CN114466009A - Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium - Google Patents
Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium Download PDFInfo
- Publication number
- CN114466009A CN114466009A CN202111580801.6A CN202111580801A CN114466009A CN 114466009 A CN114466009 A CN 114466009A CN 202111580801 A CN202111580801 A CN 202111580801A CN 114466009 A CN114466009 A CN 114466009A
- Authority
- CN
- China
- Prior art keywords
- log
- data processing
- processing method
- alarm
- cloud
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Debugging And Monitoring (AREA)
Abstract
The disclosure discloses a data processing method, an edge super-fusion end, a cloud end and a readable storage medium, which can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.
Description
Technical Field
The disclosure relates to the technical field of edge super fusion, and in particular relates to a data processing method, an edge super fusion end, a cloud end and a readable storage medium.
Background
With the rapid development of global informatization and globalization of system users, many internet product architectures cover edge-end services to bring services close to users in geographic locations. If each edge is constructed from zero, all contents such as networking, storage, computing and the like need to be involved, which undoubtedly costs huge cost and content repetition. Therefore, the integrated super-fusion cabinet is produced. Generally, a plurality of hosts are arranged in the super-fusion cabinet, each host generates logs, and the logs of the hosts are sent to the cloud. Although the cloud can uniformly display and process the logs, the log tags need to be manually created in the cloud. And hidden risks in the log cannot be identified and an alarm is given in time.
Disclosure of Invention
The data processing method, the edge super-fusion end, the cloud end and the readable storage medium are used for reducing the difficulty of label setting.
The embodiment of the disclosure provides a data processing method, which is applied to an edge super-fusion terminal; the edge super-fusion end comprises a plurality of super-fusion cabinets, and each super-fusion cabinet comprises a plurality of hosts;
the data processing method comprises the following steps:
collecting data information corresponding to each host in the edge super-fusion end; the data information comprises log contents of all the hosts and environment variables corresponding to all the hosts;
extracting log labels corresponding to the log contents of the hosts according to the data information;
and sending the log content and the log label of each host to a cloud end so that the cloud end stores the log content and the log label of each host and gives an alarm according to the log label.
The beneficial effects of the disclosed embodiment are as follows:
the data processing method applied to the edge super-fusion end provided by the embodiment of the disclosure can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.
In some examples, the log tag includes: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId.
In some examples, the log content includes: at least one of business system log data, open source component log data, and operating system log data.
The data processing method provided by the embodiment of the disclosure is applied to a cloud;
the data processing method comprises the following steps:
receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
configuring corresponding alarm information for each log label;
and when the alarm information corresponding to the log label meets the alarm condition, alarming.
The beneficial effects of the disclosed embodiment are as follows:
the data processing method applied to the cloud end provided by the embodiment of the disclosure can automatically identify the edge end fault or pre-judge the hidden fault, and inform operation and maintenance personnel when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to actual needs.
In some examples, when the alarm information corresponding to the log tag meets an alarm condition, a preset alarm sending channel is used for alarming.
In some examples, the alert transmission channel includes: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
In some examples, the data processing method further comprises:
and calling the log content corresponding to the log label meeting the alarm condition while alarming.
An edge super-fusion terminal provided by the embodiment of the present disclosure includes: the data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method when executing the computer program.
The embodiment of the present disclosure provides a cloud, including: the data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method when executing the computer program.
The embodiment of the disclosure provides a readable storage medium, which stores computer-executable instructions for causing a computer to execute the data processing method.
Drawings
FIG. 1 is a flow diagram of some of the data processing methods in an embodiment of the present disclosure;
FIG. 2 is another flow diagram of a data processing method in an embodiment of the present disclosure;
FIG. 3 is an interaction diagram of a specific embodiment in an embodiment of the present disclosure;
FIG. 4 is a block diagram of a specific embodiment in an embodiment of the present disclosure;
FIG. 5 is some schematic diagrams of alarm rule information in embodiments of the present disclosure;
FIG. 6 is some schematic diagrams of variable sets in embodiments of the present disclosure;
FIG. 7 is some schematic diagrams of action sets in embodiments of the present disclosure;
fig. 8 is some schematic diagrams of the sending station signaling in the disclosed embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings of the embodiments of the present disclosure. It is to be understood that the described embodiments are only a few embodiments of the present disclosure, and not all embodiments. And the embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the disclosure without any inventive step, are within the scope of protection of the disclosure.
Unless otherwise defined, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this disclosure belongs. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
It should be noted that the sizes and shapes of the various figures in the drawings are not to scale, but are merely intended to illustrate the present disclosure. And the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout.
In general, the edge hyperfusion end may include a plurality of hyperfusion cabinets, the hyperfusion cabinets located at edge ends across the country, and the hyperfusion cabinets including a plurality of hosts. The host can realize the functions of a service system, an open source component and an operating system. In an embodiment of the present disclosure, as shown in fig. 1, a data processing method applied to an edge super-fusion end may include the following steps:
and S110, collecting data information corresponding to each host in the edge super-fusion end. The data information includes log contents of each host and environment variables corresponding to each host. Illustratively, the log content may include: at least one of business system log data, open source component log data, and operating system log data.
And S120, extracting the log labels corresponding to the log contents of the hosts according to the data information. Illustratively, the journal tag may include: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId. Illustratively, the prometheus call uri parameters may include: workpackid (workspace number), clusterId (cluster identification number), and the like.
S130, sending the log content and the log labels of the hosts to a cloud end so that the cloud end stores the log content and the log labels of the hosts and configures corresponding alarm information for the log labels; and when the alarm information corresponding to the log label meets the alarm condition, alarming.
The data processing method applied to the edge super-fusion end provided by the embodiment of the disclosure can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.
In an embodiment of the present disclosure, as shown in fig. 2, a data processing method applied to a cloud may include the following steps:
s210, receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
s220, configuring corresponding alarm information for each log label;
and S230, when the alarm information corresponding to the log label meets the alarm condition, alarming. And when the alarm is given, the log content corresponding to the log label meeting the alarm condition is called. Illustratively, when the alarm information corresponding to the log label meets the alarm condition, a preset alarm sending channel is adopted to alarm. Wherein, the alarm sending channel comprises: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
The data processing method applied to the cloud end provided by the embodiment of the disclosure can automatically identify the edge end fault or pre-judge the hidden fault, and inform operation and maintenance personnel when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to actual needs.
In an embodiment of the present disclosure, an edge superfusion terminal is provided, including: the device comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method applied to the edge super-fusion terminal when executing the computer program.
In an embodiment of the present disclosure, a cloud is provided, including: the cloud-based data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method applied to the cloud when executing the computer program.
In an embodiment of the present disclosure, a readable storage medium is provided, which stores computer-executable instructions for causing a computer to execute the above-mentioned data processing method.
The present disclosure will be described with reference to the following embodiments and fig. 3 to 8. It should be noted that the embodiment is for better explaining the present disclosure, and does not specifically limit the present disclosure.
S110, collecting service system log data, open source component log data, operating system log data and environment variables corresponding to each host in the edge hyper-fusion end.
Of course, in practical applications, other corresponding information of each host may also be collected, which is not limited herein.
And S120, aiming at each host, the edge hyper-convergence end extracts a log label corresponding to the host according to the collected business system log data, open source component log data, operating system log data and environment variables corresponding to the host. And caching the extracted log label as metadata and the acquired data information corresponding to the host in a memory.
Illustratively, the journal tag may include: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId. The method for calling uri parameters by prometheus can include: workpackid (workspace number), clusterId (cluster identification number), and the like.
S130, the edge hyper-integration end pushes the log content and the log labels of the hosts to the cloud in a push mode.
S210, the cloud end receives the log content and the log labels of the hosts from the edge super-fusion end, pushes the log content and the log labels in a push mode, and stores the log content and the log labels in a time sequence database. The cloud page can inquire all log contents associated with the log tag according to the log tag.
S220, configuring corresponding alarm information for each log label.
Exemplary, the alarm information may include: basic information, a set of variables, and a set of actions.
Illustratively, the basic information may have alarm rule information as shown in fig. 4 and fig. 5: the rule name of the alarm required (the Ism network abnormal alarm shown in fig. 5), the execution interval of the alarm (60 s shown in fig. 5), the service range (the application level shown in fig. 5), the alarm period (24 hours shown in fig. 5), whether the alarm is grouped (not grouped) shown in fig. 5), whether the alarm is on-line (a button for selecting whether the alarm is on-line or not shown in fig. 5, if the button is on-line, the button is turned green, and if the button is not on-line, the button is kept gray), the effective time (0: 00-23:59 shown in fig. 5), and the module (arm. Of course, the basic information may also include other information, which is not limited herein.
Illustratively, the variable sets, as shown in fig. 4 and 6, may have: variable name and description (logic remote call timeout as shown in fig. 6), variable code (logic _ rpc _ timeout as shown in fig. 6) data type (long as shown in fig. 6), null default value (0 as shown in fig. 6), warning/critical alarm advisory threshold (0/' as shown in fig. 6), and expression (as shown in fig. 6). Of course, the set of variables may also include other information, and is not limited herein.
Illustratively, the action set, as shown in fig. 4 and 7, may have: name (log tag based Ism remote Call timeout as shown in FIG. 7), code (log-Ism-timeout as shown in FIG. 7, which allows a user to specify an alert action code for system docking), channel (i.e., alert send channel, which may have SMS, Phone, email, Intranet, Business Wechat, and when applied, may select one or more channels to which alerts will be sent), alert recovery notification (i.e., "receive" select button, "not receive" select button as shown in FIG. 7), expression (which may select manual input or may select automatic input, which may allow user to select when actually applied.) As shown in FIG. 7, manual input is selected), variable (i.e., alert action variable code is the same as timological _ rpc _ eout as shown in FIG. 6), duration (which functions to trigger alert when expression holds that duration for future. 300 seconds as shown in FIG. 7), The number of consecutive triggers (within a duration, an alarm condition is continuously met before an alarm is triggered, the system defaults to 1 minute, the user can also configure himself/herself, as shown in fig. 3), the silent time (for preventing that after the alarm is triggered, a plurality of same alarm messages are received within a short time, as shown in fig. 7, 0' represents that the function is not enabled), the alarm level (with a plurality of level options, as shown in fig. 7, warning alarm), the effective time (the effective time of a self-configurable specified rule, that is, alarm detection and alarm forecast are performed during the time period, as shown in fig. 7, as 00:00 to 23:59), and the alarm content (which can be configured by himself/herself, or can also set default content, which can set a word count limit, for example, within 500 words, as shown in fig. 7, "Ism remote invocation timeout based on log tag, the hyper-convergence cabinet is $ { hyper-ack }, and the timeout error information is: $ value } ". Of course, the action set may also include other information, and is not limited herein.
And S230, when the alarm information corresponding to the log label meets the alarm condition, alarming. And when the alarm is given, the log content corresponding to the log label meeting the alarm condition is called. Illustratively, when the alarm information corresponding to the log label meets the alarm condition, a preset alarm sending channel is adopted to alarm. As shown in fig. 8, the in-station message may be used as an alarm sending channel, and when an alarm needs to be performed, the in-station message is sent to prompt time-out of the remote invocation of Ism based on the log tag. Therefore, the edge end fault can be automatically identified or the hidden fault can be pre-judged, and the operation and maintenance personnel can be informed when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to the actual requirement.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. A data processing method is characterized in that the method is applied to an edge super-fusion terminal; the edge super-fusion end comprises a plurality of super-fusion cabinets, and each super-fusion cabinet comprises a plurality of hosts;
the data processing method comprises the following steps:
collecting data information corresponding to each host in the edge super-fusion end; the data information comprises log contents of all the hosts and environment variables corresponding to all the hosts;
extracting log labels corresponding to the log contents of the hosts according to the data information;
and sending the log content and the log label of each host to a cloud end so that the cloud end stores the log content and the log label of each host and gives an alarm according to the log label.
2. The data processing method of claim 1, wherein the log tag comprises: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId.
3. The data processing method of claim 2, wherein the log content comprises: at least one of business system log data, open source component log data, and operating system log data.
4. A data processing method is characterized by being applied to a cloud;
the data processing method comprises the following steps:
receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
configuring corresponding alarm information for each log label;
and when the alarm information corresponding to the log label meets the alarm condition, alarming.
5. The data processing method of claim 4, wherein when the alarm information corresponding to the log tag meets an alarm condition, a preset alarm sending channel is used for alarming.
6. The data processing method of claim 5, wherein the alert transmission channel comprises: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
7. The data processing method of any of claims 4 to 6, wherein the data processing method further comprises:
and calling the log content corresponding to the log label meeting the alarm condition while alarming.
8. An edge super-fusion tip, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the data processing method according to any one of claims 1 to 3 when executing the computer program.
9. A cloud, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executed by the processor implements a data processing method as claimed in any one of claims 4 to 7.
10. A readable storage medium storing computer-executable instructions for causing a computer to perform the data processing method of any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111580801.6A CN114466009A (en) | 2021-12-22 | 2021-12-22 | Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111580801.6A CN114466009A (en) | 2021-12-22 | 2021-12-22 | Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114466009A true CN114466009A (en) | 2022-05-10 |
Family
ID=81405633
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111580801.6A Pending CN114466009A (en) | 2021-12-22 | 2021-12-22 | Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114466009A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115827398A (en) * | 2023-02-24 | 2023-03-21 | 天翼云科技有限公司 | Method and device for calculating alarm information component value, electronic equipment and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110166290A (en) * | 2019-05-16 | 2019-08-23 | 平安科技(深圳)有限公司 | Alarm method and device based on journal file |
WO2020000763A1 (en) * | 2018-06-29 | 2020-01-02 | 平安科技(深圳)有限公司 | Network risk monitoring method and apparatus, computer device and storage medium |
CN110781930A (en) * | 2019-10-14 | 2020-02-11 | 西安交通大学 | User portrait grouping and behavior analysis method and system based on log data of network security equipment |
CN111290900A (en) * | 2020-01-16 | 2020-06-16 | 中山大学 | Software fault detection method based on micro-service log |
CN111917740A (en) * | 2020-07-15 | 2020-11-10 | 杭州安恒信息技术股份有限公司 | Abnormal flow alarm log detection method, device, equipment and medium |
WO2021008913A1 (en) * | 2019-07-18 | 2021-01-21 | Thomson Licensing | Method and device for detecting anomalies, corresponding computer program product and non-transitory computer-readable carrier medium |
CN113259166A (en) * | 2021-05-27 | 2021-08-13 | 长扬科技(北京)有限公司 | Log alarm processing method and device |
CN113537790A (en) * | 2021-07-21 | 2021-10-22 | 四川通普科技有限公司 | Super-fusion management platform |
-
2021
- 2021-12-22 CN CN202111580801.6A patent/CN114466009A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020000763A1 (en) * | 2018-06-29 | 2020-01-02 | 平安科技(深圳)有限公司 | Network risk monitoring method and apparatus, computer device and storage medium |
CN110166290A (en) * | 2019-05-16 | 2019-08-23 | 平安科技(深圳)有限公司 | Alarm method and device based on journal file |
WO2021008913A1 (en) * | 2019-07-18 | 2021-01-21 | Thomson Licensing | Method and device for detecting anomalies, corresponding computer program product and non-transitory computer-readable carrier medium |
CN110781930A (en) * | 2019-10-14 | 2020-02-11 | 西安交通大学 | User portrait grouping and behavior analysis method and system based on log data of network security equipment |
CN111290900A (en) * | 2020-01-16 | 2020-06-16 | 中山大学 | Software fault detection method based on micro-service log |
CN111917740A (en) * | 2020-07-15 | 2020-11-10 | 杭州安恒信息技术股份有限公司 | Abnormal flow alarm log detection method, device, equipment and medium |
CN113259166A (en) * | 2021-05-27 | 2021-08-13 | 长扬科技(北京)有限公司 | Log alarm processing method and device |
CN113537790A (en) * | 2021-07-21 | 2021-10-22 | 四川通普科技有限公司 | Super-fusion management platform |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115827398A (en) * | 2023-02-24 | 2023-03-21 | 天翼云科技有限公司 | Method and device for calculating alarm information component value, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11586972B2 (en) | Tool-specific alerting rules based on abnormal and normal patterns obtained from history logs | |
CN110661659B (en) | Alarm method, device and system and electronic equipment | |
US11477068B2 (en) | Data network notification bar user interface | |
CN112052111B (en) | Processing method, device and equipment for server abnormity early warning and storage medium | |
CN111934920B (en) | Monitoring alarm method, device, equipment and storage medium | |
US11314550B2 (en) | User specific event threading | |
CN103401698A (en) | Monitoring system used for alarming server status in server cluster operation | |
CN113704065A (en) | Monitoring method, device, equipment and computer storage medium | |
CN113807549A (en) | Alarm message pushing method, device, equipment and storage medium | |
US11646020B2 (en) | Communication notification management | |
US20150120374A1 (en) | Automation of customer relationship management (crm) tasks responsive to electronic communications | |
CN111694677A (en) | Message queue management method, device, terminal and computer-readable storage medium | |
CN111130867B (en) | Intelligent household equipment alarm method and device based on Internet of things | |
CN113032252A (en) | Method and device for collecting buried point data, client device and storage medium | |
CN114466009A (en) | Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium | |
CN110912807A (en) | Information prompting method and device, electronic equipment and computer readable storage medium | |
CN114553682A (en) | Real-time alarm method, system, computer equipment and storage medium | |
CN114328107A (en) | Monitoring method and system for optomagnetic fusion storage server cluster and electronic equipment | |
CN113595886A (en) | Instant messaging message processing method and device, electronic equipment and storage medium | |
CN111782481A (en) | Universal data interface monitoring system and monitoring method | |
CN105607983A (en) | Data exception monitoring method and apparatus | |
CN113014587B (en) | API detection method and device, electronic equipment and storage medium | |
CN106708706B (en) | Alarm information processing method and device for task program abnormity | |
CN111510351B (en) | Anomaly detection method and device based on Promissuris monitoring system | |
US8966503B1 (en) | System and method for correlating anomalous events |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |