Unlock instant, AI-driven research and patent intelligence for your innovation.

Running monitoring method of application system

A technology of operation monitoring and application system, applied in the field of IT operation and maintenance, can solve problems such as waste of manpower, inability to understand accurately and timely, subtle abnormalities are not obvious, and achieve powerful effects

Inactive Publication Date: 2011-11-09
勤智数码科技股份有限公司
View PDF2 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In IT operation and maintenance management, for many application monitoring and management, the traditional management method is to frequently log in to the management platform of each application to check the details of the application operation, but in many cases, subtle abnormalities may not be obvious and are not easy to be detected. Human detection, only when the system shows a serious abnormal situation, the administrator will log in to the background to check the cause of the accident
The inability to accurately and timely understand when the application started to appear abnormal is the most concerned issue of every operation and maintenance administrator, especially in the case of monitoring and managing several applications at the same time, which is time-consuming and wastes manpower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Running monitoring method of application system
  • Running monitoring method of application system
  • Running monitoring method of application system

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0031] The present invention will be further described below in conjunction with the accompanying drawings

[0032] like figure 1 As shown, the general URL connection login method is used to collect Tomcat data. The steps to operate on the monitoring system are: 1) Select the type of Tomcat application to be monitored in the monitoring server, and enter the relevant basic information and permission login information of the application to be monitored. Including IP address, port number, background login account and password; 2) Set the monitoring collection timing polling cycle and alarm threshold filtering rules on the input monitoring information, such as setting the polling cycle to the default 10 minutes, Tomcat's current memory valve The value is 500M-1G for the warning level, 1G-1.5G for the severity level, etc.; 3) On the monitoring server, according to the application monitoring configuration information, start the monitoring program of the corresponding application ty...

specific Embodiment approach 2

[0035] The present invention will be further described below in conjunction with the accompanying drawings

[0036] The data collection of IIS application is carried out by SNMP. The collection steps are: 1) Select the type of IIS application to be monitored in the monitoring server, and enter the relevant basic information and permission login information of the application to be monitored, including IP address, port number, community word etc.; 2) Set the monitoring collection timing polling collection mode and the alarm threshold filtering rules of the monitoring indicators on the input monitoring information, such as setting the polling period to the default 10 minutes, the minimum number of bytes processed per second received by IIS, The indicators such as the highest number of bytes processed and received per second are set to different value segments as different alarm levels; 3) On the monitoring server, according to the application monitoring configuration information,...

specific Embodiment approach 3

[0039] The present invention will be further described below in conjunction with the accompanying drawings

[0040] The mailbox data collection of the mail server is carried out through the POP3 protocol. The collection steps are: 1) Select the type of POP3 application to be monitored in the monitoring server, and enter the relevant basic information and permission login information of the application to be monitored, including the mailbox IP address and port. 2) On the input monitoring information, set the monitoring collection timing polling period and the alarm threshold filtering rules for monitoring indicators, such as setting the polling period to the default 10 minutes, and setting the mailbox connection time and other indicators. Different value segments have different alarm levels; 3) On the monitoring server, according to the application monitoring configuration information, start the monitoring program of the corresponding application type for data collection; 4) Dat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a running monitoring method of an application system. The method comprises the following steps of: 1) inputting basic information and authority login information of a monitored application into a monitoring server; 2) setting a monitoring and acquisition regular polling cycle and a warning threshold filter rule; 3) starting a monitoring program for data acquisition; 4) connecting a remote URL with a monitored application background to acquire data, inputting login account passwords to simulate login, and obtaining the data needed to be monitored; or acquiring the data through an API interface provided by a monitored application party; and 5) quickly responding to an warning event according to the set warning threshold filter rule. The method provided by the invention is characterized by using one uniform framework to implement various application monitoring, so that more application monitoring can be flexibly expanded, and cost on secondary development is reduced; and simultaneously, the monitoring method occupies no system resource of the monitored application devices and has no influence on regular work of the monitored application devices.

Description

technical field [0001] The invention relates to the field of IT operation and maintenance, in particular to an application system operation monitoring method. Background technique [0002] With the rapid development of the network, there are more and more various network applications. It is more and more difficult to monitor the abnormal operation and maintenance of these network applications from time to time, and the demand for intelligent management is becoming more and more obvious. [0003] In IT operation and maintenance management, for many application monitoring and management, the traditional management method is to frequently log in to the management platform of each application to check the details of the application operation, but in many cases, subtle abnormalities may not be obvious and are not easy to be detected. Human detection, only when the system shows a very serious abnormal situation, the administrator will log into the background to check the cause of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
Inventor 胡广彬廖昕
Owner 勤智数码科技股份有限公司