CN116760697B - Network equipment risk monitoring method, computer equipment and computer storage medium - Google Patents

Network equipment risk monitoring method, computer equipment and computer storage medium Download PDF

Info

Publication number
CN116760697B
CN116760697B CN202310848153.0A CN202310848153A CN116760697B CN 116760697 B CN116760697 B CN 116760697B CN 202310848153 A CN202310848153 A CN 202310848153A CN 116760697 B CN116760697 B CN 116760697B
Authority
CN
China
Prior art keywords
equipment
slot
identifier
network
initial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310848153.0A
Other languages
Chinese (zh)
Other versions
CN116760697A (en
Inventor
周磊
赵时晴
姜双林
王自强
隋洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Andi Technology Co ltd
Original Assignee
Beijing Andi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Andi Technology Co ltd filed Critical Beijing Andi Technology Co ltd
Priority to CN202310848153.0A priority Critical patent/CN116760697B/en
Publication of CN116760697A publication Critical patent/CN116760697A/en
Application granted granted Critical
Publication of CN116760697B publication Critical patent/CN116760697B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/082Configuration setting characterised by the conditions triggering a change of settings the condition being updates or upgrades of network functionality

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Embodiments of the present disclosure disclose a network device risk monitoring method, a computer device, and a computer storage medium. One embodiment of the method comprises the following steps: according to the equipment slot identification, updating the initial equipment slot information sequence pointed by the target pointer to generate an updated equipment slot information sequence; determining a target equipment slot identifier by using the equipment slot identifier; selecting a device identification group corresponding to the target device slot identification from each device identification group included in the updated device slot information sequence as a target device identification group; performing network test on the offline equipment corresponding to each target equipment identifier in the target equipment identifier group to generate a network test result, thereby obtaining a network test result group; and determining the offline equipment corresponding to the network test result which represents the network abnormality in the network test result group as abnormal network equipment to obtain an abnormal network equipment group. The embodiment can test the off-line network equipment and avoid influencing the normal execution of the service/task.

Description

Network equipment risk monitoring method, computer equipment and computer storage medium
Technical Field
Embodiments of the present disclosure relate to the field of network devices, and in particular, to a network device risk monitoring method, a computer device, and a computer storage medium.
Background
Each network device may be assigned a different service/task (e.g., VMS visualization micro-service), and when the network device is abnormal, the services of the network device need to be assigned to other online normal terminal devices. Currently, for risk monitoring and service allocation of network devices, the following methods are generally adopted: during the operation of the network device, the abnormal network device is identified, and then the service of the network device is distributed to other on-line normal terminal devices. However, with the above method, there are generally the following technical problems: 1. during the running process of the network equipment, the abnormal network equipment is identified, the normal execution of the service/task is easily affected, and the calculation resources are wasted; 2. the online equipment is tested, the testing efficiency is low, the normal execution of the service/task is easily affected, and the testing time is long.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a network device risk monitoring method, a computer device and a computer-readable storage medium to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a network device risk monitoring method, the method comprising: acquiring an equipment slot identifier pointed by a target pointer currently; acquiring initial equipment slot information of each equipment slot corresponding to the target pointer, and obtaining an initial equipment slot information sequence; constructing an equipment mapping information table according to the initial equipment slot information sequence; and according to the equipment slot identifier, carrying out update processing on the initial equipment slot information sequence pointed by the target pointer to generate an updated equipment slot information sequence, wherein update queue slot information in the updated equipment slot information sequence comprises: a device identification group; determining a target equipment slot identifier by using the equipment slot identifier; selecting a device identifier group corresponding to the target device slot identifier from the device identifier groups included in the updated device slot information sequence as a target device identifier group; performing network test on the offline device corresponding to each target device identifier in the target device identifier group to generate a network test result, thereby obtaining a network test result group; and determining the offline equipment corresponding to the network test result which represents the network abnormality in the network test result group as abnormal network equipment to obtain an abnormal network equipment group.
In a second aspect, the present disclosure also provides a computer device comprising a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program, when executed by the processor, implements a method as described in any of the implementations of the first aspect.
In a third aspect, the present disclosure also provides a computer readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, implements a method as described in any of the implementations of the first aspect.
The above embodiments of the present disclosure have the following advantageous effects: by the network equipment risk monitoring method of some embodiments of the present disclosure, the waste of computing resources is avoided. Firstly, acquiring an equipment slot identifier pointed by a target pointer at present; and acquiring initial equipment slot information of each equipment slot corresponding to the target pointer, and obtaining an initial equipment slot information sequence. And secondly, constructing a device mapping information table according to the initial device slot information sequence. And then, according to the equipment slot identification, carrying out updating processing on the initial equipment slot information sequence pointed by the target pointer so as to generate an updated equipment slot information sequence. Wherein the updating queue slot information in the updating equipment slot information sequence comprises: the device identifies the group. Thus, a device slot information sequence may be obtained for subsequent identification of offline devices by the device slot information sequence. And then, determining the target equipment slot identification by using the equipment slot identification. Thus, the device slot pointed by the next position of the pointer can be obtained according to the device slot pointed by the current position of the pointer. Then, a device identifier group corresponding to the target device slot identifier is selected from the respective device identifier groups included in the updated device slot information sequence as a target device identifier group. Thus, the target device identification group can be obtained from the device slot information sequence for subsequent identification of the offline device. And then, performing network test on the offline equipment corresponding to each target equipment identifier in the target equipment identifier group to generate a network test result, thereby obtaining a network test result group. Thus, each off-line device can be identified. Thus, the device slot information sequence may be used instead of the database to traverse, with less data traversing the device slot information sequence, no matter how many network devices are. Thus, the time to identify the offline device can be reduced. And because the network test can be performed on the identified offline equipment, the influence on the normal execution of the service/task is avoided, and the waste of computing resources is avoided. And finally, determining the offline equipment corresponding to the network test result which represents the network abnormality in the network test result group as abnormal network equipment to obtain an abnormal network equipment group. Therefore, the offline network equipment can be tested, and the influence on the normal execution of the service/task is avoided.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a flow chart of some embodiments of a network device risk monitoring method according to the present disclosure;
FIG. 2 is a schematic diagram of one scenario of an initial device slot information sequence in a network device risk monitoring method according to the present disclosure;
fig. 3 is a schematic block diagram of a computer device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a flow chart of some embodiments of a network device risk monitoring method according to the present disclosure. A flow 100 of some embodiments of a network device risk monitoring method according to the present disclosure is shown. The risk monitoring method of the network equipment comprises the following steps:
step 101, obtaining the device slot identifier pointed by the target pointer currently.
In some embodiments, the execution entity (e.g., computing device) of the network device risk monitoring may obtain, from the terminal device, by way of a wired connection or a wireless connection, the device slot identification to which the target pointer is currently directed. The device slot identification may uniquely identify the device slot to which a pointer points.
Step 102, obtaining the initial equipment slot information of each equipment slot corresponding to the target pointer, and obtaining an initial equipment slot information sequence.
In some embodiments, the execution body may acquire initial device slot information of each device slot corresponding to the target pointer, to obtain an initial device slot information sequence. The initial equipment slot information in the initial equipment slot information sequence may include, but is not limited to: device slot identification, device identification group. For example, the device slot identification may be: 1. 2, 3. The device identifications in the device identification group may be a, b, c.
And 103, constructing a device mapping information table according to the initial device slot information sequence.
In some embodiments, the executing body may construct a device mapping information table according to the initial device slot information sequence.
In an actual application scenario, the execution body may construct the device mapping information table by:
first, obtain the equipment identification of each network device, get the equipment identification sequence.
Second, for each device identifier in the above-described sequence of device identifiers, the following determination step is performed:
1. and determining the equipment slot information corresponding to the equipment identifier in the initial equipment slot information sequence as mapping equipment slot information.
2. And determining the equipment identification and the equipment slot identification included in the mapping equipment slot information as equipment mapping information.
Thirdly, constructing a device mapping information table according to the determined device mapping information. For example, a device mapping information empty table may be created, and then each device mapping information may be added to the device mapping information empty table to obtain a device mapping information table.
And 104, carrying out updating processing on the initial equipment slot information sequence pointed by the target pointer according to the equipment slot identifier so as to generate an updated equipment slot information sequence.
In some embodiments, the execution body may update the initial device slot information sequence pointed to by the target pointer according to the device slot identifier, so as to generate an updated device slot information sequence. Wherein the updating queue slot information in the updating equipment slot information sequence comprises: the device identifies the group. Here, the device identifications in the device identification group may uniquely identify a network device. The network device may be a device running services/tasks. The offline device may be a network device in which an abnormal situation such as power outage/network outage occurs. The device slot identification may uniquely identify the device slot to which a pointer points. For example, the initial device slot information sequence may refer to a schematic diagram of one of the initial device slot information sequences shown in fig. 2. Among them, the equipment slots may refer to the equipment slots 201, 202, 203, 204 shown in fig. 2. Each device slot may have a set of device identifications stored thereon. The target pointer may refer to the target pointer 205 shown in fig. 2. The device slot identification of the target pointer may characterize that the target pointer 205 points to the device slot 204. The initial device slot information sequence pointed to by the target pointer may be the initial device slot information sequence 200.
In an actual application scenario, the execution body may update the initial device slot information sequence pointed to by the target pointer to generate an updated device slot information sequence by:
first, in response to receiving heartbeat information sent by any network device, according to the device slot identifier and the heartbeat information, updating an initial device slot information sequence pointed by the target pointer to generate an updated device slot information sequence. The heartbeat information may represent information that the network device is online.
First, the device mapping information corresponding to the above-described heartbeat information in the associated device mapping information table is determined as the initial device mapping information. Wherein, the initial device mapping information includes: initial equipment slot identification. The initial device mapping information further includes: and (5) device identification. The associated device mapping information table may be a device mapping information table corresponding to the initial device slot information sequence pointed to by the target pointer.
And then, deleting the equipment identification corresponding to the heartbeat information in the equipment identification group corresponding to the initial equipment slot identification, which is included in the initial equipment slot information sequence, in response to the fact that the initial queue slot identification included in the initial equipment mapping information is not empty.
Next, the device identifier corresponding to the heartbeat information is determined as a candidate device identifier.
Then, the candidate device identifier is added to a device identifier group corresponding to the device slot identifier included in the initial device slot information sequence.
And finally, determining the initial equipment slot information sequence as an updated equipment slot information sequence.
Second, in response to not receiving the heartbeat information, determining the initial device slot information sequence pointed by the target pointer as an updated device slot information sequence.
Optionally, the device slot identifier is determined as a device slot identifier corresponding to the heartbeat information included in the device mapping information table.
And step 105, determining the target equipment slot identification by using the equipment slot identification.
In some embodiments, the executing entity may determine the target device slot identifier using the device slot identifier.
In an actual application scenario, the execution body may determine the target device slot identifier by:
first, determining the sum of the value corresponding to the equipment slot identifier and a first preset value as a first equipment slot identifier. Here, the first preset value may be 2.
Second, in response to determining that the first equipment slot identifier meets a preset condition, determining the preset identifier as a target equipment slot identifier. Here, the preset condition may be that the value of the first equipment slot identifier is greater than or equal to the number of pieces of initial equipment slot information included in the initial equipment slot information sequence. The preset identity may be 1. As shown in fig. 2, the initial equipment slot information sequence includes 4 pieces of initial equipment slot information. The target pointer 205 points to the queue slot 204. The target device slot identification may characterize the next pointing device slot 201 of the target pointer 205.
Third, in response to determining that the first equipment slot identifier does not meet the preset condition, determining the first equipment slot identifier as a target equipment slot identifier.
And 106, selecting a device identification group corresponding to the target device slot identification from the device identification groups included in the updated device slot information sequence as a target device identification group.
In some embodiments, the executing body may select, as the target device identification group, a device identification group corresponding to the target device slot identification from respective device identification groups included in the updated device slot information sequence. In an actual scenario, a device identifier group including the same device identifier as the target device slot identifier may be selected from the respective device identifier groups included in the updated device slot information sequence as the target device identifier group.
Optionally, for each target device identifier in the target device identifier group, deleting a device slot identifier corresponding to the target device identifier in the device mapping information table.
In some embodiments, the executing body may delete, for each target device identifier in the target device identifier group, a device slot identifier corresponding to the target device identifier in the device mapping information table. Wherein, the device mapping information in the device mapping information table includes: device slot identification.
Optionally, updating the equipment slot information corresponding to the target equipment slot identifier in the equipment slot information sequence.
In some embodiments, the executing body may update the device slot information corresponding to the target device slot identifier in the device slot information sequence. The device identification empty group may be determined as a device identification group included in the device slot information corresponding to the target device slot identification in the device slot information sequence.
And 107, performing network test on the offline device corresponding to each target device identifier in the target device identifier group to generate a network test result, thereby obtaining a network test result group.
In some embodiments, the executing body may perform network testing on the offline device corresponding to each target device identifier in the target device identifier group, so as to generate a network test result, and obtain a network test result set. Network testing may include, but is not limited to: network delay testing, network connection testing, network communication testing. It is envisioned that no limitation is placed on the actual operating procedures of network testing. For example, the network device may be tested by a network tester. The network test results may indicate whether the network device is network anomalous.
In another application scenario, the execution body may perform network testing on the offline device corresponding to each target device identifier in the target device identifier group by the following steps to generate a network test result:
first, according to the web page configuration information of the test web page corresponding to the test application, the test application is installed in the offline device. The webpage configuration information comprises webpage links corresponding to the test application. The test application may be any application program that needs to be subjected to offline loading test. The test web page may be a page displayed in the test application. For example, the test web page may be a page that characterizes a preset test task. The preset test task may be a task of a page click test/page skip test. The web page configuration information may be configuration related information when testing web pages of a pre-configured test application. The web page configuration information may include web page links of the test web page described above. The web page links may be represented by uniform resource locators (Uniform Resource Locator, URLs). The web page configuration information may also include, but is not limited to: triggering user information and executing offline equipment types. The trigger user information may be information about a user who is triggering an offline loading test of the test web page of the test application. Triggering user information may include, but is not limited to: and (5) user identification. The type of offline device executing the offline loading test may be the type of offline device executing the offline loading test. First, in response to determining that the web page configuration information of the test web page corresponding to the test application is received, it may be determined whether the type of the executing offline device included in the web page configuration information is the same as the type of the current offline device. The current offline device type may be the type of system of the offline device described above. Then, in response to determining that the type of the executing offline device is the same as the current offline device type, and that the offline device does not install the test application, a version of the test application corresponding to the executing offline device type may be installed on the offline device.
Second, obtaining offline equipment configuration information corresponding to the test web page through the installed test application. The offline device configuration information may be configuration related information of a pre-configured test web page when the offline device is loaded. Offline device configuration information may include, but is not limited to: check information, login state information and download information. The verification information may be information related to a real-time update mechanism of the resource to be loaded. The resources to be loaded may include, but are not limited to: html, css, pictures. The verification information may include: and the identification of each resource to be loaded. The login state information may be information of a login state to be synchronized. The login state information may include various login states to be synchronized. The downloading information can be time related information that the resource to be loaded needs to be downloaded. For example, the download information may be, but is not limited to: entering download (e.g., entering test application and downloading), starting application waits for download (after starting test application, downloading for a preset period of time), entering page download for the first time (entering test page and downloading). In practice, the executing body may read the offline device configuration information issued by the interface through the web page link.
Thirdly, loading the test web page on line in the installed test application by utilizing the web page link and the offline equipment configuration information so as to collect a web page on-line loading log. The web page links may be accessed in the test application to load the test web page online in the test application, and a web page online load log may be collected when the test web page is loaded. The execution body may further download the resource to be loaded corresponding to the test web page to the offline device in response to determining that the current time is the time corresponding to the download information. The execution body may further determine the updated login state as the login state of the test web page in response to determining that the login state of the test application is updated and that the login state information includes the updated login state. The execution body may further store the updated resource to be loaded locally in response to determining that the resource to be loaded of the test application is updated, and the verification information includes an identification of the updated resource to be loaded. The web page online load log may include load time consuming.
Fourth, according to the configuration information of the offline device, the test web page is loaded offline in the installed test application, so as to collect the offline loading log of the web page. In practice, the executing body may load the test web page offline in the installed test application according to the static resource corresponding to the test web page stored in the offline device in response to the current time being greater than the time corresponding to the downloading opportunity information, and may collect the offline loading log of the web page.
Fifthly, summarizing the webpage online loading log and the webpage offline loading log to obtain the loading test log of the test webpage. The web page online loading log and the web page offline loading log can be combined into a loading test log of the test web page.
Sixth, according to the loading test log, generating a network test result. The load test log may be determined as a network test result.
For the test on the online equipment mentioned in the background art, the test efficiency is lower, the normal execution of the service/task is easily affected, and the test time is longer. ". The method can be solved by the following steps: firstly, installing the test application in the offline equipment according to the webpage configuration information of the test webpage corresponding to the test application. The webpage configuration information comprises webpage links corresponding to the test application. Therefore, the test application can be installed on the offline equipment according to the configuration information of the test webpage of the pre-configured test application so as to construct a basic software environment for offline test. And secondly, acquiring offline equipment configuration information corresponding to the test webpage through the installed test application. Thus, the application can acquire the configuration related information of the test webpage when being loaded. And then, loading the test webpage on line in the installed test application by using the webpage link and the offline equipment configuration information so as to collect a webpage on-line loading log. Thus, the test web page can be loaded on line in the test application in advance, so that a log of the on-line loading of the test web page can be collected, and the static resources can be cached in the off-line device in advance. And then, according to the offline equipment configuration information, the test webpage is loaded offline in the installed test application so as to collect a webpage offline loading log. Thus, the test web page can be loaded on the offline device after the test web page is loaded on line, so as to collect the log of the test web page loaded on line. And then, summarizing the webpage online loading log and the webpage offline loading log to obtain the loading test log of the test webpage. Therefore, the test problems of the offline loading test web page can be positioned through the summarized loading test logs. The offline loading test operation is simplified. And finally, generating a network test result according to the loading test log. Therefore, the offline equipment can be tested, the testing efficiency is improved, and the influence on the normal execution of the service/task is avoided.
And step 108, determining the offline equipment corresponding to the network test result which represents the network abnormality in the network test result group as abnormal network equipment, and obtaining an abnormal network equipment group.
In some embodiments, the executing body may determine, as the abnormal network device, an offline device corresponding to the network test result that indicates the network abnormality in the network test result group, and obtain the abnormal network device group.
Fig. 3 is a schematic block diagram of a structure of a computer device according to an embodiment of the disclosure. The computer device may be a terminal.
As shown in fig. 3, the computer device includes a processor, a memory, and a network interface connected by a system bus, wherein the memory may include a non-volatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program comprises program instructions that, when executed, cause the processor to perform any of a number of network device risk monitoring methods.
The processor is used to provide computing and control capabilities to support the operation of the entire computer device.
The internal memory provides an environment for the execution of a computer program in a non-volatile storage medium that, when executed by a processor, causes the processor to perform any of a number of network device risk monitoring methods.
The network interface is used for network communication such as transmitting assigned tasks and the like. Those skilled in the art will appreciate that the structures shown in FIG. 3 are only block diagrams of portions of structures associated with the disclosed aspects and are not limiting as to the computer device on which the disclosed aspects may be implemented, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
It should be appreciated that the processor may be a central processing unit (Central Processing Unit, CPU), but may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field-programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. Wherein the general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of: acquiring an equipment slot identifier pointed by a target pointer currently; acquiring initial equipment slot information of each equipment slot corresponding to the target pointer, and obtaining an initial equipment slot information sequence; constructing an equipment mapping information table according to the initial equipment slot information sequence; and according to the equipment slot identifier, carrying out update processing on the initial equipment slot information sequence pointed by the target pointer to generate an updated equipment slot information sequence, wherein update queue slot information in the updated equipment slot information sequence comprises: a device identification group; determining a target equipment slot identifier by using the equipment slot identifier; selecting a device identifier group corresponding to the target device slot identifier from the device identifier groups included in the updated device slot information sequence as a target device identifier group; performing network test on the offline device corresponding to each target device identifier in the target device identifier group to generate a network test result, thereby obtaining a network test result group; and determining the offline equipment corresponding to the network test result which represents the network abnormality in the network test result group as abnormal network equipment to obtain an abnormal network equipment group.
Embodiments of the present disclosure further provide a computer readable storage medium, where a computer program is stored on the computer readable storage medium, where the computer program includes program instructions, where a method implemented when the program instructions are executed may refer to embodiments of a risk monitoring method of a network device of the present disclosure.
The computer readable storage medium may be an internal storage unit of the computer device according to the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may be an external storage device of the computer device, for example, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present disclosure are merely for description and do not represent advantages or disadvantages of the embodiments. While the invention has been described with reference to certain preferred embodiments, it will be apparent to one skilled in the art that various changes and substitutions can be made herein without departing from the spirit and scope of the invention as defined by the appended claims. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (5)

1. A method for risk monitoring of a network device, the method comprising:
acquiring an equipment slot identifier pointed by a target pointer currently;
acquiring initial equipment slot information of each equipment slot corresponding to the target pointer, and obtaining an initial equipment slot information sequence;
constructing an equipment mapping information table according to the initial equipment slot information sequence;
and according to the equipment slot identifier, carrying out update processing on an initial equipment slot information sequence pointed by the target pointer to generate an updated equipment slot information sequence, wherein update queue slot information in the updated equipment slot information sequence comprises: a device identification group;
determining a target equipment slot identifier by using the equipment slot identifier;
selecting a device identification group corresponding to the target device slot identification from each device identification group included in the updated device slot information sequence as a target device identification group;
performing network test on the offline equipment corresponding to each target equipment identifier in the target equipment identifier group to generate a network test result, thereby obtaining a network test result group;
determining offline equipment corresponding to the network test result which represents network abnormality in the network test result group as abnormal network equipment to obtain an abnormal network equipment group;
the method is characterized in that the updating processing is carried out on the initial equipment slot information sequence pointed by the target pointer according to the equipment slot identifier so as to generate an updated equipment slot information sequence, and the method comprises the following steps:
in response to receiving heartbeat information sent by any network device, updating an initial device slot information sequence pointed by the target pointer according to the device slot identifier and the heartbeat information to generate an updated device slot information sequence;
in response to not receiving the heartbeat information, determining an initial device slot information sequence pointed by the target pointer as an updated device slot information sequence;
the updating processing is performed on the initial equipment slot information sequence pointed by the target pointer so as to generate an updated equipment slot information sequence, and the updating processing comprises the following steps:
determining equipment mapping information corresponding to the heartbeat information in an associated equipment mapping information table as initial equipment mapping information;
deleting the equipment identification corresponding to the heartbeat information in the equipment identification group corresponding to the initial equipment slot identification, which is included in the initial equipment slot information sequence, in response to determining that the initial queue slot identification included in the initial equipment mapping information is not empty;
determining the equipment identifier corresponding to the heartbeat information as a candidate equipment identifier;
adding the candidate equipment identification to an equipment identification group corresponding to the equipment slot identification, wherein the equipment identification group corresponds to the equipment slot identification and is included in the initial equipment slot information sequence;
and determining the initial equipment slot information sequence as an updated equipment slot information sequence.
2. The method according to claim 1, wherein the method further comprises:
for each target equipment identifier in the target equipment identifier group, deleting the equipment slot identifier corresponding to the target equipment identifier in the equipment mapping information table, wherein the equipment mapping information in the equipment mapping information table comprises: an equipment slot identifier;
and updating the equipment slot information corresponding to the target equipment slot identification in the equipment slot information sequence.
3. The method of claim 1, wherein the initial queue slot information in the initial queue slot information sequence comprises: a queue slot mark; and
the constructing a device mapping information table according to the initial device slot information sequence includes:
acquiring the equipment identifier of each network equipment to obtain an equipment identifier sequence;
for each device identification in the sequence of device identifications, performing the following determining step:
determining equipment slot information corresponding to the equipment identifier in the initial equipment slot information sequence as mapping equipment slot information;
determining the equipment identification and the equipment slot identification included in the mapping equipment slot information as equipment mapping information;
and constructing a device mapping information table according to the determined device mapping information.
4. A computer device, wherein the computer device comprises a processor, a memory, and a computer program stored on the memory and executable by the processor, wherein the computer program, when executed by the processor, implements the steps of the method according to any of claims 1-3.
5. A computer readable storage medium, wherein the computer readable storage medium has stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the method according to any of claims 1-3.
CN202310848153.0A 2023-07-11 2023-07-11 Network equipment risk monitoring method, computer equipment and computer storage medium Active CN116760697B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310848153.0A CN116760697B (en) 2023-07-11 2023-07-11 Network equipment risk monitoring method, computer equipment and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310848153.0A CN116760697B (en) 2023-07-11 2023-07-11 Network equipment risk monitoring method, computer equipment and computer storage medium

Publications (2)

Publication Number Publication Date
CN116760697A CN116760697A (en) 2023-09-15
CN116760697B true CN116760697B (en) 2023-12-08

Family

ID=87949710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310848153.0A Active CN116760697B (en) 2023-07-11 2023-07-11 Network equipment risk monitoring method, computer equipment and computer storage medium

Country Status (1)

Country Link
CN (1) CN116760697B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021043268A1 (en) * 2019-09-05 2021-03-11 华为技术有限公司 Method for determining abnormal offline state and related device
CN113704037A (en) * 2021-08-31 2021-11-26 平安普惠企业管理有限公司 Equipment testing method and device, computer equipment and storage medium
CN113905005A (en) * 2021-09-30 2022-01-07 完美世界(北京)软件科技发展有限公司 Client state updating method and device for instant messaging
CN114301800A (en) * 2021-12-28 2022-04-08 中国电信股份有限公司 Network equipment quality difference analysis method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9357476B2 (en) * 2013-03-28 2016-05-31 Tejas Networks Limited Method and system for system information acquisition optimization

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021043268A1 (en) * 2019-09-05 2021-03-11 华为技术有限公司 Method for determining abnormal offline state and related device
CN113704037A (en) * 2021-08-31 2021-11-26 平安普惠企业管理有限公司 Equipment testing method and device, computer equipment and storage medium
CN113905005A (en) * 2021-09-30 2022-01-07 完美世界(北京)软件科技发展有限公司 Client state updating method and device for instant messaging
CN114301800A (en) * 2021-12-28 2022-04-08 中国电信股份有限公司 Network equipment quality difference analysis method and device

Also Published As

Publication number Publication date
CN116760697A (en) 2023-09-15

Similar Documents

Publication Publication Date Title
CN108416449B (en) Operation and maintenance method and device
CN110365724B (en) Task processing method and device and electronic equipment
CN110932933B (en) Network condition monitoring method, computing device and computer storage medium
CN114095567B (en) Data access request processing method and device, computer equipment and medium
CN110442502B (en) Point burying method, device, equipment and storage medium
CN110968478A (en) Log collection method, server and computer storage medium
CN109471799B (en) Method, device, storage medium and terminal for deploying demand environment
CN111782502A (en) Automatic testing method and device
CN116760697B (en) Network equipment risk monitoring method, computer equipment and computer storage medium
CN112612706A (en) Automated testing method, computer device and storage medium
CN114185763A (en) Dynamic allocation method, device, storage medium and electronic equipment
CN110971478B (en) Pressure measurement method and device for cloud platform service performance and computing equipment
CN115037653B (en) Service flow monitoring method, device, electronic equipment and storage medium
CN113158177A (en) Dynamic measurement method, device, equipment and storage medium
CN108255672B (en) Data verification method and device, storage medium and electronic equipment
CN114385498A (en) Performance test method, system, computer equipment and readable storage medium
CN111884932A (en) Link determination method, device, equipment and computer readable storage medium
CN112416750A (en) Application program boundary testing method and system
CN113031995A (en) Rule updating method and device, storage medium and electronic equipment
CN110020268B (en) Page returning method and device
CN110209959B (en) Information processing method and device
CN110868477A (en) Task scheduling method, device and system
CN112417324A (en) Chrome-based URL (Uniform resource locator) interception method and device and computer equipment
CN113778800B (en) Error information processing method, device, system, equipment and storage medium
CN111338926A (en) Patch testing method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant