Class access network monitoring log updating method

A network monitoring and updating method technology, applied in special data processing applications, instruments, electrical digital data processing and other directions, can solve problems such as low efficiency, and achieve the effect of ensuring real-time and validity, efficient retrieval and query

Inactive Publication Date: 2016-11-16
ANHUI KECHENG INFORMATION TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when we find a problem, we need to know which employee the IP address in the log corresponds to, what type of address the accessed IP address is, or whether the accessed domain name is safe, etc., but under the existing conditions, we can only search The above information can only be known by manual association of different databases, which is obviously very inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Class access network monitoring log updating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0009] Such as figure 1 As shown, embodiment 1: the technical solution that the present invention adopts is: a kind of updating method of network monitoring log in every class, it is characterized in that, set up corresponding relationship table, described corresponding relationship table stores key value, data table, database , the correspondence relation of API log, each database comprises a plurality of data tables, and the value value corresponding to key value is recorded in each data table, and described updating method also comprises the following steps: S1, obtain network monitoring log and update, Send the network monitoring log to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverse and obtain the key value and value in the data of the network monitoring log; S4, According to each key value obtained in S3, search the corresponding database and data table from the corresponding relationship tabl...

Embodiment 2

[0010] Embodiment 2: the technical scheme that the present invention adopts is: a kind of updating method of network monitoring daily log, it is characterized in that, set up corresponding relationship table, described corresponding relationship table stores key value, data table, database, API log Corresponding relationship, each database includes a plurality of data tables, each data table is recorded with a value value corresponding to the key value, and the update method also includes the following steps: S1. Obtain and update the network monitoring log, and the The network monitoring log is sent to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverses and obtains the key value and value value in the data of the network monitoring log; S4, according to S3 Each key value obtained searches the corresponding database and data table from the corresponding relationship table; S5, generating a list of trust...

Embodiment 3

[0011] Embodiment 3: the technical scheme that the present invention adopts is: a kind of updating method of network monitoring daily log, it is characterized in that, set up corresponding relationship table, described corresponding relationship table stores key value, data table, database, API log Corresponding relationship, each database includes a plurality of data tables, each data table is recorded with a value value corresponding to the key value, and the update method also includes the following steps: S1. Obtain and update the network monitoring log, and the The network monitoring log is sent to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverses and obtains the key value and value value in the data of the network monitoring log; S4, according to S3 Each key value obtained searches the corresponding database and data table from the corresponding relationship table; S5, generating a list of trust...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a class access network monitoring log updating method. A corresponding relation table is built, the corresponding relation table stores corresponding relations of key values, data tables, databases and API logs, each database comprises multiple data sheets, and each data sheet records a value corresponding to a key value. The class access network monitoring log updating method has the advantages that on the basis of distributed calculation, information related to logs is abundant in massive network monitoring logs in a unified and easy retrieval and research mode, timeliness and effectiveness of the information are ensured, and efficient retrieval and research of the information are promoted.

Description

technical field [0001] The invention relates to a network monitoring log, in particular to a method for updating the network monitoring log for every class. Background technique [0002] With the continuous expansion of enterprise scale and continuous increase of network bandwidth, the number of corresponding network monitoring logs is also continuously increasing, and the difficulty and workload of network monitoring also increase accordingly. For example, when we find a problem, we need to know which employee the IP address in the log corresponds to, what type of address the accessed IP address is, or whether the accessed domain name is safe, etc., but under the existing conditions, we can only search The above information can only be known through manual association of different databases, which is obviously very inefficient. Contents of the invention [0003] The invention provides a method for updating the monitoring log of the Banbantong network for overcoming the d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
CPCG06F16/13G06F16/1815
Inventor 陈中伟
Owner ANHUI KECHENG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products