CN116488989A - Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium - Google Patents

Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN116488989A
CN116488989A CN202310428851.5A CN202310428851A CN116488989A CN 116488989 A CN116488989 A CN 116488989A CN 202310428851 A CN202310428851 A CN 202310428851A CN 116488989 A CN116488989 A CN 116488989A
Authority
CN
China
Prior art keywords
interface
preset
access
time
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310428851.5A
Other languages
Chinese (zh)
Inventor
熊傲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202310428851.5A priority Critical patent/CN116488989A/en
Publication of CN116488989A publication Critical patent/CN116488989A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method for monitoring abnormality of interface access data, which comprises the following steps: acquiring interface access data, wherein the interface access data comprises an interface access amount and an interface access success rate; judging whether a rule of abnormality of a preset interface access amount is met or not according to the interface access amount; if the interface access data judges that the rule of the abnormality of the preset interface access quantity is met, early warning is carried out to inform staff and judge whether the rule of the abnormality of the preset interface access success rate is met according to the access success rate; and if the access success rate meets the preset interface access success rate abnormal rule, early warning is carried out to inform staff. The invention improves the working efficiency.

Description

Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium
Technical Field
The present invention relates to the technical field of financial science and technology, and in particular, to a method for monitoring abnormality of access data of an interface, a computer readable storage medium, and a computer device.
Background
With the continuous development of business of companies, the complexity of business systems is gradually increasing; in each link of the business flow, the physical configuration difference between different environments, the design difference of a business system and the diversity of business product designs are different, and after the differences are combined together, unpredictable risk problems can be directly or indirectly generated in the production environment, whether IT operation and maintenance personnel, architecture personnel, development personnel, product designers and testers can only know the risk points in the respective responsible fields, but 100% cognition on the risk of the system is almost impossible, and fault tolerance on all risk links is impossible even if the situation is realized; the method for solving the problems is to monitor the resources in each link in different dimensions through a monitoring alarm system, but how to early warn the problems of key links in advance, and the timeliness of problem investigation and processing is improved through early perception of the problems possibly generated; how to make a treatment scheme in advance before the problem is generated, and enough time is needed to coordinate the analysis of related personnel and solve the problem, it is important to design an effective business monitoring rule, and the effectiveness of monitoring is directly affected.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, a computer storage medium, and a computer device for monitoring an abnormality in access data of an interface, which can improve the working efficiency.
In a first aspect, the present application provides a method for monitoring an abnormality in access data of an interface, where the method includes: acquiring interface access data, wherein the interface access data comprises an interface access amount and an interface access success rate; judging whether a rule of abnormality of a preset interface access amount is met or not according to the interface access amount; if the interface access data judges that the rule of the abnormality of the preset interface access quantity is met, early warning is carried out to inform staff and judge whether the rule of the abnormality of the preset interface access success rate is met according to the access success rate; and if the access success rate meets the preset interface access success rate abnormal rule, early warning is carried out to inform staff.
In a second aspect, the present application provides a computer device for monitoring interface access data for anomalies, the computer device comprising a memory and a processor. And a memory for storing computer program instructions. And the processor is used for executing the computer program instructions to realize the method for monitoring the abnormality of the access data of the interface.
In a third aspect, the present application provides a computer readable storage medium for storing program instructions executable by a processor to implement a method of monitoring access data for anomalies.
In the application, interface access data exception rules are preset in a monitoring system, wherein the interface access data exception rules comprise an interface access quantity exception rule, an interface access success rate exception rule and an interface time-consuming exception rule; the abnormal rule is accessed through the interface, the abnormal rule of the success rate is accessed through the interface, the scene of transaction abnormality is effectively found in time, after a great number of abnormal alarm notices occur, the authenticity and the urgency of the business abnormality are judged through the ring comparison historical failure rate data, and meanwhile, the optimization rule of the business system for abnormality processing is reversely pushed; the performance of the service interface can be monitored through the interface time-consuming abnormal rule, the server resource is updated in time according to the interface time-consuming, the processing capacity of the server and the loading capacity of the service system are reflected through monitoring data under the high concurrency scene, and quantifiable data reference is provided for service logic optimization; when the interface access appears abnormal and accords with the preset abnormal rule in actual operation, the early warning is triggered to enable staff to process, abnormal conditions of the service system are effectively monitored and alarmed, and effective data support is provided for the optimization treatment of the service system.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to the structures shown in these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic architecture diagram of a system for monitoring abnormality of interface access data according to an embodiment of the present application.
Fig. 2 is a flowchart of a method for monitoring abnormality of interface access data according to an embodiment of the present application.
Fig. 3 is a schematic flow chart of step S102 provided in the embodiment of the present application.
Fig. 4 is a schematic flow chart of step S103 provided in the embodiment of the present application.
Fig. 5 is a schematic diagram of an internal structure of a server for monitoring an abnormality in access data of an interface according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present invention.
The terms "first," "second," "third," "fourth" and the like in the description and in the claims of this application and in the above-described figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged under appropriate circumstances, or in other words, the described embodiments may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, may also include other items, such as processes, methods, systems, articles, or apparatus that include a series of steps or elements, are not necessarily limited to only those steps or elements explicitly listed, but may include other steps or elements not explicitly listed or inherent to such processes, methods, articles, or apparatus.
It should be noted that the description herein of "first," "second," etc. is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be regarded as not exist and not within the protection scope of the present application.
The application provides a method for monitoring the abnormality of interface access data, which is operated in a system for monitoring the abnormality of interface access data shown in figure 1, wherein the system can be a Detector, CAT, cacti, nagios, zabbbix, promethenus monitoring platform and the like, and different types of monitoring platforms can be selected according to actual service requirements. The system consists of an application end 1 and a server end 2. The application end 1 is used for displaying a page, receiving the operation of a user on the page, and requesting the interface path corresponding to the operation at the server end 2. And the server side 2 responds to the request, performs data processing and returns the result to the page. The application terminal 1 and the server 2 communicate via a network 3. The server may be implemented as a stand-alone server or as a server cluster formed by a plurality of servers. The application terminal 1 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices.
Referring to fig. 2, fig. 2 is a flowchart of a method for monitoring an abnormality of access data of an interface according to an embodiment of the present application. Including steps S101-S107.
Step S101, obtaining interface access data, wherein the interface access data comprises an interface access amount and an interface access success rate.
When the user performs an operation on the page of the application terminal 1, for example, clicks on an icon, the front end may acquire an interface path of the corresponding back-end processing data to request the back-end to perform data processing. For example, during twenty-one activities of the e-commerce platform, a large amount of interface access is generated, when the back-end successfully processes the access request, the back-end is recorded as the success of the interface access, and the ratio of the successful access request to the total access request number is calculated to obtain the access success rate.
Step S102, judging whether the rule of the abnormality of the preset interface access amount is met or not according to the interface access amount.
When the abnormal increase and decrease of the interface access occurs, the business personnel need to process in time to avoid the abnormal occurrence of the business. The preset interface access volume abnormal rule is a preset trigger alarm rule, the abnormal increase or decrease of interface alarm notification is carried out through the same ratio or ring ratio of interface call volume, the service operation condition is mastered in time, the service growth speed is predicted in advance through the comparison of the statistical data volume, when the abnormal access volume of the interface appears so as to meet the preset interface access volume abnormal rule, the early warning is carried out, the personnel is informed to process the abnormal access volume abnormal rule, the application resource is expanded in time, and the early warning of data support is provided for the service planning in time.
Step S103, if the rule of the abnormal access quantity of the preset interface is judged to be met according to the access quantity of the interface, early warning is carried out to inform staff and judge whether the rule of the abnormal access success rate of the preset interface is met according to the access success rate.
The preset interface access success rate abnormality rule is a preset trigger alarm rule, when the interface access amount is abnormal and meets the rule of the preset access amount abnormality, namely a scene of finding transaction abnormality, after a large number of abnormal alarm notices occur, the reality and the urgency of the business abnormality are judged through the ring ratio historical failure rate data, and meanwhile, the optimization rule of the business system for abnormality processing is reversely pushed.
Step S104, if the access success rate meets the preset interface access success rate abnormal rule, early warning is carried out to inform staff.
When the interface abnormality is judged to meet the interface access success rate abnormality rule, an alarm is given to inform the staff, so that the staff can timely process the abnormality of the service.
Please refer to fig. 3, which is a schematic diagram illustrating a sub-flow of step S102 provided in the embodiment of the present application, including steps S1021-S1025.
And S1021, judging whether the access amount of the interface in the same preset time in the previous week is larger than a preset first value, the access amount of the interface in the same preset time in the current week is lower than a preset second value, and the success rate of the access of the interface in the same time in the current week is lower than a preset third value according to the access amount of the interface.
The preset time is a monitoring time interval and can be adjusted according to the importance of the service, for example, 1 minute, 1 hour and 2 hours; the preset first value is an interface access request quantity in a monitoring interval, for example, a request quantity threshold of one hour is a total access quantity QPS/24 in a whole day of a service system, and the preset second value is the preset first value multiplied by thirty percent; the preset third value is fixed to be 50%, and can be adjusted downwards according to the service importance degree.
For example, the last week had 1 hour of access more than 100 times but currently less than 30 times with a success rate of less than 50%.
Step S1022, if not, judging whether the access amount in the preset time interval exceeds the first access amount in the preset time interval according to the access amount of the interface, but the access amount of the interface in the current time interval does not exceed the second access amount in the preset time interval, and the success rate of the interface access is lower than the first successful value in the preset time interval, and the access amount of the current time is smaller than the third access amount.
The preset hour interval is a monitoring time interval, and can be adjusted according to the importance of the service, for example, 1 minute, 1 hour and 2 hours; the first access amount is an interface access request amount in a monitoring interval, for example, a request amount threshold of a time period is a multiple of a total access amount QPS/24 in a whole day of a service system, and the second access amount is the preset first value multiplied by thirty percent; the first successful value is fixed to be 50% and can be adjusted down according to the importance of the service. The third access amount is ten times as large as the request amount of the one period.
For example, the first 3 hours access more than 10 times but currently less than 3 times with a success rate of less than 50% and the current 1 hour access times less than 100.
Step S1023, if not, judging whether the first interface access amount in the preset long time period is larger than the first access value in the preset long time period according to the interface access amount, and reducing the first interface access amount by a preset reduction value compared with the first interface access amount in the same preset long time period in the last week.
The preset first access value is seven times of the daily interface access amount of the service system, and the preset value is adjusted according to the importance of the service.
For example, the number of requests is reduced by 80% from the last week and the number of contemporaneous requests is greater.
Step S1024, if not, judging whether the second interface access amount in the preset long time period is larger than the second access value in the preset long time period according to the interface access amount, and the second interface access amount in the preset long time period which is the same as the previous week is increased by a preset increase value;
the preset increment value is adjusted according to the service, and the second access value for a preset long time is a multiple of the total access amount.
For example, the visit rises 500% and more than 10w over the week.
Step S1025, if not, obtaining transaction amount data and judging whether the transaction amount data value is always zero in the preset transaction time according to the interface access amount, wherein the access amount at the same time in the previous preset days exceeds the preset access amount.
The preset transaction time, the preset days and the preset access amount are all adjusted according to the business importance. The preset transaction time is lower according to the higher threshold value of the service importance, the preset days are lower according to the higher threshold value of the service importance, and the preset access amount is lower according to the higher threshold value of the service importance.
For example, the transaction amount drops to zero for 3 hours and is accessed more than 5 times contemporaneously within 7 days of history.
Please refer to fig. 5, which is a schematic diagram of a sub-flow of step S103 provided in the embodiment of the present application, including steps S1031-S1033.
Step S1031, judging whether the access success rate value of the interface within a preset period of time is lower than the preset access success rate value or not according to the access success rate, wherein the access quantity of the interface is larger than the preset first access value;
the preset period of time is adjusted according to the importance of the service and can be one minute, one hour, two hours and the like; the success value of the preset access rate is adjusted downwards according to the importance degree of the service; the preset first access value is the interface access request quantity in the monitoring interval, for example, the request quantity threshold value of one hour is the total access quantity QPS/24 in the whole day of the service system.
For example, the power is less than 30% and the number of requests is greater than 500 in 1 minute.
Step S1032, if not, judging whether the access success rate value of the same time in the week is lower than the access success rate value of the same time in the week by a preset first decline value according to the access success rate, wherein the access success rate of the same time in the week is greater than the preset first probability value, and the request value in the current hour is greater than the preset second access value;
the first drop value is adjusted downwards according to the business importance degree, and the first drop value is smaller than fifty percent; the first probability value is adjusted upwards according to the service importance degree and is more than fifty percent; the second access value is preset by a worker.
For example, the success rate is reduced by 40% compared with the upper week, the original success rate is more than 50%, and the current request number is more than 100
Step S1033, if not, judging whether the access success rate is lower than the access success rate value of the previous hour by a preset second decline value, wherein the current success rate is greater than the preset second probability value, and the request number in the current hour is greater than the preset third access value.
The preset second drop value is adjusted upwards according to the service importance degree, and the preset second drop value is smaller than fifty percent; the preset second probability value is adjusted upwards according to the service importance degree, and the preset second probability value is more than fifty percent; the second access value is preset by a worker.
For example, the success rate loop drops 40% less than the previous hour and the original success rate is greater than 50% and the current request count is greater than 100.
In real life, the performance of the interface has time-consuming phenomenon, the performance of the service interface can be monitored through the rule index for monitoring the interface performance time consumption, the server resource is updated in time according to the interface time consumption, the processing capacity of the server and the load capacity of the service system are reflected through monitoring data under a high concurrency scene, and quantifiable data reference is provided for service logic optimization.
Judging whether the interface time consumption data meet the condition that the interface access quantity of which the interface time consumption data is larger than a preset interface time consumption value is larger than a preset fourth access value in the preset first interface time consumption time or not according to the interface time consumption data;
the preset time consuming time of the first interface adjusts a monitoring time interval, such as one minute, one hour and the like, according to the business importance; the preset interface time consumption value is the tolerable maximum time consumption according to the single interface design of the service system.
For example, an API request takes more than 4900 milliseconds for more than 30 requests in 1 minute.
Judging whether the interface time consumption data meet the condition that in the time consumption time of the preset second interface, the interface access quantity of the interface time consumption data larger than the preset interface time consumption data is larger than the preset proportion, and the interface access quantity is larger than the preset fifth access value.
The preset proportion is adjusted downwards according to the important adjustment of the interface.
For example, the proportion of API requests that take more than 4900 milliseconds within 1 minute is greater than 30% and the minimum number of requests is greater than 30.
Judging whether the time consumption time of the interface rises by a preset time consumption probability compared with the previous year within a preset time consumption time of the third interface according to the time consumption data, wherein the time consumption time is larger than a preset time consumption value, and the access quantity of the interface is larger than a preset sixth access value;
the higher the importance of the service interface is, the lower the preset time consumption probability is.
For example, the loop ratio takes 500% in 1 minute and takes more than 2000ms and the number of requests is more than 30.
Judging whether the time consumption data meet the condition that the average time consumption of the interface access amount is larger than the preset average time consumption within the preset time consumption time of the third interface or not, and the interface access amount is larger than a preset sixth access value or not.
The preset average time is the number of services that the system can handle per second multiplied by 100.
For example, requests take more than 3 seconds on average and the number of requests is greater than 100.
Fig. 5 is a schematic diagram of an internal structure of a server for monitoring an abnormality of access data of an interface according to an embodiment of the present application. The server 200 monitoring interface access data for anomalies is used for control, and the computer device 200 includes a processor 201, and a memory 202. The processor 201 is configured to execute an executable program to implement the method for monitoring the abnormality of the interface access data provided in the above embodiment, and the memory 202 is configured to store the computer executable program and the system for monitoring the abnormality of the interface access data provided in the above embodiment.
The processor 201 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chip in some embodiments for executing computer executable programs stored in the memory 202. Specifically, the processor 201 executes an executable program to implement the method for monitoring the interface access data for anomalies provided in the above embodiment.
Memory 202 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. Memory 202 may be an internal storage unit of computer device 200 in some embodiments, such as a hard disk of computer device 200. The memory 202 may also be an external computer device 200 storage device in other embodiments, such as a plug-in hard disk, smart Media Card (SMC), secure Digital (SD) Card, flash memory Card (Flash Card) or the like, provided on the computer device 200. Further, the memory 202 may also include both internal storage units and external storage devices of the computer device 200. The memory 202 may be used not only for storing application software installed in the computer device 200 and various types of data, for example, code or the like implementing a method of monitoring the occurrence of an abnormality in the interface access data, but also for temporarily storing data that has been output or is to be output and a module of a system in which the abnormality in the interface access data has occurred.
The computer device 200 also includes a bus 203. The bus 203 may be a peripheral component interconnect standard (peripheral component interconnect, PCI) bus, or an extended industry standard architecture (extended industry standard architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. For ease of illustration purposes,
only one thick line is shown in fig. 5, but not only one bus or one type of bus, and further, the computer device 200 may also include a display component 204. The display assembly 204 may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display component 204 may also be referred to as a display device or display unit, as appropriate, for displaying information processed in the computer device 200 and for displaying a visual user interface.
Further, the computer device 200 can also include a communication component 205. The communication component 205 can optionally include a wired communication component and/or a wireless communication component (e.g., WI-FI communication component, bluetooth communication component, etc.), typically used to establish a communication connection between the computer device 200 and other computer devices.
Fig. 5 illustrates only a computer device 200 having partial components and implementing a method of monitoring interface access data for anomalies, and those skilled in the art will appreciate that the structure illustrated in fig. 5 is not limiting of computer device 200 and may include fewer or more components than illustrated, or may combine certain components, or a different arrangement of components.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the invention, in whole or in part. The computer device may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be stored by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), etc.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, apparatuses, and methods may be implemented in other ways. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random-access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or the like, which can store program codes.
It should be noted that, the foregoing reference numerals of the embodiments of the present invention are merely for describing the embodiments, and do not represent the advantages and disadvantages of the embodiments. And the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, apparatus, article, or method that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, apparatus, article, or method. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, apparatus, article or method that comprises the element.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. A method for monitoring interface access data for anomalies, the method comprising:
acquiring interface access data, wherein the interface access data comprises an interface access amount and an interface access success rate;
judging whether a rule of abnormality of a preset interface access amount is met or not according to the interface access amount;
if the rule meeting the abnormality of the preset interface access amount is judged according to the interface access amount, early warning is carried out to inform staff and judge whether the rule meeting the abnormality of the preset interface access success rate is met according to the access success rate;
and if the access success rate meets the preset interface access success rate abnormal rule, early warning is carried out to inform staff.
2. The method of monitoring interface access data for anomalies as recited in claim 1, wherein the interface access data further comprises interface time consuming data, the method further comprising:
judging whether a rule of abnormal interface time consumption is met or not according to the interface time consumption data;
and if the interface time consumption data is used for judging whether the rule of the preset interface time consumption abnormality is met, early warning is carried out to inform staff.
3. The method for monitoring the abnormality of the interface access data according to claim 1, wherein the rule for judging whether the abnormality of the preset interface access amount is satisfied according to the interface access amount comprises:
judging whether the interface access amount in the same preset time in the previous week is larger than a preset first value or not according to the interface access amount, wherein the interface access amount in the same preset time in the current week is lower than a preset second value, and the success rate of the interface access in the same time in the current week is lower than a preset third value or not;
if not, judging whether the interface access amount in the preset time interval exceeds the first access amount in the preset time interval according to the interface access amount, but the interface access amount in the current time interval does not exceed the second access amount in the preset time interval, and the success rate of the interface access is lower than the first successful value in the preset time interval, and the current access amount in one hour is smaller than the third access amount;
if not, judging whether the first interface access amount in the preset long time period is larger than the first access value in the preset long time period according to the interface access amount, and reducing the first interface access amount by a preset reduction value compared with the first interface access amount in the same preset long time period in the last week.
4. The method for monitoring the abnormality of the interface access data according to claim 1, wherein the rule for judging whether the abnormality of the preset interface access amount is satisfied according to the interface access amount further comprises:
if not, judging whether the second interface access amount in the preset long-time period is larger than a second access value in the preset long-time period according to the interface access amount, and increasing the second interface access amount by a preset increase value compared with the second interface access amount in the same preset long-time period in the last week;
if not, acquiring transaction amount data, judging whether the transaction amount data value is zero in preset transaction time according to the interface access amount, and enabling the access amount at the same time in the preset days to exceed the preset access amount.
5. The method for monitoring the abnormality of the access data of the interface according to claim 1, wherein the determining whether the preset interface access success rate abnormality rule is satisfied according to the access success rate comprises:
judging whether the access success rate value of the interface within a preset period of time is lower than the preset access success rate value or not according to the access success rate, wherein the access quantity of the interface is larger than a preset first access value;
if not, judging whether the access success rate value at the same time in the week is lower than the access success rate value at the same time in the previous week by a preset first decline value according to the access success rate, wherein the access success rate at the same time in the week is greater than the preset first probability value, and the request value in the current hour is greater than the preset second access value;
if not, judging whether the access success rate is lower than the access success rate value of the previous hour by a preset second decline value or not according to the access success rate, wherein the current success rate is larger than the preset second probability value, and the request number in the current hour is larger than the preset third access value.
6. The method for monitoring the interface access data for anomalies according to claim 2, wherein the determining whether the preset interface time-consuming anomaly rule is satisfied according to the interface time-consuming data comprises:
judging whether the interface time consumption data meet the condition that the interface access quantity of which the interface time consumption data is larger than a preset interface time consumption value is larger than a preset fourth access value in the preset first interface time consumption time or not according to the interface time consumption data;
judging whether the interface time consumption data meet the condition that in the time consumption time of the preset second interface, the interface access quantity of the interface time consumption data larger than the preset interface time consumption data is larger than the preset proportion, and the interface access quantity is larger than the preset fifth access value.
7. The method for monitoring the interface access data for anomalies according to claim 6, wherein the determining whether the preset interface time-consuming anomaly rule is satisfied according to the interface time-consuming data further comprises:
judging whether the time consumption time of the interface rises by a preset time consumption probability compared with the previous year within a preset time consumption time of the third interface according to the time consumption data, wherein the time consumption time is larger than a preset time consumption value, and the access quantity of the interface is larger than a preset sixth access value;
judging whether the time consumption data meet the condition that the average time consumption of the interface access amount is larger than the preset average time consumption within the preset time consumption time of the third interface or not, and the interface access amount is larger than a preset sixth access value or not.
8. The method for monitoring abnormal access data of an interface according to claim 6, wherein the time consuming time of the preset first interface is adjustable according to the importance of the service corresponding to the interface.
9. A computer device for monitoring interface access data for anomalies, the computer device comprising:
a memory for storing computer program instructions;
a processor for executing the computer program instructions to implement the method of monitoring interface access data for anomalies as claimed in any one of claims 1 to 8.
10. A computer readable storage medium storing program instructions executable by a processor to implement a method of monitoring interface access data for anomalies according to any one of claims 1 to 8.
CN202310428851.5A 2023-04-13 2023-04-13 Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium Pending CN116488989A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310428851.5A CN116488989A (en) 2023-04-13 2023-04-13 Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310428851.5A CN116488989A (en) 2023-04-13 2023-04-13 Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN116488989A true CN116488989A (en) 2023-07-25

Family

ID=87226314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310428851.5A Pending CN116488989A (en) 2023-04-13 2023-04-13 Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN116488989A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116647572A (en) * 2023-07-26 2023-08-25 腾讯科技(深圳)有限公司 Access endpoint switching method, device, electronic equipment and storage medium
CN117195273A (en) * 2023-11-07 2023-12-08 闪捷信息科技有限公司 Data leakage detection method and device based on time sequence data anomaly detection

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116647572A (en) * 2023-07-26 2023-08-25 腾讯科技(深圳)有限公司 Access endpoint switching method, device, electronic equipment and storage medium
CN116647572B (en) * 2023-07-26 2023-11-14 腾讯科技(深圳)有限公司 Access endpoint switching method, device, electronic equipment and storage medium
CN117195273A (en) * 2023-11-07 2023-12-08 闪捷信息科技有限公司 Data leakage detection method and device based on time sequence data anomaly detection
CN117195273B (en) * 2023-11-07 2024-02-06 闪捷信息科技有限公司 Data leakage detection method and device based on time sequence data anomaly detection

Similar Documents

Publication Publication Date Title
CN116488989A (en) Method for monitoring abnormality of interface access data, computer equipment and computer readable storage medium
CN112965874B (en) Configurable monitoring alarm method and system
US10523580B2 (en) Automatic cloud provisioning based on related internet news and social network trends
CN109960635B (en) Monitoring and alarming method, system, equipment and storage medium of real-time computing platform
CN105095056A (en) Method for monitoring data in data warehouse
CN109992473B (en) Application system monitoring method, device, equipment and storage medium
CN109669835B (en) MySQL database monitoring method, device, equipment and readable storage medium
CN113704065A (en) Monitoring method, device, equipment and computer storage medium
CN112015618A (en) Abnormity warning method and device
CN112286770A (en) Alarm notification method, device, computer equipment and storage medium
CA3142771A1 (en) Method of and device for monitoring business data, method of and device for generating rule data, and system
CN112100034A (en) Service monitoring method and device
CN111585785A (en) Method and device for shielding alarm information, computer equipment and storage medium
CN115328733A (en) Alarm method and device applied to business system, electronic equipment and storage medium
CN110457255B (en) Method, server and computer readable storage medium for archiving data
CN114978867A (en) Alarm notification method, device, equipment and storage medium
US20190013091A1 (en) Diabetes management system with alert status interface and patient prioritization
CN110677271B (en) Big data alarm method, device, equipment and storage medium based on ELK
CN111753191A (en) Advertisement popup intercepting method and device, electronic equipment and storage medium
CN115277588B (en) Fusing current limiting system based on middle platform system
WO2020000724A1 (en) Method, electronic device and medium for processing communication load between hosts of cloud platform
CN109815080A (en) The 3 D monitoring method and device thereof of computer equipment
CN113946493A (en) Monitoring threshold determination and monitoring alarm method, device, equipment and medium
CN109508356B (en) Data abnormality early warning method, device, computer equipment and storage medium
CN113824590A (en) Method for predicting problem of micro service network, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination