CN115437812A - Application fault risk influence range analysis method and system - Google Patents

Application fault risk influence range analysis method and system Download PDF

Info

Publication number
CN115437812A
CN115437812A CN202211058241.2A CN202211058241A CN115437812A CN 115437812 A CN115437812 A CN 115437812A CN 202211058241 A CN202211058241 A CN 202211058241A CN 115437812 A CN115437812 A CN 115437812A
Authority
CN
China
Prior art keywords
application
target application
target
call chain
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211058241.2A
Other languages
Chinese (zh)
Inventor
刘祥涌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Zhejiang Technology Operation Co ltd
Original Assignee
Digital Zhejiang Technology Operation Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Zhejiang Technology Operation Co ltd filed Critical Digital Zhejiang Technology Operation Co ltd
Priority to CN202211058241.2A priority Critical patent/CN115437812A/en
Publication of CN115437812A publication Critical patent/CN115437812A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/004Error avoidance

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method and a system for analyzing application fault risk influence range, which comprises the following steps: determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application; determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and determining the range of the affected application when the target application fails based on the confidence level of the associated application of the target application. In the method, other application information with potential risks when one or more applications have faults is determined through the incidence relation among the applications in each calling chain, so that the probability of faults of other applications is reduced, and the stability of the whole application system is improved.

Description

Application fault risk influence range analysis method and system
Technical Field
The invention relates to the technical field of operation and maintenance, in particular to a method and a system for analyzing application fault risk influence range.
Background
With continuous deepening of digital reform, multiple cross-level, cross-region, cross-system, cross-department, cross-service and other multi-cross collaborative scenes are more and more applied, and the topological structure between the applications is changed from the traditional single dependence into the complex multi-system dependence and the multi-dimensional dependence; in addition, more and more application systems adopt an agile development mode to adapt to rapid change and iteration of related services of digital reform, so that the association of the application systems also changes dynamically.
The existing application fault risk range analysis method aims at early warning processing of faults or risks of a single scene and a single body, and when one application fails, other application information with potential risks related to the faulty application cannot be acquired, so that the stability of the whole application system can be influenced.
Disclosure of Invention
In view of this, the present invention provides a method and a system for analyzing application failure risk influence range, which determine other application information having potential risk when a certain application or multiple applications fail through an association relationship between applications in each call chain, so as to reduce the possibility of failure of other applications, and further improve the stability of the entire application system.
In a first aspect, an embodiment of the present invention provides an application failure risk range analysis method, including: determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application; determining the confidence of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and determining the range of the affected application when the target application fails based on the confidence level of the associated application of the target application.
Further, a real-time call chain set in the log management platform is constructed by the following method: acquiring a call chain contained in each piece of log information in a log management platform; and acquiring all applications in the call chains, and generating a real-time call chain set according to the corresponding relation between each call chain and the application corresponding to the call chain.
Further, the step of determining the associated application of the target application based on the real-time call chain set in the log management platform includes: acquiring a target call chain containing target application in a real-time call chain set; and determining the applications belonging to the at least one target call chain and the target application as the associated applications of the target application.
Further, the step of determining the confidence of the associated application of the target application according to the association relationship between each call chain in the real-time call chain set and the target application includes: calculating the support degree of the target application and the support degrees of the target application and the associated application based on the real-time call chain set; and calculating the confidence of the associated application according to the support degree of the target application and the support degrees of the target application and the associated application.
Further, the support degree of the target application and the associated application are calculated according to the following formula:
Figure BDA0003825678520000021
wherein, P (X) represents the support degree of the target application; x represents a target application; the count (X) represents the number of call chains of the target application in the real-time call chain set; d represents a call chain set in the real-time call chain set; count (D) represents the total number of call chain sets;
Figure BDA0003825678520000022
wherein P (X ^ N.Y) represents the support degree of the target application and the associated application; the count (X ≧ Y) represents the number of call chains in the real-time call chain set, which simultaneously contains the target application and the associated application.
Further, the confidence of the associated application is calculated according to the following formula:
Figure BDA0003825678520000031
wherein X represents a target application; y represents an associated application; p (X → Y) represents the probability that the associated application fails when the target application fails; p (X ≧ Y) represents the support of the target application and the associated application; p (X) represents the support of the target application.
Further, the step of determining the affected application range when the target application fails based on the confidence level of the associated application of the target application includes: comparing the confidence of the associated application with a preset confidence; and determining the associated application with the confidence coefficient larger than the preset confidence coefficient as the affected application range.
Further, the target application comprises at least one application.
In a second aspect, an embodiment of the present invention provides an analysis system for applying a fault risk influence range, including: the system comprises a related application determining module, a log management module and a processing module, wherein the related application determining module is used for determining related applications of a target application based on a real-time calling chain set in a log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application; the confidence coefficient calculation module is used for determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and the affected application range determining module is used for determining the affected application range when the target application fails based on the confidence coefficient of the associated application of the target application.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a memory and a processor, where the memory stores a computer program that is executable on the processor, and the processor implements the method described above when executing the computer program.
The embodiment of the invention provides a method and a system for analyzing application fault risk influence range, which comprises the following steps: determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application; determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and determining the range of the affected application when the target application fails based on the confidence of the associated application of the target application. In the method, the associated application of the target application is determined through the integration of the real-time call chain in the log management platform, so that other application information with potential risks can be dynamically determined when one or more applications are in fault in a multi-span collaboration scene, the possibility of the fault of other applications is reduced, and the stability of the whole application system is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
In order to make the aforementioned and other objects, features and advantages of the present invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of an application failure risk influence range analysis method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a real-time call chain set according to an embodiment of the present invention;
fig. 3 is a schematic diagram of an analysis system for application fault risk influence ranges according to a second embodiment of the present invention.
Icon: 1-an associated application determination module; 2-a confidence calculation module; 3-affected application scope determination module.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
In a multi-cooperation scene and a complex system architecture with multi-system dependence, multi-dimensional dependence and the like, the target application of operation and maintenance is dynamically changed along with the dynamic change of the scene, but the conventional application fault risk range analysis method aims at single scene, single fault or risk and single application, and cannot analyze the application fault influence range in a multi-dimensional, dynamic and deep manner and perform early warning treatment in time after the application has fault risk early warning. For example, when the CPU of a certain server is overloaded, the monitoring technical scheme can only alarm the early warning information of a single service in the application system deployed in the distributed cluster at the present stage, and for the operation and maintenance of the traditional IT system, the monitoring technical scheme can obtain a better effect, but for the operation and maintenance of the application system depending on multiple systems and depending on multiple dimensions, the single monitoring operation and maintenance mode obviously has a higher risk, the influence range of a single object fault or risk cannot be dynamically and immediately found, and the associated applications may have potential risks, even secondary associated risks.
The digital government affair system comprises thousands of items and applications, each user can generate a call chain when visiting each time, the items handled by different people and the visited applications are different, the back-end applications corresponding to the items are associated to form an intricate call chain set, and when a certain application system or deployment resource and the like have a fault risk, based on the application fault risk range analysis method, the affected associated application system or deployment resource can be quickly found out from the intricate call chain.
For the understanding of the present embodiment, the following detailed description will be given of the embodiment of the present invention.
The first embodiment is as follows:
fig. 1 is a flowchart of an application failure risk influence range analysis method according to an embodiment of the present invention.
Referring to fig. 1, the method for analyzing the application fault risk influence range includes:
step S101, determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that is co-owned by the at least one call chain with the target application.
Here, the target application and the associated application include developer information, operation and maintenance information, a contact, an application introduction, a monitoring address, an application scenario, and the like. The target application comprises at least one application. When the target application changes, the corresponding call chain changes accordingly.
In an embodiment, in step S101, a real-time call chain set in the log management platform is constructed by:
acquiring a call chain contained in each piece of log information in a log management platform;
and acquiring all applications in the call chains, and generating a real-time call chain set according to the corresponding relation between each call chain and the application corresponding to the call chain.
Here, the log management platform stores log information of actual operations of the user, and the log information includes a call chain of the actual operations of the user. The call chains are generated according to the actual operation of the user and are dynamically changed, and the corresponding relation between each call chain and the corresponding application is also dynamically changed.
In an embodiment, in step S101, the step of determining an associated application of the target application based on the real-time call chain set in the log management platform includes:
acquiring a target call chain containing target application in a real-time call chain set;
and determining the applications belonging to the at least one target call chain and the target application as the associated applications of the target application.
And S102, determining the confidence of the associated application of the target application according to the association relation between each call chain in the real-time call chain set and the target application.
In an embodiment, in step S102, the step of determining a confidence of an associated application of the target application according to an association relationship between each call chain in the real-time call chain set and the target application includes:
calculating the support degree of the target application and the support degrees of the target application and the associated application based on the real-time call chain set;
and calculating the confidence degree of the associated application according to the support degree of the target application and the support degrees of the target application and the associated application.
In one embodiment, the support of the target application is calculated according to the following formula (1) and the support of the target application and the associated application is calculated according to the following formula (2):
Figure BDA0003825678520000071
wherein, P (X) represents the support degree of the target application; x represents a target application; the count (X) represents the number of call chains of the target application in the real-time call chain set; d represents a call chain set in the real-time call chain set; count (D) represents the total number of call chain sets.
Figure BDA0003825678520000072
Wherein P (X ^ N.Y) represents the support degree of the target application and the associated application; count (X # Y) represents the number of call chains in the real-time call chain set, which simultaneously contains the target application and the associated application.
Here, the support degree is a probability of occurrence of the target application or the associated application. According to practical conditions, a threshold value can be set, and when the support degree is not less than the threshold value, the target application or the associated application is a frequent item set.
In one embodiment, the confidence level of the associated application is calculated according to the following equation (3):
Figure BDA0003825678520000073
wherein X represents a target application; y represents an associated application; p (X → Y) represents the probability that the associated application fails when the target application fails; p (X ≧ Y) represents the support degree of the target application and the associated application; p (X) represents the support of the target application.
Step S103, determining the range of the affected application when the target application fails based on the confidence of the associated application of the target application.
In one embodiment, step S103 includes: based on the confidence level of the associated application of the target application, determining the range of the affected application when the target application fails, wherein the step comprises the following steps:
comparing the confidence of the associated application with a preset confidence;
and determining the associated application with the confidence coefficient larger than the preset confidence coefficient as the affected application range.
Here, the range of the affected application when the target reference fails is determined according to the preset confidence level set in advance. The preset confidence coefficient is preset according to the actual situation. The preset confidence level comprises a first preset confidence level and a second preset confidence level.
Determining the associated applications with the confidence degrees larger than a first preset confidence degree as first target associated applications, and determining a set of the first target associated applications as a first influence range; and judging whether the first target associated applications all meet the preset associated application requirements, and if so, determining that the first influence range is the range of the influenced application. The preset associated application requirements are set according to actual conditions.
If the first target associated application has an application which does not meet the requirements of the preset associated application, determining the confidence coefficient of the first target associated application based on algorithm dynamic iteration, and comparing the confidence coefficient of the first target associated application with a second preset confidence coefficient; and determining the first target associated application with the confidence degree greater than the second preset confidence degree as a second target associated application, determining the set of the second target associated application as a second influence range, and determining the second influence range as the range of the influenced application.
In particular, the amount of the solvent to be used, application collection I = { I } in application system 1 ,i 2 ,...,i m Where i represents an application in an application system; m represents that m applications are included in the application system. Target application collection X = { i } in application system 1 ,i 2 ,...,i p P applications are contained in the list; in the application system, the system is provided with a plurality of devices, associated application set Y = { i = { i } 1 ,i 2 ,...,i q Q applications are contained in the application pool, and the target application pool and the associated application pool are subsets of the application pool. Real-time call chain set D = { t = 1 ,t 2 ,...,t n A subset I is generated according to the log information of the actual operation of the user, and one t corresponds to the call incidence relation of a specific service; the set of real-time call chains consists of n call chains.
In an embodiment, referring to the schematic diagram of the real-time call chain set of fig. 2, the call chain set includes 6 call chains, where the call chain 1 includes i 1 ,i 5 ,i 3 ,i 4 ,i 2 The call chain 2 includes i 2 ,i 5 ,i 3 ,i 4 ,i 6 The call chain 3 includes i 3 ,i 5 The call chain 4 includes i 4 ,i 3 ,i 5 The call chain 5 includes i 5 ,i 6 The call chain 6 includes i 6 ,i 3
Here, in i 5 As a target application, in a real-time call chaining set, i 5 Appear 5 times, i 5 Degree of support of
Figure BDA0003825678520000091
Occurrence of i 5 While appearing i 2 Is 2, i.e. i 5 ∩i 2 Degree of support of
Figure BDA0003825678520000092
Therefore, when i 5 When a failure risk occurs, i 2 The probability of being affected is
Figure BDA0003825678520000093
In the same way, i 1 Is influenced by a probability of
Figure BDA0003825678520000094
i 3 Is influenced by a probability of
Figure BDA0003825678520000095
i 4 The probability of being affected is
Figure BDA0003825678520000096
i 6 The probability of being affected is
Figure BDA0003825678520000097
Setting a predetermined confidence level as
Figure BDA0003825678520000098
The range of affected applications is then i 3 ,i 4 }. I.e. when the application 5 fails, the applications 3 and 4 are affected.
The embodiment of the invention provides an application fault risk influence range analysis method, which comprises the following steps: determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application which belongs to at least one call chain with the target application; determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and determining the range of the affected application when the target application fails based on the confidence of the associated application of the target application. In the method, the associated application of the target application is determined through the integration of the real-time call chain in the log management platform, so that other application information with potential risks can be dynamically determined when one or more applications are in failure in a multi-span collaborative scene, the failure possibility of other applications is reduced, and the stability of the whole application system is improved.
Example two:
fig. 3 is a schematic diagram of an analysis system for application failure risk influence ranges according to a second embodiment of the present invention.
Referring to fig. 3, the analysis system includes:
the system comprises a related application determining module 1, a log management platform and a processing module, wherein the related application determining module is used for determining related applications of a target application based on a real-time calling chain set in the log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application;
the confidence coefficient calculation module 2 is used for determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application;
and the affected application range determining module 3 is used for determining the affected application range when the target application fails based on the confidence of the associated application of the target application.
The embodiment of the invention provides an application fault risk influence range analysis system, which comprises: determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that belongs to at least one call chain with the target application; determining the confidence of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application; and determining the range of the affected application when the target application fails based on the confidence level of the associated application of the target application. In the method, the associated application of the target application is determined through the integration of the real-time call chain in the log management platform, so that other application information with potential risks can be dynamically determined when one or more applications are in fault in a multi-span collaborative scene, the possibility of the fault of other applications is reduced, and the stability of the whole application system is improved
The embodiment of the present invention further provides an electronic device, which includes a memory, a processor, and a computer program that is stored in the memory and can be run on the processor, and when the processor executes the computer program, the steps of the method for analyzing the application failure risk influence range provided by the above embodiment are implemented.
The computer program product provided in the embodiment of the present invention includes a computer readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiment, and specific implementation may refer to the method embodiment, which is not described herein again.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In addition, in the description of the embodiments of the present invention, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in a specific case to those of ordinary skill in the art.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc. indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplification of description, but do not indicate or imply that the device or element referred to must have a specific orientation, be constructed and operated in a specific orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, it should be understood by those skilled in the art that the following descriptions are only illustrative and not restrictive, and that the scope of the present invention is not limited to the above embodiments: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An application failure risk influence range analysis method is characterized by comprising the following steps:
determining the associated application of the target application based on the real-time call chain set in the log management platform; wherein the associated application is an application that is co-owned by at least one call chain with the target application;
determining the confidence of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application;
and determining the range of the affected application when the target application fails based on the confidence level of the associated application of the target application.
2. The application failure risk scope of influence analysis method of claim 1, wherein the set of real-time call chains in the log management platform is constructed by:
acquiring a call chain contained in each piece of log information in a log management platform;
and acquiring all applications in the call chains, and generating the real-time call chain set according to the corresponding relation between each call chain and the application corresponding to the call chain.
3. The method for analyzing application failure risk scope of influence according to claim 1, wherein the step of determining the associated application of the target application based on the real-time call chain set in the log management platform comprises:
acquiring a target call chain containing the target application in the real-time call chain set;
and determining the applications which belong to at least one target call chain and the target application as the associated applications of the target application.
4. The method for analyzing the application fault risk influence range according to claim 1, wherein the step of determining the confidence level of the associated application of the target application according to the association relationship between each call chain in the real-time call chain set and the target application comprises:
calculating the support degree of the target application and the support degrees of the target application and the associated application based on the real-time call chain set;
and calculating the confidence of the associated application according to the support degree of the target application and the support degrees of the target application and the associated application.
5. The application failure risk scope analysis method according to claim 4, wherein the support degree of the target application and the support degrees of the target application and the associated application are calculated according to the following formulas:
Figure FDA0003825678510000021
wherein P (X) represents the support of the target application; x represents the target application; the count (X) represents the number of call chains of the target application in the real-time call chain set; d represents a call chain set in the real-time call chain set; count (D) represents the total number of the call chain sets;
Figure FDA0003825678510000022
wherein P (X ≧ Y) represents the support of the target application and an associated application; and the count (X ^ Y) represents the number of call chains in the real-time call chain set and simultaneously contains the target application and the associated application.
6. The application failure risk scope of influence analysis method of claim 5, wherein the confidence level of the associated application is calculated according to the following formula:
Figure FDA0003825678510000023
wherein X represents the target application; y represents the associated application; p (X → Y) represents the probability that the associated application fails when the target application fails; p (X ≧ Y) represents the support degree of the target application and the associated application; p (X) represents the support of the target application.
7. The method for analyzing the application failure risk influence range according to claim 1, wherein the step of determining the affected application range when the target application fails based on the confidence level of the associated application of the target application comprises:
comparing the confidence of the associated application with a preset confidence;
determining the associated application with the confidence level greater than the preset confidence level as the affected application range.
8. The application failure risk scope analysis method according to any one of claims 1-7, wherein the target application comprises at least one application.
9. An analysis system for applying fault risk impact areas, comprising:
the system comprises a related application determining module, a log management module and a processing module, wherein the related application determining module is used for determining related applications of a target application based on a real-time calling chain set in a log management platform; wherein the associated application is an application that is co-owned by at least one call chain with the target application;
the confidence coefficient calculation module is used for determining the confidence coefficient of the associated application of the target application according to the association relation between each calling chain in the real-time calling chain set and the target application;
and the affected application range determining module is used for determining the affected application range when the target application fails based on the confidence degree of the associated application of the target application.
10. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 8 when executing the computer program.
CN202211058241.2A 2022-08-30 2022-08-30 Application fault risk influence range analysis method and system Pending CN115437812A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211058241.2A CN115437812A (en) 2022-08-30 2022-08-30 Application fault risk influence range analysis method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211058241.2A CN115437812A (en) 2022-08-30 2022-08-30 Application fault risk influence range analysis method and system

Publications (1)

Publication Number Publication Date
CN115437812A true CN115437812A (en) 2022-12-06

Family

ID=84244240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211058241.2A Pending CN115437812A (en) 2022-08-30 2022-08-30 Application fault risk influence range analysis method and system

Country Status (1)

Country Link
CN (1) CN115437812A (en)

Similar Documents

Publication Publication Date Title
CN110378487B (en) Method, device, equipment and medium for verifying model parameters in horizontal federal learning
CN109586952B (en) Server capacity expansion method and device
CN110602135B (en) Network attack processing method and device and electronic equipment
CN116305168B (en) Multi-dimensional information security risk assessment method, system and storage medium
CN114978568A (en) Data center management using machine learning
CN111667078A (en) Maintenance strategy determination method and device for excavator
CN111091385B (en) Weight-based object identification method and device and electronic equipment
CN113704018A (en) Application operation and maintenance data processing method and device, computer equipment and storage medium
CN116418653A (en) Fault positioning method and device based on multi-index root cause positioning algorithm
CN112968796A (en) Network security situation awareness method and device and computer equipment
CN115437812A (en) Application fault risk influence range analysis method and system
CN115361295B (en) TOPSIS-based resource backup method, device, equipment and medium
CN116047223A (en) Electricity larceny distinguishing method based on real-time electricity consumption and big data analysis
CN111741004B (en) Network security situation awareness method and related device
CN110890977B (en) Host node monitoring method and device of cloud platform and computer equipment
CN110113708B (en) Positioning method and device based on Wi-Fi position fingerprint
CN110765303A (en) Method and system for updating database
CN112085590A (en) Method and device for determining safety of rule model and server
CN112153685B (en) RRC fault detection method and device
CN113676377B (en) Online user number evaluation method, device, equipment and medium based on big data
CN117459625B (en) Mobile phone motherboard performance test method and system
CN112419050B (en) Credit evaluation method and device based on telephone communication network and social behavior
CN116015785B (en) Information security protection method, electronic equipment and storage medium
CN113850499A (en) Data processing method and device, electronic equipment and storage medium
CN114676912A (en) Security and protection resource deployment system based on Internet of things

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination