CN111884857A - Monitoring method and device of network equipment, computing equipment and medium - Google Patents

Monitoring method and device of network equipment, computing equipment and medium Download PDF

Info

Publication number
CN111884857A
CN111884857A CN202010747628.3A CN202010747628A CN111884857A CN 111884857 A CN111884857 A CN 111884857A CN 202010747628 A CN202010747628 A CN 202010747628A CN 111884857 A CN111884857 A CN 111884857A
Authority
CN
China
Prior art keywords
equipment
network equipment
network
information
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010747628.3A
Other languages
Chinese (zh)
Inventor
张浩文
马国祥
冯小飞
杨小康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202010747628.3A priority Critical patent/CN111884857A/en
Publication of CN111884857A publication Critical patent/CN111884857A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present disclosure provides a monitoring method of a network device performed by a monitoring device, which may be used in the financial field or other fields. The method comprises the following steps: acquiring equipment information of network equipment and a check command corresponding to the network equipment; logging in the network equipment according to the equipment information of the network equipment; executing the check command in the logged network equipment to obtain the echoed information; determining whether the network equipment is abnormal or not according to the echoed information; and generating alarm information under the condition that the network equipment is abnormal. The disclosure also provides a monitoring device of the network equipment, a computing device and a computer storage medium.

Description

Monitoring method and device of network equipment, computing equipment and medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for monitoring a network device, a computing device, and a computer storage medium.
Background
In recent years, with the rapid development of enterprise services, the size of networks is expanding, and the types of network devices are increasing. The network management tools of various network equipment manufacturers support the network equipment of the manufacturer well, but cannot monitor the operation conditions of the equipment of other manufacturers, so that the management methods of various network equipment are different. Therefore, how to monitor the operation state of the network device by a general method becomes an important issue for network professional research.
Disclosure of Invention
One aspect of the present disclosure provides a monitoring method of a network device performed by a monitoring device, including: acquiring equipment information of network equipment and a check command corresponding to the network equipment; logging in the network equipment according to the equipment information of the network equipment; executing the check command in the logged network equipment to obtain echoed information; determining whether the network equipment is abnormal or not according to the echoed information; and generating alarm information under the condition that the network equipment is abnormal.
Optionally, the device information includes an IP address of the network device, a user identifier corresponding to the network device, and a password; the logging in the network device according to the device information of the network device includes: sending a login request to an IP address of the network equipment; and in response to receiving a login authentication request from the network device, sending the user identification and the password to the network device to log in the network device.
Optionally, the executing, in the logged network device, the check command to obtain echoed information includes: sending the check command to the network device; and instructing the network equipment to execute the check command to obtain echoed information.
Optionally, the determining whether the network device is abnormal according to the echoed information includes: acquiring a check rule corresponding to the network equipment; according to the check rule, obtaining the numerical value of the key field in the echoed information, and judging whether the numerical value of the key field is abnormal or not; and if the value of the key field is abnormal, determining that the network equipment is abnormal.
Optionally, the method further comprises: and under the condition that the network equipment has no abnormity, waiting for a preset period, and executing the check command again.
Optionally, the method further comprises: checking the health state of the monitoring equipment and recording the health state of the monitoring equipment in a database; acquiring the state of second monitoring equipment from a database, wherein the second monitoring equipment is used for monitoring second network equipment; and under the condition that the second monitoring equipment is abnormal, replacing the second monitoring equipment to monitor the second network equipment.
Another aspect of the present disclosure provides a monitoring apparatus for a network device, including: the scheduler module is used for acquiring equipment information of network equipment and a check command corresponding to the network equipment; the executor module is used for logging in the network equipment according to the equipment information of the network equipment and executing the check command in the logged network equipment to obtain echoed information; the command playback content analyzer module is used for determining whether the network equipment is abnormal or not according to the playback information; and the log and result notification module is used for generating alarm information under the condition that the network equipment is abnormal.
Optionally, the apparatus further comprises: the self health degree checking module is used for checking the health state of the monitoring equipment and recording the health state of the monitoring equipment in a database; the acquisition module is used for acquiring the state of second monitoring equipment from a database, and the second monitoring equipment is used for monitoring second network equipment; and the replacing module is used for replacing the second monitoring equipment to monitor the second network equipment under the condition that the second monitoring equipment is abnormal.
Another aspect of the disclosure provides a computing device comprising: one or more processors; storage means for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed.
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
According to the embodiment of the disclosure, the network equipment is logged in, the checking command is executed in the logged network equipment to obtain the echoed information, and then whether the network equipment is abnormal or not is determined according to the echoed information, so that the running states of the network equipment of different manufacturers and different models can be checked, and the method has universality.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario of a monitoring method of a network device and a monitoring apparatus of a network device according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a monitoring method of a network device according to an embodiment of the present disclosure;
fig. 3 schematically shows a flow chart of a monitoring method of a network device according to another embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram for checking line connectivity according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow diagram for checking a power state of a network device according to another embodiment of the disclosure;
FIG. 6 schematically illustrates a flow diagram for checking a router route entry for expectations according to another embodiment of the present disclosure;
fig. 7 schematically shows a block diagram of a monitoring apparatus of a network device according to an embodiment of the present disclosure;
fig. 8 schematically shows a block diagram of a monitoring apparatus of a network device according to another embodiment of the present disclosure; and
FIG. 9 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides a monitoring method of network equipment and a monitoring device of the network equipment capable of applying the method. The method comprises the steps of obtaining equipment information of the network equipment and a check command corresponding to the network equipment; logging in the network equipment according to the equipment information of the network equipment; executing the check command in the logged network equipment to obtain the echoed information; determining whether the network equipment is abnormal or not according to the echoed information; and generating alarm information under the condition that the network equipment is abnormal.
It should be noted that the monitoring method of the network device and the monitoring apparatus of the network device capable of applying the method according to the embodiments of the present disclosure may be used in the financial field, and may also be used in any field other than the financial field.
Fig. 1 schematically illustrates an application scenario of a monitoring method of a network device and a monitoring apparatus of a network device according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the application scenario 100 according to this embodiment may include network devices 101, 102, 103, 104 and monitoring devices 105, 106. Network devices 101, 102, 103, 104 may be various electronic devices in a network that support remote access, including but not limited to routers, switches, firewall devices, load balancing devices, and so forth.
The monitoring devices 105, 106 may be, for example, servers that monitor the network devices 101, 102, 103, 104. The monitoring devices 105 and 106 may log in the network devices 101, 102, 103, and 104 remotely, execute a preset check command in the logged network devices, acquire the echoed information, determine whether alarm information needs to be generated according to the echoed information according to a corresponding check rule, and record a determination result to the operation log.
The monitoring devices 105, 106 may distribute the monitoring work evenly to achieve load balancing. For example, monitoring device 105 may be responsible for monitoring operations of network devices 101, 102, and monitoring device 106 may be responsible for monitoring operations of network devices 103, 104. In addition, the monitoring devices 105, 106 periodically check their health status and update their health status in the database. The monitoring devices 105, 106 can also acquire the health status of the other party while updating their own health status in the database table. If the opposite side is normal, the check is continued. And if the state of the other side is abnormal, taking over all the equipment monitoring work which is responsible for the other side. I.e. the monitoring devices 105, 106 are backup to each other.
According to the embodiment of the disclosure, the monitoring equipment supports expansion, can be quickly adapted to a larger-scale network by increasing the number of the monitoring equipment, and realizes monitoring of large-scale network equipment.
It should be understood that the number of network devices and monitoring devices in fig. 1 is merely illustrative. There may be any number of network devices and monitoring devices, as desired for implementation.
Fig. 2 schematically shows a flow chart of a monitoring method of a network device performed by a monitoring device according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S250.
In operation S210, device information of a network device and a check command corresponding to the network device are acquired.
According to embodiments of the present disclosure, a network device may include, for example, a router, a switch, a firewall device, a load balancing device, and so on.
According to the embodiment of the present disclosure, the check command may be determined according to the function and the position of the network device.
According to the embodiment of the disclosure, a data table is preset to store the device information and the check command of different network devices. For example, in this embodiment, a device information table and a check content table are preset. The device information table may be used to store relevant information of each network device, such as device information, check configuration information, and the like. The inspection content table may be used to hold various information required when inspecting each network device, such as an inspection command, an inspection rule, alarm content, and the like.
According to the embodiment of the disclosure, corresponding device information tables and check content tables can be configured for different network devices, so that the network devices can be monitored according to the device information tables and the check content tables. And the equipment information table and the check content table support expansion, so that the support to other network equipment can be realized by expanding the equipment information table and the check content table, and higher flexibility is realized.
In operation S220, the network device is logged in according to the device information of the network device.
According to an embodiment of the present disclosure, the device information may include, for example, an IP address of the network device, a user identification and a password required to log in to the network device, and the like.
According to the embodiment of the disclosure, the monitoring device can log in the network device in a mode of simulating manual login. More specifically, the monitoring device may send a login request to an IP address of the network device, and the network device may return a login authentication request according to the login request to authenticate the identity of the monitoring device. The monitoring device sends the user identification and the password to the network device in response to receiving a login authentication request from the network device. And the network equipment receives the user identification and the password, verifies the user identification and the password, and authorizes the monitoring equipment to log in if the user identification and the password pass the verification.
In operation S230, in the logged-in network device, a check command is executed to obtain the echoed information.
According to the embodiment of the disclosure, the check command can be sent to the network device and the network device is instructed to execute the check command, and after the network device executes the check command, the echo information is generated according to the check result.
In operation S240, it is determined whether the network device is abnormal according to the echoed information.
According to the embodiment of the present disclosure, the check rule corresponding to the network device may be acquired by reading the check content table. And acquiring the numerical value of the key field in the echoed information according to the check rule, judging whether the numerical value of the key field is abnormal or not, and determining that the network equipment is abnormal if the numerical value of the key field is abnormal.
In operation S250, in case of an abnormality of the network device, alarm information is generated.
According to the embodiment of the disclosure, under the condition that the network device is abnormal, the alarm content in the check content table can be read, and the alarm information is generated according to the alarm information format indicated by the alarm content.
According to another embodiment of the disclosure, the alarm information can be recorded in the operation log of the monitoring device, so as to facilitate subsequent inquiry.
According to another embodiment of the present disclosure, a periodic check task may be provided to periodically check the network device, based on which, in case of no abnormality of the network device, the check command is executed again after waiting for a preset period. The size of the preset period may be set according to actual needs, and the size of the preset period is not specifically limited in this embodiment. In addition, configuration information of the cycle check task, such as a preset cycle, the number of times of loop execution of the check command, the check start time, the check duration, and the like, which may be stored in the device information table, may be set in advance.
According to the embodiment of the disclosure, the network equipment is logged in, the checking command is executed in the logged network equipment to obtain the echoed information, and then whether the network equipment is abnormal or not is determined according to the echoed information, so that the running states of the network equipment of different manufacturers and different models can be checked, and the method has universality. And the inspection process is automatic, personnel participation is not needed, and in addition, the second-level inspection, quick sensing and notification functions can be realized.
Fig. 3 schematically shows a flow chart of a monitoring method of a network device according to another embodiment of the present disclosure.
As shown in fig. 3, the method may further include operations S310 to S320 in addition to operations S210 to S250.
In operation S310, a device status of a target monitoring device is received.
According to an embodiment of the present disclosure, the target monitoring device may be another monitoring device than the monitoring device performing the method. The two monitoring devices are backup devices for each other, each monitoring device periodically checks the state of its own component, and writes the state (for example, including normal and abnormal) of its own device into the monitoring device information table in the database. The device state of the target monitoring device can be obtained by reading the monitoring device information table in the database.
According to other embodiments of the present disclosure, the monitoring device may also periodically and actively send its own device status to the backup device.
In operation S320, in a case that the device status of the target monitoring device is abnormal, a monitoring device list of the target monitoring device is obtained, and the network devices in the monitoring device list are monitored.
According to the embodiment of the disclosure, under the condition that the target monitoring device is abnormal, the backup device of the target monitoring device can replace the target monitoring device to monitor the network device responsible for the target monitoring device, so that the monitoring can be normally carried out. According to the embodiment of the disclosure, the high availability and load balancing function can be realized by arranging a plurality of monitoring devices which are backup to each other. In addition, the monitoring equipment supports expansion, and can be quickly adapted to a larger-scale network by increasing the number of the monitoring equipment, so that the monitoring of large-scale network equipment is realized.
The method shown in fig. 2 is further described with reference to fig. 4-6 in conjunction with specific embodiments.
Those skilled in the art will appreciate that the following example embodiments are only for the understanding of the present disclosure, and the present disclosure is not limited thereto.
Fig. 4 schematically shows a flow chart for checking line connectivity according to another embodiment of the present disclosure.
As shown in fig. 4, in step S401, the simulated manual is checked for the device B through the telnet protocol.
At step S402, a "line connectivity" command "ping 192.168.120.2" is executed.
At step S403, a key field string value is obtained for the echoed content and compared to the expected string.
In step S404, if the string comparison result is expected, continuing the next round of checking; if not, generating alarm information.
In step S405, the operation log is recorded.
In step S406, it is determined whether the loop frequency reaches the frequency threshold and the check time reaches the time threshold, and if both are reached, the process skips to execute step S402 to continue the check.
Fig. 5 schematically shows a flow diagram for checking a power state of a network device according to another embodiment of the present disclosure.
As shown in fig. 5, in step S501, the simulated manual log-in of the device C under examination by the telnet protocol.
In step S502, a "display power state" command "dbgexec sattrl env show-ps" is executed.
In step S503, the number of occurrences of the key string is counted for the echoed content and compared with an expected number (threshold).
In step S504, if the number of occurrences of the character string is expected, continuing the next round of checking; if not, generating alarm information.
In step S505, the operation log is recorded.
In step S506, it is determined whether the loop frequency reaches the frequency threshold and the check time reaches the time threshold, and if both are reached, the process skips to execute step S502 to continue the check.
Fig. 6 schematically illustrates a flow diagram for checking whether a router route entry meets expectations according to another embodiment of the present disclosure.
As shown in fig. 6, in step S601, the device a under inspection is registered.
In step S602, a "display route entry" command "show ip route summary" is executed.
In step S603, a key field value is obtained for the playback content and compared with a set threshold.
In step S604, if the numerical comparison result is expected, the next round of checking is continued; if not, generating alarm information.
In step S605, the operation log is recorded.
In step S606, it is determined whether the loop frequency reaches the frequency threshold and the check time reaches the time threshold, and if both are reached, the process skips to execute step S602 to continue the check.
Fig. 7 schematically shows a block diagram of a monitoring apparatus of a network device according to an embodiment of the present disclosure.
As shown in fig. 7, the monitoring apparatus 700 of the network device includes a scheduler module 710, an executor module 720, a command playback content parser module 730, and a log and result notification module 740. The monitoring apparatus 700 of the network device may perform the method described above with reference to fig. 2.
Specifically, the scheduler module 710 is configured to obtain device information of the network device and a check command corresponding to the network device.
The executor module 720 is configured to log in the network device according to the device information of the network device, and execute the check command in the logged in network device to obtain the echoed information.
And a command playback content parser module 730, configured to determine whether the network device is abnormal according to the playback information.
And the log and result notification module 740 is configured to generate alarm information when the network device is abnormal.
According to the embodiment of the disclosure, the network equipment is logged in, the checking command is executed in the logged network equipment to obtain the echoed information, and then whether the network equipment is abnormal or not is determined according to the echoed information, so that the running states of the network equipment of different manufacturers and different models can be checked, and the method has universality.
Fig. 8 schematically shows a block diagram of a monitoring apparatus of a network device according to another embodiment of the present disclosure.
As shown in fig. 8, the monitoring apparatus 700 of the network device includes an acquisition module 810 and a substitution module 820 in addition to the scheduler module 710, the executor module 720, the command playback content parser module 730, and the log and result notification module 740. The monitoring apparatus 700 of the network device may perform the method described above with reference to fig. 3.
The obtaining module 810 is configured to receive a device status of the target monitoring device.
The replacing module 820 is configured to, in a case that the device state of the target monitoring device is abnormal, obtain a monitoring device list of the target monitoring device, and monitor the network device in the monitoring device list.
According to the embodiment of the disclosure, the high availability and load balancing function can be realized by arranging a plurality of monitoring devices which are backup to each other. In addition, the monitoring equipment supports expansion, and can be quickly adapted to a larger-scale network by increasing the number of the monitoring equipment, so that the monitoring of large-scale network equipment is realized.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any of the scheduler module 710, the executor module 720, the command playback content parser module 730, the log and result notification module 740, the obtaining module 810, and the substitution module 820 may be combined in one module to be implemented, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the scheduler module 710, the executor module 720, the command echo content parser module 730, the log and result notification module 740, the obtaining module 810, and the replacing module 820 may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of the scheduler module 710, the executor module 720, the command echo content parser module 730, the log and result notification module 740, the obtaining module 810, and the replacement module 820 may be at least partially implemented as a computer program module that, when executed, may perform a corresponding function.
FIG. 9 schematically illustrates a block diagram of a computer system suitable for implementing the above-described method according to an embodiment of the present disclosure. The computer system illustrated in FIG. 9 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 9, computer system 900 includes a processor 910 and a computer-readable storage medium 920. The computer system 900 may perform a method according to an embodiment of the disclosure.
In particular, processor 910 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 910 may also include onboard memory for caching purposes. The processor 910 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage media 920, for example, may be non-volatile computer-readable storage media, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 920 may include a computer program 921, which computer program 921 may include code/computer-executable instructions that, when executed by the processor 910, cause the processor 910 to perform a method according to an embodiment of the present disclosure, or any variation thereof.
The computer program 921 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 921 may include one or more program modules, including 921A, modules 921B, … …, for example. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 910 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 910.
According to an embodiment of the present invention, at least one of the scheduler module 710, the executor module 720, the command echo content parser module 730, the log and result notification module 740, the obtaining module 810, and the replacement module 820 may be implemented as a computer program module described with reference to fig. 9, which, when executed by the processor 910, may implement the corresponding operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (10)

1. A method of monitoring a network device, comprising:
acquiring equipment information of network equipment and a check command corresponding to the network equipment;
logging in the network equipment according to the equipment information of the network equipment;
executing the check command in the logged network equipment to obtain echoed information;
determining whether the network equipment is abnormal or not according to the echoed information; and
and generating alarm information under the condition that the network equipment is abnormal.
2. The method of claim 1, wherein the device information comprises an IP address of the network device, a user identification corresponding to the network device, and a password;
the logging in the network device according to the device information of the network device includes:
sending a login request to an IP address of the network equipment; and
and responding to a login verification request received from the network equipment, and sending the user identification and the password to the network equipment so as to log in the network equipment.
3. The method of claim 1, wherein said executing, in the logged-in network device, the check command to obtain echoed information comprises:
sending the check command to the network device; and
and instructing the network equipment to execute the check command to obtain the echoed information.
4. The method of claim 1, wherein the determining whether the network device is abnormal according to the echoed information comprises:
acquiring a check rule corresponding to the network equipment;
according to the check rule, obtaining the numerical value of the key field in the echoed information, and judging whether the numerical value of the key field is abnormal or not; and
and if the value of the key field is abnormal, determining that the network equipment is abnormal.
5. The method of claim 1, further comprising:
and under the condition that the network equipment has no abnormity, waiting for a preset period, and executing the check command again.
6. The method of claim 1, further comprising:
receiving the equipment state of the target monitoring equipment; and
and under the condition that the equipment state of the target monitoring equipment is abnormal, acquiring a monitoring equipment list of the target monitoring equipment, and monitoring the network equipment in the monitoring equipment list.
7. A monitoring apparatus of a network device, comprising:
the scheduler module is used for acquiring equipment information of network equipment and a check command corresponding to the network equipment;
the executor module is used for logging in the network equipment according to the equipment information of the network equipment and executing the check command in the logged network equipment to obtain echoed information; and
the command playback content analyzer module is used for determining whether the network equipment is abnormal or not according to the playback information; and
and the log and result notification module is used for generating alarm information under the condition that the network equipment is abnormal.
8. The apparatus of claim 7, further comprising:
the acquisition module is used for receiving the equipment state of the target monitoring equipment; and
and the replacing module is used for acquiring a monitoring equipment list of the target monitoring equipment and monitoring the network equipment in the monitoring equipment list under the condition that the equipment state of the target monitoring equipment is abnormal.
9. A computing device, comprising:
one or more processors;
a memory for storing one or more computer programs,
wherein the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 6.
10. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to carry out the method of any one of claims 1 to 6.
CN202010747628.3A 2020-07-29 2020-07-29 Monitoring method and device of network equipment, computing equipment and medium Pending CN111884857A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010747628.3A CN111884857A (en) 2020-07-29 2020-07-29 Monitoring method and device of network equipment, computing equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010747628.3A CN111884857A (en) 2020-07-29 2020-07-29 Monitoring method and device of network equipment, computing equipment and medium

Publications (1)

Publication Number Publication Date
CN111884857A true CN111884857A (en) 2020-11-03

Family

ID=73201155

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010747628.3A Pending CN111884857A (en) 2020-07-29 2020-07-29 Monitoring method and device of network equipment, computing equipment and medium

Country Status (1)

Country Link
CN (1) CN111884857A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114666193A (en) * 2022-03-03 2022-06-24 阿里巴巴(中国)有限公司 Anomaly detection method for CDN, computing device and storage medium
CN114666246A (en) * 2022-03-29 2022-06-24 中材邦业(杭州)智能技术有限公司 Intelligent monitoring system and method for startup and shutdown of rotary kiln based on sniffing technology
CN116170362A (en) * 2023-02-22 2023-05-26 北京乐研科技股份有限公司 Gateway equipment rapid inspection method and system based on ARM platform

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071995A (en) * 2015-08-28 2015-11-18 北京华青融天技术有限责任公司 Out-of-band network based network device patrolling method, device and system
CN110414989A (en) * 2019-07-29 2019-11-05 中国工商银行股份有限公司 Method for detecting abnormality and device, electronic equipment and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105071995A (en) * 2015-08-28 2015-11-18 北京华青融天技术有限责任公司 Out-of-band network based network device patrolling method, device and system
CN110414989A (en) * 2019-07-29 2019-11-05 中国工商银行股份有限公司 Method for detecting abnormality and device, electronic equipment and computer readable storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114666193A (en) * 2022-03-03 2022-06-24 阿里巴巴(中国)有限公司 Anomaly detection method for CDN, computing device and storage medium
CN114666193B (en) * 2022-03-03 2023-08-22 阿里巴巴(中国)有限公司 Abnormality detection method for CDN, computing device and storage medium
CN114666246A (en) * 2022-03-29 2022-06-24 中材邦业(杭州)智能技术有限公司 Intelligent monitoring system and method for startup and shutdown of rotary kiln based on sniffing technology
CN114666246B (en) * 2022-03-29 2023-10-31 中才邦业(杭州)智能技术有限公司 Rotary kiln start-stop intelligent monitoring system and method based on sniffing technology
CN116170362A (en) * 2023-02-22 2023-05-26 北京乐研科技股份有限公司 Gateway equipment rapid inspection method and system based on ARM platform
CN116170362B (en) * 2023-02-22 2024-01-30 北京乐研科技股份有限公司 Gateway equipment rapid inspection method and system based on ARM platform

Similar Documents

Publication Publication Date Title
JP6861675B2 (en) Systems, methods, devices, and non-temporary computer-readable storage media for providing mobile device support services
CN111884857A (en) Monitoring method and device of network equipment, computing equipment and medium
US9971679B2 (en) Identifying severity of test execution failures by analyzing test execution logs
EP3311529B1 (en) Resilience as a service
CN107660289B (en) Automatic network control
US10452520B2 (en) Association between a test case and source code
WO2018000607A1 (en) Method and electronic apparatus for identifying test case failure causes
US9170924B2 (en) Ecosystem certification of a partner product
CN104067234A (en) In situ processor re-characterization
US20160364319A1 (en) Enhanced bug resolution
US9158641B2 (en) Cloud auto-test system, method and non-transitory computer readable storage medium of the same
CN110888804A (en) Interface test method and interface test platform
CN114003428A (en) Fault early warning method and device for distributed system
US8171347B2 (en) Method and apparatus for troubleshooting a computer system
JP2017068691A (en) Diagnostic program, diagnostic method and diagnostic apparatus
US9354962B1 (en) Memory dump file collection and analysis using analysis server and cloud knowledge base
US9696986B2 (en) Managing a code load
JP2020144542A (en) Defect reproduction support system and defect reproduction support method
Chan et al. Debugging incidents in Google's distributed systems
CN114064510A (en) Function testing method and device, electronic equipment and storage medium
CN111711715A (en) Method, device, electronic equipment and medium for processing server IP address
CN109525470B (en) Network access method and network access system
US10936400B2 (en) Dynamic handling of callhome data
US20160275002A1 (en) Image capture in application lifecycle management for documentation and support
US9208045B2 (en) Testing integrated business systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201103

RJ01 Rejection of invention patent application after publication