Network monitoring log updating method

A network monitoring and updating method technology, applied in hardware monitoring, database updating, structured data retrieval and other directions, can solve problems such as low efficiency, and achieve the effect of ensuring real-time and validity, efficient retrieval and query

Inactive Publication Date: 2016-12-07
ANHUI KECHENG INFORMATION TECH
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when we find a problem, we need to know which employee the IP address in the log corresponds to, what type of address the accessed IP address is, or whether the accessed domain name is safe, etc., but under the existing conditions, we can only search The above information can only be known by manual association of different databases, which is obviously very inefficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network monitoring log updating method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0011] Such as figure 1 As shown, embodiment 1: the technical scheme that the present invention adopts is: a kind of update method of network monitoring log, it is characterized in that, establishes correspondence table, and described correspondence table stores key value, data table, database, API log Corresponding relationship, each database includes a plurality of data tables, each data table is recorded with a value value corresponding to the key value, and the update method also includes the following steps: S1. Obtain and update the network monitoring log, and the The network monitoring log is sent to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverses and obtains the key value and value value in the data of the network monitoring log; S4, according to S3 Each key value obtained searches the corresponding database and data table from the corresponding relationship table; S5, generating a list of ...

Embodiment 2

[0012] Embodiment 2: the technical scheme that the present invention adopts is: a kind of update method of network monitoring log, it is characterized in that, establishes correspondence table, and described correspondence table stores the correspondence relation of key value, data table, database, API log , each database includes a plurality of data tables, each data table is recorded with a value value corresponding to the key value, and the update method also includes the following steps: S1, obtaining and updating the network monitoring log, and updating the network monitoring log to send to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverses and obtains the key value and value in the data of the network monitoring log; S4, according to each node obtained in S3 A key value searches corresponding database and data table from described correspondence table; S5, generate credible file list: comprise th...

Embodiment 3

[0013] Embodiment 3: the technical scheme that the present invention adopts is: a kind of update method of network monitoring log, it is characterized in that, establish correspondence table, described correspondence table stores the correspondence relation of key value, data table, database, API log , each database includes a plurality of data tables, each data table is recorded with a value value corresponding to the key value, and the update method also includes the following steps: S1, obtaining and updating the network monitoring log, and updating the network monitoring log to send to the message processing system; S2, each node of the message processing system obtains the network monitoring log; S3, traverses and obtains the key value and value in the data of the network monitoring log; S4, according to each node obtained in S3 A key value searches corresponding database and data table from described correspondence table; S5, generate credible file list: comprise the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network monitoring log updating method. The method comprises the steps of establishing a corresponding relationship table, wherein the corresponding relationship table stores corresponding relationships among key values, data tables, databases and API logs, each database contain a plurality of the data tables, and each data table records values corresponding to the key values. The network monitoring log updating method has the beneficial effects that log-related information can be added to massive network monitoring logs in a way which is unified and easy for retrieval and query through distributed computing, so that the real-time property and validity of the information are ensured and efficient retrieval and query of the information are facilitated.

Description

technical field [0001] The invention relates to a network monitoring log, in particular to a method for updating the network monitoring log. Background technique [0002] With the continuous expansion of enterprise scale and continuous increase of network bandwidth, the number of corresponding network monitoring logs is also continuously increasing, and the difficulty and workload of network monitoring also increase accordingly. For example, when we find a problem, we need to know which employee the IP address in the log corresponds to, what type of address the accessed IP address is, or whether the accessed domain name is safe, etc., but under the existing conditions, we can only search The above information can only be known through manual association of different databases, which is obviously very inefficient. Contents of the invention [0003] The present invention provides a network monitoring log update method for overcoming the deficiencies of the prior art. [00...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F11/30G06F11/34
CPCG06F11/3079G06F11/3476G06F16/23
Inventor 陈中伟
Owner ANHUI KECHENG INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products