CN114840387A - Micro-service monitoring method and device, computer equipment and storage medium - Google Patents

Micro-service monitoring method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN114840387A
CN114840387A CN202210508992.3A CN202210508992A CN114840387A CN 114840387 A CN114840387 A CN 114840387A CN 202210508992 A CN202210508992 A CN 202210508992A CN 114840387 A CN114840387 A CN 114840387A
Authority
CN
China
Prior art keywords
monitoring
service
user
preset
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210508992.3A
Other languages
Chinese (zh)
Inventor
张盛荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202210508992.3A priority Critical patent/CN114840387A/en
Publication of CN114840387A publication Critical patent/CN114840387A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Human Computer Interaction (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application relates to the technical field of artificial intelligence, and provides a micro-service monitoring method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: displaying the micro-service on a preset service management interface based on a preset container arrangement tool; receiving a monitoring instruction which is triggered by a user in a service management interface and corresponds to a target micro-service identifier; acquiring user information, handwriting of a user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library; if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction; and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score. By the method and the device, the monitoring efficiency and the monitoring intelligence of the micro service can be effectively improved. The method and the device can also be applied to the field of block chains, and the data such as the monitoring information can be stored on the block chains.

Description

Micro-service monitoring method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of artificial intelligence, in particular to a micro-service monitoring method, a device, computer equipment and a storage medium.
Background
With the development of micro-services, a large number of business units are extracted to form a single independent micro-service, which results in a large number of micro-service instances in a single project, and management, monitoring and operation and maintenance of the micro-service become bottlenecks on the development path of projects of small and medium-sized companies. At present, the monitoring management of the micro-service is realized by depending on a monitoring mode that a system administrator manually maintains the micro-service at a server side, the monitoring mode needs to consume more time and labor cost, the monitoring efficiency is low, the intelligence of the micro-service monitoring is low, and the user experience is reduced.
Disclosure of Invention
The application mainly aims to provide a micro-service monitoring method, a micro-service monitoring device, a computer device and a storage medium, and aims to solve the technical problems that the existing micro-service monitoring mode needs to consume more time and labor cost, and has low monitoring efficiency and low monitoring intelligence.
The application provides a micro-service monitoring method, which comprises the following steps:
displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier; wherein the monitoring instruction carries user information;
acquiring the user information, handwriting of the user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library;
if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction;
and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score.
Optionally, the step of displaying the micro-service on a preset service management interface based on a preset container arrangement tool includes:
initiating the container orchestration tool;
after the container arrangement tool is successfully started, acquiring a configuration file in the container arrangement tool;
calling a preset management tool in the configuration file;
and displaying the micro service in the service management interface corresponding to the preset management tool based on the preset management tool.
Optionally, the step of obtaining the user information, the handwriting of the user, and the fingerprint image of the user, and performing identity verification on the user based on a preset answer handwriting and a preset fingerprint model library includes:
acquiring the user information and acquiring an identity authentication problem corresponding to the user information;
displaying the identity verification question and preset answer reminding information to remind the user to answer the verification question through the answer reminding information;
acquiring an answer script input by the user at a preset position, and judging whether the content corresponding to the answer script is the same as the content of a standard answer of the verification question;
if the answer handwriting is the same as the verification question, extracting first handwriting characteristic data of the answer handwriting, and extracting second handwriting characteristic data of preset answer handwriting corresponding to the verification question;
judging whether the first handwriting characteristic data is matched with the second handwriting characteristic data;
if so, acquiring fingerprint images of a plurality of preset angles corresponding to the target finger of the user, and creating a corresponding first 3D fingerprint model based on all the fingerprint images;
screening a second 3D fingerprint model corresponding to the user information from a preset 3D fingerprint model library, and screening a third 3D fingerprint model corresponding to the target finger from the second 3D fingerprint model;
extracting first model features of the first 3D fingerprint model and extracting second model features of the third 3D fingerprint model;
calculating a similarity value between the first model characteristic and the second model characteristic, and judging whether the similarity value is greater than a preset similarity threshold value;
and if the similarity is larger than the similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
Optionally, the step of obtaining monitoring information of the target micro service corresponding to the target micro service identifier based on the monitoring instruction includes:
calling a pre-stored mapping relation table;
inquiring the target micro service corresponding to the target micro service identification based on the mapping relation table;
and monitoring the running information of the target micro service based on the monitoring instruction to obtain the monitoring information of the target micro service.
Optionally, the step of determining an authority score of the user based on the user information and presenting the monitoring information in the service management interface based on the authority score includes:
calling a preset user authority score table, and inquiring an authority score corresponding to the user information from the user authority score table;
judging whether the authority score is in a preset authority score interval or not;
if the authority score interval is within the authority score interval, displaying the monitoring information in a target area of the service management interface;
if the monitoring information is not in the permission score interval, performing data desensitization treatment on the monitoring information to obtain desensitized monitoring information;
and displaying the monitoring information after desensitization in a target area of the service management interface.
Optionally, the step of performing data desensitization processing on the monitoring information to obtain desensitized monitoring information includes:
acquiring a preset sensitive index data table; the sensitive index data table stores a plurality of sensitive indexes and grade identifications respectively corresponding to the sensitive indexes; the grade marks comprise a first grade mark, a second grade mark and a third grade mark;
acquiring monitoring indexes respectively corresponding to the monitoring information;
matching each monitoring index with all sensitive indexes contained in a sensitive index data table respectively, and screening out the index to be desensitized from all the monitoring indexes according to the obtained matching result;
determining target grade identifications respectively corresponding to the indexes to be desensitized based on the sensitive index data table;
determining desensitization rules respectively corresponding to the indexes to be desensitized based on the target grade identification;
and performing one-to-one desensitization treatment on the monitoring index parameters related to the indexes to be desensitized based on the desensitization rules to obtain desensitized monitoring information.
Optionally, the step of determining desensitization rules respectively corresponding to the to-be-desensitized indexes based on the target level identifiers includes:
acquiring an appointed grade identification corresponding to an appointed index to be desensitized; the specified index to be desensitized is any one of all indexes to be desensitized;
if the specified grade identification is the first grade identification, generating a first desensitization rule corresponding to the specified index to be desensitized based on the first grade identification; the first desensitization rule is used for performing data desensitization processing on the monitoring index parameter corresponding to the specified index to be desensitized by adopting a preset encryption mode;
if the specified grade identification is the second grade identification, generating a second desensitization rule corresponding to the specified to-be-desensitized index based on the second grade identification; the second desensitization rule is used for performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized index in a fuzzy mode;
if the designated grade identification is the third grade identification, generating a third desensitization rule corresponding to the designated index to be desensitized based on the third grade identification; and performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized indexes by adopting an alternative mode according to the third desensitization rule.
The present application further provides a micro-service monitoring device, including:
the first display module is used for displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
the receiving module is used for receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to the target micro-service identifier; wherein the monitoring instruction carries user information;
the verification module is used for acquiring the user information, the handwriting of the user and the fingerprint image of the user and verifying the identity of the user based on a preset answer handwriting and a preset fingerprint model library;
the acquisition module is used for acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction if the identity authentication passes;
and the display module is used for determining the authority score of the user based on the user information and displaying the monitoring information in the service management interface based on the authority score.
The present application further provides a computer device, comprising a memory and a processor, wherein the memory stores a computer program, and the processor implements the steps of the above method when executing the computer program.
The present application also provides a computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the above-mentioned method.
The micro-service monitoring method, the micro-service monitoring device, the computer equipment and the storage medium have the following beneficial effects:
according to the micro-service monitoring method, the micro-service monitoring device, the computer equipment and the storage medium, the micro-service is displayed on a preset service management interface based on a preset container arrangement tool, then a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier is received, then user information is obtained, identity verification is conducted on the user, if the identity verification is passed, monitoring information of the target micro-service corresponding to the target micro-service identifier is obtained based on the monitoring instruction, finally the authority score of the user is determined based on the user information, and the monitoring information is displayed in the service management interface based on the authority score. The monitoring management of the micro-service is carried out by combining the container arrangement tool and the service management interface, so that the monitoring of the micro-service is rapidly and conveniently realized, the operation is simple and flexible, the monitoring efficiency and the monitoring intelligence of the micro-service are effectively improved, and the use experience of a user is improved.
Drawings
Fig. 1 is a schematic flowchart of a micro-service monitoring method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a microservice monitoring apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It will be understood by those skilled in the art that, unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The embodiment of the application can acquire and process related data based on an artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
Referring to fig. 1, a micro-service monitoring method according to an embodiment of the present application includes:
s10: displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
s20: receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier; wherein the monitoring instruction carries user information;
s30: acquiring the user information, handwriting of the user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library;
s40: if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction;
s50: and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score.
As described in the above steps S10 to S50, the main implementation of the embodiment of the method is a microservice monitoring apparatus. In practical applications, the micro-service monitoring apparatus may be implemented by a virtual apparatus, such as a software code, or by an entity apparatus written or integrated with a relevant execution code, and may perform human-computer interaction with a user through a keyboard, a mouse, a remote controller, a touch panel, or a voice control device. The micro-service monitoring device in the embodiment can monitor and manage micro-services by combining the container arrangement tool and the service management interface, thereby effectively improving the monitoring efficiency and monitoring intelligence of the micro-services and improving the use experience of users. Specifically, the micro-service is first displayed on a preset service management interface based on a preset container arrangement tool. Among other things, the container orchestration tool may provide techniques for scheduling and clustering, providing a basic mechanism for container-based application extensibility. The container orchestration tool may use the container services and orchestrate the containers to determine how interactions between the containers occur, and may include any of a number of types, dockersarm, kubernets, dockercompose, and the like. In addition, for the specific implementation process of the preset-based container arrangement tool to display the micro-service on the preset service management interface, the application will further describe the details in the following specific embodiments, which are not set forth herein too much.
And then receiving a monitoring instruction which is triggered by the user in the service management interface and corresponds to the target micro-service identifier. The target service identifier refers to an identifier corresponding to the target micro service. An information monitoring button corresponding to the target micro-service identifier is preset in the service management interface, and when a user clicks the information monitoring button in the service management interface, a corresponding control instruction, namely the monitoring instruction, can be triggered and generated. In addition, the target micro service refers to a micro service operated by a user, for example, the micro service includes a service a, a service b, and a service c, and when the user operates the service c, if the monitoring information of the service c is acquired, the service c is taken as the target micro service. In addition, the monitoring instruction can also carry user information. And a user information input box is also arranged at the corresponding position of the information monitoring button so that a user can input corresponding user information in the user information input box, wherein the user information can comprise information such as a user name or a user id. And then acquiring the user information, the handwriting of the user and the fingerprint image of the user, and performing identity verification on the user based on a preset answer handwriting and a preset fingerprint model library. In the present application, for a specific implementation process of performing identity verification on the user based on a preset answer handwriting and a preset fingerprint model library, further details of the implementation process will be described in subsequent specific embodiments, which are not set forth herein.
And if the identity authentication is passed subsequently, acquiring the monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction. The target micro service corresponding to the target micro service identifier can be inquired by calling a pre-stored mapping relation table, and then the operation information of the target micro service is monitored based on the monitoring instruction, so that the monitoring information of the target micro service is obtained. In addition, the monitoring information refers to index parameter information corresponding to a preset monitoring index, and the format of the monitoring information includes: monitoring index + monitoring index parameter. The monitoring index may be set according to actual usage requirements, and may include, for example, a call amount, an error amount, a timeout rate, and the like. And finally, determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score. And inquiring the authority score of the user corresponding to the user information based on a preset user authority score table. In addition, the acquired monitoring information can be displayed in a target area of the service management interface, so that the monitoring information of the target micro service can be visually displayed for a user. The target area refers to an area where the user shows various information of the target microservice, such as monitoring information, log information, and the like. In addition, for the implementation process of showing the monitoring information in the service management interface based on the authority score, the application will further describe the details in the following embodiments, which are not set forth herein too much.
In this embodiment, a micro service is displayed on a preset service management interface based on a preset container arrangement tool, then a monitoring instruction corresponding to a target micro service identifier triggered by a user in the service management interface is received, then the user information is obtained and the user is authenticated, if the authentication passes, the monitoring information of the target micro service corresponding to the target micro service identifier is obtained based on the monitoring instruction, finally, an authority score of the user is determined based on the user information, and the monitoring information is displayed in the service management interface based on the authority score. The embodiment monitors and manages the micro-service by combining the container arrangement tool and the service management interface, so that the micro-service is quickly and conveniently monitored, the operation is simple and flexible, the monitoring efficiency and the monitoring intelligence of the micro-service are effectively improved, and the use experience of a user is improved. In addition, when a monitoring instruction corresponding to the target micro-service identifier triggered by the user in the service management interface is received, multiple identity verifications related to the preset answer handwriting and the preset fingerprint model library are also carried out on the user, and only after the user passes the identity verification, the monitoring instruction triggered by the user and used for the target micro-service is positively responded, so that adverse consequences caused by responding to the monitoring instruction triggered by an illegal user can be effectively avoided, the leakage of important monitoring information is avoided, and the processing normalization and the safety in the processing process of the monitoring instruction are ensured.
Further, in an embodiment of the present application, the step S10 includes:
s100: initiating the container orchestration tool;
s101: after the container arrangement tool is successfully started, acquiring a configuration file in the container arrangement tool;
s102: calling a preset management tool in the configuration file;
s103: and displaying the micro service in the service management interface corresponding to the preset management tool based on the preset management tool.
As described in the foregoing steps S100 to S103, the step of displaying the micro-service on the preset service management interface based on the preset container arrangement tool may specifically include: the container arrangement tool is first started. Wherein the container organization tool is preferably a docker composition. A docker composition is a docker application that a user defines and runs multiple containers. Micro services required to be managed can be stored in the docker in advance, and a docker composition corresponding to the docker can be created. And then acquiring a configuration file in the container arrangement tool after the container arrangement tool is successfully started. After the container organization tool docker composition is started, a configuration file corresponding to the docker composition can be established. And subsequently calling a preset management tool in the configuration file. The preset management tool may be a graphical management tool, and the graphical management tool refers to an environment for managing the application container engine, and may be composed of any container that can run on the application container engine. In the present embodiment, the graphical management tool is preferably a portal. The portal is a graphical management tool of docker, and provides functions of centralized management and operation such as a state display panel, rapid deployment of application templates, basic operations (including operations of uploading and downloading images, creating containers and the like) of container image network data volumes, event log display, container console operation and service and the like, and login user management and control. Yml, after the configuration file is established, namely the docker element file, the portlet can be embedded in the configuration file, so that the portlet and the docker component can be combined, a service management interface can be displayed after the docker element is started, and monitoring information and the like of each micro service can be displayed in the service management interface. And finally, displaying the micro service in the service management interface corresponding to the preset management tool based on the preset management tool. Wherein the micro-service refers to all micro-services in the application container engine. Microservice is an emerging software architecture that refers to the splitting of a large single application and service into tens of supported microservices. A microservice policy can make work easier by extending individual components rather than the entire application stack to meet service level agreements. The application container engine refers to an engine that can be used by a developer to package an application and rely on a package to a container, and in this embodiment, the application container engine may specifically be a docker container, which is an open-source application container engine. Specifically, after a container orchestration tool docker component is started, a configuration file corresponding to the docker component is established, a graphical management tool portal is built in the configuration file, and micro services in the application container engine docker are displayed on a management interface corresponding to the graphical management tool through the portal, so that the micro services in the docker are monitored and managed in a visual interface. In the embodiment, the monitoring management of the micro-services is carried out by combining the container arrangement tool and the graphical management tool, so that the monitoring of the micro-services can be quickly and conveniently realized through the service management interface, the operation is simple and flexible, the monitoring efficiency and the monitoring intelligence of the micro-services are effectively improved, and the use experience of a user is improved.
Further, in an embodiment of the present application, the step S30 includes:
s300: acquiring the user information and acquiring an identity authentication problem corresponding to the user information;
s301: displaying the identity verification question and preset answer reminding information to remind the user to answer the verification question through the answer reminding information;
s302: acquiring an answer script input by the user at a preset position, and judging whether the content corresponding to the answer script is the same as the content of a standard answer of the verification question;
s303: if the answer handwriting is the same as the verification question, extracting first handwriting characteristic data of the answer handwriting, and extracting second handwriting characteristic data of preset answer handwriting corresponding to the verification question;
s304: judging whether the first handwriting characteristic data is matched with the second handwriting characteristic data;
s305: if so, acquiring fingerprint images of a plurality of preset angles corresponding to the target finger of the user, and creating a corresponding first 3D fingerprint model based on all the fingerprint images;
s306: screening a second 3D fingerprint model corresponding to the user information from a preset 3D fingerprint model library, and screening a third 3D fingerprint model corresponding to the target finger from the second 3D fingerprint model;
s307: extracting first model features of the first 3D fingerprint model and extracting second model features of the third 3D fingerprint model;
s308: calculating a similarity value between the first model characteristic and the second model characteristic, and judging whether the similarity value is greater than a preset similarity threshold value;
s309: and if the similarity is larger than the similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
As described in the foregoing steps S300 to S309, the step of obtaining the user information, the handwriting of the user, and the fingerprint image of the user, and performing identity verification on the user based on a preset answer handwriting and a preset fingerprint model library may specifically include: firstly, the user information is obtained, and an authentication problem corresponding to the user information is obtained. The identity authentication problem corresponding to the user information can be acquired from a preset problem database. The problem database is a pre-created database in which authentication problems corresponding to the user information of each legal user one by one are stored, and the stored authentication problems are used for asking questions of the user to realize authentication processing of the user. And then displaying the authentication question and preset answer reminding information so as to remind the user to answer the authentication question through the answer reminding information. The content of the answer reminding information is not particularly limited, and may be set according to actual requirements, for example, "please answer the displayed question by handwriting, thank you". And then, acquiring the answer handwriting input by the user at a preset position, and judging whether the content corresponding to the answer handwriting is the same as the content of the standard answer of the verification question. The preset position can be a position corresponding to the handwriting input device, and a user can write a feedback answer corresponding to the authentication question on the handwriting input device of the device, for example, a touch screen of the device, so that the device can acquire an answer script corresponding to the feedback answer. In addition, it may be determined whether the content corresponding to the handwriting of the answer is the same as the content of the standard answer to the authentication question by using a handwriting OCR (Optical Character Recognition) Recognition technique, that is, the content corresponding to the handwriting of the answer is recognized first according to the handwriting OCR Recognition technique, and then it is determined whether the recognized content is the same as the content of the standard answer to the authentication question. And if the answer handwriting is the same, extracting first handwriting characteristic data of the answer handwriting, and extracting second handwriting characteristic data of preset answer handwriting corresponding to the verification question. And judging whether the first handwriting characteristic data is matched with the second handwriting characteristic data. And if any one of the condition that the content corresponding to the handwriting of the answer is not consistent with the content of the standard answer of the authentication question or the condition that the first handwriting characteristic data is not matched with the second handwriting characteristic data exists, judging that the authentication of the user fails. And preliminarily judging that the identity of the user passes the authentication only if the content corresponding to the handwriting of the answer is the same as the content of the standard answer of the authentication question and the first handwriting characteristic data is matched with the second handwriting characteristic data. And if so, acquiring fingerprint images of a plurality of preset angles corresponding to the target finger of the user, and creating a corresponding first 3D fingerprint model based on all the fingerprint images. The fingerprint images of a plurality of preset angles corresponding to the target finger of the user can be collected through the camera. The target finger is not limited, and can be set according to actual requirements, such as a left index finger, a right thumb, and the like. In addition, after the fingerprint images within the collection range are collected through the camera, the device can analyze and process the obtained fingerprint images so as to screen out the fingerprint images at the preset angle. After the fingerprint image is collected through the camera, the angle between the finger and the camera can be determined according to the obtained fingerprint image, namely, after the fingerprint image is collected, the device can analyze and process the fingerprint image, and the required result is the angle between the target finger and the camera. It is understood that the preset angle is not particularly limited, and may be set according to actual requirements. Furthermore, the process of creating a corresponding first 3D fingerprint model based on all of said fingerprint images may comprise: and carrying out impurity removal treatment and digital treatment on the obtained fingerprint image, wherein the impurity removal treatment can comprise removing environmental factors, light source factors and the like except the finger fingerprint in the fingerprint image, and then establishing a first 3D fingerprint model corresponding to the processed fingerprint image by utilizing a 3D modeling technology. And subsequently, screening a second 3D fingerprint model corresponding to the user information from a preset 3D fingerprint model library, and screening a third 3D fingerprint model corresponding to the target finger from the second 3D fingerprint model. After the first 3D fingerprint model corresponding to the target finger of the user is obtained, the third 3D fingerprint model corresponding to the user information and the target finger is screened out from the pre-stored 3D fingerprint model library intelligently, and then similarity calculation of the characteristics between the first 3D fingerprint model and the third 3D fingerprint model is only needed, and feature similarity calculation of the first 3D fingerprint model and all the pre-stored 3D fingerprint models is not needed, so that data calculation amount is greatly reduced, device loss is reduced, and device data processing intelligence is improved. And extracting first model features of the first 3D fingerprint model and extracting second model features of the third 3D fingerprint model. And finally, calculating a similarity value between the first model characteristic and the second model characteristic, and judging whether the similarity value is greater than a preset similarity threshold value. Wherein, a similarity calculation method, such as hamming distance, cosine theorem and other algorithms, can be adopted to calculate the similarity value between the first model characteristic and the second model characteristic. In addition, the specific value of the similarity threshold is not limited, and may be set according to actual requirements, for example, may be set to 0.95. And if the similarity is larger than the similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed. In the embodiment, the accuracy of the identity verification is effectively improved by performing problem verification, handwriting verification and multiple identity verification of a fingerprint model on the user. And only after the user passes the identity verification, the user can carry out forward response on the monitoring instruction input by the user and used for the target micro-service, so that adverse consequences caused by the fact that the monitoring instruction triggered by an illegal user is responded can be effectively avoided, the leakage of important monitoring information is avoided, and the processing normalization and the safety in the processing process of the monitoring instruction are ensured.
Further, for a legal user, the fingerprint images of a plurality of preset angles of any one or more fingers of the legal user can be sequentially acquired, the 3D fingerprint model of the finger is built and stored according to the fingerprint images, and the step is operated once or repeatedly operated for a plurality of times until all the 3D fingerprint models of the fingers needing to be pre-stored are built and stored. In the process of establishing a 3D model of a finger, fingerprint images of a plurality of preset angles of the finger need to be acquired in sequence, and when all the fingerprint images required by modeling are acquired, the fingerprint images are used for modeling; after the modeling is finished, an input cycle can be continued, namely a new finger is input, the input cycle is repeated for many times, a plurality of fingers can be input, 3D fingerprint models of a plurality of fingerprints are stored in the device after the input, and all the generated 3D fingerprint models can be stored in the 3D fingerprint model library.
Further, in an embodiment of the present application, the step S40 includes:
s400: calling a pre-stored mapping relation table;
s401: inquiring the target micro service corresponding to the target micro service identification based on the mapping relation table;
s402: and monitoring the running information of the target micro service based on the monitoring instruction to obtain the monitoring information of the target micro service.
As described in the foregoing steps S400 to S402, the step of obtaining the monitoring information of the target micro service corresponding to the target micro service identifier based on the monitoring instruction may specifically include: first, a pre-stored mapping relation table is called. The mapping relation table is a data table used for storing the mapping relation between the micro-service identification of the micro-service and each micro-service. After the container arrangement tool is created and generated, the mapping relation table can be established while the configuration file corresponding to the container arrangement tool is established. And then adding the mapping relation between the micro service and the service identifier in the mapping relation table, and storing the mapping relation table after the information is added into a corresponding database. And then inquiring the target micro service corresponding to the target micro service identification based on the mapping relation table. The micro-service identification is an identification corresponding to the micro-service on the management interface. The micro service identifier refers to an identifier displayed on the service management interface by each micro service, and each micro service corresponds to a unique identifier, for example, the micro service includes a, b, and c, the identifier corresponding to the service a is 1, the identifier corresponding to the service b is 2, the identifier corresponding to the service c is 3, and the like. And finally, monitoring the running information of the target micro service based on the monitoring instruction to obtain the monitoring information of the target micro service. The mapping relation between the micro-service and the micro-service identifier is added in the mapping relation table, so that when a user monitors information of one micro-service identifier, the micro-service corresponding to the micro-service identifier controlled by the user can be searched according to the mapping relation between the micro-service identifier and the micro-service, and the monitoring information related to the micro-service is acquired. Specifically, after receiving a monitoring instruction corresponding to the target micro service triggered by the user, the device may monitor a monitoring index of the target micro service, so as to obtain monitoring information of the target micro service. In the embodiment, the target micro service corresponding to the target micro service identifier is quickly inquired based on the preset mapping relation table, and then the running information of the target micro service can be monitored based on the monitoring instruction to obtain the monitoring information of the target micro service, so that the monitoring information of the micro service can be conveniently and quickly displayed through a service management interface in the follow-up process, the monitoring management of the micro service is completed, the operation is simple and flexible, the monitoring efficiency and the monitoring intelligence of the micro service are effectively improved, and the use experience of a user is improved.
Further, in an embodiment of the present application, the step S50 includes:
s500: calling a preset user authority score table, and inquiring an authority score corresponding to the user information from the user authority score table;
s501: judging whether the authority score is within a preset authority score interval or not;
s502: if the authority score interval is within the authority score interval, displaying the monitoring information in a target area of the service management interface;
s503: if the monitoring information is not in the permission score interval, performing data desensitization treatment on the monitoring information to obtain desensitized monitoring information;
s504: and displaying the monitoring information after desensitization in a target area of the service management interface.
As described in the foregoing steps S500 to S504, the step of determining the authority score of the user based on the user information and displaying the monitoring information in the service management interface based on the authority score may specifically include: firstly, a preset user authority score table is called, and an authority score corresponding to the user information is inquired from the user authority score table. The user authority score table is pre-generated and stores user information of legal users and authority scores corresponding to the user information of each legal user. And then judging whether the authority score is in a preset authority score interval. The permission score interval is a score range interval used for judging whether the current user has the monitoring information which is completely checked. If the authority score of the user is in the authority score interval, the user is indicated to have the authority for viewing the complete monitoring information, and if the authority score of the user is not in the authority score interval, the user is indicated to not have the authority for viewing the complete monitoring information, and at the moment, the acquired monitoring information of the target micro service is intelligently subjected to data desensitization treatment and then displayed to the user. In addition, the value of the permission score interval is not limited and can be set according to actual requirements. And if the authority score interval is within the authority score interval, displaying the monitoring information in a target area of the service management interface. The target area is an area for displaying various monitoring information of the target micro service, and the specific position of the target area can be set according to actual requirements. The acquired monitoring information is displayed in the target area of the service management interface, so that the monitoring information of the target micro service can be visually displayed for a user, and the user experience can be improved. And if the monitoring information is not in the permission score interval, performing data desensitization treatment on the monitoring information to obtain desensitized monitoring information. The specific implementation process of performing data desensitization processing on the monitoring information to obtain desensitized monitoring information will be described in further detail in the following specific embodiments, and will not be elaborated herein. And displaying the desensitized monitoring information in a target area of the service management interface. In the embodiment, before the process of displaying the monitoring information of the target micro service, the authority score of the user is acquired first, the data display mode corresponding to the user is determined according to the authority score, the monitoring information can be directly and completely displayed to the user only when the authority score of the user is in the preset authority score interval, and if the authority score of the user is not in the preset authority score interval, the monitoring information can be intelligently desensitized first and then displayed to the user, so that the important monitoring index information is prevented from being leaked to the user who does not have the authority to view the important monitoring index information, and the viewing accuracy and the viewing intelligence of the monitoring information are effectively improved.
Further, in an embodiment of the present application, the step S503 includes:
s5030: acquiring a preset sensitive index data table; the sensitive index data table is internally stored with a plurality of sensitive indexes and grade identifications respectively corresponding to the sensitive indexes; the grade marks comprise a first grade mark, a second grade mark and a third grade mark;
s5031: acquiring monitoring indexes respectively corresponding to the monitoring information;
s5032: matching each monitoring index with all sensitive indexes contained in a sensitive index data table respectively, and screening out the index to be desensitized from all the monitoring indexes according to the obtained matching result;
s5033: determining target grade identifications respectively corresponding to the indexes to be desensitized based on the sensitive index data table;
s5034: determining desensitization rules respectively corresponding to the indexes to be desensitized based on the target grade identification;
s5035: and performing one-to-one desensitization treatment on the monitoring index parameters related to the indexes to be desensitized based on the desensitization rules to obtain desensitized monitoring information.
As described in the foregoing steps S5030 to S5035, the step of performing data desensitization processing on the monitoring information to obtain desensitized monitoring information may specifically include:
firstly, a preset sensitive index data table is obtained. The sensitive index data table stores a plurality of sensitive indexes and grade identifications respectively corresponding to the sensitive indexes. The grade marks comprise a first grade mark, a second grade mark and a third grade mark. In addition, the sensitive index data table is generated according to a sensitive index input by a relevant user, the sensitive index is a monitoring index corresponding to monitoring information with a high sensitivity, and when the monitoring information of the target micro service is subsequently displayed to a user without looking up the complete data content of the monitoring information, data desensitization processing needs to be performed on specified monitoring information corresponding to the sensitive index in the monitoring information of the target micro service. And acquiring monitoring indexes corresponding to the monitoring information respectively. The information form of the monitoring information is monitoring index + monitoring index parameter. And then matching each monitoring index with all sensitive indexes contained in a sensitive index data table, and screening out the index to be desensitized from all the monitoring indexes according to the obtained matching result. Wherein, the screening process of the index to be desensitized can comprise the following steps: matching the monitoring indexes respectively corresponding to the monitoring information with all sensitive indexes contained in a sensitive index data table, and judging whether target indexes identical to the specified monitoring indexes exist in the sensitive indexes; the specified monitoring index is any one of all the monitoring indexes; if the target index exists in the sensitive indexes, the specified monitoring index is marked as an index to be desensitized, and the index to be desensitized is extracted. In addition, the matching processing between the designated monitoring index and all the sensitive indexes can be performed based on a preset parallel comparison instruction, and the parallel comparison instruction can be a single instruction stream multiple data (SIMD) instruction. By utilizing the parallel computing capability of the parallel comparison instruction to simultaneously carry out data matching processing on the specified monitoring index and each sensitive index in all the sensitive indexes, the comparison processing speed between each specified monitoring index and each sensitive index is effectively improved, and the acquisition speed of the index to be desensitized is improved. And then determining target grade identifications respectively corresponding to the indexes to be desensitized based on the sensitive index data table. And then determining desensitization rules respectively corresponding to the indexes to be desensitized based on the target grade identification. In the present application, for the specific implementation process of determining the desensitization rule corresponding to each index to be desensitized based on the target level identifier, further details will be described in subsequent specific embodiments, which are not set forth herein. And finally, performing one-to-one desensitization treatment on the monitoring index parameters related to the indexes to be desensitized based on the desensitization rules to obtain the desensitized monitoring information. In the embodiment, the monitoring information is displayed to a user after performing data desensitization processing on the monitoring information intelligently when the authority score of the user is judged not to be in a preset authority score range, so as to avoid the leakage of important monitoring index information to the user without the authority for viewing the important monitoring index information, the checking accuracy and the checking intelligence of the monitoring information are effectively improved. In addition, because only the monitoring index parameter corresponding to the index to be desensitized in the monitoring information is desensitized, and all the monitoring information is not desensitized, unnecessary consumption generated in data processing is effectively reduced, and the intelligence of data desensitization is improved.
Further, the generating process of the sensitive index data table may include: firstly, a plurality of sensitive indexes which are input in advance and sensitive degree description information which corresponds to each sensitive index are received. The sensitive index can be set according to actual requirements, for example, if the information with higher sensitivity degree is that the timeout rate exists, the corresponding sensitive index can be the timeout rate index. In addition, the sensitivity degree description information is used for referring to the sensitivity degree of the sensitivity index, and the user can input corresponding sensitivity degree description information for each sensitivity index according to actual experience, wherein the sensitivity degree description information can comprise high sensitivity, medium sensitivity and low sensitivity, for example. And then generating grade identifications corresponding to the sensitivity indexes one by one based on the sensitivity degree description information. The grade marks comprise a first grade mark, a second grade mark and a third grade mark. The grade marks are generated according to the sensitivity degree description information and used for marking the sensitivity grade of the sensitivity index, corresponding first grade marks are generated for the sensitivity index with high sensitivity, corresponding second grade marks are generated for the sensitivity index with high sensitivity, and corresponding third grade marks are generated for the sensitivity index with low sensitivity. And then establishing a mapping relation between the sensitive indexes and the grade identifications and storing the mapping relation in a preset data table to obtain the sensitive index data table. Additionally, the sensitive index data table may be stored within a blockchain. The block chain is used for storing and managing the sensitive index data table, so that the safety and the non-tamper property of the sensitive index data table can be effectively ensured. The sensitive index data table is obtained by establishing the corresponding relation between the sensitive index and the grade identification and storing the corresponding relation in a preset data table, so that the sensitive index data table is beneficial to quickly screening out the index to be desensitized from the monitoring indexes corresponding to the monitoring information in the follow-up process.
Further, in an embodiment of the application, the step S5034 includes:
s50340: acquiring an appointed grade identification corresponding to an appointed index to be desensitized; the specified index to be desensitized is any one of all indexes to be desensitized;
s50341: if the specified grade identification is the first grade identification, generating a first desensitization rule corresponding to the specified index to be desensitized based on the first grade identification; the first desensitization rule is used for performing data desensitization processing on the monitoring index parameter corresponding to the specified index to be desensitized by adopting a preset encryption mode;
s50342: if the specified grade identification is the second grade identification, generating a second desensitization rule corresponding to the specified to-be-desensitized index based on the second grade identification; the second desensitization rule is used for performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized index in a fuzzy mode;
s50343: if the designated grade identification is the third grade identification, generating a third desensitization rule corresponding to the designated index to be desensitized based on the third grade identification; and performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized indexes by adopting an alternative mode according to the third desensitization rule.
As described in the foregoing steps S50340 to S50343, the step of determining, based on the target level identifier, a desensitization rule corresponding to each index to be desensitized may specifically include: firstly, acquiring a designated grade mark corresponding to a designated index to be desensitized. The specified index to be desensitized is any one of all indexes to be desensitized. And if the specified grade identification is the first grade identification, generating a first desensitization rule corresponding to the specified to-be-desensitized index based on the first grade identification. And the higher the grade of the grade mark, the desensitization mode with higher safety is adopted to perform data desensitization treatment correspondingly. And the first desensitization rule is used for performing data desensitization processing on the monitoring index parameter corresponding to the specified index to be desensitized by adopting a preset encryption mode. In addition, the preset encryption manner is not particularly limited, and may include a hash encryption algorithm, an asymmetric encryption algorithm, and the like. And if the specified grade identification is the second grade identification, generating a second desensitization rule corresponding to the specified to-be-desensitized index based on the second grade identification. And the second desensitization rule is used for performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized index in a fuzzy mode. Additionally, the obfuscation manner may include a manner of processing sensitive data into an obscured state that is not readily viewable. And if the specified grade identification is the third grade identification, generating a third desensitization rule corresponding to the specified index to be desensitized based on the third grade identification. And performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized indexes by adopting an alternative mode according to the third desensitization rule. In addition, the replacement mode can comprise a preset character replacement mode, a random character replacement mode and the like. In this embodiment, for the to-be-desensitized indexes in the screened monitoring indexes, mutually-adapted desensitization rules are allocated to different sensitive indexes according to the level identifiers corresponding to the to-be-desensitized indexes, so as to achieve reasonability of desensitization rule configuration, which is beneficial to subsequently performing data desensitization processing on the monitoring index parameters corresponding to the to-be-desensitized indexes respectively based on the generated desensitization rules to obtain desensitized monitoring information, and thus, data normalization and accuracy of the generated desensitized monitoring information are ensured.
The micro-service monitoring method in the embodiment of the application can also be applied to the field of block chains, for example, data such as the monitoring information is stored on the block chain. By using the block chain to store and manage the monitoring information, the security and the non-tamper property of the monitoring information can be effectively ensured.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
Referring to fig. 2, an embodiment of the present application further provides a micro service monitoring apparatus, including:
the system comprises a first display module 1, a second display module and a third display module, wherein the first display module is used for displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
the receiving module 2 is used for receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to the target micro-service identifier; wherein the monitoring instruction carries user information;
the verification module 3 is used for acquiring the user information, the handwriting of the user and the fingerprint image of the user and verifying the identity of the user based on a preset answer handwriting and a preset fingerprint model library;
the obtaining module 4 is configured to obtain monitoring information of the target micro service corresponding to the target micro service identifier based on the monitoring instruction if the identity authentication passes;
and the second display module 5 is configured to determine an authority score of the user based on the user information, and display the monitoring information in the service management interface based on the authority score.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the present application, the first display module 1 includes:
a start sub-module for starting the container arrangement tool;
the first obtaining sub-module is used for obtaining the configuration file in the container arrangement tool after the container arrangement tool is successfully started;
the first calling submodule is used for calling a preset management tool in the configuration file;
and the first display submodule is used for displaying the micro-service in the service management interface corresponding to the preset management tool based on the preset management tool.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the present application, the verification module 3 includes:
the second obtaining submodule is used for obtaining the user information and obtaining an identity authentication problem corresponding to the user information;
the second display sub-module is used for displaying the identity verification question and preset answer reminding information so as to remind the user to answer the verification question through the answer reminding information;
the first judgment sub-module is used for collecting the answer handwriting input by the user at a preset position and judging whether the content corresponding to the answer handwriting is the same as the content of the standard answer of the verification question or not;
the first extraction sub-module is used for extracting first handwriting characteristic data of the answer handwriting and extracting second handwriting characteristic data of preset answer handwriting corresponding to the verification question if the answer handwriting is the same as the verification question;
the second judgment submodule is used for judging whether the first handwriting characteristic data is matched with the second handwriting characteristic data;
the third acquisition sub-module is used for acquiring fingerprint images of a plurality of preset angles corresponding to the target finger of the user if the fingerprint images are matched with the target finger of the user, and establishing a corresponding first 3D fingerprint model based on all the fingerprint images;
the screening submodule is used for screening a second 3D fingerprint model corresponding to the user information from a preset 3D fingerprint model library and screening a third 3D fingerprint model corresponding to the target finger from the second 3D fingerprint model;
a second extraction sub-module for extracting first model features of the first 3D fingerprint model and extracting second model features of the third 3D fingerprint model;
the calculation submodule is used for calculating a similarity value between the first model characteristic and the second model characteristic and judging whether the similarity value is larger than a preset similarity threshold value or not;
and the judging submodule is used for judging that the identity authentication is passed if the similarity threshold is larger than the similarity threshold, and otherwise, judging that the identity authentication is not passed.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the present application, the obtaining module 4 includes:
the second calling submodule is used for calling a pre-stored mapping relation table;
the query submodule is used for querying the target micro service corresponding to the target micro service identification based on the mapping relation table;
and the monitoring submodule is used for monitoring the running information of the target micro service based on the monitoring instruction to obtain the monitoring information of the target micro service.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the present application, the second display module 5 includes:
the third calling submodule is used for calling a preset user authority score table and inquiring the authority score corresponding to the user information from the user authority score table;
the third judgment submodule is used for judging whether the authority score is in a preset authority score interval or not;
the third display submodule is used for displaying the monitoring information in a target area of the service management interface if the monitoring information is in the authority score interval;
the processing submodule is used for carrying out data desensitization processing on the monitoring information if the monitoring information is not in the authority score interval to obtain desensitized monitoring information;
and the fourth display submodule is used for displaying the desensitized monitoring information in a target area of the service management interface.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the present application, the processing sub-module includes:
the first acquisition unit is used for acquiring a preset sensitive index data table; the sensitive index data table is internally stored with a plurality of sensitive indexes and grade identifications respectively corresponding to the sensitive indexes; the grade marks comprise a first grade mark, a second grade mark and a third grade mark;
a second obtaining unit, configured to obtain monitoring indexes corresponding to the respective monitoring information;
the matching unit is used for respectively matching each monitoring index with all sensitive indexes contained in a sensitive index data table and screening out the index to be desensitized from all the monitoring indexes according to the obtained matching result;
a first determining unit, configured to determine, based on the sensitive index data table, target level identifiers corresponding to the to-be-desensitized indexes, respectively;
a second determining unit, configured to determine desensitization rules corresponding to the to-be-desensitized indexes, respectively, based on the target level identifiers;
and the processing unit is used for carrying out one-to-one desensitization treatment on the monitoring index parameters related to the indexes to be desensitized based on the desensitization rules to obtain the desensitized monitoring information.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Further, in an embodiment of the application, the second determining unit includes:
the acquisition subunit is used for acquiring the specified grade identification corresponding to the specified index to be desensitized; the specified index to be desensitized is any one of all indexes to be desensitized;
a first generating subunit, configured to generate, based on the first class identifier, a first desensitization rule corresponding to the specified to-be-desensitized index if the specified class identifier is the first class identifier; the first desensitization rule is used for performing data desensitization processing on the monitoring index parameter corresponding to the specified index to be desensitized by adopting a preset encryption mode;
a second generating subunit, configured to generate, if the specified level identifier is the second level identifier, a second desensitization rule corresponding to the specified to-be-desensitized index based on the second level identifier; the second desensitization rule is used for performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized index in a fuzzy mode;
a third generating subunit, configured to generate, based on the third level identifier, a third desensitization rule corresponding to the specified to-be-desensitized index if the specified level identifier is the third level identifier; and performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized indexes by adopting an alternative mode according to the third desensitization rule.
In this embodiment, the operations executed by the modules or units respectively correspond to the steps of the micro service monitoring method in the foregoing embodiment one to one, and are not described herein again.
Referring to fig. 3, a computer device, which may be a server and whose internal structure may be as shown in fig. 3, is also provided in the embodiment of the present application. The computer device comprises a processor, a memory, a network interface, a display screen, an input device and a database which are connected through a system bus. Wherein the processor of the computer device is designed to provide computing and control capabilities. The memory of the computer device comprises a storage medium and an internal memory. The storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operating system and computer programs in the storage medium to run. The database of the computer equipment is used for storing monitoring instructions, user information, preset answer handwriting, monitoring information and authority scores. The network interface of the computer device is used for communicating with an external terminal through a network connection. The display screen of the computer equipment is an indispensable image-text output equipment in the computer, and is used for converting digital signals into optical signals so that characters and figures are displayed on the screen of the display screen. The input device of the computer equipment is the main device for information exchange between the computer and the user or other equipment, and is used for transmitting data, instructions, some mark information and the like to the computer. The computer program is executed by a processor to implement a method of microservice monitoring.
The processor executes the micro-service monitoring method and comprises the following steps:
displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier; wherein the monitoring instruction carries user information;
acquiring the user information, handwriting of the user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library;
if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction;
and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score.
It will be understood by those skilled in the art that the structure shown in fig. 3 is only a block diagram of a part of the structure related to the present application, and does not constitute a limitation to the apparatus and the computer device to which the present application is applied.
An embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a micro-service monitoring method, and specifically includes:
displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier; wherein the monitoring instruction carries user information;
acquiring the user information, handwriting of the user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library;
if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction;
and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. Any reference to memory, storage, database, or other medium provided herein and used in the examples may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, apparatus, article, or method that includes the element.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. A micro-service monitoring method is characterized by comprising the following steps:
displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to a target micro-service identifier; wherein the monitoring instruction carries user information;
acquiring the user information, handwriting of the user and a fingerprint image of the user, and performing identity verification on the user based on preset answer handwriting and a preset fingerprint model library;
if the identity authentication is passed, acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction;
and determining the authority score of the user based on the user information, and displaying the monitoring information in the service management interface based on the authority score.
2. The method of claim 1, wherein the step of displaying the micro-service on a predetermined service management interface based on a predetermined container arrangement tool comprises:
initiating the container orchestration tool;
after the container arrangement tool is successfully started, acquiring a configuration file in the container arrangement tool;
calling a preset management tool in the configuration file;
and displaying the micro service in the service management interface corresponding to the preset management tool based on the preset management tool.
3. The micro-service monitoring method as claimed in claim 1, wherein the step of obtaining the user information, the handwriting of the user and the fingerprint image of the user, and performing the identity verification on the user based on a preset answer handwriting and a preset fingerprint model library comprises:
acquiring the user information and acquiring an identity authentication problem corresponding to the user information;
displaying the identity verification question and preset answer reminding information to remind the user to answer the verification question through the answer reminding information;
acquiring an answer script input by the user at a preset position, and judging whether the content corresponding to the answer script is the same as the content of a standard answer of the verification question;
if the answer handwriting is the same as the verification question, extracting first handwriting characteristic data of the answer handwriting, and extracting second handwriting characteristic data of preset answer handwriting corresponding to the verification question;
judging whether the first handwriting characteristic data is matched with the second handwriting characteristic data;
if so, acquiring fingerprint images of a plurality of preset angles corresponding to the target finger of the user, and creating a corresponding first 3D fingerprint model based on all the fingerprint images;
screening a second 3D fingerprint model corresponding to the user information from a preset 3D fingerprint model library, and screening a third 3D fingerprint model corresponding to the target finger from the second 3D fingerprint model;
extracting first model features of the first 3D fingerprint model and extracting second model features of the third 3D fingerprint model;
calculating a similarity value between the first model characteristic and the second model characteristic, and judging whether the similarity value is greater than a preset similarity threshold value;
and if the similarity is larger than the similarity threshold, judging that the identity authentication is passed, otherwise, judging that the identity authentication is not passed.
4. The micro-service monitoring method according to claim 1, wherein the step of obtaining the monitoring information of the target micro-service corresponding to the target micro-service identifier based on the monitoring instruction comprises:
calling a pre-stored mapping relation table;
inquiring the target micro service corresponding to the target micro service identification based on the mapping relation table;
and monitoring the running information of the target micro service based on the monitoring instruction to obtain the monitoring information of the target micro service.
5. The micro-service monitoring method according to claim 1, wherein the step of determining the authority score of the user based on the user information and presenting the monitoring information in the service management interface based on the authority score comprises:
calling a preset user authority score table, and inquiring an authority score corresponding to the user information from the user authority score table;
judging whether the authority score is within a preset authority score interval or not;
if the authority score interval is within the authority score interval, displaying the monitoring information in a target area of the service management interface;
if the monitoring information is not in the permission score interval, performing data desensitization treatment on the monitoring information to obtain desensitized monitoring information;
and displaying the monitoring information after desensitization in a target area of the service management interface.
6. The method according to claim 5, wherein the step of performing data desensitization processing on the monitoring information to obtain desensitized monitoring information comprises:
acquiring a preset sensitive index data table; the sensitive index data table is internally stored with a plurality of sensitive indexes and grade identifications respectively corresponding to the sensitive indexes; the grade marks comprise a first grade mark, a second grade mark and a third grade mark;
acquiring monitoring indexes respectively corresponding to the monitoring information;
matching each monitoring index with all sensitive indexes contained in a sensitive index data table respectively, and screening out the index to be desensitized from all the monitoring indexes according to the obtained matching result;
determining target grade identifications respectively corresponding to the indexes to be desensitized based on the sensitive index data table;
determining desensitization rules respectively corresponding to the indexes to be desensitized based on the target grade identification;
and performing one-to-one desensitization treatment on the monitoring index parameters related to the indexes to be desensitized based on the desensitization rules to obtain desensitized monitoring information.
7. The micro-service monitoring method according to claim 6, wherein the step of determining desensitization rules respectively corresponding to the indexes to be desensitized based on the target level identifiers comprises:
acquiring an appointed grade identification corresponding to an appointed index to be desensitized; the specified index to be desensitized is any one of all indexes to be desensitized;
if the specified grade identification is the first grade identification, generating a first desensitization rule corresponding to the specified index to be desensitized based on the first grade identification; the first desensitization rule is used for performing data desensitization processing on the monitoring index parameter corresponding to the specified index to be desensitized by adopting a preset encryption mode;
if the specified grade identification is the second grade identification, generating a second desensitization rule corresponding to the specified to-be-desensitized index based on the second grade identification; the second desensitization rule is used for performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized index in a fuzzy mode;
if the designated grade identification is the third grade identification, generating a third desensitization rule corresponding to the designated index to be desensitized based on the third grade identification; and performing data desensitization treatment on the monitoring index parameters corresponding to the specified to-be-desensitized indexes by adopting an alternative mode according to the third desensitization rule.
8. A microservice monitoring apparatus, comprising:
the first display module is used for displaying the micro-service on a preset service management interface based on a preset container arrangement tool;
the receiving module is used for receiving a monitoring instruction which is triggered by a user in the service management interface and corresponds to the target micro-service identifier; wherein the monitoring instruction carries user information;
the verification module is used for acquiring the user information, the handwriting of the user and the fingerprint image of the user and verifying the identity of the user based on a preset answer handwriting and a preset fingerprint model library;
the acquisition module is used for acquiring monitoring information of the target micro service corresponding to the target micro service identification based on the monitoring instruction if the identity authentication passes;
and the second display module is used for determining the authority score of the user based on the user information and displaying the monitoring information in the service management interface based on the authority score.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method according to any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210508992.3A 2022-05-10 2022-05-10 Micro-service monitoring method and device, computer equipment and storage medium Pending CN114840387A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210508992.3A CN114840387A (en) 2022-05-10 2022-05-10 Micro-service monitoring method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210508992.3A CN114840387A (en) 2022-05-10 2022-05-10 Micro-service monitoring method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114840387A true CN114840387A (en) 2022-08-02

Family

ID=82570739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210508992.3A Pending CN114840387A (en) 2022-05-10 2022-05-10 Micro-service monitoring method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114840387A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116489229A (en) * 2023-05-11 2023-07-25 中电金信软件有限公司 Micro-service arrangement method, device and storage medium
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN117079262A (en) * 2023-10-16 2023-11-17 北京睿企信息科技有限公司 Instrument panel display method for request times

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116489229A (en) * 2023-05-11 2023-07-25 中电金信软件有限公司 Micro-service arrangement method, device and storage medium
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN117079262A (en) * 2023-10-16 2023-11-17 北京睿企信息科技有限公司 Instrument panel display method for request times
CN117079262B (en) * 2023-10-16 2023-12-26 北京睿企信息科技有限公司 Instrument panel display method for request times

Similar Documents

Publication Publication Date Title
CN111024708B (en) Method, device, system and equipment for processing product defect detection data
CN114840387A (en) Micro-service monitoring method and device, computer equipment and storage medium
CN112464117A (en) Request processing method and device, computer equipment and storage medium
CN113726784B (en) Network data security monitoring method, device, equipment and storage medium
CN113642039B (en) Configuration method and device of document template, computer equipment and storage medium
CN112637282B (en) Information pushing method and device, computer equipment and storage medium
CN112668041A (en) Document file generation method and device, computer equipment and storage medium
CN112036147A (en) Method and device for converting picture into webpage, computer equipment and storage medium
CN114817055A (en) Regression testing method and device based on interface, computer equipment and storage medium
CN113672654B (en) Data query method, device, computer equipment and storage medium
KR102442694B1 (en) Manpower matching system
CN113986581A (en) Data aggregation processing method and device, computer equipment and storage medium
CN115640074A (en) Service data processing method and device and intelligent counter terminal
Ma Application of artificial intelligence in computer network technology
CN113918609A (en) Test paper creating method and device, computer equipment and storage medium
CN113435990B (en) Certificate generation method and device based on rule engine and computer equipment
CN114004639A (en) Preferential information recommendation method and device, computer equipment and storage medium
CN113656588A (en) Data code matching method, device, equipment and storage medium based on knowledge graph
CN113486316A (en) User identity authentication method and device, electronic equipment and readable storage medium
CN113535260B (en) Simulator-based data processing method, device, equipment and storage medium
CN113191146B (en) Appeal data distribution method and device, computer equipment and storage medium
CN114511200A (en) Job data generation method and device, computer equipment and storage medium
Indrayani The effectiveness and the efficiency of the use of biometric systems in supporting national database based on single ID card number (the implementation of Electronik ID Card in Bandung)
CN113918699A (en) Questionnaire generation method and device, computer equipment and storage medium
CN114399361A (en) Service request processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination