CN111984893A - System log configuration conflict reminding method, device and system - Google Patents

System log configuration conflict reminding method, device and system Download PDF

Info

Publication number
CN111984893A
CN111984893A CN202011046798.5A CN202011046798A CN111984893A CN 111984893 A CN111984893 A CN 111984893A CN 202011046798 A CN202011046798 A CN 202011046798A CN 111984893 A CN111984893 A CN 111984893A
Authority
CN
China
Prior art keywords
configuration
log
conflict
administrator
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011046798.5A
Other languages
Chinese (zh)
Other versions
CN111984893B (en
Inventor
李佳琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN202011046798.5A priority Critical patent/CN111984893B/en
Publication of CN111984893A publication Critical patent/CN111984893A/en
Application granted granted Critical
Publication of CN111984893B publication Critical patent/CN111984893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The disclosure relates to a method, a device, a system, electronic equipment and a computer readable medium for reminding system log configuration conflict. The method comprises the following steps: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the administrator on line currently to remind the configuration conflict. The system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium can reduce the risk of configuration loss of an administrator caused by configuration conflict, and improve the usability of products and the configuration efficiency of the administrator.

Description

System log configuration conflict reminding method, device and system
Technical Field
The present disclosure relates to the field of computer information processing, and in particular, to a method, an apparatus, a system, an electronic device, and a computer-readable medium for reminding a system log configuration conflict.
Background
Nowadays, all software and hardware are embedded with a system log component, a system log strategy can send warning information to an administrator just when a fault occurs, and the system log helps the administrator to find a problem in the shortest time.
The system log is a very critical component because it allows the administrator to fully understand his environment. Such system log information is critical to determining the root cause of a failure or to narrow down a system attack because the system log may allow an administrator to learn all events before the failure or attack occurred. It is also critical to develop a good set of system logging policies for a virtualized environment because system logs need to be associated with many different external components. The good system log can prevent an administrator from analyzing problems from the wrong perspective, and waste of precious troubleshooting time is avoided. Another reason is that with the help of the system log, it is very likely that the administrator will find some problems that have never been realized before. When multiple administrators configure a page at the same time, configuration conflicts must occur, resulting in configuration loss.
Therefore, a new method, device, system, electronic device and computer readable medium for reminding system log configuration conflict is needed.
The above information disclosed in this background section is only for enhancement of understanding of the background of the disclosure and therefore it may contain information that does not constitute prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the present disclosure provides a method, an apparatus, a system, an electronic device, and a computer readable medium for reminding a system log configuration conflict, which can reduce the risk of losing the configuration configured by the administrator due to the configuration conflict, and improve the usability of the product and the configuration efficiency of the administrator.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows, or in part will be obvious from the description, or may be learned by practice of the disclosure.
According to one aspect of the disclosure, a method for reminding a system log configuration conflict is provided, where the method includes: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the administrator on line currently to remind the configuration conflict.
In an exemplary embodiment of the present disclosure, obtaining a configuration request for a system log includes: acquiring the configuration request aiming at the system log from a WEB page; extracting the configuration page identification of the page to be configured based on the configuration request; extracting a session control field in the configuration request; reading, from the session control field, the user identification of an administrator that initiated the configuration request.
In an exemplary embodiment of the present disclosure, obtaining a configuration request for a system log further includes: responding to the configuration request based on a hypertext transfer protocol.
In an exemplary embodiment of the present disclosure, obtaining configuration information of all currently online administrators includes: sending the user identification and the configuration page identification to a conflict detection system; the conflict detection system obtains configuration information for all currently online administrators.
In an exemplary embodiment of the present disclosure, sequentially comparing the configuration information of all administrators with the configuration page identifier includes: sequentially acquiring user identifications of all current online administrators; acquiring a configuration page identifier corresponding to the user identifier; and comparing the configuration page identifier of the current online administrator with the configuration page identifier of the configuration request.
In an exemplary embodiment of the present disclosure, generating a configuration conflict log for configuration conflict reminding based on a user identification of the currently online administrator includes: generating a configuration conflict log based on the user identification of the currently online administrator; and sending the configuration conflict log to a log receiving system to remind the configuration conflict.
In an exemplary embodiment of the present disclosure, sending the configuration conflict log to a log receiving system for configuration conflict reminding includes: sending the configuration conflict log to the log receiving system; the log receiving system extracts at least one user identifier in the configuration conflict log; transmitting the configuration conflict log based on the at least one user identification.
In an exemplary embodiment of the disclosure, sending the configuration conflict log based on the at least one user identifier includes: receiving a log extraction request from an administrator; and when the user identifier of the administrator corresponding to the log extraction request is consistent with the at least one user identifier, sending the configuration conflict log to the administrator.
According to an aspect of the present disclosure, a system log configuration conflict reminding device is provided, the device includes: the request module is used for acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; the information module is used for acquiring the configuration information of all current online administrators; the comparison module is used for sequentially comparing the configuration information of all administrators with the configuration page identification; the identification module is used for acquiring the user identification of the current online administrator corresponding to the configuration information when the configuration information is consistent with the configuration page identification; and the reminding module is used for generating a configuration conflict log based on the user identification of the current online administrator so as to remind the configuration conflict.
According to an aspect of the present disclosure, a system for reminding a system log configuration conflict is provided, the system including: the system comprises a plurality of administrator terminals, a plurality of service terminals and a plurality of configuration servers, wherein the administrator terminals are used for operating system logs and generating configuration requests, and the configuration requests comprise user identifiers and configuration page identifiers; the configuration response server is used for responding to the configuration request and sending the configuration request to the conflict detection server for detection; the conflict detection server is used for acquiring the configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online administrator, and sending the configuration conflict log to a log receiving server; and the log receiving server is used for sending the configuration conflict log to a target administrator for configuration conflict reminding.
According to an aspect of the present disclosure, an electronic device is provided, the electronic device including: one or more processors; storage means for storing one or more programs; when executed by one or more processors, cause the one or more processors to implement a method as above.
According to an aspect of the disclosure, a computer-readable medium is proposed, on which a computer program is stored, which program, when being executed by a processor, carries out the method as above.
According to the method, the device, the system, the electronic equipment and the computer readable medium for reminding the system log configuration conflict, a configuration request aiming at the system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online administrator to remind the configuration conflict, so that the risk of configuration loss of the administrator caused by the configuration conflict can be reduced, and the usability of the product and the configuration efficiency of the administrator are improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings. The drawings described below are merely some embodiments of the present disclosure, and other drawings may be derived from those drawings by those of ordinary skill in the art without inventive effort.
Fig. 1 is a block diagram illustrating an application scenario of a system log configuration conflict reminding method and apparatus according to an exemplary embodiment.
FIG. 2 is a flow diagram illustrating a method for system log configuration conflict reminders, according to an example embodiment.
FIG. 3 is a flow chart illustrating a system log configuration conflict alert method in accordance with another illustrative embodiment.
FIG. 4 is a flowchart illustrating a system log configuration conflict alert method in accordance with another exemplary embodiment.
FIG. 5 is a schematic diagram illustrating a system log configuration conflict alert method, according to another example embodiment.
FIG. 6 is a schematic diagram illustrating a system log configuration conflict alert method, according to another example embodiment.
FIG. 7 is a block diagram illustrating a system log configuration conflict reminder, according to an example embodiment.
FIG. 8 is a block diagram illustrating a system log configuration conflict alert system in accordance with another exemplary embodiment.
FIG. 9 is a block diagram illustrating an electronic device in accordance with an example embodiment.
FIG. 10 is a block diagram illustrating a computer-readable medium in accordance with an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the disclosed concept. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It is to be understood by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present disclosure and are, therefore, not intended to limit the scope of the present disclosure.
The inventors of the present disclosure have found that when multiple administrators configure a page at the same time, a configuration conflict must occur, such as two administrators A, B modifying the address object at the address object page, wherein administrator a modifies the name of the existing address object "black dragon river" and administrator B modifies the address range of the existing address object "black dragon river". If the administrator a submits the form first, the address object of the "black dragon river" does not exist in the address object, and when the administrator B submits the form again, the server cannot find the address object of the "black dragon river", so that the modification of the administrator B cannot be effective, that is, the configuration modified by the address range of the previous "black dragon river" is lost.
If the configuration content is more, the working efficiency is seriously reduced, and meanwhile, the usability of the product is greatly reduced. The above problem cannot be solved by the system log, because each time the administrator performs management configuration on the device service, it is impossible for the administrator to see the "there are other administrators who also configure the service" log at the same time on the system log page.
How to ensure that a plurality of administrators generate configuration conflict logs when operating the same WEB page, and the configuration conflict logs are quickly, actively and obviously presented to the current administrators, so that configuration loss is avoided, and the working efficiency is reduced. Against this background, the present disclosure provides a method and an apparatus for reminding a system log configuration conflict, and the following describes technical contents in the present disclosure in detail with reference to specific embodiments.
Fig. 1 is a block diagram illustrating an application scenario of a system log configuration conflict reminding method and apparatus according to an exemplary embodiment.
As shown in fig. 1, the system architecture 10 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a shopping application, a web browser application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The server 105 may be a server providing various services, such as a back-office management server providing support for a user using a network managed by the client device 101, 102, 103. The background management server can analyze and process the received log data and feed back the processing result to the terminal equipment.
The server 105 may, for example, obtain a configuration request for a system log from the client devices 101, 102, 103, where the configuration request includes a user identifier and a configuration page identifier; the server 105 may, for example, obtain configuration information for all currently online administrators; the server 105 may, for example, compare the configuration information of all administrators with the configuration page identifier in sequence; the server 105 may, for example, obtain a user identifier of a currently online administrator corresponding to the configuration information when the configuration information is consistent with the configuration page identifier; server 105 may generate a configuration conflict log for configuration conflict reminders, e.g., based on the user identification of the currently online administrator.
The server 105 may be a server of one entity, and may also be composed of a plurality of servers, for example, a part of the server 105 may be, for example, a configuration response server in the present disclosure, configured to respond to the configuration request and send the configuration request to the collision detection server for detection; some of the servers 105 may also be used, for example, as a conflict detection server in the present disclosure, for obtaining configuration information of all currently online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online administrator, and sending the configuration conflict log to a log receiving server; and a portion of the servers 105 may also be, for example, a log receiving server in the present disclosure, for sending the configuration conflict log to a target administrator for configuration conflict alerting.
It should be noted that the method for reminding a system log configuration conflict provided by the embodiment of the present disclosure may be executed by the server 105, and accordingly, the device for reminding a system log configuration conflict may be disposed in the server 105. And the requesting end provided for the user to perform log configuration is generally located in the terminal equipment 101, 102, 103.
FIG. 2 is a flow diagram illustrating a method for system log configuration conflict reminders, according to an example embodiment. The system log configuration conflict alert method 20 includes at least steps S202 to S210.
As shown in fig. 2, in S202, a configuration request for the system log is obtained, where the configuration request includes a user identifier and a configuration page identifier. The system log is used for recording information of hardware, software and system problems in the system and monitoring events occurring in the system. Through which the user can check the cause of the error or look for traces left by the attacker when under attack. The system log includes a system log, an application log, and a security log.
In one embodiment, the configuration request for the system log may be obtained, for example, from a WEB page; extracting the configuration page identification of the page to be configured based on the configuration request; extracting a session control field in the configuration request; reading, from the session control field, the user identification of an administrator that initiated the configuration request. When the administrator sends an HTTP request for loading the configuration page content, the server receives the HTTP request for loading the configuration page, at the moment, a Session field in the HTTP request is extracted, and the administrator initiating the HTTP request at present is determined.
In one embodiment, further comprising: responding to the configuration request based on a hypertext transfer protocol.
For example, the configuration interface where the current administrator is located is recorded in the configuration file corresponding to the administrator as a configuration page to be loaded by the current administrator, and then the content of the configuration page is responded to the WEB page through HTTP.
In S204, configuration information of all currently online administrators is acquired. The method comprises the following steps: sending the user identification and the configuration page identification to a conflict detection system; the conflict detection system obtains configuration information for all currently online administrators. Only the information of the administrator currently performing the configuration is obtained, and the administrator not currently on line can consider that the possibility of configuration conflict does not exist.
In S206, the configuration information of all administrators is sequentially compared with the configuration page identifiers. The method comprises the following steps: sequentially acquiring user identifications of all current online administrators; acquiring a configuration page identifier corresponding to the user identifier; and comparing the configuration page identifier of the current online administrator with the configuration page identifier of the configuration request.
In S208, when the configuration information is consistent with the configuration page identifier, the user identifier of the currently online administrator corresponding to the configuration information is obtained. I.e. the user identification of the administrator currently online for which there is a conflict.
In S210, a configuration conflict log is generated based on the user identifier of the currently online administrator to perform a configuration conflict reminder. The configuration conflict log may be sent to the administrator terminal where there is a conflict.
According to the system log configuration conflict reminding method, a configuration request aiming at the system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online administrator to remind the configuration conflict, so that the risk of configuration loss of the administrator caused by the configuration conflict can be reduced, and the usability of the product and the configuration efficiency of the administrator are improved.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
FIG. 3 is a flow chart illustrating a system log configuration conflict alert method in accordance with another illustrative embodiment. The process 30 shown in FIG. 3 is a detailed description of the process of FIG. 2, wherein S210 "generating a configuration conflict log for configuration conflict alert based on the user identification of the currently online administrator".
As shown in fig. 3, in S302, a configuration conflict log is generated based on the user identification of the currently online administrator. The configuration conflict log may include the conflicting configuration page and the user identification of the administrator operating on the page.
In S304, the configuration conflict log is transmitted to the log receiving system (log receiving server).
In S306, the log receiving system extracts at least one user identifier in the configuration conflict log. The log receiving system sequentially reads the user identifiers of the administrators configuring the page, and it should be noted that there may be a plurality of administrators configuring the page normally, and at this time, the user identifiers of each administrator need to be sequentially extracted.
In S308, the configuration conflict log is sent based on the at least one user identity. The method comprises the following steps: receiving a log extraction request from an administrator; and when the user identifier of the administrator corresponding to the log extraction request is consistent with the at least one user identifier, sending the configuration conflict log to the administrator.
When a plurality of administrators configure a page at the same time, configuration conflict must occur, if the configuration content is more, the work efficiency is seriously reduced, and meanwhile, the usability of the product is greatly reduced. In the prior art, only the log message is sent before faults, service messages or attacks on some systems in the running process of a product, and the log message conflicted by a plurality of administrators in the WEB page operation process cannot be sent. According to the technical scheme, the log list supports multiple administrators to receive the log prompting switch when configuring the same page. The risk of configuration loss of the configuration configured by the administrator caused by configuration conflict is reduced, and the usability of the product and the configuration efficiency of the administrator are improved to a great extent.
FIG. 4 is a flowchart illustrating a system log configuration conflict alert method in accordance with another exemplary embodiment. The process 40 shown in fig. 4 is a detailed description of the process shown in fig. 2.
As shown in fig. 4, in S401, the WEB page transmits an HTTP configuration request for "loading a certain configuration page content".
In S402, the server receives a configuration request.
In S403, the administrator from which the request originates is determined according to the configuration request.
In S404, the configuration page where the current administrator is located is recorded in the configuration file of the administrator.
In S405, the content of the page is configured by the HTTP response.
In S406, the page is displayed according to the response content.
In S407, the configuration conflict detection system is triggered, and the incoming parameters are the name of the current configuration page and the user identifier of the current administrator.
In S408, the collision detection system acquires a detection instruction.
In S409, all administrators currently online are acquired.
In S410, the information of the administrator currently on line is read.
In S411, the configuration file corresponding to the current online administrator is found.
In S412, a configuration page is acquired from the configuration file.
In S413, it is compared with the configuration page in the configuration request whether it is the same.
In S414, a configuration conflict log is generated.
In S415, the configuration conflict log is transmitted to the server log receiving system.
In S416, after receiving the configuration conflict log, the log receiving system distributes the message to the corresponding administrator log storage unit, so that the administrator can read the message.
When an administrator sends an HTTP request for loading configuration page content, a server receives the HTTP request for loading configuration page content, at this time, a Session field in the HTTP request is extracted, the administrator who initiates the HTTP request currently is determined, a configuration interface where the administrator is located currently is recorded in a configuration file corresponding to the administrator as a configuration page to be requested to be loaded by the administrator currently, and then the configuration page content is responded to a WEB page through HTTP.
The server then triggers the administrator configuration conflict detection system, with the incoming parameters being the name of the configuration page just requested by the administrator and the administrator identification of the currently requested configuration page. After receiving the detection instruction, the administrator configuration conflict detection system acquires all current online administrators and traverses the online administrators one by one, and the following operations are performed when one online administrator is traversed each time: finding a configuration file corresponding to a current traversed administrator; acquiring a configuration page where a current administrator is located from a configuration file; comparing with an incoming administrator configuration conflict detection system configuration page; if the pages are not the same page, continuously traversing the next online administrator; if the two are the same, it indicates that the currently traversed administrator is also configuring the page at the same time, generating a configuration conflict log, and sending the configuration conflict log to the server log receiving system, where the configuration conflict log at this time carries the currently traversed administrator identifier.
When the server log receiving system receives the configuration conflict log, the server log receiving system sends a message to a log storage unit of a corresponding administrator; continuously traversing the next online manager; after traversing all online administrators, if only one administrator has a configuration page consistent with the configuration page of the configuration conflict detection system of the incoming administrator, a configuration conflict log is generated at the moment, and the configuration conflict log is sent to the server log receiving system, and the configuration conflict log at the moment carries the administrator identification of the content of the configuration page which is just requested.
When the server log receiving system receives the configuration conflict log, the message is sent to the log storage units corresponding to all administrators and is invisible to the administrators not operating the page currently; and after a new log comes, different administrators update the maximum number of the current administrator log list. When the WEB page actively sends an HTTP request to the server in an Ajax mode, all log information is requested to be acquired, and after the WEB page receives a response of the server, a log information list is updated. Therefore, all the online administrators with configuration conflict can receive the configuration conflict logs, and the configuration conflict logs are sent to the administrators with configuration conflict when a plurality of administrators configure the same page.
After receiving the configuration conflict, as shown in fig. 5, the administrator may also make a switch if each administrator receives the configuration conflict log, that is, an alarm button in the upper right corner of the WEB page, and the alarm message list box popped up after clicking supports "configuration conflict detection switch". The characters in fig. 5 and 6 are used only for illustration, and the specific contents of the characters are not in the scope of patent protection.
Furthermore, when the administrator modifies the configuration conflict detection switch, the page sends an HTTP request to the server through the Ajax mechanism, the request carries the modified switch state identifier, and after receiving the HTTP request, the server extracts the current administrator identifier from the Session and stores the modified switch state identifier into the configuration file corresponding to the administrator. After an administrator logs in a WEB management interface for the first time, a page sends an HTTP request to a server through an Ajax mechanism to request states such as a 'configuration conflict detection switch', the server receives the HTTP request, then takes out a current administrator identification from a Session, takes out the state from a configuration file corresponding to the current administrator, responds to the page, and after the page receives the server response, sets whether the 'configuration conflict detection switch' is selected or not according to a state value. Acquiring all current online administrators, traversing the current online administrators one by one, adding a judgment whether a current administrator configuration conflict detection switch is started, and comparing a configuration page where the administrator configuration conflict detection switch is located with a configuration page of an incoming administrator configuration conflict detection system if the current administrator configuration conflict detection switch is started, and performing subsequent processing; if closed, the current online administrator is skipped and the traversal of other administrators is continued.
For an administrator with configuration authority, the configuration conflict detection switch is turned on by default; for an administrator without configuration authority and only with viewing authority, the configuration conflict detection switch is closed by default. If the purpose of logging in the Web page by a certain administrator with the configuration authority is only to view the configuration, the configuration conflict detection can be turned off, so that the interference caused by the configuration conflict logs when other administrators operate the same page at the same time is reduced.
When multiple administrators operate the same WEB page, configuration conflict logs are sent, and the conflict logs are not necessarily limited to be displayed in a log list, for example, once a configuration conflict occurs on the WEB page, a configuration conflict prompt can be immediately popped up, and the like. And the system can also be made into a switch, an open administrator can receive the configuration conflict log when in configuration conflict, and a closed administrator cannot receive the configuration conflict log when in configuration conflict.
Those skilled in the art will appreciate that all or part of the steps implementing the above embodiments are implemented as computer programs executed by a CPU. When executed by the CPU, performs the functions defined by the above-described methods provided by the present disclosure. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic or optical disk, or the like.
Furthermore, it should be noted that the above-mentioned figures are only schematic illustrations of the processes involved in the methods according to exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
FIG. 7 is a block diagram illustrating a system log configuration conflict reminder, according to an example embodiment. As shown in fig. 7, the system log configuration conflict alert device 70 includes: a request module 702, an information module 704, an alignment module 706, an identification module 708, and a reminder module 710.
The request module 702 is configured to obtain a configuration request for a system log, where the configuration request includes a user identifier and a configuration page identifier;
the information module 704 is used for acquiring configuration information of all currently online administrators;
the comparison module 706 is configured to compare the configuration information of all administrators with the configuration page identifiers in sequence;
the identification module 708 is configured to, when the configuration information is consistent with the configuration page identifier, obtain a user identifier of a currently online administrator corresponding to the configuration information;
the reminding module 710 is used for generating a configuration conflict log based on the user identification of the administrator who is currently online to remind the configuration conflict.
FIG. 8 is a block diagram illustrating a system log configuration conflict alert system in accordance with another exemplary embodiment. As shown in fig. 8, the system log configuration conflict alert device 80 includes: an administrator terminal 802, a configuration response server 804, a conflict detection server 806, and a log receiving server 808.
The multiple administrator terminals 802 are configured to operate a system log and generate a configuration request, where the configuration request includes a user identifier and a configuration page identifier;
the configuration response server 804 is used for responding to the configuration request and sending the configuration request to the conflict detection server for detection;
the conflict detection server 806 is configured to obtain configuration information of all currently online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online administrator, and sending the configuration conflict log to a log receiving server;
the log receiving server 808 is configured to send the configuration conflict log to a target administrator for configuration conflict reminding.
According to the system log configuration conflict reminding device, a configuration request aiming at a system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online administrator to remind the configuration conflict, so that the risk of configuration loss of the administrator caused by the configuration conflict can be reduced, and the usability of the product and the configuration efficiency of the administrator are improved.
FIG. 9 is a block diagram illustrating an electronic device in accordance with an example embodiment.
An electronic device 900 according to this embodiment of the disclosure is described below with reference to fig. 9. The electronic device 900 shown in fig. 9 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present disclosure.
As shown in fig. 9, the electronic device 900 is embodied in the form of a general purpose computing device. Components of electronic device 900 may include, but are not limited to: at least one processing unit 910, at least one storage unit 920, a bus 930 connecting different system components (including the storage unit 920 and the processing unit 910), a display unit 940, and the like.
Wherein the storage unit stores program code that can be executed by the processing unit 910 such that the processing unit 910 performs the steps according to various exemplary embodiments of the present disclosure described in this specification. For example, the processing unit 910 may perform the steps shown in fig. 2, 3, and 4.
The storage unit 920 may include a readable medium in the form of a volatile storage unit, such as a random access memory unit (RAM)9201 and/or a cache memory unit 9202, and may further include a read only memory unit (ROM) 9203.
The memory unit 920 may also include a program/utility 9204 having a set (at least one) of program modules 9205, such program modules 9205 including but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 930 can be any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 900 may also communicate with one or more external devices 900' (e.g., keyboard, pointing device, bluetooth device, etc.), such that a user can communicate with devices with which the electronic device 900 interacts, and/or any device (e.g., router, modem, etc.) with which the electronic device 900 can communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interface 950. Also, the electronic device 900 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet) via the network adapter 960. The network adapter 960 may communicate with other modules of the electronic device 900 via the bus 930. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 900, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, as shown in fig. 10, the technical solution according to the embodiment of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiment of the present disclosure.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions of: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the administrator on line currently to remind the configuration conflict.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that the present disclosure is not limited to the precise arrangements, instrumentalities, or instrumentalities described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A system log configuration conflict reminding method is characterized by comprising the following steps:
acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier;
acquiring configuration information of all current online administrators;
comparing the configuration information of all administrators with the configuration page identifications in sequence;
when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information;
and generating a configuration conflict log based on the user identification of the administrator on line currently to remind the configuration conflict.
2. The method of claim 1, wherein obtaining a configuration request for a system log comprises:
acquiring the configuration request aiming at the system log from a WEB page;
extracting the configuration page identification of the page to be configured based on the configuration request;
extracting a session control field in the configuration request;
reading, from the session control field, the user identification of an administrator that initiated the configuration request.
3. The method of claim 1, wherein obtaining a configuration request for a system log further comprises:
responding to the configuration request based on a hypertext transfer protocol.
4. The method of claim 1, wherein obtaining configuration information for all currently online administrators comprises:
sending the user identification and the configuration page identification to a conflict detection system;
the conflict detection system obtains configuration information for all currently online administrators.
5. The method of claim 1, wherein comparing the configuration information of all administrators with the configuration page identifier in sequence comprises:
sequentially acquiring user identifications of all current online administrators;
acquiring a configuration page identifier corresponding to the user identifier;
and comparing the configuration page identifier of the current online administrator with the configuration page identifier of the configuration request.
6. The method of claim 1, wherein generating a configuration conflict log for configuration conflict reminders based on a user identification of the currently online administrator comprises:
generating a configuration conflict log based on the user identification of the currently online administrator;
and sending the configuration conflict log to a log receiving system to remind the configuration conflict.
7. The method of claim 6, wherein sending the configuration conflict log to a log receiving system for configuration conflict alerting comprises:
sending the configuration conflict log to the log receiving system;
the log receiving system extracts at least one user identifier in the configuration conflict log;
transmitting the configuration conflict log based on the at least one user identification.
8. The method of claim 7, wherein sending the configuration conflict log based on the at least one user identification comprises:
receiving a log extraction request from an administrator;
when the user identification of the administrator corresponding to the log extraction request is consistent with the at least one user identification,
sending the configuration conflict log to the administrator.
9. A system log configuration conflict reminding method is characterized by comprising the following steps:
the request module is used for acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier;
the information module is used for acquiring the configuration information of all current online administrators;
the comparison module is used for sequentially comparing the configuration information of all administrators with the configuration page identification;
the identification module is used for acquiring the user identification of the current online administrator corresponding to the configuration information when the configuration information is consistent with the configuration page identification;
and the reminding module is used for generating a configuration conflict log based on the user identification of the current online administrator so as to remind the configuration conflict.
10. A system log configuration conflict alert system, comprising:
the system comprises a plurality of administrator terminals, a plurality of service terminals and a plurality of configuration servers, wherein the administrator terminals are used for operating system logs and generating configuration requests, and the configuration requests comprise user identifiers and configuration page identifiers;
the configuration response server is used for responding to the configuration request and sending the configuration request to the conflict detection server for detection;
the conflict detection server is used for acquiring the configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifications in sequence; when the configuration information is consistent with the configuration page identifier, acquiring the user identifier of the current online administrator corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online administrator, and sending the configuration conflict log to a log receiving server;
and the log receiving server is used for sending the configuration conflict log to a target administrator for configuration conflict reminding.
CN202011046798.5A 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system Active CN111984893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011046798.5A CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011046798.5A CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Publications (2)

Publication Number Publication Date
CN111984893A true CN111984893A (en) 2020-11-24
CN111984893B CN111984893B (en) 2023-09-12

Family

ID=73450274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011046798.5A Active CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Country Status (1)

Country Link
CN (1) CN111984893B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159973A (en) * 2007-11-09 2008-04-09 中兴通讯股份有限公司 Conflict evading method of multi-user configuring network element data
CN101365191A (en) * 2007-08-07 2009-02-11 华为技术有限公司 Method and terminal implementing multi-user simultaneously on-line
US20100281143A1 (en) * 2009-04-29 2010-11-04 Jim Krahn Maintaining mobile device operations
CN102148817A (en) * 2010-12-08 2011-08-10 华为技术有限公司 Network equipment configuration method, client, server and network system
US20130060924A1 (en) * 2011-09-02 2013-03-07 Microsoft Corporation Granular client inventory management with conflict resolution
CN102999532A (en) * 2011-09-19 2013-03-27 中兴通讯股份有限公司 Method and device for configuring data by users
CN103220081A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Conflict detection method, network side equipment and user equipment (UE)
CN103914439A (en) * 2013-01-04 2014-07-09 中国移动通信集团公司 Method, device and system for online document edition
CN104539463A (en) * 2015-01-15 2015-04-22 北京随方信息技术有限公司 Network device configuration file online attribute cross checking method and system
CN106462833A (en) * 2014-06-23 2017-02-22 甲骨文国际公司 System and method for supporting multiple partition edit sessions in a multitenant application server environment
CN108134690A (en) * 2017-12-13 2018-06-08 中盈优创资讯科技有限公司 Network service deployment flow control method, apparatus and system
CN108696372A (en) * 2017-04-06 2018-10-23 阿里巴巴集团控股有限公司 A kind of method and system keeping system configuration consistency
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365191A (en) * 2007-08-07 2009-02-11 华为技术有限公司 Method and terminal implementing multi-user simultaneously on-line
CN101159973A (en) * 2007-11-09 2008-04-09 中兴通讯股份有限公司 Conflict evading method of multi-user configuring network element data
US20100281143A1 (en) * 2009-04-29 2010-11-04 Jim Krahn Maintaining mobile device operations
CN102148817A (en) * 2010-12-08 2011-08-10 华为技术有限公司 Network equipment configuration method, client, server and network system
US20130060924A1 (en) * 2011-09-02 2013-03-07 Microsoft Corporation Granular client inventory management with conflict resolution
CN102999532A (en) * 2011-09-19 2013-03-27 中兴通讯股份有限公司 Method and device for configuring data by users
CN103220081A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Conflict detection method, network side equipment and user equipment (UE)
CN103914439A (en) * 2013-01-04 2014-07-09 中国移动通信集团公司 Method, device and system for online document edition
CN106462833A (en) * 2014-06-23 2017-02-22 甲骨文国际公司 System and method for supporting multiple partition edit sessions in a multitenant application server environment
CN104539463A (en) * 2015-01-15 2015-04-22 北京随方信息技术有限公司 Network device configuration file online attribute cross checking method and system
CN108696372A (en) * 2017-04-06 2018-10-23 阿里巴巴集团控股有限公司 A kind of method and system keeping system configuration consistency
CN108134690A (en) * 2017-12-13 2018-06-08 中盈优创资讯科技有限公司 Network service deployment flow control method, apparatus and system
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
DONG YANG 等: "A constraint satisfaction approach to resolving product configuration conflicts", 《ADVANCED ENGINEERING INFORMATICS》, pages 592 - 602 *
刘俊 等: "电力数据通信网配置核查系统设计与实现", 《计算技术与自动化 》, pages 82 - 92 *

Also Published As

Publication number Publication date
CN111984893B (en) 2023-09-12

Similar Documents

Publication Publication Date Title
US8898796B2 (en) Managing network data
US10362046B1 (en) Runtime behavior of computing resources of a distributed environment
US11563727B2 (en) Multi-factor authentication for non-internet applications
CN112134956A (en) Distributed Internet of things instruction management method and system based on block chain
CN111586005B (en) Scanner scanning behavior identification method and device
CN109088773A (en) Fault self-healing method and device, server and storage medium
CN114598671B (en) Session message processing method, device, storage medium and electronic equipment
CN111954240A (en) Network fault processing method and device and electronic equipment
US11489830B2 (en) Source authentication of website content
EP4169227A1 (en) Distributed endpoint security architecture automated by artificial intelligence
CN111177536B (en) Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device
CN112953962A (en) Domain name access method and device
EP4152729A1 (en) Interactive email warning tags
CN110049004A (en) The generation method of industry control environment flow white list baseline
CN111984893B (en) System log configuration conflict reminding method, device and system
CN113836522A (en) Password management method and device of monitoring equipment
EP3306489B1 (en) Interaction record query processing method and device
JP6413540B2 (en) Relay device, data processing system, and program
CN111277581A (en) Certificate early warning management method and device, electronic equipment and storage medium
CN115242608B (en) Alarm information generation method, device, equipment and storage medium
CN114640522B (en) Firewall security policy processing method, device, equipment and storage medium
CN113114693B (en) Account state display method and device
CN115174367B (en) Service system boundary determining method and device, electronic equipment and storage medium
CN118051322A (en) Processing method, device, equipment, medium and program for virtual asset acquisition behavior
US20240143742A1 (en) System and method for providing user feedback

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant