CN106202511A - A kind of alarm method based on log analysis and system - Google Patents
A kind of alarm method based on log analysis and system Download PDFInfo
- Publication number
- CN106202511A CN106202511A CN201610579392.0A CN201610579392A CN106202511A CN 106202511 A CN106202511 A CN 106202511A CN 201610579392 A CN201610579392 A CN 201610579392A CN 106202511 A CN106202511 A CN 106202511A
- Authority
- CN
- China
- Prior art keywords
- journal file
- extraction
- predetermined keyword
- log
- log analysis
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3452—Performance evaluation by statistical analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1734—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
Abstract
This application discloses a kind of alarm method based on log analysis and system, the method includes: with predetermined period scanning log file;Extract the predetermined keyword in described journal file;When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.This system includes: scan module, for predetermined period scanning log file;Extraction module, for extracting the predetermined keyword in described journal file;Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending warning information.The method and system can the analysis daily record of real-time high-efficiency, and find operating system or the problem of application program timely, solve to get up to be more prone to.
Description
Technical field
The invention belongs to computer software technical field, particularly relate to a kind of alarm method based on log analysis and be
System.
Background technology
Log recording is operating system or the requisite function of application program, in the prior art, when going wrong
Time, such as when security of system sex chromosome mosaicism or application exception, go to analyze corresponding daily record, often faced by be one or several
Huge journal file, the most effectively information may have no way of having looked into, and can only go to analyze reason afterwards, can not be to system
Accomplish a real-time early warning, it is seen then that this mode solves the inefficient of problem.
Summary of the invention
For solving the problems referred to above, the invention provides a kind of alarm method based on log analysis and system, it is possible in real time
Analyze daily record efficiently, and find operating system or the problem of application program timely, solve to get up to be more prone to.
A kind of based on log analysis the alarm method that the present invention provides, including:
With predetermined period scanning log file;
Extract the predetermined keyword in described journal file;
When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
Preferably, in above-mentioned alarm method based on log analysis,
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
Preferably, in above-mentioned alarm method based on log analysis,
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Preferably, in above-mentioned alarm method based on log analysis,
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
Preferably, in above-mentioned alarm method based on log analysis,
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
A kind of based on log analysis the warning system that the present invention provides, including:
Scan module, for predetermined period scanning log file;
Extraction module, for extracting the predetermined keyword in described journal file;
Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending announcement
Alarming information.
Preferably, in above-mentioned warning system based on log analysis,
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
Preferably, in above-mentioned warning system based on log analysis,
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is
error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Preferably, in above-mentioned warning system based on log analysis,
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
Preferably, in above-mentioned warning system based on log analysis,
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
The invention provides above-mentioned alarm method based on log analysis and system, owing to first scanning daily record with predetermined period
File, then extracts the predetermined keyword in described journal file, when the quantity of the described predetermined keyword extracted reaches corresponding
Predetermined threshold value time, then send warning information, therefore, it is possible to the analysis daily record of real-time high-efficiency, and find operating system timely
Or the problem of application program, solve to get up to be more prone to.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Inventive embodiment, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to according to
The accompanying drawing provided obtains other accompanying drawing.
The schematic diagram of the first alarm method based on log analysis that Fig. 1 provides for the embodiment of the present application;
The schematic diagram of the first warning system based on log analysis that Fig. 2 provides for the embodiment of the present application.
Detailed description of the invention
The core concept of the present invention is to provide a kind of alarm method based on log analysis and system, it is possible to real-time high-efficiency
Analysis daily record, and find operating system or the problem of application program timely, solve to get up to be more prone to.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under not making creative work premise
Embodiment, broadly falls into the scope of protection of the invention.
The first alarm method based on log analysis that the embodiment of the present application provides is as it is shown in figure 1, Fig. 1 is the application reality
Execute the schematic diagram of the first alarm method based on log analysis that example provides.The method comprises the steps:
S1: with predetermined period scanning log file;
In this step, described daily record includes but not limited to system journal and concrete application log, and it is right to set
One or more journal files carry out periodic scan, and the cycle can set, usually second level, such as, can be chosen as 2 seconds.
S2: extract the predetermined keyword in described journal file;
It should be noted that different key words can be arranged for the journal file of scanning, it is used for carrying out key message
Extract.
S3: when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
In this step, the quantity in the described predetermined keyword extracted reaches corresponding predetermined threshold value, as noted abnormalities
Link, in the scan period ERROR information too much or business module to call frequency the most high, alarm will be sent according to setting means
Information, can send warning information in the way of mail notification, it would be possible to problem (the dangerous behaviour that system is carried out of generation
Make, application exception), come out in advance, in order to take measures, it would be possible to the impact caused is preferably minimized.
The embodiment of the present application provides above-mentioned alarm method based on log analysis, owing to first scanning daily record with predetermined period
File, then extracts the predetermined keyword in described journal file, when the quantity of the described predetermined keyword extracted reaches corresponding
Predetermined threshold value time, then send warning information, therefore, it is possible to the analysis daily record of real-time high-efficiency, and find operating system timely
Or the problem of application program, solve to get up to be more prone to.
The second alarm method based on log analysis that the embodiment of the present application provides, is the base in above-mentioned first method
On plinth, also include following technical characteristic:
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
It should be noted that log information warehouse-in purpose be improve log analysis performance, when journal file magnitude very
Time big, single file is analyzed extremely difficult by become, then in the periodic scan stage, it would be desirable to the log information of warehouse-in
Put in storage after formatting, had data base's support, when log analysis, using the teaching of the invention it is possible to provide function is sorted out in powerful retrieval, improve daily record
The efficiency analyzed and accuracy, and log information can be filtered before putting in storage, it is ensured that the effectiveness of warehouse-in log information,
Avoid obscuring of invalid information.
The third alarm method based on log analysis that the embodiment of the present application provides, is at above-mentioned the first or the second
On the basis of method, also include following technical characteristic:
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
It should be noted that key word needs to be configured according to concrete application scenarios, it is also not limited to above-mentioned three
Individual example.The abnormal telnet link of attention location system secure context, or the ERROR daily record of application program, and need important
The business module keyword etc. paid close attention to.Want to monitor telnet, then telnet is exactly keyword;Want to monitor interface login, that
Login is exactly keyword.Need to operate according to concrete monitoring objective, analyzed by keyword, can be by current different
Often information collects, in time for the real-time judge of the aspects such as security of system, interface exception and business module visit capacity.
The 4th kind of alarm method based on log analysis that the embodiment of the present application provides, is the base in the third method above-mentioned
On plinth, also include following technical characteristic:
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
It is to say, the most do not read log file data without changing in current period, this just can be further
Improve work efficiency.
The 5th kind of alarm method based on log analysis that the embodiment of the present application provides, is the base in above-mentioned 4th kind of method
On plinth, also include following technical characteristic:
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
In this case, it is no need for part the most scanned before every time scanning, the ground of the last scan that can continue
Point continues to scan on, thus improves work efficiency further.
The first warning system based on log analysis that the embodiment of the present application provides is as in figure 2 it is shown, Fig. 2 is the application reality
Executing the schematic diagram of the first warning system based on log analysis that example provides, this system includes:
Scan module 1, for predetermined period scanning log file, described daily record includes but not limited to system journal and tool
Body application log, can set and one or more journal files are carried out periodic scan, and the cycle can set, usually the second
Level, such as, can be chosen as 2 seconds;
Extraction module 2, for extracting the predetermined keyword in described journal file, can set for the journal file of scanning
Put different key words, be used for carrying out key message extraction;
Alarm module 3, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sending announcement
Alarming information, the quantity in the described predetermined keyword extracted reaches corresponding predetermined threshold value, such as link, the scan period of noting abnormalities
Interior ERROR information too much or business module to call frequency the most high, will send a warning message according to setting means, can be with postal
The mode of part notice sends warning information, it would be possible to (the dangerous operation that system is carried out, application program is different for the problem of generation
Often), come out in advance, in order to take measures, it would be possible to the impact caused is preferably minimized.
The embodiment of the present application provides above-mentioned warning system based on log analysis, it is possible to the analysis daily record of real-time high-efficiency,
And find operating system or the problem of application program timely, solve to get up to be more prone to.
The second warning system based on log analysis that the embodiment of the present application provides, is the base in the first system above-mentioned
On plinth, also include following technical characteristic:
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
It should be noted that log information warehouse-in purpose be improve log analysis performance, when journal file magnitude very
Time big, single file is analyzed extremely difficult by become, then in the periodic scan stage, it would be desirable to the log information of warehouse-in
Put in storage after formatting, had data base's support, when log analysis, using the teaching of the invention it is possible to provide function is sorted out in powerful retrieval, improve daily record
The efficiency analyzed and accuracy, and log information can be filtered before putting in storage, it is ensured that the effectiveness of warehouse-in log information,
Avoid obscuring of invalid information.
The third warning system based on log analysis that the embodiment of the present application provides, is at above-mentioned the first or the second
On the basis of system, also include following technical characteristic:
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is
error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Key word needs to be configured according to concrete application scenarios, is also not limited to above three example.Pay close attention to system
The abnormal telnet link of system secure context, or the ERROR daily record of application program, and need the business module of significant concern
Keyword etc..Want to monitor telnet, then telnet is exactly keyword;It is exactly crucial for wanting to monitor interface login, that login
Word.Need to operate according to concrete monitoring objective, analyzed by keyword, current abnormal information can be collected in time
Get up, for the real-time judge of the aspects such as security of system, interface exception and business module visit capacity.
The 4th kind of warning system based on log analysis that the embodiment of the present application provides, is the base in the third system above-mentioned
On plinth, also include following technical characteristic:
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
It is to say, the most do not read log file data without changing in current period, this just can be further
Improve work efficiency.
The 5th kind of warning system based on log analysis that the embodiment of the present application provides, is the base in above-mentioned 4th kind of system
On plinth, also include following technical characteristic:
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
In this case, it is no need for part the most scanned before every time scanning, the ground of the last scan that can continue
Point continues to scan on, thus improves work efficiency further.
Above-mentioned alarm method based on log analysis and system use language can be Python, Java, C++, mysql or
Oracle etc., data base can be postgresql, and applied environment can be Linux environment.It is right to realize to a certain extent
The warning function of monitored daily record, it is possible to find that daily record is abnormal timely, and pass through alarm notification, it would be possible to the risk fall of appearance
To minimum, improve the analysis ability to daily record simultaneously.
Described above to the disclosed embodiments, makes professional and technical personnel in the field be capable of or uses the present invention.
Multiple amendment to these embodiments will be apparent from for those skilled in the art, as defined herein
General Principle can realize without departing from the spirit or scope of the present invention in other embodiments.Therefore, the present invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and principles disclosed herein and features of novelty phase one
The widest scope caused.
Claims (10)
1. an alarm method based on log analysis, it is characterised in that including:
With predetermined period scanning log file;
Extract the predetermined keyword in described journal file;
When the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, send warning information.
Alarm method based on log analysis the most according to claim 1, it is characterised in that
After predetermined keyword in the described journal file of described extraction, also include:
Described journal file is formatted;
Journal file after formatting is put in storage;
The journal file of warehouse-in is sorted out.
Alarm method based on log analysis the most according to claim 1 and 2, it is characterised in that
Predetermined keyword in the described journal file of described extraction includes:
When attention location system is safe, the described predetermined keyword of extraction is telnet;
When paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
When paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Alarm method based on log analysis the most according to claim 3, it is characterised in that
Described include with predetermined period scanning log file:
Identify the amendment date of described journal file;
If the described amendment date in current period, then reads described journal file;
Scan described journal file.
Alarm method based on log analysis the most according to claim 4, it is characterised in that
After the described journal file of described scanning, also include:
The line number of record Current Scan or byte number, as the starting point of scanning next time.
6. a warning system based on log analysis, it is characterised in that including:
Scan module, for predetermined period scanning log file;
Extraction module, for extracting the predetermined keyword in described journal file;
Alarm module, for when the quantity of the described predetermined keyword extracted reaches corresponding predetermined threshold value, sends alarm letter
Breath.
Warning system based on log analysis the most according to claim 6, it is characterised in that
Also include:
Formatting module, for formatting described journal file;
Enter library module, for the journal file after formatting is put in storage;
Classifying module, for sorting out the journal file of warehouse-in.
8. according to the warning system based on log analysis described in claim 6 or 7, it is characterised in that
Described extraction module includes:
First extraction unit, for when attention location system is safe, the described predetermined keyword of extraction is telnet;
Second extraction unit, for when paying close attention to the error log of application program, the described predetermined keyword of extraction is error;
3rd extraction unit, for when paying close attention to interface and logging in situation, the described predetermined keyword of extraction is login.
Warning system based on log analysis the most according to claim 8, it is characterised in that
Described scan module includes:
Recognition unit, for identifying the amendment date of described journal file;
Read unit, for when the described amendment date is in current period, reading described journal file;
Scanning element, is used for scanning described journal file.
Warning system based on log analysis the most according to claim 9, it is characterised in that
Described scan module also includes:
Record unit, for recording line number or the byte number of Current Scan, as the starting point of scanning next time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610579392.0A CN106202511A (en) | 2016-07-21 | 2016-07-21 | A kind of alarm method based on log analysis and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610579392.0A CN106202511A (en) | 2016-07-21 | 2016-07-21 | A kind of alarm method based on log analysis and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106202511A true CN106202511A (en) | 2016-12-07 |
Family
ID=57491241
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610579392.0A Pending CN106202511A (en) | 2016-07-21 | 2016-07-21 | A kind of alarm method based on log analysis and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106202511A (en) |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107168860A (en) * | 2017-05-11 | 2017-09-15 | 郑州云海信息技术有限公司 | A kind of detection method based on log analysis, storage device and storage control |
CN107332720A (en) * | 2017-08-22 | 2017-11-07 | 河钢股份有限公司承德分公司 | A kind of device for collecting interchanger daily record |
CN107426022A (en) * | 2017-07-21 | 2017-12-01 | 上海携程商务有限公司 | Security incident monitoring method and device, electronic equipment, storage medium |
CN107729206A (en) * | 2017-09-04 | 2018-02-23 | 上海斐讯数据通信技术有限公司 | Real-time analysis method, system and the computer-processing equipment of alarm log |
CN108170581A (en) * | 2017-12-27 | 2018-06-15 | 北京奇艺世纪科技有限公司 | A kind of fault early warning method, device and electronic equipment |
CN109194532A (en) * | 2018-11-07 | 2019-01-11 | 广东电网有限责任公司 | A kind of method for pushing and device of power grid warning information |
CN109947713A (en) * | 2017-10-31 | 2019-06-28 | 北京国双科技有限公司 | A kind of monitoring method and device of log |
CN110362545A (en) * | 2019-05-27 | 2019-10-22 | 平安科技(深圳)有限公司 | Log monitoring method, device, terminal and computer readable storage medium |
CN110401570A (en) * | 2019-08-06 | 2019-11-01 | 中国联合网络通信集团有限公司 | Alarm method, device, system, equipment and readable storage medium storing program for executing |
CN110417575A (en) * | 2019-06-17 | 2019-11-05 | 平安科技(深圳)有限公司 | Alarm method, device and the computer equipment of O&M monitor supervision platform |
CN110830438A (en) * | 2019-09-25 | 2020-02-21 | 杭州优行科技有限公司 | Abnormal log warning method and device and electronic equipment |
CN111488314A (en) * | 2020-03-30 | 2020-08-04 | 北京中电华大电子设计有限责任公司 | Simulation log analysis method based on Python |
CN111736579A (en) * | 2020-08-26 | 2020-10-02 | 北京安帝科技有限公司 | Industrial control equipment safety detection method based on log inquiry and retention |
CN112087414A (en) * | 2019-06-14 | 2020-12-15 | 北京奇虎科技有限公司 | Detection method and device for mining trojans |
CN112579009A (en) * | 2019-09-30 | 2021-03-30 | 北京国双科技有限公司 | Error log printing method and device, storage medium and electronic equipment |
CN117493127A (en) * | 2023-12-29 | 2024-02-02 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101650653A (en) * | 2009-09-04 | 2010-02-17 | 中兴通讯股份有限公司 | Daily constructing method and device |
CN103336256A (en) * | 2013-06-26 | 2013-10-02 | 上海华力微电子有限公司 | WAT probe card intelligent processing system and method |
CN104104734A (en) * | 2014-08-04 | 2014-10-15 | 浪潮(北京)电子信息产业有限公司 | Log analysis method and device |
CN104378283A (en) * | 2014-11-21 | 2015-02-25 | 国家电网公司 | Sensitive email filtering system and method based on client/server mode |
CN105791100A (en) * | 2016-05-11 | 2016-07-20 | 潘成军 | Chat information prompt method |
-
2016
- 2016-07-21 CN CN201610579392.0A patent/CN106202511A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101650653A (en) * | 2009-09-04 | 2010-02-17 | 中兴通讯股份有限公司 | Daily constructing method and device |
CN103336256A (en) * | 2013-06-26 | 2013-10-02 | 上海华力微电子有限公司 | WAT probe card intelligent processing system and method |
CN104104734A (en) * | 2014-08-04 | 2014-10-15 | 浪潮(北京)电子信息产业有限公司 | Log analysis method and device |
CN104378283A (en) * | 2014-11-21 | 2015-02-25 | 国家电网公司 | Sensitive email filtering system and method based on client/server mode |
CN105791100A (en) * | 2016-05-11 | 2016-07-20 | 潘成军 | Chat information prompt method |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107168860A (en) * | 2017-05-11 | 2017-09-15 | 郑州云海信息技术有限公司 | A kind of detection method based on log analysis, storage device and storage control |
CN107426022A (en) * | 2017-07-21 | 2017-12-01 | 上海携程商务有限公司 | Security incident monitoring method and device, electronic equipment, storage medium |
CN107426022B (en) * | 2017-07-21 | 2020-06-16 | 上海携程商务有限公司 | Security event monitoring method and device, electronic equipment and storage medium |
CN107332720A (en) * | 2017-08-22 | 2017-11-07 | 河钢股份有限公司承德分公司 | A kind of device for collecting interchanger daily record |
CN107729206A (en) * | 2017-09-04 | 2018-02-23 | 上海斐讯数据通信技术有限公司 | Real-time analysis method, system and the computer-processing equipment of alarm log |
CN109947713A (en) * | 2017-10-31 | 2019-06-28 | 北京国双科技有限公司 | A kind of monitoring method and device of log |
CN109947713B (en) * | 2017-10-31 | 2021-08-10 | 北京国双科技有限公司 | Log monitoring method and device |
CN108170581A (en) * | 2017-12-27 | 2018-06-15 | 北京奇艺世纪科技有限公司 | A kind of fault early warning method, device and electronic equipment |
CN109194532B (en) * | 2018-11-07 | 2020-05-01 | 广东电网有限责任公司 | Method and device for pushing power grid alarm information |
CN109194532A (en) * | 2018-11-07 | 2019-01-11 | 广东电网有限责任公司 | A kind of method for pushing and device of power grid warning information |
CN110362545A (en) * | 2019-05-27 | 2019-10-22 | 平安科技(深圳)有限公司 | Log monitoring method, device, terminal and computer readable storage medium |
CN112087414A (en) * | 2019-06-14 | 2020-12-15 | 北京奇虎科技有限公司 | Detection method and device for mining trojans |
CN110417575A (en) * | 2019-06-17 | 2019-11-05 | 平安科技(深圳)有限公司 | Alarm method, device and the computer equipment of O&M monitor supervision platform |
CN110401570A (en) * | 2019-08-06 | 2019-11-01 | 中国联合网络通信集团有限公司 | Alarm method, device, system, equipment and readable storage medium storing program for executing |
CN110830438A (en) * | 2019-09-25 | 2020-02-21 | 杭州优行科技有限公司 | Abnormal log warning method and device and electronic equipment |
CN112579009A (en) * | 2019-09-30 | 2021-03-30 | 北京国双科技有限公司 | Error log printing method and device, storage medium and electronic equipment |
CN111488314A (en) * | 2020-03-30 | 2020-08-04 | 北京中电华大电子设计有限责任公司 | Simulation log analysis method based on Python |
CN111488314B (en) * | 2020-03-30 | 2023-06-30 | 北京中电华大电子设计有限责任公司 | Python-based simulation log analysis method |
CN111736579A (en) * | 2020-08-26 | 2020-10-02 | 北京安帝科技有限公司 | Industrial control equipment safety detection method based on log inquiry and retention |
CN117493127A (en) * | 2023-12-29 | 2024-02-02 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
CN117493127B (en) * | 2023-12-29 | 2024-04-05 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106202511A (en) | A kind of alarm method based on log analysis and system | |
CN104966172A (en) | Large data visualization analysis and processing system for enterprise operation data analysis | |
CN110830438A (en) | Abnormal log warning method and device and electronic equipment | |
CN109992484B (en) | Network alarm correlation analysis method, device and medium | |
CN110908883A (en) | User portrait data monitoring method, system, equipment and storage medium | |
US20140189097A1 (en) | Systems and methods for providing infrastructure metrics | |
CN115981984A (en) | Equipment fault detection method, device, equipment and storage medium | |
CN115567235A (en) | Network security emergency disposal system and application method | |
CN111831634A (en) | Cloud platform processing system and method based on big data | |
CN107317708B (en) | Monitoring method and device for court business application system | |
CN106802857A (en) | A kind of method for parsing Seagate hard disk SMART daily records | |
CN112817814A (en) | Abnormity monitoring method, system, storage medium and electronic device | |
CN110987081B (en) | Outdoor environment detection system | |
CN115865649A (en) | Intelligent operation and maintenance management control method, system and storage medium | |
KR101444250B1 (en) | System for monitoring access to personal information and method therefor | |
CN113220799A (en) | Big data early warning management system | |
CN111060149A (en) | Data monitoring method and device based on power equipment | |
CN115169650B (en) | Equipment health prediction method for big data analysis | |
CN110688369A (en) | Method, device, storage medium and electronic equipment for analyzing DB2 message | |
US20230195903A1 (en) | Password hardcoding checking method and apparatus based on pca, and medium | |
CN113568811A (en) | Distributed safety monitoring data processing method | |
CN104426708A (en) | Method and system for executing security detection service | |
CN113850463A (en) | Processing method and device for misoperation prevention of transformer substation | |
CN112860527A (en) | Fault monitoring method and device of application server | |
CN115145623A (en) | White box monitoring method, device, equipment and storage medium of software business system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |