Enterprise log analysis access system
A technology for accessing systems and logs, applied to instruments, electronic digital data processing, hardware monitoring, etc., can solve the problems of relying on administrators, manual extraction, lack of centralized, unified, and efficient log information management and display platforms, and achieve The effects of reasonable allocation, avoiding space occupation, and easy recording and classification
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] The enterprise log analysis access system provided by the preferred embodiment of the present invention includes network abnormality monitoring, application process management, thread management, log centralized management, log classification management and log storage management. By detecting the network and judging whether the network is safe, if the network Security accepts external network requests and assigns external network requests to application process management, which is managed by application process management; when application process management is allocated to thread management, thread management decides whether to run and the priority of operation; when thread management runs When a thread is running, receive the data transmission of the thread and send it to the centralized log management, and then send it to the server for temporary storage by the centralized log management; and send the thread data to the log classification management, and use the MAP ...
Embodiment 2
[0026] In this embodiment, on the basis of Embodiment 1, preferably, the network abnormality is monitored, and the host obtains the input source type of the external network in real time, and compares the obtained input source type with the external network input source type preset by the host; if the external network If the input source type of the external network is within the preset range of the external network input source type of the host, if it is judged that the external network is a normal and safe network, the host will allow access to the external network and accept the access request; if the input source type of the external network is not within the preset range of the host If it is judged that the external network is not a normal secure network, the host host will reject the access of the external network and disconnect the access request.
[0027] Preferably, when it is judged that the input source type of the external network is a normal secure network, the acc...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
