CN111832260B - Method for converting syslog log into universal alarm log of power system - Google Patents

Method for converting syslog log into universal alarm log of power system Download PDF

Info

Publication number
CN111832260B
CN111832260B CN202010452444.4A CN202010452444A CN111832260B CN 111832260 B CN111832260 B CN 111832260B CN 202010452444 A CN202010452444 A CN 202010452444A CN 111832260 B CN111832260 B CN 111832260B
Authority
CN
China
Prior art keywords
rule
log
application
information
syslog
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010452444.4A
Other languages
Chinese (zh)
Other versions
CN111832260A (en
Inventor
严涛松
蒋欣宇
张国浩
丁宇
邢英翔
柏嵩
王伟
汤海宁
张建周
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NARI Nanjing Control System Co Ltd
Original Assignee
NARI Nanjing Control System Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NARI Nanjing Control System Co Ltd filed Critical NARI Nanjing Control System Co Ltd
Priority to CN202010452444.4A priority Critical patent/CN111832260B/en
Publication of CN111832260A publication Critical patent/CN111832260A/en
Application granted granted Critical
Publication of CN111832260B publication Critical patent/CN111832260B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/151Transformation

Abstract

The invention discloses a method for converting syslog logs into general alarm logs of a power system, which defines a log conversion rule and converts the syslog logs into general alarm log contents of the power system based on GB/T31992, which are agreed in technical Specification of network safety monitoring devices of the power monitoring system, based on the rule. The method provided by the invention has universality for syslog log conversion, and meanwhile, the method can reduce repeated development activities of software, shorten project implementation period and reduce application cost.

Description

Method for converting syslog log into universal alarm log of power system
Technical Field
The invention relates to the field of power monitoring and network security monitoring, in particular to a method for converting syslog logs into universal alarm logs of a power system.
Background
In the technical specification of network safety monitoring devices of electric power monitoring systems, safety information of devices such as a collection server, a workstation, a switch, a firewall and transverse isolation is required, the specification agrees that a monitored object needs to upload the safety collection information by using a GB/T31992 format, but for some old station reconstruction, the specification of new delivery cannot be supported, and the syslog log of the monitored device needs to be analyzed to meet the safety information collection required by the specification. The current method for converting the syslog log into the GB/T31992 log by the main stream manufacturer is to develop corresponding syslog log analysis libraries aiming at equipment of different manufacturers and different models, and the method has poor universality and low-efficiency repeated development.
Disclosure of Invention
According to the method for converting the syslog log into the general alarm log of the power system based on rules, the steps of rule matching, information extraction, information recombination and the like can be adopted for the syslog log, so that the syslog log is converted into the general alarm log content of the power system based on GB/T31992, which is agreed by technical Specification of network safety monitoring devices of power monitoring systems (hereinafter referred to as Specification).
The technical scheme adopted by the invention for solving the technical problems is to provide a log conversion method, which comprises the following steps:
based on the predefined log conversion rule,
and converting the syslog log into a general alarm log of the GB/T31992 power system, which is agreed in technical Specification of network safety monitoring devices of the power monitoring system.
Preferably, the predefined log conversion rule is stored in a rule file;
the rule file comprises only one index rule group;
the index rule group at least comprises a list rule item;
the list rule item is composed of application names of syslog logs, and each application name of the list rule item is an application rule group corresponding to the application name;
the list rule item at least comprises an application rule group;
the set of application rules defines rules for extracting information from the syslog log and rules for reorganizing the extracted information.
Specifically, the rule items contained in the application rule group include a mode, a log grade, a log type, a log subtype, a regular expression group, an information reorganization rule, a regular expression matching group and a sub application rule group.
Further, the conversion of the syslog log into the general alarm log of the GB/T31992 power system, which is agreed in the technical specification of the network security monitoring device of the power monitoring system, includes:
step 1, loading a rule file;
step 2, reading a syslog log, and extracting an application name, time and a message body in the syslog log;
step 3, checking whether the application name exists in list rule items in the index rule group, and if so, executing step 4; otherwise, returning to the step 2;
step 4, turning to an application rule group corresponding to the application name, checking whether the application rule group has a regular expression matching group and a sub application rule group, if so, executing step 5, otherwise, executing step 6;
step 5, matching syslog logs by using regular expression matching groups respectively, if matching is successful, recording a serial number X, finding an X-th application rule group name from the sub application rule groups of the application rule groups, and executing step 4;
step 6, extracting information from the syslog message body according to the regular expression group in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing step 7;
step 7, according to the alarm information defined in the technical Specification of the network safety monitoring device of the electric power monitoring system, obtaining the reorganization information according to the information reorganization rule items and the information of the variable $ { X } in the application rule group, and executing step 8;
and 8, generating alarm content in a GB/T31992 format conforming to the technical specification of network safety monitoring devices of electric power monitoring systems according to the log grade, the log type and the log subtype rule items in the application rule group and the reorganization information.
Further, the extracting information from the syslog message body according to the regular expression sets in the application rule sets respectively includes that each regular expression in the regular expression sets only extracts one piece of information;
furthermore, the information according to the information reorganization rule item and the variable $ { X } in the application rule group obtains reorganization information, which includes that the generated reorganization information is a message in a GB/T31992 format meeting the requirements of technical Specification of network safety monitoring devices of electric power monitoring systems.
Advantageous effects
The method for converting the syslog log into the universal alarm log of the power system realizes the content conversion from the syslog log to the GB/T31992 format required by the specification on the content level by using the modes of rule matching, information extraction and information recombination based on rules.
Drawings
Fig. 1 is a syslog log of a switch provided in an embodiment of the present invention, which describes that an admin user successfully logs in to the switch through an IP address 192.168.9.194;
fig. 2 is another switch syslog log provided in an embodiment of the present invention, depicting an admin user logging out of the switch through IP address 192.168.9.194;
FIG. 3 is a diagram of an alarm content meeting the definition of Specification, describing "login success" according to an embodiment of the present invention;
FIG. 4 is another alarm content meeting the definition of Specification, describing "logout", according to an embodiment of the present invention;
FIG. 5 is a diagram of rule content provided by an embodiment of the present invention;
fig. 6 is a syslog log of a switch provided in an embodiment of the present invention, describing enabling of a portal eth 1;
fig. 7 is another switch syslog log provided in an embodiment of the present invention, describing disabling of the portal eth 1;
FIG. 8 is a diagram illustrating a "portal UP" according to the "Specification" definition for providing an alarm content according to the embodiment of the present invention;
FIG. 9 is another alarm content meeting the definition of Specification, describing "Port DOWN", provided by an embodiment of the present invention;
FIG. 10 is another rule content provided by an embodiment of the present invention;
fig. 11 is a log conversion flowchart provided in an embodiment of the present invention.
Detailed Description
The invention is further described below in connection with specific embodiments. The following examples are only for more clearly illustrating the technical aspects of the present invention, and are not intended to limit the scope of the present invention.
As described above, in the prior art, the method for converting the syslog log into the GB/T31992 log is to develop corresponding syslog log parsing libraries for devices of different manufacturers and different models, and this kind of method has poor universality and low-efficiency repetitive development.
After researching the technical problems, the inventor provides a method for converting a syslog log based on rules into a general alarm log of a power system in the specification, which comprises a description format defining the rules and a log conversion step based on the rules.
First, the description format of the rule includes that the description format of the rule is described in an ini file format, specifically:
1) There is and only one "index rule set", namely: the [ rule_index ] group must have a list item under the group, the list item is composed of "application names" of syslog log, each application name must correspond to an application rule group named "application name". The goal of the index rule set is to find an application rule set corresponding to the syslog log according to the application name or log content of the syslog log, and the index rule set may be composed of the following rule items:
2) At least one "application rule group" is provided, the goal of the application rule group is to extract the required information according to the message content of the syslog log through the rule defined by the "application rule group" or match according to the log content of the syslog, and to reorganize the information according to the result rule, the application rule group can be composed of the following rule items:
3) Rule items level, type, subtype in the application rule set correspond to grades, types and subtypes of security events defined in the technical Specification of network security monitoring devices of Power monitoring systems; matchX defines syslog message matching rules; regular x defines a regular expression that extracts information from the syslog message body; result is the definition of the information reorganization rule.
4) Matching the syslog log according to a plurality of regular expressions of the regular item and extracting information, wherein each regular expression only extracts one piece of information;
5) The result information reorganization rule can use the following variable symbols, and the result of the result information reorganization is the message content part in GB/T31992 required by Specification.
Second, the rule-based log conversion step includes, specifically:
s1: loading a rule file;
s2: reading syslog logs, and extracting information such as log application names, time, message bodies and the like;
s3: checking whether the application name of the syslog log is in a list rule item in an index rule group [ rule_index ], and if not, jumping to S2; otherwise, turning to S4, turning to an application rule group corresponding to the application name;
s4: checking whether the matchX and list rule items exist in the application rule group, if so, executing S5, otherwise, executing S6;
s5: matching syslog logs by using the match X rule respectively, if the match can be successfully performed, recording a sequence number X, finding an X-th application rule group name from list items of the application rule group, and executing S4;
s6: extracting information from the syslog message body according to the regular rule items in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing S7;
s7: referring to the alarm information content defined in the specification, carrying out information recombination according to result rule items in the application rule group and variable $ { X } information extracted by using the regular X, and executing S8;
s8: and generating alarm content in GB/T31992 format conforming to the specification according to the recombination information of level, type, subtype and result in the application rule group.
The method provided by the invention is further illustrated below in conjunction with specific examples.
Example 1: the syslog log application name is message body abstract
Referring to fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 11, a method for converting a rule-based syslog log into a general alarm log of a power system includes defining a rule description format and log content conversion steps.
First, a rule description is shown in fig. 5, and the rule is used to convert the syslog log of fig. 1 and 2 into log content in GB/T31992 format of fig. 3 and 4.
Secondly, the log conversion step is as follows:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: extracting the application name "WEB/4/WEBOPT_LOGIN_SUC" of the syslog log shown in FIG. 1, finding the corresponding application name "WEB/4/WEBOPT_LOGIN_SUC" in the list rule item, and turning to an application rule group [ WEB/4/WEBOPT_LOGIN_SUC ], and executing S4;
s4: the regular1 regular expression in the application rule set [ WEB/4/WEBOPT_LOGIN_SUC ] is used to extract the "admin" string from the syslog log message body shown in FIG. 1 and store it in the $ {1} variable. Extracting a '192.168.8.194' character string from the syslog log message body shown in fig. 1 by using the regular2 regular expression, storing the character string into $ {2} variables, and executing S5;
s5: the information is reorganized using result expressions in the application rule set [ WEB/4/WEBOPT_LOGIN_SUC ]. Replacing the $ {1} variable with the value of the $ {1} variable, replacing the variable $ {2} with the value of the $ {2} variable, the result after replacement being: result=admin 192.168.8.196, execute S6;
s6: all information can thus be provided for the generation of the log shown in fig. 3 according to the level, type, subtype configuration values in the application rule set WEB/4/weboplog SUC.
Example 2: syslog log application name non-message body digest
Referring to fig. 6, fig. 7, fig. 8, fig. 9, fig. 10, and fig. 11, a method for converting syslog logs into general alarm logs of a power system according to the present invention includes a description format defining rules and log content conversion steps.
First, rule contents are as a rule profile shown in fig. 10 for converting the syslog log of fig. 6 and 7 into log contents in GB/T31992 format of fig. 8 and 9.
The conversion steps for fig. 6 are:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: extracting the application name "kernel" of the syslog log shown in fig. 6 and 7, finding the corresponding application name "kernel" in list rule items in the index rule group, and turning to the application rule group [ kernel ], and executing S4;
s4: since the mode in the application rule group [ kernel ] is part and there is a list sub-application rule group, match the syslog log using the match x, the syslog log shown in fig. 6 matches with the match1 rule, take the sequence number 1 of match1, jump to the 1 st sub-application rule group "link_up" of list, execute S5;
s5: since there are no modes and lists in the application rule set [ LINK_UP ], the information is extracted from the syslog log using regular X. Regular expression regular1 extracts an "eth1" character string from the syslog log message body shown in fig. 6, stores it in $ {1} variable, and executes S6;
s6: the result expression in the application rule set [ LINK_UP ] is used to reorganize the information. Replacing the $ {1} variable with the value of the $ {1} variable, the result after the replacement being: result=eth1, execute S7;
s7: all information can thus be provided for generating the log shown in fig. 8 according to level, type, subtype configuration values in the application rule set LINK UP.
The conversion steps for fig. 7 are:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: matching the index rule set, extracting the application name "kernel" of the syslog log shown in fig. 7, finding the corresponding application name "kernel" in the list rule item, transferring to the application rule set [ kernel ], and executing S4;
s4: since the mode in the application rule set [ kernel ] is part and there is a list child application rule set, match X is used to match the syslog log. Rule matching between the syslog log and the match2 shown in fig. 7, the sequence number of the match2 is taken, and the process jumps to the 2 nd sub-application rule group "link_down" of list, and S5 is executed.
S5: since there are no modes and lists in the application rule set [ LINK_DOWN ], the information is extracted from the syslog log using the regular expression rules of regular. Regular expression rule 1 extracts an "eth1" character string from the syslog log message body shown in fig. 7, stores it in $ {1} variable, and executes S6;
s6: the information is reorganized using result expressions in the application rule set LINK DOWN. Replacing the $ {1} variable with the value of the $ {1} variable, the result after the replacement being: result=eth1, execute S7;
s7: all information can thus be provided for generating the log shown in fig. 9 according to level, type, subtype configuration values in the application rule set LINK DOWN.
According to the method for converting the syslog log into the universal alarm log of the power system, disclosed by the embodiment of the invention, the content conversion from the syslog log to the GB/T31992 format required by the specification on the content level is realized by using the rule-based rule matching, information extraction and information recombination modes.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.

Claims (3)

1. A method of log conversion, the method comprising:
based on the predefined log conversion rule,
converting the syslog log into a GB/T31992 general alarm log of the power system, which is agreed in technical Specification of network safety monitoring devices of the power monitoring system;
the predefined log conversion rules are stored in a rule file;
the rule file comprises only one index rule group;
the index rule group at least comprises a list rule item;
the list rule item is composed of application names of syslog logs, and each application name of the list rule item is an application rule group corresponding to the application name;
the list rule item at least comprises an application rule group;
the application rule group defines rules for extracting information from the syslog log and rules for reorganizing the extracted information;
the rule items contained in the application rule group comprise modes, log grades, log types, log sub-types, regular expression groups, information reorganization rules, regular expression matching groups and sub-application rule groups;
the method for converting the syslog log into the GB/T31992 general alarm log of the electric power system, which is agreed in technical Specification of network safety monitoring devices of electric power monitoring systems, comprises the following steps:
step 1, loading a rule file;
step 2, reading a syslog log, and extracting an application name, time and a message body in the syslog log;
step 3, checking whether the application name exists in list rule items in the index rule group, and if so, executing step 4; otherwise, returning to the step 2;
step 4, turning to an application rule group corresponding to the application name, checking whether the application rule group has a regular expression matching group and a sub application rule group, if so, executing step 5, otherwise, executing step 6;
step 5, matching syslog logs by using regular expression matching groups respectively, if matching is successful, recording a serial number X, finding an X-th application rule group name from the sub application rule groups of the application rule groups, and executing step 4;
step 6, extracting information from the syslog message body according to the regular expression group in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing step 7;
step 7, according to the alarm information defined in the technical Specification of the network safety monitoring device of the electric power monitoring system, obtaining the reorganization information according to the information reorganization rule items and the information of the variable $ { X } in the application rule group, and executing step 8;
and 8, generating alarm content in a GB/T31992 format conforming to the technical specification of network safety monitoring devices of electric power monitoring systems according to the log grade, the log type and the log subtype rule items in the application rule group and the reorganization information.
2. The method of claim 1, wherein the extracting information from the syslog message body according to the regular expression sets in the application rule sets, respectively, comprises extracting only one information per regular expression in the regular expression sets.
3. The method of claim 1, wherein the obtaining the reorganized information according to the information reorganizing rule item and the information of the variable $ { X } in the application rule group includes generating the reorganized information as a message in GB/T31992 format meeting the requirements of the technical specification of network safety monitoring devices of electric power monitoring systems.
CN202010452444.4A 2020-05-26 2020-05-26 Method for converting syslog log into universal alarm log of power system Active CN111832260B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010452444.4A CN111832260B (en) 2020-05-26 2020-05-26 Method for converting syslog log into universal alarm log of power system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010452444.4A CN111832260B (en) 2020-05-26 2020-05-26 Method for converting syslog log into universal alarm log of power system

Publications (2)

Publication Number Publication Date
CN111832260A CN111832260A (en) 2020-10-27
CN111832260B true CN111832260B (en) 2024-03-26

Family

ID=72913896

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010452444.4A Active CN111832260B (en) 2020-05-26 2020-05-26 Method for converting syslog log into universal alarm log of power system

Country Status (1)

Country Link
CN (1) CN111832260B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113285824B (en) * 2021-05-06 2023-05-12 国网福建省电力有限公司 Method and device for monitoring security of network configuration command

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007249694A (en) * 2006-03-16 2007-09-27 Nec Corp Log format conversion device, log format conversion method and log format conversion program
CN101291256A (en) * 2008-06-02 2008-10-22 杭州华三通信技术有限公司 Method and system for upgrading system log to alarm
WO2013026312A1 (en) * 2011-08-23 2013-02-28 中兴通讯股份有限公司 Alarming method and system based on log detection
KR101239401B1 (en) * 2012-10-05 2013-03-06 강명훈 Log analysys system of the security system and method thereof
CN109274178A (en) * 2018-11-14 2019-01-25 国网甘肃省电力公司电力科学研究院 A kind of automatic analysis system and method for the preposition operation information of power scheduling
CN109325009A (en) * 2018-09-19 2019-02-12 亚信科技(成都)有限公司 The method and device of log parsing
CN109376532A (en) * 2018-10-31 2019-02-22 云南电网有限责任公司 Power network security monitoring method and system based on the analysis of ELK log collection
CN109768623A (en) * 2019-02-02 2019-05-17 鼎信信息科技有限责任公司 Monitoring method, device, computer equipment and the storage medium of electric system
CN110635951A (en) * 2019-10-10 2019-12-31 北京科东电力控制系统有限责任公司 Electric power safety monitoring standardized communication method, safety monitoring device and master station management platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10318405B2 (en) * 2016-08-24 2019-06-11 International Business Machines Corporation Applying consistent log levels to application log messages

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007249694A (en) * 2006-03-16 2007-09-27 Nec Corp Log format conversion device, log format conversion method and log format conversion program
CN101291256A (en) * 2008-06-02 2008-10-22 杭州华三通信技术有限公司 Method and system for upgrading system log to alarm
WO2013026312A1 (en) * 2011-08-23 2013-02-28 中兴通讯股份有限公司 Alarming method and system based on log detection
KR101239401B1 (en) * 2012-10-05 2013-03-06 강명훈 Log analysys system of the security system and method thereof
CN109325009A (en) * 2018-09-19 2019-02-12 亚信科技(成都)有限公司 The method and device of log parsing
CN109376532A (en) * 2018-10-31 2019-02-22 云南电网有限责任公司 Power network security monitoring method and system based on the analysis of ELK log collection
CN109274178A (en) * 2018-11-14 2019-01-25 国网甘肃省电力公司电力科学研究院 A kind of automatic analysis system and method for the preposition operation information of power scheduling
CN109768623A (en) * 2019-02-02 2019-05-17 鼎信信息科技有限责任公司 Monitoring method, device, computer equipment and the storage medium of electric system
CN110635951A (en) * 2019-10-10 2019-12-31 北京科东电力控制系统有限责任公司 Electric power safety monitoring standardized communication method, safety monitoring device and master station management platform

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Investigation of acoustic emissions and pressure stimulated currents detected during bending of restored marble epistyles within the frame of log-periodic power-law models;D. Mastrogiannis;Procedia Structural Integrity;第10卷;319-325 *
海量日志分析在浙江电力的应用于实践;蒋鸿城;浙江电力;第36卷(第12期);27-32 *
电力二次系统内网安全监视平台的设计和实现;金学成;孙炜;梁野;郭玉金;谢忠华;;电力系统自动化(第16期);104-109 *

Also Published As

Publication number Publication date
CN111832260A (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US8869110B2 (en) Method and arrangement for test case creation
CN106843957A (en) System firmware upgrade method and device
CN105303112B (en) The detection method and device of component call loophole
CN110109681B (en) Method and system for converting codes between different platforms
CN103678124B (en) Video surveillance platform auto-test method and device based on continuous integrated environment
CN111832260B (en) Method for converting syslog log into universal alarm log of power system
US11681606B2 (en) Automatic configuration of logging infrastructure for software deployments using source code
CN113672597A (en) Database cross-platform migration method, device, system and equipment
CN105468531A (en) Vulnerability mining method and device and electronic equipment
CN109408076A (en) A kind of APP batch hair version method, apparatus and system
CN114650211B (en) Fault repairing method, device, electronic equipment and computer readable storage medium
CN106610899B (en) Test case generation method and device
CN105141590B (en) The method and system of plug-in sample extraction
CN111193631A (en) Information processing method, system, and computer-readable storage medium
CN111913877B (en) Fuzzy test method and device for text configuration file
CN113742340A (en) Database table processing method and related equipment
CN114611743A (en) System performance optimization method and device, electronic equipment and readable medium thereof
CN111966641B (en) Universal log normalization model configuration method and device
CN106547679A (en) The method and script management platform of script management
CN106970817A (en) Fault determination method and device
CN113836026A (en) Upgrade test method and device, electronic equipment and storage medium
CN107391202B (en) Early-stage binding method and device for plug-in and electronic equipment
CN114205276A (en) Performance test method and device for product management system and electronic equipment
CN112162920A (en) Kubernetes-based automatic model testing method and system
CN117714302A (en) Simulation method and device for data communication equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant