CN114466009A - Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium - Google Patents

Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium Download PDF

Info

Publication number
CN114466009A
CN114466009A CN202111580801.6A CN202111580801A CN114466009A CN 114466009 A CN114466009 A CN 114466009A CN 202111580801 A CN202111580801 A CN 202111580801A CN 114466009 A CN114466009 A CN 114466009A
Authority
CN
China
Prior art keywords
log
data processing
processing method
alarm
cloud
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111580801.6A
Other languages
Chinese (zh)
Inventor
邓锦烨
段云涌
熊武
谢绍航
莫华森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Cloud Technology Co Ltd
Original Assignee
Tianyi Cloud Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Cloud Technology Co Ltd filed Critical Tianyi Cloud Technology Co Ltd
Priority to CN202111580801.6A priority Critical patent/CN114466009A/en
Publication of CN114466009A publication Critical patent/CN114466009A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Mining & Analysis (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The disclosure discloses a data processing method, an edge super-fusion end, a cloud end and a readable storage medium, which can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.

Description

Data processing method, edge hyper-fusion end, cloud end and readable storage medium
Technical Field
The disclosure relates to the technical field of edge super fusion, and in particular relates to a data processing method, an edge super fusion end, a cloud end and a readable storage medium.
Background
With the rapid development of global informatization and globalization of system users, many internet product architectures cover edge-end services to bring services close to users in geographic locations. If each edge is constructed from zero, all contents such as networking, storage, computing and the like need to be involved, which undoubtedly costs huge cost and content repetition. Therefore, the integrated super-fusion cabinet is produced. Generally, a plurality of hosts are arranged in the super-fusion cabinet, each host generates logs, and the logs of the hosts are sent to the cloud. Although the cloud can uniformly display and process the logs, the log tags need to be manually created in the cloud. And hidden risks in the log cannot be identified and an alarm is given in time.
Disclosure of Invention
The data processing method, the edge super-fusion end, the cloud end and the readable storage medium are used for reducing the difficulty of label setting.
The embodiment of the disclosure provides a data processing method, which is applied to an edge super-fusion terminal; the edge super-fusion end comprises a plurality of super-fusion cabinets, and each super-fusion cabinet comprises a plurality of hosts;
the data processing method comprises the following steps:
collecting data information corresponding to each host in the edge super-fusion end; the data information comprises log contents of all the hosts and environment variables corresponding to all the hosts;
extracting log labels corresponding to the log contents of the hosts according to the data information;
and sending the log content and the log label of each host to a cloud end so that the cloud end stores the log content and the log label of each host and gives an alarm according to the log label.
The beneficial effects of the disclosed embodiment are as follows:
the data processing method applied to the edge super-fusion end provided by the embodiment of the disclosure can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.
In some examples, the log tag includes: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId.
In some examples, the log content includes: at least one of business system log data, open source component log data, and operating system log data.
The data processing method provided by the embodiment of the disclosure is applied to a cloud;
the data processing method comprises the following steps:
receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
configuring corresponding alarm information for each log label;
and when the alarm information corresponding to the log label meets the alarm condition, alarming.
The beneficial effects of the disclosed embodiment are as follows:
the data processing method applied to the cloud end provided by the embodiment of the disclosure can automatically identify the edge end fault or pre-judge the hidden fault, and inform operation and maintenance personnel when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to actual needs.
In some examples, when the alarm information corresponding to the log tag meets an alarm condition, a preset alarm sending channel is used for alarming.
In some examples, the alert transmission channel includes: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
In some examples, the data processing method further comprises:
and calling the log content corresponding to the log label meeting the alarm condition while alarming.
An edge super-fusion terminal provided by the embodiment of the present disclosure includes: the data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method when executing the computer program.
The embodiment of the present disclosure provides a cloud, including: the data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method when executing the computer program.
The embodiment of the disclosure provides a readable storage medium, which stores computer-executable instructions for causing a computer to execute the data processing method.
Drawings
FIG. 1 is a flow diagram of some of the data processing methods in an embodiment of the present disclosure;
FIG. 2 is another flow diagram of a data processing method in an embodiment of the present disclosure;
FIG. 3 is an interaction diagram of a specific embodiment in an embodiment of the present disclosure;
FIG. 4 is a block diagram of a specific embodiment in an embodiment of the present disclosure;
FIG. 5 is some schematic diagrams of alarm rule information in embodiments of the present disclosure;
FIG. 6 is some schematic diagrams of variable sets in embodiments of the present disclosure;
FIG. 7 is some schematic diagrams of action sets in embodiments of the present disclosure;
fig. 8 is some schematic diagrams of the sending station signaling in the disclosed embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings of the embodiments of the present disclosure. It is to be understood that the described embodiments are only a few embodiments of the present disclosure, and not all embodiments. And the embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the disclosure without any inventive step, are within the scope of protection of the disclosure.
Unless otherwise defined, technical or scientific terms used herein shall have the ordinary meaning as understood by one of ordinary skill in the art to which this disclosure belongs. The use of "first," "second," and similar terms in this disclosure is not intended to indicate any order, quantity, or importance, but rather is used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that the element or item listed before the word covers the element or item listed after the word and its equivalents, but does not exclude other elements or items. The terms "connected" or "coupled" and the like are not restricted to physical or mechanical connections, but may include electrical connections, whether direct or indirect.
It should be noted that the sizes and shapes of the various figures in the drawings are not to scale, but are merely intended to illustrate the present disclosure. And the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout.
In general, the edge hyperfusion end may include a plurality of hyperfusion cabinets, the hyperfusion cabinets located at edge ends across the country, and the hyperfusion cabinets including a plurality of hosts. The host can realize the functions of a service system, an open source component and an operating system. In an embodiment of the present disclosure, as shown in fig. 1, a data processing method applied to an edge super-fusion end may include the following steps:
and S110, collecting data information corresponding to each host in the edge super-fusion end. The data information includes log contents of each host and environment variables corresponding to each host. Illustratively, the log content may include: at least one of business system log data, open source component log data, and operating system log data.
And S120, extracting the log labels corresponding to the log contents of the hosts according to the data information. Illustratively, the journal tag may include: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId. Illustratively, the prometheus call uri parameters may include: workpackid (workspace number), clusterId (cluster identification number), and the like.
S130, sending the log content and the log labels of the hosts to a cloud end so that the cloud end stores the log content and the log labels of the hosts and configures corresponding alarm information for the log labels; and when the alarm information corresponding to the log label meets the alarm condition, alarming.
The data processing method applied to the edge super-fusion end provided by the embodiment of the disclosure can collect data information corresponding to each host in the edge super-fusion end, and can directly extract a log label corresponding to the log content of each host according to the data information. After the data information and the log labels are sent to the cloud, the data signals stored in the cloud can be directly provided with the corresponding log labels, and therefore the log labels do not need to be added in an extra manual mode. And the cloud can utilize the extracted log label to alarm.
In an embodiment of the present disclosure, as shown in fig. 2, a data processing method applied to a cloud may include the following steps:
s210, receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
s220, configuring corresponding alarm information for each log label;
and S230, when the alarm information corresponding to the log label meets the alarm condition, alarming. And when the alarm is given, the log content corresponding to the log label meeting the alarm condition is called. Illustratively, when the alarm information corresponding to the log label meets the alarm condition, a preset alarm sending channel is adopted to alarm. Wherein, the alarm sending channel comprises: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
The data processing method applied to the cloud end provided by the embodiment of the disclosure can automatically identify the edge end fault or pre-judge the hidden fault, and inform operation and maintenance personnel when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to actual needs.
In an embodiment of the present disclosure, an edge superfusion terminal is provided, including: the device comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method applied to the edge super-fusion terminal when executing the computer program.
In an embodiment of the present disclosure, a cloud is provided, including: the cloud-based data processing system comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the data processing method applied to the cloud when executing the computer program.
In an embodiment of the present disclosure, a readable storage medium is provided, which stores computer-executable instructions for causing a computer to execute the above-mentioned data processing method.
The present disclosure will be described with reference to the following embodiments and fig. 3 to 8. It should be noted that the embodiment is for better explaining the present disclosure, and does not specifically limit the present disclosure.
S110, collecting service system log data, open source component log data, operating system log data and environment variables corresponding to each host in the edge hyper-fusion end.
Of course, in practical applications, other corresponding information of each host may also be collected, which is not limited herein.
And S120, aiming at each host, the edge hyper-convergence end extracts a log label corresponding to the host according to the collected business system log data, open source component log data, operating system log data and environment variables corresponding to the host. And caching the extracted log label as metadata and the acquired data information corresponding to the host in a memory.
Illustratively, the journal tag may include: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId. The method for calling uri parameters by prometheus can include: workpackid (workspace number), clusterId (cluster identification number), and the like.
S130, the edge hyper-integration end pushes the log content and the log labels of the hosts to the cloud in a push mode.
S210, the cloud end receives the log content and the log labels of the hosts from the edge super-fusion end, pushes the log content and the log labels in a push mode, and stores the log content and the log labels in a time sequence database. The cloud page can inquire all log contents associated with the log tag according to the log tag.
S220, configuring corresponding alarm information for each log label.
Exemplary, the alarm information may include: basic information, a set of variables, and a set of actions.
Illustratively, the basic information may have alarm rule information as shown in fig. 4 and fig. 5: the rule name of the alarm required (the Ism network abnormal alarm shown in fig. 5), the execution interval of the alarm (60 s shown in fig. 5), the service range (the application level shown in fig. 5), the alarm period (24 hours shown in fig. 5), whether the alarm is grouped (not grouped) shown in fig. 5), whether the alarm is on-line (a button for selecting whether the alarm is on-line or not shown in fig. 5, if the button is on-line, the button is turned green, and if the button is not on-line, the button is kept gray), the effective time (0: 00-23:59 shown in fig. 5), and the module (arm. Of course, the basic information may also include other information, which is not limited herein.
Illustratively, the variable sets, as shown in fig. 4 and 6, may have: variable name and description (logic remote call timeout as shown in fig. 6), variable code (logic _ rpc _ timeout as shown in fig. 6) data type (long as shown in fig. 6), null default value (0 as shown in fig. 6), warning/critical alarm advisory threshold (0/' as shown in fig. 6), and expression (as shown in fig. 6). Of course, the set of variables may also include other information, and is not limited herein.
Illustratively, the action set, as shown in fig. 4 and 7, may have: name (log tag based Ism remote Call timeout as shown in FIG. 7), code (log-Ism-timeout as shown in FIG. 7, which allows a user to specify an alert action code for system docking), channel (i.e., alert send channel, which may have SMS, Phone, email, Intranet, Business Wechat, and when applied, may select one or more channels to which alerts will be sent), alert recovery notification (i.e., "receive" select button, "not receive" select button as shown in FIG. 7), expression (which may select manual input or may select automatic input, which may allow user to select when actually applied.) As shown in FIG. 7, manual input is selected), variable (i.e., alert action variable code is the same as timological _ rpc _ eout as shown in FIG. 6), duration (which functions to trigger alert when expression holds that duration for future. 300 seconds as shown in FIG. 7), The number of consecutive triggers (within a duration, an alarm condition is continuously met before an alarm is triggered, the system defaults to 1 minute, the user can also configure himself/herself, as shown in fig. 3), the silent time (for preventing that after the alarm is triggered, a plurality of same alarm messages are received within a short time, as shown in fig. 7, 0' represents that the function is not enabled), the alarm level (with a plurality of level options, as shown in fig. 7, warning alarm), the effective time (the effective time of a self-configurable specified rule, that is, alarm detection and alarm forecast are performed during the time period, as shown in fig. 7, as 00:00 to 23:59), and the alarm content (which can be configured by himself/herself, or can also set default content, which can set a word count limit, for example, within 500 words, as shown in fig. 7, "Ism remote invocation timeout based on log tag, the hyper-convergence cabinet is $ { hyper-ack }, and the timeout error information is: $ value } ". Of course, the action set may also include other information, and is not limited herein.
And S230, when the alarm information corresponding to the log label meets the alarm condition, alarming. And when the alarm is given, the log content corresponding to the log label meeting the alarm condition is called. Illustratively, when the alarm information corresponding to the log label meets the alarm condition, a preset alarm sending channel is adopted to alarm. As shown in fig. 8, the in-station message may be used as an alarm sending channel, and when an alarm needs to be performed, the in-station message is sent to prompt time-out of the remote invocation of Ism based on the log tag. Therefore, the edge end fault can be automatically identified or the hidden fault can be pre-judged, and the operation and maintenance personnel can be informed when the alarm needs to be given, so that the operation and maintenance personnel can configure the key fault and filter the secondary fault according to the actual requirement.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A data processing method is characterized in that the method is applied to an edge super-fusion terminal; the edge super-fusion end comprises a plurality of super-fusion cabinets, and each super-fusion cabinet comprises a plurality of hosts;
the data processing method comprises the following steps:
collecting data information corresponding to each host in the edge super-fusion end; the data information comprises log contents of all the hosts and environment variables corresponding to all the hosts;
extracting log labels corresponding to the log contents of the hosts according to the data information;
and sending the log content and the log label of each host to a cloud end so that the cloud end stores the log content and the log label of each host and gives an alarm according to the log label.
2. The data processing method of claim 1, wherein the log tag comprises: at least one of a host IP in the environment variable, a log grade in a Locback log, an ID of a cabinet to which the host belongs and a prometheus calling uri parameter workpaceId.
3. The data processing method of claim 2, wherein the log content comprises: at least one of business system log data, open source component log data, and operating system log data.
4. A data processing method is characterized by being applied to a cloud;
the data processing method comprises the following steps:
receiving and storing the log content and the log labels of the hosts sent by the edge hyper-convergence end;
configuring corresponding alarm information for each log label;
and when the alarm information corresponding to the log label meets the alarm condition, alarming.
5. The data processing method of claim 4, wherein when the alarm information corresponding to the log tag meets an alarm condition, a preset alarm sending channel is used for alarming.
6. The data processing method of claim 5, wherein the alert transmission channel comprises: at least one of short message, telephone call, mail, in-site message and enterprise Wechat.
7. The data processing method of any of claims 4 to 6, wherein the data processing method further comprises:
and calling the log content corresponding to the log label meeting the alarm condition while alarming.
8. An edge super-fusion tip, comprising: memory, processor and computer program stored on the memory and executable on the processor, the processor implementing the data processing method according to any one of claims 1 to 3 when executing the computer program.
9. A cloud, comprising: memory, processor and computer program stored on the memory and executable on the processor, which when executed by the processor implements a data processing method as claimed in any one of claims 4 to 7.
10. A readable storage medium storing computer-executable instructions for causing a computer to perform the data processing method of any one of claims 1 to 7.
CN202111580801.6A 2021-12-22 2021-12-22 Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium Pending CN114466009A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111580801.6A CN114466009A (en) 2021-12-22 2021-12-22 Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111580801.6A CN114466009A (en) 2021-12-22 2021-12-22 Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium

Publications (1)

Publication Number Publication Date
CN114466009A true CN114466009A (en) 2022-05-10

Family

ID=81405633

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111580801.6A Pending CN114466009A (en) 2021-12-22 2021-12-22 Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium

Country Status (1)

Country Link
CN (1) CN114466009A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827398A (en) * 2023-02-24 2023-03-21 天翼云科技有限公司 Method and device for calculating alarm information component value, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110166290A (en) * 2019-05-16 2019-08-23 平安科技(深圳)有限公司 Alarm method and device based on journal file
WO2020000763A1 (en) * 2018-06-29 2020-01-02 平安科技(深圳)有限公司 Network risk monitoring method and apparatus, computer device and storage medium
CN110781930A (en) * 2019-10-14 2020-02-11 西安交通大学 User portrait grouping and behavior analysis method and system based on log data of network security equipment
CN111290900A (en) * 2020-01-16 2020-06-16 中山大学 Software fault detection method based on micro-service log
CN111917740A (en) * 2020-07-15 2020-11-10 杭州安恒信息技术股份有限公司 Abnormal flow alarm log detection method, device, equipment and medium
WO2021008913A1 (en) * 2019-07-18 2021-01-21 Thomson Licensing Method and device for detecting anomalies, corresponding computer program product and non-transitory computer-readable carrier medium
CN113259166A (en) * 2021-05-27 2021-08-13 长扬科技(北京)有限公司 Log alarm processing method and device
CN113537790A (en) * 2021-07-21 2021-10-22 四川通普科技有限公司 Super-fusion management platform

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020000763A1 (en) * 2018-06-29 2020-01-02 平安科技(深圳)有限公司 Network risk monitoring method and apparatus, computer device and storage medium
CN110166290A (en) * 2019-05-16 2019-08-23 平安科技(深圳)有限公司 Alarm method and device based on journal file
WO2021008913A1 (en) * 2019-07-18 2021-01-21 Thomson Licensing Method and device for detecting anomalies, corresponding computer program product and non-transitory computer-readable carrier medium
CN110781930A (en) * 2019-10-14 2020-02-11 西安交通大学 User portrait grouping and behavior analysis method and system based on log data of network security equipment
CN111290900A (en) * 2020-01-16 2020-06-16 中山大学 Software fault detection method based on micro-service log
CN111917740A (en) * 2020-07-15 2020-11-10 杭州安恒信息技术股份有限公司 Abnormal flow alarm log detection method, device, equipment and medium
CN113259166A (en) * 2021-05-27 2021-08-13 长扬科技(北京)有限公司 Log alarm processing method and device
CN113537790A (en) * 2021-07-21 2021-10-22 四川通普科技有限公司 Super-fusion management platform

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115827398A (en) * 2023-02-24 2023-03-21 天翼云科技有限公司 Method and device for calculating alarm information component value, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11586972B2 (en) Tool-specific alerting rules based on abnormal and normal patterns obtained from history logs
CN110661659B (en) Alarm method, device and system and electronic equipment
US11477068B2 (en) Data network notification bar user interface
CN112052111B (en) Processing method, device and equipment for server abnormity early warning and storage medium
CN111934920B (en) Monitoring alarm method, device, equipment and storage medium
US11314550B2 (en) User specific event threading
CN103401698A (en) Monitoring system used for alarming server status in server cluster operation
CN113704065A (en) Monitoring method, device, equipment and computer storage medium
CN113807549A (en) Alarm message pushing method, device, equipment and storage medium
US11646020B2 (en) Communication notification management
US20150120374A1 (en) Automation of customer relationship management (crm) tasks responsive to electronic communications
CN111694677A (en) Message queue management method, device, terminal and computer-readable storage medium
CN111130867B (en) Intelligent household equipment alarm method and device based on Internet of things
CN113032252A (en) Method and device for collecting buried point data, client device and storage medium
CN114466009A (en) Data processing method, edge super-fusion terminal, cloud terminal and readable storage medium
CN110912807A (en) Information prompting method and device, electronic equipment and computer readable storage medium
CN114553682A (en) Real-time alarm method, system, computer equipment and storage medium
CN114328107A (en) Monitoring method and system for optomagnetic fusion storage server cluster and electronic equipment
CN113595886A (en) Instant messaging message processing method and device, electronic equipment and storage medium
CN111782481A (en) Universal data interface monitoring system and monitoring method
CN105607983A (en) Data exception monitoring method and apparatus
CN113014587B (en) API detection method and device, electronic equipment and storage medium
CN106708706B (en) Alarm information processing method and device for task program abnormity
CN111510351B (en) Anomaly detection method and device based on Promissuris monitoring system
US8966503B1 (en) System and method for correlating anomalous events

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination