CN112187570A - Risk detection method and device, electronic equipment and readable storage medium - Google Patents

Risk detection method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112187570A
CN112187570A CN202010968582.8A CN202010968582A CN112187570A CN 112187570 A CN112187570 A CN 112187570A CN 202010968582 A CN202010968582 A CN 202010968582A CN 112187570 A CN112187570 A CN 112187570A
Authority
CN
China
Prior art keywords
risk detection
target
controlling
enabling parameter
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010968582.8A
Other languages
Chinese (zh)
Inventor
池源
王勇
宾龙
蔡汉魏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN202010968582.8A priority Critical patent/CN112187570A/en
Publication of CN112187570A publication Critical patent/CN112187570A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Game Theory and Decision Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to the technical field of computers, in particular to a risk detection method, a risk detection device, electronic equipment and a readable storage medium, wherein the method comprises the steps of receiving a user target instruction through an editable display interface; and controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state. The risk detection scheme disclosed by the application can realize various monitoring task scheduling modes, so that a system administrator can conveniently customize monitoring items and monitoring task scheduling modes by combining actual monitoring requirements, and monitoring accuracy and coverage rate are improved.

Description

Risk detection method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of computer data processing technologies, and in particular, to a risk detection method and apparatus, an electronic device, and a readable storage medium.
Background
The continuous development of the internet of things technology has higher and higher requirements on the security and stability of system architecture and network information, and the running state of the system and the transmission state of the network information need to be monitored constantly to ensure the normal service of each device in the internet of things. The mainstream monitoring systems adopted at present mainly include Nagios, zabbix and the like, which can realize monitoring and alarming to a certain degree, but do not meet large-scale complex monitoring scenes.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks. The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application provides a risk detection method applied to a risk detection device, where the method includes:
receiving a user target instruction through an editable display interface;
and controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state.
Optionally, the controlling the risk detection target enabling parameter according to the target instruction includes:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
Optionally, the controlling the risk detection target enabling parameter includes:
and controlling the risk detection process of the device based on the APScheduler.
Optionally, the method further comprises:
receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
starting a risk detection process according to a preset detection rule;
and if the detection result data meet the index parameters, performing alarm prompt.
Optionally, after the risk detection process is started according to the preset detection rule, the method further includes:
reporting the risk detection result data to an ActiveMQ;
reading risk detection result data from the ActiveMQ and caching the risk detection result data to Redis;
storing the cached risk detection result data to a database;
and reading detection result data in the database, and if the detection result data meet the index parameters, giving an alarm.
Optionally, before the loading the configuration information, the method further includes:
receiving a configuration loading request approval passing message of an administrator;
and responding to the approval passing message and loading the configuration information.
In a second aspect, an embodiment of the present application provides a risk detection device, including:
a display module, an interface module and a control module, wherein,
the display module is used for displaying; editable display interface
The interface module is used for receiving a user target instruction through an editable display interface;
the control module is used for controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state.
Optionally, the control module is specifically configured to:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
Optionally, the control module is further configured to:
and controlling the risk detection process of the device based on the APScheduler.
Optionally, the apparatus further comprises a verification module and an alarm module, wherein,
the interface module is also used for receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
the control module is used for starting a risk detection process according to a preset detection rule;
the verification module is used for verifying whether the detection result data meets the index parameters;
and if the detection result data accords with the index parameters, the alarm module is used for carrying out alarm prompt.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the risk detection method by calling the operation instruction.
In a fourth aspect, a computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the above-described risk detection method.
According to the risk detection scheme disclosed by the embodiment of the application, a user target instruction is received through an editable display interface; and controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state. The technical scheme provided by the embodiment of the application has the following beneficial effects: the APScheduler is adopted to realize various monitoring task scheduling modes, the web management background realizes configuration management of refined complex rules, and the system architecture can be expanded in parallel and support large-scale deployment. A system administrator combines actual monitoring requirements, conveniently customizes monitoring items and monitoring task scheduling modes, and improves monitoring accuracy and coverage rate. The monitoring client and the monitoring configuration can be managed conveniently through the WEB background, the monitoring state can be checked in real time, and the labor cost is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a risk detection method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a risk detection device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To more clearly describe the embodiments of the present application, some definitions, concepts or devices that may be used in the embodiments are described below:
MySQL is an open source relational database management system (RDBMS) that uses the most common database management language, Structured Query Language (SQL), for database management.
Nginx is a lightweight Web server/reverse proxy server and email (IMAP/POP3) proxy server, published under the BSD-like protocol. The method has the characteristics of less occupied memory and strong concurrency capability, and the fact that the concurrency capability of nginx is better in the same type of web servers. Nginx as a load balancing service: the Nginx can directly support the Rails and the PHP program to carry out external service inside, and can also support the external service as HTTP proxy service. Nginx is written by C, and the system resource overhead and the CPU use efficiency are much better than those of Perlbal.
The PHP-FPM (FastCGI Process Manager) is a PHPFastCGI Manager, and for PHP before PHP 5.3.3, it is a patch package aiming at integrating FastCGI Process management into PHP package.
Apache ActiveMQ is an open source code message middleware developed by Apache software foundation; because the ActiveMQ is a pure Java program, the ActiveMQ can be executed only by the operating system supporting the Java virtual machine.
Redis (remote Dictionary Server), a remote Dictionary service, is an open source log-type and Key-Value database written in ANSI C language, supporting network, based on memory and persistent, and provides API of multiple languages. redis is a key-value storage system, is a high-performance key-value database, and supports master-slave synchronization.
Python is a cross-platform computer programming language. Is a high-level scripting language that combines interpretive, compiled, interactive, and object-oriented capabilities.
An apschduler (advanced Python scheduler) functions to execute a specified job at a specified time rule. The way of specifying the time rule may be how often to execute, may be execution of specified time of day, or may execute tasks in a similar way as in Crontab in Linux systems. The specified task is a Python function.
Tornado (Web framework of python) Tornado is an open source version of Web server software. Tornado differs significantly from the mainstream Web server framework (including most Python frameworks): it is a non-blocking server and is relatively fast. In favor of its non-blocking manner and the use of epoll, Tornado can handle thousands of connections per second, and thus Tornado is an ideal framework for real-time Web services.
As described in the background art, currently adopted mainstream monitoring systems mainly include Nagios, zabbix and the like, but do not satisfy large-scale complex monitoring scenes, and the monitoring system has a single monitoring task scheduling mode, only supports periodic tasks, does not support timed tasks or is not fine enough in instant task configuration management, is not high in user-defined degree, does not support configuration approval operation, and has performance problems in large-scale deployment. Based on this application, a risk detection scheme is disclosed to solve at least one of the above technical problems.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments in conjunction with the accompanying drawings. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
To make the objects, technical solutions, and advantages of the present application clearer, fig. 1 discloses a flowchart of a risk detection method provided in an embodiment of the present application, and as shown in fig. 1, the risk detection method includes:
s101, receiving a user target instruction through an editable display interface;
s102, controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state.
In an embodiment of the present application, the controlling the risk detection target enabling parameter according to the target instruction includes:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
In an optional embodiment of the present application, the APScheduler is adopted to control the risk detection process of the device, and the principle of executing the specified operation based on the time rule specified by the APScheduler is mainly adopted, so that the timing and instant start of the detection process can be controlled, and the problem that the current monitoring system can only perform periodic detection is solved.
In an optional embodiment of the present application, the risk detection scheme architecture includes a web end, a monitoring server end and a monitoring client end, the web end of the basic framework adopts PHP yii, the monitoring server end adopts a python tornado, and the monitoring client end adopts a python tornado and an APscheduler. The monitoring client can be in butt joint with a third-party platform through an open interface, such as an ITSM (integrated switching System), a short message platform, an enterprise WeChat and the like. The web side comprises an editable display interface and a configuration management center, the web side acquires a configuration file of the monitoring client side from a network and sends the configuration file to the monitoring client side through the monitoring server side as a transmission medium, and the client side loads the configuration file to complete configuration after receiving the configuration file, wherein the specific implementation flow is as follows:
step 1, a Web terminal acquires a configuration file and stores the configuration file in a database, wherein the configuration file in the step is a configuration file of a monitoring client, and the configuration file comprises basic configuration information of the monitoring client and index parameters (or threshold parameters) of preset detection rules;
step 2, the web side sends the configuration file to a monitoring server side;
step 3, the monitoring server side sends a notification to the monitoring client side to inquire and configure updating;
and 4, the monitoring client inquires and acquires the configuration file from the monitoring server, and the monitoring client loads the configuration according to the acquired configuration file.
According to the embodiment, when the configuration modification is monitored, the configuration can be dynamically updated without restarting the client.
Optionally, in the above embodiment, the web load balancer nginnx may be loaded at the web end according to circumstances of the monitoring system, and in response, load balancing is also added at the monitoring server end. The web side and the server side provide services through the preposed load balancer, and can be deployed at multiple nodes and support parallel extension
In an alternative embodiment, the method further comprises: receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
starting a risk detection process according to a preset detection rule;
reporting the risk detection result data to an ActiveMQ;
reading risk detection result data from the ActiveMQ and caching the risk detection result data to Redis;
storing the cached risk detection result data to a database;
and reading detection result data in the database, and if the detection result data meet the index parameters, giving an alarm.
In the embodiment of the application, the monitoring client does not process the data, directly stores the monitoring detection result data into a message queue (ActiveMQ) of the monitoring server, and reads the data by the data processing service of the monitoring server for processing. The data processing process is asynchronous, interface response abnormity caused by large data volume is avoided, functions of signature, encryption, source limitation and the like are optionally added at the data interaction interface of the monitoring client and the monitoring server, and data security is guaranteed.
In an alternative embodiment of the present application, the database may be a MySQL database.
In an optional embodiment of the present application, the WEB management background implements management of complex rules of monitoring types and monitoring item configurations, and sets a configuration approval function, and modification of monitoring configurations can be validated only after being approved by a configuration administrator, thereby avoiding generation of misoperation and abnormal monitoring configurations, and the implementation process is as follows:
receiving a configuration loading request approval passing message of an administrator;
and responding to the approval passing message and loading the configuration information.
In the above embodiments of the present application, all communication interfaces use HMAC authentication (using SHA256 hash algorithm), and a unique signature is constructed through a series of algorithms and added to the HTTP request header, thereby ensuring interface security.
Optionally, in the foregoing embodiment, the web end, the monitoring server end, and the monitoring client may be simultaneously carried in the same device, or may be respectively carried in different devices.
Based on the risk detection method provided by the embodiment shown in fig. 1, fig. 2 shows a risk detection device provided by the embodiment of the present application, and as shown in fig. 2, the device mainly includes: 201 a display module, 202 an interface module and 203 a control module, wherein,
the 201 display module is used for displaying; editable display interface
The 202 interface module is used for receiving a user target instruction through an editable display interface;
the 203 control module is configured to control the risk detection target enabling parameter according to the target instruction, where the target enabling parameter is used to control a risk detection enabling state.
In an alternative embodiment of the present application, the control module is specifically configured to:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
In an optional embodiment of the present application, the control module is further configured to:
and controlling the risk detection process of the device based on the APScheduler.
In an alternative embodiment of the present application, the apparatus further comprises 204 a verification module and 205 an alarm module, wherein,
the interface module is also used for receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
the control module is used for starting a risk detection process according to a preset detection rule;
the 204 verification module is used for verifying whether the detection result data meets the index parameters;
and if the detection result data meets the index parameters, the alarm module 205 is used for carrying out alarm prompt.
It is understood that the above modules of the risk detection device in this embodiment have functions of implementing the corresponding steps of the method in the embodiment shown in fig. 1. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules can be software and/or hardware, and each module can be implemented independently or by integrating a plurality of modules. For the functional description of each module, reference may be specifically made to the corresponding description of the method in the embodiment shown in fig. 1, and details are not repeated here.
The embodiment of the application provides an electronic device, which comprises a processor and a memory;
a memory for storing operating instructions;
the processor is used for executing the risk detection method provided by any embodiment of the application by calling the operation instruction.
As an example, fig. 3 shows a schematic structural diagram of an electronic device to which an embodiment of the present application is applicable, and as shown in fig. 3, the electronic device 2000 includes: a processor 2001 and a memory 2003. Wherein the processor 2001 is coupled to a memory 2003, such as via a bus 2002. Optionally, the electronic device 2000 may also include a transceiver 2004. It should be noted that the transceiver 2004 is not limited to one in practical applications, and the structure of the electronic device 2000 is not limited to the embodiment of the present application.
The processor 2001 is applied to the embodiment of the present application to implement the method shown in the above method embodiment. The transceiver 2004 may include a receiver and a transmitter, and the transceiver 2004 is applied to the embodiments of the present application to implement the functions of the electronic device of the embodiments of the present application to communicate with other devices when executed.
The Processor 2001 may be a CPU (Central Processing Unit), general Processor, DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit), FPGA (Field Programmable Gate Array) or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 2001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
Bus 2002 may include a path that conveys information between the aforementioned components. The bus 2002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 2002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The Memory 2003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
Optionally, the memory 2003 is used for storing application program code for performing the disclosed aspects, and is controlled in execution by the processor 2001. The processor 2001 is configured to execute the application program codes stored in the memory 2003 to implement the risk detection method provided in any embodiment of the present application.
The electronic device provided by the embodiment of the application is applicable to any embodiment of the method, and is not described herein again.
The embodiment of the present application provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the risk detection method shown in the above method embodiment.
The computer-readable storage medium provided in the embodiments of the present application is applicable to any of the embodiments of the foregoing method, and is not described herein again.
According to the risk detection scheme disclosed by the embodiment of the application, a user target instruction is received through an editable display interface; and controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state. According to the embodiment of the application, the APScheduler is adopted to realize various monitoring task scheduling modes, the web management background realizes configuration management of refined complex rules, and the system architecture can be expanded in parallel and supports large-scale deployment. A system administrator combines actual monitoring requirements, conveniently customizes monitoring items and monitoring task scheduling modes, and improves monitoring accuracy and coverage rate. The monitoring client and the monitoring configuration can be managed conveniently through the WEB background, the monitoring state can be checked in real time, and the labor cost is reduced.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (12)

1. A risk detection method is applied to a risk detection device, and the method comprises the following steps:
receiving a user target instruction through an editable display interface;
and controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state.
2. The risk detection method of claim 1, wherein the controlling the risk detection target enabling parameter according to the target command comprises:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
3. The risk detection method of claim 2, wherein the controlling the risk detection target enabling parameter comprises:
and controlling the risk detection process of the device based on the APScheduler.
4. The risk detection method of claim 3, further comprising:
receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
starting a risk detection process according to a preset detection rule;
and if the detection result data meet the index parameters, performing alarm prompt.
5. The risk detection method of claim 4, wherein after the risk detection process is initiated according to the preset detection rule, the method further comprises:
reporting the risk detection result data to an ActiveMQ;
reading risk detection result data from the ActiveMQ and caching the risk detection result data to Redis;
storing the cached risk detection result data to a database;
and reading detection result data in the database, and if the detection result data meet the index parameters, giving an alarm.
6. The risk detection method of claim 4, wherein prior to loading the configuration information, the method further comprises:
receiving a configuration loading request approval passing message of an administrator;
and responding to the approval passing message and loading the configuration information.
7. A risk detection device, the device comprising: a display module, an interface module and a control module, wherein,
the display module is used for displaying; editable display interface
The interface module is used for receiving a user target instruction through an editable display interface;
the control module is used for controlling the risk detection target enabling parameter according to the target instruction, wherein the target enabling parameter is used for controlling a risk detection enabling state.
8. The risk detection device of claim 7, wherein the control module is configured to:
controlling the risk detection target enabling parameter to be a first target enabling parameter according to a first target instruction of a user, wherein the first target enabling parameter is used for controlling the device to start a risk detection process according to a preset detection rule; or the like, or, alternatively,
controlling the risk detection target enabling parameter to be a second target enabling parameter according to a second target instruction of a user, wherein the second target enabling parameter is used for controlling the device to suspend a risk detection process; or the like, or, alternatively,
and controlling the risk detection target enabling parameter to be a third target enabling parameter according to a third target instruction of the user, wherein the third target enabling parameter is used for controlling the device to terminate the risk detection process.
9. The risk detection device of claim 8, wherein the control module is further configured to:
and controlling the risk detection process of the device based on the APScheduler.
10. The risk detection device of claim 9, further comprising a verification module and an alarm module, wherein,
the interface module is also used for receiving configuration information sent by a Web end and loading the configuration information; the configuration information comprises index parameters of a preset detection rule;
the control module is used for starting a risk detection process according to a preset detection rule;
the verification module is used for verifying whether the detection result data meets the index parameters;
and if the detection result data accords with the index parameters, the alarm module is used for carrying out alarm prompt.
11. An electronic device comprising a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the method of any one of claims 1-6 by calling the operation instruction.
12. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1-6.
CN202010968582.8A 2020-09-15 2020-09-15 Risk detection method and device, electronic equipment and readable storage medium Pending CN112187570A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010968582.8A CN112187570A (en) 2020-09-15 2020-09-15 Risk detection method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010968582.8A CN112187570A (en) 2020-09-15 2020-09-15 Risk detection method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112187570A true CN112187570A (en) 2021-01-05

Family

ID=73921168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010968582.8A Pending CN112187570A (en) 2020-09-15 2020-09-15 Risk detection method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112187570A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065627A (en) * 2022-05-20 2022-09-16 北京奇艺世纪科技有限公司 Parameter modification method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150032773A1 (en) * 2011-04-28 2015-01-29 International Business Machines Corporation Monitoring a monitoring-target process
CN105871957A (en) * 2015-01-21 2016-08-17 深圳市腾讯计算机系统有限公司 Monitoring framework design method, monitoring server, proxy unit and center control server
CN107656858A (en) * 2016-07-26 2018-02-02 深圳联友科技有限公司 A kind of method and system of automatic O&M monitoring oracle database
CN108762900A (en) * 2018-05-21 2018-11-06 平安科技(深圳)有限公司 High frequency method for scheduling task, system, computer equipment and storage medium
CN111143163A (en) * 2019-12-13 2020-05-12 上海硬通网络科技有限公司 Data monitoring method and device, computer equipment and storage medium
CN111290916A (en) * 2020-02-18 2020-06-16 深圳前海微众银行股份有限公司 Big data monitoring method, device and equipment and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150032773A1 (en) * 2011-04-28 2015-01-29 International Business Machines Corporation Monitoring a monitoring-target process
CN105871957A (en) * 2015-01-21 2016-08-17 深圳市腾讯计算机系统有限公司 Monitoring framework design method, monitoring server, proxy unit and center control server
CN107656858A (en) * 2016-07-26 2018-02-02 深圳联友科技有限公司 A kind of method and system of automatic O&M monitoring oracle database
CN108762900A (en) * 2018-05-21 2018-11-06 平安科技(深圳)有限公司 High frequency method for scheduling task, system, computer equipment and storage medium
CN111143163A (en) * 2019-12-13 2020-05-12 上海硬通网络科技有限公司 Data monitoring method and device, computer equipment and storage medium
CN111290916A (en) * 2020-02-18 2020-06-16 深圳前海微众银行股份有限公司 Big data monitoring method, device and equipment and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
腾讯移动品质中心TMQ: "Python定时框架Apscheduler详解", 《WWW.CNBLOG.COM》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115065627A (en) * 2022-05-20 2022-09-16 北京奇艺世纪科技有限公司 Parameter modification method and device, electronic equipment and storage medium
CN115065627B (en) * 2022-05-20 2024-04-12 北京奇艺世纪科技有限公司 Parameter modification method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US10735345B2 (en) Orchestrating computing resources between different computing environments
CN111897633A (en) Task processing method and device
CN112395107A (en) Tax control equipment control method and device, storage medium and electronic equipment
CN111367629A (en) Delayed task processing method and device
US11645098B2 (en) Systems and methods to pre-provision sockets for serverless functions
CN111726304A (en) Information processing method, information processing apparatus, computer system, and medium
US10291730B1 (en) Throttling push notifications using predictive workload modeling
CN112463290A (en) Method, system, apparatus and storage medium for dynamically adjusting the number of computing containers
EP4060496A2 (en) Method, apparatus, device and storage medium for running inference service platform
KR20220151585A (en) Business data processing method, apparatus, electronic apparatus, storage media and computer program
US10789183B2 (en) Aggregation handling
KR102583532B1 (en) Scheduling method and apparatus, device and storage medium
CN112187570A (en) Risk detection method and device, electronic equipment and readable storage medium
CN111198753A (en) Task scheduling method and device
US20190324817A1 (en) Method, apparatus, and computer program product for optimization in distributed system
CN113612643B (en) Network configuration method, device and equipment of cloud mobile phone and storage medium
US11061743B2 (en) Event loop optimization through event ordering
CN110445628B (en) NGINX-based server and deployment and monitoring methods and devices thereof
CN113726609A (en) System test method and device, electronic device and medium
CN112463616A (en) Chaos testing method and device for Kubernetes container platform
CN112988738A (en) Data slicing method and device for block chain
US11768704B2 (en) Increase assignment effectiveness of kubernetes pods by reducing repetitive pod mis-scheduling
CN113761548B (en) Data transmission method and device for Shuffle process
CN116991594B (en) Load balancer creation method, device, equipment and storage medium
CN114356505A (en) Method, apparatus, device, medium and product for scheduling groups of containers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210105