CN117857323A - Visualization method and device for network link - Google Patents

Visualization method and device for network link Download PDF

Info

Publication number
CN117857323A
CN117857323A CN202410095907.4A CN202410095907A CN117857323A CN 117857323 A CN117857323 A CN 117857323A CN 202410095907 A CN202410095907 A CN 202410095907A CN 117857323 A CN117857323 A CN 117857323A
Authority
CN
China
Prior art keywords
target node
information
configuration
nodes
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410095907.4A
Other languages
Chinese (zh)
Inventor
刘雷
袁阳
朱选章
李欣阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202410095907.4A priority Critical patent/CN117857323A/en
Publication of CN117857323A publication Critical patent/CN117857323A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a visualization method and a device of a network link, which relate to the technical field of network security and also relate to intelligent operation and maintenance, and can be used in the field of information security, wherein the method comprises the following steps: determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node; acquiring configuration information and configuration state of a target node according to access information of the target node; judging whether address information of other nodes except the target node exists in configuration information of the target node; and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed. The invention can realize the visualization of the configuration information and the configuration state of all nodes on the network link, can discover the abnormal state timely and accurately, and reduces the operation and maintenance difficulty and the cost.

Description

Visualization method and device for network link
Technical Field
The invention relates to the technical field of network security, and also relates to intelligent operation and maintenance, which can be used in the field of information security, in particular to a method and a device for visualizing a network link.
Background
Links play an important role in computer networks. It is the basis for network communication, responsible for transmitting data from a source device to a destination device. With the continuous development of network technology, network links are increasingly complex, and the complexity of the network links leads to the failure of operation and maintenance personnel to accurately and rapidly master the configuration information and state information of each equipment node in the network links, so that abnormal states of the equipment nodes cannot be found in time, and the transmission of data and the normal operation of services are affected.
The existing network link visualization method cannot accurately and comprehensively display the configuration information and the configuration state of all nodes on the network link, so that the fault positioning of the nodes is inaccurate, and the operation and maintenance cost and the difficulty are high.
In view of the above problems, no effective solution has been proposed at present.
Disclosure of Invention
The embodiment of the specification provides a visualization method and a visualization device for a network link, which are used for solving the problems that the prior art cannot accurately and comprehensively display the configuration information and the configuration state of all nodes on the network link, so that the fault positioning of the nodes is inaccurate, and the operation and maintenance cost and the difficulty are high.
In a first aspect, embodiments of the present disclosure provide a method for visualizing a network link, the method including:
determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node;
acquiring configuration information and configuration state of a target node according to access information of the target node;
judging whether address information of other nodes except the target node exists in configuration information of the target node;
and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
In some embodiments, the method further comprises:
obtaining a query element, wherein the query element comprises a query type and query content, the query type is used for determining a node range of a query, and the query content is used for determining a target node from the node range of the query;
accordingly, the determining the access information of the target node and the target node on the link includes:
judging whether the query type belongs to the domain name;
when the query type does not belong to the domain name, extracting a plurality of first nodes matched with the query type from a preset database;
comparing the address information of the plurality of first nodes with the address information in the query content;
according to the comparison result, screening nodes matched with the address information in the query content from a plurality of first nodes as target nodes;
and obtaining access information matched with the first node from a preset database as access information of the target node.
In some embodiments, the query types include at least one of: the domain name comprises a public network domain name and an intranet domain name, and the address comprises a public network address and an intranet address; the query content includes at least one of: address information, port information.
In some embodiments, the method further comprises:
when the query type belongs to the domain name, extracting a plurality of second nodes matched with the query type from a preset database to serve as target nodes, wherein the plurality of second nodes are other nodes except the first node;
and obtaining access information matched with the second node from a preset database as access information of the target node.
In some embodiments, the obtaining the configuration information and the configuration state of the target node according to the access information of the target node includes:
accessing a target node according to access information of the target node, inputting a configuration acquisition instruction corresponding to the target node, which is generated in advance, into the target node, and acquiring configuration text information corresponding to the target node;
and extracting effective text information in the configuration text information to obtain the configuration information and the configuration state of the target node.
In some embodiments, the configuration information includes at least one of: the configuration state comprises at least one of the following: whether addresses corresponding to the domain name are effective, whether the load balancing virtual address and the hanging node are effective, and whether other virtual addresses and background service addresses are effective.
In some embodiments, the method further comprises:
when address information of other nodes exists, determining a second target node on a link and access information of the second target node according to the address information;
acquiring configuration information and configuration state of the second target node according to the access information of the second target node;
judging whether second address information exists in configuration information of a second target node, wherein the second address information is other address information except the address information of the second target node;
and when the second address information does not exist, the configuration information and the configuration state of the second target node are displayed.
In a second aspect, embodiments of the present disclosure further provide a visualization apparatus for a network link, where the apparatus includes:
the determining module is used for determining the target node on the link and the access information of the target node, wherein the access information is used for accessing the target node;
the acquisition module is used for acquiring the configuration information and the configuration state of the target node according to the access information of the target node;
the judging module is used for judging whether address information of other nodes except the target node exists in the configuration information of the target node;
and the display module is used for displaying the configuration information and the configuration state of the target node when the address information of other nodes does not exist.
In a third aspect, the present disclosure further provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the method for visualizing a network link in the above embodiments when the processor executes the computer program.
In a fourth aspect, the present description embodiment also provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the method for visualizing a network link in the above embodiment.
The embodiment of the specification provides a visualization method and a visualization device for a network link, firstly, determining a target node on the link and access information of the target node, wherein the access information is used for accessing the target node. And then, according to the access information of the target node, acquiring the configuration information and the configuration state of the target node. And judging whether address information of other nodes except the target node exists in the configuration information of the target node. And finally, when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed. In the embodiment of the specification, the target node can be accessed in time according to the access information of the target node by determining the target node and the access information of the target node on the link, so that the configuration information and the configuration state of the target node can be timely and accurately obtained. By judging whether the address information of other nodes except the target node exists in the configuration information of the target node, the configuration information and the configuration state of all the nodes on the network link can be ensured to be acquired, the configuration information and the configuration state of all the nodes on the network link are displayed more comprehensively, so that the abnormal state can be found timely and accurately, and the operation and maintenance difficulty and cost are reduced.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art. In the drawings:
FIG. 1 is a simplified network link configuration diagram provided by an embodiment of the present description;
FIG. 2 is a block diagram of a network link of the complications provided by the embodiments of the present description;
fig. 3 is a flow chart of a method for visualizing a network link according to an embodiment of the present disclosure;
FIG. 4 is a block diagram of a visualization system for network links provided by embodiments of the present description;
FIG. 5 is a schematic interaction diagram of a query entry module and a data acquisition module provided in an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of the modular interaction of the visualization system of network links provided by embodiments of the present description;
FIG. 7 is a schematic flow chart of determining access information of a target node and the target node according to an embodiment of the present disclosure;
FIG. 8 is a data flow diagram of a text data processing module provided by an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of a data presentation module provided in an embodiment of the present disclosure;
fig. 10 is a schematic structural diagram of a network link visualization device according to an embodiment of the present disclosure;
fig. 11 is a schematic structural composition of an electronic device provided in the embodiment of the present specification.
Detailed Description
In order to make the technical solutions in the present specification better understood by those skilled in the art, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
Links play an important role in computer networks. It is the basis for network communication, responsible for transmitting data from a source device to a destination device. As network technology continues to evolve, network links become increasingly complex. Referring to fig. 1, fig. 1 is a simplified network link structure diagram, that is, in the early stage of network technology development, a network link of a service end of a domain name is composed of F5 (load balancer or load balancing device), an under-hook server 1 under F5, and an under-hook server 2. Referring to fig. 2, fig. 2 is a complicated network link structure diagram, that is, in the process of continuously developing network technologies, the network link of the service end of the domain name is not a simple domain name server-F5 load balancing-server mode, and an encryption and decryption gateway and a WAF (which is short for a Web application firewall (Web Application Firewall) are added to the whole network link, and may be integrated with devices such as a network switch and a router, so as to intercept traffic from an external network and protect the Web application), SLB (SLB is short for Server Load Balancer (load balancing service) and a Docker container (Docker container may be understood as a lightweight virtual machine), where the container includes all components required for running an application program, including an operating system, an application program, a dependency library, and so on), and even has multiple layers of F5 load balancing (such as an outer layer F5 and an inner layer F5 appearing in fig. 2). The challenges presented by the complexity of the link are: 1. it is difficult for the application operation and maintenance personnel to grasp the configuration state information of all nodes on the link, and it is almost impossible to acquire the configuration information and the configuration state of each node under the domain name link in real time, and the network operation and maintenance personnel must be required to assist to log in network equipment one by one to check the configuration; 2. any node in the link fails or has a problem, the normal operation of the service can be affected, and when the domain name service has a problem, the time and energy cost for locating the failure point of operation and maintenance personnel are greatly increased. That is, the complexity of the network link causes that the operation and maintenance personnel cannot accurately and rapidly grasp the configuration and state information of each equipment node in the network link, so that the abnormal state of the equipment node cannot be found in time, and the transmission of data and the normal operation of service are affected.
The existing network link visualization method cannot accurately and comprehensively display the configuration information and the configuration state of each node on the network link, so that the fault positioning of the node is inaccurate, and the operation and maintenance cost and the operation and maintenance difficulty are high.
Aiming at the problems and the specific reasons for generating the problems in the prior art, the application considers the method and the device for introducing the visualization of the network link, can provide a concise and clear visual view for the complex domain name link, comprehensively and accurately display the specific configuration information of each equipment node on the domain name link, provide a convenient query window for operation and maintenance personnel, and change the current situation of background review of login equipment. And whether the configuration state of each node on the link is normal is displayed, so that references are provided for operation and maintenance personnel to locate faults, and the operation and maintenance difficulty and cost are reduced.
Based on the above-mentioned idea, the present disclosure proposes a network link visualization method, first, determining a target node on a link and access information of the target node, where the access information is used to access the target node. And then, according to the access information of the target node, acquiring the configuration information and the configuration state of the target node. And judging whether address information of other nodes except the target node exists in the configuration information of the target node. And finally, when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
Fig. 3 is a flow chart of a visualization method of a network link according to an embodiment of the present disclosure. Although the description provides methods and apparatus structures as shown in the examples or figures described below, more or fewer steps or modular units may be included in the methods or apparatus, whether conventionally or without inventive effort. In the steps or the structures where there is no necessary causal relationship logically, the execution order of the steps or the module structure of the apparatus is not limited to the execution order or the module structure shown in the embodiments or the drawings of the present specification. The described methods or module structures may be implemented in a device, server or end product in practice, in a sequential or parallel fashion (e.g., parallel processor or multi-threaded processing environments, or even distributed processing, server cluster implementations) as shown in the embodiments or figures. In particular, referring to fig. 3, the method may be applied to a network link visualization system, and the method may include the following.
S301: and determining the target node on the link and access information of the target node, wherein the access information is used for accessing the target node.
In some embodiments, the above-mentioned links may also be referred to as network links or network links of the server side of the domain name (abbreviated as domain name links). The target node may be a target network device in a network link, and any one of the network devices or servers in the network link may be used as a node. The access information may include: management IP address (management IP refers to an IP address used in a network to identify and manage devices), an api user (api refers to an application programming interface, api user refers to a user who invokes the application programming interface), and access information of a target node may be used to access the target node. The access information of the target node is obtained, so that the target node can be accessed in time, and the configuration information and the configuration state of the target node can be timely and accurately obtained.
In some embodiments, before determining the target node on the link and the access information of the target node, when implemented, the method may further include:
a query element is obtained, the query element comprising a query type for determining a node range of the query and query content for determining a target node from the node range of the query.
In some embodiments, the visualization system of the network link may provide the user with an interactive window for entering information, such as: the user can input the query element in the interactive window, the visual system of the network link can acquire the query element input by the user, and the target node on the network link is determined according to the query element input by the user. The query element may include a query type and query content, where the query type may be used to determine a node range of the query (e.g. from which nodes or network devices or servers in the network link are queried, if the query type is a public domain name, a query is required to go to a node related to the public domain name or a public domain name server, if the query type is a public network address, a query is required to go to load balancing of a public network access area), the query content may be used to determine a target node from the node range of the query (a node matching the query content may be further determined from the node range of the query according to the query content, for example, the node may be used as a target node, where the query content is "xx.xx.xx.xx", "IPV4 address", "443 port" type is "public network ip", and the query content is "xx.xx.xx.xx.xx.xx.xx.load balancing" device in the public network access area is required to be queried, and the query object content is "xx.xx.xx.xx.xx.xx.xx.xx.load balancing" address "port" and "service address" is required to be found for each of the target devices. The query types may include at least one of: domain name, address (ip), which may include a public network domain name, an intranet domain name, which may include a public network address (i.e., public network ip), an intranet address (i.e., intranet ip); the query content may include at least one of: address information (e.g., ip value, IPV4/IPV6 type), port information. It should be noted that the query types and the query contents are not limited to the above examples, and those skilled in the art may make other modifications in light of the technical spirit of the embodiments of the present disclosure, and all the functions and effects achieved by the embodiments of the present disclosure should be covered in the protection scope of the embodiments of the present disclosure as long as the functions and effects are the same or similar to those of the embodiments of the present disclosure.
In some embodiments, the determining the access information of the target node and the target node on the link may include, when implemented:
judging whether the query type belongs to the domain name;
when the query type does not belong to the domain name, extracting a plurality of first nodes matched with the query type from a preset database;
comparing the address information of the plurality of first nodes with the address information in the query content;
according to the comparison result, screening nodes matched with the address information in the query content from a plurality of first nodes as target nodes;
and obtaining access information matched with the first node from a preset database as access information of the target node.
In some embodiments, after the visualization system of the network link acquires the query element input by the user, it may first determine whether the query type in the query element belongs to the domain name, and then select different processing modes to determine the target node on the network link and the access information on the target node. Specifically, if it is determined that the query type does not belong to the domain name (i.e., the query type belongs to the address), a plurality of first nodes (or referred to as a plurality of first network devices), which are matched with the query type, are required to be extracted from a preset database (the preset database is a network device account, for example, the network device account is a account maintained by a network operation and maintenance personnel), which can include device types (for example, a domain name server, load balancing, and a SLB) of all network device information, device types, management ip addresses corresponding to different devices, service ip address network segment ranges, account passwords of device api users, and the like, and when the query type belongs to the address, the plurality of first network devices can be devices of other types except the domain name server) (specifically, address information of the plurality of first nodes is extracted, for example, address information of the plurality of first nodes is extracted), address information of the plurality of first nodes (for example, a service ip address network segment is compared with the address information of the first nodes, for example, 192.168.1.168.1.1.1.1.24, or 192.0, and the address information of the ip address of the first nodes is compared with the address information of the first nodes (for example, the address information of the first nodes is compared with the address information of the first nodes is filtered, and the address information of the nodes is compared with the address information of the first nodes is compared with the address information of the nodes as at least one node (for example, the address information is compared with the address information of the node). Then, access information matched with the first node can be obtained from a preset database and used as the access information of the target node (such as management ip, address and account password of api user of the first node). In practical application, the visualization system of the network link can directly output the model and the type (namely the equipment model and the equipment type) of the target node, the management ip and the address of the target node, the account password of the api user and the like.
In some embodiments, after comparing the address information of the plurality of first nodes with the address information in the query content, when implemented, the method may further include: and generating error reporting information when the matched address information does not exist in the comparison result. Wherein, the error reporting information may include: "cannot confirm the target node" or "cannot confirm the device".
In some embodiments, after determining whether the query type belongs to the domain name, in implementation, the method may further include:
when the query type belongs to the domain name, extracting a plurality of second nodes matched with the query type from a preset database to serve as target nodes, wherein the plurality of second nodes are other nodes except the first node;
and obtaining access information matched with the second node from a preset database as access information of the target node.
In some embodiments, if it is determined that the query type belongs to the domain name, a plurality of second nodes (or called a plurality of second network devices, when the query type belongs to the domain name, the plurality of second network devices may be a plurality of domain name servers) that are matched with the query type may be directly extracted from the preset database (specifically, the ledger information of the plurality of second nodes that are matched with the query type is extracted), where the plurality of second nodes are other nodes than the first node. Then, access information matched with the second node is obtained from a preset database and used as access information of the target node (such as management ip, address and account password of api user of the second node).
By judging whether the query types in the query elements belong to domain names or not to select different processing modes, the target node on the link and the access information of the target node can be timely and accurately determined, and a foundation is laid for the subsequent acquisition of the configuration information and the configuration state of the target node.
S302: and acquiring configuration information and configuration state of the target node according to the access information of the target node.
In some embodiments, the obtaining the configuration information and the configuration state of the target node according to the access information of the target node may include, when the method is implemented:
accessing a target node according to access information of the target node, inputting a configuration acquisition instruction corresponding to the target node, which is generated in advance, into the target node, and acquiring configuration text information corresponding to the target node;
and extracting effective text information in the configuration text information to obtain the configuration information and the configuration state of the target node.
In some embodiments, after obtaining the access information of the target node, the target node may be accessed based on the access information of the target node, for example: the target node or target network device can be accessed or logged in by using the management ip address of the target node, the device api user and the password. And then, inputting a preset configuration acquisition instruction corresponding to the generated target node to the target node, wherein the target node returns corresponding configuration text information (the configuration text information can comprise configuration information and configuration state information and other useless text information) to a visualization system of the network link, namely, the visualization system of the network link can acquire the configuration text information corresponding to the target node. Since the configuration file information is large, it is necessary to further extract the valid text information in the configuration text information (i.e., the valid text information may include the configuration information and the configuration status information extracted from the configuration text information), and the extracted configuration information and configuration status information are used as the configuration information and the configuration status of the target node. After the effective text information is extracted, the effective text information can be subjected to data cleaning, so that the configuration information and the configuration state of the target node can be accurately obtained. Wherein, the effective text information in the configuration text information can be extracted by using a regular matching method. The extracted configuration information and configuration state information may be stored in a second database of the visualization system of the network link (the second database is different from the preset database, and the second database may store configuration information and configuration state corresponding to different nodes on the network link). By storing the extracted configuration information and configuration state information in the second database of the visualization system of the network link, the configuration information and configuration state of each node on the network link can be ensured to be displayed in time later, and the delay degree is reduced. The following describes, with a specific example, a process of inputting a configuration acquisition instruction corresponding to a target node, which is generated in advance, to the target node, acquiring configuration text information corresponding to the target node, and then acquiring configuration information and a configuration state of the target node from the configuration text information:
For example: a configuration acquisition instruction (e.g., command line list ltm pool AAA) corresponding to the load balancing device may be input to the load balancing device, where the load balancing device may return the following configuration text information:
only a small part of the configuration text information returned by the load balancing device is useful, namely whether the ip address and the state of the down-hanging node are up or not, and health check names are useful information (namely the effective text information) which needs to be extracted by a regular matching method. The final extraction results were as follows:
members
{ Address AAAA:BBBBBB:CCCC:DDD:EEEEEE% 2state up (underhung node 1, state up)
Address 192.168.1.4%2state up (hanging node 2, status up)
}
monitor HTTP_AAA_monitor (health check name)
In some embodiments, the configuration acquisition instruction corresponding to the target node generated in advance may be a configuration acquisition instruction matched with the target node or referred to as a configuration acquisition instruction corresponding to the target node, where the configuration acquisition instruction corresponding to the target node may be used to acquire configuration text information corresponding to the target node, by a visualization system of the network link according to a node type and a node model of the target node (i.e., a device type and a device model of the target network device). Wherein the target node or target network device may comprise at least one of: the configuration acquisition instruction corresponding to the domain name server device, the load balancing device, the WAF device, and the SLB, and the target node or the target network device may include: the configuration acquisition instruction corresponding to the domain name server device may be: inquiring the domain name configuration, the domain name state and the statement of the park where the domain name is located. The configuration acquisition instruction corresponding to the load balancing device may be: a statement of information such as a down service group address pool, down node ip and port, a load balancing algorithm, a deep health check path, and ir. The configuration acquisition instruction corresponding to the WAF device may be: statement of virtual service and background service configuration. The configuration acquisition instruction corresponding to the SLB may be: SLB address, down-hanging docker container, monitoring page url, cluster name and other information sentences.
In some embodiments, the configuration information may include at least one of: the configuration state may include at least one of the following: whether addresses corresponding to the domain name are effective, whether the load balancing virtual address and the hanging node are effective, and whether other virtual addresses and background service addresses are effective.
In some embodiments, the configuration information and configuration state corresponding to different nodes on the network link are different. For example: for a domain name server (i.e., DNS (Domain Name Server) is a server that converts a domain name (domain name) and an IP address (IP address) corresponding thereto), a table of a domain name (domain name) and an IP address (IP address) corresponding thereto is stored in the DNS to resolve the domain name of the message, the corresponding configuration information may include: domain name type, address to which the domain name corresponds, domain name deployment information (i.e., campus information for domain name deployment), etc., the corresponding configuration state may include: whether the address corresponding to the domain name is valid, etc. For a load balancing device (the load balancing device is a network device and is mainly used for distributing network traffic to a plurality of servers to improve the performance and reliability of a network), the corresponding configuration information may include: load balancing virtual addresses, load balancing down-hanging node addresses and ports, load balancing load rules, load balancing check paths and the like, and the corresponding configuration states thereof can comprise: load balancing virtual addresses, whether the down node is in effect (i.e., in active state). For WAF devices (a security device for protecting Web applications), its corresponding configuration information may include: the virtual address (i.e., the other virtual addresses described above) and the background service address of the WAF device may include: whether the virtual address (i.e., the other virtual addresses described above) and the background service address of the WAF device are valid (i.e., whether the virtual address and the background service address of the WAF device are in active state).
By acquiring the configuration information and the configuration state of the target node and storing the configuration information and the configuration state in the second database, it is ensured that the configuration information and the configuration state of all nodes on the network link can be displayed in time later.
S303: and judging whether address information of other nodes except the target node exists in the configuration information of the target node.
In some embodiments, after determining whether address information of other nodes except the target node exists in the configuration information of the target node, when implementing the method, the method may further include:
when address information of other nodes exists, determining a second target node on a link and access information of the second target node according to the address information;
acquiring configuration information and configuration state of the second target node according to the access information of the second target node;
judging whether second address information exists in configuration information of a second target node, wherein the second address information is other address information except the address information of the second target node;
and when the second address information does not exist, the configuration information and the configuration state of the second target node are displayed.
In some embodiments, after the configuration information and the configuration state of the target node are obtained, it may be determined whether address information of other nodes except the target node (e.g., domain name resolution ip in a domain name server, load balancing, a hanging node ip in an SLB, a background service ip in a WAF, etc.) exists in the configuration information of the target node, if address information of other nodes except the target node exists, the address information may be used as a new query element, based on the new query element, the second target node on the network link and access information of the second target node (the second target node is different from the target node) are determined, then the second target node is accessed according to the access information of the second target node, a configuration obtaining instruction corresponding to the second target node which is preset is input to the second target node, configuration text information of the second target node is obtained, and valid text information in the configuration text information of the second target node is extracted to obtain the configuration information and the configuration state of the second target node and stored in the second database. Then, it is determined whether or not there is second address information in the configuration information of the second target node, where the second address information is address information other than the address information of the second target node (note that there is no address information of the target node in the second address information). And if the second address information does not exist, acquiring the configuration information and the configuration state of the second target node from the second database and displaying the configuration information and the configuration state of the second target node. If the second address information exists in the second target node, the second address information can be continuously used as a new query element, and a new round of query is started until all nodes on the network link are queried. For example: a configuration acquisition instruction (such as list ltm virtual VS _xx.xx.xx.xx_443) is input into the load balancing device, and the load balancing device returns a series of configuration content (i.e. the configuration text information) of the service, which may include the address and port information of the hanging node: yy.yy.yy.yy:8080, extracting effective text information (namely, extracting yy.yy.yy: 8080) from configuration text information, wherein the information relates to an ip address, so that the information can be used as a new query element to start a new round of query.
By judging whether the second address information exists in the configuration information of the second target node when the address information of other nodes except the target node exists, the configuration information and the configuration state of all the nodes in the network link can be accurately and comprehensively queried.
S304: and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
In some embodiments, when it is determined that address information of other nodes except the target node does not exist in the configuration information of the target node, the configuration information and the configuration state of the target node may be displayed, which indicates that the query of all the nodes on the network link has been completed. Specifically, a window visible to the user may be generated, showing configuration information and configuration status of the full link node. By displaying the configuration information and the configuration state of all-link nodes, operation and maintenance personnel can conveniently grasp the configuration information and the configuration state of each node, discover and locate the fault node in time, and reduce the difficulty and the cost of operation and maintenance. For example: the underhung node (SLB) state of the second-layer load balancing equipment in the network link is inactive, namely in a failure or inactive state, the method and the device do not need to log in each network equipment in the network link manually, check each equipment state one by one, and then determine the network equipment in an abnormal state, and can accurately and rapidly find that the underhung node (SLB) state of the second-layer load balancing equipment is abnormal based on the visualized full-link configuration information and the configuration state, so that the purpose of locating a fault node in time is achieved.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. Specific reference may be made to the foregoing description of related embodiments of the related process, which is not described herein in detail.
The foregoing description of the present method has been presented for purposes of illustration, but it is noted that the detailed description is merely intended to be a better illustration of the present application and description of specific embodiments. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The above method is described below in connection with a specific embodiment, however, it should be noted that this specific embodiment is only for better illustrating the present application and is not meant to be a undue limitation on the present application.
When the method is implemented, firstly, the visualization system of the network link can firstly receive the query element input by the user, then determine the target node on the link according to the query element, and acquire the access information matched with the target node from the preset database as the access information of the target node. And then, accessing the target node according to the access information of the target node, and inputting a configuration acquisition instruction corresponding to the target node, which is generated in advance, into the target node to acquire configuration text information corresponding to the target node. And then extracting the effective text information in the configuration text information to finally obtain the configuration information and the configuration state of the target node. Finally, judging whether the configuration information of the target node contains address information of other nodes except the target node, if so, starting a new round of inquiry by taking the address information of other nodes as a new inquiry element, and judging whether the configuration information of the second target node contains second address information which is other than the address information of the second target node, if so, continuing to take the second address information as a new inquiry element, and starting a new round of inquiry until the inquiry of the nodes on the whole link is completed. If the configuration information of the target node includes address information of other nodes except the target node, the configuration information and the configuration state of the target node can be directly displayed.
By the method, the configuration information and the configuration state of each node on the link can be obtained, and a structured view is generated. The operation and maintenance personnel can acquire all information on the link under the same window, and the fault point can be rapidly positioned through the displayed configuration information, configuration state and the like.
