CN113778508A - Alarm method and system based on alarm center - Google Patents
Alarm method and system based on alarm center Download PDFInfo
- Publication number
- CN113778508A CN113778508A CN202110841723.4A CN202110841723A CN113778508A CN 113778508 A CN113778508 A CN 113778508A CN 202110841723 A CN202110841723 A CN 202110841723A CN 113778508 A CN113778508 A CN 113778508A
- Authority
- CN
- China
- Prior art keywords
- alarm
- module
- message
- personnel
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 22
- 238000004806 packaging method and process Methods 0.000 claims abstract description 3
- 238000005538 encapsulation Methods 0.000 claims description 9
- 230000002688 persistence Effects 0.000 claims description 8
- 238000012423 maintenance Methods 0.000 claims description 6
- 230000008520 organization Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 claims description 5
- 238000013439 planning Methods 0.000 claims description 3
- 238000004590 computer program Methods 0.000 description 5
- 238000007726 management method Methods 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000002159 abnormal effect Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000000926 separation method Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000000644 propagated effect Effects 0.000 description 1
- 238000009517 secondary packaging Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000000758 substrate Substances 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000012384 transportation and delivery Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/30—Creation or generation of source code
- G06F8/35—Creation or generation of source code model driven
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/76—Adapting program code to run in a different environment; Porting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
- G06F9/546—Message passing systems or structures, e.g. queues
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2209/00—Indexing scheme relating to G06F9/00
- G06F2209/54—Indexing scheme relating to G06F9/54
- G06F2209/547—Messaging middleware
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
- Alarm Systems (AREA)
Abstract
The invention provides an alarming method and system based on an alarming center. Wherein the method comprises: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface; carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data; consuming the secondarily packaged alarm message, and configuring an alarm rule; and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
Description
Technical Field
The invention relates to the technical field of intelligent alarm, in particular to an alarm method and an alarm system based on an alarm center.
Background
With the increase of alarm software and modes, the alarm configuration of new business online causes great trouble to development/operation and maintenance personnel, and mainly solves the problems of complicated alarm configuration and repeated alarm configuration.
Along with the continuous expansion of the system and the continuous increase of the service, various alarm conditions can also emerge endlessly, the receiving mode of the alarm is also changed to be diversified due to the occurrence of diversified data acquisition, and along with different requirements of different projects, the contradiction that the alarm is complicated to realize also arises.
One technical solution with publication number CN112559287A is to provide a method and an apparatus for optimizing a task flow in data, which can monitor the execution condition of the task flow and send an alarm, thereby effectively supervising the task flow. When the task flow is abnormal, the alarm can be given, the key abnormal node on the task flow can be accurately positioned, the execution time of the optimized task flow can be predicted, and whether the optimized task flow can be completed in the preset time or not can be judged in advance.
The prior art solves the problem that each system is individually configured with an alarm mode, each system has an own unique alarm mode and configuration mode according to the mode supported by the system, or short messages, or nails, or telephones, and each system maintains own rules and alarm receiving personnel and media.
The problems that exist are that:
1 there is no uniform way, each system requires different personnel to maintain;
2, the personnel management mode of each system is self-maintenance, and the personnel change operation is troublesome and easy to miss;
3, the alarm mode needs to be changed, or more-dimensional alarms are expected, the independent opening is needed, and the codes cannot be reused;
4, the system structure is not formed, the configuration file is slow to enter hands, and the time cost is wasted.
Disclosure of Invention
The invention aims to provide an alarming method and an alarming system based on an alarming center station, which aim to solve the technical problems in the prior art.
The first aspect of the invention provides an alarm method based on an alarm center, which comprises the following steps:
s1: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface;
s2: carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data;
s3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
s4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
According to the method provided by the first aspect of the present invention, the warning method further includes: code access of a restful style needs to be supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the mode of the source of the alarm is various.
According to the method provided by the first aspect of the present invention, the mode of the source of the alarm is specifically zabbix custom alarm or trigger after program embedding point or skywalk alarm trigger.
According to the method provided by the first aspect of the present invention, before the secondary consumption, the method further comprises: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
The second aspect of the present invention provides an alarm system based on an alarm center, wherein the method includes: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of alarms in different modes can be sent according to the unified interface to realize a subsequent alarm access layer, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, then secondary consumption is carried out, the control layer consumes the alarm message after secondary encapsulation, alarm rule configuration is carried out, personnel information is acquired, and specific alarm realization is carried out according to the configured alarm rule; and the control layer performs data persistence through the basic layer according to the configured alarm rule.
According to the apparatus provided by the second aspect of the present invention, the access stratum further includes: kafka; before the secondary consumption, the method further comprises the following steps: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
According to a second aspect of the invention, there is provided an apparatus, the control layer comprising: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; and the notice project carries out specific alarm realization.
According to the apparatus provided by the second aspect of the present invention, the role supports a custom rule, and performs data persistence through the base layer; the role module configures the message system, the alarm mode and the configuration of personnel.
According to the apparatus provided by the second aspect of the present invention, the baseuser module pulls the organization architecture personnel information and the group information; the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, and realizes that personnel are changed to the role module in a task planning mode; the baseuser module is responsible for the maintenance of personnel alarm media, manages in a group and personnel mode and maintains a tree structure diagram.
According to the device provided by the second aspect of the present invention, after the role module obtains the personnel information through the baseuser module, the role module can send the personnel information to the notice project for specific alarm realization according to the rule;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules of the notice project by receiving different alarm media modes given by the role module and the incoming personnel information.
Compared with the prior art, the technical scheme provided by the embodiment of the application has the following advantages:
the alarm method and the alarm system based on the alarm middle station have more flexible configuration, can realize the alarm in a mode of N to N, can be connected with more systems by the middle station telephone, and are compatible with the data access of all restful styles; the bottleneck can not be generated, the flow is smoother, and the robustness of the system is increased. Meanwhile, the application provides an alarming method and device based on an alarming center platform, a unified mode is adopted, different personnel are not needed for maintenance of each system, and the working efficiency is improved; is not easy to be omitted, and reduces the labor cost.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description in the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a block diagram of an alarm system based on an alarm center, which is adopted by the present invention;
fig. 2 is a diagram of a monitoring alarm architecture employed in the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first aspect of the invention provides an alarm method based on an alarm center, which comprises the following steps:
s1: code access of a restful style is supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface; the mode of the source of the alarm is specifically modes of various sources needing alarm, such as the self-defined alarm of zabbix, the trigger after program embedding, the alarm trigger of sky walking and the like;
parameter of json Format
{message:””,requestId:””,data:{“projectname”:””,”servername”:””}}
S2: performing secondary processing on the alarm message of the unified interface, secondarily encapsulating the alarm message into data required by a subsequent program, using kafka as a processing middleware of the alarm message, storing the secondarily encapsulated alarm message into the kafka, and then performing secondary consumption;
and (3) alarm rules:
1. the project needs to be sent to the owner for alarm configuration;
2. what the notification medium is after this personal alert (phone/sms/.).
S3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
and the personnel information is formed by a personnel architecture of enterprise WeChat, and can be automatically selected when the alarm rule is configured.
S4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
In some embodiments:
1. configuring program error log alarm, and transmitting the program into an access layer in an api mode;
2. configuring an alarm rule, selecting an incoming rule- > and selecting this rule will alarm those;
3. what way these people want to alarm (phone, sms, wechat).
In some embodiments:
1. the testservcer reports json data information in an http//192.168.10.11:8700/upload mode;
2. and configuring the testserver to be three corresponding to the alarm personnel, and jointly selecting the alarm modes, such as: short messages;
3. the silent time after the alarm is selected, e.g. 24h alarm once.
As shown in fig. 1, an alarm system based on an alarm center, the system includes: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the access stratum further comprises: kafka;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of the multimode alarm can realize a subsequent alarm access layer by sending according to the unified interface, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, kafka is used as a processing middleware of the alarm message, and the secondarily encapsulated alarm message is stored into kafka and then consumed for the second time; kafka is used as a message queue, so that snow peak valley filling of data and data loss prevention can be guaranteed, and data consistency is guaranteed; the control layer consumes the alarm information after secondary packaging, performs alarm rule configuration, acquires personnel information, and performs specific alarm realization according to the configured alarm rule; the control layer carries out data persistence through the basic layer according to the configured alarm rule without losing the configuration rule;
the control layer includes: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; the notice project carries out specific alarm realization;
the role supports a custom rule and performs data persistence through the base layer; the role module configures a message system, an alarm mode and personnel configuration;
the rule of role realizes the configuration alarm with other services by pulling the information of the organization architecture personnel and the group information through the baseuser module;
the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, realizes personnel change to the role module in a task planning mode, and realizes the baseuser as a unified entrance and exit of personnel management so as to avoid the problem of repeated configuration; .
The baseuser module is responsible for the maintenance of personnel alarm media, manages in a group-by-group personnel mode, maintains a tree structure diagram and is convenient for realizing the alarm mode of a group;
after the role module acquires the personnel information through the baseuser module, the role module can send the personnel information to a notice project for realizing specific alarm according to the rule;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules by receiving different alarm media modes given by the role module and the transmitted personnel information;
judging that when the type is in different modes such as short message/telephone/mail/enterprise WeChat and the like, the type is sent to different processing modules, and each module has self-defined rules;
and the node sends all messages to be subjected to warehousing management so as to facilitate the subsequent analysis of the report.
As shown in fig. 2, the middle station receives different projects to deliver messages, and realizes message access;
the middle station receives alarm rule configuration in a web mode, and carries out alarm personnel in the web mode, and an alarm medium is selected;
the middle station receives the grafana mode to inquire and analyze the alarm message and inquire the historical alarm record;
the middle support role sends the message needing alarm to the downstream service for alarm processing by the delivery mode, and the final alarm is realized.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
Embodiments of the subject matter and the functional operations described in this specification can be implemented in: digital electronic circuitry, tangibly embodied computer software or firmware, computer hardware including the structures disclosed in this specification and their structural equivalents, or a combination of one or more of them. Embodiments of the subject matter described in this specification can be implemented as one or more computer programs, i.e., one or more modules of computer program instructions, encoded on a tangible, non-transitory program carrier for execution by, or to control the operation of, data processing apparatus. Alternatively or additionally, the program instructions may be encoded on an artificially generated propagated signal, e.g., a machine-generated electrical, optical, or electromagnetic signal, that is generated to encode and transmit information to suitable receiver apparatus for execution by the data processing apparatus. The computer storage medium may be a machine-readable storage device, a machine-readable storage substrate, a random or serial access memory device, or a combination of one or more of them.
The processes and logic flows described in this specification can be performed by one or more programmable computers executing one or more computer programs to perform corresponding functions by operating on input data and generating output. The processes and logic flows can also be performed by, and apparatus can also be implemented as, special purpose logic circuitry, e.g., an FPGA (field programmable gate array) or an ASIC (application-specific integrated circuit).
Computers suitable for executing computer programs include, for example, general and/or special purpose microprocessors, or any other type of central processing unit. Generally, a central processing unit will receive instructions and data from a read-only memory and/or a random access memory. The basic components of a computer include a central processing unit for implementing or executing instructions and one or more memory devices for storing instructions and data. Generally, a computer will also include, or be operatively coupled to receive data from or transfer data to, or both, one or more mass storage devices for storing data, e.g., magnetic, magneto-optical disks, or optical disks. However, a computer does not necessarily have such a device. Moreover, a computer may be embedded in another device, e.g., a mobile telephone, a Personal Digital Assistant (PDA), a mobile audio or video player, a game console, a Global Positioning System (GPS) receiver, or a portable storage device such as a Universal Serial Bus (USB) flash drive, to name a few.
Computer-readable media suitable for storing computer program instructions and data include all forms of non-volatile memory, media and memory devices, including by way of example semiconductor memory devices (e.g., EPROM, EEPROM, and flash memory devices), magnetic disks (e.g., an internal hard disk or a removable disk), magneto-optical disks, and CD ROM and DVD-ROM disks.
While this specification contains many specific implementation details, these should not be construed as limitations on the scope of any invention or of what may be claimed, but rather as descriptions of features specific to particular embodiments of particular inventions. Certain features that are described in this specification in the context of separate embodiments can also be implemented in combination in a single embodiment. In other instances, features described in connection with one embodiment may be implemented as discrete components or in any suitable subcombination. Moreover, although features may be described above as acting in certain combinations and even initially claimed as such, one or more features from a claimed combination can in some cases be excised from the combination, and the claimed combination may be directed to a subcombination or variation of a subcombination.
Similarly, while operations are depicted in the drawings in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. In some cases, multitasking and parallel processing may be advantageous. Moreover, the separation of various system modules and components in the embodiments described above should not be understood as requiring such separation in all embodiments, and it should be understood that the described program components and systems can generally be integrated together in a single software product or packaged into multiple software products.
Thus, particular embodiments of the subject matter have been described. Other embodiments are within the scope of the following claims. In some cases, the actions recited in the claims can be performed in a different order and still achieve desirable results. Further, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some implementations, multitasking and parallel processing may be advantageous.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (10)
1. An alarm method based on an alarm center is characterized by comprising the following steps:
s1: the alarm input is encapsulated into a uniform interface type, and the sources of alarms in different modes can realize subsequent alarm access by sending the alarms according to the uniform interface;
s2: carrying out secondary processing on the alarm message of the uniform interface, secondarily packaging the alarm message into data required by a subsequent program, and then secondarily consuming the data;
s3: consuming the secondarily packaged alarm message, and configuring an alarm rule;
s4: and acquiring personnel information, and carrying out specific alarm realization according to the configured alarm rule.
2. The alarm method based on the alarm center according to claim 1, wherein the alarm method further comprises: code access of a restful style needs to be supported, and alarm triggering is carried out according to fixed parameters in a post + parameter mode; the mode of the source of the alarm is various.
3. The alarm method based on the alarm center according to claim 2, wherein the mode of the source of the alarm is specifically zabbix's custom alarm or trigger after program burial or skywalk's alarm trigger.
4. The alert method based on an alert center according to claim 1, wherein the secondary consumption further comprises before: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
5. An alarm system based on an alarm center, the system comprising: the system comprises an alarm source unified interface module, an access layer, a control layer, a basic layer and a cache and persistence module;
the alarm source unified interface module encapsulates alarm input into a unified interface type, the source of alarms in different modes can be sent according to the unified interface to realize a subsequent alarm access layer, the access layer carries out secondary processing on the alarm message of the unified interface, secondary encapsulation is carried out on the alarm message into data required by a subsequent program, then secondary consumption is carried out, the control layer consumes the alarm message after secondary encapsulation, alarm rule configuration is carried out, personnel information is acquired, and specific alarm realization is carried out according to the configured alarm rule; and the control layer performs data persistence through the basic layer according to the configured alarm rule.
6. The alarm system based on an alarm center according to claim 5, wherein the access layer further comprises: kafka; before the secondary consumption, the method further comprises the following steps: and using kafka as the processing middleware of the alarm message, and storing the alarm message after secondary encapsulation into the kafka.
7. The middle station alarm system according to claim 5, wherein said control layer comprises: role module, baseuser module, notice project; the role module carries out alarm rule configuration; the baseuser module is responsible for acquiring personnel information; and the notice project carries out specific alarm realization.
8. The alarm console-based alarm system of claim 7, wherein said role supports custom rules and persists data through said base layer; the role module configures the message system, the alarm mode and the configuration of personnel.
9. The middle station alarm system according to claim 8, wherein the baseuser module pulls organization architecture personnel information and group information; the baseuser module dynamically pulls the organization architecture personnel information of the company, updates the information in real time, and realizes that personnel are changed to the role module in a task planning mode; the baseuser module is responsible for the maintenance of personnel alarm media, manages in a group and personnel mode and maintains a tree structure diagram.
10. The alarm system based on the alarm center according to claim 8, wherein the role module can send the personnel information to the notice project for specific alarm realization according to the rule after acquiring the personnel information through the baseuser module;
the schema information in the notice item is persisted in data through base, different warning media are maintained, and specific warning realization is realized by receiving parameters;
the notice project realizes the sending of the alarm message through different modules of the notice project by receiving different alarm media modes given by the role module and the incoming personnel information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110841723.4A CN113778508B (en) | 2021-07-26 | 2021-07-26 | Alarm method and system based on alarm center |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110841723.4A CN113778508B (en) | 2021-07-26 | 2021-07-26 | Alarm method and system based on alarm center |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113778508A true CN113778508A (en) | 2021-12-10 |
CN113778508B CN113778508B (en) | 2024-04-16 |
Family
ID=78836368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110841723.4A Active CN113778508B (en) | 2021-07-26 | 2021-07-26 | Alarm method and system based on alarm center |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113778508B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100131394A1 (en) * | 2008-11-25 | 2010-05-27 | Hans-Joerg Rutsch | Managing consistent interfaces for tax authority business objects across heterogeneous systems |
CN106850283A (en) * | 2017-01-19 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | One kind is based on event driven cloud AC alarming processing system and methods |
CN110730305A (en) * | 2019-10-28 | 2020-01-24 | 北京旷视科技有限公司 | Multi-source snapshot image processing and accessing method and device based on blocking queue |
CN111786833A (en) * | 2020-07-01 | 2020-10-16 | 浪潮云信息技术股份公司 | Alarm matching processing implementation method based on cloud service platform |
CN112532456A (en) * | 2020-12-04 | 2021-03-19 | 浪潮云信息技术股份公司 | Alarm monitoring method in cloud environment |
CN112671560A (en) * | 2020-12-11 | 2021-04-16 | 广东电力通信科技有限公司 | High-availability distributed real-time alarm processing method and system |
-
2021
- 2021-07-26 CN CN202110841723.4A patent/CN113778508B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100131394A1 (en) * | 2008-11-25 | 2010-05-27 | Hans-Joerg Rutsch | Managing consistent interfaces for tax authority business objects across heterogeneous systems |
CN106850283A (en) * | 2017-01-19 | 2017-06-13 | 上海斐讯数据通信技术有限公司 | One kind is based on event driven cloud AC alarming processing system and methods |
CN110730305A (en) * | 2019-10-28 | 2020-01-24 | 北京旷视科技有限公司 | Multi-source snapshot image processing and accessing method and device based on blocking queue |
CN111786833A (en) * | 2020-07-01 | 2020-10-16 | 浪潮云信息技术股份公司 | Alarm matching processing implementation method based on cloud service platform |
CN112532456A (en) * | 2020-12-04 | 2021-03-19 | 浪潮云信息技术股份公司 | Alarm monitoring method in cloud environment |
CN112671560A (en) * | 2020-12-11 | 2021-04-16 | 广东电力通信科技有限公司 | High-availability distributed real-time alarm processing method and system |
Non-Patent Citations (3)
Title |
---|
PHILIP A.LEGG, ET AL: "Automated insider threat detection system using user and role-based profile assessment", 《IEEE SYSTEMS JOURNAL》, pages 1 - 10 * |
李太凤;朱艳;: "Orion NPM在校园网管理中实现短信报警的方法", 《绵阳师范学院学报》, no. 05, pages 1 - 5 * |
黄雅萍: "基于物联网的智慧消防水压监测系统", 《中国优秀硕士论文电子期刊网》, pages 1 - 92 * |
Also Published As
Publication number | Publication date |
---|---|
CN113778508B (en) | 2024-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10292370B2 (en) | Tracking and monitoring of animals with combined wireless technology and geo-fencing | |
US10574808B2 (en) | Automatic setting of an alert mode on a wireless device | |
CA2743307C (en) | Mobile tag tracking system | |
US8340699B2 (en) | Method and system for monitoring high availability support system | |
CN102034342A (en) | Methods and arrangements for smart sensors | |
MX2009004835A (en) | Communication of notifications in a wireless broadcast network. | |
CN105591821A (en) | Monitoring system and business system | |
US20210367448A1 (en) | Power Grid Monitoring Using Network Devices in a Cable Network | |
US20060025159A1 (en) | System and method for context-based notification of a received transmission | |
CN113778508A (en) | Alarm method and system based on alarm center | |
CN108171470A (en) | A kind of based reminding method and device | |
CN104038368B (en) | Device alarm full-data notification system and method for electric-power communication network | |
CN205262616U (en) | Cold chain logistics temperature remote monitering system | |
CN202121619U (en) | Wireless sensing network periphery monitoring system without infrastructure | |
CN116216075A (en) | Tracking method based on packaging box, system and electronic equipment thereof | |
US10939231B2 (en) | Geofencing | |
Soh et al. | Cold chain management system via low power wide area network and IoT | |
CN105574602A (en) | Alarming method for third party to call application program interface (API) | |
Anggraini et al. | Optimal USB to Serial Converter and Delphi Software Integration for Emergency Call Handling | |
US11908291B2 (en) | Reconfigurable power modes | |
CN209170411U (en) | A kind of gateway and gateway | |
US11963084B2 (en) | Intelligent route selection of messages for low-power wide-area devices and other devices | |
KR101246092B1 (en) | Data transmission system and method capable of load balancing and multiple access | |
CN110234087B (en) | Logistics tracing method capable of sharing data | |
CN118785016A (en) | Multi-mode data transmission method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |