CN111984893B - System log configuration conflict reminding method, device and system - Google Patents

System log configuration conflict reminding method, device and system Download PDF

Info

Publication number
CN111984893B
CN111984893B CN202011046798.5A CN202011046798A CN111984893B CN 111984893 B CN111984893 B CN 111984893B CN 202011046798 A CN202011046798 A CN 202011046798A CN 111984893 B CN111984893 B CN 111984893B
Authority
CN
China
Prior art keywords
configuration
log
conflict
page
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011046798.5A
Other languages
Chinese (zh)
Other versions
CN111984893A (en
Inventor
李佳琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN202011046798.5A priority Critical patent/CN111984893B/en
Publication of CN111984893A publication Critical patent/CN111984893A/en
Application granted granted Critical
Publication of CN111984893B publication Critical patent/CN111984893B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/109Time management, e.g. calendars, reminders, meetings or time accounting

Abstract

The disclosure relates to a system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium. The method comprises the following steps: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding. The system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium can reduce the risk of configuration loss of an administrator caused by configuration conflict, and improve the usability of products and the configuration efficiency of the administrator.

Description

System log configuration conflict reminding method, device and system
Technical Field
The disclosure relates to the field of computer information processing, and in particular relates to a system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium.
Background
Today, all software and hardware have a system log component embedded in it, and the system log policy can send warning information to the administrator just when a fault occurs, and the system log helps the administrator to find the problem in the shortest time.
The system log is a very critical component, because it allows an administrator to fully understand its environment. Such system log information is critical to determining the root cause of the fault or to narrowing down the scope of system attacks, as the system log allows an administrator to know all events before the fault or attack occurs. It is also critical to formulate a good set of system log policies for virtualized environments because the system log needs to be associated with many different external components. Good system logs can prevent administrators from analyzing problems from an error perspective, avoiding wasting valuable debug time. Another reason is that with the aid of the system log, the administrator is likely to find some problems that were not previously recognized. When multiple administrators configure one page at the same time, configuration conflicts must occur, resulting in configuration loss.
Therefore, a new system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium are needed.
The above information disclosed in the background section is only for enhancement of understanding of the background of the disclosure and therefore it may include information that does not form the prior art that is already known to a person of ordinary skill in the art.
Disclosure of Invention
In view of this, the disclosure provides a system log configuration conflict reminding method, device, system, electronic device and computer readable medium, which can reduce the risk of configuration loss of an administrator caused by configuration conflict, and improve the usability of products and the configuration efficiency of the administrator.
Other features and advantages of the present disclosure will be apparent from the following detailed description, or may be learned in part by the practice of the disclosure.
According to an aspect of the present disclosure, a system log configuration conflict reminding method is provided, the method includes: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding.
In one exemplary embodiment of the present disclosure, obtaining a configuration request for a system log includes: acquiring the configuration request from the WEB page aiming at the system log; extracting the configuration page identification of a page to be configured based on the configuration request; extracting a session control field in the configuration request; the user identification of the administrator initiating the configuration request is read from the session control field.
In an exemplary embodiment of the present disclosure, obtaining a configuration request for a system log further includes: responding to the configuration request based on a hypertext transfer protocol.
In one exemplary embodiment of the present disclosure, obtaining configuration information for all administrators currently online includes: transmitting the user identification and the configuration page identification to a conflict detection system; the conflict detection system acquires configuration information of all current online administrators.
In an exemplary embodiment of the present disclosure, comparing configuration information of all administrators and the configuration page identifier sequentially includes: sequentially acquiring user identifiers of all current online administrators; acquiring a configuration page identifier corresponding to the user identifier; and comparing the configuration page identifier of the current online administrator with the configuration page identifier of the configuration request.
In an exemplary embodiment of the present disclosure, generating a configuration conflict log for configuration conflict reminding based on a user identification of the currently online administrator includes: generating a configuration conflict log based on the user identification of the currently online manager; and sending the configuration conflict log to a log receiving system to carry out configuration conflict reminding.
In an exemplary embodiment of the present disclosure, the sending the configuration conflict log to a log receiving system for configuration conflict reminding includes: transmitting the configuration conflict log to the log receiving system; the log receiving system extracts at least one user identifier in the configuration conflict log; and sending the configuration conflict log based on the at least one user identifier.
In an exemplary embodiment of the present disclosure, sending the configuration conflict log based on the at least one user identification includes: receiving a log extraction request from an administrator; and when the user identification of the administrator corresponding to the log extraction request is consistent with the at least one user identification, sending the configuration conflict log to the administrator.
According to an aspect of the present disclosure, a system log configuration conflict reminding device is provided, the device includes: the request module is used for acquiring a configuration request aiming at the system log, wherein the configuration request comprises a user identifier and a configuration page identifier; the information module is used for acquiring configuration information of all current online administrators; the comparison module is used for sequentially comparing the configuration information of all administrators with the configuration page identifiers; the identification module is used for acquiring the user identification of the current online manager corresponding to the configuration information when the configuration information is consistent with the configuration page identification; and the reminding module is used for generating a configuration conflict log based on the user identification of the current online manager so as to carry out configuration conflict reminding.
According to an aspect of the present disclosure, a system log configuration conflict reminding system is provided, the system includes: the system comprises a plurality of manager terminals, a plurality of configuration server terminals and a plurality of configuration server terminals, wherein the manager terminals are used for operating the system logs and generating configuration requests, and the configuration requests comprise user identifiers and configuration page identifiers; the configuration response server is used for responding to the configuration request and sending the configuration request to the conflict detection server for detection; the conflict detection server is used for acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online manager, and sending the configuration conflict log to a log receiving server; and the log receiving server is used for sending the configuration conflict log to a target administrator to carry out configuration conflict reminding.
According to an aspect of the present disclosure, there is provided an electronic device including: one or more processors; a storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the methods as described above.
According to an aspect of the present disclosure, a computer-readable medium is presented, on which a computer program is stored, which program, when being executed by a processor, implements a method as described above.
According to the system log configuration conflict reminding method, device, system, electronic equipment and computer readable medium, a configuration request for the system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; the method for generating the configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding can reduce the risk of configuration loss of the manager due to configuration conflict, and improves the usability of products and the configuration efficiency of the manager.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings. The drawings described below are merely examples of the present disclosure and other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
Fig. 1 is a block diagram of an application scenario of a system log configuration conflict reminding method and apparatus according to an exemplary embodiment.
FIG. 2 is a flowchart illustrating a system log configuration conflict reminder method, according to an example embodiment.
Fig. 3 is a flow chart illustrating a system log configuration conflict reminder method in accordance with another exemplary embodiment.
Fig. 4 is a flow chart illustrating a system log configuration conflict reminder method in accordance with another exemplary embodiment.
Fig. 5 is a schematic diagram illustrating a system log configuration conflict reminding method according to another exemplary embodiment.
Fig. 6 is a schematic diagram illustrating a system log configuration conflict reminding method according to another exemplary embodiment.
FIG. 7 is a block diagram illustrating a system log configuration conflict reminder in accordance with an exemplary embodiment.
FIG. 8 is a block diagram illustrating a system log configuration conflict reminder system in accordance with another exemplary embodiment.
Fig. 9 is a block diagram of an electronic device, according to an example embodiment.
Fig. 10 is a block diagram of a computer-readable medium shown according to an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments can be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art. The same reference numerals in the drawings denote the same or similar parts, and thus a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the disclosed aspects may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another element. Accordingly, a first component discussed below could be termed a second component without departing from the teachings of the concepts of the present disclosure. As used herein, the term "and/or" includes any one of the associated listed items and all combinations of one or more.
Those skilled in the art will appreciate that the drawings are schematic representations of example embodiments and that the modules or flows in the drawings are not necessarily required to practice the present disclosure, and therefore, should not be taken to limit the scope of the present disclosure.
The inventors of the present disclosure found that when a plurality of administrators configure one page at the same time, a configuration conflict must occur, such as two administrators A, B modifying an address object at the address object page at the same time, wherein administrator a modifies the name of the existing address object "black longjiang", and administrator B modifies the address range of the existing address object "black longjiang". If the administrator A submits the form first, then there is no "Heilongjiang" address object in the address object, and when the administrator B resubmisses the form, the server cannot find the "Heilongjiang" address object, so that the modification of the administrator B cannot take effect, i.e. the configuration of the previous "Heilongjiang" address range modification is lost.
If the configuration content is more, the working efficiency is seriously reduced, and meanwhile, the usability of the product is greatly reduced. The above problem cannot be solved by the system log because it is impossible for an administrator to see the "as well as other administrators configuring the service" log of the system log page each time the administrator is performing management configuration of the device service.
How to ensure that a plurality of administrators generate configuration conflict logs when operating the same WEB page, and the configuration conflict logs are quickly, actively and obviously presented to the current administrator, so that the configuration loss is avoided, and the working efficiency is reduced. Under the circumstances, the disclosure provides a method and an apparatus for reminding a system log configuration conflict, and the following detailed description is made on the technical content in the disclosure by means of specific embodiments.
Fig. 1 is a block diagram of an application scenario of a system log configuration conflict reminding method and apparatus according to an exemplary embodiment.
As shown in fig. 1, the system architecture 10 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The server 105 may be a server providing various services, such as a background management server providing support for a network managed by a user using the client devices 101, 102, 103. The background management server can analyze the received log data and feed back the processing result to the terminal equipment.
The server 105 may, for example, obtain a configuration request for the system log from the client device 101, 102, 103, where the configuration request includes a user identifier and a configuration page identifier; the server 105 may, for example, obtain configuration information for all administrators currently online; server 105 may, for example, compare all administrators' configuration information with the configuration page identification in turn; the server 105 may, for example, obtain a user identifier of a currently online administrator corresponding to the configuration information when the configuration information is consistent with the configuration page identifier; the server 105 may generate a configuration conflict log for configuration conflict reminders, e.g., based on the user identification of the currently online administrator.
The server 105 may be an entity server, and may be formed of a plurality of servers, for example, and a part of the server 105 may be used as a configuration response server in the disclosure, for responding to the configuration request, and sending the configuration request to a conflict detection server for detection; some of the servers 105 may also be used, for example, as conflict detection servers in the present disclosure, to obtain configuration information for all administrators currently online; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online manager, and sending the configuration conflict log to a log receiving server; and a portion of the server 105 may also be used, for example, as a log receiving server in the present disclosure, to send the configuration conflict log to a target administrator for configuration conflict reminders.
It should be noted that, the system log configuration conflict reminding method provided in the embodiment of the present disclosure may be executed by the server 105, and accordingly, the system log configuration conflict reminding device may be set in the server 105. While the requesting end, which is provided to the user for log configuration, is typically located in the terminal device 101, 102, 103.
FIG. 2 is a flowchart illustrating a system log configuration conflict reminder method, according to an example embodiment. The system log configuration conflict reminding method 20 at least includes steps S202 to S210.
As shown in fig. 2, in S202, a configuration request for the system log is acquired, where the configuration request includes a user identifier and a configuration page identifier. The system log is information for recording hardware, software and system problems in the system, and can monitor events occurring in the system. Through which the user can check the cause of the error or look for traces left by an attacker when under attack. The system log includes a system log, an application log, and a security log.
In one embodiment, the configuration request for the system log from the WEB page may be obtained, for example; extracting the configuration page identification of a page to be configured based on the configuration request; extracting a session control field in the configuration request; the user identification of the administrator initiating the configuration request is read from the session control field. When an administrator sends an HTTP request for loading configuration page content, a server receives the HTTP request for loading configuration page, and at the moment, a Session field in the HTTP request is extracted to determine the administrator who initiates the HTTP request currently.
In one embodiment, further comprising: responding to the configuration request based on a hypertext transfer protocol.
For example, the configuration interface where the current administrator is located is recorded in the corresponding configuration file of the administrator as a configuration page to be requested to be loaded by the current administrator, and then the content of the configuration page is responded to the WEB page through HTTP.
In S204, configuration information of all administrators currently online is acquired. Comprising the following steps: transmitting the user identification and the configuration page identification to a conflict detection system; the conflict detection system acquires configuration information of all current online administrators. Only information of an administrator currently in progress for configuration is acquired, and an administrator not currently on-line can consider that there is no possibility of configuration conflict.
In S206, the configuration information of all administrators and the configuration page identifier are sequentially compared. Comprising the following steps: sequentially acquiring user identifiers of all current online administrators; acquiring a configuration page identifier corresponding to the user identifier; and comparing the configuration page identifier of the current online administrator with the configuration page identifier of the configuration request.
In S208, when the configuration information is consistent with the configuration page identifier, a user identifier of a currently online administrator corresponding to the configuration information is obtained. I.e. to obtain the user identification of the currently online administrator with the conflict.
In S210, a configuration conflict log is generated based on the user identification of the currently online administrator to perform configuration conflict reminding. The configuration conflict log may be sent to the administrator terminal that has a conflict.
According to the system log configuration conflict reminding method, a configuration request aiming at the system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; the method for generating the configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding can reduce the risk of configuration loss of the manager due to configuration conflict, and improves the usability of products and the configuration efficiency of the manager.
It should be clearly understood that this disclosure describes how to make and use particular examples, but the principles of this disclosure are not limited to any details of these examples. Rather, these principles can be applied to many other embodiments based on the teachings of the present disclosure.
Fig. 3 is a flow chart illustrating a system log configuration conflict reminder method in accordance with another exemplary embodiment. The process 30 shown in fig. 3 is a detailed description of S210 "generate a configuration conflict log based on the user identification of the currently online administrator to perform configuration conflict reminding" in the process shown in fig. 2.
As shown in fig. 3, in S302, a configuration conflict log is generated based on the user identification of the currently online administrator. The configuration conflict log may contain conflicting configuration pages and user identification of the administrator operating on the page.
In S304, the configuration conflict log is transmitted to the log receiving system (log receiving server).
In S306, the log receiving system extracts at least one user identification in the configuration conflict log. The log receiving system sequentially reads the user identifications of the administrators configuring the page, and it should be noted that the number of the administrators configuring the page normally may be multiple, and at this time, the user identifications of each administrator need to be sequentially extracted.
In S308, the configuration conflict log is sent based on the at least one user identification. Comprising the following steps: receiving a log extraction request from an administrator; and when the user identification of the administrator corresponding to the log extraction request is consistent with the at least one user identification, sending the configuration conflict log to the administrator.
When a plurality of administrators configure a page at the same time, configuration conflicts are generated, if the configuration content is more, the working efficiency is seriously reduced, and meanwhile, the usability of the product is greatly reduced. In the prior art, only the log information is sent for faults, service information or attacks on some systems in the running process of the product, and the log information which is conflicted by a plurality of administrators in the WEB page operation process is not sent. In the technical scheme of the disclosure, the log list supports whether the log prompt switch is received when multiple administrators configure the same page. The risk of the loss of the configuration allocated by the administrator caused by the configuration conflict is reduced, and the usability of the product and the configuration efficiency of the administrator are improved to a great extent.
Fig. 4 is a flow chart illustrating a system log configuration conflict reminder method in accordance with another exemplary embodiment. The flow 40 shown in fig. 4 is a detailed description of the flow shown in fig. 2.
As shown in fig. 4, in S401, the WEB page transmits an HTTP configuration request of "load a certain configuration page content".
In S402, the server receives a configuration request.
In S403, the administrator from which the request originates is determined from the configuration request.
In S404, the configuration page where the current administrator is located is recorded in the configuration file of the administrator.
In S405, the content of the page is configured by HTTP response.
In S406, the page is displayed according to the response content.
In S407, the configuration conflict detection system is triggered, and the incoming parameters are the current configuration page name and the user identification of the current administrator.
In S408, the collision detection system acquires a detection instruction.
In S409, all administrators currently online are acquired.
In S410, information of an administrator currently online is read.
In S411, a profile corresponding to the current online administrator is found.
In S412, a configuration page is acquired from the configuration file.
In S413, a comparison is made with the configuration page in the configuration request as to whether it is the same.
In S414, a configuration conflict log is generated.
In S415, the configuration conflict log is transmitted to the server log receiving system.
After receiving the configuration conflict log, the log receiving system distributes the message to the corresponding manager log storage unit for the manager to read in S416.
When an administrator sends an HTTP request for loading configuration page content, a server receives the request for loading the configuration page, at the moment, a Session field in the HTTP request is extracted, the administrator which initiates the HTTP request currently is determined, a configuration interface where the administrator is located currently is recorded in a configuration file corresponding to the administrator as a configuration page which the administrator needs to load currently, and then the configuration page content is responded to a WEB page through HTTP.
The server then triggers the administrator configuration conflict detection system, and the incoming parameters are the name of the configuration page just requested by the administrator and the administrator identification of the currently requested configuration page. After receiving the detection instruction, the administrator configuration conflict detection system acquires all current online administrators and traverses the online administrators one by one, and each time one online administrator is traversed, the following operations are performed: finding a configuration file corresponding to the current traversed administrator; acquiring a configuration page where a current administrator is located from a configuration file; comparing with an incoming administrator configuration conflict detection system configuration page; if the page is not the same page, continuing to traverse the next online manager; if the configuration conflict logs are the same, the administrator currently traversing is also configured with the page, a configuration conflict log is generated, and the configuration conflict log is sent to a server log receiving system, and the configuration conflict log at the moment carries the identity of the administrator currently traversing.
When the server log receiving system receives the configuration conflict log, the server log receiving system sends a message to a log storage unit of a corresponding manager; continuing traversing the next online manager; after traversing all online administrators, if only one administrator exists that the configuration page is consistent with the configuration page of the configuration conflict detection system of the incoming administrator, a configuration conflict log is generated at the moment, and is sent to the server log receiving system, and the configuration conflict log at the moment carries an administrator identifier which just requests the content of the configuration page.
When the server log receiving system receives the configuration conflict log, a message is sent to log storage units corresponding to all administrators, and the message is invisible to the administrator who is not currently operating the page; after a new log arrives, different administrators update the maximum number of the current administrator log list. When the WEB page actively sends an HTTP request to the server in an Ajax mode, the WEB page requests to acquire all log information, and updates a log message list after receiving a response from the server. Thus, all online administrators with configuration conflicts can receive the configuration conflict log, and therefore when a plurality of administrators configure the same page, the configuration conflict log is sent to the configuration conflict administrators.
After receiving the configuration conflict, as shown in fig. 5, each administrator may also make a switch, i.e. an alarm button at the upper right corner of the WEB page, and the alarm message list box popped up after clicking supports a "configuration conflict detection switch". The words in fig. 5 and 6 are used as illustrations only, and the specific content of the words is not in the scope of patent protection.
Further, when the administrator modifies the configuration conflict detection switch, the page sends an HTTP request to the server through the Ajax mechanism, the request carries the modified switch state identifier, the server takes the current administrator identifier from the Session after receiving the HTTP request, and stores the modified switch state identifier in a configuration file corresponding to the administrator. After an administrator logs in a WEB management interface for the first time, the page sends an HTTP request to a server through an Ajax mechanism, the server receives the HTTP request and then takes out the current administrator identification from the Session, takes out the state from a configuration file corresponding to the current administrator, responds to the page, and sets whether the configuration conflict detection switch is checked or not according to the state value after the page receives the server response. The method comprises the steps of acquiring all current online administrators, performing traversing flow on the online administrators one by one, adding a judgment for judging whether a current administrator configuration conflict detection switch is started, and performing subsequent processing such as comparing a configuration page with an incoming administrator configuration conflict detection system configuration page if the current administrator configuration conflict detection switch is started; if the manager is closed, skipping the current online manager, and continuing to traverse other managers.
For an administrator with configuration authority, configuring a conflict detection switch to be turned on by default; for administrators without configuration rights and with only viewing rights, the configuration conflict detection switch defaults to off. If a certain administrator with configuration authority logs in the Web page for a certain time only to view the configuration, the configuration conflict detection can be turned off, so that interference caused by configuration conflict logs generated when other administrators operate the same page at the same time is reduced.
When a plurality of administrators operate the same WEB page, a configuration conflict log is sent, and the conflict log is not necessarily limited to be displayed in a log list, for example, a configuration conflict prompt can be popped up immediately once a configuration conflict occurs on the WEB page. And the switch can be made, an on manager can receive the configuration conflict log when the configuration conflicts, and an off manager can not receive the configuration conflict log when the configuration conflicts.
Those skilled in the art will appreciate that all or part of the steps implementing the above described embodiments are implemented as a computer program executed by a CPU. The above-described functions defined by the above-described methods provided by the present disclosure are performed when the computer program is executed by a CPU. The program may be stored in a computer readable storage medium, which may be a read-only memory, a magnetic disk or an optical disk, etc.
Furthermore, it should be noted that the above-described figures are merely illustrative of the processes involved in the method according to the exemplary embodiments of the present disclosure, and are not intended to be limiting. It will be readily appreciated that the processes shown in the above figures do not indicate or limit the temporal order of these processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, for example, among a plurality of modules.
The following are device embodiments of the present disclosure that may be used to perform method embodiments of the present disclosure. For details not disclosed in the embodiments of the apparatus of the present disclosure, please refer to the embodiments of the method of the present disclosure.
FIG. 7 is a block diagram illustrating a system log configuration conflict reminder in accordance with an exemplary embodiment. As shown in fig. 7, the system log configuration conflict reminder 70 includes: the request module 702, the information module 704, the comparison module 706, the identification module 708, the reminder module 710.
The request module 702 is configured to obtain a configuration request for a system log, where the configuration request includes a user identifier and a configuration page identifier;
the information module 704 is configured to obtain configuration information of all currently online administrators;
the comparison module 706 is configured to compare the configuration information of all administrators with the configuration page identifier in sequence;
The identification module 708 is configured to obtain a user identifier of a currently online administrator corresponding to the configuration information when the configuration information is consistent with the configuration page identifier;
the reminding module 710 is configured to generate a configuration conflict log based on the user identifier of the currently online administrator to perform configuration conflict reminding.
FIG. 8 is a block diagram illustrating a system log configuration conflict reminder system in accordance with another exemplary embodiment. As shown in fig. 8, the system log configuration conflict reminder 80 includes: the administrator terminal 802 configures a response server 804, a collision detection server 806, and a log receiving server 808.
The plurality of administrator terminals 802 are configured to operate the system log, and generate a configuration request, where the configuration request includes a user identifier and a configuration page identifier;
the configuration response server 804 is configured to respond to the configuration request, and send the configuration request to the conflict detection server for detection;
the conflict detection server 806 is configured to obtain configuration information of all currently online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online manager, and sending the configuration conflict log to a log receiving server;
The log receiving server 808 is configured to send the configuration conflict log to a target administrator to perform configuration conflict reminding.
According to the system log configuration conflict reminding device, a configuration request aiming at the system log is obtained, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; the method for generating the configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding can reduce the risk of configuration loss of the manager due to configuration conflict, and improves the usability of products and the configuration efficiency of the manager.
Fig. 9 is a block diagram of an electronic device, according to an example embodiment.
An electronic device 900 according to such an embodiment of the present disclosure is described below with reference to fig. 9. The electronic device 900 shown in fig. 9 is merely an example and should not be construed to limit the functionality and scope of use of embodiments of the present disclosure in any way.
As shown in fig. 9, the electronic device 900 is embodied in the form of a general purpose computing device. Components of electronic device 900 may include, but are not limited to: at least one processing unit 910, at least one storage unit 920, a bus 930 connecting the different system components (including the storage unit 920 and the processing unit 910), a display unit 940, and the like.
Wherein the storage unit stores program code that is executable by the processing unit 910 such that the processing unit 910 performs steps described in the present specification according to various exemplary embodiments of the present disclosure. For example, the processing unit 910 may perform the steps as shown in fig. 2, 3, and 4.
The storage unit 920 may include readable media in the form of volatile storage units, such as Random Access Memory (RAM) 9201 and/or cache memory 9202, and may further include Read Only Memory (ROM) 9203.
The storage unit 920 may also include a program/utility 9204 having a set (at least one) of program modules 9205, such program modules 9205 include, but are not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
The bus 930 may be one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 900 may also be in communication with one or more external devices 900' (e.g., keyboard, pointing device, bluetooth device, etc.), devices that enable a user to interact with the electronic device 900, and/or any devices (e.g., routers, modems, etc.) that the electronic device 900 can communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 950. Also, electronic device 900 may communicate with one or more networks such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the Internet, through network adapter 960. The network adapter 960 can communicate with other modules of the electronic device 900 via the bus 930. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 900, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, as shown in fig. 10, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the embodiments of the present disclosure.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The computer-readable medium carries one or more programs, which when executed by one of the devices, cause the computer-readable medium to perform the functions of: acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier; acquiring configuration information of all current online administrators; comparing the configuration information of all administrators with the configuration page identifiers in sequence; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; and generating a configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding.
Those skilled in the art will appreciate that the modules may be distributed throughout several devices as described in the embodiments, and that corresponding variations may be implemented in one or more devices that are unique to the embodiments. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or in combination with the necessary hardware. Thus, the technical solutions according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and include several instructions to cause a computing device (may be a personal computer, a server, a mobile terminal, or a network device, etc.) to perform the method according to the embodiments of the present disclosure.
Exemplary embodiments of the present disclosure are specifically illustrated and described above. It is to be understood that this disclosure is not limited to the particular arrangements, instrumentalities and methods of implementation described herein; on the contrary, the disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (9)

1. A system log configuration conflict reminding method, comprising:
acquiring a configuration request aiming at a system log, wherein the configuration request comprises a user identifier and a configuration page identifier;
acquiring configuration information of all current online administrators;
sequentially acquiring user identifiers of all current online administrators;
acquiring a configuration page identifier corresponding to the user identifier;
comparing the configuration page identifiers of all the current online administrators with the configuration page identifiers of the configuration request;
when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information;
and generating a configuration conflict log based on the user identification of the current online manager to carry out configuration conflict reminding.
2. The method of claim 1, wherein obtaining a configuration request for a system log comprises:
Acquiring the configuration request from the WEB page aiming at the system log;
extracting the configuration page identification of a page to be configured based on the configuration request;
extracting a session control field in the configuration request;
the user identification of the administrator initiating the configuration request is read from the session control field.
3. The method of claim 1, wherein obtaining a configuration request for a system log, further comprises:
responding to the configuration request based on a hypertext transfer protocol.
4. The method of claim 1, wherein obtaining configuration information for all administrators currently online comprises:
transmitting the user identification and the configuration page identification to a conflict detection system;
the conflict detection system acquires configuration information of all current online administrators.
5. The method of claim 1, wherein generating a configuration conflict log for configuration conflict reminders based on the user identification of the currently online administrator comprises:
generating a configuration conflict log based on the user identification of the currently online manager;
and sending the configuration conflict log to a log receiving system to carry out configuration conflict reminding.
6. The method of claim 5, wherein sending the configuration conflict log to a log receiving system for configuration conflict reminders comprises:
transmitting the configuration conflict log to the log receiving system;
the log receiving system extracts at least one user identifier in the configuration conflict log;
and sending the configuration conflict log based on the at least one user identifier.
7. The method of claim 6, wherein sending the configuration conflict log based on the at least one user identification comprises:
receiving a log extraction request from an administrator;
when the user identification of the administrator corresponding to the log extraction request is consistent with the at least one user identification,
and sending the configuration conflict log to the administrator.
8. A system log configuration conflict reminding method, comprising:
the request module is used for acquiring a configuration request aiming at the system log, wherein the configuration request comprises a user identifier and a configuration page identifier;
the information module is used for acquiring configuration information of all current online administrators;
the comparison module is used for sequentially acquiring the user identifications of all the current online administrators, acquiring the configuration page identifications corresponding to the user identifications, and comparing the configuration page identifications of all the current online administrators with the configuration page identifications of the configuration request;
The identification module is used for acquiring the user identification of the current online manager corresponding to the configuration information when the configuration information is consistent with the configuration page identification;
and the reminding module is used for generating a configuration conflict log based on the user identification of the current online manager so as to carry out configuration conflict reminding.
9. A system log configuration conflict reminder system, comprising:
the system comprises a plurality of manager terminals, a plurality of configuration server terminals and a plurality of configuration server terminals, wherein the manager terminals are used for operating the system logs and generating configuration requests, and the configuration requests comprise user identifiers and configuration page identifiers;
the configuration response server is used for responding to the configuration request and sending the configuration request to the conflict detection server for detection;
the conflict detection server is used for acquiring configuration information of all current online administrators; sequentially acquiring user identifiers of all current online administrators, acquiring configuration page identifiers corresponding to the user identifiers, and comparing the configuration page identifiers of all the current online administrators with the configuration page identifiers of the configuration request; when the configuration information is consistent with the configuration page identification, acquiring a user identification of a current online manager corresponding to the configuration information; generating a configuration conflict log based on the user identification of the current online manager, and sending the configuration conflict log to a log receiving server;
And the log receiving server is used for sending the configuration conflict log to a target administrator to carry out configuration conflict reminding.
CN202011046798.5A 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system Active CN111984893B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011046798.5A CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011046798.5A CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Publications (2)

Publication Number Publication Date
CN111984893A CN111984893A (en) 2020-11-24
CN111984893B true CN111984893B (en) 2023-09-12

Family

ID=73450274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011046798.5A Active CN111984893B (en) 2020-09-29 2020-09-29 System log configuration conflict reminding method, device and system

Country Status (1)

Country Link
CN (1) CN111984893B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159973A (en) * 2007-11-09 2008-04-09 中兴通讯股份有限公司 Conflict evading method of multi-user configuring network element data
CN101365191A (en) * 2007-08-07 2009-02-11 华为技术有限公司 Method and terminal implementing multi-user simultaneously on-line
CN102148817A (en) * 2010-12-08 2011-08-10 华为技术有限公司 Network equipment configuration method, client, server and network system
CN102999532A (en) * 2011-09-19 2013-03-27 中兴通讯股份有限公司 Method and device for configuring data by users
CN103220081A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Conflict detection method, network side equipment and user equipment (UE)
CN103914439A (en) * 2013-01-04 2014-07-09 中国移动通信集团公司 Method, device and system for online document edition
CN104539463A (en) * 2015-01-15 2015-04-22 北京随方信息技术有限公司 Network device configuration file online attribute cross checking method and system
CN106462833A (en) * 2014-06-23 2017-02-22 甲骨文国际公司 System and method for supporting multiple partition edit sessions in a multitenant application server environment
CN108134690A (en) * 2017-12-13 2018-06-08 中盈优创资讯科技有限公司 Network service deployment flow control method, apparatus and system
CN108696372A (en) * 2017-04-06 2018-10-23 阿里巴巴集团控股有限公司 A kind of method and system keeping system configuration consistency
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9185174B2 (en) * 2009-04-29 2015-11-10 Ianywhere Solutions, Inc. Maintaining mobile device operations
US9143407B2 (en) * 2011-09-02 2015-09-22 Microsoft Technology Licensing, Llc Granular client inventory management with conflict resolution

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101365191A (en) * 2007-08-07 2009-02-11 华为技术有限公司 Method and terminal implementing multi-user simultaneously on-line
CN101159973A (en) * 2007-11-09 2008-04-09 中兴通讯股份有限公司 Conflict evading method of multi-user configuring network element data
CN102148817A (en) * 2010-12-08 2011-08-10 华为技术有限公司 Network equipment configuration method, client, server and network system
CN102999532A (en) * 2011-09-19 2013-03-27 中兴通讯股份有限公司 Method and device for configuring data by users
CN103220081A (en) * 2012-01-21 2013-07-24 华为技术有限公司 Conflict detection method, network side equipment and user equipment (UE)
CN103914439A (en) * 2013-01-04 2014-07-09 中国移动通信集团公司 Method, device and system for online document edition
CN106462833A (en) * 2014-06-23 2017-02-22 甲骨文国际公司 System and method for supporting multiple partition edit sessions in a multitenant application server environment
CN104539463A (en) * 2015-01-15 2015-04-22 北京随方信息技术有限公司 Network device configuration file online attribute cross checking method and system
CN108696372A (en) * 2017-04-06 2018-10-23 阿里巴巴集团控股有限公司 A kind of method and system keeping system configuration consistency
CN108134690A (en) * 2017-12-13 2018-06-08 中盈优创资讯科技有限公司 Network service deployment flow control method, apparatus and system
CN111159252A (en) * 2019-12-27 2020-05-15 腾讯科技(深圳)有限公司 Transaction execution method and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
电力数据通信网配置核查系统设计与实现;刘俊 等;《计算技术与自动化 》;82-92 *

Also Published As

Publication number Publication date
CN111984893A (en) 2020-11-24

Similar Documents

Publication Publication Date Title
US11870802B1 (en) Identifying automated responses to security threats based on communication interactions content
CN109716343B (en) Enterprise graphic method for threat detection
US10523609B1 (en) Multi-vector malware detection and analysis
US9003552B2 (en) Online privacy management
US9336379B2 (en) Reputation-based safe access user experience
US8973134B2 (en) Software vulnerability notification via icon decorations
CN105635178B (en) Ensure the block type Network Access Method and device of safety
US20190289027A1 (en) Methods and Systems for Providing Security for Page Framing
CN103607385A (en) Method and apparatus for security detection based on browser
US10778687B2 (en) Tracking and whitelisting third-party domains
US20190222587A1 (en) System and method for detection of attacks in a computer network using deception elements
EP3926503A1 (en) Dynamically providing cybersecurity training based on user-specific threat information
CN111488581A (en) Weak password vulnerability detection method and device, electronic equipment and computer readable medium
CN106790171B (en) Session control method, device, computer readable storage medium and equipment
US20230224325A1 (en) Distributed endpoint security architecture enabled by artificial intelligence
US9398041B2 (en) Identifying stored vulnerabilities in a web service
CN111984893B (en) System log configuration conflict reminding method, device and system
EP4152729A1 (en) Interactive email warning tags
US11863583B2 (en) Generating action recommendations for courses of action used for incident response
CN114598524B (en) Method, device, equipment and storage medium for detecting agent tool
CN113839957B (en) Unauthorized vulnerability detection method and device
CN112543203B (en) Terminal access method, device and system
CN113824696B (en) Portal authentication method and device
US20230319040A1 (en) Repeating verification of a user
CN117675561A (en) Software configuration method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant