CN111752642A - Configuration modification method and device, computing equipment and storage medium - Google Patents

Configuration modification method and device, computing equipment and storage medium Download PDF

Info

Publication number
CN111752642A
CN111752642A CN202010614070.1A CN202010614070A CN111752642A CN 111752642 A CN111752642 A CN 111752642A CN 202010614070 A CN202010614070 A CN 202010614070A CN 111752642 A CN111752642 A CN 111752642A
Authority
CN
China
Prior art keywords
configuration information
configuration
error
determining
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010614070.1A
Other languages
Chinese (zh)
Inventor
黄善荣
卢道和
罗锶
黄叶飞
陈晓峰
胡思文
朱嘉伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WeBank Co Ltd
Original Assignee
WeBank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WeBank Co Ltd filed Critical WeBank Co Ltd
Priority to CN202010614070.1A priority Critical patent/CN111752642A/en
Publication of CN111752642A publication Critical patent/CN111752642A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention relates to the field of financial technology (Fintech) and discloses a configuration modification method, a configuration modification device, computing equipment and a storage medium. In the embodiment of the invention, configuration information contained in a configuration modification instruction is determined in response to the configuration modification instruction triggered by a user; determining target content matched with a preset error-prone type set in the configuration information; verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content; determining the error rate of the configuration information according to the verification result of the target content; and if the error rate is lower than the preset value, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction. The embodiment of the invention determines the error rate of the configuration information and automatically determines whether the configuration information has errors according to the error rate, so that compared with manual inspection, the processing efficiency of inspecting whether the configuration information has errors is improved.

Description

Configuration modification method and device, computing equipment and storage medium
Technical Field
The present invention relates to the technical field of data processing in financial technology (Fintech), and in particular, to a configuration modification method, apparatus, computing device, and storage medium.
Background
With the development of computer technology, more and more technologies (such as block chains, cloud computing or big data) are applied in the financial field, the traditional financial industry is gradually changing to the financial technology, and big data technology is no exception, but higher requirements are also put forward on big data technology due to the security and real-time requirements of the financial and payment industries.
The application needs to load a series of configurations in response to a user's request when running, and thus the configurations are modified to meet different requirements of the user. After the configuration is modified, the configuration is input into a test system to test the application environment, whether the configuration can meet the requirements of users is tested, and if the test fails, the configuration is modified.
However, the reasons for the failed test may include that the configuration itself is faulty, or the configuration itself has no fault but the configuration cannot meet the requirements of the user, so that the developer who needs to modify the configuration performs a manual check to determine whether the configuration itself is faulty, which is inefficient.
Disclosure of Invention
The invention aims to provide a configuration modification method, which can automatically check the errors of configuration information and improve the processing efficiency of checking whether the configuration information is erroneous.
In a first aspect, an embodiment of the present invention provides a configuration modification method, including:
responding to a configuration modification instruction triggered by a user, and determining configuration information contained in the configuration modification instruction; the configuration information is used for enabling the corresponding application to respond to a request instruction of a user;
determining target content matched with a preset error-prone type set in the configuration information;
verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content;
determining the error rate of the configuration information according to the verification result of the target content;
and if the error rate is lower than a preset value, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
According to the method, when the user modifies the configuration information, the target content of the configuration information is matched from the preset error-prone type set, the verification mode corresponding to the target content is adopted for verification, the error rate of the configuration information is determined according to the verification result of the target content, whether the configuration information is wrong or not is automatically determined according to the error rate, and compared with manual verification, the processing efficiency for verifying whether the configuration information is wrong or not is improved.
In a possible implementation manner, determining an error rate of the configuration information according to a verification result of the target content includes:
forming a target error-prone type subset by the error-prone type to which the target content belongs;
determining a contribution rate set corresponding to the target error-prone type subset according to a corresponding relation between a preset error-prone type subset and the contribution rate set; the contribution rate in the determined contribution rate set represents the influence degree of errors on the configuration information containing the target content when the target content has errors; the error-prone type subset is formed by randomly combining error-prone types in a preset error-prone type set;
and according to the determined contribution rate set, adding the contribution rates of the target contents which are not verified in the verification result to obtain the error rate of the configuration information.
According to the method, because the content matched with the error-prone type does not pass the verification and does not have certain errors, and the failure of the content can only indicate that the error probability is higher, if the configuration information comprises a plurality of target contents, the influence degree values of the target contents which are not passed the verification in the verification result are added to serve as the error rate of the configuration information, and the accuracy of calculating the error rate of the configuration information is improved.
In a possible implementation manner, after determining an error rate of the configuration information according to a verification result of the target content, the method further includes:
if the error rate is higher than a preset value, generating an alarm frame and displaying the alarm frame to a user;
and if the user confirms that the configuration information has no error, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
According to the method, under the condition that the determined error rate is high, whether the configuration information has errors can be confirmed again in a manual mode, and the accuracy of detecting whether the configuration information has errors is improved.
In one possible implementation, the method further includes:
after a preset condition is met, adjusting the contribution rate in the contribution rate set through an exhaustion method;
determining a first false alarm rate of the target configuration information by adopting the adjusted contribution rate set, and determining a second false alarm rate of the target configuration information by adopting the contribution rate set updated last time; the target configuration information is the configuration information of the content matched through the target error-prone type subset after the contribution rate set is updated last time; taking the configuration information with the error rate higher than a preset value but without errors confirmed by the user as a false alarm;
if the first false alarm rate is smaller than the second false alarm rate, updating the corresponding relation by the adjusted contribution rate set;
wherein the preset conditions are any or all of the following:
the total number of the target configuration information exceeds the threshold number;
the current time point belongs to a preset adjustment time point.
According to the method, when the conditions are met, the contribution rate in the contribution rate set is finely adjusted through an exhaustion method, after each adjustment, the adjusted contribution rate is used for determining the false alarm rate of the target configuration information, the last updated contribution rate is used for determining the false alarm rate of the target configuration information, if the adjusted false alarm rate is lower than the last updated false alarm rate, the adjustment target is reached, and the error rate of the user for modifying the configuration information after the adjustment is carried out by using the adjusted contribution rate set is used.
In a possible implementation manner, after determining the configuration information included in the modification configuration instruction, before determining an error rate of the configuration information according to a verification result of the target content, the method further includes:
performing initial verification on the configuration information, and determining that the configuration information passes the initial verification;
wherein the initial verification comprises some or all of:
performing initial verification on the configuration information through a type verification rule corresponding to the type of the configuration information contained in the modification configuration instruction;
performing initial verification on the configuration information through an application corresponding verification rule to which the configuration information contained in the modification configuration instruction belongs;
performing initial verification on the configuration information through an error configuration information set; wherein the wrong configuration information set is a set of wrong configuration information.
The method can verify the configuration information integrally by adopting other verification means before verifying the content in the configuration information, so that the invention respectively verifies the configuration information integrally and verifies the local part of the configuration information, namely the content matched with the error-prone type, thereby improving the accuracy of the verification result.
In one possible implementation, the method further includes:
if the configuration information is initially verified and fails to pass the initial verification, generating an alarm box and displaying the alarm box to a user;
and if the user confirms that the configuration information has no error, determining the error rate of the configuration information according to the verification result of the target content.
According to the method, when the configuration information does not pass the error verification, the alarm frame is popped up for the user, whether the configuration information has errors is determined in a manual re-checking mode, if the configuration information has no errors in the manual verification, the content in the configuration information is further verified, and the accuracy of judging whether the configuration information has errors is improved.
In a possible implementation manner, after the updating the configuration information of the configuration center according to the configuration information included in the modification configuration instruction, the method further includes:
testing the updated configuration information through a testing system;
if the test is passed, judging whether the test environment in the test system is the same as the production environment in the production system;
if yes, importing the updated configuration information into a document, and sending the imported document to the production system from the test system;
and issuing the updated configuration information to the application through the production system.
According to the method, the test of the test system is carried out under the condition that no error exists in the configuration information, if the test is passed, the configuration information is proved to meet the requirements of the user, and the configuration in the test system is directly synchronized to the production system when the test environment in the test system is the same as the production environment in the production system, so that the efficiency of releasing the configuration information is improved.
In a possible implementation manner, before the updated configuration information is released to the application through the production system, the method further includes:
determining that the encrypted total value when not sent to the production system is equal to the encrypted total value when sent to the production system; the total encryption value is obtained by encrypting the updated configuration information;
and/or in the production system, determining configuration items in the updated configuration information, wherein the configuration items are equal to configuration items obtained by decrypting the encrypted character strings corresponding to each configuration item; when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
According to the method, whether the configuration item sent to the production system is tampered or not is determined through one or all of the two modes, so that the security verification is carried out on the configuration item sent to the production system, and the security of the transmission of the configuration information among different systems is improved.
In a possible implementation manner, after the updated configuration information is published to the application through the production system, the method further includes:
sending a tool pack to the application so that the application determines the sending time of the configuration request after the first configuration request according to the tool pack and sends the configuration request to the configuration center according to the determined sending time;
the tool kit specifies that the product of the interval times determined by the difference between the sending time of the first configuration request and the current time point and the preset interval time is added with the sending time of the first configuration request of the application to be used as the sending time of the current configuration request; or the product of the interval times determined by the difference between the preset time corresponding to the application and the current time point and the preset interval time, and the preset time corresponding to the application are added to be used as the sending time of the current configuration request.
According to the method, the request time of the application to the configuration center configuration request is specified, the time of the application configuration request is dispersed, and the pressure of the configuration center processing request when the application requests the configuration center to configure is reduced.
In a second aspect, an embodiment of the present invention further provides a configuration modification apparatus, where the apparatus includes:
the configuration information determining module is used for responding to a configuration modification instruction triggered by a user and determining configuration information contained in the configuration modification instruction; the configuration information is used for enabling the corresponding application to respond to a request instruction of a user;
the content determining module is used for determining target content matched with a preset error-prone type set in the configuration information;
the verification module is used for verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content;
the error rate determining module is used for determining the error rate of the configuration information according to the verification result of the target content;
and the updating module is used for updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction if the error rate is lower than a preset value.
In one possible implementation, the error rate determining module includes:
determining a contribution rate set unit, configured to form a target error-prone type subset by using the error-prone type to which the target content belongs; determining a contribution rate set corresponding to the target error-prone type subset according to a corresponding relation between a preset error-prone type subset and the contribution rate set; the contribution rate in the determined contribution rate set represents the influence degree of errors on the configuration information containing the target content when the target content has errors; the error-prone type subset is formed by randomly combining error-prone types in a preset error-prone type set;
and the error rate calculation unit is used for adding the contribution rates of the target contents which are not verified in the verification result according to the determined contribution rate set to obtain the error rate of the configuration information.
In a possible implementation manner, after the error rate determining module determines the error rate of the configuration information, the apparatus further includes:
the first display module is used for generating an alarm frame and displaying the alarm frame to a user if the error rate is higher than a preset value;
and the user determining module is used for updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction if the user confirms that the configuration information has no error.
In one possible implementation, the apparatus further includes:
the adjusting module is used for adjusting the contribution rate in the contribution rate set through an exhaustion method after a preset condition is met; wherein the preset conditions are any or all of the following: the total number of the target configuration information exceeds the threshold number; the current time point belongs to a preset adjusting time point;
a module for calculating false alarm rate, which is used for determining the first false alarm rate of the target configuration information by adopting the adjusted contribution rate set, and determining the second false alarm rate of the target configuration information by adopting the contribution rate set updated last time; the target configuration information is the configuration information of the content matched through the target error-prone type subset after the contribution rate set is updated last time; taking the configuration information with the error rate higher than a preset value but without errors confirmed by the user as a false alarm;
and the updating module is used for updating the corresponding relation by the adjusted contribution rate set if the first false alarm rate is smaller than the second false alarm rate.
In a possible implementation manner, after the determining configuration information module determines the configuration information included in the modification configuration instruction, and before the determining error rate module determines the error rate of the configuration information, the apparatus further includes:
the initial verification module is used for performing initial verification on the configuration information and determining that the configuration information passes the initial verification;
wherein the initial verification comprises some or all of:
performing initial verification on the configuration information through a type verification rule corresponding to the type of the configuration information contained in the modification configuration instruction;
performing initial verification on the configuration information through an application corresponding verification rule to which the configuration information contained in the modification configuration instruction belongs;
performing initial verification on the configuration information through an error configuration information set; wherein the wrong configuration information set is a set of wrong configuration information.
In one possible implementation, the apparatus further includes:
the second display module is used for generating an alarm frame and displaying the alarm frame to a user if the configuration information is initially verified and fails to pass the initial verification;
and the error rate determining module is further used for determining the error rate of the configuration information according to the verification result of the target content if the user confirms that the configuration information has no error.
In a possible implementation manner, after the updating module updates the configuration information of the configuration center, the apparatus further includes:
the test module is used for testing the updated configuration information through the test system; if the test is passed, judging whether the test environment in the test system is the same as the production environment in the production system; if yes, importing the updated configuration information into a document, and sending the imported document to the production system from the test system;
and the release module is used for releasing the updated configuration information to the application through the production system.
In a possible implementation manner, before the issuing module issues the updated configuration information, the apparatus further includes:
the safety verification module is used for determining that the encrypted total value when the encrypted total value is not sent to the production system is equal to the encrypted total value when the encrypted total value is sent to the production system; the total encryption value is obtained by encrypting the updated configuration information;
and/or in the production system, determining configuration items in the updated configuration information, wherein the configuration items are equal to configuration items obtained by decrypting the encrypted character strings corresponding to each configuration item; when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
In a possible implementation manner, after the issuing module issues the updated configuration information, the apparatus further includes:
a tool pack sending module, configured to send a tool pack to the application, so that the application determines, according to the tool pack, sending time of a configuration request after a first configuration request, and sends the configuration request to the configuration center according to the determined sending time;
the tool kit specifies that the product of the interval times determined by the difference between the sending time of the first configuration request and the current time point and the preset interval time is added with the sending time of the first configuration request of the application to be used as the sending time of the current configuration request; or the product of the interval times determined by the difference between the preset time corresponding to the application and the current time point and the preset interval time, and the preset time corresponding to the application are added to be used as the sending time of the current configuration request.
In a third aspect, an embodiment of the present invention provides a computing device, including:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to perform a method according to any of the first aspects in accordance with the obtained program.
In a fourth aspect, the present invention provides a computer-readable storage medium storing computer-executable instructions for causing a computer to perform the method according to any one of the first aspect.
In addition, for technical effects brought by any one implementation manner of the second aspect to the third aspect, reference may be made to technical effects brought by different implementation manners of the first aspect, and details are not described here.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments of the present invention will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart of a configuration modification method according to an embodiment of the present invention;
fig. 2 is a flowchart of a manual access configuration modification method according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a modification of configuration information according to an embodiment of the present invention;
FIG. 4 is an information interaction diagram for performing validation according to an applied validation rule according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating verification that configuration information passes initial verification and error rate verification according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a work of publishing after configuration modification according to an embodiment of the present invention;
fig. 7 is a block diagram of a configuration modification apparatus according to an embodiment of the present invention.
Detailed Description
To further illustrate the technical solutions provided by the embodiments of the present invention, the following detailed description is made with reference to the accompanying drawings and the specific embodiments. Although embodiments of the present invention provide method steps as shown in the following embodiments or figures, more or fewer steps may be included in a method based on conventional or non-inventive efforts. In steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by embodiments of the present invention. The method can be executed in the order of the embodiments or the method shown in the drawings or in parallel in the actual process or the control device.
It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. The term "plurality" in the embodiments of the present invention means two or more, and other terms are similarly used, it being understood that the preferred embodiments described herein are only for illustrating and explaining the present invention, and are not intended to limit the present invention, and that the embodiments of the present invention and features of the embodiments may be combined with each other without conflict.
At present, when a test configuration of a test system has a problem, the problem may occur in the writing method of the configuration information, and the problem in the writing method can only be detected manually, so that the detection efficiency is low. In view of the above, the present invention provides a configuration modification method, apparatus, computing device and storage medium, which are used to solve the above problems.
The error-prone type is a type of content in which an error easily occurs in the configuration information, for example, an english word, an IP address, and the like.
The configuration center is a device for storing configuration information. The configuration center comprises a test system and a production system, the test system is a system for testing whether configuration meets the requirements of users, the production system is a system which is in direct communication with the application side, and for example, when configuration information is released, the configuration information is released in the production system of the configuration center.
The invention conception of the invention is as follows: the method comprises the steps of finding out the content matched with the error-prone type in the configuration information, verifying the target content matched with the configuration information in a verification mode corresponding to the error-prone type, determining the error rate of the configuration information according to the verification result of the target content, automatically determining whether the configuration information is in error or not, and improving the processing efficiency of detecting whether the configuration information is in error or not compared with manual detection.
The configuration modification method in the embodiment of the present invention is described in detail below with reference to the drawings.
An embodiment of the present invention provides a configuration modification method, which is shown in fig. 1 and includes:
s100: and determining the configuration information contained in the configuration modification instruction in response to the configuration modification instruction triggered by the user.
The configuration information is used for enabling the corresponding application to respond to a request instruction of a user.
The modification configuration instructions in response to user triggers are completed on the visualization modification configuration page.
Modifying the configuration information includes modifying the original configuration information and adding new configuration information.
S101: and determining target content matched with a preset error-prone type set in the configuration information.
When an error occurs through historical configuration information, the error reason is found, the type of the content of the error reason is determined as an error-prone type, and a plurality of error-prone types are combined into an error-prone type set.
For example, when the historical configuration information is wrong, the found error reason is that the IP address cannot be connected, and the IP address in the configuration information is determined to be wrong, so that the type of the IP address is taken as an error-prone type.
For example, the error-prone type set is an English letter composed of an IP address, t "" u "" r "" e ";
in the matching, the IP address is first matched from the content in the configuration information, and if the IP address is matched, for example: extracting ABCDE from the extract; then matching English letters consisting of't', 'u', 'r' and 'e' from the content in the configuration information, and extracting the tube if matching to the tube, wherein the target content is ABCDE and the tube.
S102: and verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content.
Before the configuration modification method is carried out, the verification method corresponding to the error-prone type in the preset error-prone type set is determined, wherein the verification method corresponding to each error-prone type is set by a developer according to own experience. And after the target content is determined, verifying the target content by directly adopting a preset verification method corresponding to the error-prone type to which the target content belongs to obtain a verification result.
If the error-prone type of the target content is the IP address, judging whether the target content is communicated, if so, judging that the verification result is pass verification, otherwise, judging that the verification result is fail verification;
if the error-prone type of the target content is the English character, judging whether the composition sequence of the English character in the target content is a preset composition sequence, if so, judging that the verification result is pass verification, otherwise, judging that the verification result is not pass verification.
Taking target contents as ABCDE and true as examples, regarding the error-prone type of the ABCDE as an IP address, and whether the IP address is communicated with a preset verification mode is determined according to the IP address; the type of easy error of the tune is English letters composed of "t", "u", "r" and "e", and the preset verification mode corresponding to the English letters composed of "t", "u", "r" and "e" is that whether the composition sequence of the four letters is true or not; then determining whether the ABCDE is communicated or not, and taking the judgment result as a verification result; and regarding whether the sequence of the tube is true, and taking the judgment result as a verification result.
S103: and determining the error rate of the configuration information according to the verification result of the target content.
S104: and if the error rate is lower than the preset value, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
The preset value is preset by a developer according to own experience, and the preset value can be modified by the developer after being set.
Through the process, a mode for automatically detecting whether the configuration information is wrong is provided, when the configuration information is modified, the content matched with the preset error-prone type in the configuration information is verified, the error rate of the configuration information is determined based on the verification result of the content matched with the error-prone type, and compared with the prior art that the error rate is detected through a manual mode, the processing efficiency for detecting whether the configuration information is wrong is improved.
The number of the target contents matched in each configuration information and the error-prone type subset formed by the error-prone types to which the target contents belong are different, so that the error rate of the subsequent configuration information is different in confirmation result. Therefore, in the present invention, the corresponding relationship between the error-prone type subset and the contribution rate set needs to be preset in advance.
And the error-prone type subset is formed by randomly combining error-prone types in a preset error-prone type set.
For example, if the error-prone types in the error-prone type set are respectively an error-prone type 1, an error-prone type 2, an error-prone type 3, an error-prone type 4, and an error-prone type 5, the error-prone type subset may be: any one error-prone type in the error-prone type set, a set formed by any two error-prone types in the error-prone type set, a set formed by any three error-prone types in the error-prone type set, a set formed by any four error-prone types in the error-prone type set, and a set formed by 5 error-prone types in the error-prone type set.
Then for each error-prone type subset a contribution ratio set is corresponded. And the contribution rate in the contribution rate set represents the influence degree of the error of the configuration information containing the content matched with the corresponding error-prone type when the content matched with the corresponding error-prone type is in error.
Based on this, the present invention provides a way to determine the error rate of configuration information, comprising:
forming a target error-prone type subset by the error-prone type to which the target content belongs;
determining a contribution rate set corresponding to the target error-prone type subset according to the corresponding relation between the preset error-prone type subset and the contribution rate set; the contribution rate in the determined contribution rate set represents the influence degree of errors on the configuration information containing the target content when the target content has errors;
and adding the contribution rates of the target contents which are not verified in the verification result according to the determined contribution rate set to obtain the error rate of the configuration information.
For example, the target contents in the configuration information are content 1, content 2, content 3, content 4, and content 5; the content 1 belongs to an error-prone type 1, the content 2 belongs to an error-prone type 2, the content 3 belongs to an error-prone type 3, the content 4 belongs to an error-prone type 4, and the content 5 belongs to an error-prone type 5; and forming an easy-to-error type subset by an easy-to-error type 1, an easy-to-error type 2, an easy-to-error type 3, an easy-to-error type 4 and an easy-to-error type 5, and determining a contribution rate set corresponding to the easy-to-error type subset. The contribution rate set comprises a contribution rate 1 corresponding to an error-prone type 1, a contribution rate 2 corresponding to an error-prone type 2, a contribution rate 3 corresponding to an error-prone type 3, a contribution rate 4 corresponding to an error-prone type 4, and a contribution rate 5 corresponding to an error-prone type 5.
That is, the contribution rate of the content 1 whose verification result is failed verification is the contribution rate 1, the contribution rate of the content 2 whose verification result is failed verification is the contribution rate 2, the contribution rate of the content 3 whose verification result is failed verification is the contribution rate 3, the contribution rate of the content 4 whose verification result is failed verification is the contribution rate 4, and the contribution rate of the content 5 whose verification result is failed verification is the contribution rate 5.
Wherein, the target contents which fail to pass the verification result are respectively content 1, content 2 and content 4. The error rate of the configuration information is equal to the contribution rate 1+ the contribution rate 2+ the contribution rate 4.
Because the content matched with the error-prone type is the content which is easy to make an error, the verification fails in a preset verification mode, the content matched with the error-prone type is not necessarily wrong, but the error probability is higher, so that the error rate of the configuration information can be evaluated by the target content which is failed in verification through the mode of determining the error rate of the configuration information, and the accuracy of calculating the error rate of the configuration information is improved.
In addition, if the verification target content in the configuration information fails, an alarm is sent to the developer, although the fault tolerance is low, the probability of error extraction is high, and particularly, when the number of the modified configuration information is high, the probability of error extraction is high, and the developer is troublesome to process. Therefore, the error rate of the configuration information obtained by adding the contribution rates of the target contents which are not verified provided by the invention can reduce the work of developers, and the processing speed is relatively high.
When the error rate is higher than the preset value, it is described that the probability of error of the configuration information obtained by the method shown in fig. 1 is relatively high, and when the probability of error of the configuration information is relatively high, the present invention provides a manual method to further determine whether the configuration information has an error, specifically:
if the error rate is higher than the preset value, generating an alarm frame and displaying the alarm frame to a user;
and if the user confirms that the configuration information has no error, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
The manner of integrating manual determinations, as shown in fig. 2, when modifying the configuration, can work as follows:
s200: responding to a configuration modification instruction triggered by a user, and determining configuration information contained in the configuration modification instruction;
s201: determining an error rate of the configuration information; the method in which the error rate is determined is shown in fig. 1.
S202: judging whether the error rate is greater than or equal to a preset value or not; if yes, executing S203 and S204; otherwise, S205 is executed;
s203: generating an alarm frame and displaying the alarm frame to a user;
s204: if the user confirms that the configuration information has no errors, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction;
s205: and updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
Referring to fig. 3, the modified configuration page includes the name of the configuration item to be modified, a filling box (white box in the figure) for modifying the configuration item, and a button for determining the modification, and when the user wants to modify the configuration information, the user needs to start the visualized modified configuration page.
Inputting the content of the modified configuration item in the filling box of the modified configuration item of the visual modified configuration page, clicking a button for determining modification, responding to a modified configuration instruction triggered by a user by the configuration center, and extracting the content of the modified configuration item in the filling box of the modified configuration item of the visual modified configuration page as the configuration information for starting modification at this time. And for the configuration information modified this time, adopting the method of FIG. 1 to verify the error rate of the configuration information.
When the error rate is higher than the preset value, a warning frame is popped up, the warning frame indicates the target content which is not verified, the reason why the target content is not verified, the error rate of the configuration information, and inquires whether a developer carries out the next step, for example, the IP address network is not available, the tune letter is misspelled, the error rate is 60%, a 'next step' button is used, when the user clicks the 'next step' button, the user confirms that the configuration information is not wrong, and the configuration information of the configuration center is updated according to the configuration information contained in the modified configuration instruction. And when the error rate is lower than a preset value, directly updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
For the contribution rate sets in the corresponding relationship, the initial contribution rate set is divided equally according to the number of the target contents in the configuration information, for example, if the number of the target contents in the configuration information is 5, each contribution rate is 20%; if the number of the target contents in the configuration information is 4, each contribution rate is 25%; however, since each target content error has a different influence on the configuration information error, the contribution rate is different.
It should be noted that the contribution rates in the initial contribution rate set may also be randomly generated, and the present invention is not limited in particular.
And under the condition of meeting the preset condition, adjusting the value of the contribution rate by an exhaustion method, so that the contribution rate is more consistent with the influence degree of the contribution rate on configuration information errors. Meanwhile, in order to avoid unlimited adjustment, an adjustment target is determined by a false alarm rate, and adjustment is stopped after the adjustment target is reached, wherein the error rate is higher than a preset value, but the configuration information of which the user confirms that the configuration information has no error is used as one false alarm.
The false alarm rate is the number of elements in the target cluster meeting the false alarm condition divided by the total number of elements in the target cluster. The target cluster is configuration information in which an error-prone type subset consisting of error-prone types to which target content belongs and a contribution rate set are in a corresponding relationship after the contribution rate set is updated last time. That is, when the contribution rate in the contribution rate set 1 is adjusted, and when the user modifies the configuration information, the content is matched through the error-prone type subset 1, and the error rate of the configuration information, which is a member of the target cluster, is determined according to the matched content through the contribution rate set 1 corresponding to the error-prone type subset 1. The false alarm condition means that the error rate of the configuration information is higher than a preset value, and a user confirms that the configuration information has no error.
The embodiment of the invention provides an adjusting scheme which specifically comprises the following steps:
after the preset conditions are met, adjusting the contribution rate in the contribution rate set through an exhaustion method;
determining a first false alarm rate of the target configuration information by adopting the adjusted contribution rate set, and determining a second false alarm rate of the target configuration information by adopting the contribution rate set updated last time;
and if the first false alarm rate is less than the second false alarm rate, updating the corresponding relation of the adjusted contribution rate set.
For example, before a preset condition is met, work is performed by using the contribution rate in the contribution rate set of the last update, the contribution rate set of the last update comprises a 0%, b 0% and c 0%, the statistics shows that the error rate of the target configuration information determined by using a 0%, b 0% and c 0% is higher than the preset value, but the user considers that the modified target configuration information has no error, and the times of determining the error rate of the target configuration information modified by the user using a 0%, b 0% and c 0% are divided, so as to obtain the false alarm rate.
And the target configuration information is the configuration information of the content matched by the target error-prone type subset after the contribution rate set is updated last time.
For example, the contribution rate set 1 is adjusted, the error-prone type subset 1 has a corresponding relationship with the contribution rate set 1, when the user modifies the configuration information for verification after the contribution rate set 1 is updated last time, the error-prone type to which the target content belongs is extracted from the configuration information modified by the user, and the error-prone type subset composed of the error-prone types is combined into the error-prone type subset 1, wherein the configuration information modified by the user is the target configuration information.
After the preset conditions are met, obtaining the contribution rate sets of a 1%, b 1% and c 1% after the first adjustment by an exhaustion method; and counting the times that the error rate of the target configuration information modified by the user is determined to be higher than a preset value by adopting a 1%, b 1% and c 1%, but the user considers that the modified target configuration information has no error, and the times that the error rate of the target configuration information modified by the user is determined by adopting a 1%, b 1% and c 1%, and dividing the two times to obtain the false alarm rate.
Judging whether the false alarm rates obtained by a 1%, b 1% and c 1% are smaller than the false alarm rates obtained by a 0%, b 0% and c 0%, if so, stopping adjustment, updating the corresponding relation of the first-adjusted contribution rate set, and then determining the error rate of the configuration information modified by the user by adopting the first-adjusted contribution rate set until a preset condition is met.
If the false alarm rates obtained by a 1%, b 1% and c 1% are judged to be not less than the false alarm rates obtained by a 0%, b 0% and c 0%, the contribution rates in the contribution rate set are adjusted for the second time through an exhaustion method, and the adjusted contribution rate set is a 2%, b 2% and c 2%.
And counting the times that the error rate of the target configuration information modified by the user is determined to be higher than a preset value by adopting a 2%, b 2% and c 2%, but the user considers that the modified target configuration information has no error, and the times that the error rate of the target configuration information modified by the user is determined by adopting a 2%, b 2% and c 2%, and dividing the two times to obtain the false alarm rate.
And judging whether the false alarm rates obtained by a 2%, b 2% and c 2% are smaller than the false alarm rates obtained by a 0%, b 0% and c 0%, if so, stopping adjustment, and performing subsequent work by adopting the contribution rate sets obtained after the second adjustment of a 2%, b 2% and c 2%. And analogizing in sequence, if the false alarm rates obtained by a 0%, b 0% and c 0% are still not satisfied for the second time, performing adjustment for the third time until the condition that the false alarm rates obtained by a 0%, b 0% and c 0% are less than is satisfied, and updating the corresponding relation by using the adjusted contribution rate set which satisfies the false alarm rates obtained by a 0%, b 0% and c 0% so that when the error rate is determined later, the error rate is determined according to the adjusted contribution rate set which satisfies the false alarm rates obtained by a 0%, b 0% and c 0%.
The introduced preset conditions are as follows:
mode 1: the total number of the target configuration information exceeds the threshold number;
in the mode 1, when the contribution rate needs to be adjusted, the commonality can be found through the statistical characteristics for adjustment, if the number is small, the individuality is highlighted instead of the commonality, that is, the counted false alarm rate cannot reflect the influence degree of the content error matched with the error-prone type on the configuration information error.
Therefore, when the total number of the target configuration information exceeds the threshold value, the contribution rate set is adjusted, and the accuracy of adjustment can be improved.
Mode 2: the current time point belongs to a preset adjustment time point.
Since the configuration information is used by the application, when the application requests configuration, the configuration center has busy time, so that the contribution rate set can be adjusted when the configuration center is relatively idle.
The preset adjusting time point can be at late night such as 1 am, 2 am and the like.
It should be noted that the preset conditions provided by the present invention may be used alone, or may be used in combination, for example, after the total number of the target configuration information exceeds the threshold number, the contribution rate in the contribution rate set is adjusted by an exhaustion method; or after the current time point belongs to a preset adjusting time point, adjusting the contribution rate in the contribution rate set by an exhaustion method; or after the total number of the target configuration information exceeds the threshold number and the current time point belongs to the preset adjusting time point, adjusting the contribution rate in the contribution rate set through an exhaustion method.
After the configuration information is determined, the configuration information is initially verified, the configuration information is determined to pass the initial verification, then the error rate of the configuration information is determined according to the verification result of the target content, and the configuration information of the configuration center is updated when the error rate is lower than the preset value.
Wherein the initial verification comprises:
mode 1: and initially verifying the configuration information by modifying a type verification rule corresponding to the type of the configuration information contained in the configuration instruction.
When a developer modifies configuration information in a configuration center, the developer can select the type of the modified configuration information by modifying a 'drop-down box' in a configuration page, click a button for determining modification, respond to a modification configuration instruction triggered by a user, extract the content of the modified configuration item in a filling box of the modified configuration item of the visual modified configuration page as the configuration information for starting modification at this time, and simultaneously extract the type of the configuration information, and adopt a type verification rule corresponding to the type to perform initial verification on the configuration information.
For example, the type of the modified configuration information may be a mobile phone number and an ID (Identity document) number, and when the type is the mobile phone number, the modified configuration information may be verified according to a type verification rule corresponding to the mobile phone number, where the type verification rule corresponding to the mobile phone number is an arrangement rule forming the mobile phone number, for example: the first three digits are the 2113 national uniform number segment, for example: 139, 138, 137, the middle four digits typically represent the city, and the last four digits are random numbers.
Mode 2: performing initial verification on the configuration information by modifying an application corresponding verification rule to which the configuration information contained in the configuration instruction belongs;
the specific configuration information contained in the application can be verified by the application with the verification rule, so that when the specific configuration information is modified, the verification rule of the application can be adopted for verification.
In the actual execution process, the configuration center reserves an interface, and as shown in fig. 4, when the configuration center 400 modifies the configuration information, a developer transmits the configuration information to the interface, verifies the modified configuration information on the application side 401, feeds back the verification result to the configuration center 400 by the application side 401, and the configuration center 400 continues the subsequent process according to the verification result.
Mode 3: performing initial verification on the configuration information through an error configuration information set; wherein the wrong configuration information set is a set of configuration information that is in error.
In practical applications, a developer a configures a configuration item incorrectly, the developer a remembers that the writing of the configuration item is incorrect, but a developer B of the same project configures the same configuration item after a certain time, but due to reasons such as leave or leave of the developer a, the developer B may have the same error when modifying a configuration item as when modifying the configuration item by an opener a. The method is that the configuration center stores the previously determined wrong configuration information, namely, the configuration center has a memory function, when the configuration information is modified by the configuration center, whether the modified configuration information is in the wrong configuration information set is determined, if so, the verification is not passed, otherwise, the verification is passed.
When the configuration information with errors in the error configuration information set has a rule, that is, when an error can be found through a verification mode, a developer adds a new error-prone type in a preset error-prone type set and configures a corresponding verification mode. And deleting the configuration information in the error configuration information set which is determined to be in error through the new error-prone type. That is, the configuration information of the error in the error configuration information set may be the configuration information including the content of the error that cannot be verified by the verification means. The error content is the content in the configuration information, and the error content is the basis for judging the error of the configuration information.
If the configuration information is initially verified and fails to pass the initial verification, generating an alarm box and displaying the alarm box to a user;
and if the user confirms that the configuration information has no error, determining the error rate of the configuration information according to the verification result of the target content. That is, after the initial verification is passed, the error rate of the configuration information is determined by the method shown in fig. 1, and the error rate is determined.
It should be noted that the three initial verifications provided by the present invention can be used separately, for example, the method 1 is adopted for initial verification; or performing initial verification by adopting a mode 2; or perform initial verification using mode 3. Three initial verifications can be used in combination, for example, the initial verification is performed by way of mode 1 and mode 2; or performing initial verification by adopting a mode 1 and a mode 3; or performing initial verification by adopting a mode 2 and a mode 3; or performing initial verification using mode 1, mode 2, and mode 3.
In general, in order to improve the accuracy of verification, the initial verification is performed in the above three ways, but special cases may also occur as follows:
with respect to the mode 1, if the user does not select the type of the modified configuration information, the initial authentication cannot be performed by the mode 1.
For the mode 2, if there is no corresponding verification mode in the application to which the configuration information modified by the user belongs, the initial verification cannot be performed by the mode 2.
In the case of the method 3, if no wrong configuration information set is stored in the configuration information, the initial verification cannot be performed by the method 3.
For the case of performing the initial verification in two or more ways, taking the case of performing the initial verification in way 1 and way 2 as an example, the specific process, as shown in fig. 5, includes:
s500: responding to a configuration modification instruction triggered by a user, and determining configuration information contained in the configuration modification instruction;
s501: performing initial verification on the configuration information by modifying a type verification rule corresponding to the type of the configuration information contained in the configuration instruction, and judging whether the configuration information passes the verification; if yes, executing S502, otherwise, executing S503;
s502: performing initial verification on the configuration information by modifying an application corresponding verification rule to which the configuration information contained in the configuration instruction belongs, and judging whether the configuration information passes the verification; if yes, executing S504; if so, executing S505;
s503: generating a first alarm frame to be displayed to the user, and executing S502 after the user confirms that the configuration information has no error; and the content displayed in the first alarm box can be the failed type verification rule.
S504: determining an error rate of the configuration information; wherein the error rate can be obtained by the method shown in fig. 1;
s505: generating a second alarm frame to be displayed to the user, and executing S504 after the user confirms that the configuration information has no error; the content displayed in the second alarm box can be the verification rule which fails to pass the application.
S506: judging whether the error rate is smaller than a preset value or not; if yes, executing S507, otherwise executing S508;
s507: updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction;
s508: and generating a third alarm frame to be displayed to the user, and updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction when the user confirms that no error occurs in the configuration information.
Taking a new requirement added to the application as an example, the workflow of the new requirement is shown in fig. 6, and includes:
s600: responding to a configuration modification instruction triggered by a user, and determining whether the error rate of configuration information contained in the configuration modification instruction and the fault rate are smaller than a preset value or not; the manner of determining the error rate of the configuration information is as shown in fig. 1. If yes, executing S601; otherwise, executing S602;
s601: updating the configuration information of the configuration center and inputting the updated configuration information into the test system;
s602: notifying the developer; thus, the developer can modify the configuration information;
s603: testing the updated configuration information through the testing system to determine whether the test is passed; if yes, go to S604; otherwise, executing S605;
s604: judging whether the test environment in the test system is the same as the production environment in the production system; if so, executing S606 and S608, otherwise, executing S607 and S608;
s605: generating a prompt box to prompt developers of test failure;
s606: importing the updated configuration information into a document, and sending the imported document to a production system from a test system;
s607: introducing the modified configuration information into a production system in a manual mode;
s608: and issuing the modified configuration information to the application through the production system.
It should be noted that, when the modified configuration information is manually imported into the production system, an error is likely to occur due to manual operation, and in order to ensure the correctness of the published configuration information, after the modified configuration information is imported into the production system, whether the configuration information has an error is determined by using the method shown in fig. 1 for the configuration information, if no error exists, the updated configuration information is published into the application through the production system, and if an error occurs, a developer is notified, so that the developer performs manual inspection.
The updated configuration information mentioned in S606 is imported into a document, where the document may be an excel table, WPS, or the like.
For information security, before S608, the present invention provides three schemes for verifying the security of the configuration information transmitted from the test system to the production system.
Scheme 1:
determining that the encrypted total value when not sent to the production system is equal to the encrypted total value when sent to the production system; and the encrypted total value is obtained by encrypting the updated configuration information.
Specifically, after the updated configuration information passes the test of the test system, the updated configuration information is encrypted, and a corresponding encryption character string, namely an encryption total value when the configuration information is not sent to the production system, is calculated; sending the encrypted character string and the updated configuration information to a production system, encrypting the configuration information in the production system by adopting the same encryption mode as the encryption in the test system to obtain an encrypted total value when the configuration information is sent to the generation system, then judging whether the two encrypted total values are the same, if so, indicating that the synchronous configuration information is not tampered and can be released, otherwise, indicating that the synchronous configuration information is tampered and has the risk of malicious attack.
Scheme 2:
in the production system, determining configuration items in the updated configuration information, wherein the configuration items are equal to configuration items obtained by decrypting the encrypted character string corresponding to each configuration item; when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
Specifically, after the updated configuration information passes the test of the test system, the configuration items in the updated configuration information are encrypted, an encrypted character string corresponding to each configuration item is calculated, the encrypted character string corresponding to each configuration item and the updated configuration information are sent to the production system, in the production system, the updated configuration information is decrypted by adopting a decryption method corresponding to encryption in the test system to obtain the configuration items, then, each configuration item is judged to compare the received configuration items with the configuration items decrypted by the encrypted character strings, if the configuration items are the same, the synchronous configuration information is not tampered and can be issued, otherwise, the synchronous configuration information is tampered and has a risk of malicious attack.
Scheme 3:
determining that the encrypted total value when not sent to the production system is equal to the encrypted total value when sent to the production system; the total encryption value is obtained by encrypting the updated configuration information;
and in the production system, determining configuration items in the updated configuration information, which are equal to configuration items obtained by decrypting the encrypted character string corresponding to each configuration item; and when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
Specifically, after the updated configuration information passes the test of the test system, calculating a corresponding encrypted character string according to each configuration item in the updated configuration information, and calculating a corresponding encrypted total value for the whole updated configuration information; and after the encrypted character string, the encrypted total value and the updated configuration information are led into a file, after the encrypted character string, the encrypted total value and the updated configuration information are synchronized to a production system, the corresponding encrypted total value is calculated in the production system according to the whole updated configuration information, whether the encrypted total value which is not sent to the production system is equal to the encrypted total value which is sent to the production system or not is judged, if yes, the synchronized configuration information is not tampered, otherwise, the synchronized configuration information is tampered, and the risk of malicious attack is caused.
And meanwhile, decrypting the encrypted character string corresponding to each configuration by adopting decryption operation, judging whether the decrypted configuration item is the same as the configuration item in the file, if so, indicating that the synchronous configuration information is not tampered, otherwise, indicating that the synchronous configuration information is tampered and having the risk of malicious attack.
And after the synchronous configuration information is found to be determined to be tampered, notifying maintenance personnel of the test system and the production system so that the maintenance personnel can maintain the information security of the test system and the production system.
Before the updated configuration information is published, manual approval is generally required, that is, whether the updated configuration information needs to be published is determined through manual approval. Based on this, an embodiment of the present invention provides a workflow, including:
step 1: the developer modifies the configuration information in the test system, and after the configuration information is verified by the method provided by the invention, the configuration information is fully tested in the test environment of the test system.
Step 2: and after a developer logs in the test environment and enters a corresponding application configuration page, the configuration items needing to be synchronized are screened, and a configuration file table is clicked and generated. The configuration file table is an excel table of configuration items, and each configuration item in the excel table has a specific encrypted character string and an overall encrypted character string of configured content.
And step 3: and (4) a developer logs in the bill-of-lading approval system, fills the imported excel form into a template configured with the synchronous bill, obtains an approval bill and applies for approval of the approval bill.
And 4, step 4: after the examination and approval sheet is approved by each approver, the bill-drawing examination and approval system triggers and calls a preset synchronous interface to transmit the configuration items and the corresponding encrypted character strings in the examination and approval sheet to the production system.
And 5: after receiving the configuration items of the examination and approval list and the corresponding encrypted character strings, the production system carries out decryption operation on each configuration item, and if two conditions that the contents of the encrypted character strings and the configuration items are not matched or the contents of the whole content configuration contents and the encrypted character strings are not matched are found, the configuration items of the examination and approval list at this time are rejected, and a maintainer of the production system and a developer initiating synchronization are prompted, so that the maintainer can check whether the network is attacked maliciously and whether the developer initiates the operation of synchronizing to the production system again.
Step 6: after the content of the examination and approval sheet is verified, the operation and maintenance personnel log in the production system, enter the corresponding application configuration page and click the synchronous production configuration button, namely, the configuration content of the test environment is successfully synchronized into the production environment. And after synchronization, the operation and maintenance personnel perform corresponding release operation. Wherein the publishing of the configuration information is to inform the application that the configuration information can be requested from the configuration center.
The configuration center stores configuration information, and when the application responds to a user request, the application needs to make a configuration request to the configuration center.
Based on this, after the updated configuration information is released to the application through the production system, the method further includes:
sending the tool pack to the application so that the application determines the sending time of the configuration request after the first configuration request according to the tool pack and sends the configuration request to the configuration center according to the determined sending time;
the tool kit specifies that the product of the interval times determined by the difference between the sending time of the first configuration request and the current time point and the preset interval time is added with the sending time of the first configuration request of the application to be used as the sending time of the current configuration request; or the product of the interval times determined by the difference between the preset time corresponding to the application and the current time point and the preset interval time is added with the preset time corresponding to the application to be used as the sending time of the current configuration request.
After the same configuration information is issued, due to the issue of the script/machine, for example, different routers, the terminals connected to different routers receive the time of issuing the configuration information in sequence, that is, the application receiving time is also different, and the time of initiating the first configuration request to the issued configuration information may also be different.
Based on this, the configuration center of the invention will send an application tool packet, so that the application side can receive the tool packet according to the sending time of the configuration request specified by the tool packet.
For example: under the condition that the default application requests in the toolkit are configured once at an interval of 5 seconds, because the time of the first configuration request is inconsistent, the time of sending each round of configuration requests to the configuration center after the first time can calculate the next execution time T1, the configuration center records the sending time of the first configuration request of the application, identifies the sending time of the first configuration request of which application is specific according to the system number of the application, and then configures the sending time of the first configuration request into the toolkit to send the application with the same system number as the first configuration request.
When the application side needs to carry out a second configuration request, obtaining the time for sending the second configuration request according to the sending time of the first configuration request plus 1 preset interval time; if the current time exceeds the calculated sending time of the second configuration request, the interval time is increased once, and the time for initiating the second configuration request is the preset interval time multiplied by 2+ the sending time of the first configuration request; until the current time point does not exceed the calculated time for sending the second configuration request.
For example, when the first sending time of the configuration request is 1 month 1 afternoon 1:20 minutes 3 seconds in 2020, the reference sending time of the second sending of the configuration request is: 1/pm in 2020 at 1:20 min 3 s +5 s ═ 1/pm in 2020 at 1:20 min 8 s; if the current time point is 1/45 pm 1:20 min 45 sec in 2020 and is longer than the calculated second time transmission time of the configuration request, the difference between the first time transmission time of the configuration request and the current time point is calculated, the difference between the first time transmission time of the configuration request and the current time point is 42 sec, the interval time is 8 times by dividing 42 sec by a preset interval time of 5 sec in 1/1 pm 1/2020 and is 2 seconds more, so that the interval time is determined to be 9 and 5 seconds, that is, the transmission time is 1/20 min 1/1 pm in 1/2020, and the second time of the configuration request needs to wait for 3 seconds and then is transmitted at 48 seconds.
The manner of calculating the sending time by using the preset time corresponding to the application is similar to the manner described above, wherein the preset time corresponding to the application can be configured for the application by the configuration center.
Based on the same conception, the embodiment of the invention also provides a configuration modification device. As shown in fig. 7, the apparatus includes:
a configuration information determining module 700, configured to determine, in response to a configuration modification instruction triggered by a user, configuration information included in the configuration modification instruction; the configuration information is used for enabling the corresponding application to respond to a request instruction of a user;
a content determining module 701, configured to determine target content that matches a preset error prone type set in the configuration information;
the verification module 702 is configured to verify the target content according to a preset verification method corresponding to the error-prone type to which the target content belongs, so as to obtain a verification result of the target content;
an error rate determining module 703, configured to determine an error rate of the configuration information according to a verification result of the target content;
an updating module 704, configured to update the configuration information of the configuration center according to the configuration information included in the configuration modification instruction if the error rate is lower than a preset value.
Further, the error rate determining module 703 includes:
determining a contribution rate set unit, configured to form a target error-prone type subset by using the error-prone type to which the target content belongs; determining a contribution rate set corresponding to the target error-prone type subset according to a corresponding relation between a preset error-prone type subset and the contribution rate set; the contribution rate in the determined contribution rate set represents the influence degree of errors on the configuration information containing the target content when the target content has errors; the error-prone type subset is formed by randomly combining error-prone types in a preset error-prone type set;
and the error rate calculation unit is used for adding the contribution rates of the target contents which are not verified in the verification result to obtain the error rate of the configuration information according to the contribution rate set corresponding to the target content set.
Further, after the error rate determining module 703 determines the error rate of the configuration information, the apparatus further includes:
the first display module is used for generating an alarm frame and displaying the alarm frame to a user if the error rate is higher than a preset value;
and the user determining module is used for updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction if the user confirms that the configuration information has no error.
Further, the apparatus further comprises:
the adjusting module is used for adjusting the contribution rate in the contribution rate set through an exhaustion method after a preset condition is met; wherein the preset conditions are any or all of the following: the total number of the target configuration information exceeds the threshold number; the current time point belongs to a preset adjusting time point;
a module for calculating false alarm rate, which is used for determining the first false alarm rate of the target configuration information by adopting the adjusted contribution rate set, and determining the second false alarm rate of the target configuration information by adopting the contribution rate set updated last time; the target configuration information is the configuration information of the content matched through the target error-prone type subset after the contribution rate set is updated last time; setting the configuration information with the error rate higher than a preset value and without errors as a false alarm by the user;
and the updating module is used for updating the corresponding relation by the adjusted contribution rate set if the first false alarm rate is smaller than the second false alarm rate.
Further, after the module for determining configuration information 700 determines the configuration information included in the modification configuration instruction and before the module for determining error rate 703 determines the error rate of the configuration information, the apparatus further includes:
the initial verification module is used for performing initial verification on the configuration information and determining that the configuration information passes the initial verification;
wherein the initial verification comprises some or all of:
performing initial verification on the configuration information through a type verification rule corresponding to the type of the configuration information contained in the modification configuration instruction;
performing initial verification on the configuration information through an application corresponding verification rule to which the configuration information contained in the modification configuration instruction belongs;
performing initial verification on the configuration information through an error configuration information set; wherein the wrong configuration information set is a set of wrong configuration information.
Further, the apparatus further comprises:
the second display module is used for generating an alarm frame and displaying the alarm frame to a user if the configuration information is initially verified and fails to pass the initial verification;
and the error rate determining module is further used for determining the error rate of the configuration information according to the verification result of the target content if the user confirms that the configuration information has no error.
Further, after the updating module 704 updates the configuration information of the configuration center, the apparatus further includes:
the test module is used for testing the updated configuration information through the test system; if the test is passed, judging whether the test environment in the test system is the same as the production environment in the production system; if yes, importing the modified configuration information into a document, and sending the imported document to the production system from the test system;
and the release module is used for releasing the updated configuration information to the application through the production system.
Further, before the issuing module issues the updated configuration information, the apparatus further includes:
the safety verification module is used for determining that the encrypted total value when the encrypted total value is not sent to the production system is equal to the encrypted total value when the encrypted total value is sent to the production system; the total encryption value is obtained by encrypting the updated configuration information;
and/or in the production system, determining configuration items in the updated configuration information, wherein the configuration items are equal to configuration items obtained by decrypting the encrypted character strings corresponding to each configuration item; when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
Further, after the issuing module issues the updated configuration information, the apparatus further includes:
a tool pack sending module, configured to send a tool pack to the application, so that the application determines, according to the tool pack, sending time of a configuration request after a first configuration request, and sends the configuration request to the configuration center according to the determined sending time;
the tool kit specifies that the product of the interval times determined by the difference between the sending time of the first configuration request and the current time point and the preset interval time is added with the sending time of the first configuration request of the application to be used as the sending time of the current configuration request; or the product of the interval times determined by the difference between the preset time corresponding to the application and the current time point and the preset interval time, and the preset time corresponding to the application are added to be used as the sending time of the current configuration request.
The embodiment of the invention also provides a computing device, which can be specifically a desktop computer, a portable computer, a smart phone, a tablet computer, a Personal Digital Assistant (PDA) and the like. The computing device may include a Central Processing Unit (CPU), memory, input/output devices, etc., the input devices may include a keyboard, mouse, touch screen, etc., and the output devices may include a Display device, such as a Liquid Crystal Display (LCD), a Cathode Ray Tube (CRT), etc.
Memory, which may include Read Only Memory (ROM) and Random Access Memory (RAM), provides the processor with program instructions and data stored in the memory. In embodiments of the present invention, the memory may be used to store program instructions for a configuration modification method;
and the processor is used for calling the program instructions stored in the memory and executing the configuration modification method according to the obtained program.
An embodiment of the present invention further provides a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are used to enable a computer to execute the configuration modification method.
It should be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A configuration modification method, comprising:
responding to a configuration modification instruction triggered by a user, and determining configuration information contained in the configuration modification instruction; the configuration information is used for enabling the corresponding application to respond to a request instruction of a user;
determining target content matched with a preset error-prone type set in the configuration information;
verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content;
determining the error rate of the configuration information according to the verification result of the target content;
and if the error rate is lower than a preset value, updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction.
2. The method of claim 1, wherein determining the error rate of the configuration information according to the verification result of the target content comprises:
forming a target error-prone type subset by the error-prone type to which the target content belongs;
determining a contribution rate set corresponding to the target error-prone type subset according to a corresponding relation between a preset error-prone type subset and the contribution rate set; the contribution rate in the determined contribution rate set represents the influence degree of errors on the configuration information containing the target content when the target content has errors; the error-prone type subset is formed by randomly combining error-prone types in a preset error-prone type set;
and according to the determined contribution rate set, adding the contribution rates of the target contents which are not verified in the verification result to obtain the error rate of the configuration information.
3. The configuration modification method according to claim 2, characterized in that the method further comprises:
after a preset condition is met, adjusting the contribution rate in the contribution rate set through an exhaustion method;
determining a first false alarm rate of the target configuration information by adopting the adjusted contribution rate set, and determining a second false alarm rate of the target configuration information by adopting the contribution rate set updated last time; the target configuration information is the configuration information of the content matched through the target error-prone type subset after the contribution rate set is updated last time; taking the configuration information with the error rate higher than a preset value but without errors confirmed by the user as a false alarm;
if the first false alarm rate is smaller than the second false alarm rate, updating the corresponding relation by the adjusted contribution rate set;
wherein the preset conditions are any or all of the following:
the total number of the target configuration information exceeds the threshold number;
the current time point belongs to a preset adjustment time point.
4. The method according to claim 1, wherein after determining the configuration information included in the modification configuration command and before determining the error rate of the configuration information according to the verification result of the target content, the method further comprises:
performing initial verification on the configuration information, and determining that the configuration information passes the initial verification;
wherein the initial verification comprises some or all of:
performing initial verification on the configuration information through a type verification rule corresponding to the type of the configuration information contained in the modification configuration instruction;
performing initial verification on the configuration information through an application corresponding verification rule to which the configuration information contained in the modification configuration instruction belongs;
performing initial verification on the configuration information through an error configuration information set; wherein the wrong configuration information set is a set of wrong configuration information.
5. The method according to any one of claims 1 to 4, wherein after updating the configuration information of the configuration center according to the configuration information included in the configuration modification instruction, the method further comprises:
testing the updated configuration information through a testing system;
if the test is passed, judging whether the test environment in the test system is the same as the production environment in the production system;
if yes, importing the updated configuration information into a document, and sending the imported document to the production system from the test system;
and issuing the updated configuration information to the application through the production system.
6. The configuration modification method according to claim 5, wherein before the updated configuration information is published into an application by the production system, the method further comprises:
determining that the encrypted total value when not sent to the production system is equal to the encrypted total value when sent to the production system; the total encryption value is obtained by encrypting the updated configuration information;
and/or in the production system, determining configuration items in the updated configuration information, wherein the configuration items are equal to configuration items obtained by decrypting the encrypted character strings corresponding to each configuration item; when the updated configuration information is not sent to the production system, determining the encrypted character string corresponding to each configuration item, and sending the updated configuration information and the encrypted character string corresponding to each configuration item to the production system.
7. The configuration modification method according to claim 5, wherein after the updated configuration information is published into an application by the production system, the method further comprises:
sending a tool pack to the application so that the application determines the sending time of the configuration request after the first configuration request according to the tool pack and sends the configuration request to the configuration center according to the determined sending time;
the tool kit specifies that the product of the interval times determined by the difference between the sending time of the first configuration request and the current time point and the preset interval time is added with the sending time of the first configuration request of the application to be used as the sending time of the current configuration request; or the product of the interval times determined by the difference between the preset time corresponding to the application and the current time point and the preset interval time, and the preset time corresponding to the application are added to be used as the sending time of the current configuration request.
8. A configuration modification apparatus, characterized in that the apparatus comprises:
the configuration information determining module is used for responding to a configuration modification instruction triggered by a user and determining configuration information contained in the configuration modification instruction; the configuration information is used for enabling the corresponding application to respond to a request instruction of a user;
the content determining module is used for determining target content matched with a preset error-prone type set in the configuration information;
the verification module is used for verifying the target content according to a preset verification method corresponding to the error-prone type of the target content to obtain a verification result of the target content;
the error rate determining module is used for determining the error rate of the configuration information according to the verification result of the target content;
and the updating module is used for updating the configuration information of the configuration center according to the configuration information contained in the configuration modification instruction if the error rate is lower than a preset value.
9. A computing device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to execute the configuration modification method of any one of claims 1 to 7 in accordance with the obtained program.
10. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the configuration modification method of any one of claims 1-7.
CN202010614070.1A 2020-06-30 2020-06-30 Configuration modification method and device, computing equipment and storage medium Pending CN111752642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010614070.1A CN111752642A (en) 2020-06-30 2020-06-30 Configuration modification method and device, computing equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010614070.1A CN111752642A (en) 2020-06-30 2020-06-30 Configuration modification method and device, computing equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111752642A true CN111752642A (en) 2020-10-09

Family

ID=72676962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010614070.1A Pending CN111752642A (en) 2020-06-30 2020-06-30 Configuration modification method and device, computing equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111752642A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114327602A (en) * 2021-12-31 2022-04-12 北京百度网讯科技有限公司 Information processing method, information processing device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114327602A (en) * 2021-12-31 2022-04-12 北京百度网讯科技有限公司 Information processing method, information processing device, electronic equipment and storage medium
CN114327602B (en) * 2021-12-31 2022-11-04 北京百度网讯科技有限公司 Information processing method, device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108427632B (en) Automatic test method and device
US11003563B2 (en) Compliance testing through sandbox environments
AU2019331368B2 (en) Electronic document signing using blockchain
CN113779444B (en) Interface development method, zero code engine and zero code data interface development system
US11778083B2 (en) Generating a screening interface for communications
CN110088744A (en) A kind of database maintenance method and its system
CN111428132A (en) Data verification method and device, computer storage medium and electronic equipment
CN109145651B (en) Data processing method and device
US20240089361A1 (en) Restricting access based on voice communication parameters
CN110309160A (en) Data enter chain transaction methods, device, computer equipment and storage medium
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN111339551B (en) Data verification method and related device and equipment
CN103440460A (en) Application system change validation method and system
US10282239B2 (en) Monitoring method
CN111752642A (en) Configuration modification method and device, computing equipment and storage medium
CN111222181A (en) AI model supervision method, system, server and storage medium
CN116450391A (en) Fault positioning method, device, equipment and medium
US11531735B1 (en) Dynamic fraud intervention machine
CN113971602A (en) Financial data processing method and device, storage medium and server
CN108882239A (en) A kind of method for sending information and device
CN106528248A (en) Downloading method and system of mobile terminal based on software integrity
CN113360172A (en) Application deployment method and device, computer equipment and storage medium
CN113570370B (en) UTXO-based blockchain transaction supervision method and device and readable storage medium
CN113570368B (en) Block chain mixed signature verification method and system
US11463572B1 (en) Using communication source data to generate modifications to user interfaces

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination