WO2020233251A1 - 一种数据管理方法及装置 - Google Patents

一种数据管理方法及装置 Download PDF

Info

Publication number
WO2020233251A1
WO2020233251A1 PCT/CN2020/083369 CN2020083369W WO2020233251A1 WO 2020233251 A1 WO2020233251 A1 WO 2020233251A1 CN 2020083369 W CN2020083369 W CN 2020083369W WO 2020233251 A1 WO2020233251 A1 WO 2020233251A1
Authority
WO
WIPO (PCT)
Prior art keywords
alarm
node
target
information
report
Prior art date
Application number
PCT/CN2020/083369
Other languages
English (en)
French (fr)
Inventor
王勇
殷跃
黄定朝
Original Assignee
深圳前海微众银行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海微众银行股份有限公司 filed Critical 深圳前海微众银行股份有限公司
Publication of WO2020233251A1 publication Critical patent/WO2020233251A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof

Definitions

  • the present invention relates to the technical field of financial technology (Fintech), in particular to a data management method and device.
  • the embodiments of the present invention provide a data management method and device, which are used to improve the efficiency of alarms and the satisfaction of users.
  • a data management method provided by an embodiment of the present invention includes:
  • the preset topology map includes a one-to-one corresponding to one or more systems Or multiple nodes.
  • the user can intuitively obtain the alarm information of one or more systems by viewing the preset topology map. Thereby user satisfaction can be improved; and by setting at least one alarm rule corresponding to the first system, when the data of the first system triggers the alarm rule corresponding to the first system, the first system can be automatically alarmed without The alarm information is determined manually, which can improve the efficiency of the alarm.
  • the displaying the first alarm information on the target node includes: determining the target alarm type to which the first alarm information belongs, and obtaining the target node from a preset mapping table The corresponding relationship between one or more alarm types and an alarm mode in, determine the target alarm mode corresponding to the target alarm type, and then display the first alarm information on the target node according to the target alarm mode;
  • the preset mapping table includes the corresponding relationship between the alarm type and the alarm mode of one or more nodes.
  • the corresponding relationship between one or more alarm types of the first system and the alarm mode is preset, so that the user can easily determine the alarm type (such as network interruption) based on the alarm mode displayed in the preset topology diagram of the alarm information Alarms, machine damage alarms, etc.), thereby reducing user workload and improving user satisfaction.
  • the method further includes: if it is determined that there is no node corresponding to the first system in the preset topology, displaying a node configuration interface to the user, and the node configuration interface is used to Create a node corresponding to the first system in the preset topology; further, receive first configuration information input by the user on the node configuration interface, where the first configuration information includes the first system corresponding The node style of the node in the first system, the connection relationship between the node corresponding to the first system and one or more nodes included in the preset topology diagram, one or more alarm types and alarms of the node corresponding to the first system Corresponding relationship of the mode; accordingly, the connection relationship between the node corresponding to the first system and the one or more nodes included in the preset topology map is based on the node pattern of the node corresponding to the first system A node corresponding to the first system is created in the preset topology map, and the correspondence between one or more alarm types and alarm modes of the nodes corresponding to
  • the user can input the first configuration information in the node management interface, thereby creating a new node and the alarm mode of the node on the preset topology diagram; that is, the above technical solution supports
  • the user-defined method sets the node and the alarm mode of the node, that is, the user can set the node and the alarm mode of the node according to actual needs, so that the data management method in the above technical solution has a wider application range.
  • the method further includes: acquiring the data generated by the one or more systems during the execution of the business, and displaying a report management interface to the user, the report management interface being used for reporting in the form of a report Displaying the data generated by the one or more systems; further, receiving second configuration information input by the user on the report management interface, the second configuration information including report type, report element, and title of report element , At least one of the parameters corresponding to the report element; correspondingly, obtain the target data in the one or more system-generated data according to the second configuration information, and obtain the target data according to the second configuration information and the target Data and generate target reports.
  • the user can obtain the data of one or more systems more intuitively and improve user satisfaction; and, by setting report management In the interface, the user can set the target report according to actual needs. For example, it can filter out the useless resources in advance and place the data that the user wants to obtain in the target report. That is to say, the above technical solution allows the user to customize the target report. To better meet actual needs.
  • the second configuration information further includes the recipient’s mailbox information and time information; the method further includes: at the time point indicated by the time information, according to the recipient’s Mailbox information, sending the target report to the recipient via email.
  • the target report can be sent to the email recipient at the sending time.
  • the user can set the email recipient and sending time according to actual needs, so as to make the data
  • the management method is more in line with actual needs; on the other hand, by setting the email recipient and sending time, the target report can be sent to the corresponding operation and maintenance personnel in a timely manner, thereby improving the efficiency of troubleshooting.
  • the second configuration information further includes one or more alarm rules corresponding to the target report; the time point indicated by the time information is based on the recipient’s Mailbox information, sending the target report to the recipient via email, including: at the time point indicated by the time information, if it is determined that the target report meets the triggering conditions of the one or more alarm rules, Then, second alarm information is generated, and the target report and the second alarm information are sent to the recipient by mail according to the mailbox information of the recipient.
  • the alarm information can be automatically generated when the target report is determined to trigger one or more alarm rules, which can reduce the workload of users and improve the efficiency of alarms; and , By sending the alarm information to the recipient, the recipient can obtain the alarm information in time, thereby improving the efficiency of troubleshooting.
  • an embodiment of the present invention provides a data management device, the device includes:
  • the obtaining module is used to obtain the data generated by the first system in the business execution process
  • a generating module configured to generate first alarm information if it is determined that the data meets the triggering condition of at least one alarm rule corresponding to the first system
  • a processing module configured to display the first alarm information on the target node if it is determined that there is a target node corresponding to the first system in the preset topology map; the preset topology map includes One or more nodes in one-to-one correspondence of multiple systems.
  • the processing module is configured to: determine the target alarm type to which the first alarm information belongs, and obtain the correspondence between one or more alarm types of the target node and the alarm mode from a preset mapping table Relationship, determine the target alarm mode corresponding to the target alarm type; the preset mapping table includes the corresponding relationship between the alarm type and the alarm mode of one or more nodes; further, the first alarm mode is determined according to the target alarm mode.
  • the alarm information is displayed on the target node.
  • the processing module is further configured to: if it is determined that there is no node corresponding to the first system in the preset topology, display a node configuration interface to the user, and the node configuration interface is used for Creating a node corresponding to the first system in the preset topology diagram; and receiving first configuration information input by the user on the node configuration interface, where the first configuration information includes the first system
  • the acquisition module is also used to: acquire data generated by the one or more systems in the business execution process; accordingly, the processing module is also used to: display the report management interface to the user
  • the report management interface is configured to display the data generated by the one or more systems in the form of a report; and, receiving second configuration information input by the user on the report management interface, the second configuration information Including at least one of the report type, report element, report element title, and report element corresponding parameter; and, according to the second configuration information, obtain the target data in the one or more system-generated data, and according to The second configuration information and the target data generate a target report.
  • the second configuration information further includes the recipient’s mailbox information and time information; the processing module is further configured to: at the time point indicated by the time information, according to the received The mailbox information of the person, and the target report is sent to the recipient by mail.
  • the second configuration information further includes one or more alarm rules corresponding to the target report; the processing module is further configured to: at the time point indicated by the time information, if It is determined that the target report meets the triggering conditions of the one or more alarm rules, then second alarm information is generated, and the target report and the second alarm information are sent by email according to the recipient’s mailbox information Sent to the recipient.
  • a computer-readable storage medium provided by an embodiment of the present invention includes instructions, which when run on a processor of a computer, cause the processor of the computer to execute any of the above-mentioned first or first aspects.
  • a computer program product provided by an embodiment of the present invention, when it is run on a computer, causes the computer to execute the method described in the first aspect or any of the first aspects.
  • this application provides a computing device, which includes:
  • processor memory, transceiver, and bus interface; among them, the processor, memory and transceiver are connected by a bus;
  • the processor is configured to read a program in the memory, and execute the foregoing first aspect or any of the methods described in the first aspect;
  • the memory is used to store one or more executable programs, and can store data used by the processor when performing operations.
  • FIG. 1 is a schematic diagram of a possible system architecture provided by an embodiment of the present invention
  • FIG. 2 is a schematic diagram of a process corresponding to a data management method provided by an embodiment of the present invention
  • FIG. 3 is a schematic diagram of a preset topology diagram provided by an embodiment of the present invention.
  • FIG. 4 is a schematic diagram of an updated preset topology diagram provided by an embodiment of the present invention.
  • FIG. 5 is a schematic flowchart corresponding to another data management method provided by an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a data management device provided by an embodiment of the present invention.
  • FIG. 7 is a schematic structural diagram of a computing device provided by this application.
  • the financial field usually involves multiple systems, such as office systems, production systems, operation and maintenance systems, etc.
  • the office system can be used to perform various internal affairs in the financial field, and the production system can be used to perform business generated in the financial field;
  • the operation and maintenance system can supervise the office system and the production system to ensure the normal operation of the office system and the production system.
  • the coordinated operation of multiple systems can ensure the rapid and healthy development of the financial sector.
  • the present invention provides a data management method to improve alarm efficiency and user satisfaction.
  • FIG. 1 is a schematic diagram of a possible system architecture provided by an embodiment of the present invention.
  • the system architecture may include one or more systems (system 101 to system 104 shown in FIG. 1), and a system connected to one or more systems.
  • Proxy server 200 Taking the system 101 as an example, the system 101 may be connected to the proxy server 200 in a wired manner, or may also be connected to the proxy server 200 in a wireless manner, which is not specifically limited.
  • one or more systems can be divided into a first type system and a second type system.
  • the first type system can be a security-level system, which is responsible for transactions and/or business-related matters in the financial field. , Such as production systems, accounting systems, etc.; the first type of system is the core system in the financial sector.
  • the second type of system can be an application-level system that is responsible for matters related to the operation of the financial field, such as office systems, network systems, and operation and maintenance systems.
  • the systems 101 to 103 may belong to the second type system, and the system 104 may belong to the first type system.
  • a security operation platform 300 may be provided in the system 104, and the security operation platform 300 may obtain data generated by the systems 101-104 in the process of executing services, and may manage these data.
  • the data can refer to transaction-related data, such as the number of transactions of the production system within a preset time period (such as 1 day, 1 week, 1 month), the number of bank card transactions, etc.; or it can also be Refers to data related to the operation of the financial sector, such as the number of network interruptions, the time of machine damage, etc.; or it can also include other data, such as the number of accounting errors, which are not specifically limited.
  • transaction-related data such as the number of transactions of the production system within a preset time period (such as 1 day, 1 week, 1 month), the number of bank card transactions, etc.
  • data related to the operation of the financial sector such as the number of network interruptions, the time of machine damage, etc.
  • other data such as the number of accounting errors, which are not specifically limited.
  • the security operation platform 300 may obtain the data of the system 101 to the system 103 by proxy forwarding. Specifically, for any one of the systems 101 to 103 (such as system 101), if the system 101 detects that the system 101 generates data during the execution of the business, it can send the generated data to the proxy server 200 , And forwarded by the proxy server 200 to the security operation platform 300; correspondingly, for the system 104, the system 104 can directly back up (or upload) the data generated by the system 104 in the process of executing services to the security operation platform 300.
  • implementation method 1 one or more systems can push data to the security operation platform in real time. Compared with the method of saving data through a preset database in the prior art, it can ensure the real-time data stored in the security operation platform. Sexuality and comprehensiveness.
  • the security operation system 300 can obtain the data of the systems 101 to 104 through manual page entry. Take the system 101 as an example. Specifically, the user can copy the data generated by the system 101 during the execution of the business to a storage device (such as a USB flash drive, mobile hard disk) in advance, and can connect the storage device to the security operation platform 400 , The data is entered into the security operation platform 400; in one example, the user can also perform addition, deletion, modification, and check operations on the data during the data entry process, thereby improving the efficiency of data acquisition.
  • a storage device such as a USB flash drive, mobile hard disk
  • the user can also perform addition, deletion, modification, and check operations on the data during the data entry process, thereby improving the efficiency of data acquisition.
  • the data generated by a certain system is forwarded to the safe operation platform through the proxy server, instead of acquiring the data by means of communication between the system and the system, it can prevent the data generated by a certain system from being acquired by other systems, and guarantee one or Security of data generated by multiple systems.
  • FIG. 2 is a schematic diagram of a process corresponding to a data management method provided by an embodiment of the present invention, wherein the execution subject of the data management method may be the security operation platform 400. As shown in Figure 2, the method includes:
  • Step 201 Obtain data generated by the first system during the execution of the service.
  • the data of the first system can be obtained through backup or manual page entry; accordingly, if the first system is the same Different systems (such as system 101) where the security operation platform 400 is located can obtain the data of the first system through proxy forwarding or manual page entry.
  • the process of acquiring data can be implemented with reference to the first implementation or the second implementation, which will not be repeated here.
  • the security operation platform 400 may also verify the data before receiving the data. Taking the data of the receiving system 101 as an example, in one example, if the system 101 sends the data to the security operation platform 400 by proxy forwarding, the security operation platform 400 can perform the first round of verification and the second round of calibration on the data. The first round of verification can verify the user's authority information, and the second round of verification can verify the data.
  • the data sent by the system 101 to the security operation platform 400 may include the authority information of the system 101, and the authority information may be the authority information pre-assigned to the system 101 by the security operation platform 400; accordingly
  • the security operation platform 400 receives the data, if it determines that the authority information of the system 101 is legal, it can perform the second round of verification process, and if it determines that the authority information of the system 101 is illegal, it can refuse to receive the data of the system 101.
  • the data sent by the system 101 to the security operation platform 400 may include the first verification value (such as a hash value) determined by the system 101 using a preset verification algorithm, and the security operation platform After 400 receives the data, the second check value can be determined by using a preset check algorithm. If the first check value matches the second check value, the security operation platform 400 can receive the data of the system 101; If the check value does not match the second check value, the security operation platform 400 may refuse to receive the data of the system 101. In another example, if the system 101 sends data to the security operation platform 400 through manual page entry, the security operation platform 400 may only perform the second round of verification on the data. In this example, the second round of verification It can be implemented with reference to the above process, and will not be repeated here.
  • the first verification value such as a hash value
  • the security operation platform 400 may store the data of the system 101 in the first database. In this way, the data of one or more systems received by the security operation platform 400 may be stored in the first database. On the one hand, since the data of one or more systems is sent to the security operation platform 400 in real time, the first database The data stored in it is more comprehensive and accurate, so that the platform 400 can manage the data of one or more systems; on the other hand, the data of one or more systems is managed through the first database, so that one or more systems do not need to be independent Maintain a separate database, which can reduce the pressure on one or more systems and improve the efficiency of data management.
  • Step 202 If it is determined that the data meets the triggering condition of at least one alarm rule corresponding to the first system, generate first alarm information.
  • At least one alarm rule corresponding to each of the systems 101 to 104 can be preset. Taking system 101 as an example, if the data of system 101 matches the trigger condition of at least one alarm rule corresponding to system 101, Then the safety operation platform 400 can generate the first alarm information.
  • Table 1 is a schematic table of at least one alarm rule corresponding to the system 101.
  • Table 1 Schematic of at least one alarm rule corresponding to system 101
  • the system 101 is correspondingly set with four alarm rules.
  • the four alarm rules are: alarm when the network interruption time in the system 101 exceeds 5 seconds; when the system 101 executes services, apply every second An alarm is issued when the number of open cards is greater than 1000; an alarm is issued when the current available memory space of a device in the system 101 is less than 5M; an alarm is issued when the network delay in the system 101 is greater than 2s.
  • the security operation platform 400 can analyze the data of the system 101, and if it is determined that the data of the system 101 triggers any of the above four alarm rules, the security operation platform 400 can generate corresponding alarm information. For example, in Example 1, if the data of the system 101 includes the information "when 10:50: ⁇ 10:51, the number of card opening applications is 2000", the security operation platform 400 can determine that the data of the system 101 triggers The second alarm rule in Table 1, in this way, the security operation platform 400 can generate the alarm information corresponding to the above second alarm rule; where the alarm information can include the identification of the system (ie system 101) and the content of the alarm (such as opening The number of cards), or it can also include other content, such as time information, which is not specifically limited.
  • the alarm information can include the identification of the system (ie system 101) and the content of the alarm (such as opening The number of cards), or it can also include other content, such as time information, which is not specifically limited.
  • the security operation platform 400 can determine that the data of the system 101 triggers the first alarm rule in Table 1. In this way, the security operation platform 400 can generate the alarm information corresponding to the above-mentioned first alarm rule.
  • Step 203 If it is determined that there is a target node corresponding to the first system in the preset topology, display the first alarm information on the target node.
  • the preset topology map may include one or more nodes corresponding to one or more systems in a one-to-one manner.
  • the preset topology map can be automatically created by the security operation platform based on the data of one or more systems; specifically, after the security operation platform obtains the data of one or more systems, it can be separately Create one or more nodes corresponding to one or more systems; further, the security operation platform can determine the communication connection relationship of one or more systems in the actual operation process, and can connect one or more nodes according to the communication connection relationship. Nodes, get the preset topology map.
  • the preset topology map can be created for the user; specifically, the user can perform view management operations on the security management platform to obtain the view management interface, which can be used to create the topology Figure; Further, the user can add one or more nodes corresponding to one or more systems and the connection relationship of one or more nodes on the view management interface, thereby obtaining a preset topology map.
  • FIG 3 is a schematic diagram of a preset topology diagram provided by an embodiment of the present invention.
  • the preset topology diagram may include multiple nodes, such as a disaster recovery center node, a physical computer room node, and a production virtual private network ( Virtual Private Network (vpn) node, security operation room node, firewall node, release room node, security front node, data operation room node, cooperative outreach area node and network node.
  • the disaster recovery center node and the physical computer room node can be respectively connected to the production vpn node
  • the firewall can be respectively connected to the production vpn node, the security operation room node, the data operation room node, the release room node, the security front node, and the cooperation external connection area node.
  • the cooperative outreach area can be connected to the network node.
  • the network connection status of any two connected nodes can also be displayed on the preset topology diagram.
  • the network connection status can be displayed in the preset topology diagram in a variety of ways, for example, it can be displayed in the preset topology diagram in the form of icons, or it can be displayed in the preset topology diagram in the form of text, or it can also be displayed through
  • the voice mode is displayed in the preset topology map, or it can also be displayed in the preset topology map by combining any number of icons, texts, and voices (ie, two or more), which is not specifically limited.
  • the network connection status can be displayed in the preset topology diagram through a combination of icons and text; specifically, if the network connection status between the firewall system and the cooperative external area system is normal, the firewall A lightning-style icon can be displayed on the connecting line between the node and the node in the cooperative outreach area, and the text "network condition is normal" can be displayed under the lightning-style icon.
  • connection relationship of one or more systems and the network connection status of the system can be presented to the user intuitively; that is, the user can view one or more preset topology diagrams.
  • the connection relationship of each node and the network connection status of the node can obtain the network connection status of the two systems connected in one or more systems in time, thereby improving user satisfaction.
  • the first alarm information after the first alarm information is generated, if it is determined that there is a target node corresponding to the first system in the preset topology, the first alarm information can be displayed on the target node; accordingly, if the prediction is determined Assuming that there is no target node corresponding to the first system in the topology map, the node corresponding to the first system can be generated on the preset topology map first, and then the first alarm information is displayed on the node corresponding to the first system.
  • the preset topology diagram shown in Figure 3 as an example, if the first system is a firewall system, there is a firewall node corresponding to the first system in the preset topology diagram.
  • the first alarm information can be displayed on the firewall node ,As shown in Figure 3.
  • the first system is an accounting system
  • a new node corresponding to the accounting system (such as an accounting node) can be created on the preset topology. ), so that the updated preset topology diagram shown in FIG. 4 can be obtained; further, the first alarm information can be displayed on the firewall node corresponding to the firewall system.
  • the accounting node can be connected to the production vpn node.
  • the first alarm information can be directly displayed on the target node.
  • the first alarm information can be displayed on the target node in text, or the first alarm information can be displayed in the form of icons.
  • the position of the first alarm information displayed on the target node can be set by those skilled in the art based on experience, for example, it can be set at the center of the target node, or it can also be set around the target node. Not limited.
  • the security operation platform may also store a preset mapping table.
  • the preset mapping table may be set by the user when creating the preset topology map.
  • the preset mapping table may store preset topologies The alarm type and alarm mode of one or more nodes included in the graph.
  • Table 2 is a schematic table of a preset mapping table.
  • Table 2 An illustration of a preset mapping table
  • the preset mapping table can store the correspondence between the alarm type and the alarm mode of the cooperative outreach area node and the firewall node.
  • the alarm type is device alarm
  • the text "device alarm” can be displayed on the cooperative outreach area node
  • the alarm type is communication alarm
  • it can display "! "Icon”
  • the alarm type is a server quality alarm
  • the "!" icon can be displayed on the cooperative outreach area node
  • the alarm type is a transaction volume alarm
  • the voice can be broadcast on the cooperative outreach area node.
  • the voice can be broadcast on the firewall node; if the alarm type is a virus intrusion alarm, the "***" icon can be displayed on the node of the cooperative outreach area; If the alarm type is a downtime alarm, the "downtime alarm” icon can be displayed on the firewall node.
  • the alarm type to which the first alarm information belongs can be determined, and the target alarm can be determined according to the correspondence between one or more alarm types of the target node in the preset mapping table and the alarm mode The target alarm mode corresponding to the type, and then the first alarm information can be displayed on the target node according to the target alarm mode.
  • the first alarm information is a network interruption alarm
  • the first alarm information may belong to a communication alarm type; further, if the first system is a cooperative outreach area node, it is based on the cooperative outreach area shown in Table 2.
  • Correspondence between the four alarm types of the node and the alarm mode it can be determined that the alarm mode corresponding to the first alarm information is "! Alarm", that is, the "! icon can be displayed on the node of the cooperation outreach area.
  • the corresponding relationship between one or more alarm types of the first system and the alarm mode is preset, so that the user can conveniently determine the alarm type according to the alarm mode displayed in the preset topology diagram by the alarm information, thereby reducing The workload of users improves user satisfaction.
  • the node configuration interface can be displayed to the user; if the user is detected, the node configuration interface is triggered.
  • the icon corresponding to the “Create Node” function can display a text box to the user and prompt the user to enter the name of the new node, the style of the new node (such as shape, size, etc.), the new node and the existing node in the preset topology The connection relationship.
  • an accounting node as shown in FIG. 4 can be created.
  • the user may also be prompted to input the alarm type and the alarm mode of the accounting node, and after the user's successful input is detected, the corresponding relationship between the alarm type and the alarm mode of the accounting node may be added to the preset mapping table. For example, based on the preset mapping table shown in Table 2, if the alarm type and alarm mode of the accounting node input by the user include the following three, the preset mapping table 2 can be updated to the preset mapping table shown in Table 3. .
  • the alarm method is to display the text "transaction value alarm" on the accounting node;
  • the alarm method is to display the "!!!" icon on the accounting node
  • the type of alarm is an account error alarm, and the alarm method is voice broadcast on the account node;
  • Table 3 An illustration of an updated preset mapping table
  • the first alarm information may be displayed on the accounting node according to the alarm type to which the first alarm information belongs.
  • the specific implementation process can be implemented with reference to scenario 1, and the details are not repeated here.
  • the user by setting the node management interface, the user can enter the first configuration information in the node management interface, thereby creating a new node and the alarm mode of the node on the preset topology diagram; that is, the embodiment of the present invention It supports setting the node and the alarm mode of the node in a user-defined manner, that is, the user can set the node and the alarm mode of the node according to actual needs, so that the data management method in the above technical solution has a wider application range.
  • the first alarm information is generated; further, If it is determined that there is a target node corresponding to the first system in the preset topology map, the first alarm information is displayed on the target node; wherein, the preset topology map includes one or more corresponding to one or more systems. Nodes.
  • the user can intuitively obtain the alarm information of one or more systems by viewing the preset topology map , Thereby improving user satisfaction; and by setting at least one alarm rule corresponding to the first system, when the data of the first system triggers the alarm rule corresponding to the first system, the first system can be automatically alarmed, and There is no need to manually determine the alarm information, which can improve the efficiency of the alarm.
  • an embodiment of the present invention also provides a data management method that can display data from one or more systems in the form of reports.
  • the execution subject may be the security operation platform 400.
  • FIG. 5 is a schematic flowchart corresponding to a data management method provided by an embodiment of the present invention. As shown in FIG. 5, the method includes:
  • Step 501 Obtain data generated by one or more systems during the execution of the business, and display the report management interface to the user.
  • the report management interface can be displayed to the user.
  • multiple text boxes can be set on the report management interface. Multiple text boxes can be divided into input text boxes and selection text boxes. The user can enter the corresponding configuration information in the input text box and select the text Select the corresponding configuration information in the box.
  • Step 502 Receive configuration information entered by the user on the report management interface.
  • the configuration information corresponding to the multiple text boxes may include at least one of report type, report element, title of the report element, and parameters corresponding to the report element.
  • the report type refers to the system domain to which the data that generates the report belongs.
  • the report type can be the visualization type of the report, for example, it can include network reports, business reports, and data reports; accordingly, users can select in the selection text box corresponding to the report type Target report type.
  • Report elements refer to the modules included in the report.
  • a report may include one module or multiple modules, which is not specifically limited. Among them, the module can include the module type, module instance, module identification, module title, etc.; the module type can be any of the view module, the table module, and the interval bar module.
  • the instance of the view module can be Generated according to the data range set by the user; for example, if the view module is a view generated based on a day's transaction volume, the instance of the view module may be a view generated based on the transaction volume on May 8, 2019.
  • multiple preset view modules and/or multiple preset table modules can be set. Accordingly, the user can select the target preset view module and/or the target preset view module and/or the selection text box corresponding to the report element Target preset form module.
  • the preset view module can be obtained by the following methods: after detecting that the user triggers the icon corresponding to the "create view module" function on the management interface, the view module management interface is displayed to the user; the receiving user is on the view management interface The type of the input view module (such as view module a).
  • the type of the view module can include line chart, bar chart, pie chart, mixed column chart, etc.; further, the target system and variables can be determined according to the user's choice, and The configuration information corresponding to the view module is generated according to the target system, variables and the type of the view module. For example, if the view type of view module a selected by the user is a pie chart, the target system is system 101, and the variable is the number of transactions within 24 hours, it can be determined that view module a is used to generate the number of transactions of system 101 on a certain day The corresponding pie chart. Further, the configuration information of view module a can be run.
  • the attributes of view module a can be configured according to the user's settings, such as time information, quantity information, average, maximum or minimum, and unit For example, if the time information set by the user is May 8, 2019, and the quantity information is the oldest 1000, it can be determined that the view module a is used to generate the earliest time when the system 101 is generated on May 8, 2019 Pie chart corresponding to the number of 1000 transactions. After determining the view module a, the above-mentioned information of the view module a can be stored on the security operation platform, so that the user can call the view module a on the report management interface.
  • the preset form module can be obtained in the following manner: after detecting that the user triggers the icon corresponding to the "create form module" function on the management interface, the form module management interface is displayed to the user; the user inputs the target on the form management interface System and variables, and can generate configuration information corresponding to the table module according to the target system and variables. For example, if the target system of the form module b selected by the user is the system 102 and the variable is the number of transactions in 24 hours, it can be determined that the form module b is used to generate a table corresponding to the number of transactions in the system 102 on a certain day. Further, the configuration information of the form module b can be run. If it is determined that the result of the operation meets expectations, the above information of the form module b can be stored on the security operation platform, so that the user can call the form module b on the report management interface.
  • the user can select view module a, form module b, and interval bar module c on the report management interface; for view module a and form module b, because the generated information of view module a and form module b is pre-stored in the security On the operating platform, therefore, the user enters the attribute information on the report management interface to obtain instances of the view module a and the form module b.
  • the view module a is to generate a pie chart corresponding to the number of transactions in the system 101 within a day. If the attribute information input by the user is the number of transactions in the current day and the average value of the number of transactions per hour, the view module a can be used The generating system 101 generates an average value of the number of transactions generated per hour in each day.
  • the form module b generates a form corresponding to the transaction of the system 102 on a certain day. If the parameter information input by the user is the transaction data of the latest day, the form module b can be used to generate a form of the transaction generated by the system 102 on the current day.
  • the user can input the content of the interval column c on the report management interface, and the content of the interval column c is used to prompt the user of the key content included in the report.
  • the user can also set the title of the module after selecting the module.
  • the title of the module can be displayed above the bar graph, or can be displayed on one side of the bar graph, or can be displayed below the bar graph, and the specifics are not limited.
  • the user can add multiple modules sequentially, or can also add multiple modules at the same time, which is not specifically limited. Further, after one or more modules are added, a configuration program corresponding to one or more modules can be generated, and one or more modules can be loaded using the configuration program.
  • the steps can be performed 503: If it is determined that the loading result does not meet the preset requirements, the user may be prompted to add the module again. For example, if the user finds that the view module a cannot be loaded after adding the view module a, the table module b, and the interval bar module c, the user can be prompted to add the module again; accordingly, if the user re-adds the view module d and the table module b After connecting with the interval bar module c, the configuration programs corresponding to the view module d, the table module b, and the interval bar module c can be generated. If it is determined that the loading result meets the preset requirements after loading the configuration program, step 503 can be executed.
  • Step 503 Obtain target data in one or more system-generated data according to the second configuration information, and generate a target report according to the second configuration information and the target data.
  • the target data after receiving the second configuration information input by the user, can be determined according to the second configuration information, and the target data can be converted into a report based on the second configuration information. For example, if the target data determined according to the second configuration information is the transaction volume of system 101 and system 102 in June, and the module included in the second configuration information is a histogram, then it is possible to generate system 101 and system 102 in 6
  • the bar chart corresponding to the trading volume of the month, the bar chart can be the target report.
  • the user can obtain the data of one or more systems more intuitively and improve user satisfaction; and, by setting the report In the management interface, users can set target reports according to actual needs. For example, they can filter out useless resources in advance and place the data they want to obtain in the target reports. That is to say, using the above technical solutions allows users to customize target reports. So as to better meet actual needs.
  • the second configuration information may also include the recipient's mailbox information and time information.
  • the prompt of "Send Mail” can be displayed on the report management interface. If it is detected that the user triggers the "Send Mail” icon, the user can be prompted to enter the type of mail, the time when the mail is sent, and the recipient's Email information.
  • the mail type can be any one of daily, weekly, and monthly reports, and the time information of the mail sending can include the date and time.
  • the target report is a histogram corresponding to the number of transactions per day in the system 101
  • the email type set by the user is daily
  • the email sending time information is 10:00 on May 8, 2019,
  • the recipient's mailbox information is 123456 @163.com
  • the target report can be sent to the email recipient at the sending time.
  • the user can set the email recipient and sending time according to actual needs, so that The data management method is more in line with actual needs; on the other hand, by setting the email recipient and sending time, the target report can be sent to the corresponding operation and maintenance personnel in a timely manner, thereby improving the efficiency of troubleshooting.
  • the second configuration information may also include one or more alarm rules corresponding to the target report.
  • One or more alarm rules can be set as follows: after receiving the alarm rules entered by the user on the report management interface, the configuration program corresponding to the alarm rule can be generated; the configuration program corresponding to the alarm rule is verified, if the program is checked If it is legal, it is determined that the alarm rule is set successfully; if the program verification is illegal (such as lack of conditional judgment statements, code errors, etc.), it is determined that the alarm rule has not been set successfully, and the configuration program corresponding to the alarm rule can be regenerated and re-calibrated Test.
  • the target report can be detected before the target report is sent at 10 o'clock every day, and if it is determined that the target report triggers one or more alarm rules, the second alarm information can be generated.
  • an alarm rule is that the number of transactions is greater than 1000. If the number of transactions on May 9, 2019 is 2000, it is determined that the target report corresponding to May 9, 2019 has started the alarm rule; in this way, it can be generated The second warning message. Further, the target report and the second alarm information can be sent to 123456@163.com by email according to the recipient's mailbox information (ie, 123456@163.com).
  • the alarm information can be automatically generated when one or more alarm rules are triggered by the target report, which can reduce the workload of the user and improve the efficiency of the alarm; Moreover, by sending the alarm information to the recipient, the recipient can obtain the alarm information in time, thereby improving the efficiency of troubleshooting.
  • the management interface of the security operation platform can be provided with a first preset icon and a second preset icon. If the user triggers the first preset icon, the preset topology map corresponding to one or more systems can be displayed , And the alarm information can be displayed in one or more nodes on the preset topology according to the method shown in Figure 2. Correspondingly, if the user triggers the second preset icon, the report can be generated and managed according to the method shown in FIG. 5.
  • the first alarm information is generated; further, If it is determined that there is a target node corresponding to the first system in the preset topology map, the first alarm information is displayed on the target node; wherein, the preset topology map includes one or more corresponding to one or more systems. Nodes.
  • the user can intuitively obtain the alarm information of one or more systems by viewing the preset topology map , Thereby improving user satisfaction; and by setting at least one alarm rule corresponding to the first system, when the data of the first system triggers the alarm rule corresponding to the first system, the first system can be automatically alarmed, and There is no need to manually determine the alarm information, which can improve the efficiency of the alarm.
  • an embodiment of the present invention also provides a data management device, and the specific content of the device can be implemented with reference to the foregoing method.
  • Fig. 6 is a schematic structural diagram of a data management device provided by an embodiment of the present invention, including:
  • the obtaining module 601 is used to obtain data generated by the first system during the execution of the business;
  • the generating module 602 is configured to generate first alarm information if it is determined that the data meets the triggering condition of at least one alarm rule corresponding to the first system;
  • the processing module 603 is configured to, if it is determined that there is a target node corresponding to the first system in the preset topology, display the first alarm information on the target node; the preset topology graph includes and One or more nodes in one or more systems.
  • processing module 603 is used to:
  • the preset mapping table includes the alarm types of one or more nodes Correspondence with alarm mode;
  • the first alarm information is displayed on the target node according to the target alarm mode.
  • the processing module 603 is further configured to: if it is determined that there is no node corresponding to the first system in the preset topology, display a node configuration interface to the user, and the node configuration interface is used to Create a node corresponding to the first system in a preset topology; and, receive first configuration information input by the user on the node configuration interface, where the first configuration information includes the node corresponding to the first system
  • the generating module 602 is further configured to: according to the node pattern of the node corresponding to the first system and the connection between the node corresponding to the first system and one or more nodes included in the preset topology map Relationships Create a node corresponding to the first system in the preset topology map, and add the corresponding relationship between one or more alarm types and alarm modes of the nodes corresponding to the first system to the preset mapping table in.
  • the obtaining module 601 is further configured to: obtain data generated by the one or more systems during the execution of the service;
  • the processing module 603 is further configured to: display a report management interface to the user, the report management interface being used to display the data generated by the one or more systems in the form of a report;
  • the second configuration information entered on the report management interface where the second configuration information includes at least one of a report type, a report element, a title of the report element, and a parameter corresponding to the report element; and, according to the second configuration information Obtain target data in the data generated by the one or more systems, and generate a target report according to the second configuration information and the target data.
  • the second configuration information further includes mailbox information and time information of the recipient
  • the processing module 603 is further configured to: at the time point indicated by the time information, according to the mailbox information of the recipient, send the target report to the recipient by mail.
  • the second configuration information further includes one or more alarm rules corresponding to the target report
  • the processing module 603 is also used for:
  • second alarm information is generated, and based on the recipient’s mailbox information, via email Sending the target report and the second alarm information to the recipient.
  • the first system after acquiring the data generated by the first system during the execution of the service, if it is determined that the data meets the triggering condition of at least one alarm rule corresponding to the first system, the first system is generated.
  • An alarm information further, if it is determined that there is a target node corresponding to the first system in the preset topology, the first alarm information is displayed on the target node; wherein, the preset topology includes one or more systems One or more nodes in one-to-one correspondence.
  • the user can intuitively obtain the alarm information of one or more systems by viewing the preset topology map , Thereby improving user satisfaction; and by setting at least one alarm rule corresponding to the first system, when the data of the first system triggers the alarm rule corresponding to the first system, the first system can be automatically alarmed, and There is no need to manually determine the alarm information, which can improve the efficiency of the alarm.
  • an embodiment of the present invention also provides a computer-readable storage medium, including instructions, which when run on the processor of the computer, cause the processor of the computer to execute any of the steps described in FIG. 2 or FIG. 2 Data management methods.
  • the embodiments of the present invention also provide a computer program product, which when running on a computer, enables the computer to execute the data management method described in any of FIG. 2 or FIG. 2.
  • this application also provides a computing device. As shown in FIG. 7, the computing device includes:
  • the processor 701 is configured to read a program in the memory 702, and execute any data management method described in FIG. 2 or FIG. 2;
  • the processor 701 may be a central processing unit (central processing unit, CPU for short), a network processor (NP for short), or a combination of CPU and NP. It can also be a hardware chip.
  • the aforementioned hardware chip may be an application-specific integrated circuit (ASIC for short), a programmable logic device (PLD for short), or a combination thereof.
  • ASIC application-specific integrated circuit
  • PLD programmable logic device
  • the above-mentioned PLD can be a complex programmable logic device (complex programmable logic device, referred to as CPLD), field-programmable gate array (field-programmable gate array, referred to as FPGA), general array logic (generic array logic, referred to as GAL) or any of them combination.
  • the memory 702 is configured to store one or more executable programs, and can store data used by the processor 701 when performing operations.
  • the program may include program code, and the program code includes computer operation instructions.
  • the memory 702 may include a volatile memory (volatile memory), such as random-access memory (random-access memory, RAM for short); the memory 702 may also include a non-volatile memory (non-volatile memory), such as flash memory ( flash memory, hard disk drive (HDD for short) or solid-state drive (SSD for short); the memory 702 may also include a combination of the foregoing types of memories.
  • the memory 702 stores the following elements, executable modules or data structures, or their subsets, or their extended sets:
  • Operating instructions including various operating instructions, used to implement various operations.
  • Operating system including various system programs, used to implement various basic services and process hardware-based tasks.
  • the bus may be a peripheral component interconnect standard (PCI) bus or an extended industry standard architecture (EISA) bus, etc.
  • PCI peripheral component interconnect standard
  • EISA extended industry standard architecture
  • the bus can be divided into address bus, data bus, control bus, etc. For ease of presentation, only one thick line is used in FIG. 7, but it does not mean that there is only one bus or one type of bus.
  • the bus interface 704 may be a wired communication access port, a wireless bus interface or a combination thereof, where the wired bus interface may be, for example, an Ethernet interface.
  • the Ethernet interface can be an optical interface, an electrical interface or a combination thereof.
  • the wireless bus interface may be a WLAN interface.
  • the embodiments of the present invention may be provided as a method or a computer program product. Therefore, the present invention may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the present invention may adopt the form of a computer program product implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes.
  • a computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can guide a computer or other programmable data processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable data processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, so as to execute on the computer or other programmable equipment.
  • the instructions provide steps for implementing functions specified in a flow or multiple flows in the flowchart and/or a block or multiple blocks in the block diagram.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

一种数据管理方法及装置,其中方法包括:获取第一系统在业务执行过程中生成的数据(201),若确定该数据满足第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息(202);进一步地,若确定预设拓扑图中存在与第一系统对应的目标节点,则将第一告警信息显示在目标节点上(203)。该方法,通过将一个或多个系统以及一个或多个系统的告警信息映射到预设拓扑图中,用户可以直观地获取到一个或多个系统的告警信息,从而提高用户的满意度;且,通过设置第一系统对应的至少一条告警规则,在第一系统的数据触发第一系统对应的告警规则时,可以自动实现告警,而无需采用人工方式确定告警信息,从而提高告警的效率。

Description

一种数据管理方法及装置
相关申请的交叉引用
本申请要求在2019年05月17日提交中国专利局、申请号为201910409756.4、申请名称为“一种数据管理方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及金融科技(Fintech)技术领域,尤其涉及一种数据管理方法及装置。
背景技术
随着计算机技术的发展,越来越多的技术(大数据、分布式、区块链Blockchain、人工智能等)应用在金融领域,传统金融业正在逐步向金融科技(Fintech)转变,但由于金融行业的安全性、实时性要求,也对技术提出了更高的要求。以业务执行为例,在金融领域中,由于业务执行的并发性和多样性,导致一段时间内会生成大量的业务数据;比如,通常情况下,银行在1分钟内可能会产生100万条甚至远远大于100万条的业务数据;因此,如何合理地将大量的业务数据显示给用户,对于监督业务执行的状态、及时排查故障是非常重要的。
现有技术通常基于运维人员的经验对业务数据进行分析,具体地说,运维人员可以实时监控业务数据,若基于经验发现某一条业务数据存在问题,则可以通过将该条业务数据发送给用户以完成告警过程,使得用户可以基于该条业务数据进行故障排查。然而,由于业务数据的频繁出现,导致业务数据的数据量较大,采用上述方式可能会使得告警不及时,从而使得告警的效率较差;且,通过运维人员发送业务数据实现告警的方式并不直观,用户并不能很好地获取告警信息,从而使得用户的满意度较差。
综上,目前亟需一种数据处理方法,用以提高告警的效率和用户的满意度。
发明内容
本发明实施例提供一种数据管理方法及装置,用以提高告警的效率和用户的满意度。
第一方面,本发明实施例提供的一种数据管理方法,包括:
获取第一系统在业务执行过程中生成的数据,若确定所述数据满足所述第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;进一步地,若确定预设拓扑图中存在与所述第一系统对应的目标节点,则将所述第一告警信息显示在所述目标节点上;其中,所述预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。
上述技术方案中,通过将一个或多个系统以及一个或多个系统的告警信息映射到预设拓扑图中,用户可以通过查看预设拓扑图直观地获取到一个或多个系统的告警信息,从而可以提高用户的满意度;且,通过设置第一系统对应的至少一条告警规则,在第一系统的数据触发第一系统对应的告警规则时,可以自动实现对第一系统的告警,而无需采用人工的方式确定告警信息,从而可以提高告警的效率。
在一种可能的设计中,所述将所述第一告警信息显示在所述目标节点上,包括:确定所述第一告警信息所属的目标告警类型,并从预设映射表中获取目标节点的一个或多个告警类型与告警方式的对应关系,确定所述目标告警类型对应的目标告警方式,进而按照所述目标告警方式将所述第一告警信息显示在所述目标节点上;所述预设映射表包括一个或多个节点的告警类型与告警方式的对应关系。
上述技术方案中,通过预先设置第一系统的一个或多个告警类型与告警方式的对应关系,使得用户可以根据告警信息在预设拓扑图中显示的告警方式方便地确定告警类型(比如网络中断告警、机器损坏告警等),从而减少用 户的工作量,提高用户的满意度。
在一种可能的设计中,所述方法还包括:若确定预设拓扑图中不存在与所述第一系统对应的节点,则向用户显示节点配置界面,所述节点配置界面用于在所述预设拓扑图中创建所述第一系统对应的节点;进一步地,接收所述用户在所述节点配置界面上输入的第一配置信息,所述第一配置信息包括所述第一系统对应的节点的节点样式、所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系、所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系;相应地,根据所述第一系统对应的节点的节点样式和所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系在所述预设拓扑图中创建所述第一系统对应的节点,并将所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系添加到所述预设映射表中。
上述技术方案中,通过设置节点管理界面,用户可以在节点管理界面中输入第一配置信息,从而在预设拓扑图上创建新的节点以及节点的告警方式;也就是说,上述技术方案支持以用户自定义的方式设置节点及节点的告警方式,即用户可以根据实际需要设置节点及节点的告警方式,从而使得上述技术方案中的数据管理方法具有更广泛的应用范围。
在一种可能的设计中,所述方法还包括:获取所述一个或多个系统在业务执行过程中生成的数据,并向用户显示报表管理界面,所述报表管理界面用于以报表的形式显示所述一个或多个系统生成的数据;进一步地,接收所述用户在所述报表管理界面上输入的第二配置信息,所述第二配置信息包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项;相应地,根据所述第二配置信息获取所述一个或多个系统生成的数据中的目标数据,并根据所述第二配置信息和所述目标数据,生成目标报表。
上述技术方案中,通过将一个或多个系统的数据以报表的形式显示给用户,可以使得用户更加直观地获取到一个或多个系统的数据,提高用户的满意度;且,通过设置报表管理界面,用户可以根据实际需要设置目标报表, 比如可以预先过滤掉无用资源并将用户想要获取的数据放置在目标报表中,也就是说,采用上述技术方案,使得用户可以自定义目标报表,从而更加满足实际需要。
在一种可能的设计中,所述第二配置信息还包括收件人的邮箱信息和时间信息;所述方法还包括:在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人。
上述技术方案中,通过设置目标报表的邮件接收人和发送时间,可以在发送时间将目标报表发送给邮件接收人,一方面,用户可以根据实际需要设置邮件接收人和发送时间,从而可以使得数据管理方法更加符合实际需要;另一方面,通过设置邮件接收人和发送时间,可以将目标报表及时地发送给对应的运维人员,从而提高故障排查的效率。
在一种可能的设计中,所述第二配置信息中还包括所述目标报表对应的一条或多条告警规则;所述在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人,包括:在所述时间信息所指示的时间点,若确定所述目标报表满足所述一条或多条告警规则的触发条件,则生成第二告警信息,并根据所述收件人的邮箱信息,通过邮件将所述目标报表和所述第二告警信息发送给所述收件人。
上述技术方案中,通过设置目标报表对应的一条或多条告警规则,可以在确定目标报表触发一条或多条告警规则时自动生成告警信息,可以减轻用户的工作量,并提高告警的效率;且,通过将告警信息发送给收件人,可以使得收件人及时获取到告警信息,从而提高故障排查的效率。
第二方面,本发明实施例提供的一种数据管理装置,所述装置包括:
获取模块,用于获取第一系统在业务执行过程中生成的数据;
生成模块,用于若确定所述数据满足所述第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;
处理模块,用于若确定预设拓扑图中存在与所述第一系统对应的目标节点,则将所述第一告警信息显示在所述目标节点上;所述预设拓扑图中包括 与一个或多个系统一一对应的一个或多个节点。
在一种可能的设计中,所述处理模块用于:确定所述第一告警信息所属的目标告警类型,并从预设映射表中获取目标节点的一个或多个告警类型与告警方式的对应关系,确定所述目标告警类型对应的目标告警方式;所述预设映射表包括一个或多个节点的告警类型与告警方式的对应关系;进一步地,按照所述目标告警方式将所述第一告警信息显示在所述目标节点上。
在一种可能的设计中,所述处理模块还用于:若确定预设拓扑图中不存在与所述第一系统对应的节点,则向用户显示节点配置界面,所述节点配置界面用于在所述预设拓扑图中创建所述第一系统对应的节点;以及,接收所述用户在所述节点配置界面上输入的第一配置信息,所述第一配置信息包括所述第一系统对应的节点的节点样式、所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系、所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系;相应地,所述生成模块还用于:根据所述第一系统对应的节点的节点样式和所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系在所述预设拓扑图中创建所述第一系统对应的节点,并将所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系添加到所述预设映射表中。
在一种可能的设计中,所述获取模块还用于:获取所述一个或多个系统在业务执行过程中生成的数据;相应地,所述处理模块还用于:向用户显示报表管理界面,所述报表管理界面用于以报表的形式显示所述一个或多个系统生成的数据;以及,接收所述用户在所述报表管理界面上输入的第二配置信息,所述第二配置信息包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项;以及,根据所述第二配置信息获取所述一个或多个系统生成的数据中的目标数据,并根据所述第二配置信息和所述目标数据,生成目标报表。
在一种可能的设计中,所述第二配置信息还包括收件人的邮箱信息和时间信息;所述处理模块还用于:在所述时间信息所指示的时间点,根据所述 收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人。
在一种可能的设计中,所述第二配置信息中还包括所述目标报表对应的一条或多条告警规则;所述处理模块还用于:在所述时间信息所指示的时间点,若确定所述目标报表满足所述一条或多条告警规则的触发条件,则生成第二告警信息,并根据所述收件人的邮箱信息,通过邮件将所述目标报表和所述第二告警信息发送给所述收件人。
第三方面,本发明实施例提供的一种计算机可读存储介质,包括指令,当其在计算机的处理器上运行时,使得计算机的处理器执行如上述第一方面或第一方面任意所述的方法。
第四方面,本发明实施例提供的一种计算机程序产品,当其在计算机上运行时,使得计算机执行如上述第一方面或第一方面任意所述的方法。
第五方面,本申请提供一种计算设备,该计算设备包括:
处理器、存储器、收发器、总线接口;其中,处理器、存储器与收发器之间通过总线连接;
所述处理器,用于读取所述存储器中的程序,执行上述第一方面或第一方面任意所述的方法;
所述存储器,用于存储一个或多个可执行程序,可以存储所述处理器在执行操作时所使用的数据。
本发明的这些方面或其他方面在以下实施例的描述中会更加简明易懂。
附图说明
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简要介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例提供的一种可能的系统架构示意图;
图2为本发明实施例提供的一种数据管理方法对应的流程示意图;
图3为本发明实施例提供的一种预设拓扑图的示意图;
图4为本发明实施例提供的一种更新后的预设拓扑图的示意图;
图5为本发明实施例提供的又一种数据管理方法对应的流程示意图;
图6为本发明实施例提供的一种数据管理装置的结构示意图;
图7为本申请提供的一种计算设备的结构示意图。
具体实施方式
为了使本发明的目的、技术方案和优点更加清楚,下面将结合附图对本发明作进一步地详细描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本发明保护的范围。
金融领域中通常涉及到多个系统,比如办公系统、生产系统、运维系统等,办公系统可以用于执行金融领域内部的各项事务,而生产系统可以用于执行金融领域中产生的业务;相应地,运维系统可以对办公系统和生产系统进行监督,从而保证办公系统和生产系统的正常运行。通过多个系统的协同运作,可以保证金融领域快速、健康地发展。
现阶段,越来越多的技术应用在金融领域,传统金融业正在逐步向金融科技(Fintech)转变。在这种情况下,如何通过科技的手段来监控金融领域中的多个系统的执行情况,并对监控获取的多个系统的数据进行管理,对于保证多个系统的安全是非常重要的。
基于此,本发明提供了一种数据管理方法,用以提高告警的效率和用户的满意度。
图1为本发明实施例提供的一种可能的系统架构示意图,该系统架构可以包括一个或多个系统(如图1所示意出的系统101~系统104)、与一个或多个系统连接的代理服务器200。以系统101为例,系统101可以通过有线方式与代理服务器200连接,或者也可以通过无线方式与代理服务器200连接, 具体不作限定。
本发明实施例中,一个或多个系统可以分为第一类型系统和第二类型系统,第一类型系统可以为安全层面的系统,用于负责与金融领域的交易和/或业务相关的事项,比如生产系统、核账系统等;第一类型系统为金融领域的核心系统。相应地,第二类型系统可以为应用层面的系统,用于负责与金融领域的运行相关的事项,比如办公系统、网络系统、运维系统等。
在一个示例中,如图1所示,系统101~系统103可以属于第二类型系统,系统104可以属于第一类型系统。具体实施中,系统104中可以设置有安全运营平台300,安全运营平台300可以获取系统101~系统104在执行业务的过程中生成的数据,并可以对这些数据进行管理。此处,数据可以是指与交易相关的数据,比如生产系统在预设时间段(比如1天、1星期、1个月)内的交易数量、办理银行卡交易的数量等;或者也可以是指与金融领域运行情况相关的数据,比如网络中断的次数、机器损坏的时间等;或者还可以包括其它数据,比如核账失误的次数,具体不作限定。
在一种可能的实现方式(为便于描述,简称为实现方式一)中,安全运营平台300可以通过代理转发的方式获取系统101~系统103的数据。具体地说,针对于系统101~系统103中的任一系统(比如系统101),系统101若检测到系统101在执行业务的过程中生成数据,则可以将生成的数据发送至代理服务器200上,并由代理服务器200转发至安全运营平台300;相应地,针对于系统104,系统104可以直接将系统104在执行业务的过程中生成的数据备份(或上传)至安全运营平台300中。采用实现方式一,一个或多个系统可以实时地将数据推送至安全运营平台,相比于现有技术中通过预设数据库保存数据的方式来说,可以保证安全运营平台中存储的数据的实时性和全面性。
在另一种可能的实现方式(为便于描述,简称为实现方式二)中,安全运营系统300可以通过人工页面录入的方式获取系统101~系统104的数据。以系统101为例,具体地说,用户可以预先将系统101在执行业务的过程中 生成的数据拷贝至存储设备中(比如优盘、移动硬盘),并可以在存储设备与安全运营平台400连接后,将数据录入安全运营平台400;在一个示例中,用户还可以在录入数据的过程中对数据执行增删改查操作,从而可以提高获取数据的效率。采用实现方式二,一个或多个系统可以无需维护独立的数据库,从而可以减轻一个或多个系统的负担。
本发明实施例中,通过代理服务器将某一系统生成的数据转发给安全运营平台,而并非采用系统与系统通信的方式获取数据,可以避免某一系统生成的数据被其它系统获取,保证一个或多个系统生成的数据的安全性。
基于图1所示意的系统架构,图2为本发明实施例提供的一种数据管理方法对应的流程示意图,其中,数据管理方法的执行主体可以为安全运营平台400。如图2所示,该方法包括:
步骤201,获取第一系统在业务执行过程中生成的数据。
具体实施中,若第一系统为安全运营平台400所在的系统(即系统104),则可以通过备份的方式或人工页面录入的方式获取第一系统的数据;相应地,若第一系统为与安全运营平台400所在的系统不同的系统(比如系统101),则可以通过代理转发的方式或人工页面录入的方式获取第一系统的数据。其中,获取数据的过程可以参照实现方式一或实现方式二进行实现,此处不再赘述。
在一种可能的实现方式中,安全运营平台400在接收数据之前,还可以对数据进行校验。以接收系统101的数据为例,在一个示例中,若系统101通过代理转发的方式将数据发送至安全运营平台400,则安全运营平台400可以对数据进行第一轮校验和第二轮校验,第一轮校验可以对用户的权限信息进行校验,第二轮校验可以对数据进行校验。具体地说,在第一轮校验中,系统101发送给安全运营平台400的数据中可以包括系统101的权限信息,权限信息可以为安全运营平台400预先分配给系统101的权限信息;相应地,安全运营平台400在接收到数据后,若确定系统101的权限信息合法,则可以执行第二轮校验过程,若确定系统101的权限信息不合法,则可以拒绝接收系统101的数据。进一步地,在第二轮校验中,系统101发送给安全运营平台400的数据 中可以包括系统101采用预设校验算法确定得到的第一校验值(比如哈希值),安全运营平台400在接收到数据后,可以采用预设校验算法确定第二校验值,若第一校验值与第二校验值匹配,则安全运营平台400可以接收系统101的数据;若第一校验值与第二校验值不匹配,则安全运营平台400可以拒绝接收系统101的数据。在另一个示例中,若系统101通过人工页面录入的方式将数据发送至安全运营平台400,则安全运营平台400可以仅对数据进行第二轮校验,在该示例中,第二轮校验可以参照上述过程实现,不再赘述。
进一步地,若确定接收系统101的数据,则安全运营平台400可以将系统101的数据存储到第一数据库中。如此,第一数据库中可以存储有安全运营平台400接收到的一个或多个系统的数据,一方面,由于一个或多个系统的数据是实时发送给安全运营平台400的,因此,第一数据库中存储的数据较为全面和准确,从而使得平台400可以对一个或多个系统的数据进行管理;另一方面,通过第一数据库管理一个或多个系统的数据,使得一个或多个系统无需独立维护单独的数据库,从而可以减轻一个或多个系统的压力,提高数据管理的效率。
步骤202,若确定数据满足第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息。
本发明实施例中,可以预先设置系统101~系统104中每个系统对应的至少一条告警规则,以系统101为例,若系统101的数据与系统101对应的至少一条告警规则的触发条件匹配,则安全运营平台400可以生成第一告警信息。
表1为系统101对应的至少一条告警规则的示意表。
表1:系统101对应的至少一条告警规则的示意
Figure PCTCN2020083369-appb-000001
如图1所示,系统101对应设置有四条告警规则,这四条告警规则分别为:在系统101中的网络中断时间超过5秒时进行告警;在系统101执行业务的过程中,每秒钟申请开卡的数量大于1000时进行告警;在系统101中某台设备的当前可用内存空间小于5M时进行告警;在系统101中网络延时大于2s时进行告警。
具体实施中,安全运营平台400可以对系统101的数据进行分析,若确定系统101的数据触发了上述四条告警规则中的任一告警规则,则安全运营平台400可以生成相应的告警信息。举例来说,在示例一中,若系统101的数据中包括“10:50:~10:51时,申请开卡的数量为2000”信息,则安全运营平台400可以确定系统101的数据触发了表1中的第二条告警规则,如此,安全运营平台400可以生成上述第二条告警规则对应的告警信息;其中,告警信息可以包括系统的标识(即系统101)、告警的内容(比如开卡数量),或者也可以包括其它内容,比如时间信息,具体不作限定。在示例二中,若系统101的数据中包括“10:52:~10:58时,网络中断”信息,则安全运营平台400可以确定系统101的数据触发了表1中的第一条告警规则,如此,安全运营平台400可以生成上述第一条告警规则对应的告警信息。
步骤203,若确定预设拓扑图中存在与第一系统对应的目标节点,则将第一告警信息显示在目标节点上。
此处,预设拓扑图中可以包括与一个或多个系统一一对应的一个或多个节点。在一种可能的实现方式中,预设拓扑图可以为安全运营平台根据一个或多个系统的数据自动创建的;具体地说,安全运营平台获取到一个或多个 系统的数据后,可以分别创建与一个或多个系统一一对应的一个或多个节点;进一步地,安全运营平台可以确定实际操作过程中一个或多个系统的通信连接关系,并可以根据该通信连接关系连接一个或多个节点,得到预设拓扑图。在另一种可能的实现方式中,预设拓扑图可以为用户创建的;具体地说,用户可以在安全管理平台上执行视图管理操作,从而得到视图管理界面,视图管理界面可以用于创建拓扑图;进一步地,用户可以在视图管理界面上添加与一个或多个系统一一对应的一个或多个节点以及一个或多个节点的连接关系,从而得到预设拓扑图。
图3为本发明实施例提供的一种预设拓扑图的示意图,如图3所示,预设拓扑图上可以包括多个节点,比如灾备中心节点、物理机房节点、生产虚拟专用网络(Virtual Private Network,vpn)节点、安全操作间节点、防火墙节点、发布间节点、安全前置节点、数据操作间节点、合作外联区域节点和网络节点。其中,灾备中心节点和物理机房节点可以分别与生产vpn节点连接,防火墙可以分别与生产vpn节点、安全操作间节点、数据操作间节点、发布间节点、安全前置节点、合作外联区域节点连接,合作外联区域可以与网络节点连接。
在一个示例中,预设拓扑图上还可以显示任意两个连接的节点的网络连接状态。其中,网络连接状态可以通过多种方式显示在预设拓扑图中,比如可以通过图标的形式显示在预设拓扑图中,或者可以通过文字的形式显示在预设拓扑图中,或者也可以通过语音的方式显示在预设拓扑图中,或者还可以通过组合图标、文字、语音中的任意多种(即两种或两种以上)的方式显示在预设拓扑图中,具体不作限定。如图3所示,网络连接状态可以通过图标与文字组合的方式显示在预设拓扑图中;具体地说,若防火墙系统与合作外联区域系统之间的网络连接状态为正常状态,则防火墙节点与合作外联区域节点之间的连接线上可以显示有闪电样式的图标,在闪电样式的图标的下方可以显示有文字“网络状况正常”。
本发明实施例中,通过设置预设拓扑图,可以直观地将一个或多个系统 的连接关系以及系统的网络连接状态呈现给用户;也就是说,用户通过查看预设拓扑图中一个或多个节点的连接关系以及节点的网络连接状态,即可及时获取到一个或多个系统中连接的两个系统的网络连接状态,从而可以提高用户的满意度。
本发明实施例中,在生成第一告警信息后,若确定预设拓扑图中存在与第一系统对应的目标节点,则可以将第一告警信息显示在目标节点上;相应地,若确定预设拓扑图中不存在与第一系统对应的目标节点,则可以先在预设拓扑图上生成第一系统对应的节点,进而将第一告警信息显示在第一系统对应的节点上。以图3所示意的预设拓扑图为例,若第一系统为防火墙系统,则预设拓扑图中存在与第一系统对应的防火墙节点,如此,可以将第一告警信息显示在防火墙节点上,如图3所示。若第一系统为核账系统,则预设拓扑图中不存在与第一系统对应的节点,如此,可以在预设拓扑图上创建一个与核账系统对应的新的节点(比如核账节点),从而可以得到图4所示意的更新后的预设拓扑图;进一步地,可以将第一告警信息显示在防火墙系统对应的防火墙节点上。如图4所示,核账节点可以与生产vpn节点连接。
下面分别从情形一和情形二描述将第一告警信息显示在目标节点的实现过程。
情形一
在情形一中,预设拓扑图中存在与第一系统对应的目标节点,如此,可以直接将第一告警信息显示在目标节点上。
具体实施中,将第一告警信息显示在目标节点上的方式可以有多种,比如可以通过文字的方式将第一告警信息显示在目标节点上,或者可以通过图标的方式将第一告警信息显示在目标节点上;相应地,第一告警信息在目标节点上显示的位置可以由本领域技术人员根据经验进行设置,比如可以设置在目标节点的中心位置,或者也可以设置在目标节点的周围,具体不作限定。
在一种可能的实现方式中,安全运营平台中还可以存储有预设映射表,预设映射表可以为用户在创建预设拓扑图时设置的,预设映射表中可以存储 有预设拓扑图所包括的一个或多个节点的告警类型与告警方式。表2为一种预设映射表的示意表。
表2:一种预设映射表的示意
Figure PCTCN2020083369-appb-000002
如表2所示,预设映射表中可以存储有合作外联区域节点和防火墙节点的告警类型与告警方式的对应关系。在合作外联区域节点中,若告警类型为设备告警,则可以在合作外联区域节点上显示“设备告警”文字;若告警类型为通信告警,则可以在合作外联区域节点上显示“!”图标;若告警类型为服务器质量告警,则可以在合作外联区域节点上显示“!!”图标;若告警类型为交易量告警,则可以在合作外联区域节点上播报语音。相应地,在防火墙节点中,若告警类型为数据丢失告警,则可以在防火墙节点上播报语音;若告警类型为病毒入侵告警,则可以在合作外联区域节点上显示“***”图标;若告警类型为宕机告警,则可以在防火墙节点上显示“宕机告警”图标。
具体实施中,在生成第一告警信息后,可以确定第一告警信息所属的告警类型,并可以根据预设映射表中目标节点的一个或多个告警类型与告警方式的对应关系,确定目标告警类型对应的目标告警方式,进而可以按照目标告警方式将第一告警信息显示在目标节点上。举例来说,若第一告警信息为网络中断告警,则第一告警信息可以属于通信告警类型;进一步地,若第一系统为合作外联区域节点,则基于表2所示意的合作外联区域节点的四种告警 类型与告警方式的对应关系,可以确定第一告警信息对应的告警方式为“!告警”,即可以在合作外联区域节点上显示“!”图标。
本发明实施例中,通过预先设置第一系统的一个或多个告警类型与告警方式的对应关系,使得用户可以根据告警信息在预设拓扑图中显示的告警方式方便地确定告警类型,从而减少用户的工作量,提高用户的满意度。
情形二
在情形二中,预设拓扑图中不存在与第一系统对应的目标节点,如此,可以先在预设拓扑图上创建第一系统对应的节点,进而将第一告警信息显示在第一系统对应的节点上。
以第一系统为核账系统为例,具体实施中,若确定预设拓扑图中不存在与核账系统对应的节点,则可以向用户显示节点配置界面;若检测到用户触发节点配置界面上“创建节点”功能对应的图标,则可以向用户显示文本框,并可以提示用户输入新节点的名称、新节点的样式(比如形状、尺寸等)、新节点与预设拓扑图中已有节点的连接关系。在一个示例中,若用户输入的新节点的名称为“核账节点”、新节点的样式为圆形、新节点与生产vpn节点连接,则可以创建一个如图4所示的核账节点。进一步地,还可以提示用户输入核账节点的告警类型与告警方式,并可以在检测到用户成功输入后,将核账节点的告警类型与告警方式的对应关系添加到预设映射表中。比如,基于表2所示意的预设映射表,若用户输入的核账节点的告警类型与告警方式包括如下三种,则预设映射表表2可以更新为表3所示意的预设映射表。
(1)告警类型为交易数值告警,则告警方式为在核账节点上显示“交易数值告警”文字;
(2)告警类型为数据丢失告警,则告警方式为在核账节点上显示“!!!”图标;
(3)告警类型为核账失误告警,则告警方式为在核账节点上进行语音播报;
表3:一种更新后的预设映射表的示意
Figure PCTCN2020083369-appb-000003
进一步地,可以根据第一告警信息所属的告警类型,在核账节点上显示第一告警信息。具体实现过程可以参照情形一进行实现,具体不在赘述。
本发明实施例中,通过设置节点管理界面,用户可以在节点管理界面中输入第一配置信息,从而在预设拓扑图上创建新的节点以及节点的告警方式;也就是说,本发明实施例支持以用户自定义的方式设置节点及节点的告警方式,即用户可以根据实际需要设置节点及节点的告警方式,从而使得上述技术方案中的数据管理方法具有更广泛的应用范围。
本发明的上述实施例中,获取第一系统在业务执行过程中生成的数据后,若确定该数据满足第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;进一步地,若确定预设拓扑图中存在与第一系统对应的目标节点,则将第一告警信息显示在目标节点上;其中,预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。本发明实施例中,通过将一个或多个系统以及一个或多个系统的告警信息映射到预设拓扑图中,用户可以通过 查看预设拓扑图直观地获取到一个或多个系统的告警信息,从而可以提高用户的满意度;且,通过设置第一系统对应的至少一条告警规则,在第一系统的数据触发第一系统对应的告警规则时,可以自动实现对第一系统的告警,而无需采用人工的方式确定告警信息,从而可以提高告警的效率。
基于图1所示意的系统架构和图2所示意的数据管理方法,本发明实施例还提供了一种数据管理方法,该方法可以以报表的形式显示一个或多个系统的数据,该方法的执行主体可以为安全运营平台400。
图5为本发明实施例提供的一种数据管理方法对应的流程示意图,如图5所示,该方法包括:
步骤501,获取一个或多个系统在业务执行过程中生成的数据,并向用户显示报表管理界面。
具体实施中,若确定以报表的形式显示一个或多个系统的数据,则可以向用户显示报表管理界面。
在一个示例中,报表管理界面上可以设置有多个文本框,多个文本框可以划分为输入文本框和选择文本框,用户可以在输入文本框中输入对应的配置信息,且可以在选择文本框中选择对应的配置信息。
步骤502,接收用户在报表管理界面上输入的配置信息。
具体实施中,多个文本框对应的配置信息可以包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项。报表类型是指生成报表的数据所属的系统领域,报表类型可以为报表的可视化类型,比如可以包括网络报表、业务报表和数据报表等;相应地,用户可以在报表类型对应的选择文本框中选择目标报表类型。报表元素是指报表包括的模块,一个报表可以包括一个模块,或者也可以包括多个模块,具体不作限定。其中,模块可以包括模块类型、模块实例、模块的标识、模块的标题等;模块类型可以为视图模块、表格模块和间隔栏模块中的任意一项,以视图模块为例,视图模块的实例可以根据用户设定的数据范围生成;比如,视图模块为根据一天的交易量生成的视图,则视图模块的实例可以为根据2019年5月8日的交易量 生成的视图。
在一种可能的实现方式中,可以设置多个预设视图模块和/或多个预设表格模块,相应地,用户可以在报表元素对应的选择文本框中选择目标预设视图模块和/或目标预设表格模块。在一个示例中,预设视图模块可以为通过如下方式得到的:检测到用户触发管理界面上“创建视图模块”功能对应的图标后,向用户显示视图模块管理界面;接收用户在视图管理界面上输入的视图模块(比如视图模块a)的类型,视图模块的类型可以包括折线图、柱状图、饼状图、折柱混合图等;进一步地,可以根据用户的选择确定目标系统和变量,并根据目标系统、变量和视图模块的类型生成视图模块对应的配置信息。举例来说,若用户选择的视图模块a的视图类型为饼状图,目标系统为系统101,变量为24小时内的交易数量,则可以确定视图模块a用于生成系统101某一天的交易数量对应的饼状图。进一步地,可以运行视图模块a的配置信息,若确定运行的结果符合预期,则可以根据用户的设置配置视图模块a的属性,比如时间信息、数量信息、平均值、最大值或最小值、单位等;比如,若用户设置的时间信息为2019年5月8日,数量信息为时间最早的1000条,则可以确定视图模块a用于生成系统101在2019年5月8日产生的时刻最早的1000条交易数量对应的饼状图。在确定视图模块a后,可以将视图模块a的上述信息存储在安全运营平台上,以使用户可以在报表管理界面上调用视图模块a。
相应地,预设表格模块可以为通过如下方式得到的:检测到用户触发管理界面上“创建表格模块”功能对应的图标后,向用户显示表格模块管理界面;接收用户在表格管理界面上输入目标系统和变量,并可以根据目标系统和变量生成表格模块对应的配置信息。举例来说,若用户选择的表格模块b的目标系统为系统102,变量为24小时内的交易数量,则可以确定表格模块b用于生成系统102某一天的交易数量对应的表格。进一步地,可以运行表格模块b的配置信息,若确定运行的结果符合预期,则可以将表格模块b的上述信息存储在安全运营平台上,以使用户可以在报表管理界面上调用表格模块b。
作为一个示例,用户可以在报表管理界面上选择视图模块a、表格模块b 和间隔栏模块c;针对于视图模块a和表格模块b,由于视图模块a和表格模块b的生成信息预先存储在安全运营平台上,因此,用户在报表管理界面上输入属性信息,即可得到视图模块a和表格模块b的实例。比如,视图模块a为生成系统101在一天时间内的交易数量对应的饼状图,若用户输入的属性信息为当前一天的交易数量和每小时的交易数量平均值,则视图模块a可以用于生成系统101在每一天的每小时生成的交易数量的平均值。表格模块b为生成系统102某一天的交易对应的表格,若用户输入的参数信息为最新一天的交易数据,则表格模块b可以用于生成系统102在当前一天生成的交易的表格。相应地,针对于间隔栏模块c,用户可以在报表管理界面上输入间隔栏c的内容,间隔栏c的内容用于向用户提示报表包括的关键内容。
本发明实施例中,用户在选择模块后,还可以设置模块的标题。以模块类型为柱状图为例,模块的标题可以显示在柱状图的上方,或者也可以显示在柱状图的一侧,或者还可以显示在柱状图的下方,具体不作限定。本发明实施例中,若报表中包括多个模块,则用户可以依次添加多个模块,或者也可以同时添加多个模块,具体不作限定。进一步地,在一个或多个模块添加完成后,可以生成一个或多个模块对应的配置程序,并可以使用配置程序加载一个或多个模块,若确定加载结果满足预设要求,则可以执行步骤503;若确定加载结果不满足预设要求,则可以提示用户重新添加模块。举例来说,若用户添加视图模块a、表格模块b和间隔栏模块c后,发现视图模块a无法加载,则可以提示用户重新添加模块;相应地,若用户重新添加视图模块d、表格模块b和间隔栏模块c后,则可以生成视图模块d、表格模块b和间隔栏模块c对应的配置程序,若加载该配置程序后确定加载结果满足预设要求,则可以执行步骤503。
步骤503,根据第二配置信息获取一个或多个系统生成的数据中的目标数据,并根据第二配置信息和目标数据,生成目标报表。
具体实施中,在接收到用户输入的第二配置信息后,可以根据第二配置信息确定目标数据,并可以基于第二配置信息将目标数据转换为报表。举例 来说,若根据第二配置信息确定的目标数据为系统101和系统102分别在6月份的交易量,第二配置信息中包括的模块为柱状图,则可以生成系统101和系统102在6月份的交易量对应的柱状图,该柱状图即可为目标报表。
本发明实施例中,通过将一个或多个系统的数据以报表的形式显示给用户,可以使得用户更加直观地获取到一个或多个系统的数据,提高用户的满意度;且,通过设置报表管理界面,用户可以根据实际需要设置目标报表,比如可以预先过滤掉无用资源并将用户想要获取的数据放置在目标报表中,也就是说,采用上述技术方案,使得用户可以自定义目标报表,从而更加满足实际需要。
在一种可能的实现方式中,第二配置信息还可以包括收件人的邮箱信息和时间信息。具体地说,可以在报表管理界面上显示“是否发送邮件”的提示语,若检测到用户触发“发送邮件”的图标,则可以提示用户输入邮件类型、邮件发送的时间信息以及收件人的邮箱信息。其中,邮件类型可以为日报、周报、月报中的任意一项,邮件发送的时间信息可以包括日期与时刻。相应地,若目标报表为系统101每天的交易数量对应的柱状图,用户设置的邮件类型为日报、邮件发送的时间信息为2019年5月8日10:00、收件人的邮箱信息为123456@163.com,则可以自2019年5月8日开始,每天统计一次系统101的交易数量,并在每天早上10:00将每天的交易数量对应的柱状图发送给123456@163.com。
本发明实施例中,通过设置目标报表的邮件接收人和发送时间,可以在发送时间将目标报表发送给邮件接收人,一方面,用户可以根据实际需要设置邮件接收人和发送时间,从而可以使得数据管理方法更加符合实际需要;另一方面,通过设置邮件接收人和发送时间,可以将目标报表及时地发送给对应的运维人员,从而提高故障排查的效率。
在一个示例中,第二配置信息中还可以包括目标报表对应的一条或多条告警规则。一条或多条告警规则可以为通过如下方式设置的:接收用户在报表管理界面上输入的告警规则后,可以生成告警规则对应的配置程序;对告 警规则对应的配置程序进行校验,若程序检验合法,则确定告警规则设置成功;若程序校验不合法(比如缺少条件判断语句、代码错误等),则确定告警规则未设置成功,则可以重新生成告警规则对应的配置程序,并重新进行校验。
相应地,若至少一条告警规则设置成功,则在每天10点发送目标报表之前,还可以对目标报表进行检测,若确定目标报表触发了一条或多条告警规则,则可以生成第二告警信息。举例来说,某一条告警规则为交易数量大于1000,若2019年5月9日的交易数量为2000,则确定2019年5月9日对应的目标报表出发了该条告警规则;如此,可以生成第二告警信息。进一步地,可以根据收件人的邮箱信息(即123456@163.com),通过邮件将目标报表和第二告警信息发送给123456@163.com。
本发明实施例中,通过设置目标报表对应的一条或多条告警规则,可以在确定目标报表触发一条或多条告警规则时自动生成告警信息,可以减轻用户的工作量,并提高告警的效率;且,通过将告警信息发送给收件人,可以使得收件人及时获取到告警信息,从而提高故障排查的效率。
需要说明的是,安全运营平台的管理界面上可以设置有第一预设图标和第二预设图标,若用户触发第一预设图标,则可以显示一个或多个系统对应的预设拓扑图,并可以按照图2所示意的方法告警信息显示在预设拓扑图上的一个或多个节点中。相应地,若用户触发第二预设图标,则可以按照图5所示意的方法生成并管理报表。
本发明的上述实施例中,获取第一系统在业务执行过程中生成的数据后,若确定该数据满足第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;进一步地,若确定预设拓扑图中存在与第一系统对应的目标节点,则将第一告警信息显示在目标节点上;其中,预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。本发明实施例中,通过将一个或多个系统以及一个或多个系统的告警信息映射到预设拓扑图中,用户可以通过查看预设拓扑图直观地获取到一个或多个系统的告警信息,从而可以提高用 户的满意度;且,通过设置第一系统对应的至少一条告警规则,在第一系统的数据触发第一系统对应的告警规则时,可以自动实现对第一系统的告警,而无需采用人工的方式确定告警信息,从而可以提高告警的效率。
针对上述方法流程,本发明实施例还提供一种数据管理装置,该装置的具体内容可以参照上述方法实施。
图6为本发明实施例提供的一种数据管理装置的结构示意图,包括:
获取模块601,用于获取第一系统在业务执行过程中生成的数据;
生成模块602,用于若确定所述数据满足所述第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;
处理模块603,用于若确定预设拓扑图中存在与所述第一系统对应的目标节点,则将所述第一告警信息显示在所述目标节点上;所述预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。
可选地,所述处理模块603用于:
确定所述第一告警信息所属的目标告警类型;
从预设映射表中获取目标节点的一个或多个告警类型与告警方式的对应关系,确定所述目标告警类型对应的目标告警方式;所述预设映射表包括一个或多个节点的告警类型与告警方式的对应关系;
按照所述目标告警方式将所述第一告警信息显示在所述目标节点上。
可选地,所述处理模块603还用于:若确定预设拓扑图中不存在与所述第一系统对应的节点,则向用户显示节点配置界面,所述节点配置界面用于在所述预设拓扑图中创建所述第一系统对应的节点;以及,接收所述用户在所述节点配置界面上输入的第一配置信息,所述第一配置信息包括所述第一系统对应的节点的节点样式、所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系、所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系;
相应地,所述生成模块602还用于:根据所述第一系统对应的节点的节点样式和所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点 的连接关系在所述预设拓扑图中创建所述第一系统对应的节点,并将所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系添加到所述预设映射表中。
可选地,所述获取模块601还用于:获取所述一个或多个系统在业务执行过程中生成的数据;
相应地,所述处理模块603还用于:向用户显示报表管理界面,所述报表管理界面用于以报表的形式显示所述一个或多个系统生成的数据;以及,接收所述用户在所述报表管理界面上输入的第二配置信息,所述第二配置信息包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项;以及,根据所述第二配置信息获取所述一个或多个系统生成的数据中的目标数据,并根据所述第二配置信息和所述目标数据,生成目标报表。
可选地,所述第二配置信息还包括收件人的邮箱信息和时间信息;
所述处理模块603还用于:在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人。
可选地,所述第二配置信息中还包括所述目标报表对应的一条或多条告警规则;
所述处理模块603还用于:
在所述时间信息所指示的时间点,若确定所述目标报表满足所述一条或多条告警规则的触发条件,则生成第二告警信息,并根据所述收件人的邮箱信息,通过邮件将所述目标报表和所述第二告警信息发送给所述收件人。
从上述内容可以看出:本发明的上述实施例中,获取第一系统在业务执行过程中生成的数据后,若确定该数据满足第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;进一步地,若确定预设拓扑图中存在与第一系统对应的目标节点,则将第一告警信息显示在目标节点上;其中,预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。本发明实施例中,通过将一个或多个系统以及一个或多个系统的告警信息映射到预设拓扑图中,用户可以通过查看预设拓扑图直观地获取到一个或多个系统的告 警信息,从而可以提高用户的满意度;且,通过设置第一系统对应的至少一条告警规则,在第一系统的数据触发第一系统对应的告警规则时,可以自动实现对第一系统的告警,而无需采用人工的方式确定告警信息,从而可以提高告警的效率。
基于同一发明构思,本发明实施例还提供了一种计算机可读存储介质,包括指令,当其在计算机的处理器上运行时,使得计算机的处理器执行如图2或图2任意所述的数据管理方法。
基于同一发明构思,本发明实施例还提供了一种计算机程序产品,当其在计算机上运行时,使得计算机执行如图2或图2任意所述的数据管理方法。
基于同一发明构思,本申请还提供一种计算设备,如图7所示,该计算设备包括:
处理器701、存储器702、收发器703、总线接口704;其中,处理器701、存储器702与收发器703之间通过总线连接;
所述处理器701,用于读取所述存储器702中的程序,执行如图2或图2任意所述的数据管理方法;
处理器701可以是中央处理器(central processing unit,简称CPU),网络处理器(network processor,简称NP)或者CPU和NP的组合。还可以是硬件芯片。上述硬件芯片可以是专用集成电路(application-specific integrated circuit,简称ASIC),可编程逻辑器件(programmable logic device,简称PLD)或其组合。上述PLD可以是复杂可编程逻辑器件(complex programmable logic device,简称CPLD),现场可编程逻辑门阵列(field-programmable gate array,简称FPGA),通用阵列逻辑(generic array logic,简称GAL)或其任意组合。
所述存储器702,用于存储一个或多个可执行程序,可以存储所述处理器701在执行操作时所使用的数据。
具体地,程序可以包括程序代码,程序代码包括计算机操作指令。存储器702可以包括易失性存储器(volatile memory),例如随机存取存储器(random-access memory,简称RAM);存储器702也可以包括非易失性存储 器(non-volatile memory),例如快闪存储器(flash memory),硬盘(hard disk drive,简称HDD)或固态硬盘(solid-state drive,简称SSD);存储器702还可以包括上述种类的存储器的组合。
存储器702存储了如下的元素,可执行模块或者数据结构,或者它们的子集,或者它们的扩展集:
操作指令:包括各种操作指令,用于实现各种操作。
操作系统:包括各种系统程序,用于实现各种基础业务以及处理基于硬件的任务。
总线可以是外设部件互连标准(peripheral component interconnect,简称PCI)总线或扩展工业标准结构(extended industry standard architecture,简称EISA)总线等。总线可以分为地址总线、数据总线、控制总线等。为便于表示,图7中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。
总线接口704可以为有线通信接入口,无线总线接口或其组合,其中,有线总线接口例如可以为以太网接口。以太网接口可以是光接口,电接口或其组合。无线总线接口可以为WLAN接口。
本领域内的技术人员应明白,本发明的实施例可提供为方法、或计算机程序产品。因此,本发明可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的 装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
尽管已描述了本发明的优选实施例,但本领域内的技术人员一旦得知了基本创造性概念,则可对这些实施例作出另外的变更和修改。所以,所附权利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。
显然,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围。这样,倘若本发明的这些修改和变型属于本发明权利要求及其等同技术的范围之内,则本发明也意图包含这些改动和变型在内。

Claims (15)

  1. 一种数据管理方法,其特征在于,所述方法包括:
    获取第一系统在业务执行过程中生成的数据;
    若确定所述数据满足所述第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;
    若确定预设拓扑图中存在与所述第一系统对应的目标节点,则将所述第一告警信息显示在所述目标节点上;所述预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。
  2. 根据权利要求1所述的方法,其特征在于,所述将所述第一告警信息显示在所述目标节点上,包括:
    确定所述第一告警信息所属的目标告警类型;
    从预设映射表中获取目标节点的一个或多个告警类型与告警方式的对应关系,确定所述目标告警类型对应的目标告警方式;所述预设映射表包括一个或多个节点的告警类型与告警方式的对应关系;
    按照所述目标告警方式将所述第一告警信息显示在所述目标节点上。
  3. 根据权利要求2所述的方法,其特征在于,所述方法还包括:
    若确定预设拓扑图中不存在与所述第一系统对应的节点,则向用户显示节点配置界面,所述节点配置界面用于在所述预设拓扑图中创建所述第一系统对应的节点;
    接收所述用户在所述节点配置界面上输入的第一配置信息,所述第一配置信息包括所述第一系统对应的节点的节点样式、所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系、所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系;
    根据所述第一系统对应的节点的节点样式和所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系在所述预设拓扑图中创建所述第一系统对应的节点,并将所述第一系统对应的节点的一个或多个告 警类型与告警方式的对应关系添加到所述预设映射表中。
  4. 根据权利要求1至3中任一项所述的方法,其特征在于,所述方法还包括:
    获取所述一个或多个系统在业务执行过程中生成的数据,并向用户显示报表管理界面,所述报表管理界面用于以报表的形式显示所述一个或多个系统生成的数据;
    接收所述用户在所述报表管理界面上输入的第二配置信息,所述第二配置信息包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项;
    根据所述第二配置信息获取所述一个或多个系统生成的数据中的目标数据,并根据所述第二配置信息和所述目标数据,生成目标报表。
  5. 根据权利要求4所述的方法,其特征在于,所述第二配置信息还包括收件人的邮箱信息和时间信息;
    所述方法还包括:
    在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人。
  6. 根据权利要求5所述的方法,其特征在于,所述第二配置信息中还包括所述目标报表对应的一条或多条告警规则;
    所述在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人,包括:
    在所述时间信息所指示的时间点,若确定所述目标报表满足所述一条或多条告警规则的触发条件,则生成第二告警信息,并根据所述收件人的邮箱信息,通过邮件将所述目标报表和所述第二告警信息发送给所述收件人。
  7. 一种数据管理装置,其特征在于,所述装置包括:
    获取模块,用于获取第一系统在业务执行过程中生成的数据;
    生成模块,用于若确定所述数据满足所述第一系统对应的至少一条告警规则的触发条件,则生成第一告警信息;
    处理模块,用于若确定预设拓扑图中存在与所述第一系统对应的目标节点,则将所述第一告警信息显示在所述目标节点上;所述预设拓扑图中包括与一个或多个系统一一对应的一个或多个节点。
  8. 根据权利要求7所述的装置,其特征在于,所述处理模块用于:
    确定所述第一告警信息所属的目标告警类型;
    从预设映射表中获取目标节点的一个或多个告警类型与告警方式的对应关系,确定所述目标告警类型对应的目标告警方式;所述预设映射表包括一个或多个节点的告警类型与告警方式的对应关系;
    按照所述目标告警方式将所述第一告警信息显示在所述目标节点上。
  9. 根据权利要求8所述的装置,其特征在于,
    所述处理模块还用于:若确定预设拓扑图中不存在与所述第一系统对应的节点,则向用户显示节点配置界面,所述节点配置界面用于在所述预设拓扑图中创建所述第一系统对应的节点;以及,接收所述用户在所述节点配置界面上输入的第一配置信息,所述第一配置信息包括所述第一系统对应的节点的节点样式、所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系、所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系;
    所述生成模块还用于:根据所述第一系统对应的节点的节点样式和所述第一系统对应的节点与所述预设拓扑图中包括的一个或多个节点的连接关系在所述预设拓扑图中创建所述第一系统对应的节点,并将所述第一系统对应的节点的一个或多个告警类型与告警方式的对应关系添加到所述预设映射表中。
  10. 根据权利要求7至9中任一项所述的装置,其特征在于,
    所述获取模块还用于:获取所述一个或多个系统在业务执行过程中生成的数据;
    所述处理模块还用于:向用户显示报表管理界面,所述报表管理界面用于以报表的形式显示所述一个或多个系统生成的数据;以及,接收所述用户 在所述报表管理界面上输入的第二配置信息,所述第二配置信息包括报表类型、报表元素、报表元素的标题、报表元素对应的参数中的至少一项;以及,根据所述第二配置信息获取所述一个或多个系统生成的数据中的目标数据,并根据所述第二配置信息和所述目标数据,生成目标报表。
  11. 根据权利要求10所述的装置,其特征在于,所述第二配置信息还包括收件人的邮箱信息和时间信息;
    所述处理模块还用于:在所述时间信息所指示的时间点,根据所述收件人的邮箱信息,通过邮件将所述目标报表发送给所述收件人。
  12. 根据权利要求11所述的装置,其特征在于,所述第二配置信息中还包括所述目标报表对应的一条或多条告警规则;
    所述处理模块还用于:
    在所述时间信息所指示的时间点,若确定所述目标报表满足所述一条或多条告警规则的触发条件,则生成第二告警信息,并根据所述收件人的邮箱信息,通过邮件将所述目标报表和所述第二告警信息发送给所述收件人。
  13. 一种计算机可读存储介质,其特征在于,包括指令,当其在计算机的处理器上运行时,使得计算机的处理器执行如权利要求1至6任一项所述的方法。
  14. 一种计算机程序产品,其特征在于,当其在计算机上运行时,使得计算机执行如权利要求1至6任一项所述的方法。
  15. 一种电子设备,其特征在于,包括处理器、存储器、收发器、总线接口,其中处理器、存储器与收发器之间通过总线连接;
    所述处理器,用于读取所述存储器中的程序,执行权利要求1至6任一项方法;
    所述存储器,用于存储一个或多个可执行程序,可以存储所述处理器在执行操作时所使用的数据。
PCT/CN2020/083369 2019-05-17 2020-04-03 一种数据管理方法及装置 WO2020233251A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910409756.4 2019-05-17
CN201910409756.4A CN110188099A (zh) 2019-05-17 2019-05-17 一种数据管理方法及装置

Publications (1)

Publication Number Publication Date
WO2020233251A1 true WO2020233251A1 (zh) 2020-11-26

Family

ID=67716513

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/083369 WO2020233251A1 (zh) 2019-05-17 2020-04-03 一种数据管理方法及装置

Country Status (2)

Country Link
CN (1) CN110188099A (zh)
WO (1) WO2020233251A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113688015A (zh) * 2021-08-25 2021-11-23 深圳华远云联数据科技有限公司 告警通知方法、装置、服务器及存储介质
CN113821404A (zh) * 2021-08-30 2021-12-21 济南浪潮数据技术有限公司 一种告警处理方法、系统、设备以及介质
CN115242622A (zh) * 2022-07-25 2022-10-25 京东方科技集团股份有限公司 一种告警处理系统、方法及物联网系统
CN117313189A (zh) * 2023-12-01 2023-12-29 国网山东省电力公司淄博供电公司 光纤二次回路可视化分析方法、系统、终端及存储介质
CN118163737A (zh) * 2024-05-13 2024-06-11 深圳安培时代数字能源科技有限公司 一种房车电力系统的控制方法及相关装置

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188099A (zh) * 2019-05-17 2019-08-30 深圳前海微众银行股份有限公司 一种数据管理方法及装置
CN111400521B (zh) * 2020-02-28 2022-06-07 苏州浪潮智能科技有限公司 一种图数据处理方法、装置、设备、介质
CN112000324B (zh) * 2020-08-21 2023-12-15 成都卫士通信息产业股份有限公司 一种示警功能设置方法、装置及相关组件
CN113595797B (zh) * 2021-08-02 2024-06-21 北京汇钧科技有限公司 告警信息的处理方法、装置、电子设备及存储介质
CN113590437B (zh) * 2021-08-03 2024-04-30 上海浦东发展银行股份有限公司 一种告警信息处理方法、装置、设备和介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506361A (zh) * 2014-12-26 2015-04-08 成都科来软件有限公司 一种网络流量的监测方法及装置
CN104616134A (zh) * 2015-01-23 2015-05-13 北京京东尚科信息技术有限公司 一种报表分析报告推送方法及装置
CN105959171A (zh) * 2016-07-19 2016-09-21 北京星网锐捷网络技术有限公司 基于网络拓扑图创建重保业务的方法
CN108111342A (zh) * 2017-12-15 2018-06-01 北京华创网安科技股份有限公司 基于可视化的威胁告警展示方法
CN108234168A (zh) * 2016-12-15 2018-06-29 腾讯科技(深圳)有限公司 一种基于业务拓扑的数据展示方法及系统
CN110188099A (zh) * 2019-05-17 2019-08-30 深圳前海微众银行股份有限公司 一种数据管理方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102308522B (zh) * 2011-07-21 2014-01-22 华为技术有限公司 一种定位网络故障的方法、设备及系统
CN103001804B (zh) * 2012-12-10 2015-12-02 上海斐讯数据通信技术有限公司 设备无关的告警处理方法、装置及相应的网管系统
CN109688188B (zh) * 2018-09-07 2022-08-19 平安科技(深圳)有限公司 监控告警方法、装置、设备及计算机可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104506361A (zh) * 2014-12-26 2015-04-08 成都科来软件有限公司 一种网络流量的监测方法及装置
CN104616134A (zh) * 2015-01-23 2015-05-13 北京京东尚科信息技术有限公司 一种报表分析报告推送方法及装置
CN105959171A (zh) * 2016-07-19 2016-09-21 北京星网锐捷网络技术有限公司 基于网络拓扑图创建重保业务的方法
CN108234168A (zh) * 2016-12-15 2018-06-29 腾讯科技(深圳)有限公司 一种基于业务拓扑的数据展示方法及系统
CN108111342A (zh) * 2017-12-15 2018-06-01 北京华创网安科技股份有限公司 基于可视化的威胁告警展示方法
CN110188099A (zh) * 2019-05-17 2019-08-30 深圳前海微众银行股份有限公司 一种数据管理方法及装置

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113688015A (zh) * 2021-08-25 2021-11-23 深圳华远云联数据科技有限公司 告警通知方法、装置、服务器及存储介质
CN113821404A (zh) * 2021-08-30 2021-12-21 济南浪潮数据技术有限公司 一种告警处理方法、系统、设备以及介质
CN113821404B (zh) * 2021-08-30 2023-12-26 济南浪潮数据技术有限公司 一种告警处理方法、系统、设备以及介质
CN115242622A (zh) * 2022-07-25 2022-10-25 京东方科技集团股份有限公司 一种告警处理系统、方法及物联网系统
CN117313189A (zh) * 2023-12-01 2023-12-29 国网山东省电力公司淄博供电公司 光纤二次回路可视化分析方法、系统、终端及存储介质
CN117313189B (zh) * 2023-12-01 2024-03-19 国网山东省电力公司淄博供电公司 光纤二次回路可视化分析方法、系统、终端及存储介质
CN118163737A (zh) * 2024-05-13 2024-06-11 深圳安培时代数字能源科技有限公司 一种房车电力系统的控制方法及相关装置

Also Published As

Publication number Publication date
CN110188099A (zh) 2019-08-30

Similar Documents

Publication Publication Date Title
WO2020233251A1 (zh) 一种数据管理方法及装置
US11902316B2 (en) Real-time cybersecurity status system with event ticker
CN110611651B (zh) 网络监控方法、网络监控装置和电子设备
WO2019090998A1 (zh) 数据监控方法、装置、计算机设备及存储介质
CN107566163B (zh) 一种用户行为分析关联的告警方法及装置
US10108480B2 (en) Data stream processor and method to counteract anomalies in data streams transiting a distributed computing system
CN106548402B (zh) 资源转移监控方法及装置
WO2021121244A1 (zh) 一种告警信息生成方法、装置、电子设备及存储介质
WO2014129983A1 (en) Methods, systems, and devices for managing a plurality of alarms
US11074652B2 (en) System and method for model-based prediction using a distributed computational graph workflow
CN111078695B (zh) 计算企业内元数据关联关系的方法及装置
WO2020233356A1 (zh) 测试环境控制方法、装置、计算机可读存储介质及服务器
US20160294651A1 (en) Method, apparatus, and computer program product for monitoring an electronic data exchange
CN110661717A (zh) 一种限流方法、装置及电子设备
WO2019214014A1 (zh) 网销产品管理方法、装置、终端设备及存储介质
WO2024027328A1 (zh) 基于零信任数据访问控制系统的数据处理方法
CN110933152B (zh) 一种预热方法、装置、系统及电子设备
US20220028008A1 (en) Signals-based data syndication and collaboration
CN113094053A (zh) 产品的交付方法及装置、计算机存储介质
CN105763555A (zh) 一种网站风险控制服务器和方法及客户端
CN110633165B (zh) 故障处理方法、装置、系统服务器及计算机可读存储介质
CN112380478A (zh) 网页截图方法、装置、计算机设备及计算机可读存储介质
CN117273429A (zh) 事件监测方法、系统、电子设备及存储介质
CN116136801B (zh) 云平台的数据处理方法、装置、电子设备及存储介质
US20210350024A1 (en) Providing transparency in private-user-data access

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20808829

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 01/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20808829

Country of ref document: EP

Kind code of ref document: A1