CN111832260B - Method for converting syslog log into universal alarm log of power system - Google Patents
Method for converting syslog log into universal alarm log of power system Download PDFInfo
- Publication number
- CN111832260B CN111832260B CN202010452444.4A CN202010452444A CN111832260B CN 111832260 B CN111832260 B CN 111832260B CN 202010452444 A CN202010452444 A CN 202010452444A CN 111832260 B CN111832260 B CN 111832260B
- Authority
- CN
- China
- Prior art keywords
- rule
- log
- application
- information
- syslog
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 27
- 238000006243 chemical reaction Methods 0.000 claims abstract description 19
- 238000012544 monitoring process Methods 0.000 claims abstract description 16
- 238000012806 monitoring device Methods 0.000 claims abstract description 14
- 230000014509 gene expression Effects 0.000 claims description 27
- 230000008521 reorganization Effects 0.000 claims description 14
- 238000011161 development Methods 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 101100513046 Neurospora crassa (strain ATCC 24698 / 74-OR23-1A / CBS 708.71 / DSM 1257 / FGSC 987) eth-1 gene Proteins 0.000 description 6
- 239000000284 extract Substances 0.000 description 5
- 238000005215 recombination Methods 0.000 description 5
- 230000006798 recombination Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000000605 extraction Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003252 repetitive effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/12—Use of codes for handling textual entities
- G06F40/151—Transformation
Abstract
The invention discloses a method for converting syslog logs into general alarm logs of a power system, which defines a log conversion rule and converts the syslog logs into general alarm log contents of the power system based on GB/T31992, which are agreed in technical Specification of network safety monitoring devices of the power monitoring system, based on the rule. The method provided by the invention has universality for syslog log conversion, and meanwhile, the method can reduce repeated development activities of software, shorten project implementation period and reduce application cost.
Description
Technical Field
The invention relates to the field of power monitoring and network security monitoring, in particular to a method for converting syslog logs into universal alarm logs of a power system.
Background
In the technical specification of network safety monitoring devices of electric power monitoring systems, safety information of devices such as a collection server, a workstation, a switch, a firewall and transverse isolation is required, the specification agrees that a monitored object needs to upload the safety collection information by using a GB/T31992 format, but for some old station reconstruction, the specification of new delivery cannot be supported, and the syslog log of the monitored device needs to be analyzed to meet the safety information collection required by the specification. The current method for converting the syslog log into the GB/T31992 log by the main stream manufacturer is to develop corresponding syslog log analysis libraries aiming at equipment of different manufacturers and different models, and the method has poor universality and low-efficiency repeated development.
Disclosure of Invention
According to the method for converting the syslog log into the general alarm log of the power system based on rules, the steps of rule matching, information extraction, information recombination and the like can be adopted for the syslog log, so that the syslog log is converted into the general alarm log content of the power system based on GB/T31992, which is agreed by technical Specification of network safety monitoring devices of power monitoring systems (hereinafter referred to as Specification).
The technical scheme adopted by the invention for solving the technical problems is to provide a log conversion method, which comprises the following steps:
based on the predefined log conversion rule,
and converting the syslog log into a general alarm log of the GB/T31992 power system, which is agreed in technical Specification of network safety monitoring devices of the power monitoring system.
Preferably, the predefined log conversion rule is stored in a rule file;
the rule file comprises only one index rule group;
the index rule group at least comprises a list rule item;
the list rule item is composed of application names of syslog logs, and each application name of the list rule item is an application rule group corresponding to the application name;
the list rule item at least comprises an application rule group;
the set of application rules defines rules for extracting information from the syslog log and rules for reorganizing the extracted information.
Specifically, the rule items contained in the application rule group include a mode, a log grade, a log type, a log subtype, a regular expression group, an information reorganization rule, a regular expression matching group and a sub application rule group.
Further, the conversion of the syslog log into the general alarm log of the GB/T31992 power system, which is agreed in the technical specification of the network security monitoring device of the power monitoring system, includes:
step 1, loading a rule file;
step 2, reading a syslog log, and extracting an application name, time and a message body in the syslog log;
step 3, checking whether the application name exists in list rule items in the index rule group, and if so, executing step 4; otherwise, returning to the step 2;
step 4, turning to an application rule group corresponding to the application name, checking whether the application rule group has a regular expression matching group and a sub application rule group, if so, executing step 5, otherwise, executing step 6;
step 5, matching syslog logs by using regular expression matching groups respectively, if matching is successful, recording a serial number X, finding an X-th application rule group name from the sub application rule groups of the application rule groups, and executing step 4;
step 6, extracting information from the syslog message body according to the regular expression group in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing step 7;
step 7, according to the alarm information defined in the technical Specification of the network safety monitoring device of the electric power monitoring system, obtaining the reorganization information according to the information reorganization rule items and the information of the variable $ { X } in the application rule group, and executing step 8;
and 8, generating alarm content in a GB/T31992 format conforming to the technical specification of network safety monitoring devices of electric power monitoring systems according to the log grade, the log type and the log subtype rule items in the application rule group and the reorganization information.
Further, the extracting information from the syslog message body according to the regular expression sets in the application rule sets respectively includes that each regular expression in the regular expression sets only extracts one piece of information;
furthermore, the information according to the information reorganization rule item and the variable $ { X } in the application rule group obtains reorganization information, which includes that the generated reorganization information is a message in a GB/T31992 format meeting the requirements of technical Specification of network safety monitoring devices of electric power monitoring systems.
Advantageous effects
The method for converting the syslog log into the universal alarm log of the power system realizes the content conversion from the syslog log to the GB/T31992 format required by the specification on the content level by using the modes of rule matching, information extraction and information recombination based on rules.
Drawings
Fig. 1 is a syslog log of a switch provided in an embodiment of the present invention, which describes that an admin user successfully logs in to the switch through an IP address 192.168.9.194;
fig. 2 is another switch syslog log provided in an embodiment of the present invention, depicting an admin user logging out of the switch through IP address 192.168.9.194;
FIG. 3 is a diagram of an alarm content meeting the definition of Specification, describing "login success" according to an embodiment of the present invention;
FIG. 4 is another alarm content meeting the definition of Specification, describing "logout", according to an embodiment of the present invention;
FIG. 5 is a diagram of rule content provided by an embodiment of the present invention;
fig. 6 is a syslog log of a switch provided in an embodiment of the present invention, describing enabling of a portal eth 1;
fig. 7 is another switch syslog log provided in an embodiment of the present invention, describing disabling of the portal eth 1;
FIG. 8 is a diagram illustrating a "portal UP" according to the "Specification" definition for providing an alarm content according to the embodiment of the present invention;
FIG. 9 is another alarm content meeting the definition of Specification, describing "Port DOWN", provided by an embodiment of the present invention;
FIG. 10 is another rule content provided by an embodiment of the present invention;
fig. 11 is a log conversion flowchart provided in an embodiment of the present invention.
Detailed Description
The invention is further described below in connection with specific embodiments. The following examples are only for more clearly illustrating the technical aspects of the present invention, and are not intended to limit the scope of the present invention.
As described above, in the prior art, the method for converting the syslog log into the GB/T31992 log is to develop corresponding syslog log parsing libraries for devices of different manufacturers and different models, and this kind of method has poor universality and low-efficiency repetitive development.
After researching the technical problems, the inventor provides a method for converting a syslog log based on rules into a general alarm log of a power system in the specification, which comprises a description format defining the rules and a log conversion step based on the rules.
First, the description format of the rule includes that the description format of the rule is described in an ini file format, specifically:
1) There is and only one "index rule set", namely: the [ rule_index ] group must have a list item under the group, the list item is composed of "application names" of syslog log, each application name must correspond to an application rule group named "application name". The goal of the index rule set is to find an application rule set corresponding to the syslog log according to the application name or log content of the syslog log, and the index rule set may be composed of the following rule items:
2) At least one "application rule group" is provided, the goal of the application rule group is to extract the required information according to the message content of the syslog log through the rule defined by the "application rule group" or match according to the log content of the syslog, and to reorganize the information according to the result rule, the application rule group can be composed of the following rule items:
3) Rule items level, type, subtype in the application rule set correspond to grades, types and subtypes of security events defined in the technical Specification of network security monitoring devices of Power monitoring systems; matchX defines syslog message matching rules; regular x defines a regular expression that extracts information from the syslog message body; result is the definition of the information reorganization rule.
4) Matching the syslog log according to a plurality of regular expressions of the regular item and extracting information, wherein each regular expression only extracts one piece of information;
5) The result information reorganization rule can use the following variable symbols, and the result of the result information reorganization is the message content part in GB/T31992 required by Specification.
Second, the rule-based log conversion step includes, specifically:
s1: loading a rule file;
s2: reading syslog logs, and extracting information such as log application names, time, message bodies and the like;
s3: checking whether the application name of the syslog log is in a list rule item in an index rule group [ rule_index ], and if not, jumping to S2; otherwise, turning to S4, turning to an application rule group corresponding to the application name;
s4: checking whether the matchX and list rule items exist in the application rule group, if so, executing S5, otherwise, executing S6;
s5: matching syslog logs by using the match X rule respectively, if the match can be successfully performed, recording a sequence number X, finding an X-th application rule group name from list items of the application rule group, and executing S4;
s6: extracting information from the syslog message body according to the regular rule items in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing S7;
s7: referring to the alarm information content defined in the specification, carrying out information recombination according to result rule items in the application rule group and variable $ { X } information extracted by using the regular X, and executing S8;
s8: and generating alarm content in GB/T31992 format conforming to the specification according to the recombination information of level, type, subtype and result in the application rule group.
The method provided by the invention is further illustrated below in conjunction with specific examples.
Example 1: the syslog log application name is message body abstract
Referring to fig. 1, fig. 2, fig. 3, fig. 4, fig. 5, fig. 11, a method for converting a rule-based syslog log into a general alarm log of a power system includes defining a rule description format and log content conversion steps.
First, a rule description is shown in fig. 5, and the rule is used to convert the syslog log of fig. 1 and 2 into log content in GB/T31992 format of fig. 3 and 4.
Secondly, the log conversion step is as follows:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: extracting the application name "WEB/4/WEBOPT_LOGIN_SUC" of the syslog log shown in FIG. 1, finding the corresponding application name "WEB/4/WEBOPT_LOGIN_SUC" in the list rule item, and turning to an application rule group [ WEB/4/WEBOPT_LOGIN_SUC ], and executing S4;
s4: the regular1 regular expression in the application rule set [ WEB/4/WEBOPT_LOGIN_SUC ] is used to extract the "admin" string from the syslog log message body shown in FIG. 1 and store it in the $ {1} variable. Extracting a '192.168.8.194' character string from the syslog log message body shown in fig. 1 by using the regular2 regular expression, storing the character string into $ {2} variables, and executing S5;
s5: the information is reorganized using result expressions in the application rule set [ WEB/4/WEBOPT_LOGIN_SUC ]. Replacing the $ {1} variable with the value of the $ {1} variable, replacing the variable $ {2} with the value of the $ {2} variable, the result after replacement being: result=admin 192.168.8.196, execute S6;
s6: all information can thus be provided for the generation of the log shown in fig. 3 according to the level, type, subtype configuration values in the application rule set WEB/4/weboplog SUC.
Example 2: syslog log application name non-message body digest
Referring to fig. 6, fig. 7, fig. 8, fig. 9, fig. 10, and fig. 11, a method for converting syslog logs into general alarm logs of a power system according to the present invention includes a description format defining rules and log content conversion steps.
First, rule contents are as a rule profile shown in fig. 10 for converting the syslog log of fig. 6 and 7 into log contents in GB/T31992 format of fig. 8 and 9.
The conversion steps for fig. 6 are:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: extracting the application name "kernel" of the syslog log shown in fig. 6 and 7, finding the corresponding application name "kernel" in list rule items in the index rule group, and turning to the application rule group [ kernel ], and executing S4;
s4: since the mode in the application rule group [ kernel ] is part and there is a list sub-application rule group, match the syslog log using the match x, the syslog log shown in fig. 6 matches with the match1 rule, take the sequence number 1 of match1, jump to the 1 st sub-application rule group "link_up" of list, execute S5;
s5: since there are no modes and lists in the application rule set [ LINK_UP ], the information is extracted from the syslog log using regular X. Regular expression regular1 extracts an "eth1" character string from the syslog log message body shown in fig. 6, stores it in $ {1} variable, and executes S6;
s6: the result expression in the application rule set [ LINK_UP ] is used to reorganize the information. Replacing the $ {1} variable with the value of the $ {1} variable, the result after the replacement being: result=eth1, execute S7;
s7: all information can thus be provided for generating the log shown in fig. 8 according to level, type, subtype configuration values in the application rule set LINK UP.
The conversion steps for fig. 7 are:
s1: loading rules;
s2: reading a syslog log, and analyzing information such as the application name, time, message body and the like of the log;
s3: matching the index rule set, extracting the application name "kernel" of the syslog log shown in fig. 7, finding the corresponding application name "kernel" in the list rule item, transferring to the application rule set [ kernel ], and executing S4;
s4: since the mode in the application rule set [ kernel ] is part and there is a list child application rule set, match X is used to match the syslog log. Rule matching between the syslog log and the match2 shown in fig. 7, the sequence number of the match2 is taken, and the process jumps to the 2 nd sub-application rule group "link_down" of list, and S5 is executed.
S5: since there are no modes and lists in the application rule set [ LINK_DOWN ], the information is extracted from the syslog log using the regular expression rules of regular. Regular expression rule 1 extracts an "eth1" character string from the syslog log message body shown in fig. 7, stores it in $ {1} variable, and executes S6;
s6: the information is reorganized using result expressions in the application rule set LINK DOWN. Replacing the $ {1} variable with the value of the $ {1} variable, the result after the replacement being: result=eth1, execute S7;
s7: all information can thus be provided for generating the log shown in fig. 9 according to level, type, subtype configuration values in the application rule set LINK DOWN.
According to the method for converting the syslog log into the universal alarm log of the power system, disclosed by the embodiment of the invention, the content conversion from the syslog log to the GB/T31992 format required by the specification on the content level is realized by using the rule-based rule matching, information extraction and information recombination modes.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The foregoing is merely a preferred embodiment of the present invention, and it should be noted that modifications and variations could be made by those skilled in the art without departing from the technical principles of the present invention, and such modifications and variations should also be regarded as being within the scope of the invention.
Claims (3)
1. A method of log conversion, the method comprising:
based on the predefined log conversion rule,
converting the syslog log into a GB/T31992 general alarm log of the power system, which is agreed in technical Specification of network safety monitoring devices of the power monitoring system;
the predefined log conversion rules are stored in a rule file;
the rule file comprises only one index rule group;
the index rule group at least comprises a list rule item;
the list rule item is composed of application names of syslog logs, and each application name of the list rule item is an application rule group corresponding to the application name;
the list rule item at least comprises an application rule group;
the application rule group defines rules for extracting information from the syslog log and rules for reorganizing the extracted information;
the rule items contained in the application rule group comprise modes, log grades, log types, log sub-types, regular expression groups, information reorganization rules, regular expression matching groups and sub-application rule groups;
the method for converting the syslog log into the GB/T31992 general alarm log of the electric power system, which is agreed in technical Specification of network safety monitoring devices of electric power monitoring systems, comprises the following steps:
step 1, loading a rule file;
step 2, reading a syslog log, and extracting an application name, time and a message body in the syslog log;
step 3, checking whether the application name exists in list rule items in the index rule group, and if so, executing step 4; otherwise, returning to the step 2;
step 4, turning to an application rule group corresponding to the application name, checking whether the application rule group has a regular expression matching group and a sub application rule group, if so, executing step 5, otherwise, executing step 6;
step 5, matching syslog logs by using regular expression matching groups respectively, if matching is successful, recording a serial number X, finding an X-th application rule group name from the sub application rule groups of the application rule groups, and executing step 4;
step 6, extracting information from the syslog message body according to the regular expression group in the application rule group respectively, storing the extracted information into a variable $ { X }, and executing step 7;
step 7, according to the alarm information defined in the technical Specification of the network safety monitoring device of the electric power monitoring system, obtaining the reorganization information according to the information reorganization rule items and the information of the variable $ { X } in the application rule group, and executing step 8;
and 8, generating alarm content in a GB/T31992 format conforming to the technical specification of network safety monitoring devices of electric power monitoring systems according to the log grade, the log type and the log subtype rule items in the application rule group and the reorganization information.
2. The method of claim 1, wherein the extracting information from the syslog message body according to the regular expression sets in the application rule sets, respectively, comprises extracting only one information per regular expression in the regular expression sets.
3. The method of claim 1, wherein the obtaining the reorganized information according to the information reorganizing rule item and the information of the variable $ { X } in the application rule group includes generating the reorganized information as a message in GB/T31992 format meeting the requirements of the technical specification of network safety monitoring devices of electric power monitoring systems.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010452444.4A CN111832260B (en) | 2020-05-26 | 2020-05-26 | Method for converting syslog log into universal alarm log of power system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010452444.4A CN111832260B (en) | 2020-05-26 | 2020-05-26 | Method for converting syslog log into universal alarm log of power system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111832260A CN111832260A (en) | 2020-10-27 |
CN111832260B true CN111832260B (en) | 2024-03-26 |
Family
ID=72913896
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010452444.4A Active CN111832260B (en) | 2020-05-26 | 2020-05-26 | Method for converting syslog log into universal alarm log of power system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111832260B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113285824B (en) * | 2021-05-06 | 2023-05-12 | 国网福建省电力有限公司 | Method and device for monitoring security of network configuration command |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007249694A (en) * | 2006-03-16 | 2007-09-27 | Nec Corp | Log format conversion device, log format conversion method and log format conversion program |
CN101291256A (en) * | 2008-06-02 | 2008-10-22 | 杭州华三通信技术有限公司 | Method and system for upgrading system log to alarm |
WO2013026312A1 (en) * | 2011-08-23 | 2013-02-28 | 中兴通讯股份有限公司 | Alarming method and system based on log detection |
KR101239401B1 (en) * | 2012-10-05 | 2013-03-06 | 강명훈 | Log analysys system of the security system and method thereof |
CN109274178A (en) * | 2018-11-14 | 2019-01-25 | 国网甘肃省电力公司电力科学研究院 | A kind of automatic analysis system and method for the preposition operation information of power scheduling |
CN109325009A (en) * | 2018-09-19 | 2019-02-12 | 亚信科技(成都)有限公司 | The method and device of log parsing |
CN109376532A (en) * | 2018-10-31 | 2019-02-22 | 云南电网有限责任公司 | Power network security monitoring method and system based on the analysis of ELK log collection |
CN109768623A (en) * | 2019-02-02 | 2019-05-17 | 鼎信信息科技有限责任公司 | Monitoring method, device, computer equipment and the storage medium of electric system |
CN110635951A (en) * | 2019-10-10 | 2019-12-31 | 北京科东电力控制系统有限责任公司 | Electric power safety monitoring standardized communication method, safety monitoring device and master station management platform |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10318405B2 (en) * | 2016-08-24 | 2019-06-11 | International Business Machines Corporation | Applying consistent log levels to application log messages |
-
2020
- 2020-05-26 CN CN202010452444.4A patent/CN111832260B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007249694A (en) * | 2006-03-16 | 2007-09-27 | Nec Corp | Log format conversion device, log format conversion method and log format conversion program |
CN101291256A (en) * | 2008-06-02 | 2008-10-22 | 杭州华三通信技术有限公司 | Method and system for upgrading system log to alarm |
WO2013026312A1 (en) * | 2011-08-23 | 2013-02-28 | 中兴通讯股份有限公司 | Alarming method and system based on log detection |
KR101239401B1 (en) * | 2012-10-05 | 2013-03-06 | 강명훈 | Log analysys system of the security system and method thereof |
CN109325009A (en) * | 2018-09-19 | 2019-02-12 | 亚信科技(成都)有限公司 | The method and device of log parsing |
CN109376532A (en) * | 2018-10-31 | 2019-02-22 | 云南电网有限责任公司 | Power network security monitoring method and system based on the analysis of ELK log collection |
CN109274178A (en) * | 2018-11-14 | 2019-01-25 | 国网甘肃省电力公司电力科学研究院 | A kind of automatic analysis system and method for the preposition operation information of power scheduling |
CN109768623A (en) * | 2019-02-02 | 2019-05-17 | 鼎信信息科技有限责任公司 | Monitoring method, device, computer equipment and the storage medium of electric system |
CN110635951A (en) * | 2019-10-10 | 2019-12-31 | 北京科东电力控制系统有限责任公司 | Electric power safety monitoring standardized communication method, safety monitoring device and master station management platform |
Non-Patent Citations (3)
Title |
---|
Investigation of acoustic emissions and pressure stimulated currents detected during bending of restored marble epistyles within the frame of log-periodic power-law models;D. Mastrogiannis;Procedia Structural Integrity;第10卷;319-325 * |
海量日志分析在浙江电力的应用于实践;蒋鸿城;浙江电力;第36卷(第12期);27-32 * |
电力二次系统内网安全监视平台的设计和实现;金学成;孙炜;梁野;郭玉金;谢忠华;;电力系统自动化(第16期);104-109 * |
Also Published As
Publication number | Publication date |
---|---|
CN111832260A (en) | 2020-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8869110B2 (en) | Method and arrangement for test case creation | |
CN106843957A (en) | System firmware upgrade method and device | |
CN105303112B (en) | The detection method and device of component call loophole | |
CN110109681B (en) | Method and system for converting codes between different platforms | |
CN103678124B (en) | Video surveillance platform auto-test method and device based on continuous integrated environment | |
CN111832260B (en) | Method for converting syslog log into universal alarm log of power system | |
US11681606B2 (en) | Automatic configuration of logging infrastructure for software deployments using source code | |
CN113672597A (en) | Database cross-platform migration method, device, system and equipment | |
CN105468531A (en) | Vulnerability mining method and device and electronic equipment | |
CN109408076A (en) | A kind of APP batch hair version method, apparatus and system | |
CN114650211B (en) | Fault repairing method, device, electronic equipment and computer readable storage medium | |
CN106610899B (en) | Test case generation method and device | |
CN105141590B (en) | The method and system of plug-in sample extraction | |
CN111193631A (en) | Information processing method, system, and computer-readable storage medium | |
CN111913877B (en) | Fuzzy test method and device for text configuration file | |
CN113742340A (en) | Database table processing method and related equipment | |
CN114611743A (en) | System performance optimization method and device, electronic equipment and readable medium thereof | |
CN111966641B (en) | Universal log normalization model configuration method and device | |
CN106547679A (en) | The method and script management platform of script management | |
CN106970817A (en) | Fault determination method and device | |
CN113836026A (en) | Upgrade test method and device, electronic equipment and storage medium | |
CN107391202B (en) | Early-stage binding method and device for plug-in and electronic equipment | |
CN114205276A (en) | Performance test method and device for product management system and electronic equipment | |
CN112162920A (en) | Kubernetes-based automatic model testing method and system | |
CN117714302A (en) | Simulation method and device for data communication equipment and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |