Method and system for improving alarm quality

A quality and alarm message technology, applied in the Internet field, can solve problems such as inability to fully understand and many alarm messages, and achieve the effects of improving alarm quality, efficiency, and pertinence

Active Publication Date: 2020-12-18
FUJIAN TIANQUAN EDUCATION TECH LTD
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this aggregated alarm is only for a single instance
The impact of this treatment is that when a problem occurs, there are many alarm messages, which makes it impossible to fully understand the overall problem situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for improving alarm quality
  • Method and system for improving alarm quality
  • Method and system for improving alarm quality

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] Please refer to figure 2 , the present embodiment provides a method for improving the quality of an alarm, which is applied to an existing interactive system between a server and a client. The system includes a sequentially connected front-end application 1 (client, etc.), a reverse proxy server 2 (nginx or SLB, etc.) and back-end applications (one or more WEB service application instances).

[0069] The method of this embodiment may include the following steps:

[0070] S0: Unify the standardization of the log format for the interface that provides external services in the back-end application instance (hereinafter referred to as the instance). Specifically, the logs that may have been in various formats were uniformly modified to include the following fields: exception error class, exception details, exception interface type (used to clarify which interface threw the exception), instance identifier (such as ID) And cluster identification (such as ID); wherein, the ...

Embodiment 2

[0098] This embodiment provides a specific application scenario corresponding to Embodiment 1:

[0099] There is a cluster in the account system of a certain company, which is called UC business cluster here, and there are three tomcat application instances under this cluster, which are instance A, instance B, and instance C. The function of the application instance mainly provides an interface for obtaining user information, which obtains user information from the mysql database and returns it to the caller (ie, the front end).

[0100] Assume that within 1 minute, there are five exception logs indicating that the interface for obtaining user information failed in instance A. (Assuming that the interface in the prior art has 3 abnormalities within 1 minute, an alarm prompt is required.

corresponding Embodiment 1

[0101] And corresponding to the method of embodiment one, then will carry out and comprise:

[0102] 1. If the contents of the five exception logs recorded in instance A are:

[0103] GetInfoClass (abnormal error class), own business error (abnormal detail information), GetInfo interface (interface type), instance A (instance id) and UC business cluster (cluster id).

[0104] 2. Obtain the instance ID list under the cluster according to the cluster ID in the exception log. At this time, the obtained instance ID list includes A instance, B instance, and C instance.

[0105] 3. According to the instance ID list in step 2, query the exception log of each instance ID related to the GetInfo interface within the time period. Assume that instance A occurs 5 times, instance B occurs 2 times, and instance C occurs 1 time. At this time, the following 3 scenarios may exist in the 8 exception logs:

[0106] 3.1 Scenario: These 8 exception logs are all business exceptions caused by the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for improving alarm quality, and the method comprises the steps: S1, generating a corresponding abnormal log when an instance is abnormal, wherein the exception log comprises an exception error class, exception detail information, an exception interface type, an instance identifier and a cluster identifier; the abnormal error class comprises a basic service class and a business service class; S2, acquiring an abnormal log, and acquiring all abnormal logs of which each instance under the corresponding cluster has the same abnormal interface type as the abnormal log in a preset time period according to the cluster identifier; S3, if the abnormal error classes of all the abnormal logs are business service classes and the abnormal reasons are non-basic service abnormities, judging whether an alarm message which is the same as the cluster identifier, the abnormal interface type and the abnormal error classes exists in a corresponding preset time period in an alarm message table or not; if not, sending an alarm message; and if so, not processing. The number of alarm messages can be reduced, the alarm quality is improved, and the problem solvingefficiency is improved.

Description

technical field [0001] The invention relates to the Internet field, in particular to a method and a system for improving alarm quality. Background technique [0002] With the vigorous development of the mobile Internet today, various system applications have been developed, and each client or front-end application corresponds to one or more back-end server applications; at the same time, with the massive growth of application users, Server-side applications also need to support a large number of users and a large number of requests, so server-side applications generally need to have the ability to support high concurrency and high availability. As the number of users gradually increases, the request volume of the system will also gradually increase. In order to support a large number of requests, back-end service applications generally use distributed deployment, and request distribution is performed through reverse proxy servers such as NGINX. The backend deploys multiple ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/08
CPCH04L41/069H04L41/0604H04L41/0677H04L67/10
Inventor 刘德建林伟郭玉湖陈宏
Owner FUJIAN TIANQUAN EDUCATION TECH LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products