Alarm strategy verification method and device, electronic equipment and readable storage medium

A verification method and strategy technology, applied in the computer field, can solve the problems of low alarm prompt efficiency, reliance on manual interpretation costs, and poor timeliness of policy optimization, so as to avoid omission of alarm events and redundant risks, maximize health and practicability The effect of streamlining and saving labor costs

Active Publication Date: 2021-06-01
云账户技术(天津)有限公司
View PDF8 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide an alarm policy verification method, device, electronic equipment, and readable storage medium to solve the problems in the prior art that the alarm policy is strongly dependent on configuration experience, the cost of manual interpretation is high, the efficiency of alarm prompts is low, and the policy optimization is time-sensitive. sex problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Alarm strategy verification method and device, electronic equipment and readable storage medium
  • Alarm strategy verification method and device, electronic equipment and readable storage medium
  • Alarm strategy verification method and device, electronic equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0039] Please refer to figure 1 , figure 1 It is one of the flow diagrams of the warning policy verification method provided by the embodiment of the present invention; the warning policy verification method includes:

[0040] Step 11: Obtain an alarm strategy selected by the user from the alarm strategy list;

[0041] Step 12: If the user needs to verify and analyze the alarm strategy, obtain the verify analysis parameters corresponding to the alarm...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an alarm strategy verification method and device, electronic equipment and a readable storage medium, and relates to the technical field of computers. The method comprises the following steps: acquiring an alarm strategy; if an operation that a user needs to perform verification analysis on the alarm strategy is received, acquiring a verification analysis parameter corresponding to the alarm strategy, and generating a verification analysis number corresponding to the alarm strategy; receiving a time interval of system log data input by a user; screening out a plurality of target log events which are located in a time interval and conform to the verification analysis parameters from the historical system log data, and generating a verification analysis result of the verification analysis number according to event data of the target log events; and updating the strategy parameters of the alarm strategy according to the verification analysis result of the verification analysis number. Prepositive verification analysis is carried out on the configuration parameters of the alarm strategy by using the historical system log data, and the technical effect of completing reasonable configuration and optimization of the strategy before the alarm strategy is started is achieved.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method, device, electronic device and readable storage medium for verifying an alarm strategy. Background technique [0002] Alarm event management is an important module in the log audit system, which can realize alarming of sensitive events based on system log data so as to deal with alarm events in time and avoid greater risks. In alarm event management, alarm policy configuration is a prerequisite, and whether the alarm policy configuration is appropriate will directly affect the health of subsequent alarm events. [0003] In the existing technology, the user usually configures the parameters of the alarm strategy based on his own understanding of the business. The rationality of the parameter configuration often strongly depends on the configuration personnel's business familiarity and configuration experience. The configuration experience i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/34G06F11/32G06F11/30G06F9/54
CPCG06F9/542G06F11/3093G06F11/327G06F11/3409
Inventor 马瑞宽杨宜邹永强杨晖
Owner 云账户技术(天津)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products