Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of monitoring and alarming

A technology for monitoring alarms and alarm time, applied in the field of information security, can solve the problems of increasing development and operation and maintenance costs, inability to transmit data to alarm servers, and inability to ensure high availability of alarms, and achieve the effect of ensuring correctness.

Active Publication Date: 2018-05-11
FEITIAN TECHNOLOGIES
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The existing alarm scheme cannot guarantee the high availability of the alarm. When the server or network interruption causes the alarm server to be unavailable, the monitoring terminal cannot completely transmit the collected data to the alarm server.
If multiple alarm servers are used, it is necessary to ensure the communication between multiple servers to ensure the synchronization of alarm data, which increases the cost of development and operation and maintenance, and when one of the servers alarms, the other servers cannot work normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of monitoring and alarming
  • A method of monitoring and alarming
  • A method of monitoring and alarming

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Embodiment 1 of the present invention provides an operation in which the server obtains the alarm authority in the method for monitoring and alarming, such as figure 2 As shown, including: After the server in the server cluster is started, the started server performs the following operations:

[0061] Step 101: the server queries the alarm authority time field in the database, and obtains the alarm time value recorded in the field;

[0062] In this embodiment, preferably, when the server is started, first obtain and process the alarm time value, after processing, wait for the second preset time and then query the alarm time value again, in addition, it can also be: Step 101 It also includes before, after the server is started, first wait for the second preset time, and then execute step 101; preferably, the second preset time is 20s;

[0063] Step 102: The server acquires the current system time, and judges whether the difference between the current system time and th...

Embodiment 2

[0089] Embodiment 2 of the present invention provides a method for monitoring and alarming in which the server that obtains the alarm authority handles the operation of the alarm process, such as image 3 As shown, including: the alarm thread of the server that obtains the alarm authority performs the following operations:

[0090] Step 201: the server acquires all resource records from the database every third preset time;

[0091] For example, as shown in Table 1, all resource records obtained by the alarm server from the database are:

[0092] Table 1

[0093]

[0094]

[0095] Step 202: the server takes the first record among all resource records as the current resource record;

[0096] For example, the first resource record obtained is the resource name otp1, the update operation performed by server C, the alarm flag is not alarmed, the resource update time is 2012.01.28 11:25:00, and the number of resource errors is 4 times. The IP address is 192.168.16.225, the...

Embodiment 3

[0129] Embodiment 3 of the present invention provides a method for processing and updating resource records in the database of the server in the method for monitoring and alarming, such as Figure 4 shown, including:

[0130] Step 301: start the client of the host;

[0131] Step 302: The client generates a request for obtaining monitoring information according to the IP address of the host, obtains and sends the request for obtaining monitoring information to the server according to preset configuration information;

[0132] For example, the generated request to obtain monitoring information is:

[0133]

[0134]

[0135] 192.168.16.225

[0136]

[0137] The client program obtains the corresponding preset configuration information according to the host IP landlord, obtains the server list from the preset configuration information, sends the request for obtaining monitoring information to the first server in the server list according to the order of the server list, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a monitoring alarm method and belongs to the field of information safety. The monitoring alarm method comprises the following steps of after servers in a server cluster are started, A querying an alarm time value in database, obtaining and judging whether a difference value between the current system time and an alarming time value is larger than first preset time or not, executing B if yes and executing C if no; B updating the alarm time value to be the current system time, judging whether update is succeed or not, executing D if yes and executing C if no; C returning back to A after waiting for the second preset time; D executing alarm operation with the interval of the third preset time, obtaining the current system time, updating the alarm time value to be the current system time, judging whether the update is succeed or not, executing D if yes and returning back to A if not. According to the technical scheme of the monitoring alarm method, only one server alarms and other servers can normally work during operation of a plurality of servers and the accuracy of the monitoring alarm is guaranteed.

Description

technical field [0001] The invention relates to the field of information security, in particular to a monitoring and alarming method. Background technique [0002] The existing alarm scheme cannot guarantee the high availability of the alarm. When the server or network interruption causes the alarm server to be unavailable, the monitoring terminal cannot completely transmit the collected data to the alarm server. If multiple alarm servers are used, it is necessary to ensure the communication between multiple servers to ensure the synchronization of alarm data, which increases the cost of development and operation and maintenance, and when one of the servers alarms, the other servers cannot work normally. Contents of the invention [0003] In order to solve the problems provided in the prior art, the present invention provides a monitoring and alarming method. [0004] The technical scheme adopted in the present invention is: a method for monitoring and alarming, comprisin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24
CPCH04L41/06H04L41/069H04L41/0836
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES