Log data exception detection method and device, terminal and medium

A technology of data anomaly and detection method, applied in the computer field, can solve problems such as a large number of labor costs, omission of alarms, and inability to fully cover rules

Pending Publication Date: 2019-10-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, new devices are constantly introduced in network operations, and it takes a long time to add and complete these rules for each type of new device, resulting in many alarms that have not been added to the rule base being missed.
In addition, defining each rule requires a lot of labor costs, and the available rules cannot be fully covered, and the accuracy and efficiency of the detection and processing of log data are low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log data exception detection method and device, terminal and medium
  • Log data exception detection method and device, terminal and medium
  • Log data exception detection method and device, terminal and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to enable those skilled in the art to better understand the solution of the present application, the technical solution in the embodiment of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiment of the application. Obviously, the described embodiment is only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0042] The terms "first", "second" and the like in the specification and claims of the present application and the above drawings are used to distinguish different objects, rather than to describe a specific order. Furthermore, the terms "include" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log data exception detection method and device, a terminal and a medium. The method comprises the following steps: converting the acquired first log data sequence into a first identification sequence, wherein the first log data sequence is M pieces of system log data arranged in a time sequence of the first network equipment, the first identification sequence comprises Mlog identifications, M is an integer greater than 1, and a prediction result is obtained based on the first identification sequence and comprises at least one prediction log identification; acquiringsecond log data, wherein the second log data is the next system log data generated by the first network device after the first log data sequence; the second log data is converted into the corresponding target log identifier, the target log identifier is compared with the prediction result, and whether the second log data is abnormal data or not is determined, so that abnormality detection of the system log data of the network equipment can be realized more accurately and efficiently, and abnormality processing can be carried out in time.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a log data anomaly detection method, device, terminal and medium. Background technique [0002] The system log data output by network devices such as switches and routers records the various states of the devices in operation and contains a lot of important and valuable information. Through the detection of these system log data, it can be found whether the state of the network device is abnormal. [0003] The anomaly detection method of system log data is generally based on rule-based keyword matching, which performs regular expression matching between system log data and each rule in the existing rule base, and generates an abnormal alarm if the match is successful. However, new devices are constantly introduced in network operations, and it takes a long time to add and complete these rules for each type of new device, resulting in the omission of many alarms t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/2458G06F16/26
CPCG06F16/2465G06F16/2477G06F16/26
Inventor 张梦妮谭利军周峰马晓雁吴懿伦
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products