Method and device for reporting monitoring logs, method and device for processing monitoring logs

A technology for logging and monitoring equipment, applied in the field of cloud computing

Active Publication Date: 2021-04-02
ALIBABA GRP HLDG LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] Embodiments of the present invention provide a method and device for reporting monitoring logs, and a method and device for processing monitoring logs, so as to at least solve the problem in the related art that in the process of using and managing encryption machines in a cloud computing environment, it is impossible to implement a large number of hardware encryption machines. And the technical problem of centralized management of virtual machine encryption machine for visual monitoring logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for reporting monitoring logs, method and device for processing monitoring logs
  • Method and device for reporting monitoring logs, method and device for processing monitoring logs
  • Method and device for reporting monitoring logs, method and device for processing monitoring logs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] According to an embodiment of the present invention, a method embodiment of reporting a monitoring log and a method embodiment of processing a monitoring log are also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be implemented in a group of computers such as Instructions are executed in a computer system and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0043] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 1 It is a hardware structural block diagram of a computer terminal for reporting a monitoring log or a method for processing a monitoring log according to an embodiment of the present invention. Such as figure 1 As...

Embodiment 2

[0094] According to an embodiment of the present invention, an embodiment of an apparatus for implementing the above-mentioned reporting of monitoring logs is also provided. Figure 5 is a structural block diagram of a device for reporting monitoring logs according to an embodiment of the present invention. This device is applied to the log server, such as Figure 5 As shown, the device includes: an acquisition module 10, configured to acquire configuration information, wherein the configuration information includes at least: the identification information of the log server and the reporting method of the monitoring log; the processing module 20, configured to report the monitoring log to log server.

[0095] The above configuration information can be used by the service provider to perform global configuration on the hardware encryption machine to power on and initialize the hardware encryption machine. The management personnel of the service provider can use their own UKey ...

Embodiment 3

[0122] Embodiments of the present invention may provide a computer terminal, and the computer terminal may be any computer terminal device in a group of computer terminals. Optionally, in this embodiment, the foregoing computer terminal may also be replaced with a terminal device such as a mobile terminal.

[0123] Optionally, in this embodiment, the foregoing computer terminal may be located in at least one network device among multiple network devices of the computer network.

[0124] Optionally, Figure 8 It is a structural block diagram of a computer terminal according to an embodiment of the present invention. Such as Figure 8 As shown, the computer terminal may include: one or more (only one is shown in the figure) processors and memory.

[0125] Wherein, the memory can be used to store software programs and modules, such as the program instructions / modules corresponding to the method and device for reporting monitoring logs and the method and device for processing m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device used for reporting a monitoring log, and a method and a device for processing the monitoring log. The method comprises the steps that a hardware encryption machine acquires configuration information, wherein the configuration information includes at least the identification information of a log server and the reporting mode of the monitoring log; and the hardware encryption machine reports the monitoring log to the log server according to the configuration information. According to the invention, the technical problem that visual monitoring log centralized management for a large number of hardware encryption machines and virtual machine encryption machines cannot be realized in use and management processes of the encryption machines in a cloud computing environment in the related technology is solved.

Description

technical field [0001] The present invention relates to the field of cloud computing, in particular to a method and device for reporting monitoring logs, and a method and device for processing monitoring logs. Background technique [0002] The encryption machine is a domestically developed host encryption device that has been identified and approved by the national commercial cryptography authority. The encryption machine and the host use Transmission Control Protocol (TCP) / Internet Protocol (IP) communication. The type and operating system used by the host does not have any special requirements. Provide secure and confidential data communication services for computer network systems through the use of encryption machines to prevent various fraudulent behaviors on the network. [0003] The encryption machine generally includes the following four functional modules: hardware encryption components, key management menu, encryption machine background process, encryption machine...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L41/069H04L63/0428
Inventor 黄雨洁蒋海滔林贤圩林龙苏建东李诚
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products