements and configuration information; the configuration module is also set to select an alarm item and at least one alarm of the associated alarm item according to the alarm mask configuration object.
其中,告警屏蔽配置情况可以包括以下至少一种:Among them, the alarm shielding configuration conditions may include at least one of the following:
系统资源的名称、系统资源的类型、系统资源屏蔽的告警项、系统资源屏蔽的告警项的运行情况以及系统资源屏蔽的告警项的配置时间。The name of the system resource, the type of the system resource, the alarm item masked by the system resource, the running status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource.
进一步的,控制模块还设置为将告警项以及告警对象的告警信息进行存储;若检测到系统故障关联的告警信息被屏蔽,控制模块还设置为在后台中查询关联的告警信息,根据关联的告警信息处理系统故障。Further, the control module is also configured to store the alarm information of the alarm item and the alarm object; if it is detected that the alarm information associated with the system failure is shielded, the control module is also configured to query the associated alarm information in the background, and according to the associated alarm information Information processing system failure.
具体的,获取模块中还部署了入口按钮,通过入口按钮可以进入配置模块,用户可以在配置模块中选择想要屏蔽的告警项,继而根据选择的告警项关联该告警项的告警对象(系统资源对象),进行对应的告警屏蔽。其中选择的告警项只能有一个,关联的系统资源对象可以有多个。Specifically, an entry button is also deployed in the acquisition module, and the configuration module can be entered through the entry button. The user can select the alarm item to be shielded in the configuration module, and then associate the alarm object of the alarm item according to the selected alarm item (system resource object) to perform corresponding alarm shielding. There can only be one alarm item selected, and there can be multiple associated system resource objects.
在本实施例中,提供了虚拟化产品告警屏蔽装置,可以提供灵活配置系统所有告警的显示与屏蔽的功能,使得告警信息清晰明确,还可以存储屏蔽的告警项以及告警对象的告警信息,避免因告警信息的屏蔽导致的系统故障不及时处理的问题出现,实用性强,灵活性高,提供可视化界面供用户根据需求自定义各种资源的告警信息显示或者屏蔽配置,用户的体验好。In this embodiment, a virtualized product alarm shielding device is provided, which can flexibly configure the display and shielding functions of all alarms in the system, so that the alarm information is clear and clear, and can also store the alarm information of the masked alarm items and alarm objects to avoid The problem of system failure not being dealt with in time due to the shielding of alarm information occurs. It has strong practicability and high flexibility. It provides a visual interface for users to customize the alarm information display or shielding configuration of various resources according to their needs, and the user experience is good.
实施例三Embodiment Three
对应上述实施例,本申请还提供了一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行程序时可以实现上述虚拟化产品告警屏蔽方法。Corresponding to the above-mentioned embodiments, the present application also provides an electronic device, including a memory, a processor, and a computer program stored on the memory and operable on the processor. When the processor executes the program, the above-mentioned virtualization product alarm shielding method can be realized. .
如图3所示,在一些实施例中,系统能够作为各所述实施例中的任意一个用于虚拟化产品告警屏蔽方法的上述电子设备。在一些实施例中,系统可包括具有指令的一个或多个计算机可读介质(例如,系统存储器或NVM/存储设备)以及与该一个或多个计算机可读介质耦合并被配置为执行指令以实现模块从而执行本申请中所述的动作的一个或多个处理器。As shown in FIG. 3 , in some embodiments, the system can be used as the above-mentioned electronic device in any one of the above-mentioned embodiments for the method for shielding an alarm of a virtualized product. In some embodiments, a system may include one or more computer-readable media (e.g., system memory or NVM/storage devices) having instructions and coupled to the one or more computer-readable media and configured to execute the instructions to One or more processors that implement a module to perform the actions described in this application.
对于一个实施例,系统控制模块可包括任意适当的接口控制器,以向(一个或多个)处理 器中的至少一个和/或与系统控制模块通信的任意适当的设备或组件提供任意适当的接口。For one embodiment, the system control module may include any suitable interface controller to provide any suitable interface.
系统控制模块可包括存储器控制器模块,以向系统存储器提供接口。存储器控制器模块可以是硬件模块、软件模块和/或固件模块。The system control module may include a memory controller module to provide an interface to the system memory. A memory controller module may be a hardware module, a software module and/or a firmware module.
系统存储器可被用于例如为系统加载和存储数据和/或指令。对于一个实施例,系统存储器可包括任意适当的易失性存储器,例如,适当的DRAM。在一些实施例中,系统存储器可包括双倍数据速率类型四同步动态随机存取存储器(DDR4SDRAM)。System memory may be used, for example, to load and store data and/or instructions for the system. For one embodiment, system memory may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory may include Double Data Rate Type Quad Synchronous Dynamic Random Access Memory (DDR4 SDRAM).
对于一个实施例,系统控制模块可包括一个或多个输入/输出(I/O)控制器,以向NVM/存储设备及(一个或多个)通信接口提供接口。For one embodiment, the system control module may include one or more input/output (I/O) controllers to provide interfaces to NVM/storage devices and communication interface(s).
例如,NVM/存储设备可被用于存储数据和/或指令。NVM/存储设备可包括任意适当的非易失性存储器(例如,闪存)和/或可包括任意适当的(一个或多个)非易失性存储设备(例如,一个或多个硬盘驱动器(HDD)、一个或多个光盘(CD)驱动器和/或一个或多个数字通用光盘(DVD)驱动器)。For example, NVM/storage devices may be used to store data and/or instructions. The NVM/storage device may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drives (HDD ), one or more compact disc (CD) drives, and/or one or more digital versatile disc (DVD) drives).
NVM/存储设备可包括在物理上作为系统被安装在其上的设备的一部分的存储资源,或者其可被该设备访问而不必作为该设备的一部分。例如,NVM/存储设备可通过网络经由(一个或多个)通信接口进行访问。NVM/storage devices may include storage resources that are physically part of the device on which the system is installed, or may be accessed by the device without necessarily being part of the device. For example, NVM/storage devices may be accessed over a network via communication interface(s).
(一个或多个)通信接口可为系统提供接口以通过一个或多个网络和/或与任意其他适当的设备通信。系统可根据一个或多个无线网络标准和/或协议中的任意标准和/或协议来与无线网络的一个或多个组件进行无线通信。The communication interface(s) may provide the system with an interface to communicate over one or more networks and/or with any other suitable device. The system may communicate wirelessly with one or more components of the wireless network according to any of one or more wireless network standards and/or protocols.
对于一个实施例,(一个或多个)处理器中的至少一个可与系统控制模块的一个或多个控制器(例如,存储器控制器模块)的逻辑封装在一起。对于一个实施例,(一个或多个)处理器中的至少一个可与系统控制模块的一个或多个控制器的逻辑封装在一起以形成系统级封装(SiP)。对于一个实施例,(一个或多个)处理器中的至少一个可与系统控制模块的一个或多个控制器的逻辑集成在同一模具上。对于一个实施例,(一个或多个)处理器中的至少一个可与系统控制模块的一个或多个控制器的逻辑集成在同一模具上以形成片上系统(SoC)。For one embodiment, at least one of the processor(s) may be packaged with logic of one or more controllers of the system control module (eg, a memory controller module). For one embodiment, at least one of the processor(s) may be packaged with the logic of the one or more controllers of the system control module to form a system-in-package (SiP). For one embodiment, at least one of the processor(s) may be integrated on the same die as the logic of the one or more controllers of the system control module. For one embodiment, at least one of the processor(s) may be integrated on the same die with the logic of the one or more controllers of the system control module to form a system on chip (SoC).
在各个实施例中,系统可以但不限于是:服务器、工作站、台式计算设备或移动计算设备(例如,膝上型计算设备、手持计算设备、平板电脑、上网本等)。在各个实施例中,系统可具有更多或更少的组件和/或不同的架构。例如,在一些实施例中,系统包括一个或多个摄像机、键盘、液晶显示器(LCD)屏幕(包括触屏显示器)、非易失性存储器端口、多个天线、图形芯片、专用集成电路(ASIC)和扬声器。In various embodiments, a system may be, but is not limited to, a server, workstation, desktop computing device, or mobile computing device (eg, laptop computing device, handheld computing device, tablet computer, netbook, etc.). In various embodiments, the system may have more or fewer components and/or a different architecture. For example, in some embodiments, a system includes one or more cameras, a keyboard, a liquid crystal display (LCD) screen (including a touchscreen display), a non-volatile memory port, multiple antennas, a graphics chip, an application-specific integrated circuit (ASIC) ) and speakers.
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专 用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。It should be noted that the present application can be implemented in software and/or a combination of software and hardware, for example, it can be implemented by using an application specific integrated circuit (ASIC), a general purpose computer or any other similar hardware devices. In one embodiment, the software program of the present application can be executed by a processor to realize the steps or functions described above. Likewise, the software program (including associated data structures) of the present application can be stored in a computer-readable recording medium such as RAM memory, magnetic or optical drive or floppy disk and the like. In addition, some steps or functions of the present application may be implemented by hardware, for example, as a circuit that cooperates with a processor to execute each step or function.
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机非易失性可读存储介质或通信介质。In addition, a part of the present application can be applied as a computer program product, such as a computer program instruction. When it is executed by a computer, the method and/or technical solution according to the present application can be invoked or provided through the operation of the computer. Those skilled in the art should understand that computer program instructions exist in computer-readable media in forms including but not limited to source files, executable files, installation package files, etc. Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding post-installation program program. Here, a computer readable medium may be any available computer non-volatile readable storage medium or communication medium that can be accessed by a computer.
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。Communication media includes the media whereby communication signals embodying, for example, computer readable instructions, data structures, program modules or other data are transmitted from one system to another. Communication media can include guided transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating waves of energy, such as acoustic, electromagnetic, RF, microwave, and infrared . Computer readable instructions, data structures, program modules or other data may be embodied, for example, as a modulated data signal in a wireless medium such as a carrier wave or similar mechanism such as embodied as part of spread spectrum technology. The term "modulated data signal" means a signal that has one or more of its characteristics changed or set in such a manner as to encode information in the signal. Modulation can be analog, digital or mixed modulation techniques.
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。Here, an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein when the computer program instructions are executed by the processor, triggering The operation of the device is based on the foregoing methods and/or technical solutions according to multiple embodiments of the present application.
实施例四Embodiment four
对应上述实施例,本申请还提供了一种计算机非易失性可读存储介质,存储有计算机可执行指令,计算机可执行指令用于执行虚拟化产品告警屏蔽方法。Corresponding to the above-mentioned embodiments, the present application also provides a non-volatile computer-readable storage medium storing computer-executable instructions, and the computer-executable instructions are used to execute the method for shielding an alarm of a virtualization product.
在本实施例中,计算机非易失性可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机非易失性可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器 (ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。In this embodiment, computer non-volatile readable storage media may include volatile and non-volatile media implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules, or other data. volatile, removable and non-removable media. For example, computer non-volatile readable storage media include, but are not limited to, volatile memory, such as random access memory (RAM, DRAM, SRAM); and non-volatile memory, such as flash memory, various read-only memory (ROM) , PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other media now known or developed in the future capable of Store computer readable information/data for use by computer systems.
尽管已描述了本申请实施例中的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本申请实施例中范围的所有变更和修改。Although the preferred embodiments of the embodiments of the present application have been described, those skilled in the art can make additional changes and modifications to these embodiments once the basic inventive concept is understood. Therefore, the appended claims are intended to be construed to include the preferred embodiments and all changes and modifications that fall within the scope of the embodiments of the application.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the application without departing from the spirit and scope of the application. In this way, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalent technologies, the present application is also intended to include these modifications and variations.

Claims (20)

  1. 一种虚拟化产品告警屏蔽方法,所述方法包括:A virtualization product alarm shielding method, the method comprising:
    获取虚拟化产品的告警屏蔽配置信息;Obtain the alarm shielding configuration information of the virtualization product;
    根据所述配置信息,选择需要屏蔽的告警项以及关联所述告警项的至少一个告警对象;Selecting an alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information;
    将所述告警项以及所述告警对象的数据下发到后台,以供所述后台根据所述数据对所述告警项以及所述告警对象进行屏蔽处理。Sending the data of the alarm item and the alarm object to the background, so that the background can mask the alarm item and the alarm object according to the data.
  2. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,所述方法还包括:The alarm shielding method for virtualization products according to claim 1, wherein the method further comprises:
    创建可视化页面,所述可视化页面用于展示所述配置信息。A visual page is created, and the visual page is used to display the configuration information.
  3. 根据权利要求2所述的虚拟化产品告警屏蔽方法,其中,所述方法还包括:The virtualization product alarm shielding method according to claim 2, wherein the method further comprises:
    所述可视化页面还用于展示屏蔽了所述告警项以及所述告警对象之后的告警列表,以供用户根据所述告警列表获取屏蔽了所述告警项以及所述告警对象之后的告警情况。The visualization page is also used to display the alarm list after the alarm item and the alarm object are masked, so that the user can obtain the alarm situation after the alarm item and the alarm object are masked according to the alarm list.
  4. 根据权利要求2所述的虚拟化产品告警屏蔽方法,其中,所述方法还包括:The virtualization product alarm shielding method according to claim 2, wherein the method further comprises:
    在所述可视化页面中创建一个或多个按钮,所述按钮用于控制所述告警项以及所述告警对象的屏蔽和/或显示。One or more buttons are created on the visualization page, and the buttons are used to control shielding and/or displaying of the alarm item and the alarm object.
  5. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,在所述获取虚拟化产品的告警屏蔽配置信息之后,所述方法还包括:The method for shielding an alarm of a virtualization product according to claim 1, wherein, after said obtaining the configuration information of warning shielding of the virtualization product, said method further comprises:
    获取用户需求,根据所述用户需求以及所述配置信息,展示系统资源的告警屏蔽配置情况。Obtain user requirements, and display the alarm shielding configuration of system resources according to the user requirements and the configuration information.
  6. 根据权利要求5所述的虚拟化产品告警屏蔽方法,其中,所述根据所述配置信息,选择需要屏蔽的告警项以及关联所述告警项的至少一个告警对象,还包括:The method for shielding alarms of virtualized products according to claim 5, wherein, according to the configuration information, selecting an alarm item to be masked and at least one alarm object associated with the alarm item further includes:
    根据所述告警屏蔽配置情况,选择需要屏蔽的告警项以及关联所述告警项的至少一个告警对象。According to the configuration of the alarm masking, an alarm item to be masked and at least one alarm object associated with the alarm item are selected.
  7. 根据权利要求5所述的虚拟化产品告警屏蔽方法,其中,所述系统资源包括以下至少之一:虚拟化系统的主机资源,虚拟化系统的虚拟机资源,虚拟化系统的网卡资源,虚拟化系统的存储资源。The alarm shielding method for virtualization products according to claim 5, wherein the system resources include at least one of the following: host resources of the virtualization system, virtual machine resources of the virtualization system, network card resources of the virtualization system, virtualization system storage resources.
  8. 根据权利要求5所述的虚拟化产品告警屏蔽方法,其中,所述告警屏蔽配置情况可以包括以下至少一种:The alarm shielding method for virtualization products according to claim 5, wherein the alarm shielding configuration conditions may include at least one of the following:
    所述系统资源的名称、所述系统资源的类型、所述系统资源屏蔽的告警项、所述系统资源屏蔽的告警项的运行情况以及所述系统资源屏蔽的告警项的配置时间。The name of the system resource, the type of the system resource, the alarm item masked by the system resource, the running status of the alarm item masked by the system resource, and the configuration time of the alarm item masked by the system resource.
  9. 根据权利要求8所述的虚拟化产品告警屏蔽方法,其中,所述告警项的运行情况包括:屏蔽的告警项的启用或禁用情况。The alarm shielding method for a virtualization product according to claim 8, wherein the operation status of the alarm item includes: enabling or disabling of the masked alarm item.
  10. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,所述方法还包括:The alarm shielding method for virtualization products according to claim 1, wherein the method further comprises:
    将所述告警项以及所述告警对象的告警信息进行存储;storing the alarm item and the alarm information of the alarm object;
    响应于检测到系统故障关联的告警信息被屏蔽,在所述后台中查询所述关联的告警信息,根据所述关联的告警信息处理所述系统故障。In response to detecting that the alarm information associated with the system failure is masked, the associated alarm information is queried in the background, and the system failure is processed according to the associated alarm information.
  11. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,根据配置信息,选择需要屏蔽的告警项,包括:The method for shielding an alarm of a virtualization product according to claim 1, wherein, according to configuration information, selecting an alarm item to be shielded includes:
    根据用户的选择操作从所述配置信息中确定需要屏蔽的所述告警项。The alarm item that needs to be blocked is determined from the configuration information according to the user's selection operation.
  12. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,根据所述配置信息,选择关联所述告警项的至少一个告警对象,包括:The alarm shielding method for virtualization products according to claim 1, wherein, according to the configuration information, selecting at least one alarm object associated with the alarm item includes:
    确定所述告警项对应的资源的类型;Determine the resource type corresponding to the alarm item;
    根据所述资源的类型确定关联所述告警项的至少一个告警对象。Determine at least one alarm object associated with the alarm item according to the type of the resource.
  13. 根据权利要求12所述的虚拟化产品告警屏蔽方法,其中,所述告警项对应的资源的类型包括以下至少之一:虚拟机的CPU使用率、虚拟机的内存使用率、虚拟机的磁盘使用率、主机的CPU使用率、主机的内存使用率、主机的磁盘使用率。The alarm shielding method for virtualization products according to claim 12, wherein the resource type corresponding to the alarm item includes at least one of the following: the CPU usage rate of the virtual machine, the memory usage rate of the virtual machine, and the disk usage rate of the virtual machine rate, CPU usage of the host, memory usage of the host, and disk usage of the host.
  14. 根据权利要求12所述的虚拟化产品告警屏蔽方法,其中,根据所述资源的类型确定关联所述告警项的至少一个告警对象,包括:The alarm shielding method for virtualization products according to claim 12, wherein determining at least one alarm object associated with the alarm item according to the type of the resource comprises:
    在确定所述告警项对应的资源的类型为虚拟机告警的情况下,获取虚拟机列表,并从所述虚拟机列表中确定与所述虚拟机告警关联的虚拟机。If it is determined that the resource type corresponding to the alarm item is a virtual machine alarm, a virtual machine list is obtained, and a virtual machine associated with the virtual machine alarm is determined from the virtual machine list.
  15. 根据权利要求12所述的虚拟化产品告警屏蔽方法,其中,根据所述资源的类型确定关联所述告警项的至少一个告警对象,包括:The alarm shielding method for virtualization products according to claim 12, wherein determining at least one alarm object associated with the alarm item according to the type of the resource comprises:
    在确定所述告警项对应的资源的类型为主机告警的情况下,获取主机列表,并从所述主机列表中确定与所述主机告警关联的主机。If it is determined that the resource type corresponding to the alarm item is a host alarm, a host list is obtained, and a host associated with the host alarm is determined from the host list.
  16. 根据权利要求1所述的虚拟化产品告警屏蔽方法,其中,所述方法还包括:The alarm shielding method for virtualization products according to claim 1, wherein the method further comprises:
    对已经设置屏蔽的告警进行静默处理。Silently process alarms that have been set to be masked.
  17. 一种虚拟化产品告警屏蔽装置,包括:A virtualization product alarm shielding device, comprising:
    获取模块,用于获取虚拟化产品的告警屏蔽配置信息;An acquisition module, configured to acquire alarm shielding configuration information of a virtualization product;
    配置模块,用于根据所述配置信息,选择需要屏蔽的告警项以及关联所述告警项的至少一个告警对象;A configuration module, configured to select an alarm item to be shielded and at least one alarm object associated with the alarm item according to the configuration information;
    控制模块,用于将所述告警项以及所述告警对象的数据下发到后台,以供所述后台 根据所述数据对所述告警项以及所述告警对象进行屏蔽处理。The control module is configured to send the data of the alarm item and the alarm object to the background, so that the background can shield the alarm item and the alarm object according to the data.
  18. 根据权利要求17所述的虚拟化产品告警屏蔽装置,其中,所述获取模块还设置为创建可视化页面,其中,所述可视化页面用于展示所述配置信息。The alarm shielding device for virtualized products according to claim 17, wherein the obtaining module is further configured to create a visualization page, wherein the visualization page is used to display the configuration information.
  19. 一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述计算机程序时实现如权利要求1至16中任意一项所述虚拟化产品告警屏蔽方法。An electronic device, comprising a memory, a processor, and a computer program stored on the memory and operable on the processor, when the processor executes the computer program, the virtual computer program described in any one of claims 1 to 16 is realized Chemical product alarm shielding method.
  20. 一种计算机非易失性可读存储介质,存储有计算机可执行指令,所述计算机可执行指令用于执行权利要求1至16中任意一项所述虚拟化产品告警屏蔽方法。A non-volatile computer-readable storage medium storing computer-executable instructions, the computer-executable instructions being used to execute the alarm shielding method for a virtualized product according to any one of claims 1-16.
PCT/CN2022/123190 2021-11-17 2022-09-30 Alarm shielding method and apparatus for virtualized product, and device and medium WO2023087956A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111360030.X 2021-11-17
CN202111360030.XA CN114202354A (en) 2021-11-17 2021-11-17 Virtualized product alarm shielding method, device, equipment and medium

Publications (1)

Publication Number Publication Date
WO2023087956A1 true WO2023087956A1 (en) 2023-05-25

Family

ID=80647757

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/123190 WO2023087956A1 (en) 2021-11-17 2022-09-30 Alarm shielding method and apparatus for virtualized product, and device and medium

Country Status (2)

Country Link
CN (1) CN114202354A (en)
WO (1) WO2023087956A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114202354A (en) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 Virtualized product alarm shielding method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (en) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 Method for shielding alarm generated by base station
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104683155A (en) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 Alarm shielding mechanism in network management system
CN107358300A (en) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 A kind of intelligent O&M alarm filtering method and system based on multi-platform Autonomic prediction
CN114202354A (en) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 Virtualized product alarm shielding method, device, equipment and medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109039740B (en) * 2018-08-01 2022-07-19 平安科技(深圳)有限公司 Method and equipment for processing operation and maintenance monitoring alarm
CN111585785B (en) * 2020-03-27 2023-07-21 中国平安人寿保险股份有限公司 Method and device for shielding alarm information, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5636206A (en) * 1994-05-19 1997-06-03 Fujitsu Limited System for achieving alarm masking processing
CN101296466A (en) * 2008-06-12 2008-10-29 广东高新兴通信股份有限公司 Method for shielding alarm generated by base station
CN101741615A (en) * 2009-12-14 2010-06-16 北京神州泰岳软件股份有限公司 Server-based alarm filtering system and method
CN104683155A (en) * 2015-03-09 2015-06-03 江苏物联网研究发展中心 Alarm shielding mechanism in network management system
CN107358300A (en) * 2017-06-19 2017-11-17 北京至信普林科技有限公司 A kind of intelligent O&M alarm filtering method and system based on multi-platform Autonomic prediction
CN114202354A (en) * 2021-11-17 2022-03-18 苏州浪潮智能科技有限公司 Virtualized product alarm shielding method, device, equipment and medium

Also Published As

Publication number Publication date
CN114202354A (en) 2022-03-18

Similar Documents

Publication Publication Date Title
US8683589B2 (en) Providing protection against unauthorized network access
US9124488B2 (en) Method and apparatus for visualizing the health of datacenter objects
WO2020063846A1 (en) Method and device for presenting update information of guest program
US11429270B2 (en) User interface tools for visual exploration of multi-dimensional data
US20110219331A1 (en) Window resize on remote desktops
US9547466B2 (en) Systems and methods for using screen sampling to detect display changes
US20240029327A1 (en) Multi-dimensional data insight interaction
US20190012005A1 (en) Method and device for asynchronous touch and asynchronous display on dual-screen and computer readable storage medium
CN110321189B (en) Method and equipment for presenting hosted program in hosted program
WO2023087956A1 (en) Alarm shielding method and apparatus for virtualized product, and device and medium
CN113127050B (en) Application resource packaging process monitoring method, device, equipment and medium
CN111049904A (en) Method and equipment for monitoring multiple public cloud resources
US20200089512A1 (en) Method and Apparatus for Invoking Input Method, Server, and Terminal
US20150067139A1 (en) Agentless monitoring of computer systems
CN109284101B (en) Method and device for changing association of object attributes
WO2019125546A1 (en) Application analysis with flexible post-processing
US20150007191A1 (en) Methods, systems, and computer program products for selecting a resource based on a measure of a processing cost
US20130145054A1 (en) Supervising a data storage system
US20160266951A1 (en) Diagnostic collector for hadoop
CN111796731B (en) Method and equipment for automatically arranging icons
US20180189118A1 (en) Systems and methods for transforming applications
WO2018000395A1 (en) Method and apparatus for managing data
US20180088991A1 (en) Methods, systems, and computer program products for selecting a resource based on a measure of a processing cost
US20150100615A1 (en) Drag and drop of a uri to link resources
US20240111369A1 (en) Information handling system and kvm display automated configuration

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22894494

Country of ref document: EP

Kind code of ref document: A1