Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for realizing cloud environment bypass monitoring by utilizing public cloud storage

A monitoring system and cloud environment technology, applied in the field of network communication, can solve the problems of collecting traffic, not supporting protocol traffic transmission, and unable to fully meet the requirements, and achieve the effect of improving processing efficiency, convenient and quick deployment, and wide applicability

Active Publication Date: 2021-09-03
SHANGHAI NETIS TECH
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1) Most public clouds do not provide business traffic mirroring services, and cannot use traditional environment switch port mirroring to collect traffic;
[0007] 2) The local area network in the public cloud may be distributed in different nodes, and the network intercommunication between virtual machines is limited, and the transmission of protocol traffic such as GRE, vxlan, and MPLS may not be supported;
However, the above solutions are only aimed at the performance indicators of servers or containers in the cloud environment, and are limited to the occupancy of resources such as CPU, memory, and disk. These monitoring data can monitor whether the server and container resources are overloaded at the time, but cannot monitor the server or container. Is the application working properly
Unable to fully meet the needs of users to monitor cloud environment applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for realizing cloud environment bypass monitoring by utilizing public cloud storage
  • Method and system for realizing cloud environment bypass monitoring by utilizing public cloud storage

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The present invention will be described in detail below in conjunction with specific embodiments. The following examples will help those skilled in the art to further understand the present invention, but do not limit the present invention in any form. It should be noted that those skilled in the art can make several changes and improvements without departing from the concept of the present invention. These all belong to the protection scope of the present invention.

[0061] The present invention utilizes the common NAS storage service of the public cloud to realize the collection and transmission of service traffic in the public cloud environment.

[0062] Reference for the overall deployment diagram of the public cloud environment traffic collection solution figure 1 .

[0063] 1. Deployment Diagram Description

[0064] 1. The two virtual machines VM1 and VM2 are virtual machines that need to collect business traffic, and PA (traffic collection agent) is deployed...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for realizing cloud environment bypass monitoring by utilizing public cloud storage, and the method comprises the following steps: a PA service flow collection step: a PA captures the flow on a VM communication port in real time, extracts a useful data packet according to a service filtering rule, and stores the useful data packet in a shared storage in a pcap format; a step that the PKTM reads the service flow: the PKTM reads the abstract file information in the shared storage in real time, extracts a data packet in the file, and submits the data packet to the DP in a shared memory mode; and a DP decoding analysis step: carrying out DP decoding analysis, analyzing the data packet according to configuration and a protocol format, generating a service original record, carrying out aggregation calculation on a specified field, generating multi-dimensional index data, generating real-time alarm, multi-dimensional statistics and alarm records according to the multi-dimensional index data, and sending the alarm records to a monitoring platform. The method is wide in applicability, influences on cloud services are as little as possible, the bandwidth of a service network is not occupied, and influences on communication between service nodes are avoided.

Description

technical field [0001] The present invention relates to the field of network communication, in particular to a method and system for implementing cloud environment bypass monitoring by utilizing public cloud storage. Background technique [0002] Real-time collection of network service traffic for decoding and statistical analysis is the current mainstream operation and maintenance monitoring solution. The main advantage of this method is bypass monitoring and no intrusion into the business. It has the least impact on the business among all operation and maintenance monitoring solutions. [0003] In a traditional environment, network traffic collection is to aggregate and export business traffic through switch port mirroring. A TAP device may also be required to aggregate and filter the traffic exported by multiple switches, and then send it to the monitoring system for decoding, analysis and statistics. [0004] However, with the increasing proportion of cloud services in v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/24H04L12/26H04L29/08H04L29/06
CPCH04L41/0631H04L43/028H04L67/1097H04L69/22
Inventor 朱世文李振国卢呈超蔡晓华
Owner SHANGHAI NETIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products