Alarm analysis method, device, computer equipment, and computer-readable storage medium
An analysis method and technology of setting values, applied in the field of data analysis, can solve problems such as failure to find root cause alarm information, low efficiency of alarm root cause analysis, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 2
[0103] like Figure 3F As shown, it is a second correlation topology diagram composed of a plurality of alarm nodes extracted from the first correlation topology diagram by the computer device according to the alarm information reported by the nodes. from Figure 3F It can be known that, from the bottom-level system to the top-level application, the relationship between the three is layer-by-layer dependent, and there is a pointing relationship in attribution. Taking application A, mysql (relational database management system), and system of the alarm chain as an example, the pointing relationship between each alarm node in the alarm chain can be determined: application A→mysql→system. In this case, the computer device obtains the last alarm node on the alarm chain according to the pointing relationship, and determines the system as the root cause alarm node. Thus, it is known that an alarm generated by insufficient system memory can trigger an alarm in mysql, which in turn ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


