1. The distributed lock is actually used to realize the distributed deployment and single point operation of the monitoring module. 2. Access ES to realize the low-level extension of data center, develop deletion strategy for ES expiration table, and realize periodic deletion and email notification. 3