In one specific example scenario, the above-described network link visualization system is described. Referring to fig. 4, fig. 4 is a diagram of a visualization system architecture of a network link. The visualization system of the network link in the application mainly comprises the following modules: the system comprises a query entry module, a data acquisition module and a data display module. The query entry module receives elements to be queried (such as domain names, ips and the like), the data acquisition module acquires configuration information and configuration state information (the configuration information and the configuration state information corresponding to different network devices are different) from each network device after acquiring the query element information, and the data display module generates a visual view according to the information.
Referring to fig. 5, fig. 5 is an interaction diagram of a query entry module and a data acquisition module. The query entry module may provide an interactive window for the user to enter information, the user entering query elements, the query elements being sent to the data acquisition module interface for processing by the data acquisition module.
Referring to fig. 6, fig. 6 is a schematic diagram showing the interaction of modules of a visualization system for network links. After the query elements are acquired from the data acquisition module interface, the device confirmation module confirms the network device (i.e. the target node) where the configuration is located by comparing the query elements with the network device ledger (i.e. the preset database). The command line generation module generates the command of inquiring configuration of the devices (namely, the configuration acquisition command corresponding to the target node) according to the confirmed type and model of the network device. Logging in the network device by the network device executing module, and writing the generated command line into the network device to obtain configuration text information. The text processing module extracts the configuration information and the configuration state in the configuration text information, the configuration information is reserved in a proper format, the text processing module also makes a certain judgment at the same time, judges whether to start a new round of inquiry, if the new round of inquiry needs to be started, the processed part of information is input to the equipment confirmation module again to start the new round of inquiry, and if the new round of inquiry does not need to be started, the data is output to the data display module interface, and the specific functions of each part are as follows:
network equipment standing book: one ledger maintained by network operation and maintenance personnel can contain equipment types (such as a domain name server, load balancing, SLB and the like) of all network equipment information, equipment models, management ip addresses, service ip address network segment ranges, account passwords of equipment api users and the like.
And a device confirmation module: referring to fig. 7, fig. 7 is a schematic flow chart of determining access information of a target node and the target node. When a new query element exists in the data acquisition module interface or the text data processing module, whether the query element belongs to a domain name or ip can be judged. If the domain name is the domain name, domain name server ledger information can be extracted from the network equipment ledger, and the equipment types, the equipment models and the management ip addresses of all domain name servers are output. If the element is ip, information of other types of equipment except a domain name server in the network equipment ledger can be extracted, and if the ip value in the element is matched with all business ip address network segments of the equipment in the ledger, the process is directly ended, and the equipment cannot be confirmed by error is reported; and if the matching exists, outputting the equipment type, the equipment model, the management ip address and the api user account password of all the matched ledger entries. The output data is used by the subsequent command line generation module and the network device execution module.
A command line generation module: and generating a device query command line of a corresponding model according to the device type and the device model output by the device confirmation module. And the domain name server equipment generates sentences for inquiring domain name configuration, domain name state and the park where the domain name is located according to the content of the inquiry element. The load balancing device generates sentences for inquiring information such as an address pool of the down service group, down nodes ip and ports, a load balancing algorithm, a deep health check path, irules and the like. The WAF device generates statements that query the virtual service and the background service configuration. The SLB generates sentences for inquiring the information such as SLB addresses, underslung docker containers, monitoring page url, cluster names and the like. All the generated command line sentences are output for the network equipment execution module.
The network device execution module: and extracting the management ip address, the equipment api user and the password from the data output by the equipment confirmation module, and logging in the network equipment by using the information. Inputting the command line statement output by the command line generating module into the network equipment to acquire corresponding equipment configuration and equipment state information. And transmitting the acquired equipment configuration and equipment state to a text data processing module.
Text data processing module: and processing the acquired equipment configuration information and the configuration state text to a certain extent. Referring to fig. 8, fig. 8 is a data flow chart of the text data processing module. The text information (configuration text information) of the device configuration information, the configuration state and the like is obtained from the network device execution module, useful information is obtained by a regular matching method, cleaned data is obtained, and the cleaned data is added into a second database for storage. Meanwhile, whether the cleaned data has a subsequent ip address (such as domain name resolution ip in a domain name server, load balancing, a down-hanging node ip in an SLB and a background service ip in a WAF) or not is judged, if so, the subsequent ip address information is extracted and is input into the equipment confirmation module again as a new query element, and a new round of query is started. And if not, outputting the data stored in the second database to the data display module interface.
And the data display module is used for: referring to fig. 9, fig. 9 is a schematic diagram of a data display module. And after the interface of the data display module receives the data, extracting configuration item information in the data. And matching the configuration information and the configuration state information of the all-link node in the visualization framework, generating a window visible to a user, and displaying the configuration information and the configuration state information of the all-link node.
Although the present description provides the method operational steps or apparatus configurations illustrated in the following examples or fig. 10, more or fewer operational steps or modular units may be included in the method or apparatus, either conventionally or without the inventive effort. In the steps or the structures where there is no necessary causal relationship logically, the execution order of the steps or the module structure of the apparatus is not limited to the execution order or the module structure shown in the embodiments or the drawings of the present specification. The described methods or module structures may be implemented in a device, server or end product in practice, in a sequential or parallel fashion (e.g., parallel processor or multi-threaded processing environments, or even distributed processing, server cluster implementations) as shown in the embodiments or figures. Based on the above-mentioned network link visualization method, the embodiment of the present disclosure further provides an embodiment of a network link visualization device. As shown in fig. 10, the apparatus may specifically include the following modules:
A determining module 1001, configured to determine a target node on a link and access information of the target node, where the access information is used to access the target node;
the obtaining module 1002 may be configured to obtain configuration information and a configuration state of the target node according to access information of the target node;
a judging module 1003, configured to judge whether address information of other nodes except the target node exists in configuration information of the target node;
the display module 1004 may be configured to display the configuration information and the configuration state of the target node when there is no address information of other nodes.
In some embodiments, the determining module 1001 may also be further configured to obtain a query element, where the query element includes a query type and query content, where the query type is used to determine a node range of a query, and the query content is used to determine a target node from the node range of the query; accordingly, the determining module 1001 may be specifically configured to determine whether the query type belongs to a domain name; when the query type does not belong to the domain name, extracting a plurality of first nodes matched with the query type from a preset database; comparing the address information of the plurality of first nodes with the address information in the query content; according to the comparison result, screening nodes matched with the address information in the query content from a plurality of first nodes as target nodes; and obtaining access information matched with the first node from a preset database as access information of the target node.
In some embodiments, the query types in the determination module 1001 may include at least one of: the domain name can comprise a public network domain name and an intranet domain name, and the address can comprise a public network address and an intranet address; the query content may include at least one of: address information, port information.
In some embodiments, the determining module 1001 may be further specifically configured to extract, when the query type belongs to a domain name, a plurality of second nodes that match the query type from a preset database, where the plurality of second nodes are other nodes except the first node, as target nodes; and obtaining access information matched with the second node from a preset database as access information of the target node.
In some embodiments, the obtaining module 1002 may specifically be configured to access a target node according to access information of the target node, input a configuration obtaining instruction corresponding to the target node, which is generated in advance, to the target node, and obtain configuration text information corresponding to the target node; and extracting effective text information in the configuration text information to obtain the configuration information and the configuration state of the target node.
In some embodiments, the configuration information in the above-mentioned obtaining module 1002 may include at least one of the following: the configuration state may include at least one of the following: whether addresses corresponding to the domain name are effective, whether the load balancing virtual address and the hanging node are effective, and whether other virtual addresses and background service addresses are effective.
In some embodiments, the determining module 1003 may be further configured to determine, when address information of another node exists, a second target node on the link and access information of the second target node according to the address information; acquiring configuration information and configuration state of the second target node according to the access information of the second target node; judging whether second address information exists in configuration information of a second target node, wherein the second address information is other address information except the address information of the second target node; and when the second address information does not exist, the configuration information and the configuration state of the second target node are displayed.
It should be noted that, the units, devices, or modules described in the above embodiments may be implemented by a computer chip or entity, or may be implemented by a product having a certain function. For convenience of description, the above devices are described as being functionally divided into various modules, respectively. Of course, when the present description is implemented, the functions of each module may be implemented in the same piece or pieces of software and/or hardware, or a module that implements the same function may be implemented by a plurality of sub-modules or a combination of sub-units, or the like. The above-described apparatus embodiments are merely illustrative, for example, the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
From the above, based on the visualization device for network links provided in the embodiments of the present disclosure, on one hand, a concise and clear visualization view can be provided for a complex domain name link, specific configuration information of each device node on the domain name link is clearly displayed at a glance, a convenient query window is provided for operation and maintenance personnel, and the current situation of background review of login devices one by one is changed. On the other hand, the configuration information and the configuration state of each node are displayed, so that references are provided for operation and maintenance personnel to locate faults, and the operation and maintenance difficulty and cost are reduced.
The embodiment of the specification also provides an electronic device based on the network link visualization method, which comprises a processor and a memory for storing executable instructions of the processor, wherein the processor can execute the following steps according to the instructions when being implemented: determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node; acquiring configuration information and configuration state of a target node according to access information of the target node; judging whether address information of other nodes except the target node exists in configuration information of the target node; and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
In order to more accurately complete the above instructions, referring to fig. 11, another specific electronic device is further provided in this embodiment of the present disclosure, where the electronic device includes a network communication port 1101, a processor 1102, and a memory 1103, where the foregoing structures are connected by an internal cable, so that each structure may perform specific data interaction.
The network communication port 1101 may be specifically configured to determine a target node on a link and access information of the target node, where the access information is used to access the target node;
the processor 1102 may be specifically configured to obtain configuration information and a configuration state of the target node according to access information of the target node; judging whether address information of other nodes except the target node exists in configuration information of the target node; when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed;
the memory 1103 may be specifically configured to store a corresponding program of instructions.
In this embodiment, the network communication port 1101 may be a virtual port that binds with different communication protocols, so that different data may be sent or received. For example, the network communication port may be a port responsible for performing web data communication, a port responsible for performing FTP data communication, or a port responsible for performing mail data communication. The network communication port may also be an entity's communication interface or a communication chip. For example, it may be a wireless mobile network communication chip, such as GSM, CDMA, etc.; it may also be a Wifi chip; it may also be a bluetooth chip.
In this embodiment, the processor 1102 may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor, and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable logic controller, and an embedded microcontroller, among others. The description is not intended to be limiting.
In this embodiment, the memory 1103 may include multiple levels, and in a digital system, the memory may be any memory as long as it can hold binary data; in an integrated circuit, a circuit with a memory function without a physical form is also called a memory, such as a RAM, a FIFO, etc.; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card, and the like.
The embodiments of the present specification also provide a computer storage medium based on the above network link visualization method, where the computer storage medium stores computer program instructions that when executed implement: determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node; acquiring configuration information and configuration state of a target node according to access information of the target node; judging whether address information of other nodes except the target node exists in configuration information of the target node; and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
In the present embodiment, the storage medium includes, but is not limited to, a random access Memory (Random Access Memory, RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects of the program instructions stored in the computer storage medium may be explained in comparison with other embodiments, and are not described herein.
The present specification embodiment also provides a computer program product of the above network link based visualization method, comprising a non-transitory computer readable storage medium storing a computer program, the computer program being operable to cause a computer to perform the steps of: determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node; acquiring configuration information and configuration state of a target node according to access information of the target node; judging whether address information of other nodes except the target node exists in configuration information of the target node; and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
Although the present description provides method operational steps as described in the examples or flowcharts, more or fewer operational steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one way of performing the order of steps and does not represent a unique order of execution. When implemented by an apparatus or client product in practice, the methods illustrated in the embodiments or figures may be performed sequentially or in parallel (e.g., in a parallel processor or multi-threaded processing environment, or even in a distributed data processing environment). The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, it is not excluded that additional identical or equivalent elements may be present in a process, method, article, or apparatus that comprises a described element. The terms first, second, etc. are used to denote a name, but not any particular order.
Those skilled in the art will also appreciate that, in addition to implementing the controller in a pure computer readable program code, it is well possible to implement the same functionality by logically programming the method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers, etc. Such a controller can be regarded as a hardware component, and means for implementing various functions included therein can also be regarded as a structure within the hardware component. Or even means for achieving the various functions may be regarded as either software modules implementing the methods or structures within hardware components.
The description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of embodiments, it will be apparent to those skilled in the art that the present description may be implemented in software plus a necessary general hardware platform. Based on such understanding, the technical solutions of the present specification may be embodied essentially in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and include several instructions to cause a computer device (which may be a personal computer, a mobile terminal, a server, or a network device, etc.) to perform the methods described in the various embodiments or portions of the embodiments of the present specification.
Various embodiments in this specification are described in a progressive manner, and identical or similar parts are all provided for each embodiment, each embodiment focusing on differences from other embodiments. The specification is operational with numerous general purpose or special purpose computer system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
Although the present description has been described by way of example, it will be appreciated by those of ordinary skill in the art that there are many variations to the description without departing from the spirit of the present description, and it is intended that the appended claims encompass such variations without departing from the spirit of the present description.

Claims (10)

1. A method for visualizing a network link, comprising:
determining a target node on a link and access information of the target node, wherein the access information is used for accessing the target node;
acquiring configuration information and configuration state of a target node according to access information of the target node;
judging whether address information of other nodes except the target node exists in configuration information of the target node;
and when the address information of other nodes does not exist, the configuration information and the configuration state of the target node are displayed.
2. The method according to claim 1, wherein the method further comprises:
obtaining a query element, wherein the query element comprises a query type and query content, the query type is used for determining a node range of a query, and the query content is used for determining a target node from the node range of the query;
accordingly, the determining the access information of the target node and the target node on the link includes:
Judging whether the query type belongs to the domain name;
when the query type does not belong to the domain name, extracting a plurality of first nodes matched with the query type from a preset database;
comparing the address information of the plurality of first nodes with the address information in the query content;
according to the comparison result, screening nodes matched with the address information in the query content from a plurality of first nodes as target nodes;
and obtaining access information matched with the first node from a preset database as access information of the target node.
3. The method of claim 2, wherein the query types include at least one of: the domain name comprises a public network domain name and an intranet domain name, and the address comprises a public network address and an intranet address; the query content includes at least one of: address information, port information.
4. The method according to claim 2, wherein the method further comprises:
when the query type belongs to the domain name, extracting a plurality of second nodes matched with the query type from a preset database to serve as target nodes, wherein the plurality of second nodes are other nodes except the first node;
and obtaining access information matched with the second node from a preset database as access information of the target node.
5. The method according to claim 1, wherein the obtaining the configuration information and the configuration state of the target node according to the access information of the target node includes:
accessing a target node according to access information of the target node, inputting a configuration acquisition instruction corresponding to the target node, which is generated in advance, into the target node, and acquiring configuration text information corresponding to the target node;
and extracting effective text information in the configuration text information to obtain the configuration information and the configuration state of the target node.
6. The method of claim 5, wherein the configuration information comprises at least one of: the configuration state comprises at least one of the following: whether addresses corresponding to the domain name are effective, whether the load balancing virtual address and the hanging node are effective, and whether other virtual addresses and background service addresses are effective.
7. The method according to claim 1, wherein the method further comprises:
When address information of other nodes exists, determining a second target node on a link and access information of the second target node according to the address information;
acquiring configuration information and configuration state of the second target node according to the access information of the second target node;
judging whether second address information exists in configuration information of a second target node, wherein the second address information is other address information except the address information of the second target node;
and when the second address information does not exist, the configuration information and the configuration state of the second target node are displayed.
8. A network link visualization apparatus, comprising:
the determining module is used for determining the target node on the link and the access information of the target node, wherein the access information is used for accessing the target node;
the acquisition module is used for acquiring the configuration information and the configuration state of the target node according to the access information of the target node;
the judging module is used for judging whether address information of other nodes except the target node exists in the configuration information of the target node;
and the display module is used for displaying the configuration information and the configuration state of the target node when the address information of other nodes does not exist.
9. An electronic device comprising a memory and a processor, said processor and said memory being communicatively coupled to each other, said memory having stored therein computer instructions, said processor implementing the steps of the method of any of claims 1-7 by executing said computer instructions.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the steps of the method according to any of claims 1-7.
CN202410095907.4A 2024-01-23 2024-01-23 Visualization method and device for network link Pending CN117857323A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410095907.4A CN117857323A (en) 2024-01-23 2024-01-23 Visualization method and device for network link

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410095907.4A CN117857323A (en) 2024-01-23 2024-01-23 Visualization method and device for network link

Publications (1)

Publication Number Publication Date
CN117857323A true CN117857323A (en) 2024-04-09

Family

ID=90541797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410095907.4A Pending CN117857323A (en) 2024-01-23 2024-01-23 Visualization method and device for network link

Country Status (1)

Country Link
CN (1) CN117857323A (en)

Similar Documents

Publication Publication Date Title
US11700273B2 (en) Rule-based network-threat detection
CN112187825B (en) Honeypot defense method, system, equipment and medium based on mimicry defense
US8020045B2 (en) Root cause analysis method, apparatus, and program for IT apparatuses from which event information is not obtained
CN103607385B (en) Method and apparatus for security detection based on browser
JP2019536331A (en) System and method for interactive network analysis platform
CN106209920B (en) A kind of safety protecting method and device of dns server
US20190068598A1 (en) Verifying whether connectivity in a composed policy graph reflects a corresponding policy in input policy graphs
JP7416919B2 (en) Data processing methods and devices and computer storage media
CN108600260A (en) A kind of industry Internet of Things security configuration check method
CN108183975A (en) A kind of method and system of domain name mapping
Serketzis et al. Actionable threat intelligence for digital forensics readiness
CN114465741B (en) Abnormality detection method, abnormality detection device, computer equipment and storage medium
CN111193640A (en) Stateful data plane fault detection method using policy decomposition and symbolic execution
Killer et al. Threat management dashboard for a blockchain collaborative defense
CN117857323A (en) Visualization method and device for network link
Sharma et al. A Graph Database-Based Method for Network Log File Analysis
Mugitama et al. An evidence-based technical process for openflow-based SDN forensics
Boeira et al. Traffic centralization and digital sovereignty: an analysis under the lens of DNS servers
CN116074029A (en) Risk prediction information determining method and device, electronic equipment and storage medium
CN116074280A (en) Application intrusion prevention system identification method, device, equipment and storage medium
CN114221808B (en) Security policy deployment method and device, computer equipment and readable storage medium
CN116302711B (en) Disaster recovery method and device based on cloud platform mirror image, electronic equipment and storage medium
CN117331819A (en) Method and device for classifying test cases of gateway equipment and electronic equipment
CN117614705A (en) Method and device for displaying attack link, computer equipment and storage medium
Klang Network Device Enumeration and Identification Using Passive Asset Detection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination