CN117875924A - Service alarm system optimization method, device, computer equipment and storage medium - Google Patents

Service alarm system optimization method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN117875924A
CN117875924A CN202410039488.2A CN202410039488A CN117875924A CN 117875924 A CN117875924 A CN 117875924A CN 202410039488 A CN202410039488 A CN 202410039488A CN 117875924 A CN117875924 A CN 117875924A
Authority
CN
China
Prior art keywords
information
mail
data
mail data
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410039488.2A
Other languages
Chinese (zh)
Inventor
龙长江
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202410039488.2A priority Critical patent/CN117875924A/en
Publication of CN117875924A publication Critical patent/CN117875924A/en
Pending legal-status Critical Current

Links

Abstract

The application belongs to the field of financial science and technology, is applied to risk control of financial business, and relates to a business alarm system optimization method, a business alarm system optimization device, computer equipment and a storage medium, wherein the business alarm system optimization method comprises the following steps: extracting mail data according to the data extraction information; classifying the mail data to obtain alarm mail data and alarm related mail data; analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information; searching corresponding source mail data according to mail invalidation processing information, and detecting the source mail data; if the source mail data are valid, collecting first feedback information fed back from the mail address; if the source mail data are invalid, collecting second feedback information fed back from the display page; and analyzing the first feedback information and the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining processing or closing processing on the corresponding system monitor. The service alarm system optimization method and the service alarm system can effectively optimize the service alarm system.

Description

Service alarm system optimization method, device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of system alarm technologies, and in particular, to a method and apparatus for optimizing a service alarm system, a computer device, and a storage medium.
Background
With the advent of the digitization era, more and more business data begin to be online, in order to ensure the accuracy and real-time performance of the data, a corresponding monitoring alarm function needs to be configured for a data object related to the business data, for example, in a financial business system, a monitoring alarm module needs to be configured for loan business data to monitor loan information, or a monitoring alarm module needs to be configured for insurance business data to monitor insurance information, or a monitoring alarm module needs to be configured for bank account data to monitor bank account information, and the like, each business data in the financial industry is monitored by setting the monitoring alarm module, so that when the monitoring alarm module monitors that risk alarm items appear in the business data, corresponding risk alarm information is generated, and the risk alarm information is sent to corresponding monitoring personnel in a mail notification mode, so that the effective monitoring of the financial business system is realized.
The service alarm system is a functional system for effectively monitoring the data objects in the service system, automatically monitors the service system in real time through the service alarm system, and timely generates corresponding alarm information to remind so as to avoid the service system from running continuously under the condition of risk alarm, improve the safety of the service system and further effectively ensure the normal work of the service system.
However, as the service system is continuously updated, a situation that some service indexes change is caused, when the change occurs, the monitoring of some data objects by the service alarm system is likely to be invalid, so that useless mail information is further sent, and because personnel change or job position change, a plurality of invalid alarm mails configured by the prior personnel are not cleaned in time, and the system is continuously sending new alarm mails, so that the waste of system resources is caused. Meanwhile, too many reminding type alarm mails are configured in the monitoring items, and the sending frequency of the part of mails is very high, so that excessive mail cost can be generated. And some projects or related project components are already offline, but the alarm configuration is not yet cleaned, so that a plurality of invalid alarms are generated, and the running memory of the system is occupied, so that inconvenience is brought to the use of the system.
Disclosure of Invention
The invention aims to provide a service alarm system optimization method, a device, computer equipment and a storage medium, so as to solve the problem that the service alarm system carries out invalid alarm to waste system resources.
In order to solve the above technical problems, the embodiments of the present application provide a service alarm system optimization method, which adopts the following technical schemes:
Acquiring data extraction information, and extracting mail data from a preset alarm system library according to the data extraction information;
classifying the mail data to obtain alarm mail data and alarm related mail data;
analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information;
searching corresponding source mail data according to the mail invalidation processing information, and detecting whether the state of the source mail data is valid or invalid;
if the state of the source mail data is valid, the source mail data is sent to a corresponding mail address, and first feedback information fed back from the mail address is collected;
if the state of the source mail data is invalid, acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and
Searching a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining processing or closing processing on the system monitor according to the opening instruction or the closing instruction.
Further, the step of acquiring data extraction information and extracting mail data from a preset alarm system library according to the data extraction information specifically includes:
acquiring the data extraction information, and analyzing the data extraction information to obtain search identification information and data scanning information;
searching a corresponding mail account in the alarm system library according to the searching identification information; and
Traversing all the mails sent and received under the mail account according to the data scanning information, and extracting the mails sent and received as the mail data.
Further, the step of classifying the mail data to obtain alarm mail data and alarm associated mail data specifically includes:
acquiring the mail data, and screening the mail data according to a preset alarm data identifier to obtain alarm related data;
acquiring target address information of the alarm related data, and sorting association relation information of the alarm related data according to the target address information and the alarm data identifier; and
And classifying the alarm related data according to the association relation information to obtain the alarm mail data and the alarm associated mail data.
Further, the step of analyzing the alert mail data and the alert associated mail data to obtain mail invalidation processing information specifically includes:
acquiring preset mail data screening information, and analyzing the mail data screening information to obtain a time length judgment threshold value and processing completion node information;
processing flow information is arranged according to the alarm mail data and the alarm associated mail data, and processing termination node information corresponding to the processing flow information is obtained;
acquiring first time information of the alarm mail data and second time information of the alarm associated mail data, and calculating processing time according to the first time information and the second time information;
comparing the processing termination node information with the processing completion node information, and extracting alarm mail data and alarm associated mail data which are inconsistent with the processing termination node information and the processing completion node information to obtain the mail invalid processing information; and
Comparing the processing time length with the time length judging threshold value, and extracting alarm mail data and alarm associated mail data of which the processing time length is smaller than the time length judging threshold value to obtain the mail invalid processing information.
Further, the step of sending the source mail data to a corresponding mail address for warning and reminding, and collecting the first feedback information fed back from the mail address specifically includes:
acquiring the sending time of the source mail data, and the number of alarm mails and the number of alarm associated mails corresponding to the source mail data;
sequencing the source mail data according to the sending time, the number of the alarm mail data and the number of the alarm associated mails, and generating a source mail sequencing table;
acquiring monitoring information corresponding to the source mail data, and analyzing the monitoring information to obtain monitoring item information and a monitoring configuration object;
acquiring object information of the monitoring configuration object, and analyzing the object information to obtain the mail address;
transmitting the source mail data and the monitoring item information to the corresponding mail addresses according to the sorting order of the source mail sorting table; and
Acquiring preset first timing extraction information, performing timing access on a preset feedback mail address according to the first timing extraction information, extracting feedback mail data of the feedback mail address, and taking the feedback mail data as the first feedback information.
Further, the step of acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page specifically includes:
acquiring the alarm mail data corresponding to the source mail data, and searching the source mail information corresponding to the source mail data in a pre-stored mail record table according to the alarm mail data corresponding to the source mail data, wherein the source mail information comprises: source mail sending time and source mail sending object;
acquiring preset display page address information, and transmitting the source mail transmitting time and the source mail transmitting object to a display page corresponding to the display page address for display; and
Acquiring preset second timing extraction information, performing timing access on the display page according to the second timing extraction information, extracting page feedback information recorded by the display page, and taking the page feedback information as the second feedback information.
Further, the step of searching for a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and performing a keep-open process or a close process on the system monitor according to the opening instruction or the closing instruction specifically includes:
Analyzing the first feedback information and the second feedback information to obtain a first feedback field and a second feedback field;
extracting keywords from the first feedback field and the second feedback field to obtain field keywords, and identifying processing instructions corresponding to the field keywords, wherein the processing instructions comprise the opening instructions and the closing instructions;
performing a keep-open process on the system monitor according to the open instruction; and
And closing the system monitor according to the closing instruction.
In order to solve the above technical problem, an embodiment of the present application further provides a service alarm system optimization device, including:
the data extraction module is used for acquiring data extraction information and extracting mail data from a preset alarm system library according to the data extraction information;
the data classification module is used for classifying the mail data to obtain alarm mail data and alarm associated mail data;
the data analysis module is used for analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information;
the data detection module is used for searching corresponding source mail data according to the mail invalidation processing information and detecting whether the state of the source mail data is valid or invalid;
The first information collection module is used for sending the source mail data to a corresponding mail address if the state of the source mail data is valid, and collecting first feedback information fed back from the mail address;
the second information collection module is used for acquiring source mail information according to the source mail data if the state of the source mail data is invalid, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and
And the system adjustment module is used for searching a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining processing or closing processing on the system monitor according to the opening instruction or the closing instruction.
In order to solve the above technical problems, the embodiments of the present application further provide a computer device, which adopts the following technical schemes:
the computer equipment comprises a memory and a processor, wherein the memory stores a computer program, and the processor realizes the steps of the service alarm system optimization method when executing the computer program.
In order to solve the above technical problems, embodiments of the present application further provide a computer readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having stored thereon computer readable instructions which when executed by a processor implement the steps of the business alert system optimization method of any of the above claims.
Compared with the prior art, the embodiment of the application has the following main beneficial effects:
according to the method, the mail data are extracted from the preset alarm system library according to the data extraction information, so that all mail data recorded in the alarm system library are obtained; the mail data is classified, so that alarm mail data and alarm related mail data are obtained; analyzing the alarm mail data and the alarm associated mail data so as to confirm whether the alarm mail is processed timely and effectively, and obtaining mail invalid processing information after confirmation; the corresponding source mail data is searched according to the mail invalidation processing information, and whether the state of the source mail data is valid or invalid is detected, so that corresponding processing can be carried out according to whether the source mail data is in a valid state or not; if the state of the source mail data is valid, the source mail data is sent to a corresponding mail address for warning and reminding, and first feedback information fed back from the mail address is collected; if the state of the source mail data is invalid, acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and searching the corresponding system monitor according to the first feedback information and the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining treatment or closing treatment on the system monitor according to the opening instruction or the closing instruction so as to realize the optimization of the service alarm system. The method and the device can be applied to the financial business alarm system, and the financial business alarm system is optimized by carrying out opening maintaining processing or closing processing on the system monitor corresponding to the financial business data.
Drawings
For a clearer description of the solution in the present application, a brief description will be given below of the drawings that are needed in the description of the embodiments of the present application, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow chart of one embodiment of a data batch request method according to the present application;
FIG. 3 is a flow chart of one embodiment of step S10 of FIG. 2;
FIG. 4 is a flow chart of one embodiment of step S20 of FIG. 2;
FIG. 5 is a flow chart of one embodiment of step S30 of FIG. 2;
FIG. 6 is a flow chart of one embodiment of step S50 of FIG. 2;
FIG. 7 is a flow chart of one embodiment of step S60 of FIG. 2;
FIG. 8 is a flow chart of one embodiment of step S70 of FIG. 2;
FIG. 9 is a schematic diagram illustrating one embodiment of a data batch request device according to the present application;
FIG. 10 is a schematic structural diagram of one embodiment of a computer device according to the present application.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the applications herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "comprising" and "having" and any variations thereof in the description and claims of the present application and in the description of the figures above are intended to cover non-exclusive inclusions. The terms first, second and the like in the description and in the claims or in the above-described figures, are used for distinguishing between different objects and not necessarily for describing a sequential or chronological order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment may be included in at least one embodiment of the present application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
In order to better understand the technical solutions of the present application, the following description will clearly and completely describe the technical solutions in the embodiments of the present application with reference to the accompanying drawings.
As shown in fig. 1, a system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications, such as a web browser application, a shopping class application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc., may be installed on the terminal devices 101, 102, 103.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablet computers, electronic book readers, MP3 players (Moving Picture ExpertsGroup Audio Layer III, dynamic video expert compression standard audio plane 3), MP4 (Moving PictureExperts Group Audio Layer IV, dynamic video expert compression standard audio plane 4) players, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the operation system optimization method based on artificial intelligence provided in the embodiments of the present application is generally executed by a server, and correspondingly, the operation system optimization device based on artificial intelligence is generally disposed in the server.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to FIG. 2, a flow chart of one embodiment of a business alert system optimization method according to the present application is shown. The service alarm system optimizing method comprises the following steps:
step S10, acquiring data extraction information, and extracting mail data from a preset alarm system library according to the data extraction information;
in this embodiment, the mail data refers to mail sending and receiving data recorded in the alarm system library, and an object corresponding to the mail sending and receiving data is a mail account number in the alarm system library.
Step S20, classifying the mail data to obtain alarm mail data and alarm associated mail data;
In this embodiment, the alert mail data refers to alert mails sent to the mail account by the service alert system, and the alert associated mail data refers to process flow mails generated after the process processing is performed on the alert alerts by the monitoring personnel corresponding to the mail account. In this embodiment, when the service system sends an alert notification mail and a process flow mail to the monitoring personnel, the system will copy the sent mail to a predetermined storage location in the alert system library for backup storage, so as to realize real-time monitoring of the alert flow.
Step S30, analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information;
in this embodiment, the mail invalidation processing information refers to status information that alarm reminding items of alarm mails are not processed in time or are not processed at the current time.
Step S40, searching corresponding source mail data according to the mail invalidation processing information, and detecting whether the state of the source mail data is valid or invalid;
in this embodiment, the source mail data refers to a monitoring item mail generated when the data object is monitored for the first time, where the monitoring item mail is updated by a monitoring configurator and sent to a predetermined storage location in the service system for storage, and the mail includes monitoring information, where the monitoring information further includes monitoring item information and a monitoring configuration object, where the monitoring item information includes time of monitoring the data object, identification information of the monitoring data object, monitoring status of the monitoring data object, and the monitoring configuration object includes name of the monitoring configurator, and a mail address of the monitoring configurator, and by detecting whether the source mail data is in an active state or an inactive state, whether the current monitoring item is handled by the monitoring configurator is effectively determined.
Step S50, if the state of the source mail data is valid, the source mail data is sent to a corresponding mail address, and first feedback information fed back from the mail address is collected;
in this embodiment, the first feedback information refers to reply information fed back after the mail addressee corresponding to the mail address views the data information included in the source mail data, where the reply information includes a system monitor and a processing mode of the system monitor.
Step S60, if the state of the source mail data is invalid, acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and
In this embodiment, the second feedback information refers to reply information fed back after the viewer of the display page views the source mail information, where the reply information includes a system monitor and a processing manner of the system monitor.
Step S70, searching for a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and performing a keep-open process or a close process on the system monitor according to the opening instruction or the closing instruction.
In this embodiment, the system monitor refers to an event trigger for monitoring a data object, where the event trigger includes a corresponding trigger condition, where the trigger condition corresponds to a data risk identification indicator of the data object, and when risk information occurs in the data object, risk identification is performed on the data object through the data risk identification indicator, and after a risk is identified, a mail generation event is triggered through the event trigger to generate a corresponding alert mail.
The embodiment can be applied to risk monitoring and alarming of an insurance business system, wherein in the insurance business system, the monitoring object of a system monitor is insurance business data, such as insurance sales, insurance business products, insurance customer information, insurance project planning and the like, and the sensitive data object is used as the monitoring object, so that effective monitoring and alarming of the insurance business system are realized. And simultaneously, after the alarm, closing a system monitor in the insurance business system according to the feedback condition obtained after the alarm mail is prompted so as to realize the optimization of a monitoring alarm module of the insurance business system.
According to the method, the mail data are extracted from the preset alarm system library according to the data extraction information, so that all mail data recorded in the alarm system library are obtained; the mail data is classified, so that alarm mail data and alarm related mail data are obtained; analyzing the alarm mail data and the alarm associated mail data so as to confirm whether the alarm mail is processed timely and effectively, and obtaining mail invalid processing information after confirmation; the corresponding source mail data is searched according to the mail invalidation processing information, and whether the state of the source mail data is valid or invalid is detected, so that corresponding processing can be carried out according to whether the source mail data is in a valid state or not; if the state of the source mail data is valid, the source mail data is sent to a corresponding mail address for warning and reminding, and first feedback information fed back from the mail address is collected; if the state of the source mail data is invalid, acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and searching the corresponding system monitor according to the first feedback information and the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining treatment or closing treatment on the system monitor according to the opening instruction or the closing instruction so as to realize the optimization of the service alarm system. The method and the device can be applied to the financial business alarm system, and the financial business alarm system is optimized by carrying out opening maintaining processing or closing processing on the system monitor corresponding to the financial business data.
With continued reference to FIG. 3, a flowchart of one particular embodiment of step S10 is shown, comprising the steps of:
step S101, acquiring the data extraction information, and analyzing the data extraction information to obtain search identification information and data scanning information;
step S102, searching a corresponding mail account in the alarm system library according to the searching identification information; and
In this embodiment, the searching identification information is ID information corresponding to the mail account, and the mail account can be accurately searched through the ID information, and repeated acquisition of the mail account is avoided.
Step S103, traversing all the mails sent and received under the mail account according to the data scanning information, and extracting the mails sent and received as the mail data.
According to the embodiment, the data extraction information is obtained and analyzed, so that the searching identification information and the data scanning information are obtained, the corresponding mail account is searched according to the searching identification information and the data scanning information, all the mails sent and received under the mail account are extracted, and the mail data are effectively obtained.
With continued reference to fig. 4, a flowchart of one particular embodiment of step S20 is shown, comprising the steps of:
Step S201, acquiring the mail data, and screening the mail data according to a preset alarm data identifier to obtain alarm related data;
in this embodiment, the alarm data identifier includes field information such as alarm, alert, risk, and process, and identifies text content of the mail data according to the field information, so as to screen the mail data and obtain alarm related data.
Step S202, obtaining target address information of the alarm related data, and sorting association relation information of the alarm related data according to the target address information and the alarm data identifier; and
In this embodiment, the target address information is a mail sending target address of the alarm related data, and the alarm related data is distinguished by field information in the alarm data identifier, for example, a mail containing fields of alarm, alert, risk, etc. is an alarm mail, a mail containing fields of alarm, risk, processing, etc. is an alarm processing mail, the target address information is a mail of a monitoring configurator is an alarm mail, and the target address information is a mail of a processing auditor is an alarm processing mail. And the association relation information of the alarm related data is obtained by sorting the association relation of the alarm mail and the alarm processing mail.
And step 203, classifying the alarm related data according to the association relation information to obtain the alarm mail data and the alarm associated mail data.
In this embodiment, the association relationship information includes a correspondence relationship between the alert mail and the alert processing mail, for example, the alert mail a corresponds to the alert processing mail A1 and the alert processing mail A2. The alarm related data is effectively classified through the association relation information so as to divide alarm mails into alarm mail data and alarm processing mails into alarm related mail data.
With continued reference to fig. 5, a flowchart of one particular embodiment of step S30 is shown, comprising the steps of:
step S301, acquiring preset mail data screening information, and analyzing the mail data screening information to obtain a time length judgment threshold value and processing completion node information;
step S302, processing flow information is arranged according to the alarm mail data and the alarm associated mail data, and processing termination node information corresponding to the processing flow information is obtained;
in this embodiment, the alert mail data includes an alert mail, the alert associated mail data includes an alert processing mail, where the alert processing mail includes processing report information, the processing report information further includes processing success and processing failure, when the current processing step is not successful, processing needs to be performed again, or the processing of the alert is divided into a plurality of stages, and the plurality of stages correspond to a complete processing procedure, so that the alert processing procedure may include a plurality of processing steps, for example, an alert processing step X1, an alert processing step X2, and an alert processing step X3, and the alert processing step X3 closest to the current time period is taken as processing termination node information.
Step S303, obtaining first time information of the alarm mail data and second time information of the alarm associated mail data, and calculating processing duration according to the first time information and the second time information;
in this embodiment, the first time information refers to the time of sending the alert mail data, the second time information refers to the time of sending the alert associated mail data, and the processing duration is calculated by calculating the difference between the second time information and the second time information. For example, if the first time information is 2 hours 30 minutes 30 seconds and the second time information is 5 hours 30 minutes 30 seconds, the processing time is 3 hours. In this embodiment, the value of the second time information is the sending time of the alarm associated mail data corresponding to the processing termination node information.
Step S304, comparing the processing termination node information with the processing completion node information, and extracting alarm mail data and alarm associated mail data which are inconsistent with the processing termination node information and the processing completion node information to obtain the mail invalidation processing information; and
In this embodiment, by comparing the processing termination node information with the processing completion node information and identifying whether the processing completion node corresponds to the processing termination node, it is determined whether the alert mail is processed, so that alert mail data and alert associated mail data which are not processed are extracted as mail invalidation processing information.
Step S305, comparing the processing duration with the duration judgment threshold, and extracting the alarm mail data and the alarm associated mail data, where the processing duration is less than the duration judgment threshold, so as to obtain the mail invalid processing information.
In this embodiment, by comparing the processing time length with the time length judgment threshold, and detecting whether the processing time length exceeds the time length judgment threshold, whether the processing time length of the alert mail exceeds the expected time limit is judged, so that alert mail data and alert associated mail data, the processing time length of which is less than the time length judgment threshold, are extracted as mail invalid processing information. In this embodiment, the duration judgment threshold is preset to be 6 hours, and can be adjusted according to actual situations.
With continued reference to fig. 6, a flowchart of one particular embodiment of step S50 is shown, comprising the steps of:
step S501, acquiring the sending time of the source mail data, and the number of alarm mails and the number of alarm related mails corresponding to the source mail data;
step S502, sorting the source mail data according to the sending time, the number of the alarm mail data and the number of the alarm associated mails, and generating a source mail sorting table;
Step S503, obtaining the monitoring information corresponding to the source mail data, and analyzing the monitoring information to obtain monitoring item information and monitoring configuration objects;
step S504, obtaining the object information of the monitoring configuration object, and analyzing the object information to obtain the mail address;
step S505, the source mail data and the monitoring item information are sent to the corresponding mail addresses according to the sorting order of the source mail sorting table; and
Step S506, obtaining preset first timing extraction information, performing timing access on a preset feedback mail address according to the first timing extraction information, extracting feedback mail data of the feedback mail address, and taking the feedback mail data as the first feedback information.
In this embodiment, the first timing extraction information includes a time interval of timing extraction, and the feedback mail address is accessed at a timing according to the time interval, and in this embodiment, the time interval is preset to 1 minute, and feedback mail data can be acquired at a timing by setting the first timing extraction information, so as to collect the first feedback information.
With continued reference to FIG. 7, a flowchart of one particular embodiment of step S60 is shown, comprising the steps of:
Step S601, acquiring alert mail data corresponding to the source mail data, and searching, in a pre-stored mail record table, for the source mail information corresponding to the source mail data according to the alert mail data corresponding to the source mail data, where the source mail information includes: source mail sending time and source mail sending object;
step S602, obtaining preset display page address information, and sending the source mail sending time and the source mail sending object to a display page corresponding to the display page address for display; and
Step S603, acquiring preset second timing extraction information, performing timing access on the presentation page according to the second timing extraction information, extracting page feedback information recorded by the presentation page, and taking the page feedback information as the second feedback information.
In this embodiment, the second timing extraction information includes a time interval for timing extraction, and the presentation page is accessed at a timing according to the time interval, and in this embodiment, the time interval is preset to 1 minute, and page feedback information can be obtained at a timing by setting the second timing extraction information, so as to collect the second feedback information.
With continued reference to fig. 8, a flowchart of one particular embodiment of step S70 is shown, comprising the steps of:
step S701, analyzing the first feedback information and the second feedback information to obtain a first feedback field and a second feedback field;
step S702, extracting keywords from the first feedback field and the second feedback field to obtain field keywords, and identifying processing instructions corresponding to the field keywords, where the processing instructions include the opening instruction and the closing instruction;
step S703, performing a keep-on process on the system monitor according to the on command; and
And step S704, closing the system monitor according to the closing instruction.
In this embodiment, the first feedback field and the second feedback field contain feedback text information, for example: turned off for monitor Y1, kept on or off for monitor Y2, etc. Extracting keywords from the first feedback field and the second feedback field, and identifying the extracted field keywords, so as to obtain a processing instruction comprising a monitor name and a monitor processing mode, for example, if the field keywords are monitors Y1 and are closed, closing the system monitor Y1, and if the field keywords are monitors Y2 and are not closed, not processing the system monitor Y2, and continuously keeping on.
In this embodiment, if the first feedback information or the second feedback information is not collected in the predetermined period, the corresponding system monitor is processed according to a processing instruction preset in the system, and if the first feedback information or the second feedback information corresponding to the alarm source data is not collected in the predetermined period, the corresponding system monitor is closed to implement optimization of the service alarm system.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored in a computer-readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a nonvolatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the flowcharts of the figures may include a plurality of sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily being sequential, but may be performed in turn or alternately with other steps or at least a portion of the other steps or stages.
With further reference to fig. 9, as an implementation of the method shown in fig. 1, the present application provides an embodiment of a service alarm system optimization apparatus, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 1, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 9, the service alarm system optimization device 800 according to the present embodiment includes: a data extraction module 801, a data classification module 802, a data analysis module 803, a data detection module 804, a first information collection module 805, a second information collection module 806, and a system adjustment module 807. Wherein:
the data extraction module 801 is configured to obtain data extraction information, and extract mail data from a preset alarm system library according to the data extraction information;
the data classification module 802 is configured to perform classification processing on the mail data to obtain alarm mail data and alarm associated mail data;
the data analysis module 803 is configured to analyze the alert mail data and the alert associated mail data to obtain mail invalidation processing information;
a data detection module 804, configured to find corresponding source mail data according to the mail invalidation processing information, and detect whether the state of the source mail data is valid or invalid;
A first information collection module 805, configured to send the source mail data to a corresponding mail address if the status of the source mail data is valid, and collect first feedback information fed back from the mail address;
the second information collecting module 806 is configured to obtain source mail information according to the source mail data if the state of the source mail data is invalid, send the source mail information to a preset display page for display, and collect second feedback information fed back from the display page; and
And a system adjustment module 807, configured to search a corresponding system monitor according to the first feedback information or the second feedback information, analyze the first feedback information or the second feedback information, obtain an opening instruction or a closing instruction, and perform a keep-open process or a close process on the system monitor according to the opening instruction or the closing instruction.
According to the embodiment, the device module corresponding to the service alarm system optimization method is arranged, so that the opening and closing of the system monitor for monitoring the data object can be effectively adjusted, and the service alarm system is optimized.
In order to solve the technical problems, the embodiment of the application also provides computer equipment. Referring specifically to fig. 10, fig. 10 is a basic structural block diagram of a computer device according to the present embodiment.
The computer device 9 comprises a memory 91, a processor 92, a network interface 93 communicatively connected to each other via a system bus. It should be noted that only computer device 9 having components 91-93 is shown in the figures, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead. It will be appreciated by those skilled in the art that the computer device herein is a device capable of automatically performing numerical calculations and/or information processing in accordance with predetermined or stored instructions, the hardware of which includes, but is not limited to, microprocessors, application specific integrated circuits (Application Specific Integrated Circuit, ASICs), programmable gate arrays (fields-Programmable Gate Array, FPGAs), digital processors (Digital Signal Processor, DSPs), embedded devices, etc.
The computer equipment can be a desktop computer, a notebook computer, a palm computer, a cloud server and other computing equipment. The computer equipment can perform man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch pad or voice control equipment and the like.
The memory 91 includes at least one type of readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the storage 91 may be an internal storage unit of the computer device 9, such as a hard disk or a memory of the computer device 9. In other embodiments, the memory 91 may also be an external storage device of the computer device 9, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 9. Of course, the memory 91 may also comprise both an internal memory unit of the computer device 9 and an external memory device. In this embodiment, the memory 91 is generally used to store an operating system and various application software installed on the computer device 9, such as program codes of a service alarm system optimization method, etc. Further, the memory 91 may be used to temporarily store various types of data that have been output or are to be output.
The processor 92 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 92 is typically used to control the overall operation of the computer device 9. In this embodiment, the processor 92 is configured to execute the program code stored in the memory 91 or process data, for example, execute the program code of the service alarm system optimization method.
The network interface 93 may comprise a wireless network interface or a wired network interface, which network interface 93 is typically used to establish a communication connection between the computer device 9 and other electronic devices.
According to the embodiment, the opening and closing of the system monitor for monitoring the data object can be effectively adjusted by setting the computer equipment corresponding to the optimization method of the service alarm system, so that the service alarm system is optimized.
The present application also provides another embodiment, namely, a computer readable storage medium, where a service alarm system optimization program is stored, where the service alarm system optimization program is executable by at least one processor, so that the at least one processor performs the steps of the service alarm system optimization method as described above.
The embodiment can effectively adjust the on/off of the system monitor for monitoring the data object by setting the computer readable storage medium corresponding to the service alarm system optimization method so as to realize the optimization of the service alarm system.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), comprising several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present application.
It is apparent that the embodiments described above are only some embodiments of the present application, but not all embodiments, the preferred embodiments of the present application are given in the drawings, but not limiting the patent scope of the present application. This application may be embodied in many different forms, but rather, embodiments are provided in order to provide a more thorough understanding of the present disclosure. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that modifications may be made to the embodiments described in the foregoing, or equivalents may be substituted for elements thereof. All equivalent structures made by the specification and the drawings of the application are directly or indirectly applied to other related technical fields, and are also within the protection scope of the application.

Claims (10)

1. The service alarm system optimizing method is characterized by comprising the following steps:
acquiring data extraction information, and extracting mail data from a preset alarm system library according to the data extraction information;
classifying the mail data to obtain alarm mail data and alarm related mail data;
analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information;
searching corresponding source mail data according to the mail invalidation processing information, and detecting whether the state of the source mail data is valid or invalid;
if the state of the source mail data is valid, the source mail data is sent to a corresponding mail address, and first feedback information fed back from the mail address is collected;
if the state of the source mail data is invalid, acquiring source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and
Searching a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining processing or closing processing on the system monitor according to the opening instruction or the closing instruction.
2. The service alerting system optimizing method of claim 1, wherein the step of obtaining data extraction information and extracting mail data from a preset alerting system library according to the data extraction information specifically comprises:
acquiring the data extraction information, and analyzing the data extraction information to obtain search identification information and data scanning information;
searching a corresponding mail account in the alarm system library according to the searching identification information; and
Traversing all the mails sent and received under the mail account according to the data scanning information, and extracting the mails sent and received as the mail data.
3. The method for optimizing a service alert system according to claim 1, wherein the step of classifying the mail data to obtain alert mail data and alert associated mail data comprises:
acquiring the mail data, and screening the mail data according to a preset alarm data identifier to obtain alarm related data;
acquiring target address information of the alarm related data, and sorting association relation information of the alarm related data according to the target address information and the alarm data identifier; and
And classifying the alarm related data according to the association relation information to obtain the alarm mail data and the alarm associated mail data.
4. The method for optimizing a service alert system according to claim 1, wherein the step of analyzing the alert mail data and the alert associated mail data to obtain mail invalidation processing information comprises:
acquiring preset mail data screening information, and analyzing the mail data screening information to obtain a time length judgment threshold value and processing completion node information;
processing flow information is arranged according to the alarm mail data and the alarm associated mail data, and processing termination node information corresponding to the processing flow information is obtained;
acquiring first time information of the alarm mail data and second time information of the alarm associated mail data, and calculating processing time according to the first time information and the second time information;
comparing the processing termination node information with the processing completion node information, and extracting alarm mail data and alarm associated mail data which are inconsistent with the processing termination node information and the processing completion node information to obtain the mail invalid processing information; and
Comparing the processing time length with the time length judging threshold value, and extracting alarm mail data and alarm associated mail data of which the processing time length is smaller than the time length judging threshold value to obtain the mail invalid processing information.
5. The service alert system optimization method according to claim 1, wherein the step of sending the source mail data to a corresponding mail address for alert reminding and collecting first feedback information fed back from the mail address specifically comprises:
acquiring the sending time of the source mail data, and the number of alarm mails and the number of alarm associated mails corresponding to the source mail data;
sequencing the source mail data according to the sending time, the number of the alarm mail data and the number of the alarm associated mails, and generating a source mail sequencing table;
acquiring monitoring information corresponding to the source mail data, and analyzing the monitoring information to obtain monitoring item information and a monitoring configuration object;
acquiring object information of the monitoring configuration object, and analyzing the object information to obtain the mail address;
transmitting the source mail data and the monitoring item information to the corresponding mail addresses according to the sorting order of the source mail sorting table; and
Acquiring preset first timing extraction information, performing timing access on a preset feedback mail address according to the first timing extraction information, extracting feedback mail data of the feedback mail address, and taking the feedback mail data as the first feedback information.
6. The optimization method of the service alarm system according to claim 1, wherein the step of acquiring the source mail information according to the source mail data, sending the source mail information to a preset display page for display, and collecting the second feedback information fed back from the display page specifically includes:
acquiring the alarm mail data corresponding to the source mail data, and searching the source mail information corresponding to the source mail data in a pre-stored mail record table according to the alarm mail data corresponding to the source mail data, wherein the source mail information comprises: source mail sending time and source mail sending object;
acquiring preset display page address information, and transmitting the source mail transmitting time and the source mail transmitting object to a display page corresponding to the display page address for display; and
Acquiring preset second timing extraction information, performing timing access on the display page according to the second timing extraction information, extracting page feedback information recorded by the display page, and taking the page feedback information as the second feedback information.
7. The service alarm system optimization method according to claim 1, wherein the step of searching for a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and performing a keep-open process or a close process on the system monitor according to the opening instruction or the closing instruction specifically includes:
analyzing the first feedback information and the second feedback information to obtain a first feedback field and a second feedback field;
extracting keywords from the first feedback field and the second feedback field to obtain field keywords, and identifying processing instructions corresponding to the field keywords, wherein the processing instructions comprise the opening instructions and the closing instructions;
performing a keep-open process on the system monitor according to the open instruction; and
And closing the system monitor according to the closing instruction.
8. A service alert system optimizing apparatus, comprising:
the data extraction module is used for acquiring data extraction information and extracting mail data from a preset alarm system library according to the data extraction information;
The data classification module is used for classifying the mail data to obtain alarm mail data and alarm associated mail data;
the data analysis module is used for analyzing the alarm mail data and the alarm associated mail data to obtain mail invalid processing information;
the data detection module is used for searching corresponding source mail data according to the mail invalidation processing information and detecting whether the state of the source mail data is valid or invalid;
the first information collection module is used for sending the source mail data to a corresponding mail address if the state of the source mail data is valid, and collecting first feedback information fed back from the mail address;
the second information collection module is used for acquiring source mail information according to the source mail data if the state of the source mail data is invalid, sending the source mail information to a preset display page for display, and collecting second feedback information fed back from the display page; and
And the system adjustment module is used for searching a corresponding system monitor according to the first feedback information or the second feedback information, analyzing the first feedback information or the second feedback information to obtain an opening instruction or a closing instruction, and carrying out opening maintaining processing or closing processing on the system monitor according to the opening instruction or the closing instruction.
9. A computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the steps of the service alert system optimization method of any one of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the service alarm system optimization method according to any of claims 1 to 7.
CN202410039488.2A 2024-01-09 2024-01-09 Service alarm system optimization method, device, computer equipment and storage medium Pending CN117875924A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410039488.2A CN117875924A (en) 2024-01-09 2024-01-09 Service alarm system optimization method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410039488.2A CN117875924A (en) 2024-01-09 2024-01-09 Service alarm system optimization method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117875924A true CN117875924A (en) 2024-04-12

Family

ID=90586151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410039488.2A Pending CN117875924A (en) 2024-01-09 2024-01-09 Service alarm system optimization method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117875924A (en)

Similar Documents

Publication Publication Date Title
CN112052111B (en) Processing method, device and equipment for server abnormity early warning and storage medium
CN111752793A (en) System abnormity monitoring method and device, computer equipment and storage medium
CN113556254B (en) Abnormal alarm method and device, electronic equipment and readable storage medium
CN111586005B (en) Scanner scanning behavior identification method and device
CN111585785B (en) Method and device for shielding alarm information, computer equipment and storage medium
CN115237857A (en) Log processing method and device, computer equipment and storage medium
CN115329381A (en) Sensitive data-based analysis and early warning method and device, computer equipment and medium
CN115273231A (en) Information processing method, information processing apparatus, storage medium, and electronic device
CN116389148B (en) Network security situation prediction system based on artificial intelligence
CN117875924A (en) Service alarm system optimization method, device, computer equipment and storage medium
CN115757075A (en) Task abnormity detection method and device, computer equipment and storage medium
CN115543565A (en) Task processing method and device, computer equipment and storage medium
CN110677271B (en) Big data alarm method, device, equipment and storage medium based on ELK
CN113342619A (en) Log monitoring method and system, electronic device and readable medium
CN113595886A (en) Instant messaging message processing method and device, electronic equipment and storage medium
CN112116415A (en) Commodity information pushing method, device and system
CN117331786A (en) Service system alarm convergence method, device, computer equipment and storage medium
CN110365642B (en) Method and device for monitoring information operation, computer equipment and storage medium
CN113407859B (en) Resource recommendation method and device, electronic equipment and storage medium
CN117278298A (en) Domain name detection method, device, equipment and storage medium based on artificial intelligence
CN116129584A (en) Security alarm duplicate removal method, device, equipment and storage medium
CN117407420A (en) Data construction method, device, computer equipment and storage medium
CN116662987A (en) Service system monitoring method, device, computer equipment and storage medium
CN117034173A (en) Data processing method, device, computer equipment and storage medium
CN117453536A (en) System abnormality analysis method, system abnormality analysis device, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination