Monitoring message alarming method and system

An alarm system and message technology, applied in the field of information processing, can solve problems such as low operation and maintenance efficiency, lack of alarm mechanism, application business cannot be quickly located, etc., and achieve the effect of improving maintenance efficiency

Active Publication Date: 2016-03-02
TENCENT TECH (SHENZHEN) CO LTD +1
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] like figure 1 As shown, it is a schematic diagram of the monitoring and alarm system in the traditional technology for the alarm of the collected monitoring data. The horizontal axis in the figure indicates the monitoring time, and the vertical axis indicates the magnitude of abnormal business data. The statistics and display of abnormal data, the source of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Monitoring message alarming method and system
  • Monitoring message alarming method and system
  • Monitoring message alarming method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] The alarm method for monitoring messages provided by the embodiments of the present invention can be applied to such as figure 2 shown in the application environment, please refer to the figure 2 As shown, the application environment may specifically include one or more clients ( figure 2 Take three clients as an example, that is, clients 3001~3003), one or more application platforms ( figure 2 Two application platforms are taken as an example, namely, application platforms 2001 and 2002), and a computer system 1000 capable of executing specified operations of the alarm method for monitoring messages according to the embodiment of the present invention. The client interacts with the application platform, and the application platform interacts with the computer system; the client may include smart devices, mobile terminals, personal computers, and similar devices. The application program can be run on the client, and a service request is initiated to the applicatio...

Embodiment 2

[0034] Such as Figure 4 As shown, an alarm method for monitoring messages is provided, and the method is illustrated by being applied to a computer system, including the following steps:

[0035] S41. Collect monitoring messages of each application platform; wherein, the monitoring messages include a service request identifier and a response status identifier of the service request;

[0036] S42. According to the service request identifier and the response status identifier of the service request, obtain the response status of the monitoring message with the same service request identifier;

[0037] S43. When it is judged that the response state of the monitoring message of the same service request identifier satisfies a preset alarm standard, search for a preset alarm object corresponding to the service request identifier, and send an alarm notification to the alarm object.

[0038] In the alarm method of the monitoring message in the embodiment of the present invention, the ...

Embodiment 3

[0049] see Figure 5 , Figure 5 It is a schematic flowchart of the third embodiment of the alarm method for monitoring messages of the present invention.

[0050] The main difference between the alarm method of the monitoring message in this embodiment and the second embodiment is that the step of obtaining the response status of the monitoring message with the same service request ID according to the service request ID and the response status ID of the service request, May include:

[0051] S51. Read the service request identifier, the response status identifier of the service request, and the processing time of the service request in each of the monitoring messages;

[0052] S52. Record the total number of service requests, successful service requests, or service request timeouts of the monitoring messages with the same service request identifier within the preset monitoring time;

[0053] S53. Determine the response status of the monitoring message according to the prop...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a monitoring message alarming method and system. The monitoring message alarming method comprises the following steps: collecting monitoring messages of all the application platforms, wherein the monitoring messages comprise service request identifications and response state identifications of service requests; obtaining the response state of the monitoring messages of the same service request identification according to the service request identifications and the response state identifications of the service requests; and when judging that the response state of the monitoring messages of the same service request identification satisfies a preset alarming standard, searching a preset alarming object corresponding to the service request identification and sending an alarming notification to the alarming object. According to the method and system, the application service with faults can be automatically searched and alarmed, so that the application operation and maintenance efficiencies are improved.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to an alarm method for monitoring messages and an alarm system for monitoring messages. Background technique [0002] With the continuous development of global Internet business, more and more network users access various Internet applications, and a large number of user terminals accessing application platforms bring a large number of data read and write requests, which will inevitably generate a large number of monitoring on each application platform Data: In the face of such a fast and large amount of data read and write requests, how to monitor the service quality of the application so as to find the problem in time is a problem that needs to be solved at present. [0003] Such as figure 1 As shown, it is a schematic diagram of the monitoring alarm system in the traditional technology for the monitoring data collected. The horizontal axis in the figure represents...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/30
Inventor 林俊
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products