Big data activity project log analysis and resource allocation method

An activity project and resource allocation technology, which is applied in the field of big data activity project log analysis and resource allocation, can solve the problems of low resource allocation efficiency and long time required for activity projects, so as to improve efficiency and timeliness, and ensure security. Effect

Pending Publication Date: 2022-04-08
北京市大数据中心
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a big data activity project log analysis and resource allocation method, which is used to solve the problems that unreasonable resource allocation in the prior art will cause long time required for activity items and low resource allocation efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data activity project log analysis and resource allocation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The embodiment of the present invention provides a big data activity project log analysis and resource allocation method, figure 1 It is a flow chart of the big data activity project log analysis and resource allocation method in the embodiment of the present invention, please refer to figure 1 , the method includes the following steps:

[0052] Step S101, performing log fusion on the cloud resource host machine log, virtual machine log, bastion machine log and monitoring camera equipment log;

[0053] Step S102, based on the cloud resource host machine log and the virtual machine log, allocate the resources of the participants;

[0054] Step S103, based on the log of the bastion machine and the log of the monitoring camera equipment, it is judged whether the participants have illegal operations or malicious operations;

[0055] Wherein step S102 comprises the following steps:

[0056] Step S102-1, based on the cloud resource host machine log and the virtual machine ...

Embodiment 2

[0072] On the basis of embodiment 1, when judging whether the resource ratio of the participant is outside the first threshold range, it is judged whether the resource ratio of the participant is within the second threshold range; the second threshold a range greater than said first threshold range;

[0073] If not, perform a second resource allocation on the resources of the participants;

[0074] When it is judged that the resource proportion of the participant exceeds the first threshold range or the second threshold range, an early warning display is performed by issuing an alarm.

[0075] The working principle of the above technical solution is: the solution adopted in this embodiment is to judge whether the resource ratio of the participant is within the second threshold range when judging whether the resource ratio of the participant is outside the first threshold range within; the second threshold range is greater than the first threshold range; if not, perform a seco...

Embodiment 3

[0078] On the basis of Embodiment 1, the first resource allocation of the resources of the participants includes:

[0079] When the resource ratio of the participant reaches the maximum value of the first threshold range, the resource allocation of the participant is increased; the increase of the resource allocation of the participant includes a combination of one or more of the following situations: Improve the resource allocation of CPU utilization, improve the resource allocation of memory, and improve the resource allocation of storage space;

[0080] When the resource ratio of the participant is lower than the minimum value of the first threshold range, reduce the resource allocation of the participant; the reduction of the resource ratio of the participant includes reducing the CPU utilization of the participant resource allocation.

[0081] The working principle of the above technical solution is: the solution adopted in this embodiment is to allocate the resources of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a big data activity project log analysis and resource allocation method. According to the scheme provided by the invention, a cloud resource host machine log, a virtual machine log, a bastion host log and a monitoring camera equipment log are subjected to log fusion; deploying the resources of the participants based on the cloud resource host machine log and the virtual machine log; and based on the bastion host log and the monitoring camera equipment log, judging whether the participants have illegal operation and malicious operation behaviors or not. The resource configuration of the participants is quickly adjusted in real time by monitoring the resource use conditions of the participants in the activity project in real time, and the efficiency and timeliness of resource configuration are improved. In addition, whether the participants have illegal operation or malicious operation behaviors or not can be judged, so that the safety of data in the process of the activity project is ensured.

Description

technical field [0001] The invention relates to the technical field of big data analysis, in particular to a method for log analysis and resource allocation of big data activity items. Background technique [0002] In the environment of big data, big data analysis has become a hot spot in recent years. Big data analysis is based on the construction of private cloud system, builds a big data system based on the private cloud environment architecture, and provides a comprehensive search and analysis environment in the direction of data mining and analysis in combination with today's big data situation, mainstream equipment, and technology. Through hands-on practical operations, participants will strengthen their understanding of big data technology knowledge and improve their cluster deployment and data analysis capabilities. The operation of the big data platform relies on the cloud computing system, and integrates the computing resources of the cloud computing system with v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/17G06F21/62G06F11/34G06Q10/06
Inventor 单武赵俊房璐陶一瑾穆勇
Owner 北京市大数据中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products