CN107092544A - monitoring method and device - Google Patents

monitoring method and device Download PDF

Info

Publication number
CN107092544A
CN107092544A CN201610349960.8A CN201610349960A CN107092544A CN 107092544 A CN107092544 A CN 107092544A CN 201610349960 A CN201610349960 A CN 201610349960A CN 107092544 A CN107092544 A CN 107092544A
Authority
CN
China
Prior art keywords
node
user
monitoring
information
log information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610349960.8A
Other languages
Chinese (zh)
Other versions
CN107092544B (en
Inventor
王春龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610349960.8A priority Critical patent/CN107092544B/en
Publication of CN107092544A publication Critical patent/CN107092544A/en
Application granted granted Critical
Publication of CN107092544B publication Critical patent/CN107092544B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3017Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is implementing multitasking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

This application discloses a kind of monitoring method and device, it is related to service monitoring technical field, the precision of service monitoring can be improved.The main technical schemes of the application are:When receiving the behavioral data of user, the user identity information of the user is obtained;Detect whether to exist and different nodes are included in monitoring model corresponding with the user identity information, the monitoring model, and binding has preset rules on node;If in the presence of according to the behavioral data, configuring node corresponding with the behavioral data in the monitoring model;According to the preset rules, configuration result is monitored.

Description

Monitoring method and device
Technical field
The application is related to service monitoring technical field, more particularly to a kind of monitoring method and device.
Background technology
Service monitoring is the monitoring to system service interface, is provided particularly directed to system to caller Service related information is monitored, for example, to time-consuming, input parameter, return information, whether report an error, The information such as call number are monitored.The result of service monitoring can be exported by console, can also Journal file is write, or persistence (Persistence) arrives database, and business is performed for system Situation carries out on-line analysis and off-line analysis.
At present, existing service monitoring is all horizontal based on service dimension itself, concrete implementation Mode is:Background monitoring system will belong to same type of user behavior and be counted, during by unit In statistical information weigh the correlated performance of service system, and make the alarm of correlation, i.e., it is just sharp Pinpointed the problems with statistical information macroscopical in the unit interval, and make feedback.For example, background monitoring System all takes together the request of access interface a in one minute, occurs during these requests of detection process Error number whether be more than alarm threshold, if so, then make correlation alarm.
However, for the horizontal monitoring based on service dimension, when not touching corresponding alert if, For unique user the correlation circumstance of service can not be called to make targetedly to feed back, can cause to occur The hidden danger of service system failure, and then the precision of service monitoring can be caused relatively low.For example, user is in net On when making a reservation, only there are many vegetables in one or two shop, when vegetable is loaded, looks into accordingly Service is ask time-consuming very high or cause time-out, when there is a large number of users while accessing the shop and loading vegetable When, service system failure can be caused, but if temporarily only having a small amount of user to trigger this problem, its Quantity is not less than alarm threshold, then existing service monitoring mode be monitoring less than.
The content of the invention
In view of this, the embodiment of the present application provides a kind of monitoring method and device, and main purpose is solution Certainly the service monitoring mode based on service dimension itself horizontal at present, can cause the precision of service monitoring Relatively low the problem of.
To reach above-mentioned purpose, the application provides following technical scheme:
On the one hand, this application provides a kind of monitoring method, including:
When receiving the behavioral data of user, the user identity information of the user is obtained;
Detect whether exist in monitoring model corresponding with the user identity information, the monitoring model Comprising different nodes, and on node, binding has preset rules;
If in the presence of, according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;
According to the preset rules, configuration result is monitored.
On the other hand, this application provides a kind of supervising device, including:
Acquiring unit, user's mark for when receiving the behavioral data of user, obtaining the user Know information;
Detection unit, for detecting whether in the presence of monitoring model corresponding with the user identity information, Different nodes are included in the monitoring model, and binding has preset rules on node;
Dispensing unit, if being detected for the detection unit in the presence of corresponding with the user identity information Monitoring model, then according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;
Monitoring unit, for according to the preset rules, being monitored to configuration result.
By above-mentioned technical proposal, the technical scheme that the embodiment of the present application is provided at least has following advantages:
A kind of monitoring method and device that the embodiment of the present application is provided, when the behavioral data for receiving user When, the user identity information of the user is obtained first;Then detect whether to exist and marked with the user Know and different nodes are included in the corresponding monitoring model of information, the monitoring model, and there be binding on node Preset rules;If in the presence of, according to the behavioral data, configure in the monitoring model with the row For the corresponding node of data;Finally according to the preset rules, configuration result is monitored.With The service monitoring mode based on service dimension itself horizontal at present is compared, the application can by user and The behavior expression of system service, which is built into one and bound, the monitoring models of preset rules, and by with The preset rules bound on the corresponding monitoring model interior joint of user identity information, can detect that user adjusts With the correlation circumstance of service, and then it can realize and call the correlation circumstance of service to make for unique user Targetedly feed back, so as to accomplish the real-time monitoring based on user's dimension, improve service system Unite to the perception of unique user behavior, completed by the quality and state of monitoring model pair User and the monitoring of respective service, improve the precision of service monitoring.
Described above is only the general introduction of technical scheme, in order to better understand the application's Technological means, and being practiced according to the content of specification, and in order to allow the above-mentioned of the application and Other objects, features and advantages can become apparent, below especially exemplified by the embodiment of the application.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, various other advantage and benefit for Those of ordinary skill in the art will be clear understanding.Accompanying drawing is only used for showing the mesh of preferred embodiment , and it is not considered as the limitation to the application.And in whole accompanying drawing, with identical with reference to symbol Number represent identical part.In the accompanying drawings:
Fig. 1 shows a kind of flow chart for monitoring method that the embodiment of the present application is provided;
Fig. 2 shows the flow chart for another monitoring method that the embodiment of the present application is provided;
Fig. 3 shows a kind of example schematic for directed cyclic graph model that the embodiment of the present application is provided;
Fig. 4 shows a kind of monitoring system example schematic that the embodiment of the present application is provided;
Fig. 5 shows a kind of structural representation for supervising device that the embodiment of the present application is provided;
Fig. 6 shows the structural representation for another supervising device that the embodiment of the present application is provided.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although showing in accompanying drawing The exemplary embodiment of the disclosure is shown, it being understood, however, that may be realized in various forms the disclosure Without that should be limited by embodiments set forth here.Conversely it is able to more there is provided these embodiments Thoroughly understand the disclosure, and can be by the technology for conveying to this area of the scope of the present disclosure completely Personnel.
The embodiment of the present application provides a kind of monitoring method, as shown in figure 1, methods described includes:
101st, when receiving the behavioral data of user, the user identity information of user is obtained.
Wherein, the user identity information can be user's name information, ID (Identity, identity mark Know number) number, IP address etc..The data about user behavior can be included in the behavioral data, It can specifically be acquired according to the corresponding log information of server, can also be collected and obtained by client Obtain, when user behavior data is acquired according to the corresponding log information of server, user Behavioral data can be the corresponding log information of user.
It should be noted that can be for configuration in the server for the executive agent of the embodiment of the present application Supervising device, or configuration monitoring module in the server etc..For example, server is right When the service request for being currently received client transmission is handled, corresponding log information is have recorded, And the supervising device in server is passed to, the supervising device is after the log information is received, from day User identity information is obtained in will information.
102nd, detect whether there is monitoring model corresponding with user identity information.
Wherein, different nodes are included in the monitoring model, and binding has preset rules on node.One Individual node can correspond to a user behavior type, i.e., in monitoring model corresponding with user identity information In have recorded the node of different user behavior type corresponding with user mark, and the user behavior Type can be to call the behavior types such as service interface, for example, accessing shop a service by calling Interface, accesses the shop a page.The preset rules can be by technical staff according to user behavior class The actual demand of type writes and in the corresponding presetting database of configuration server in advance, for example, user Behavior type is the access shop b pages, and in order to detect whether the net for having to the shop b pages Network reptile crawls behavior, the preset rules that will can be bound on node corresponding with the user behavior type It is configured to the node and is accessed number of times less than alarm threshold.
Specifically, it whether there is monitoring model corresponding with user identity information in detection service device.It is right In the embodiment of the present application, a user identity information can correspond to a monitoring model, if server In monitoring model corresponding with user identity information is not present, can be created, for example, new user When sending service request for the first time by client, received in server at the service request and progress During reason, monitoring model corresponding with the new user identity information can be created.Specifically, monitoring model In node can be configured according to behavioral data, for example, according to the user recorded in log information Behavior type, the log information is filled into corresponding node object, while can save this The access times of point are accumulative Jia 1;And the corresponding preset rules of the node can be corresponding according to the node User behavior type, obtains from presetting database and binds on this node.
It should be noted that can specifically be detected by calculating the corresponding cryptographic Hash of user identity information It whether there is monitoring model corresponding with user identity information in server.For example, working as in server , can be with during the corresponding cryptographic Hash of recorded user identity information, it may be determined that the user is old user Monitoring model corresponding with the user identity information is obtained from presetting database;When not having in server When recording the corresponding cryptographic Hash of user identity information, it may be determined that the user is new user, it is necessary to create The corresponding monitoring model of the new user, and record the corresponding cryptographic Hash of the new user identity information.
If the 103, in the presence of monitoring model corresponding with user identity information, according to behavioral data, configuration The node corresponding with behavioral data in monitoring model.
For example, in the log information received user behavior type for access vegetable list page, from with Determined in monitoring model corresponding to family identification information with the corresponding node of access vegetable list page, and by day Will information is filled into the node.
104th, according to preset rules, configuration result is monitored.
For example, ought detect that server is to vegetable list page service interface in the newly-increased log information of egress Acquisition request when being handled the consumed time more than or equal to 200 milliseconds of alarm threshold, it is determined that The corresponding preset rules of the node, and corresponding log information are not met with the node postponed In user identity information be user a, at this moment can export the corresponding nodes of user a with postponing renewal Monitoring figure, so that monitoring personnel judges that exception occurs in user a;Monitoring device correspondence can also be passed through Display screen show that user a accesses the time-consuming text more than or equal to 200 milliseconds of loading of vegetable list page Word warning information, at the same can by the corresponding audio output outputting alarm audio of monitoring device, with Just operation maintenance personnel is reminded to carry out associated maintenance in time.
A kind of monitoring method that the embodiment of the present application is provided, it is first when receiving the behavioral data of user First obtain the user identity information of the user;Then detect whether exist and the user identity information Different nodes are included in corresponding monitoring model, the monitoring model, and binding has default rule on node Then;If in the presence of, according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;Finally according to the preset rules, configuration result is monitored.With current horizontal stroke To the service monitoring mode based on service dimension itself compare, the application can take user and system The behavior expression of business is built into one and binds the monitoring model for having preset rules, and by being marked with user Know the preset rules bound on the corresponding monitoring model interior joint of information, can detect that user calls service Correlation circumstance, and then can realize that calling the correlation circumstance of service to make for unique user is directed to The feedback of property, so as to accomplish the real-time monitoring based on user's dimension, improves service system to list The perception of individual user behavior, completed by the quality and state of monitoring model to user and The monitoring of respective service, improves the precision of service monitoring.
Further, the embodiment of the present application provides another monitoring method, as shown in Fig. 2 described Method includes:
201st, when detecting the log information for existing in default journal file and increasing newly, from log information Obtain user identity information.
Wherein, clothes of the server to each transmission of different clients are preserved in the default journal file The log information that business request is recorded when being handled.For example, have recorded client correspondence in log information The longitude and latitude of position, place city, the time for receiving service request, the sign string of service request, use Family mobile phone IP (agreement interconnected between Internet Protocol, network) address, mobile phone operating system class Network environment information etc. residing for type, user.The user identity information can be user's name information, ID Number, IP address etc..
Specifically, when server receives the service request of client transmission, server is according to service The service fields information that is carried in request and an information is buried, service request is handled, returned Object information.Wherein, the longitude and latitude of client correspondence position can be included in the service fields information The information such as lon and lat, place city city.Described bury can be comprising reception service request in an information Time current_time, service request sign string rn, user mobile phone IP address, mobile phone operating system The information such as network environment residing for type os, user.It can be included to service in the returning result information Request handle consumed time, whether the information such as normal returning result, user behavior type.
Then server is according to returning result information, service fields information and buries an information, generates daily record Information is simultaneously stored in default journal file.For example, user accesses shop list page by client, Client collects the service fields information of the operation and buries an information, and regard both information as parameter The shop list page acquisition of information interface for calling service end to provide, it is corresponding that service end receives this operation Service request, and by various inquiries, calculating logic, return result to client.Service simultaneously End by the service fields information of service request, bury an information and returning result information is arrived by log recording In default journal file, form can be as follows:
lon:120.11111;lat:30.11111;city:330100;current_time:2016-02-01
12:30:12;rn:46e86a2697014;ip:10.111.22.11;os:iphone5;.....
202nd, it whether there is monitoring model corresponding with user identity information in detection service device.
Wherein, different nodes, node one user behavior class of correspondence are included in the monitoring model There being binding in type, and node also includes the corresponding incidence edge of node in preset rules, the monitoring model. It should be noted that the concrete form of monitoring model can be determined according to specific business demand, it is right In the access behavior of user, the corresponding incidence edge of monitoring model interior joint be all it is directive, therefore, Monitoring model can be Directed Graph Model.For example, user a first accesses webpage A, then webpage clicking A In link jump to access webpage B, in the corresponding monitoring models of user a, webpage A is corresponding Association edge direction between the node 2 corresponding with webpage B of node 1 is to point to node 2 from node 1. The Directed Graph Model can be very good to show the access behavior of user.Further, can also basis It whether there is loop in Directed Graph Model, Directed Graph Model is divided into digraph has ring model and oriented Acyclic graph model, for example, user a first accesses webpage A, then jumps to webpage B, so by webpage A Jumped to again by webpage B in webpage A, the corresponding Directed Graph Models of user a afterwards and there is loop, therefore The corresponding monitoring models of user a are directed cyclic graph model.
Specifically, can by the user behavior on APP (Application, application program), the page, Interface etc. is reasonably encoded, and the node correspondence being built into a monitoring model, monitoring model The page, the return information and page self information of the attribute corresponding with service interface of node, the association of node Side correspondence user behavior, incidence edge attribute correspondence user behavior bury an information (facility information, Call service interface information etc.).Preset rules can be bound on node, preset rules can specifically divide For general rule and ad hoc rules, for example, ad hoc rules is configurable to the corresponding section of shop list page Number of times is accessed in one minute of point to be less than 100 times, is more than or is waited if being accessed number of times in one minute Just alerted in 100 times, this ad hoc rules is applied to crawl web crawlers the service prison of the behaviors such as data Control;General rule, which is configurable to take the loading of node corresponding page, is less than 200 milliseconds, if plus Carry the time-consuming just alarm more than or equal to 200 milliseconds.
For example, as shown in figure 3, the take-away APP clients that user is installed by mobile phone access shop row Table page, vegetable list page, lower single page and order list page, it is corresponding with the user identity information oriented Have and there is corresponding node in ring graph model, be shop list page node, vegetable list page section respectively Point, lower single page node, order list page node, wherein, there be in real time binding on the list page node of shop Rule, specially when the consumption that server pair service interface request corresponding with shop list page is handled When more than 200 milliseconds when just trigger alarm;Binding has rule and clocking discipline in real time on lower single page node, Rule specially returns tight after server is handled the request of lower single page corresponding service interface in real time Alarm is just triggered during weight mistake, and clocking discipline is specially not place an order successfully within 10 minutes just to send one Red packet message is to user.
It should be noted that can specifically be detected by calculating the corresponding cryptographic Hash of user identity information With the presence or absence of monitoring model corresponding with user identity information.For example, user's mark ought have recorded During the corresponding cryptographic Hash of information, it may be determined that the user is old user, can be obtained from presetting database Take monitoring model corresponding with the user identity information;Breathed out when no record user identity information is corresponding During uncommon value, it may be determined that the user is new user, it is necessary to create the corresponding monitoring model of the new user, And record the corresponding cryptographic Hash of the new user identity information.
If there is monitoring model corresponding with user identity information in 203a, server, from monitoring model It is middle to determine node corresponding with user behavior type in log information.
For the embodiment of the present application, also include before step 203a:Detect in the monitoring model whether In the presence of node corresponding with user behavior type in the log information;If being not present, create and institute The corresponding node of user behavior type in log information is stated, and according to the log information to the node Configured;Step 205a can specifically include:If in the presence of, from the monitoring model determine with The corresponding node of user behavior type in the log information.
If for example, in monitoring model be not present node corresponding with user behavior type in log information, Corresponding node can be created in the monitoring model, log information is filled into the node, by this The accessed number of times of node is configured to 1 time, and is obtained and the user behavior class from presetting database The corresponding preset rules of type are simultaneously bound on this node.
204a, according to log information configuration node.
For the embodiment of the present application, step 206a can specifically include:According in the log information Service fields information and bury an information, configure the corresponding incidence edge of the node;Believed according to the daily record Returning result information in breath, configures the node.
Whether 205a, detection meet the preset rules being bundled on node with the node postponed.
For the embodiment of the present application, if the preset rules bound on the node are in prefixed time interval The corresponding access times of the interior node are less than preset times threshold value, wherein, the prefixed time interval And preset times threshold value can be configured according to the actual demand of business, for example, between preset time Every being configurable to 5 seconds, 30 seconds etc., and preset times threshold value be configurable to 50 times, it is 100 inferior. Step 204a can specifically include:The node is configured and by the node pair according to the log information The access times answered are added up.And step 205a can specifically include:Detection is in the preset time Whether the access times of the node are less than the preset times threshold value in interval;If when described default Between be spaced in the node access times be more than or equal to the preset times threshold value, it is determined that configuration The node afterwards does not meet the preset rules being bundled on the node.
For example, the preset rules bound on node are that the corresponding access times of the node are less than in 30 seconds 50 times, log information is filled into the node, and Jia 1 by the corresponding access times of the node are accumulative, And detect whether the access times in the node 30 seconds are less than 50 times, the access in the node 30 seconds When number of times is less than 50 times, it is determined that meeting the preset rules of binding on this node with the node postponed;When When access times in the node 30 seconds are more than or equal to 50 times, it is determined that not met with the node postponed The preset rules of binding on this node.
For the embodiment of the present application, if the preset rules bound on the node are that service request is carried out Processing the consumed time is less than preset time threshold, wherein, the preset time threshold can basis The actual demand of business is configured, for example, preset time threshold be configurable to 200 milliseconds, 220 Millisecond etc..Step 205a can specifically include:Detect in the newly-increased log information of the node to service Request is handled whether the consumed time is less than the preset time threshold;If the time is more than Or equal to the preset time threshold, it is determined that do not met with the node postponed and be bundled in the section Preset rules on point.
For example, the preset rules bound on node handle what is consumed by server to service request progress Time is less than 200 milliseconds, detects that server is carried out to service request in the newly-increased log information of the node Whether processing the consumed time is less than 200 milliseconds, when server in the log information that the node is increased newly When being handled service request the consumed time less than 200 milliseconds, it is determined that with the node symbol postponed Close the preset rules of binding on this node;When the node increase newly log information in server to service When request is handled the consumed time more than or equal to 200 milliseconds, it is determined that with the node postponed not Meet the preset rules of binding on this node.
If corresponding with user identity information with being not present in step 203b that step 203a is arranged side by side, server Monitoring model, then create corresponding with user identity information monitoring model.
204b, according to log information, node in configuration monitoring model and corresponding with node default Rule.
Specifically, the user behavior type in log information, log information is filled into and the use In the corresponding node of family behavior type, and the access times of the node are configured to 1 time, and from pre- If obtaining preset rules corresponding with the user behavior type in database and being bundled on the node.
For the embodiment of the present application, also include after step 206b:Detection with the node that postpones whether Meet the preset rules of binding on this node.
For example, when detecting the log information for existing in default journal file and increasing newly, by log information Real-time computing engines jstorm clusters are sent to, jstorm clusters obtain log information and entered according to ID Row cryptographic Hash is verified, and is determined that monitoring model corresponding with User IP is not present in server, is then selected This log information is identified one machine jstorm_node, can identify following information:
The current time:2016-02-01 12:30:12
Behavior type:Access shop homepage
Whether normally return:It is
It is time-consuming:120ms
Corresponding user's mark:ip:10.111.22.11
。。。。。
According to above- mentioned information, a newly-built monitoring model, the user behavior type in log information, Log information is filled into monitoring model node corresponding with the user behavior type, and by the node Access times be configured to 1 time, and from presetting database obtain it is corresponding with the user behavior type Preset rules and bind on this node, finally trigger a series of binding default rule on this node Then, preset rules here are that whether the accessed number of times of the node is more than in continuous one minute of task Or equal to alarm threshold, if the number of times is more than or equal to alarm threshold, alerted.
If the 206, detecting not meeting the preset rules being bundled on node with the node postponed, export Warning information.
Wherein, the warning information can be text alert information, picture warning information, audible alarm Information, visual alarm information etc..
If for example, the preset rules bound on node access for node within a preset time interval is corresponding Number of times is less than preset times threshold value, and the access times when detection egress within a preset time interval During more than or equal to preset times threshold value, outputting alarm information, to remind operation maintenance personnel timely Carry out associated maintenance.
It should be noted that information (the bag that the follow-up a series of behavior of user and service end can be returned to Include service related information:Such as take, whether report an error etc.) constantly collected, and continue structure Build the corresponding monitoring model of user.For example, as shown in figure 4, the corresponding monitoring model of user can be Persistently build and safeguarded in the internal memory of jstorm clusters, so as to construct the service based on user's dimension Monitoring system.In this service monitoring system, behavior of the user on APP in certain time A monitoring model can be corresponded to, the rule that this monitoring model is bound above can be triggered in real time, So as to accomplish the real-time monitoring based on user's dimension.
Further, until the corresponding rule of triggering or more than the regular hour monitoring model no longer by During access, monitoring model relevant information serializing is stored into database for future use.
Another monitoring method that the embodiment of the present application is provided, when receiving the behavioral data of user, The user identity information of the user is obtained first;Then detect whether to exist to identify with the user and believe Cease and different nodes are included in corresponding monitoring model, the monitoring model, and binding has default on node Rule;If in the presence of, according to the behavioral data, configure in the monitoring model with the behavior number According to corresponding node;Finally according to the preset rules, configuration result is monitored.With it is current The horizontal service monitoring mode based on service dimension itself is compared, and the application can be by user and system The behavior expression of service, which is built into one and bound, the monitoring models of preset rules, and by with user The preset rules bound on monitoring model interior joint corresponding to identification information, can detect that user calls clothes The correlation circumstance of business, and then can realize and call the correlation circumstance of service to make pin for unique user To the feedback of property, so as to accomplish the real-time monitoring based on user's dimension, service system pair is improved The perception of unique user behavior, is completed to user by the quality and state of monitoring model With the monitoring of respective service, the precision of service monitoring is improved.
Further, implementing as method shown in Fig. 1, the embodiment of the present application provides one kind Supervising device, as shown in figure 5, described device can include:Acquiring unit 51, detection unit 52, Dispensing unit 53, monitoring unit 54.
The acquiring unit 51, can be used for when receiving the behavioral data of user, obtain described use The user identity information at family.The acquiring unit 51 is user in acquisition user behavior data in the present apparatus The main functional modules of identification information.
The detection unit 52, can be used in detection service device whether there is to identify with the user believing Cease and different nodes are included in corresponding monitoring model, the monitoring model, and binding has default on node Rule.The detection unit 52 is to be used in detection service device with the presence or absence of monitoring model in the present apparatus Main functional modules.
The dispensing unit 53, if can be used for the detection unit 52 detects exist and the user Monitoring model corresponding to identification information, then according to the behavioral data, configure in the monitoring model with The corresponding node of the behavioral data.The dispensing unit 53 be the present apparatus according to user behavior number According to the main functional modules of configuration monitoring model node.
The monitoring unit 54, can be used for, according to the preset rules, being monitored configuration result. The monitoring unit 54 is the main functional modules of progress service monitoring in the present apparatus.
It should be noted that the device embodiment is corresponding with preceding method embodiment, specifically it may be referred to Correspondence description in Fig. 1, for ease of reading, present apparatus embodiment is no longer in preceding method embodiment Detail content repeated one by one, it should be understood that the device in the present embodiment can correspond to realize Full content in preceding method embodiment.
A kind of supervising device that the embodiment of the present application is provided, it is first when receiving the behavioral data of user First obtain the user identity information of the user;Then detect whether exist and the user identity information Different nodes are included in corresponding monitoring model, the monitoring model, and binding has default rule on node Then;If in the presence of, according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;Finally according to the preset rules, configuration result is monitored.With current horizontal stroke To the service monitoring mode based on service dimension itself compare, the application can take user and system The behavior expression of business is built into one and binds the monitoring model for having preset rules, and by being marked with user Know the preset rules bound on the corresponding monitoring model interior joint of information, can detect that user calls service Correlation circumstance, and then can realize that calling the correlation circumstance of service to make for unique user is directed to The feedback of property, so as to accomplish the real-time monitoring based on user's dimension, improves service system to list The perception of individual user behavior, completed by the quality and state of monitoring model to user and The monitoring of respective service, improves the precision of service monitoring.
Further, implementing as method shown in Fig. 2, the embodiment of the present application provides another Supervising device is planted, as shown in fig. 6, described device can include:Acquiring unit 61, detection unit 62, Dispensing unit 63, monitoring unit 64.
The acquiring unit 61, can be used for when receiving the behavioral data of user, obtain described use The user identity information at family.The acquiring unit 61 is user in acquisition user behavior data in the present apparatus The main functional modules of identification information.
The detection unit 62, can be used in detection service device whether there is to identify with the user believing Cease and different nodes are included in corresponding monitoring model, the monitoring model, and binding has default on node Rule.The detection unit 62 is to be used in detection service device with the presence or absence of monitoring model in the present apparatus Main functional modules.
The dispensing unit 63, if can be used for the detection unit 62 detects exist and the user Monitoring model corresponding to identification information, then according to the behavioral data, configure in the monitoring model with The corresponding node of the behavioral data.The dispensing unit 63 be the present apparatus according to user behavior number According to the main functional modules of configuration monitoring model node.
The monitoring unit 64, can be used for, according to the preset rules, being monitored configuration result. The monitoring unit 64 is the main functional modules of progress service monitoring in the present apparatus.
Specifically, the monitoring unit 64 includes:Detection module 641, output module 642.
The detection module 641, can be used for detection with whether the node postponed meets and is bundled in the section Preset rules on point.
The output module 642, is detected with the node postponed if can be used for the detection module 641 The preset rules being bundled on the node are not met, then outputting alarm information.
Alternatively, the behavioral data can be the corresponding log information of user, in the monitoring model One node one user behavior type of correspondence.
Further, the dispensing unit 63 includes:Determining module 631, configuration module 632.
The determining module 631, can be used for from the monitoring model in determination and the log information The corresponding node of user behavior type.
The configuration module 632, can be used for configuring the determining module determination according to the log information Node.
If the preset rules bound on the node are visited for the node within a preset time interval is corresponding Ask that number of times is less than preset times threshold value, the configuration module 632 specifically can be used for according to the daily record Node described in information configuration is simultaneously added up the corresponding access times of the node.
The detection module 641, specifically can be used for detection node in the prefixed time interval Access times whether be less than the preset times threshold value.
The detection module 641, if specifically can be also used for detecting the institute in the prefixed time interval The access times for stating node are more than or equal to the preset times threshold value, it is determined that with the section postponed Point does not meet the preset rules being bundled on the node.
If the preset rules bound on the node handle what is consumed by server to service request progress Time is less than preset time threshold, and the detection module 641 specifically can be used for detecting that the node is new Whether server is handled service request the consumed time less than described pre- in the log information of increasing If time threshold.
The detection module 641, if specifically can be also used for detecting the time more than or equal to described Preset time threshold, it is determined that do not met with the node postponed and be bundled in presetting on the node Rule.
The acquiring unit 61, specifically can be used for detecting in the default journal file in the presence of new During the log information of increasing, user identity information is obtained from the log information, wherein, it is described default Preserve when server is handled the service request of each transmission of different clients and remember in journal file The log information of record.
Alternatively, the corresponding incidence edge of node can also be included in the monitoring model.
The configuration module 632, specifically can be also used for the service fields letter in the log information Cease and bury an information, configure the corresponding incidence edge of the node.
The configuration module 632, specifically can be also used for the returning result letter in the log information Breath, configures the node.
Further, the dispensing unit 63 also includes:Detection module 633, creation module 634.
The detection module 633, can be also used for detecting in the monitoring model whether there is and the day The corresponding node of user behavior type in will information.
The creation module 634, if can be used for the detection module 633 detects the monitoring model In be not present node corresponding with user behavior type in the log information, then create with the daily record The corresponding node of user behavior type in information.
The configuration module 632, can be also used for according to the log information to the creation module 634 The node of establishment is configured.
The determining module 631, if specifically can be used for the detection module 623 detects the monitoring There is node corresponding with user behavior type in the log information in model, then from the monitoring mould Node corresponding with user behavior type in the log information is determined in type.
Further, described device also includes:Creating unit 65.
The creating unit 65, is used if can be used for the detection unit 62 and detect to be not present with described Monitoring model corresponding to family identification information, then create monitoring model corresponding with the user identity information.
The dispensing unit 63, can be also used for, according to the behavioral data, configuring the creating unit Node and preset rules corresponding with the node in 65 monitoring models created.
Alternatively, the monitoring model can be Directed Graph Model.
It should be noted that the device embodiment is corresponding with preceding method embodiment, specifically it may be referred to Correspondence description in Fig. 2, for ease of reading, present apparatus embodiment is no longer in preceding method embodiment Detail content repeated one by one, it should be understood that the device in the present embodiment can correspond to realize Full content in preceding method embodiment.
The supervising device includes processor and memory, above-mentioned acquiring unit, detection unit, configuration Unit, monitoring unit, creating unit etc. are stored in memory, by processor as program unit The said procedure unit of storage in memory is performed to realize corresponding function.
Kernel is included in processor, is gone in memory to transfer corresponding program unit by kernel.Kernel can To set one or more, being tieed up based on service for current transverse direction in itself is solved by adjusting kernel parameter The service monitoring mode of degree, can cause the problem of precision of service monitoring is relatively low.
Memory potentially includes the volatile memory in computer-readable medium, random access memory The form such as device (RAM) and/or Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM), memory includes at least one storage chip.
Another supervising device that the embodiment of the present application is provided, when receiving the behavioral data of user, The user identity information of the user is obtained first;Then detect whether to exist to identify with the user and believe Cease and different nodes are included in corresponding monitoring model, the monitoring model, and binding has default on node Rule;If in the presence of, according to the behavioral data, configure in the monitoring model with the behavior number According to corresponding node;Finally according to the preset rules, configuration result is monitored.With it is current The horizontal service monitoring mode based on service dimension itself is compared, and the application can be by user and system The behavior expression of service, which is built into one and bound, the monitoring models of preset rules, and by with user The preset rules bound on monitoring model interior joint corresponding to identification information, can detect that user calls clothes The correlation circumstance of business, and then can realize and call the correlation circumstance of service to make pin for unique user To the feedback of property, so as to accomplish the real-time monitoring based on user's dimension, service system pair is improved The perception of unique user behavior, is completed to user by the quality and state of monitoring model With the monitoring of respective service, the precision of service monitoring is improved.
Present invention also provides a kind of computer program product, when being performed on data processing equipment, It is adapted for carrying out the program code of initialization there are as below methods step:When receiving the behavioral data of user, Obtain the user identity information of the user;Detect whether in the presence of corresponding with the user identity information Different nodes are included in monitoring model, the monitoring model, and binding has preset rules on node;If In the presence of corresponding with the behavioral data in the configuration monitoring model then according to the behavioral data Node;According to the preset rules, configuration result is monitored.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system, Or computer program product.Therefore, the application can be implemented using complete hardware embodiment, complete software The form of embodiment in terms of example or combination software and hardware.Moreover, the application can be used at one Or multiple computer-usable storage mediums for wherein including computer usable program code are (including but not Be limited to magnetic disk storage, CD-ROM, optical memory etc.) on the computer program product implemented Form.
The application is produced with reference to according to the monitoring method of the embodiment of the present application, device and computer program The flow chart and/or block diagram of product is described.It should be understood that can be by computer program instructions implementation process In figure and/or each flow and/or square frame and flow chart and/or block diagram in block diagram The combination of flow and/or square frame.These computer program instructions can be provided to all-purpose computer, special The processor of computer, Embedded Processor or other programmable data processing devices is to produce a machine Device so that produced by the instruction of computer or the computing device of other programmable data processing devices For realizing in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames In the device of function specified.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable datas to handle In the computer-readable memory that equipment works in a specific way so that be stored in this and computer-readable deposit Instruction in reservoir, which is produced, includes the manufacture of command device, and command device realization is in flow chart one The function of being specified in flow or multiple flows and/or one square frame of block diagram or multiple square frames.
These computer program instructions can also be loaded into computer or other programmable data processing devices On so that series of operation steps is performed on computer or other programmable devices to produce computer The processing of realization, so that the instruction performed on computer or other programmable devices is provided for realizing Specified in one flow of flow chart or multiple flows and/or one square frame of block diagram or multiple square frames The step of function.
In a typical configuration, computing device include one or more processors (CPU), input/ Output interface, network interface and internal memory.
Memory potentially includes the memory permanently or non-permanently in computer-readable medium, with The form such as machine access memory (RAM) and/or Nonvolatile memory, such as read-only storage (ROM) or sudden strain of a muscle Deposit (flash RAM).Memory is the example of computer-readable medium.
Embodiments herein is these are only, the application is not limited to.For this area skill For art personnel, the application can have various modifications and variations.It is all spirit herein and principle it Interior made any modification, equivalent substitution and improvements etc., should be included in claims hereof model Within enclosing.

Claims (20)

1. a kind of monitoring method, it is characterised in that including:
When receiving the behavioral data of user, the user identity information of the user is obtained;
Detect whether exist in monitoring model corresponding with the user identity information, the monitoring model Comprising different nodes, and on node, binding has preset rules;
If in the presence of, according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;
According to the preset rules, configuration result is monitored.
2. monitoring method according to claim 1, it is characterised in that described according to described pre- If regular, configuration result is monitored, specifically included:
Whether detection meets the preset rules being bundled on the node with the node postponed;
If it is not, then outputting alarm information.
3. monitoring method according to claim 2, it is characterised in that the behavioral data is use Node one user behavior type of correspondence in the corresponding log information in family, the monitoring model,
It is described according to the behavioral data, configure corresponding with the behavioral data in the monitoring model Node, specifically include:
Node corresponding with user behavior type in the log information is determined from the monitoring model;
The node is configured according to the log information.
4. monitoring method according to claim 3, it is characterised in that if being bound on the node Preset rules be less than preset times threshold for corresponding access times of the node within a preset time interval Value, it is described that the node is configured according to the log information, specifically include:
The node is configured according to the log information and the corresponding access times of the node are tired out Plus;
Whether the detection meets the preset rules being bundled on the node with the node postponed, specifically Including:
Detect whether the access times of the node in the prefixed time interval are less than described default time Number threshold value;
If the access times of the node are more than or equal to described default time in the prefixed time interval Number threshold value, it is determined that the preset rules being bundled on the node are not met with the node postponed.
5. monitoring method according to claim 3, it is characterised in that if being bound on the node Preset rules to be handled service request the consumed time less than preset time threshold, it is described Whether detection meets the preset rules being bundled on the node with the node postponed, specifically includes:
Detecting, consumed time is handled service request in the newly-increased log information of the node is It is no to be less than the preset time threshold;
If the time is more than or equal to the preset time threshold, it is determined that with the node postponed The preset rules being bundled on the node are not met.
6. monitoring method according to claim 3, it is characterised in that described to receive user Behavioral data when, obtain the user identity information of the user, specifically include:
When detecting the log information for existing in default journal file and increasing newly, from the log information User identity information is obtained, wherein, server is preserved to different clients in the default journal file The log information recorded when holding the service request sent every time to be handled.
7. monitoring method according to claim 3, it is characterised in that in the monitoring model also Comprising the corresponding incidence edge of node,
It is described that the node is configured according to the log information, specifically include:
Service fields information in the log information is corresponded to an information, the configuration node is buried Incidence edge;
Returning result information in the log information, configures the node.
8. monitoring method according to claim 3, it is characterised in that described from the monitoring mould Determined in type before node corresponding with user behavior type in the log information, methods described is also wrapped Include:
Detect in the monitoring model with the presence or absence of corresponding with user behavior type in the log information Node;
If being not present, node corresponding with user behavior type in the log information, and root are created The node is configured according to the log information;
It is described that section corresponding with user behavior type in the log information is determined from the monitoring model Point, is specifically included:
If in the presence of determination and user behavior type pair in the log information from the monitoring model The node answered.
9. monitoring method according to claim 1, it is characterised in that described to detect whether exist After monitoring model corresponding with the user identity information, methods described also includes:
If being not present, monitoring model corresponding with the user identity information is created;
According to the behavioral data, node in the monitoring model is configured and corresponding with the node Preset rules.
10. the monitoring method according to any one of claim 1 to 9, it is characterised in that described Monitoring model is Directed Graph Model.
11. a kind of supervising device, it is characterised in that including:
Acquiring unit, user's mark for when receiving the behavioral data of user, obtaining the user Know information;
Detection unit, for detecting whether in the presence of monitoring model corresponding with the user identity information, Different nodes are included in the monitoring model, and binding has preset rules on node;
Dispensing unit, if being detected for the detection unit in the presence of corresponding with the user identity information Monitoring model, then according to the behavioral data, configure in the monitoring model with the behavioral data Corresponding node;
Monitoring unit, for according to the preset rules, being monitored to configuration result.
12. supervising device according to claim 11, it is characterised in that the monitoring unit bag Include:
Detection module, presetting on the node is bundled in for detecting whether to meet with the node postponed Rule;
Output module, institute is bundled in if detecting not meeting with the node postponed for the detection module The preset rules on node are stated, then outputting alarm information.
13. supervising device according to claim 12, it is characterised in that the behavioral data is Node one user behavior type of correspondence in the corresponding log information of user, the monitoring model, The dispensing unit includes:
Determining module, for being determined from the monitoring model and user behavior class in the log information The corresponding node of type;
Configuration module, for configuring the node that the determining module is determined according to the log information.
14. supervising device according to claim 13, it is characterised in that if being tied up on the node Fixed preset rules are less than preset times for the corresponding access times of the node within a preset time interval Threshold value,
The configuration module, specifically for configuring the node and by the section according to the log information The corresponding access times of point are added up;
The detection module, the access specifically for detecting the node in the prefixed time interval Whether number of times is less than the preset times threshold value;
The detection module, if being specifically additionally operable to detect the node in the prefixed time interval Access times be more than or equal to the preset times threshold value, it is determined that be not inconsistent with the node postponed Close the preset rules being bundled on the node.
15. supervising device according to claim 13, it is characterised in that if being tied up on the node Fixed preset rules are less than preset time threshold to be handled service request the consumed time,
To service request in the detection module, the log information newly-increased specifically for detecting the node Handled whether the consumed time is less than the preset time threshold;
The detection module, if be specifically additionally operable to detect that the time is more than or equal to described default Between threshold value, it is determined that the preset rules being bundled on the node are not met with the node postponed.
16. supervising device according to claim 13, it is characterised in that
, there is newly-increased day in the default journal file specifically for working as to detect in the acquiring unit During will information, user identity information is obtained from the log information, wherein, the default daily record text The day recorded when server is handled the service request of each transmission of different clients is preserved in part Will information.
17. supervising device according to claim 13, it is characterised in that in the monitoring model The corresponding incidence edge of node is also included,
The configuration module, is specifically additionally operable to the service fields information in the log information and buries Point information, configures the corresponding incidence edge of the node;
The configuration module, is specifically additionally operable to the returning result information in the log information, matches somebody with somebody Put the node.
18. supervising device according to claim 13, it is characterised in that the dispensing unit is also Including:Detection module and creation module;
The detection module, for detect in the monitoring model whether there is with the log information The corresponding node of user behavior type;
The creation module, if for the detection module detect in the monitoring model be not present with The corresponding node of user behavior type in the log information, then create and user in the log information The corresponding node of behavior type;
The configuration module, is additionally operable to the node created according to the log information to the creation module Configured;
The determining module, if detecting exist in the monitoring model specifically for the detection module Node corresponding with user behavior type in the log information, then from the monitoring model determine with The corresponding node of user behavior type in the log information.
19. supervising device according to claim 11, it is characterised in that described device also includes: Creating unit;
The creating unit, believes if detecting to be not present to identify with the user for the detection unit Corresponding monitoring model is ceased, then creates monitoring model corresponding with the user identity information;
Dispensing unit, is additionally operable to according to the behavioral data, configures the monitoring that the creating unit is created Node and preset rules corresponding with the node in model.
20. the supervising device according to any one of claim 11 to 19, it is characterised in that institute Monitoring model is stated for Directed Graph Model.
CN201610349960.8A 2016-05-24 2016-05-24 Monitoring method and device Expired - Fee Related CN107092544B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610349960.8A CN107092544B (en) 2016-05-24 2016-05-24 Monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610349960.8A CN107092544B (en) 2016-05-24 2016-05-24 Monitoring method and device

Publications (2)

Publication Number Publication Date
CN107092544A true CN107092544A (en) 2017-08-25
CN107092544B CN107092544B (en) 2020-09-15

Family

ID=59648831

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610349960.8A Expired - Fee Related CN107092544B (en) 2016-05-24 2016-05-24 Monitoring method and device

Country Status (1)

Country Link
CN (1) CN107092544B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107562551A (en) * 2017-09-05 2018-01-09 北京小度信息科技有限公司 Monitoring method, device and the computer-readable recording medium of outside access system
CN108228431A (en) * 2018-01-04 2018-06-29 北京中关村科金技术有限公司 A kind of method and system of configurationization reptile quality-monitoring
CN108322350A (en) * 2018-02-27 2018-07-24 阿里巴巴集团控股有限公司 Business monitoring method and device and electronic equipment
CN109583758A (en) * 2018-11-30 2019-04-05 广州净松软件科技有限公司 Early warning rule modification method, device and the computer equipment of observation system
CN109766370A (en) * 2018-12-27 2019-05-17 口碑(上海)信息技术有限公司 Data processing method, data service system and equipment
CN109961200A (en) * 2017-12-25 2019-07-02 北京嘀嘀无限科技发展有限公司 Monitoring and reminding method, monitoring and reminding system, computer equipment and storage medium
CN110120964A (en) * 2018-02-07 2019-08-13 北京三快在线科技有限公司 User behavior monitoring method and device and calculating equipment
CN110489311A (en) * 2019-03-01 2019-11-22 北京亿赛通科技发展有限责任公司 Automatic detection computer user behavior and the method and system for automatically updating detection model
CN110874307A (en) * 2018-08-29 2020-03-10 北京京东尚科信息技术有限公司 Event buried point collecting and reporting method and device
CN111045950A (en) * 2019-12-16 2020-04-21 上海钧正网络科技有限公司 Method and device for determining performance problem point, data analysis system and storage medium
US11017340B2 (en) 2017-12-05 2021-05-25 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for cheat examination
CN112839008A (en) * 2019-11-22 2021-05-25 北京沃东天骏信息技术有限公司 Access monitoring method, device and system
CN113138905A (en) * 2021-05-11 2021-07-20 北京京东拓先科技有限公司 Software function monitoring method and device
CN113941901A (en) * 2020-07-17 2022-01-18 智能云科信息科技有限公司 Machine tool cutter monitoring method and device and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404741A (en) * 2011-11-30 2012-04-04 中国联合网络通信集团有限公司 Method and device for detecting abnormal online of mobile terminal
CN103049163A (en) * 2012-12-28 2013-04-17 华为技术有限公司 Method and device for controlling intelligent displaying of user interfaces
US8645919B2 (en) * 2008-04-16 2014-02-04 Microsoft Corporation Generic validation test framework for graphical user interfaces
CN104636237A (en) * 2015-01-19 2015-05-20 上海新炬网络信息技术有限公司 Monitoring method for Web application system service performance based on Java platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8645919B2 (en) * 2008-04-16 2014-02-04 Microsoft Corporation Generic validation test framework for graphical user interfaces
CN102404741A (en) * 2011-11-30 2012-04-04 中国联合网络通信集团有限公司 Method and device for detecting abnormal online of mobile terminal
CN103049163A (en) * 2012-12-28 2013-04-17 华为技术有限公司 Method and device for controlling intelligent displaying of user interfaces
CN104636237A (en) * 2015-01-19 2015-05-20 上海新炬网络信息技术有限公司 Monitoring method for Web application system service performance based on Java platform

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107562551A (en) * 2017-09-05 2018-01-09 北京小度信息科技有限公司 Monitoring method, device and the computer-readable recording medium of outside access system
US11017340B2 (en) 2017-12-05 2021-05-25 Beijing Didi Infinity Technology And Development Co., Ltd. Systems and methods for cheat examination
CN109961200A (en) * 2017-12-25 2019-07-02 北京嘀嘀无限科技发展有限公司 Monitoring and reminding method, monitoring and reminding system, computer equipment and storage medium
CN108228431A (en) * 2018-01-04 2018-06-29 北京中关村科金技术有限公司 A kind of method and system of configurationization reptile quality-monitoring
CN110120964A (en) * 2018-02-07 2019-08-13 北京三快在线科技有限公司 User behavior monitoring method and device and calculating equipment
CN108322350A (en) * 2018-02-27 2018-07-24 阿里巴巴集团控股有限公司 Business monitoring method and device and electronic equipment
CN108322350B (en) * 2018-02-27 2021-06-01 创新先进技术有限公司 Service monitoring method and device and electronic equipment
CN110874307A (en) * 2018-08-29 2020-03-10 北京京东尚科信息技术有限公司 Event buried point collecting and reporting method and device
CN109583758A (en) * 2018-11-30 2019-04-05 广州净松软件科技有限公司 Early warning rule modification method, device and the computer equipment of observation system
CN109766370A (en) * 2018-12-27 2019-05-17 口碑(上海)信息技术有限公司 Data processing method, data service system and equipment
CN110489311A (en) * 2019-03-01 2019-11-22 北京亿赛通科技发展有限责任公司 Automatic detection computer user behavior and the method and system for automatically updating detection model
CN110489311B (en) * 2019-03-01 2023-04-18 北京亿赛通科技发展有限责任公司 Method and system for automatically detecting computer user behaviors and automatically updating detection model
CN112839008A (en) * 2019-11-22 2021-05-25 北京沃东天骏信息技术有限公司 Access monitoring method, device and system
CN112839008B (en) * 2019-11-22 2024-02-06 北京沃东天骏信息技术有限公司 Access monitoring method, device and system
CN111045950A (en) * 2019-12-16 2020-04-21 上海钧正网络科技有限公司 Method and device for determining performance problem point, data analysis system and storage medium
CN111045950B (en) * 2019-12-16 2023-06-30 上海钧正网络科技有限公司 Performance problem point determining method, device, data analysis system and storage medium
CN113941901A (en) * 2020-07-17 2022-01-18 智能云科信息科技有限公司 Machine tool cutter monitoring method and device and electronic equipment
CN113941901B (en) * 2020-07-17 2024-04-23 智能云科信息科技有限公司 Machine tool cutter monitoring method, machine tool cutter monitoring device and electronic equipment
CN113138905A (en) * 2021-05-11 2021-07-20 北京京东拓先科技有限公司 Software function monitoring method and device

Also Published As

Publication number Publication date
CN107092544B (en) 2020-09-15

Similar Documents

Publication Publication Date Title
CN107092544A (en) monitoring method and device
US9432821B2 (en) Adaptive notification system for mobile devices
US10432669B1 (en) Security appliance to monitor networked computing environment
CN104252479B (en) Processing method, the device and system of information
CN107426252B (en) The method and apparatus of web application firewall service is provided
CN107402880A (en) A kind of method of testing and electronic equipment
CN104753730B (en) A kind of method and device of Hole Detection
CN105531679B (en) The abnormality detection carried out on networking client
CN107015991A (en) Self checking method, device, system and the service apparatus of data consistency
CN106156147B (en) A kind of report sending method based on big data analysis, apparatus and system
US20200327045A1 (en) Test System and Test Method
US20200356462A1 (en) Systems and methods for determining performance metrics of remote relational databases
CN109766502A (en) Page improved method, device, computer equipment and storage medium
CN103095693A (en) Method for positioning and accessing database user host information
CN108134708A (en) The method and apparatus for monitoring third party's interface
CN107168844B (en) Performance monitoring method and device
CN106603464A (en) Network detection method, system and device
CN110380890A (en) A kind of CDN system service quality detection method and system
CN109241435A (en) It is a kind of for digital cash transaction data push method, apparatus and system
RU2015143226A (en) ONLINE PRIVACY MANAGEMENT
US20180329907A1 (en) Reducing data sent from a user device to a server
CN108337100B (en) Cloud platform monitoring method and device
CN107943678A (en) A kind of method for evaluating application access process and evaluation server
CN112383513A (en) Crawler behavior detection method and device based on proxy IP address pool and storage medium
US9378230B1 (en) Ensuring availability of data in a set being uncorrelated over time

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200915