Method for realizing accessibility monitoring based on net-ping under RubyGems
A technology of accessibility and monitoring items, which is applied in the field of net-ping to achieve accessibility monitoring, and can solve the problem of insufficient server reachability monitoring accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] Such as figure 1 A method for achieving reachability monitoring based on net-ping under RubyGems shown includes the following steps:
[0029] Perform multiple WEB configurations, specifically monitoring items based on ICMP, TCP, UDP and HTTP can be configured; write the information of multiple WEB configurations into corresponding database tables, save them, and then read the information in the data tables to perform The daemon process reads the configuration from the database table, constructs the detection request under the corresponding monitoring items based on ICMP, TCP, UDP and HTTP; verifies the response result, verifies the result after the above daemon work is completed, and sends the corresponding The results are written into the database table again for saving; the WEB side displays, and the back-end reads the results in the database table again, assembles them into JSON format and returns them to the front-end for analysis and rendering display.
[0030] Th...
Embodiment 2
[0032] This embodiment provides a method for realizing reachability monitoring based on net-ping under RubyGems, including the following steps:
[0033] Step 1. Configure monitoring items based on ICMP, TCP, UDP and HTTP on the front-end WEB;
[0034] Step 2. After submitting, the backend writes these configurations into their corresponding database ICMP tables, TCP tables, UDP tables, and HTTP tables.
[0035] Step 3, daemon process processing, comprises the following steps:
[0036] Step 3.1, every minute, read the corresponding monitoring item configuration from the database table;
[0037] Step 3.2. For ICMP monitoring items, send ICMP ECHO-REQUEST request, see figure 2 .
[0038] Step 3.3. For TCP monitoring items, send a TCP three-way handshake to the target IP. If the handshake fails, return false directly; if the handshake is successful, construct a TCP request message (the data payload part is the previously defined data specification format), if it is standardize...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 



