CN113377622A - Transaction response abnormity warning method and device and electronic equipment - Google Patents

Transaction response abnormity warning method and device and electronic equipment Download PDF

Info

Publication number
CN113377622A
CN113377622A CN202110744697.3A CN202110744697A CN113377622A CN 113377622 A CN113377622 A CN 113377622A CN 202110744697 A CN202110744697 A CN 202110744697A CN 113377622 A CN113377622 A CN 113377622A
Authority
CN
China
Prior art keywords
transaction
log
time
transaction response
transaction request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110744697.3A
Other languages
Chinese (zh)
Inventor
胡江南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fusionskye Beijing Software Co ltd
Original Assignee
Fusionskye Beijing Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fusionskye Beijing Software Co ltd filed Critical Fusionskye Beijing Software Co ltd
Priority to CN202110744697.3A priority Critical patent/CN113377622A/en
Publication of CN113377622A publication Critical patent/CN113377622A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Abstract

The invention provides an alarming method, a device and electronic equipment for transaction response abnormity, wherein the alarming method does not need to make a transaction request log wait for a transaction response log at a data acquisition end, the transaction request log directly enters a database, the transaction request log and the transaction response log are further obtained from the database, and whether the transaction response is abnormal or not is judged, so that the complexity of the data acquisition end is reduced, the resource consumption of the data acquisition end is reduced, meanwhile, the real-time property of warehousing the transaction request log and the transaction response log is improved, and the technical problems that the existing transaction response abnormity alarming method consumes the resources of the data acquisition end and improves the complexity of the data acquisition end are solved.

Description

Transaction response abnormity warning method and device and electronic equipment
Technical Field
The invention relates to the technical field of network monitoring, in particular to an alarming method and device for transaction response abnormity and electronic equipment.
Background
With the rapid development of computer networks, digital transformation has been completed by all large financial institutions, which means that a large number of transactions are completed on line. The success rate of online transaction has a great influence on the user experience, so that it is very important to alarm the failed transaction (transaction time is over or no transaction returns).
The existing alarm technology generally comprises the steps of acquiring a transaction request log and caching transaction request data to a data acquisition end when the data acquisition end acquires data, waiting for the data acquisition end to acquire a transaction response log, inquiring a transaction request log matched with the transaction response log in a cache of the data acquisition end after the transaction response log is acquired (after the transaction request log matched with the transaction response log is inquired, the matched transaction request log is deleted from the cache), calculating transaction time according to the request time in the matched transaction request log and the response time in the transaction response log, determining whether the transaction is overtime according to whether the transaction time is greater than preset overtime time, supplementing information on whether the transaction is overtime to the transaction request log or the transaction response log, and storing the transaction request log and the transaction response log carrying the transaction overtime to a database, for the user to query. In the above alarm technology, the transaction request log needs to be made to wait for the transaction response log at the data acquisition end, when the waiting time is long and the amount of the transaction request log is large, the cache space of the data acquisition end occupied by the transaction request log is also large, and when the transaction request log matched with the transaction response log is queried in the cache, the consumed CPU resource is also large, that is, the log needs to be analyzed and processed at the data acquisition end, which may affect the efficiency and stability of the data acquisition end.
In summary, the existing transaction response abnormity warning method has the technical problem of increasing the complexity of a data acquisition end.
Disclosure of Invention
In view of this, the present invention provides an alarm method, an alarm device and an electronic device for transaction response exception, so as to alleviate the technical problem that the existing alarm method for transaction response exception consumes resources of a data acquisition end.
In a first aspect, an embodiment of the present invention provides an alarm method for abnormal transaction response, including:
acquiring a transaction request log stored in a database, and determining whether the transaction request log is the transaction request log of a target service;
if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service;
acquiring a transaction response log stored in the database, and determining whether the transaction response log is a transaction response log of a target service;
if so, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the activity list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the activity list;
determining expired target corresponding relation data in the activity list according to the expiration time of the activity list;
and determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data.
Further, determining whether the transaction request log is a transaction request log of a target service includes:
matching the transaction request log with a transaction request rule of the target service;
if the transaction request log is matched with the transaction request rule, determining that the transaction request log is the transaction request log of the target service;
and if the transaction request log is not matched with the transaction request rule, determining that the transaction request log is not the transaction request log of the target service.
Further, determining whether the transaction response log is a transaction response log of the target service includes:
matching the transaction response log with a transaction response rule of the target service;
if the transaction response log is matched with the transaction response rule, determining that the transaction response log is the transaction response log of the target service;
and if the transaction response log is not matched with the transaction response rule, determining that the transaction response log is not the transaction response log of the target service.
Further, determining the expired target corresponding relationship data in the activity list according to the expiration time of the activity list includes:
if the non-update time of the first corresponding relation data in the activity list is greater than the expiration time of the activity list, determining that the first corresponding relation data is expired target corresponding relation data, wherein the first corresponding relation data is any corresponding relation data in the activity list.
Further, after determining the target corresponding relationship data expired in the active list according to the expiration time of the active list, before determining whether the transaction response corresponding to the target corresponding relationship data is abnormal according to the transaction request time and the transaction response time in the target corresponding relationship data, the method further includes:
and deleting the target corresponding relation data from the active list.
Further, determining whether the corresponding transaction response is abnormal according to the transaction request time and the transaction response time in the target corresponding relation data includes:
if the transaction response time in the target corresponding relation data is empty, determining that the corresponding transaction response is abnormal;
if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is greater than a preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is abnormal, wherein the preset timeout time is less than the expiration time;
and if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is not greater than the preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is normal.
Further, after determining that the transaction response is abnormal, the method further comprises:
and alarming according to the abnormal transaction response information.
In a second aspect, an embodiment of the present invention further provides an apparatus for warning of abnormal transaction response, including:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a transaction request log stored in a database and determining whether the transaction request log is a transaction request log of a target service;
the storage unit is used for storing the transaction identification information and the transaction request time in the transaction request log to an activity list of the target service if the transaction identification information and the transaction request time are in the transaction request log;
the second acquisition unit is used for acquiring the transaction response log stored in the database and determining whether the transaction response log is the transaction response log of the target service;
the updating unit is used for updating the transaction response time corresponding to the transaction identification information in the transaction response log in the activity list if the transaction request time is the transaction request time, so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the activity list;
a first determining unit, configured to determine, according to expiration time of the active list, expired target correspondence data in the active list;
and the second determining unit is used for determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data.
In a third aspect, an embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the method according to any one of the above first aspects when executing the computer program.
In a fourth aspect, embodiments of the present invention also provide a computer-readable storage medium storing machine executable instructions, which when invoked and executed by a processor, cause the processor to perform the method of any of the first aspect.
In an embodiment of the present invention, an alarm method for abnormal transaction response is provided, including: acquiring a transaction request log stored in a database, and determining whether the transaction request log is the transaction request log of a target service; if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service; acquiring a transaction response log stored in a database, and determining whether the transaction response log is the transaction response log of the target service; if so, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the active list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the active list; determining expired target corresponding relation data in the activity list according to the expiration time of the activity list; and determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data. As can be seen from the above description, in the method for alarming transaction response abnormality in the embodiment of the present invention, the transaction request log does not need to be issued at the data acquisition end to wait for the transaction response log, the transaction request log directly enters the database, and then the transaction request log and the transaction response log are obtained from the database, and whether the transaction response is abnormal or not is determined, so that the complexity of the data acquisition end is reduced, the resource consumption of the data acquisition end is reduced, meanwhile, the real-time property of warehousing the transaction request log and the transaction response log is improved, and the technical problems that the existing method for alarming transaction response abnormality consumes the resources of the data acquisition end and improves the complexity of the data acquisition end are alleviated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an alarm method for transaction response exception according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for determining whether a transaction request log is a transaction request log of a target service according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for determining whether a transaction response log is a transaction response log of a target service according to an embodiment of the present invention;
fig. 4 is a flowchart of a method for determining whether a transaction response corresponding to a target corresponding relationship data is abnormal according to a transaction request time and a transaction response time in the target corresponding relationship data according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an alarm device for transaction response exception according to an embodiment of the present invention;
fig. 6 is a schematic diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the following embodiments, and it should be understood that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The existing alarm technology is to perform complex analysis processing on the log at the data acquisition end, so that the complexity of the data acquisition end is improved, and the resources of the data acquisition end are consumed.
Therefore, the embodiment provides an alarm method for transaction response abnormity, the method does not need to give a transaction request log to wait for a transaction response log at a data acquisition end, the transaction request log directly enters a database, the transaction request log and the transaction response log are further obtained from the database, and whether the transaction response is abnormal or not is judged, so that the complexity of the data acquisition end is reduced, the resource consumption of the data acquisition end is reduced, and meanwhile, the real-time performance of warehousing the transaction request log and the transaction response log is improved.
Embodiments of the present invention are further described below with reference to the accompanying drawings.
The first embodiment is as follows:
in accordance with an embodiment of the present invention, there is provided an embodiment of a method for alerting of a transaction response anomaly, to the extent that the steps illustrated in the flowchart of the figure can be performed in a computer system such as a set of computer-executable instructions, and although a logical order is illustrated in the flowchart, in some cases the steps illustrated or described can be performed in an order different than presented herein.
Fig. 1 is a flowchart of an alarm method for transaction response exception according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, obtaining a transaction request log stored in a database, and determining whether the transaction request log is a transaction request log of a target service;
in an embodiment of the invention, the method may be applied to an alert engine. After entering the data acquisition end, the transaction request log of the embodiment of the invention can directly enter the database without waiting at the data acquisition end, thereby improving the real-time performance of the data.
The warning engine can monitor the database, acquire a transaction request log after entering a new transaction request log in the database, determine whether the transaction request log is a transaction request log of a target service, and perform subsequent operations.
The alarm engine may also obtain the transaction request log stored in the database according to a preset time period, and determine the transaction request log of the target service in the transaction request log.
Step S104, if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service;
in the embodiment of the present invention, the activity list is a data table, the activity list is predefined to have three fields, which are a transaction identifier, a transaction request time and a transaction response time, and an expiration time of the activity list is predefined, the expiration time needs to be greater than a preset timeout time, and the expiration time is valid for each item in the activity list.
If not, the transaction request log is saved to a database.
Step S106, acquiring a transaction response log stored in a database, and determining whether the transaction response log is the transaction response log of the target service;
specifically, the alarm engine may monitor the database, obtain a transaction response log after entering a new transaction response log in the database, determine whether the transaction response log is a transaction response log of the target service, and perform subsequent operations.
The alarm engine may also obtain the transaction response log stored in the database according to a preset time period, and determine the transaction response log of the target service in the transaction response log.
Step S108, if yes, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the activity list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the activity list;
step S110, determining overdue target corresponding relation data in the activity list according to the overdue time of the activity list;
and step S112, determining whether the corresponding transaction response is abnormal according to the transaction request time and the transaction response time in the target corresponding relation data.
In an embodiment of the present invention, an alarm method for abnormal transaction response is provided, including: acquiring a transaction request log stored in a database, and determining whether the transaction request log is the transaction request log of a target service; if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service; acquiring a transaction response log stored in a database, and determining whether the transaction response log is the transaction response log of the target service; if so, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the active list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the active list; determining expired target corresponding relation data in the activity list according to the expiration time of the activity list; and determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data. As can be seen from the above description, in the method for alarming transaction response abnormality in the embodiment of the present invention, the transaction request log does not need to be issued at the data acquisition end to wait for the transaction response log, the transaction request log directly enters the database, and then the transaction request log and the transaction response log are obtained from the database, and whether the transaction response is abnormal or not is determined, so that the complexity of the data acquisition end is reduced, the resource consumption of the data acquisition end is reduced, meanwhile, the real-time property of warehousing the transaction request log and the transaction response log is improved, and the technical problems that the existing method for alarming transaction response abnormality consumes the resources of the data acquisition end and improves the complexity of the data acquisition end are alleviated.
The above description briefly introduces the transaction response anomaly alerting method of the present invention, and the details thereof are described in detail below.
In an optional embodiment of the present invention, referring to fig. 2, the step S102 of determining whether the transaction request log is a transaction request log of the target service specifically includes the following steps:
step S201, the transaction request log is matched with the transaction request rule of the target service;
the transaction request rule of the target service may be a transaction request rule of one service, or may be a transaction request rule of multiple services. When the transaction request rule of the target service is the transaction request rule of multiple services, the transaction response rule of the target service is also the corresponding transaction response rule of multiple services, and the corresponding transaction response rule also has an activity list of multiple services. In addition, the transaction request rule of the target service is preset.
Step S202, if the transaction request log is matched with the transaction request rule, determining the transaction request log as the transaction request log of the target service;
step S203, if the transaction request log does not match the transaction request rule, determining that the transaction request log is not the transaction request log of the target service.
In an optional embodiment of the present invention, referring to fig. 3, the step S106 of determining whether the transaction response log is the transaction response log of the target service specifically includes the following steps:
step S301, matching the transaction response log with the transaction response rule of the target service;
the transaction response rule of the target service is preset.
Step S302, if the transaction response log is matched with the transaction response rule, determining the transaction response log as the transaction response log of the target service;
step S303, if the transaction response log does not match the transaction response rule, determining that the transaction response log is not the transaction response log of the target service.
In an optional embodiment of the present invention, determining the expired target correspondence data in the active list according to the expiration time of the active list specifically includes: and if the non-updating time of the first corresponding relation data in the active list is greater than the expiration time of the active list, determining that the first corresponding relation data is expired target corresponding relation data, wherein the first corresponding relation data is any corresponding relation data in the active list.
In an optional embodiment of the present invention, after determining the target correspondence data that expires in the active list according to the expiration time of the active list, before determining whether the transaction response corresponding to the target correspondence data is abnormal according to the transaction request time and the transaction response time in the target correspondence data, the method further includes: and deleting the target corresponding relation data from the active list.
In an optional embodiment of the present invention, referring to fig. 4, the step S112, determining whether the transaction response corresponding to the transaction request time is abnormal according to the transaction response time and the transaction request time in the target correspondence data, specifically includes the following steps:
step S401, if the transaction response time in the target corresponding relation data is empty, determining that the corresponding transaction response is abnormal;
in this case, the transaction response exception is described as no transaction return.
Step S402, if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is greater than a preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is abnormal, wherein the preset timeout time is less than an expiration time;
in this case, the transaction response time-out is described as the occurrence of a transaction response exception. The reason why the preset timeout time is smaller than the timeout time is that it is ensured that the transaction response time corresponding to the transaction response log is obtained after the target corresponding relationship data is expired, and if the transaction response time is not obtained, it is indicated that a transaction response exception has occurred (because the transaction response is already overtime, the reason is that the timeout time is larger than the preset timeout time). In addition, the expiration time of the activity list is set to avoid unnecessary waiting caused by the fact that the transaction response time of the corresponding transaction response log is not obtained for a long time, namely, after the target corresponding relation data is expired, whether the transaction response is abnormal is triggered to be judged, the transaction response log cannot be obtained all the time, and the method is more scientific.
It should be noted that, the determination rule (the rule that the transaction response time is null or the time difference between the transaction response time and the transaction request time is greater than the preset timeout time) for determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target correspondence data is a preset rule.
In step S403, if the time difference between the transaction response time and the transaction request time in the target corresponding relationship data is not greater than the preset timeout time, it is determined that the transaction response corresponding to the target corresponding relationship data is normal.
In an optional embodiment of the invention, after determining that the transaction response is abnormal, the method further comprises: and alarming according to the abnormal information of the transaction response. For example, different alarms are respectively given according to the information of no transaction return and transaction response overtime, and then the information is put in storage.
It should be noted that: the transaction identification information may be a transaction ID. When the method is actually applied, a user only needs to set a transaction request rule of the target service, a transaction response rule of the target service, an activity list (comprising three fields and expiration time) and a judgment rule of whether the transaction response is abnormal (the transaction response time is null or the time difference between the transaction response time and the transaction request time is greater than the preset timeout time), and the method is simple and convenient.
Compared with the prior art, the method of the invention does not need to give the transaction request log to wait for the transaction response log at the data acquisition end, thereby reducing the complexity of the data acquisition end, simultaneously improving the real-time property of data storage, and the user can realize the transaction request log only by focusing on the configuration of the rule, so that the configuration is clearer.
Example two:
the embodiment of the present invention further provides an alarm device for transaction response abnormality, where the alarm device for transaction response abnormality is mainly used to execute the alarm method for transaction response abnormality provided in the first embodiment of the present invention, and the alarm device for transaction response abnormality provided in the embodiment of the present invention is specifically described below.
Fig. 5 is a schematic diagram of an alarm device for transaction response abnormality according to an embodiment of the present invention, as shown in fig. 5, the device mainly includes: a first acquisition unit 10, a saving unit 20, a second acquisition unit 30, an updating unit 40, a first determination unit 50, and a second determination unit 60, wherein:
the first acquisition unit is used for acquiring a transaction request log stored in a database and determining whether the transaction request log is the transaction request log of a target service;
the storage unit is used for storing the transaction identification information and the transaction request time in the transaction request log to an activity list of the target service if the transaction identification information and the transaction request time are in the transaction request log;
the second acquisition unit is used for acquiring the transaction response log stored in the database and determining whether the transaction response log is the transaction response log of the target service;
the updating unit is used for updating the transaction response time corresponding to the transaction identification information in the transaction response log in the active list if the transaction request time is the transaction request time, so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the active list;
the first determining unit is used for determining the expired target corresponding relation data in the activity list according to the expiration time of the activity list;
and the second determining unit is used for determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data.
In an embodiment of the present invention, an alarm device for transaction response exception is provided, including: acquiring a transaction request log stored in a database, and determining whether the transaction request log is the transaction request log of a target service; if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service; acquiring a transaction response log stored in a database, and determining whether the transaction response log is the transaction response log of the target service; if so, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the active list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the active list; determining expired target corresponding relation data in the activity list according to the expiration time of the activity list; and determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data. As can be seen from the above description, the alarm device for transaction response abnormality in the embodiment of the present invention does not need to give the transaction request log to wait for the transaction response log at the data acquisition end, and the transaction request log directly enters the database, so as to obtain the transaction request log and the transaction response log from the database, and determine whether the transaction response is abnormal, thereby reducing the complexity of the data acquisition end, reducing the resource consumption of the data acquisition end, simultaneously improving the real-time property of the transaction request log and the transaction response log entering the database, and alleviating the technical problems of the existing alarm method for transaction response abnormality that consumes the resources of the data acquisition end and improves the complexity of the data acquisition end.
Optionally, the first obtaining unit is further configured to: matching the transaction request log with the transaction request rule of the target service; if the transaction request log is matched with the transaction request rule, determining the transaction request log as the transaction request log of the target service; and if the transaction request log does not match the transaction request rule, determining that the transaction request log is not the transaction request log of the target service.
Optionally, the second obtaining unit is further configured to: matching the transaction response log with the transaction response rule of the target service; if the transaction response log is matched with the transaction response rule, determining the transaction response log as the transaction response log of the target service; and if the transaction response log is not matched with the transaction response rule, determining that the transaction response log is not the transaction response log of the target service.
Optionally, the first determining unit is further configured to: and if the non-updating time of the first corresponding relation data in the active list is greater than the expiration time of the active list, determining that the first corresponding relation data is expired target corresponding relation data, wherein the first corresponding relation data is any corresponding relation data in the active list.
Optionally, the apparatus is further configured to: and deleting the target corresponding relation data from the active list.
Optionally, the second determining unit is further configured to: if the transaction response time in the target corresponding relation data is empty, determining that the corresponding transaction response is abnormal; if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is greater than the preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is abnormal, wherein the preset timeout time is less than the expiration time; and if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is not greater than the preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is normal.
Optionally, the apparatus is further configured to: and alarming according to the abnormal information of the transaction response.
The device provided by the embodiment of the present invention has the same implementation principle and technical effect as the method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the method embodiments without reference to the device embodiments.
As shown in fig. 6, an electronic device 600 provided in an embodiment of the present application includes: a processor 601, a memory 602 and a bus, wherein the memory 602 stores machine-readable instructions executable by the processor 601, when the electronic device is operated, the processor 601 and the memory 602 communicate with each other through the bus, and the processor 601 executes the machine-readable instructions to execute the steps of the method for alarming in response to an exception of a transaction as described above.
Specifically, the memory 602 and the processor 601 can be general memories and processors, which are not limited in particular, and the processor 601 can execute the above-mentioned transaction response exception warning method when executing the computer program stored in the memory 602.
The processor 601 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 601. The Processor 601 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present application may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 602, and the processor 601 reads the information in the memory 602 and completes the steps of the method in combination with the hardware thereof.
Corresponding to the above-mentioned warning method for transaction response exception, the present application further provides a computer-readable storage medium, where a machine executable instruction is stored, and when the computer executable instruction is called and executed by a processor, the computer executable instruction causes the processor to execute the step of the above-mentioned warning method for transaction response exception.
The warning device for the transaction response abnormity provided by the embodiment of the application can be specific hardware on the equipment or software or firmware installed on the equipment, and the like. The device provided by the embodiment of the present application has the same implementation principle and technical effect as the foregoing method embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing method embodiments where no part of the device embodiments is mentioned. It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the foregoing systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
For another example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments provided in the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing an electronic device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the vehicle marking method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus once an item is defined in one figure, it need not be further defined and explained in subsequent figures, and moreover, the terms "first", "second", "third", etc. are used merely to distinguish one description from another and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the scope of the embodiments of the present application. Are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A transaction response exception warning method is characterized by comprising the following steps:
acquiring a transaction request log stored in a database, and determining whether the transaction request log is the transaction request log of a target service;
if yes, transaction identification information and transaction request time in the transaction request log are stored in an activity list of the target service;
acquiring a transaction response log stored in the database, and determining whether the transaction response log is a transaction response log of a target service;
if so, updating the transaction response time corresponding to the transaction identification information in the transaction response log in the activity list so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the activity list;
determining expired target corresponding relation data in the activity list according to the expiration time of the activity list;
and determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data.
2. The method of claim 1, wherein determining whether the transaction request log is a transaction request log for a target service comprises:
matching the transaction request log with a transaction request rule of the target service;
if the transaction request log is matched with the transaction request rule, determining that the transaction request log is the transaction request log of the target service;
and if the transaction request log is not matched with the transaction request rule, determining that the transaction request log is not the transaction request log of the target service.
3. The method of claim 1, wherein determining whether the transaction response log is a transaction response log for a target transaction comprises:
matching the transaction response log with a transaction response rule of the target service;
if the transaction response log is matched with the transaction response rule, determining that the transaction response log is the transaction response log of the target service;
and if the transaction response log is not matched with the transaction response rule, determining that the transaction response log is not the transaction response log of the target service.
4. The method of claim 1, wherein determining the outdated target correspondence data in the active list based on the expiration time of the active list comprises:
if the non-update time of the first corresponding relation data in the activity list is greater than the expiration time of the activity list, determining that the first corresponding relation data is expired target corresponding relation data, wherein the first corresponding relation data is any corresponding relation data in the activity list.
5. The method according to claim 1, wherein after determining the target correspondence data expired in the activity list according to the expiration time of the activity list, before determining whether the transaction response corresponding to the target correspondence data is abnormal according to the transaction request time and the transaction response time in the target correspondence data, the method further comprises:
and deleting the target corresponding relation data from the active list.
6. The method of claim 1, wherein determining whether the transaction response corresponding to the target correspondence data is abnormal according to the transaction request time and the transaction response time in the target correspondence data comprises:
if the transaction response time in the target corresponding relation data is empty, determining that the corresponding transaction response is abnormal;
if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is greater than a preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is abnormal, wherein the preset timeout time is less than the expiration time;
and if the time difference between the transaction response time and the transaction request time in the target corresponding relation data is not greater than the preset timeout time, determining that the transaction response corresponding to the target corresponding relation data is normal.
7. The method of claim 1, wherein after determining that the transaction response is anomalous, the method further comprises:
and alarming according to the abnormal transaction response information.
8. An apparatus for alerting of anomalies in transaction responses, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a transaction request log stored in a database and determining whether the transaction request log is a transaction request log of a target service;
the storage unit is used for storing the transaction identification information and the transaction request time in the transaction request log to an activity list of the target service if the transaction identification information and the transaction request time are in the transaction request log;
the second acquisition unit is used for acquiring the transaction response log stored in the database and determining whether the transaction response log is the transaction response log of the target service;
the updating unit is used for updating the transaction response time corresponding to the transaction identification information in the transaction response log in the activity list if the transaction request time is the transaction request time, so as to establish corresponding relation data among the transaction identification information, the transaction request time and the transaction response time in the activity list;
a first determining unit, configured to determine, according to expiration time of the active list, expired target correspondence data in the active list;
and the second determining unit is used for determining whether the corresponding transaction response is abnormal or not according to the transaction request time and the transaction response time in the target corresponding relation data.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of any of the preceding claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer readable storage medium having stored thereon machine executable instructions which, when invoked and executed by a processor, cause the processor to perform the method of any of claims 1 to 7.
CN202110744697.3A 2021-07-01 2021-07-01 Transaction response abnormity warning method and device and electronic equipment Pending CN113377622A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110744697.3A CN113377622A (en) 2021-07-01 2021-07-01 Transaction response abnormity warning method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110744697.3A CN113377622A (en) 2021-07-01 2021-07-01 Transaction response abnormity warning method and device and electronic equipment

Publications (1)

Publication Number Publication Date
CN113377622A true CN113377622A (en) 2021-09-10

Family

ID=77580503

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110744697.3A Pending CN113377622A (en) 2021-07-01 2021-07-01 Transaction response abnormity warning method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN113377622A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023476A (en) * 2016-05-11 2016-10-12 广州御银自动柜员机科技有限公司 Electronic turnover system
CN106210021A (en) * 2016-07-05 2016-12-07 中国银行股份有限公司 The method for real-time monitoring of financial application system online business and supervising device
CN106651569A (en) * 2016-12-26 2017-05-10 中国建设银行股份有限公司 Transaction response time obtaining system and method and analysis method
CN109377369A (en) * 2018-11-13 2019-02-22 平安科技(深圳)有限公司 Checking method, device and the computer readable storage medium of transaction data
CN111798237A (en) * 2020-06-30 2020-10-20 中国工商银行股份有限公司 Abnormal transaction diagnosis method and system based on application log
CN112910905A (en) * 2021-02-07 2021-06-04 中国工商银行股份有限公司 Security verification method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106023476A (en) * 2016-05-11 2016-10-12 广州御银自动柜员机科技有限公司 Electronic turnover system
CN106210021A (en) * 2016-07-05 2016-12-07 中国银行股份有限公司 The method for real-time monitoring of financial application system online business and supervising device
CN106651569A (en) * 2016-12-26 2017-05-10 中国建设银行股份有限公司 Transaction response time obtaining system and method and analysis method
CN109377369A (en) * 2018-11-13 2019-02-22 平安科技(深圳)有限公司 Checking method, device and the computer readable storage medium of transaction data
CN111798237A (en) * 2020-06-30 2020-10-20 中国工商银行股份有限公司 Abnormal transaction diagnosis method and system based on application log
CN112910905A (en) * 2021-02-07 2021-06-04 中国工商银行股份有限公司 Security verification method and device

Similar Documents

Publication Publication Date Title
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN112307057A (en) Data processing method and device, electronic equipment and computer storage medium
CN110362455B (en) Data processing method and data processing device
CN112311617A (en) Configured data monitoring and alarming method and system
CN108415925B (en) Electronic device, data call log generation and query method and storage medium
CN112054915B (en) Processing method, device and system for client exception pre-warning and computing equipment
CN111061802B (en) Power data management processing method, device and storage medium
CN108959514B (en) Data processing method and device
CN114827168A (en) Alarm aggregation reporting method and device, computer equipment and storage medium
CN107798086B (en) Server information updating method, device and system and electronic equipment
CN114153703A (en) Micro-service exception positioning method and device, electronic equipment and program product
CN110599278A (en) Method, apparatus, and computer storage medium for aggregating device identifiers
CN114880194B (en) Service abnormity monitoring method and device, electronic equipment and computer storage medium
CN113377622A (en) Transaction response abnormity warning method and device and electronic equipment
CN110704486A (en) Data processing method, device, system, storage medium and server
CN111427878B (en) Data monitoring alarm method, device, server and storage medium
WO2019071899A1 (en) Electronic device, vehicle data import method and storage medium
CN111356097B (en) Short message analysis method and device and readable storage medium
CN114860432A (en) Method and device for determining information of memory fault
CN114595765A (en) Data processing method and device, electronic equipment and storage medium
CN113132431B (en) Service monitoring method, service monitoring device, electronic device, and medium
CN113961431A (en) Service monitoring method and device
CN112596974A (en) Full link monitoring method, device, equipment and storage medium
CN111629005A (en) Anti-cheating method and device, electronic equipment and storage medium
CN117522363A (en) Work order processing time length calculation method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination