CN113868615A - Asset database configuration management method based on network monitoring - Google Patents

Asset database configuration management method based on network monitoring Download PDF

Info

Publication number
CN113868615A
CN113868615A CN202111222896.4A CN202111222896A CN113868615A CN 113868615 A CN113868615 A CN 113868615A CN 202111222896 A CN202111222896 A CN 202111222896A CN 113868615 A CN113868615 A CN 113868615A
Authority
CN
China
Prior art keywords
configuration
user
data
information
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111222896.4A
Other languages
Chinese (zh)
Inventor
刘昕林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Power Supply Bureau Co Ltd
Original Assignee
Shenzhen Power Supply Bureau Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Power Supply Bureau Co Ltd filed Critical Shenzhen Power Supply Bureau Co Ltd
Priority to CN202111222896.4A priority Critical patent/CN113868615A/en
Publication of CN113868615A publication Critical patent/CN113868615A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Abstract

The invention discloses an asset database configuration management method based on network monitoring, which belongs to the technical field of data processing and comprises the following specific steps: (1) creating a user account, and identifying and analyzing the user identity; (2) carrying out configuration management on the asset database; (3) detecting user operation in real time and feeding back abnormal operation; (4) executing a configuration task and carrying out data backup on data; (5) monitoring the task execution flow in real time and feeding back monitoring data; the invention can reduce the workload of workers, improve the working enthusiasm and the working efficiency of the workers, ensure the normal operation of the configuration process, improve the configuration efficiency of the workers, and improve the use experience of the workers without spending a large amount of time to modify the configuration scheme.

Description

Asset database configuration management method based on network monitoring
Technical Field
The invention relates to the technical field of data processing, in particular to an asset database configuration management method based on network monitoring.
Background
The database is a warehouse for storing data, the storage space of the database is large, millions of data can be stored, the database does not store the data randomly, certain rules exist, otherwise, the query efficiency is low, along with the development of the internet technology, the number and types of service systems are more and more, when the service systems process related service requests, the connection relation with the database is generally required to be established, then corresponding operations are executed on the database to obtain the required data, before the database data are used, the database is generally required to be configured first, and then data support is provided for the service systems according to the configured database; therefore, it becomes more important to invent an asset database configuration management method based on network monitoring;
through retrieval, the Chinese patent No. CN111159162A discloses a database configuration method and equipment, although the configuration efficiency and the accuracy of the database are improved and the stable operation of the database is ensured, the configuration of the database generally needs a configuration scheme manually set by a worker, the workload of the worker is increased, and the working enthusiasm and the working efficiency of the worker are reduced; in addition, the existing asset database configuration management method based on network monitoring interrupts configuration when an abnormal configuration process occurs, so that the configuration efficiency of workers is reduced, the workers need to spend a large amount of time to modify a configuration scheme, and the use experience of the workers is reduced; therefore, the asset database configuration management method based on network monitoring is provided.
Disclosure of Invention
The invention aims to solve the defects in the prior art and provides an asset database configuration management method based on network monitoring.
In order to achieve the purpose, the invention adopts the following technical scheme:
a asset database configuration management method based on network monitoring comprises the following specific steps:
(1) creating a user account, and carrying out identification analysis on the user identity: a user logs in a configuration management platform, a user account is created through the management platform, and the management platform collects basic information of the user and identifies and analyzes the identity of the user;
(2) and (3) carrying out configuration management on the asset database: the user selects and checks each item of data in the asset database through the management platform, and performs data management on each item of data through the management platform;
(3) detecting user operation in real time, and performing abnormal operation feedback: the network monitoring module collects user operation information in real time, detects and judges the user operation information, automatically generates an abnormal recording table and records the abnormal operation information of the user when the user logs in successfully;
(4) executing a configuration task, and carrying out data backup on data: the asset database receives a configuration task formulated by a user and takes the configuration task as candidate configuration, receives a configuration instruction issued by the user, performs configuration adjustment on various data according to the configuration task, and performs data backup on the adjustment data;
(5) monitoring the task execution flow in real time, and feeding back monitoring data: and the flow monitoring module collects the configuration task flow information in real time, analyzes and feeds back the collected flow information, records the abnormal flow information into the abnormal recording list and feeds back the abnormal recording list to the user.
Further, the specific steps of the identification and analysis in the step (1) are as follows:
the method comprises the following steps: the management platform receives the user information and detects whether the user information is missing or not, if so, the management platform feeds back the user that 'information is missing, please supplement', and if not, the management platform judges the user identity information;
step two: and if the user is a common user, the management platform jumps to the basic operation page, and if the user is an administrator, the management platform jumps to the configuration page.
Further, the specific steps of selecting and viewing in the step (2) are as follows:
the first step is as follows: a user inputs a data name X to be checked through a management platform, and the management platform converts the data name X into a calling instruction;
the second step is that: the asset database receives the calling instruction, judges the type of the data to be called, retrieves the corresponding data type and transmits the data type to the management platform;
the third step: the management platform receives the data transmitted by the asset database, converts the data into display data and feeds the display data back to the user, and meanwhile, the user selects the configuration requirement required by the user, and the management platform automatically generates a corresponding configuration scheme list and feeds the configuration scheme list back to the user.
Further, the detection and judgment in the step (3) specifically comprises the following steps:
i: the network monitoring module receives the user identity information and judges whether the user operation information is in the user authority range;
II: if the user operation exceeds the user authority requirement, the user operation is forbidden, and meanwhile, the popup window is popped out to feed back the user;
III: and if the user operation meets the user authority requirement, detecting whether the user operation meets the operation regulation, and if not, feeding back the user operation abnormity.
Further, the configuration adjustment in step (4) specifically includes the following steps:
s1: the asset database receives the configuration instruction and selects a corresponding configuration task from the task list according to the configuration instruction;
s2: and configuring the management asset list according to the configuration task, simultaneously performing configuration comparison on the management asset list, automatically generating a configuration record table, and simultaneously recording configuration time, configuration equipment, configuration personnel names, configuration operation information and configuration results into the configuration record table.
Further, the specific steps of analyzing and feeding back in the step (5) are as follows:
p1: detecting whether abnormal flow information exists in the execution process of the configuration task;
p2: if the task flow exists, the asset database adjusts and repairs the related task flow, and feeds back the adjustment information to the user for confirmation;
p3: and receiving the configuration record table, detecting various data in the configuration record table, feeding back the abnormal information to a user for confirmation if the abnormal information exists, and restoring the configuration information.
Compared with the prior art, the invention has the beneficial effects that:
1. according to the asset database configuration management method based on network monitoring, a user inputs a data name X required to be checked through a management platform, the management platform converts the data name X into a calling instruction, the asset database receives the calling instruction, judges the type of the data required to be called, simultaneously retrieves the corresponding type of the data and transmits the data to the management platform, the management platform receives the data transmitted by the asset database, converts the data into display data and feeds the display data back to the user, the user selects the configuration requirement required by the user, the management platform automatically generates a corresponding configuration scheme list and feeds the task list back to the user for selection, a configuration scheme does not need to be manually set by a worker, the workload of the worker can be reduced, and the working enthusiasm and the working efficiency of the worker are improved;
2. the asset database detects whether abnormal flow information exists in the execution process of a configuration task, if so, the asset database adjusts and repairs the related task flow and feeds back the adjustment information to a user for confirmation, the user confirms that the adjustment flow can be executed, the asset database is configured according to the adjustment flow, the configuration is completed, the asset database receives a configuration record table and detects various data in the configuration record table, if the abnormal information exists, the user confirmation is fed back, and the configuration information is restored at the same time, so that the configuration flow can be ensured to be normally performed, the configuration efficiency of workers is improved, the configuration scheme does not need to be modified by spending a large amount of time, and the use experience of the workers is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a flow chart of an asset database configuration management method based on network monitoring according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments.
In the description of the present invention, it is to be understood that the terms "upper", "lower", "front", "rear", "left", "right", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, are merely for convenience in describing the present invention and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention.
Example 1
Referring to fig. 1, a method for asset database configuration management based on network monitoring, this embodiment specifically discloses a method for selecting and viewing:
creating a user account, and carrying out identification analysis on the user identity: the user creates a user account through the management platform, and the management platform collects basic information of the user and identifies and analyzes the identity of the user.
Specifically, the user information is received through the management platform, whether the user information is lost or not is detected, if yes, the user is fed back to 'information loss and supplement', if not, the user identity information is judged, if the user is a common user, the management platform jumps to a basic operation page, if the user is an administrator, the management platform jumps to a configuration page, and corresponding management asset lists are respectively displayed for the user.
And (3) carrying out configuration management on the asset database: and the user selects and checks each item of data in the asset database through the management platform, and performs data management on each item of data through the management platform.
Specifically, a user inputs a data name X required to be checked through a management platform, the management platform converts the data name X into a call instruction, an asset database receives the call instruction, judges the type of the data required to be called, simultaneously retrieves the corresponding data type and transmits the data type to the management platform, the management platform receives the data transmitted by the asset database, converts the data into display data and feeds the display data back to the user, meanwhile, the user selects the self required configuration requirement, and the management platform automatically generates a corresponding configuration scheme list and feeds the corresponding configuration scheme list back to the user.
It should be further noted that the data category specifically includes historical configuration and configuration comparison information.
Detecting user operation in real time, and performing abnormal operation feedback: and when the user logs in successfully, the network monitoring module collects the user operation information in real time, detects and judges the user operation information, generates an abnormal record table by self, and records the abnormal operation information of the user.
Specifically, the network monitoring module receives user identity information and judges whether user operation information is in a user authority range, if the user operation exceeds a user authority requirement, the user operation is forbidden, meanwhile, a popup window is popped out to feed back a user, if the user operation meets the user authority requirement, whether the user operation meets an operation regulation is detected, and if not, the user operation is fed back to be abnormal;
in the embodiment, the management platform receives the data transmitted by the asset database, converts the data into the display data and feeds the display data back to the user, the user selects the configuration requirement required by the user, the management platform generates the corresponding configuration scheme list by self and feeds the task list back to the user for selection, and a worker does not need to manually set the configuration scheme, so that the workload of the worker can be reduced, and the working enthusiasm and the working efficiency of the worker are improved.
Example 2
Referring to fig. 1, the present embodiment discloses an analysis feedback method, except for the same structure as the above embodiments, in an asset database configuration management method based on network monitoring:
executing a configuration task, and carrying out data backup on data: the asset database receives a configuration task formulated by a user and takes the configuration task as candidate configuration, the asset database receives a configuration instruction issued by the user, performs configuration adjustment on various data according to the configuration task, and performs data backup on the adjustment data.
Specifically, the asset database receives the configuration instruction, selects a corresponding configuration task from the task list according to the configuration instruction, configures the management asset list according to the configuration task, updates the task list, sets the configuration task selected by the user as a default selection, simultaneously performs configuration comparison on the configuration task, automatically generates a configuration record table, and simultaneously records configuration time, configuration equipment, configuration personnel names, configuration operation information and configuration results into the configuration record table.
Monitoring the task execution flow in real time, and feeding back monitoring data: and the flow monitoring module collects the configuration task flow information in real time, analyzes and feeds back the collected flow information, records the abnormal flow information into the abnormal recording list and feeds back the abnormal recording list to the user.
The method comprises the steps that an asset database detects whether abnormal flow information exists in the execution process of a configuration task, if the abnormal flow information exists, the asset database adjusts and repairs related task flows and feeds the adjustment information back to a user for confirmation, the user confirms that the adjustment flow can be executed, the asset database is configured according to the adjustment flow and is configured completely, the asset database receives a configuration record table and detects various data in the configuration record table, if the abnormal information exists, the user confirms the feedback information, and meanwhile the configuration information is restored, so that the configuration flow can be guaranteed to be normally carried out, the configuration efficiency of workers is improved, a large amount of time is not needed for modifying a configuration scheme, and the use experience of the workers is improved.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (6)

1. A method for asset database configuration management based on network monitoring is characterized in that the method comprises the following steps:
(1) creating a user account, and carrying out identification analysis on the user identity: a user logs in a configuration management platform, a user account is created through the management platform, and the management platform collects basic information of the user and identifies and analyzes the identity of the user;
(2) and (3) carrying out configuration management on the asset database: the user selects and checks each item of data in the asset database through the management platform, and performs data management on each item of data through the management platform;
(3) detecting user operation in real time, and performing abnormal operation feedback: the network monitoring module collects user operation information in real time, detects and judges the user operation information, automatically generates an abnormal recording table and records the abnormal operation information of the user when the user logs in successfully;
(4) executing a configuration task, and carrying out data backup on data: the asset database receives a configuration task formulated by a user and takes the configuration task as candidate configuration, receives a configuration instruction issued by the user, performs configuration adjustment on various data according to the configuration task, and performs data backup on the adjustment data;
(5) monitoring the task execution flow in real time, and feeding back monitoring data: and the flow monitoring module collects the configuration task flow information in real time, analyzes and feeds back the collected flow information, records the abnormal flow information into the abnormal recording list and feeds back the abnormal recording list to the user.
2. The asset database configuration management method based on network monitoring according to claim 1, wherein the specific steps of the identification and analysis in step (1) are as follows:
the method comprises the following steps: the management platform receives the user information and detects whether the user information is missing or not, if so, the management platform feeds back the user that 'information is missing, please supplement', and if not, the management platform judges the user identity information;
step two: and if the user is a common user, the management platform jumps to the basic operation page, and if the user is an administrator, the management platform jumps to the configuration page.
3. The asset database configuration management method based on network monitoring as claimed in claim 1, wherein the specific steps of selecting and viewing in step (2) are as follows:
the first step is as follows: a user inputs a data name X to be checked through a management platform, and the management platform converts the data name X into a calling instruction;
the second step is that: the asset database receives the calling instruction, judges the type of the data to be called, retrieves the corresponding data type and transmits the data type to the management platform;
the third step: the management platform receives the data transmitted by the asset database, converts the data into display data and feeds the display data back to the user, and meanwhile, the user selects the configuration requirement required by the user, and the management platform automatically generates a corresponding configuration scheme list and feeds the configuration scheme list back to the user.
4. The asset database configuration management method based on network monitoring as claimed in claim 1, wherein the detection and judgment in step (3) specifically comprises the following steps:
i: the network monitoring module receives the user identity information and judges whether the user operation information is in the user authority range;
II: if the user operation exceeds the user authority requirement, the user operation is forbidden, and meanwhile, the popup window is popped out to feed back the user;
III: and if the user operation meets the user authority requirement, detecting whether the user operation meets the operation regulation, and if not, feeding back the user operation abnormity.
5. The asset database configuration management method based on network monitoring according to claim 1, wherein the configuration adjustment in step (4) specifically comprises the following steps:
s1: the asset database receives the configuration instruction and selects a corresponding configuration task from the task list according to the configuration instruction;
s2: and configuring the management asset list according to the configuration task, simultaneously performing configuration comparison on the management asset list, automatically generating a configuration record table, and simultaneously recording configuration time, configuration equipment, configuration personnel names, configuration operation information and configuration results into the configuration record table.
6. The asset database configuration management method based on network monitoring as claimed in claim 1, wherein the specific steps of analyzing and feeding back in step (5) are as follows:
p1: detecting whether abnormal flow information exists in the execution process of the configuration task;
p2: if the task flow exists, the asset database adjusts and repairs the related task flow, and feeds back the adjustment information to the user for confirmation;
p3: and receiving the configuration record table, detecting various data in the configuration record table, feeding back the abnormal information to a user for confirmation if the abnormal information exists, and restoring the configuration information.
CN202111222896.4A 2021-10-20 2021-10-20 Asset database configuration management method based on network monitoring Pending CN113868615A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111222896.4A CN113868615A (en) 2021-10-20 2021-10-20 Asset database configuration management method based on network monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111222896.4A CN113868615A (en) 2021-10-20 2021-10-20 Asset database configuration management method based on network monitoring

Publications (1)

Publication Number Publication Date
CN113868615A true CN113868615A (en) 2021-12-31

Family

ID=78996922

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111222896.4A Pending CN113868615A (en) 2021-10-20 2021-10-20 Asset database configuration management method based on network monitoring

Country Status (1)

Country Link
CN (1) CN113868615A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102980A (en) * 2022-06-06 2022-09-23 中国中电国际信息服务有限公司 Real estate asset data management method and device based on Internet of things and related medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115102980A (en) * 2022-06-06 2022-09-23 中国中电国际信息服务有限公司 Real estate asset data management method and device based on Internet of things and related medium

Similar Documents

Publication Publication Date Title
US10673683B2 (en) Data network notification bar processing system
CN101128812B (en) Message management facility for an industrial process control environment
US8255260B2 (en) System and method for filtering exceptions generated by forecasting and replenishment engine
US7620715B2 (en) Change event correlation
US6918059B1 (en) Method and system for handling errors in a distributed computer system
CN110278097B (en) Server operation and maintenance system and method based on Android system
US20010008999A1 (en) Method and system for tracking employee productivity in a client/server environment
US20110029548A1 (en) Methods and systems for data processing
US20060178921A1 (en) Project management system and method therefor
JP2011076161A (en) Incident management system
WO2021057383A1 (en) Log query method, apparatus, device, and computer-readable storage medium
CN112396397A (en) Operation and maintenance affair collection and management system
US20090083221A1 (en) System and Method for Estimating and Storing Skills for Reuse
CN108089915A (en) The method and system of business controlization processing based on message queue
US20120072589A1 (en) Information Processing Apparatus and Method of Operating the Same
US8090994B2 (en) System, method, and computer readable media for identifying a log file record in a log file
CN113868615A (en) Asset database configuration management method based on network monitoring
CN112052134A (en) Service data monitoring method and device
CN110738459A (en) quick fault reporting and automatic work order circulation system
CN109993468B (en) Picking task generation method and related equipment
US8693670B2 (en) Synchronization of data within an ACD system
CN113438248B (en) Network IP address self-checking management system convenient for master station
JP2011203801A (en) Problem information sharing system
CN112965793B (en) Identification analysis data-oriented data warehouse task scheduling method and system
CN112256489A (en) Data acquisition method and device of cloud development platform and data storage architecture

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination