CN106202511A - A kind of alarm method based on log analysis and system - Google Patents

A kind of alarm method based on log analysis and system Download PDF

Info

Publication number
CN106202511A
CN106202511A CN201610579392.0A CN201610579392A CN106202511A CN 106202511 A CN106202511 A CN 106202511A CN 201610579392 A CN201610579392 A CN 201610579392A CN 106202511 A CN106202511 A CN 106202511A
Authority
CN
China
Prior art keywords
journal file
extraction
predetermined keyword
log
log analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610579392.0A
Other languages
Chinese (zh)
Inventor
朱英澍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201610579392.0A priority Critical patent/CN106202511A/en
Publication of CN106202511A publication Critical patent/CN106202511A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3452Performance evaluation by statistical analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs

Abstract

This application discloses a kind of alarm method based on log analysis and system, the method includes: with predetermined period scanning log file;Extract the predetermined keyword in described journal file;When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.This system includes: scan module, for predetermined period scanning log file;Extraction module, for extracting the predetermined keyword in described journal file;Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending warning information.The method and system can the analysis daily record of real-time high-efficiency, and find operating system or the problem of application program timely, solve to get up to be more prone to.

Description

A kind of alarm method based on log analysis and system
Technical field
The invention belongs to computer software technical field, particularly relate to a kind of alarm method based on log analysis and be System.
Background technology
Log recording is operating system or the requisite function of application program, in the prior art, when going wrong Time, such as when security of system sex chromosome mosaicism or application exception, go to analyze corresponding daily record, often faced by be one or several Huge journal file, the most effectively information may have no way of having looked into, and can only go to analyze reason afterwards, can not be to system Accomplish a real-time early warning, it is seen then that this mode solves the inefficient of problem.
Summary of the invention
For solving the problems referred to above, the invention provides a kind of alarm method based on log analysis and system, it is possible in real time Analyze daily record efficiently, and find operating system or the problem of application program timely, solve to get up to be more prone to.
A kind of based on log analysis the alarm method that the present invention provides, including:
With predetermined period scanning log file;
Extract the predetermined keyword in described journal file;
When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
Preferably, in above-mentioned alarm method based on log analysis,
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
Preferably, in above-mentioned alarm method based on log analysis,
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Preferably, in above-mentioned alarm method based on log analysis,
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
Preferably, in above-mentioned alarm method based on log analysis,
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
A kind of based on log analysis the warning system that the present invention provides, including:
Scan module, for predetermined period scanning log file;
Extraction module, for extracting the predetermined keyword in described journal file;
Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending announcement Alarming information.
Preferably, in above-mentioned warning system based on log analysis,
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
Preferably, in above-mentioned warning system based on log analysis,
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Preferably, in above-mentioned warning system based on log analysis,
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
Preferably, in above-mentioned warning system based on log analysis,
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
The invention provides above-mentioned alarm method based on log analysis and system, owing to first scanning daily record with predetermined period File, then extracts the predetermined keyword in described journal file, when the quantity of the described predetermined keyword extracted reaches corresponding Predetermined threshold value time, then send warning information, therefore, it is possible to the analysis daily record of real-time high-efficiency, and find operating system timely Or the problem of application program, solve to get up to be more prone to.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to The accompanying drawing provided obtains other accompanying drawing.
The schematic diagram of the first alarm method based on log analysis that Fig. 1 provides for the embodiment of the present application;
The schematic diagram of the first warning system based on log analysis that Fig. 2 provides for the embodiment of the present application.
Detailed description of the invention
The core concept of the present invention is to provide a kind of alarm method based on log analysis and system, it is possible to real-time high-efficiency Analysis daily record, and find operating system or the problem of application program timely, solve to get up to be more prone to.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise Embodiment, broadly falls into the scope of protection of the invention.
The first alarm method based on log analysis that the embodiment of the present application provides is as it is shown in figure 1, Fig. 1 is the application reality Execute the schematic diagram of the first alarm method based on log analysis that example provides.The method comprises the steps:
S1: with predetermined period scanning log file;
In this step, described daily record includes but not limited to system journal and concrete application log, and it is right to set One or more journal files carry out periodic scan, and the cycle can set, usually second level, such as, can be chosen as 2 seconds.
S2: extract the predetermined keyword in described journal file;
It should be noted that different key words can be arranged for the journal file of scanning, it is used for carrying out key message Extract.
S3: when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
In this step, the quantity in the described predetermined keyword extracted reaches corresponding predetermined threshold value, as noted abnormalities Link, in the scan period ERROR information too much or business module to call frequency the most high, alarm will be sent according to setting means Information, can send warning information in the way of mail notification, it would be possible to problem (the dangerous behaviour that system is carried out of generation Make, application exception), come out in advance, in order to take measures, it would be possible to the impact caused is preferably minimized.
The embodiment of the present application provides above-mentioned alarm method based on log analysis, owing to first scanning daily record with predetermined period File, then extracts the predetermined keyword in described journal file, when the quantity of the described predetermined keyword extracted reaches corresponding Predetermined threshold value time, then send warning information, therefore, it is possible to the analysis daily record of real-time high-efficiency, and find operating system timely Or the problem of application program, solve to get up to be more prone to.
The second alarm method based on log analysis that the embodiment of the present application provides, is the base in above-mentioned first method On plinth, also include following technical characteristic:
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
It should be noted that log information warehouse-in purpose be improve log analysis performance, when journal file magnitude very Time big, single file is analyzed extremely difficult by become, then in the periodic scan stage, it would be desirable to the log information of warehouse-in Put in storage after formatting, had data base's support, when log analysis, using the teaching of the invention it is possible to provide function is sorted out in powerful retrieval, improve daily record The efficiency analyzed and accuracy, and log information can be filtered before putting in storage, it is ensured that the effectiveness of warehouse-in log information, Avoid obscuring of invalid information.
The third alarm method based on log analysis that the embodiment of the present application provides, is at above-mentioned the first or the second On the basis of method, also include following technical characteristic:
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
It should be noted that key word needs to be configured according to concrete application scenarios, it is also not limited to above-mentioned three Individual example.The abnormal telnet link of attention location system secure context, or the ERROR daily record of application program, and need important The business module keyword etc. paid close attention to.Want to monitor telnet, then telnet is exactly keyword;Want to monitor interface login, that Login is exactly keyword.Need to operate according to concrete monitoring objective, analyzed by keyword, can be by current different Often information collects, in time for the real-time judge of the aspects such as security of system, interface exception and business module visit capacity.
The 4th kind of alarm method based on log analysis that the embodiment of the present application provides, is the base in the third method above-mentioned On plinth, also include following technical characteristic:
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
It is to say, the most do not read log file data without changing in current period, this just can be further Improve work efficiency.
The 5th kind of alarm method based on log analysis that the embodiment of the present application provides, is the base in above-mentioned 4th kind of method On plinth, also include following technical characteristic:
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
In this case, it is no need for part the most scanned before every time scanning, the ground of the last scan that can continue Point continues to scan on, thus improves work efficiency further.
The first warning system based on log analysis that the embodiment of the present application provides is as in figure 2 it is shown, Fig. 2 is the application reality Executing the schematic diagram of the first warning system based on log analysis that example provides, this system includes:
Scan module 1, for predetermined period scanning log file, described daily record includes but not limited to system journal and tool Body application log, can set and one or more journal files are carried out periodic scan, and the cycle can set, usually the second Level, such as, can be chosen as 2 seconds;
Extraction module 2, for extracting the predetermined keyword in described journal file, can set for the journal file of scanning Put different key words, be used for carrying out key message extraction;
Alarm module 3, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending announcement Alarming information, the quantity in the described predetermined keyword extracted reaches corresponding predetermined threshold value, such as link, the scan period of noting abnormalities Interior ERROR information too much or business module to call frequency the most high, will send a warning message according to setting means, can be with postal The mode of part notice sends warning information, it would be possible to (the dangerous operation that system is carried out, application program is different for the problem of generation Often), come out in advance, in order to take measures, it would be possible to the impact caused is preferably minimized.
The embodiment of the present application provides above-mentioned warning system based on log analysis, it is possible to the analysis daily record of real-time high-efficiency, And find operating system or the problem of application program timely, solve to get up to be more prone to.
The second warning system based on log analysis that the embodiment of the present application provides, is the base in the first system above-mentioned On plinth, also include following technical characteristic:
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
It should be noted that log information warehouse-in purpose be improve log analysis performance, when journal file magnitude very Time big, single file is analyzed extremely difficult by become, then in the periodic scan stage, it would be desirable to the log information of warehouse-in Put in storage after formatting, had data base's support, when log analysis, using the teaching of the invention it is possible to provide function is sorted out in powerful retrieval, improve daily record The efficiency analyzed and accuracy, and log information can be filtered before putting in storage, it is ensured that the effectiveness of warehouse-in log information, Avoid obscuring of invalid information.
The third warning system based on log analysis that the embodiment of the present application provides, is at above-mentioned the first or the second On the basis of system, also include following technical characteristic:
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Key word needs to be configured according to concrete application scenarios, is also not limited to above three example.Pay close attention to system The abnormal telnet link of system secure context, or the ERROR daily record of application program, and need the business module of significant concern Keyword etc..Want to monitor telnet, then telnet is exactly keyword;It is exactly crucial for wanting to monitor interface login, that login Word.Need to operate according to concrete monitoring objective, analyzed by keyword, current abnormal information can be collected in time Get up, for the real-time judge of the aspects such as security of system, interface exception and business module visit capacity.
The 4th kind of warning system based on log analysis that the embodiment of the present application provides, is the base in the third system above-mentioned On plinth, also include following technical characteristic:
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
It is to say, the most do not read log file data without changing in current period, this just can be further Improve work efficiency.
The 5th kind of warning system based on log analysis that the embodiment of the present application provides, is the base in above-mentioned 4th kind of system On plinth, also include following technical characteristic:
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
In this case, it is no need for part the most scanned before every time scanning, the ground of the last scan that can continue Point continues to scan on, thus improves work efficiency further.
Above-mentioned alarm method based on log analysis and system use language can be Python, Java, C++, mysql or Oracle etc., data base can be postgresql, and applied environment can be Linux environment.It is right to realize to a certain extent The warning function of monitored daily record, it is possible to find that daily record is abnormal timely, and pass through alarm notification, it would be possible to the risk fall of appearance To minimum, improve the analysis ability to daily record simultaneously.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention. Multiple amendment to these embodiments will be apparent from for those skilled in the art, as defined herein General Principle can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention It is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein and features of novelty phase one The widest scope caused.

Claims (10)

1. an alarm method based on log analysis, it is characterised in that including:
With predetermined period scanning log file;
Extract the predetermined keyword in described journal file;
When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
Alarm method based on log analysis the most according to claim 1, it is characterised in that
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
Alarm method based on log analysis the most according to claim 1 and 2, it is characterised in that
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Alarm method based on log analysis the most according to claim 3, it is characterised in that
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
Alarm method based on log analysis the most according to claim 4, it is characterised in that
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
6. a warning system based on log analysis, it is characterised in that including:
Scan module, for predetermined period scanning log file;
Extraction module, for extracting the predetermined keyword in described journal file;
Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sends alarm letter Breath.
Warning system based on log analysis the most according to claim 6, it is characterised in that
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
8. according to the warning system based on log analysis described in claim 6 or 7, it is characterised in that
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Warning system based on log analysis the most according to claim 8, it is characterised in that
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
Warning system based on log analysis the most according to claim 9, it is characterised in that
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
CN201610579392.0A 2016-07-21 2016-07-21 A kind of alarm method based on log analysis and system Pending CN106202511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610579392.0A CN106202511A (en) 2016-07-21 2016-07-21 A kind of alarm method based on log analysis and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610579392.0A CN106202511A (en) 2016-07-21 2016-07-21 A kind of alarm method based on log analysis and system

Publications (1)

Publication Number Publication Date
CN106202511A true CN106202511A (en) 2016-12-07

Family

ID=57491241

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610579392.0A Pending CN106202511A (en) 2016-07-21 2016-07-21 A kind of alarm method based on log analysis and system

Country Status (1)

Country Link
CN (1) CN106202511A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107168860A (en) * 2017-05-11 2017-09-15 郑州云海信息技术有限公司 A kind of detection method based on log analysis, storage device and storage control
CN107332720A (en) * 2017-08-22 2017-11-07 河钢股份有限公司承德分公司 A kind of device for collecting interchanger daily record
CN107426022A (en) * 2017-07-21 2017-12-01 上海携程商务有限公司 Security incident monitoring method and device, electronic equipment, storage medium
CN107729206A (en) * 2017-09-04 2018-02-23 上海斐讯数据通信技术有限公司 Real-time analysis method, system and the computer-processing equipment of alarm log
CN108170581A (en) * 2017-12-27 2018-06-15 北京奇艺世纪科技有限公司 A kind of fault early warning method, device and electronic equipment
CN109194532A (en) * 2018-11-07 2019-01-11 广东电网有限责任公司 A kind of method for pushing and device of power grid warning information
CN109947713A (en) * 2017-10-31 2019-06-28 北京国双科技有限公司 A kind of monitoring method and device of log
CN110362545A (en) * 2019-05-27 2019-10-22 平安科技(深圳)有限公司 Log monitoring method, device, terminal and computer readable storage medium
CN110401570A (en) * 2019-08-06 2019-11-01 中国联合网络通信集团有限公司 Alarm method, device, system, equipment and readable storage medium storing program for executing
CN110417575A (en) * 2019-06-17 2019-11-05 平安科技(深圳)有限公司 Alarm method, device and the computer equipment of O&M monitor supervision platform
CN110830438A (en) * 2019-09-25 2020-02-21 杭州优行科技有限公司 Abnormal log warning method and device and electronic equipment
CN111488314A (en) * 2020-03-30 2020-08-04 北京中电华大电子设计有限责任公司 Simulation log analysis method based on Python
CN111736579A (en) * 2020-08-26 2020-10-02 北京安帝科技有限公司 Industrial control equipment safety detection method based on log inquiry and retention
CN112087414A (en) * 2019-06-14 2020-12-15 北京奇虎科技有限公司 Detection method and device for mining trojans
CN112579009A (en) * 2019-09-30 2021-03-30 北京国双科技有限公司 Error log printing method and device, storage medium and electronic equipment
CN117493127A (en) * 2023-12-29 2024-02-02 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101650653A (en) * 2009-09-04 2010-02-17 中兴通讯股份有限公司 Daily constructing method and device
CN103336256A (en) * 2013-06-26 2013-10-02 上海华力微电子有限公司 WAT probe card intelligent processing system and method
CN104104734A (en) * 2014-08-04 2014-10-15 浪潮(北京)电子信息产业有限公司 Log analysis method and device
CN104378283A (en) * 2014-11-21 2015-02-25 国家电网公司 Sensitive email filtering system and method based on client/server mode
CN105791100A (en) * 2016-05-11 2016-07-20 潘成军 Chat information prompt method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101650653A (en) * 2009-09-04 2010-02-17 中兴通讯股份有限公司 Daily constructing method and device
CN103336256A (en) * 2013-06-26 2013-10-02 上海华力微电子有限公司 WAT probe card intelligent processing system and method
CN104104734A (en) * 2014-08-04 2014-10-15 浪潮(北京)电子信息产业有限公司 Log analysis method and device
CN104378283A (en) * 2014-11-21 2015-02-25 国家电网公司 Sensitive email filtering system and method based on client/server mode
CN105791100A (en) * 2016-05-11 2016-07-20 潘成军 Chat information prompt method

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107168860A (en) * 2017-05-11 2017-09-15 郑州云海信息技术有限公司 A kind of detection method based on log analysis, storage device and storage control
CN107426022A (en) * 2017-07-21 2017-12-01 上海携程商务有限公司 Security incident monitoring method and device, electronic equipment, storage medium
CN107426022B (en) * 2017-07-21 2020-06-16 上海携程商务有限公司 Security event monitoring method and device, electronic equipment and storage medium
CN107332720A (en) * 2017-08-22 2017-11-07 河钢股份有限公司承德分公司 A kind of device for collecting interchanger daily record
CN107729206A (en) * 2017-09-04 2018-02-23 上海斐讯数据通信技术有限公司 Real-time analysis method, system and the computer-processing equipment of alarm log
CN109947713A (en) * 2017-10-31 2019-06-28 北京国双科技有限公司 A kind of monitoring method and device of log
CN109947713B (en) * 2017-10-31 2021-08-10 北京国双科技有限公司 Log monitoring method and device
CN108170581A (en) * 2017-12-27 2018-06-15 北京奇艺世纪科技有限公司 A kind of fault early warning method, device and electronic equipment
CN109194532B (en) * 2018-11-07 2020-05-01 广东电网有限责任公司 Method and device for pushing power grid alarm information
CN109194532A (en) * 2018-11-07 2019-01-11 广东电网有限责任公司 A kind of method for pushing and device of power grid warning information
CN110362545A (en) * 2019-05-27 2019-10-22 平安科技(深圳)有限公司 Log monitoring method, device, terminal and computer readable storage medium
CN112087414A (en) * 2019-06-14 2020-12-15 北京奇虎科技有限公司 Detection method and device for mining trojans
CN110417575A (en) * 2019-06-17 2019-11-05 平安科技(深圳)有限公司 Alarm method, device and the computer equipment of O&M monitor supervision platform
CN110401570A (en) * 2019-08-06 2019-11-01 中国联合网络通信集团有限公司 Alarm method, device, system, equipment and readable storage medium storing program for executing
CN110830438A (en) * 2019-09-25 2020-02-21 杭州优行科技有限公司 Abnormal log warning method and device and electronic equipment
CN112579009A (en) * 2019-09-30 2021-03-30 北京国双科技有限公司 Error log printing method and device, storage medium and electronic equipment
CN111488314A (en) * 2020-03-30 2020-08-04 北京中电华大电子设计有限责任公司 Simulation log analysis method based on Python
CN111488314B (en) * 2020-03-30 2023-06-30 北京中电华大电子设计有限责任公司 Python-based simulation log analysis method
CN111736579A (en) * 2020-08-26 2020-10-02 北京安帝科技有限公司 Industrial control equipment safety detection method based on log inquiry and retention
CN117493127A (en) * 2023-12-29 2024-02-02 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium
CN117493127B (en) * 2023-12-29 2024-04-05 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN106202511A (en) A kind of alarm method based on log analysis and system
CN104966172A (en) Large data visualization analysis and processing system for enterprise operation data analysis
CN110830438A (en) Abnormal log warning method and device and electronic equipment
CN109992484B (en) Network alarm correlation analysis method, device and medium
CN110908883A (en) User portrait data monitoring method, system, equipment and storage medium
US20140189097A1 (en) Systems and methods for providing infrastructure metrics
CN115981984A (en) Equipment fault detection method, device, equipment and storage medium
CN115567235A (en) Network security emergency disposal system and application method
CN111831634A (en) Cloud platform processing system and method based on big data
CN107317708B (en) Monitoring method and device for court business application system
CN106802857A (en) A kind of method for parsing Seagate hard disk SMART daily records
CN112817814A (en) Abnormity monitoring method, system, storage medium and electronic device
CN110987081B (en) Outdoor environment detection system
CN115865649A (en) Intelligent operation and maintenance management control method, system and storage medium
KR101444250B1 (en) System for monitoring access to personal information and method therefor
CN113220799A (en) Big data early warning management system
CN111060149A (en) Data monitoring method and device based on power equipment
CN115169650B (en) Equipment health prediction method for big data analysis
CN110688369A (en) Method, device, storage medium and electronic equipment for analyzing DB2 message
US20230195903A1 (en) Password hardcoding checking method and apparatus based on pca, and medium
CN113568811A (en) Distributed safety monitoring data processing method
CN104426708A (en) Method and system for executing security detection service
CN113850463A (en) Processing method and device for misoperation prevention of transformer substation
CN112860527A (en) Fault monitoring method and device of application server
CN115145623A (en) White box monitoring method, device, equipment and storage medium of software business system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161207