Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormity monitoring method and abnormity monitoring device

An abnormality monitoring and abnormality technology, applied in the computer field, can solve the problems that the system operating environment cannot be monitored, cannot realize automatic monitoring, etc., and achieves the effect of being convenient to carry.

Active Publication Date: 2013-10-30
KINGDEE SOFTWARE(CHINA) CO LTD
View PDF9 Cites 49 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the traditional anomaly monitoring method can only monitor the anomaly of the system itself, and cannot monitor the system operating environment, and cannot realize dynamic automatic monitoring

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormity monitoring method and abnormity monitoring device
  • Abnormity monitoring method and abnormity monitoring device
  • Abnormity monitoring method and abnormity monitoring device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Such as figure 1 As shown, in one embodiment, a method for anomaly monitoring, comprising the following steps:

[0037] Step S10 , detecting abnormal key information, and identifying the abnormal type and abnormal level according to the abnormal key information.

[0038] Abnormal key information is the monitoring information dynamically obtained during the process of monitoring the system running status, including the running information of application software and environmental information such as CPU usage rate, memory usage rate, port status, and network bandwidth.

[0039] The abnormal key information in the present invention does not refer to the error information when an error occurs, but the information related to the abnormality. As long as the abnormal key information does not meet the set conditions, it is considered that an abnormality has occurred and needs to be repaired.

[0040] In one embodiment, exception types and exception levels can be set. The exce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an abnormity monitoring method. The method includes the following steps: monitoring abnormal key information, and recognizing an abnormality type and an abnormality grade of the abnormal key information; acquiring a preset abnormity processing scheme corresponding to the abnormity type and the abnormity grade; executing the abnormality processing scheme. By the method, abnormities can be monitored in real time, and different abnormity processing schemes can be adopted according to different types and grades for abnormity repairing, so that more flexibility is provided. In addition, the invention further provides an abnormity monitoring device.

Description

【Technical field】 [0001] The invention relates to computer technology, in particular to an abnormality monitoring method and device. 【Background technique】 [0002] During the operation of the system (such as operating system, software system, etc.), the operating environment of the system and the system itself may affect the operation of the system, such as hardware resources, hardware working conditions, network communication, system errors, and system operation defects. , ambient temperature, etc. may cause the system to run abnormally, resulting in downtime. The traditional anomaly monitoring method usually triggers the user to scan the patch information provided by the software supplier. When a new patch is detected, the user is prompted whether to repair it. The user can operate according to the prompt information to complete the software repair. Therefore, the traditional anomaly monitoring method can only monitor the anomaly of the system itself, but cannot monitor ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/00G06F11/32
Inventor 任峰
Owner KINGDEE SOFTWARE(CHINA) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products