Efficient terminal alarm processing method

A processing method and terminal technology, applied in the field of IT operation and maintenance, can solve problems such as system crash, inability to achieve different alarms and different devices without affecting each other, and inability to efficiently and stably handle alarm events, so as to reduce daily workload and provide reliable data basis. Effect

Inactive Publication Date: 2014-03-26
勤智数码科技股份有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous deepening and improvement of information system construction, computer operation and maintenance has become a common concern and overwhelming problem for information service departments in all walks of life. In the enterprise LAN, a large number of terminals are connected to different network segments. Not only that, when a certain device reaches the alarm condition, it needs to be specially processed, which puts forward higher requirements for the flexibility of the alarm processing arrangement. The traditional monitoring management is based on monitoring The server sends commands to process and obtain alarm information, which inevitably causes lag or delay when large-scale alarms occur, or even system crashes. It is impossible to efficiently and stably handle large-scale outbreaks of alarm events, and it is impossible to realize the interaction between different alarms and different devices. does not affect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Efficient terminal alarm processing method
  • Efficient terminal alarm processing method
  • Efficient terminal alarm processing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0016] Embodiment one: if figure 1 and figure 2 As shown, this example uses telnet to obtain the load information of the alarm terminal as the alarm processing scheme. The specific steps of using the method of the present invention are as follows: 1) Install the expect script environment in the server, upload the telnet remote login in the monitoring system and execute the command to obtain the load The expect script file, the telnet login user name in the file, telnet login password, telnet general terminator, telnet privileged mode password, telnet privileged mode terminator, telnet login user prompt, telnet login password prompt, telnet privileged password prompt 2) When an alarm occurs, the monitoring system replaces the macro value in the expect file with the terminal telnet information and device IP in the database, generates and executes the temporary file, and telnet remotely Log in to the terminal device, execute the command to obtain the load, and output the return...

Embodiment 2

[0017] Embodiment two: if figure 1 and image 3 As shown, this example takes ssh to obtain the load information of the alarm terminal as an example. The specific steps are as follows: 1) Install the expect script environment in the server, upload the ssh remote login in the monitoring system and execute the expect script file to obtain the load command. The ssh login user name, ssh login password, terminal IP, and absolute path of the diagnostic file in the ssh file are replaced by macro values; 2) When an alarm is generated, the monitoring system replaces the macro value in the expect file with the terminal ssh information and device IP in the database, Generate and execute the temporary file, ssh remote login to the terminal device, execute the command to obtain the load, and output the returned result to the specified directory; 3) After the command is executed, the monitoring system deletes the temporary file, and returns the diagnostic information of the returned result a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an efficient terminal alarm processing method, the steps of which include: 1) information of a monitored terminal and an expect script file are input or uploaded into a monitoring system; and a command for logging in an alarm device and a service logic command which needs to be executed remotely are both included in the expect script file and alarm-device information in the expect script file is all expressed substitutively through adoption of stipulated macro values; 2) the monitoring system replaces the alarm-device information macro values in the expect file with the information of the monitored terminal which generates an alarm so that a temporary expect script file is generated; 3) the monitoring system executes the temporary expect script file; 4) the monitoring system deleting the temporary expect script file and outputs an alarm processing result. The method does not only have the characteristics of being efficient, rapid and stable, but is also capable of performing differentiated processing according to different alarms of different devices and ensuring that different alarms and processing logics do not interfere mutually.

Description

technical field [0001] The invention relates to the field of IT operation and maintenance, in particular to an efficient terminal alarm processing method. Background technique [0002] With the continuous deepening and improvement of information system construction, computer operation and maintenance has become a common concern and overwhelming problem for information service departments in all walks of life. In the enterprise LAN, a large number of terminals are connected to different network segments. Not only that, when a certain device reaches the alarm condition, it needs to be specially processed, which puts forward higher requirements for the flexibility of the alarm processing arrangement. The traditional monitoring management is based on monitoring The server sends commands to process and obtain alarm information, which inevitably causes lag or delay when large-scale alarms occur, or even system crashes. It is impossible to efficiently and stably handle large-scale ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
Inventor 陆起阳
Owner 勤智数码科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products