CN104702443B - For handling the processor and method of the data for needing to alarm - Google Patents

For handling the processor and method of the data for needing to alarm Download PDF

Info

Publication number
CN104702443B
CN104702443B CN201510137977.2A CN201510137977A CN104702443B CN 104702443 B CN104702443 B CN 104702443B CN 201510137977 A CN201510137977 A CN 201510137977A CN 104702443 B CN104702443 B CN 104702443B
Authority
CN
China
Prior art keywords
alarm
data
back end
alarmed
alert
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510137977.2A
Other languages
Chinese (zh)
Other versions
CN104702443A (en
Inventor
曾文杰
刘浩
冯顾
胡宇
华起
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510137977.2A priority Critical patent/CN104702443B/en
Priority claimed from CN201210459207.6A external-priority patent/CN102970162B/en
Publication of CN104702443A publication Critical patent/CN104702443A/en
Application granted granted Critical
Publication of CN104702443B publication Critical patent/CN104702443B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of method for being used to handle the data for needing to alarm, its data for including alarming as needed constructs alert data table, the data for needing to alarm include at least two data item, alert data table includes multiple back end, annular doubly linked list is linked on each back end, annular doubly linked list includes multiple chained list nodes, each back end is identified by selected at least one data item, the data that at least one data item identical needs to alarm are stored under same back end and are stored in sequence in corresponding chained list node in the annular doubly linked list of the back end, whether meet alarm strategy according to the tactful data alarmed come the needs determined in the annular doubly linked list associated with back end of predetermined alarm, alarmed when it is determined that meeting that alarm is tactful;The historical record of alarming result is stored in alarm history memory.In addition, the present invention also provides a kind of processor for being used to handle the data for needing to alarm.

Description

For handling the processor and method of the data for needing to alarm
The application is on November 14th, 2012 for the applying date, and application number is 201210459207.6, and title is " to be used to handle Need the processor and method of data alarmed " application for a patent for invention divisional application.
Technical field
The present invention relates to field of computer technology, and in particular to it is a kind of be used to handling the processor of data that needs to alarm and Method.
Background technology
With the fast development of network, occur needing the network system for a large number of users service.These network systems have A large amount of servers in each address are distributed, and the mode that these servers are generally constructed with cluster is come for user service.With It is more and more the server of the service of offer, the performance of these servers is monitored and timely, accurate when breaking down Ground, which carries out alarm, turns into the problem of paying special attention at present.
When monitoring system is used to monitor large-scale server, substantial amounts of monitoring data can be produced.As monitoring data is got over Come more, how monitoring data extracted, analyzed, effectively managed quickly to be alarmed accurately and in time to operating personnel As fast reaction, the repair ability of the network system comprising large-scale server is considered, the clothes of network system are directly affected Business quality.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the processor and method that are used to handle the data for needing to alarm of problem.
According to one aspect of the present invention, there is provided for handling the processor for the data for needing to alarm, it includes:Data Table constructing module, alert data table is constructed suitable for the data alarmed as needed, the data for needing to alarm are included at least Two data item, the alert data table include multiple back end, and each back end cochain is connected to annular doubly linked list, institute Stating annular doubly linked list includes multiple chained list nodes, and wherein back end is by least one number for being selected in the data that need to alarm Be identified according to item, the data that at least one data item identical needs to alarm be stored under same back end and by It is stored sequentially in corresponding chained list node in the annular doubly linked list of the back end;Alarm module, according to predetermined alarm plan Whether the data slightly alarmed come the needs determined in the annular doubly linked list associated with back end meet the alarm strategy, When be determined for compliance with alarming strategy when alarmed;And alarm history memory, it stores the historical record of alarming result.
According to another aspect of the present invention, there is provided a kind of method for being used to handle the data for needing to alarm, it includes:Root Alert data table is constructed according to the data for needing to alarm, the data for needing to alarm include at least two data item, the report Alert tables of data includes multiple back end, and each back end cochain is connected to annular doubly linked list, the annular doubly linked list bag Multiple chained list nodes are included, wherein each back end enters rower by least one data item selected in the data that need to alarm Know, the data that at least one data item identical needs to alarm are stored under same back end and are stored in sequence in Corresponding chained list node in the annular doubly linked list of the back end;Determined and back end phase according to predetermined alarm strategy Whether the data that the needs in the annular doubly linked list of association are alarmed meet the alarm strategy, when it is determined that meeting that alarm is tactful Alarmed;The historical record of alarming result is stored in alarm history memory.
The processor for being used to handle the data for needing to alarm and method of the present invention can apply in monitoring system, especially More are monitored even in the monitoring system of thousands of, up to ten thousand machines, is easy to classify to the data alarmed of needs, counts, and Alarmed.Allow the operator to quickly and accurately position and abnormal machine occur.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 shows the block diagram for being used to handle the processor for the data for needing to alarm according to one embodiment of the invention;
Fig. 2 shows the schematic diagram of alert data table according to an embodiment of the invention;And
Fig. 3 shows the flow chart according to an embodiment of the invention for being used to handle the method for the data for needing to alarm.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
The present invention provides a kind of alarm processor, and it can be used for the monitoring system for monitoring multiple servers, is in monitoring After system monitors the substantial amounts of misoperation data of multiple servers, alarm processor has to these substantial amounts of misoperation data Handled to effect, so as to be alarmed accurately and in time.
Fig. 1 shows the frame for being used to handle the processor 100 for the data for needing to alarm according to one embodiment of the invention Figure.As shown in figure 1, alarm processor 100 includes tables of data constructing module 110 and alarm module 120.
Tables of data constructing module 110 constructs alert data table suitable for the data alarmed as needed.Here, it is necessary to alarm Data for example can be monitored machine misoperation data.The misoperation data include at least two data item, Such as it can include:Machine domain name, alarm tactful ID, monitoring data item ID, fault value and timestamp.Wherein machine domain name is The monitored domain name with the presence or absence of abnormal machine;The tactful ID that alarms is the corresponding predetermined alarm strategy taken;Monitor number An operating index of monitored machine is corresponded to according to item ID;Fault value is the exception of the monitoring data item of the machine monitored Data;Timestamp is the time of the abnormal data for the monitoring data item for monitoring machine.Think special instruction, the misoperation Data are not limited to given example above, and it can be the two or more or whole of listed data item in above-mentioned example, can also It is other data item.
The alert data table that tables of data constructing module 110 is constructed is as shown in Figure 2.Alert data table 200 in Fig. 2 be with The data for needing to alarm include machine domain name, tactful this five data of ID, monitoring data item ID, fault value and timestamp of alarm What is carried out exemplified by illustrates.From figure 2 it can be seen that alert data table 200 includes multiple back end 210, here only Schematically show 3 back end 210.Each chain of back end 210 is connected to an annular doubly linked list 220, and annular is two-way Chained list 220 includes multiple chained list nodes 2220-2205.In Fig. 2 for clarity of illustration, annular doubly linked list 220 is drawn in Outside alert data table 200, in fact, annular doubly linked list 220 and the tight association of alert data table 200.In alert data table In 200, machine domain name in the service data that each back end 210 is alarmed by needs and the tactful ID of alarming are identified, and every Be stored with each chained list node of the associated annular doubly linked list 220 of individual back end 210 with same machines domain name and The service data that the identical tactful ID of alarm needs are alarmed, the service data that multiple chained list nodes are alarmed according to needs thereon The link arrangement successively in annular doubly linked list 220 of the size of the value of timestamp.
Want to illustrate, the alert data table 200 according to Fig. 2, in the data for largely needing to alarm, i.e., Make machine domain name identical, but the tactful ID of alarming is different, can also form different back end 210, i.e. same server because The tactful ID that alarms is different and has different back end 210.On the other hand, even if the tactful ID that alarms is identical, but machine domain Name is different, can also form different back end 210.Only machine domain name and the tactful ID of alarm all identical data is just located at one Individual back end 210, and be distributed in it is each right in the annular doubly linked list 220 orderly with the back end 210 corresponding one On the chained list node answered.Whenever a data enter in alert data table 200, the data are assigned corresponding back end 210, and the data are mounted at chained list node corresponding with the timestamp in the data in annular doubly linked list 220.Profit , can be in the case of in the presence of largely the data alarmed be needed, with the alert data table 200 shown in Fig. 2 by each machine not The alarm content of same type differentiates, and there is a problem so as to be accurately positioned which machine in largely monitored machine, And there is any problem.
In Fig. 2 annular doubly linked list 220, the chained list node that certain point is stabbed as the standard time can be set, then will The value that each data are temporally stabbed is from small to large or from big to small from the chained list node that the standard time stabs by side clockwise or counterclockwise To being arranged.For example, as shown in Fig. 2 in annular doubly linked list 220,2200 be the chained list node of standard time stamp, by suitable The value of clockwise timestamp gradually increases, the chained list node counterclockwise closest with it since chained list node 2200 2205 be the maximum chained list node of the value of timestamp;And chained list closest with it clockwise since chained list node 2200 Node 2201 is the minimum chained list node of the value of timestamp.2202nd, 2203,2204 be timestamp of the value of timestamp more than 2201 Value and timestamp less than 2205 three data increasing successively of value and timestamp value.It is only two-way with annular in Fig. 2 5 data instances are included in chained list 220, less or more data can be included in annular doubly linked list 220 in practice.Separately Outside, the number of the chained list node included in annular doubly linked list 220 may also change with the time.Enter whenever there are new data When, the correspondence position that is just inserted it into according to the value of its timestamp in annular doubly linked list 220.
In the embodiment shown in Figure 2, back end is with machine domain name and tactful the two data item identifiers of ID of alarming 's.The present invention is not limited to this.In fact, in the focus difference of operating personnel, back end can be by selected from needs Different data item identifiers in the data of alarm, in addition, the data item for mark data node can also be one, two Individual, or more.So, it is stored in same back end for all data of data item identical of mark data node Down and corresponding chained list node in the annular doubly linked list of the back end is stored in sequence in another data item size.Example Such as, when in the same software of trial operation on each machine, operating personnel want to monitor the effect that the software is run on each machine, this When parameter, machine domain name and the timestamp that the software can be had an impact to machine performance as monitoring data item, use it In the parameter being had an impact to machine performance this monitoring data item carry out mark data node, machine performance will be had an impact Data of the parameter in different range be placed under different back end, the data under each back end are pressed it The size of the value of timestamp is in turn arranged in annular doubly linked list, is run it is possible thereby to count the software on each machine When on caused by the performance of machine influence.
In addition, in the embodiment described in Fig. 2, alarm strategy ID of the alarm module 120 in each back end 210 The corresponding alarm strategy of selection, and determined according to selected alarm strategy associated with back end 210 annular two-way Whether the data that the needs in chained list 220 are alarmed reach the alert if in selected alarm strategy, when it is determined that meeting alarm Alarmed during condition.For example, when alert if is to occur M time (wherein N and M are greater than being equal to 1 integer) N minutes then to carry out During alarm, the maximum place of the value of timestamp starts to take the data in minute time N successively since annular doubly linked list 220, general The data amount check taken out is compared with M, if the data amount check taken out is more than or equal to M, then it represents that reach alarm bar Part, alarm module 120 can by alarmed (example of alarm includes hair Email and/or short message, but not invention not by It is limited to this);If the data amount check taken out is less than M, then it represents that has not been met alert if, it is not necessary to alarmed.Thus Understand, can soon be calculated by using annular doubly linked list 220 and know whether to reach alert if.In addition, alert if Other contents can also be increased, for example, S (S is greater than being equal to 1 integer) is secondary, then alarm module 120 is no longer when alarm exceedes Alarmed.
Alarm module 120 is described in detail below by a specific example.
When strategy of alarming is " #118#add_ops#2#4#5# machine loadings are too high ", it represents the ID of the alarm strategy Number be 118, belong to alarm group add_ops.Alert if is:If there is situation as 4 times to occur in 2 minutes, hair is carried out Alarm (example of alarm includes Email or short message, but the present invention is not only restricted to this), at most carry out 5 alarms, alarm content For " machine loading is too high ".
Alternatively, alarm history memory 130 can also be included according to the alarm processor 100 of the present invention, the alarm is gone through History memory 130 is couple to alarm module 120, stores the historical record of the alarming result of alarm module 120.Here, alarm is gone through History memory 130 can be stored data in hbase databases, because hbase databases are a distributed databases, Being capable of extension storage well.Alternatively, alarm history memory 130 be independently of the present invention alarm processor 100 and Set.
The present invention also provides a kind of alarm processing method, and its data alarmed needs is handled.
Fig. 3 shows the flow according to an embodiment of the invention for being used to handle the method for the data for needing to alarm Figure.As shown in figure 3, the alarm processing method starts from step S310, in step S310, the data alarmed as needed are reported to construct Alert tables of data.The data for needing to alarm include at least two data item.Here, it is necessary to alarm data for example can be by The misoperation data of the machine of monitoring.The misoperation data include at least two data item, such as can include:Machine domain Name, alarm tactful ID, monitoring data item ID, fault value and timestamp.Wherein machine domain name is monitored with the presence or absence of exception The domain name of machine;The tactful ID that alarms is the corresponding predetermined alarm strategy taken;Monitoring data item ID corresponds to be monitored One operating index of machine;Fault value is the abnormal data of the monitoring data item of the machine monitored;It is monitoring with timestamp To the time of the abnormal data of the monitoring data item of machine.Think special instruction, the misoperation data are not limited to institute above Citing, it can be two or more or whole or other data item of listed data item in above-mentioned example.
Alert data table includes multiple back end, and each back end cochain is connected to annular doubly linked list, the annular Doubly linked list includes multiple chained list nodes, wherein each back end is by least one data for being selected in the data that need to alarm Item is identified, and the data that at least one data item identical needs to alarm are stored under same back end and by suitable Sequence is stored in corresponding chained list node in the annular doubly linked list of the back end.Referring in particular to the explanation for being previously with regard to Fig. 2.
Then, the data for needing to alarm are obtained in step S320, and by data according to the content of data item therein and At the chained list node for storing the corresponding data node in alert data table.Because the monitoring generally to machine is long-term prison Control, so the alarm processing method of the present invention is that the data alarmed the needs constantly obtained are handled.
Then, in step S330, determined according to the alert data table of construction and the predetermined alarm strategy prestored Whether the data that acquired needs are alarmed meet the alert if in alarm strategy, when it is determined that meeting alert if, then enter Enter step S340, alarmed;When being unsatisfactory for alert if, then step S320 is returned to, continue to obtain the data for needing to alarm And store.Here, each alarm strategy includes uniquely alarm tactful ID and alert if.On alarm strategy specifically The bright part referring to the description for being previously with regard to alarm module 120, no longer describe in detail here.
Specifically, the alert if in alarm strategy can go out within a predetermined period of time including a certain monitored data item The information that now number more than the first predetermined threshold reaches or just alarmed more than the first pre-determined number, as previously described, Such as when strategy of alarming is " 2#4# machine loadings are too high ", represent, if there is situation as 4 times to occur in 2 minutes, just to send out Email or short message are alarmed.At this moment, the maximum position of the value of the timestamps of data alarmed is needed from annular doubly linked list Start to obtain the data in 2 minutes, if the bar number of the data obtained is more than or equal to 4, alarmed.
Alternatively, the alert if in alarm strategy can also reach the second pre-determined number including alarm times and then no longer report Alert information, so, after step S340, step S350 can also be included, in step S350, determine whether alarm times reach To the second pre-determined number, when alarm times reach the second pre-determined number, then step S360 is carried out, is no longer alarmed;When alarm time When number is not up to the second pre-determined number, then step S330 is performed.For example, when alarm strategy is " 2#4#5# machine loadings are too high " When, as described in step S330, there is situation as 4 times to occur in 2 minutes, then into step S340, alarmed.Connect down Come, in step S350, when alarm times reach 5 times, then into step S360, no longer alarm;When alarm times are not up to 5 When secondary, then step S330 is performed.
Alternatively, alarm processing method 300 of the invention can also include step S370:Alarming result is stored in alarm In historical memory, so that operating personnel check and monitor the operation conditions of multiple servers.So, in operating personnel not existing In the case that field is without hearing alarm or seeing alarming result in time, it can be stored by checking in alarm history memory Alarming result information and known whether abnormal conditions appearance quickly.
It should be noted that the method shown in Fig. 3 does not limit the order progress by shown each step, can be according to need The sequencing of each step is adjusted, in addition, the step is also not limited to above-mentioned steps division, above-mentioned steps can be further Less step can also be merged into by splitting into more multi-step.
The processor for being used to handle the data for needing to alarm and method of the present invention can apply in monitoring system, especially More are monitored even in the monitoring system of thousands of, up to ten thousand machines, is easy to classify to the data alarmed of needs, counts, and Alarmed.Allow the operator to quickly and accurately position and abnormal machine occur.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to be carried out adaptively to the module in the equipment in embodiment Change and they are arranged in one or more equipment different from the embodiment.Can be the module or list in embodiment Member or component be combined into a module or unit or component, and can be divided into addition multiple submodule or subelement or Sub-component.In addition at least some in such feature and/or process or unit exclude each other, it can use any Combination is disclosed to all features disclosed in this specification (including adjoint claim, summary and accompanying drawing) and so to appoint Where all processes or unit of method or equipment are combined.Unless expressly stated otherwise, this specification (including adjoint power Profit requires, summary and accompanying drawing) disclosed in each feature can be by providing the alternative features of identical, equivalent or similar purpose come generation Replace.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor (DSP) are come one of some or all parts in realizing according to embodiments of the present invention A little or repertoire.The present invention is also implemented as setting for performing some or all of method as described herein Standby or program of device (for example, computer program and computer program product).Such program for realizing the present invention can deposit Storage on a computer-readable medium, or can have the form of one or more signal.Such signal can be from because of spy Download and obtain on net website, either provide on carrier signal or provided in the form of any other.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (10)

1. a kind of processor for being used to handle the data for needing to alarm, including:
Tables of data constructing module, alert data table, the data for needing to alarm are constructed suitable for the data alarmed as needed Including at least two data item, the alert data table includes multiple back end, and each back end cochain is connected to annular double To chained list, the annular doubly linked list includes multiple chained list nodes, and wherein back end is by selecting in the data that need to alarm At least one data item is identified, and the data that at least one data item identical needs to alarm are stored in same data Under node and it is stored in sequence in corresponding chained list node in the annular doubly linked list of the back end;And
Alarm module, the corresponding alarm strategy of alarm strategy ID selections in each back end, and according to selected Whether the tactful data alarmed come the needs determined in the annular doubly linked list associated with back end of alarm meet the report Alert if in whipping a horse on slightly, is alarmed when being determined for compliance with alert if;
Alarm history memory, it stores the historical record of alarming result.
2. processor according to claim 1, wherein, the alarm strategy includes alarm tactful ID and alert if, institute State at least two data item include it is following in two or more:Machine domain name, the tactful ID of alarm, monitoring data item ID, event Barrier value and timestamp, wherein,
Machine domain name, it is the monitored domain name with the presence or absence of abnormal machine;
Alarm tactful ID, corresponding to predetermined alarm strategy;
Monitoring data item ID, corresponding to an operating index of monitored machine;
Fault value, the abnormal data of the monitoring data item of the machine monitored;With
Timestamp, monitor the time of the abnormal data of the monitoring data item of machine.
3. processor according to claim 2, wherein,
The back end is identified by the machine domain name in the data that need to alarm and the tactful ID of alarming, and with each data section It is stored with each chained list node of the associated annular doubly linked list of point with same machines domain name and the identical tactful ID of alarm The data alarmed of needs, the timestamp value size for the data that the multiple chained list node is alarmed according to needs thereon carries out chain Run in row.
4. processor as claimed in claim 2 or claim 3, wherein the alert if in the alarm strategy exists including monitoring data item The information that the number of the first predetermined threshold reaches or just alarmed more than the first pre-determined number is occurred more than in predetermined amount of time,
The alarm module obtains within a predetermined period of time according to the timestamp value for the data for needing to alarm in annular doubly linked list Chained list node, if the quantity of chained list node is more than or equal to first pre-determined number, alarmed.
5. processor as claimed in claim 4, wherein, the alert if also reaches the second pre-determined number including alarm times The information no longer alarmed.
6. a kind of method for being used to handle the data for needing to alarm, including:
The data alarmed as needed construct alert data table, and the data for needing to alarm include at least two data item, The alert data table includes multiple back end, and each back end cochain is connected to annular doubly linked list, and the annular is two-way Chained list includes multiple chained list nodes, wherein each back end is entered by least one data item selected in the data that need to alarm Line identifier, the data that at least one data item identical needs to alarm are stored under same back end and deposited in order Storage corresponding chained list node in the annular doubly linked list of the back end,
The corresponding alarm strategy of alarm strategy ID selections in each back end, and according to selected alarm strategy come It is determined that whether the data that the needs in the annular doubly linked list associated with back end are alarmed meet in the alarm strategy Alert if, alarmed when it is determined that meeting alert if;
The historical record of alarming result is stored in alarm history memory.
7. method as claimed in claim 6, wherein, the alarm strategy includes alarm tactful ID and alert if, it is described extremely Few two data item include it is following in two or more:Machine domain name, the tactful ID of alarm, monitoring data item ID, fault value And timestamp, wherein,
Machine domain name, it is the monitored domain name with the presence or absence of abnormal machine;
Alarm tactful ID, corresponding to predetermined alarm strategy;
Monitoring data item ID, corresponding to an operating index of monitored machine;
Fault value, the abnormal data of the monitoring data item of the machine monitored;With
Timestamp, monitor the time of the abnormal data of the monitoring data item of machine.
8. method as claimed in claim 7, wherein,
The back end is identified by the machine domain name in the data that need to alarm and the tactful ID of alarming, and with each data section It is stored with each chained list node of the associated annular doubly linked list of point with same machines domain name and the identical tactful ID of alarm The data alarmed of needs, the timestamp value size for the data that the multiple chained list node is alarmed according to needs thereon carries out chain Run in row.
9. method as claimed in claim 7 or 8, wherein, the alert if includes monitoring data item within a predetermined period of time The information that the number of the first predetermined threshold reaches or just alarmed more than the first pre-determined number is occurred more than,
The corresponding alarm strategy of alarm strategy ID selections in each back end of basis, and according to selected alarm plan Whether the data slightly alarmed come the needs determined in the annular doubly linked list associated with back end meet the alarm strategy In alert if, the step of being alarmed when it is determined that meeting alert if is:According to the alert if, based on annular double The timestamp value for the data for needing to alarm into chained list obtains chained list node within a predetermined period of time, if the number of chained list node Amount is more than or equal to first pre-determined number, then is alarmed.
10. method as claimed in claim 9, wherein, the alert if also reaches the second pre-determined number including alarm times The information no longer alarmed.
CN201510137977.2A 2012-11-14 2012-11-14 For handling the processor and method of the data for needing to alarm Expired - Fee Related CN104702443B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510137977.2A CN104702443B (en) 2012-11-14 2012-11-14 For handling the processor and method of the data for needing to alarm

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510137977.2A CN104702443B (en) 2012-11-14 2012-11-14 For handling the processor and method of the data for needing to alarm
CN201210459207.6A CN102970162B (en) 2012-11-14 2012-11-14 Processor and method used for processing data to be alarmed

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201210459207.6A Division CN102970162B (en) 2012-11-14 2012-11-14 Processor and method used for processing data to be alarmed

Publications (2)

Publication Number Publication Date
CN104702443A CN104702443A (en) 2015-06-10
CN104702443B true CN104702443B (en) 2018-03-06

Family

ID=53349235

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510137977.2A Expired - Fee Related CN104702443B (en) 2012-11-14 2012-11-14 For handling the processor and method of the data for needing to alarm

Country Status (1)

Country Link
CN (1) CN104702443B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104200611B (en) * 2012-11-14 2017-04-05 北京奇虎科技有限公司 A kind of alarm processor and alarm processing method
CN108255667B (en) * 2017-12-27 2021-07-06 创新先进技术有限公司 Service monitoring method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184003A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 NMP based front and background alarm management system and management method thereof
CN101222361A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Alarm frequency monitor and alarm processing method
WO2012068808A1 (en) * 2010-11-25 2012-05-31 中兴通讯股份有限公司 Method and equipment for processing and reporting alarm information
CN102722965A (en) * 2012-05-28 2012-10-10 深圳市邦健电子有限公司 Alarm management and supervision devices
CN102930690B (en) * 2012-11-14 2014-10-15 北京奇虎科技有限公司 Alarm processor and alarm processing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101184003A (en) * 2007-12-03 2008-05-21 中兴通讯股份有限公司 NMP based front and background alarm management system and management method thereof
CN101222361A (en) * 2008-01-22 2008-07-16 中兴通讯股份有限公司 Alarm frequency monitor and alarm processing method
WO2012068808A1 (en) * 2010-11-25 2012-05-31 中兴通讯股份有限公司 Method and equipment for processing and reporting alarm information
CN102722965A (en) * 2012-05-28 2012-10-10 深圳市邦健电子有限公司 Alarm management and supervision devices
CN102930690B (en) * 2012-11-14 2014-10-15 北京奇虎科技有限公司 Alarm processor and alarm processing method

Also Published As

Publication number Publication date
CN104702443A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN105005532B (en) A kind of system and method for automatic test application programming interfaces stability
US9049105B1 (en) Systems and methods for tracking and managing event records associated with network incidents
CN105938443B (en) Method and system for executing diagnostic activities in a computing environment
CN106789323A (en) A kind of communication network management method and its device
CN103001824B (en) A kind of supervisory control system and method for supervising monitoring multiple servers
CN104991854B (en) A kind of monitoring statisticss method and system of server resource
CN110309130A (en) A kind of method and device for host performance monitor
CN110166297A (en) O&M method, system, equipment and computer readable storage medium
CN105095056A (en) Method for monitoring data in data warehouse
CN107302469B (en) Monitoring device and method for data update of distributed service cluster system
US20110270804A1 (en) Agile re-engineering of information systems
CN106844145A (en) A kind of server hardware fault early warning method and device
CN102970162B (en) Processor and method used for processing data to be alarmed
CN105653322B (en) The processing method of O&M server and server event
TW201239561A (en) Apparatus and system for diagnosing abnormal of servo control device
JP6109662B2 (en) Operation management apparatus, operation management method, and program
CN107832446B (en) Configuration item information searching method and computing device
CN110460476A (en) A kind of network O&M management method
CN105653362A (en) Method and equipment for managing timed tasks
CN104702443B (en) For handling the processor and method of the data for needing to alarm
CN106815137A (en) Ui testing method and apparatus
CN105119761A (en) Operation and maintenance monitoring and solution integrated management system and method
US8601318B2 (en) Method, apparatus and computer program product for rule-based directed problem resolution for servers with scalable proactive monitoring
CN102930690B (en) Alarm processor and alarm processing method
CN108173711A (en) Enterprises system data exchange monitoring method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20180306

Termination date: 20211114