CN116318892A - Loose distributed deployment method and device for database auditing system - Google Patents

Loose distributed deployment method and device for database auditing system Download PDF

Info

Publication number
CN116318892A
CN116318892A CN202310152540.0A CN202310152540A CN116318892A CN 116318892 A CN116318892 A CN 116318892A CN 202310152540 A CN202310152540 A CN 202310152540A CN 116318892 A CN116318892 A CN 116318892A
Authority
CN
China
Prior art keywords
data
center
data center
control center
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310152540.0A
Other languages
Chinese (zh)
Inventor
梁俊明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Suninfo Technology Co ltd
Original Assignee
Shanghai Suninfo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Suninfo Technology Co ltd filed Critical Shanghai Suninfo Technology Co ltd
Priority to CN202310152540.0A priority Critical patent/CN116318892A/en
Publication of CN116318892A publication Critical patent/CN116318892A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/044Network management architectures or arrangements comprising hierarchical management structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/26Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using dedicated tools for LAN [Local Area Network] management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The purpose of the application is to provide a loose distributed deployment method and equipment for a database auditing system. Specifically, one data center is selected from a plurality of data centers to serve as a control center, and each data center is added to the control center; then, configuring each data center through the management and control center, and distributing all databases in the local area network to each data center for auditing; and each data center reports the statistical data of the database audit result to the management and control center at intervals of a preset time period. Compared with the prior art, the method and the device have the advantages that all databases in the local area network are managed and monitored through a loose distributed deployment mechanism, so that the data warehouse entry pressure of an audit result is effectively reduced.

Description

Loose distributed deployment method and device for database auditing system
Technical Field
The present application relates to the field of information technology, and in particular, to a loose distributed deployment technique for a database auditing system.
Background
For a small local area network environment, only a limited number of databases are provided, and the database auditing system can meet the requirements by adopting an all-in-one mode. For large LAN environments, databases are often frequent, and single databases have huge flow, and the existing database audit system deployment structure generally adopts audit agents, audit engines and data centers in three-level structure mode. In particular, in a large LAN environment, a distributed mode is adopted for database deployment, and an audit agent mode can be adopted for distributed logic or physical position comparison, so that distributed deployment of data acquisition is realized; and for the distributed deployment of data operation, an audit engine mode can be adopted for the high audit pressure ratio and high operation efficiency requirement of the database. However, the data warehouse entry pressure problem of the final audit result cannot be solved no matter in an audit agency mode or an audit engine mode, and even if a caching mechanism is adopted, the data warehouse entry pressure can be reduced to a limited extent only.
Disclosure of Invention
It is an object of the present application to provide a loosely distributed deployment method and apparatus for a database auditing system.
According to one aspect of the present application, there is provided a loose distributed deployment method for a database auditing system, wherein the method comprises:
selecting one from a plurality of data centers as a control center, and adding each data center in the control center;
configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing;
and each data center reports the statistical data of the database audit result to the management and control center at intervals of a preset time period.
Further, the database auditing system includes a plurality of the data centers;
each of the data centers has one or more audit engines, each of the audit engines having one or more audit agents;
the audit agent is used for collecting database flow; the auditing engine is used for analyzing and processing the database flow to obtain an auditing result; the data center is used for storing and displaying the auditing result.
Further, selecting one from a plurality of data centers as a management center, adding each data center in the management center, and the method comprises the following steps:
selecting one with the smallest SSID value from a plurality of data centers as the management and control center;
and adding each data center in the control center, recording each data center node in the control center, and writing the IP address of the control center and the SSID value allocated to the data center in each data center.
Further, each data center reports statistical data of the database audit result to the management and control center at intervals of a preset time period, including:
if each data center detects the configuration of the control center and the SSID value distributed to the data center, the data center reports the statistic data of the database audit result to the control center at intervals of preset time periods.
Further, the method further comprises:
if the data center does not detect the configuration of the management and control center, stopping reporting the statistical data of the database audit result, and continuing to operate as an independent data center.
Further, the management and control center configures each data center, and distributes all databases in the local area network to each data center for auditing, including:
configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing according to network deployment conditions;
the configuration content comprises monitored databases, and audit strategies and alarm strategies of the databases.
Further, the method further comprises:
when the data center node needs to be deleted, deleting the corresponding data center node through the control center, and deleting the configuration of the control center on the data center.
According to another aspect of the present application, there is also provided a loose distributed deployment apparatus for a database auditing system, wherein the apparatus includes:
the first module is used for selecting one from a plurality of data centers as a control center, and adding each data center in the control center;
the second module is used for configuring each data center through the management and control center, and distributing all databases in the local area network to each data center for auditing;
and the third module is used for reporting the statistical data of the database audit result to the management and control center at intervals of a preset time period by each data center.
According to yet another aspect of the present application, there is also provided a computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the loose distributed deployment method for a database auditing system.
According to yet another aspect of the present application, there is also provided a computer readable medium having stored thereon computer program instructions executable by a processor to implement the loose distributed deployment method for a database auditing system.
In the scheme provided by the application, one data center is selected from a plurality of data centers to serve as a management and control center, and each data center is added in the management and control center; then, configuring each data center through the management and control center, and distributing all databases in the local area network to each data center for auditing; and each data center reports the statistical data of the database audit result to the management and control center at intervals of a preset time period. Compared with the prior art, the method and the device have the advantages that all databases in the local area network are managed and monitored through a loose distributed deployment mechanism, so that the data warehouse entry pressure of an audit result is effectively reduced.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the following drawings, in which:
FIG. 1 is a flow chart of a loose distributed deployment method for a database auditing system, according to an embodiment of the present application;
FIG. 2 is a schematic diagram of the architecture of a data center, audit engine, audit agent, according to an embodiment of the present application;
FIG. 3 is a schematic diagram of selecting one from a plurality of data centers as a management center according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a loose distributed deployment apparatus for a database auditing system, according to an embodiment of the present application.
The same or similar reference numbers in the drawings refer to the same or similar parts.
Detailed Description
The present application is described in further detail below with reference to the accompanying drawings.
In one typical configuration of the present application, the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer-readable media include both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technology. The information may be computer readable instructions, data structures, program devices, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium which can be used to store information that can be accessed by a computing device.
The embodiment of the application provides a loose distributed deployment method for a database auditing system, which is applicable to a large local area network environment, a distributed environment, clouding and containerized deployment environments, and the loose distributed deployment mechanism is used for carrying out management monitoring on all databases in the local area network, so that the data warehousing pressure of auditing results is effectively reduced. Moreover, for the deployed database auditing system, if the embodiment of the application is applied, stable capacity expansion and product compatibility can be realized only by simple upgrading operation of the data center, and the system is convenient to deploy in actual project implementation and has certain robustness.
In a practical scenario, the device implementing the method may be a user device, a network device, or a device formed by integrating the user device and the network device through a network. The user equipment comprises terminal equipment such as a smart phone, a tablet personal computer, a personal computer and the like, and the network equipment comprises network hosts, a single network server, a plurality of network server sets or a computer set based on cloud computing and the like. Here, the Cloud is composed of a large number of hosts or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual computer composed of a group of loosely coupled computer sets.
Fig. 1 is a flowchart of a loose distributed deployment method for a database auditing system, according to an embodiment of the present application, the method including steps S101, S102, and S103.
Step S101, selecting one from a plurality of data centers as a control center, and adding each data center in the control center.
For example, a management center may be determined from a plurality of data centers by election or human assignment, and centralized management may be performed on each data center.
In some embodiments, the database auditing system includes a plurality of the data centers; as shown in fig. 2, each of the data centers has one or more audit engines, each of the audit engines having one or more audit agents; the audit agent is used for collecting database flow; the auditing engine is used for analyzing and processing the database flow to obtain an auditing result; the data center is used for storing and displaying the auditing result. And in this case, a plurality of data centers are adopted to cooperate and divide work, and all databases in the whole local area network are audited.
In some embodiments, the step S101 includes: selecting one of the data centers with the smallest SSID (Service Set Identifier ) value as the control center; and adding each data center in the control center, recording each data center node in the control center, and writing the IP address of the control center and the SSID value allocated to the data center in each data center.
For example, after logging in by a system administrator account, each data center is added in the management and control center based on oauth2.0 protocol, if the addition is successful, the management and control center records the data center node, and simultaneously, the IP address of the management and control center and the SSID value allocated to the data center are written in each data center. In addition, when the management and control center writes the configuration into each data center, a standby management and control center can be added (for example, the data center with the smallest SSID value except the management and control center can be selected), so that single-point faults caused by failure of the management and control center can be avoided.
Of course, those skilled in the art will appreciate that the oauth2.0 protocol described above is by way of example only, and that other protocols, either now known or later developed, may be suitable for use in the present application and are intended to be within the scope of the present application and are incorporated herein by reference.
And step S102, configuring each data center through the management and control center, and distributing all databases in the local area network to each data center for auditing.
For example, after the management and control center is authorized by oauth2.0 protocol, each data center is configured, and all databases in the local area network are distributed to each data center for auditing.
In some embodiments, the step S102 includes: configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing according to network deployment conditions; the configuration content comprises monitored databases, audit strategies, alarm strategies and other configurations of each database.
And step S103, each data center reports the statistical data of the database audit result to the management and control center at intervals of a preset time period.
For example, statistics of database audit results include: the monitored databases, statistics of operation records of each database and statistics of alarm records. Therefore, the management and control center can evaluate the auditing conditions of each data center and analyze the pressure bottleneck in the network, so that the data warehousing pressure of the auditing result is reduced.
In some embodiments, the step S103 includes: if each data center detects the configuration of the control center and the SSID value distributed to the data center, the data center reports the statistic data of the database audit result to the control center at intervals of preset time periods.
In some embodiments, the loosely distributed deployment method for a database auditing system further includes: if the data center does not detect the configuration of the management and control center, stopping reporting the statistical data of the database audit result, and continuing to operate as an independent data center.
In some embodiments, the loosely distributed deployment method for a database auditing system further includes: when the data center node needs to be deleted, deleting the corresponding data center node through the control center, and deleting the configuration of the control center on the data center.
Fig. 4 is a schematic diagram of a loose distributed deployment apparatus for a database auditing system, including a first module 401, a second module 402, and a third module 403, according to an embodiment of the present application.
The first module 401 selects one from a plurality of data centers as a management center, and adds each data center to the management center.
For example, a management center may be determined from a plurality of data centers by election or human assignment, and centralized management may be performed on each data center.
In some embodiments, the database auditing system includes a plurality of the data centers; as shown in fig. 2, each of the data centers has one or more audit engines, each of the audit engines having one or more audit agents; the audit agent is used for collecting database flow; the auditing engine is used for analyzing and processing the database flow to obtain an auditing result; the data center is used for storing and displaying the auditing result. And in this case, a plurality of data centers are adopted to cooperate and divide work, and all databases in the whole local area network are audited.
In some embodiments, the first module 401 is configured to: selecting one of the data centers with the smallest SSID (Service Set Identifier ) value as the control center; and adding each data center in the control center, recording each data center node in the control center, and writing the IP address of the control center and the SSID value allocated to the data center in each data center.
For example, after logging in by a system administrator account, each data center is added in the management and control center based on oauth2.0 protocol, if the addition is successful, the management and control center records the data center node, and simultaneously, the IP address of the management and control center and the SSID value allocated to the data center are written in each data center. In addition, when the management and control center writes the configuration into each data center, a standby management and control center can be added (for example, the data center with the smallest SSID value except the management and control center can be selected), so that single-point faults caused by failure of the management and control center can be avoided.
Of course, those skilled in the art will appreciate that the oauth2.0 protocol described above is by way of example only, and that other protocols, either now known or later developed, may be suitable for use in the present application and are intended to be within the scope of the present application and are incorporated herein by reference.
And a second module 402, configured with each data center through the management and control center, for distributing all databases in the local area network to each data center for auditing.
For example, after the management and control center is authorized by oauth2.0 protocol, each data center is configured, and all databases in the local area network are distributed to each data center for auditing.
In some embodiments, the second module 402 is configured to: configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing according to network deployment conditions; the configuration content comprises monitored databases, audit strategies, alarm strategies and other configurations of each database.
And a third module 403, where each data center reports statistical data of the database audit result to the management and control center at intervals of a preset time period.
For example, statistics of database audit results include: the monitored databases, statistics of operation records of each database and statistics of alarm records. Therefore, the management and control center can evaluate the auditing conditions of each data center and analyze the pressure bottleneck in the network, so that the data warehousing pressure of the auditing result is reduced.
In some embodiments, the third module 403 is configured to: if each data center detects the configuration of the control center and the SSID value distributed to the data center, the data center reports the statistic data of the database audit result to the control center at intervals of preset time periods.
In some embodiments, the loosely distributed deployment apparatus for a database auditing system is further to: if the data center does not detect the configuration of the management and control center, stopping reporting the statistical data of the database audit result, and continuing to operate as an independent data center.
In some embodiments, the loosely distributed deployment apparatus for a database auditing system is further to: when the data center node needs to be deleted, deleting the corresponding data center node through the control center, and deleting the configuration of the control center on the data center.
In summary, in the embodiment of the application, the database audit system uses a plurality of data centers to store data, and each data center generates a management and control center to centrally manage and control each data center through election or manual assignment, reasonably distributes the monitored database and audit policy among the plurality of data centers, and periodically gathers the statistical data of the audit result to the management and control center, and centrally manages, configures and displays the statistical data in the management and control center, thereby effectively solving the data warehouse entry pressure problem of the audit result.
Furthermore, portions of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application by way of operation of the computer. Program instructions for invoking the methods of the present application may be stored in fixed or removable recording media and/or transmitted via a data stream in a broadcast or other signal bearing medium and/or stored within a working memory of a computer device operating according to the program instructions. Some embodiments of the present application provide a computing device comprising a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the methods and/or aspects of the various embodiments of the present application described previously.
Furthermore, some embodiments of the present application provide a computer readable medium having stored thereon computer program instructions executable by a processor to implement the methods and/or aspects of the various embodiments of the present application described above.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, using Application Specific Integrated Circuits (ASIC), a general purpose computer or any other similar hardware device. In some embodiments, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential characteristics thereof. The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the apparatus claims can also be implemented by means of one unit or means in software or hardware. The terms first, second, etc. are used to denote a name, but not any particular order.

Claims (10)

1. A loose distributed deployment method for a database auditing system, wherein the method comprises:
selecting one from a plurality of data centers as a control center, and adding each data center in the control center;
configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing;
and each data center reports the statistical data of the database audit result to the management and control center at intervals of a preset time period.
2. The method of claim 1, wherein the database auditing system includes a plurality of the data centers;
each of the data centers has one or more audit engines, each of the audit engines having one or more audit agents;
the audit agent is used for collecting database flow; the auditing engine is used for analyzing and processing the database flow to obtain an auditing result; the data center is used for storing and displaying the auditing result.
3. The method of claim 1, wherein selecting one of a plurality of data centers as a management center, adding each of the data centers at the management center, comprises:
selecting one with the smallest SSID value from a plurality of data centers as the management and control center;
and adding each data center in the control center, recording each data center node in the control center, and writing the IP address of the control center and the SSID value allocated to the data center in each data center.
4. A method according to claim 3, wherein reporting statistics of database audit results to the management and control center by each of the data centers every predetermined time period comprises:
if each data center detects the configuration of the control center and the SSID value distributed to the data center, the data center reports the statistic data of the database audit result to the control center at intervals of preset time periods.
5. A method according to claim 3, wherein the method further comprises:
if the data center does not detect the configuration of the management and control center, stopping reporting the statistical data of the database audit result, and continuing to operate as an independent data center.
6. The method of any one of claims 1 to 5, wherein configuring each of the data centers by the management center assigns all databases within a local area network to each of the data centers for auditing, comprising:
configuring each data center through the management and control center, and distributing all databases in a local area network to each data center for auditing according to network deployment conditions;
the configuration content comprises monitored databases, and audit strategies and alarm strategies of the databases.
7. The method of any one of claims 1 to 6, wherein the method further comprises:
when the data center node needs to be deleted, deleting the corresponding data center node through the control center, and deleting the configuration of the control center on the data center.
8. A loose distributed deployment apparatus for a database auditing system, wherein the apparatus comprises:
the first module is used for selecting one from a plurality of data centers as a control center, and adding each data center in the control center;
the second module is used for configuring each data center through the management and control center, and distributing all databases in the local area network to each data center for auditing;
and the third module is used for reporting the statistical data of the database audit result to the management and control center at intervals of a preset time period by each data center.
9. A computing device, wherein the device comprises a memory for storing computer program instructions and a processor for executing the computer program instructions, wherein the computer program instructions, when executed by the processor, trigger the device to perform the method of any one of claims 1 to 7.
10. A computer readable medium having stored thereon computer program instructions executable by a processor to implement the method of any of claims 1 to 7.
CN202310152540.0A 2023-02-21 2023-02-21 Loose distributed deployment method and device for database auditing system Pending CN116318892A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310152540.0A CN116318892A (en) 2023-02-21 2023-02-21 Loose distributed deployment method and device for database auditing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310152540.0A CN116318892A (en) 2023-02-21 2023-02-21 Loose distributed deployment method and device for database auditing system

Publications (1)

Publication Number Publication Date
CN116318892A true CN116318892A (en) 2023-06-23

Family

ID=86837121

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310152540.0A Pending CN116318892A (en) 2023-02-21 2023-02-21 Loose distributed deployment method and device for database auditing system

Country Status (1)

Country Link
CN (1) CN116318892A (en)

Similar Documents

Publication Publication Date Title
CN102880557B (en) look-up method of multistage distribution type high-speed cache of heterogeneous data source
CN103853671B (en) A kind of data write-in control method and device
US20140164329A1 (en) Dynamically Varying the Number of Database Replicas
CN105897946A (en) Obtaining method and system of access address
CA3141329A1 (en) Request link tracking method and service request processing method
US10069702B2 (en) Dynamic discovery of applications, external dependencies, and relationships
JP2011222006A (en) Method and apparatus for network packet capture distributed storage system
JP2003186564A (en) Storage resource measuring system
JP2019523952A (en) Streaming data distributed processing method and apparatus
CN107087031A (en) A kind of storage resource load-balancing method and device
CN113259407B (en) Data interaction method and device based on application market architecture
CN114003439B (en) Data backup method, device, equipment and storage medium
WO2017008658A1 (en) Storage checking method and system for text data
US20140019797A1 (en) Resource management in ephemeral environments
CN107515807B (en) Method and device for storing monitoring data
CN113946276A (en) Disk management method and device in cluster and server
CN116827830A (en) Database flow audit processing method and system under multiple database servers
CN116318892A (en) Loose distributed deployment method and device for database auditing system
CN115766527A (en) Business analysis system and method based on API gateway inlet and outlet flow under trusted environment
CN110018986B (en) Abnormal snapshot identification method and device
CN115756955A (en) Data backup and data recovery method and device and computer equipment
CN110688350B (en) Method and device for storing logs
CN101383738A (en) Internet interaction affair monitoring method and system
CN114860432A (en) Method and device for determining information of memory fault
CN114338684A (en) Energy management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination