[go: up one dir, main page]

CN120342857B - Link configuration processing method and device for software system - Google Patents

Link configuration processing method and device for software system

Info

Publication number
CN120342857B
CN120342857B CN202510812808.8A CN202510812808A CN120342857B CN 120342857 B CN120342857 B CN 120342857B CN 202510812808 A CN202510812808 A CN 202510812808A CN 120342857 B CN120342857 B CN 120342857B
Authority
CN
China
Prior art keywords
data
assets
service
traffic
links
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202510812808.8A
Other languages
Chinese (zh)
Other versions
CN120342857A (en
Inventor
杨海峰
张广学
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianjin Anhua Jinhe Technology Co ltd
Original Assignee
Tianjin Anhua Jinhe Technology Co ltd
Filing date
Publication date
Application filed by Tianjin Anhua Jinhe Technology Co ltd filed Critical Tianjin Anhua Jinhe Technology Co ltd
Priority to CN202510812808.8A priority Critical patent/CN120342857B/en
Publication of CN120342857A publication Critical patent/CN120342857A/en
Application granted granted Critical
Publication of CN120342857B publication Critical patent/CN120342857B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The application discloses a link configuration processing method and device of a software system, wherein the method comprises the steps of capturing data traffic generated when the software system operates, obtaining a new function configured in the software system, obtaining preset data and/or service of the software system required to be used by the new function, analyzing the captured data traffic, wherein the analysis is used for searching the preset traffic using the preset data and/or service from the data traffic, obtaining a link capable of accessing the preset data and/or service from the preset traffic, and configuring the link accessing the preset data and/or service to the new function. The application solves the problem that the configuration efficiency is lower by operation and maintenance personnel when the functions in the software system are expanded, thereby improving the link configuration efficiency to a certain extent.

Description

Link configuration processing method and device of software system
Technical Field
The present application relates to the field of software, and in particular, to a link configuration processing method and apparatus for a software system.
Background
Various services are typically included in software systems, such as web pages, databases, e-mail, etc., each running on a server (including physical and/or cloud servers herein), and each providing services on an IP address and port number that are typically grasped by the operation and maintenance personnel.
In the related art, it is desired that a software system be more flexible and easily expandable, and such expanded work may be provided to an ordinary user (the user referred to herein as a user who uses the software system), for example, the user may implement a desired function by configuring himself. When the function of the software system is expanded, the original services of the software system are needed to be used, at the moment, operation and maintenance personnel are needed to perform configuration, and the operation and maintenance personnel are needed to perform security assessment and other works before the configuration, so that the efficiency is low.
Disclosure of Invention
The embodiment of the application provides a link configuration processing method and device of a software system, which at least solve the problem that operation and maintenance personnel are needed to perform configuration with lower efficiency when functions in the software system are expanded.
According to one aspect of the application, a link configuration processing method of a software system is provided, which comprises the steps of capturing data traffic generated when the software system is operated in the process of operating the software system, acquiring a new function configured in the software system, wherein the new function is a software function which is beneficial to the existing service and/or data in the software system and is provided for a user, acquiring preset data and/or service of the software system which needs to be used by the new function, analyzing the captured data traffic, wherein the analysis is used for searching the preset traffic using the preset data and/or service from the data traffic, acquiring a link which can access the preset data and/or service from the preset traffic, and configuring the link which can access the preset data and/or service to the new function.
Further, the data traffic includes at least one of data traffic between each server of the software system, and data traffic between a client and each server.
Further, the step of configuring the links capable of accessing the predetermined data and/or services to the new function includes obtaining whether an asset corresponding to the link capable of accessing the predetermined data and/or services is in an asset table, wherein the asset includes a network address and/or a port number, if the asset is not in the asset table, searching for another link capable of accessing the predetermined data and/or services until the asset corresponding to the searched link is in the asset table, and configuring the searched link to the new function.
Further, all the assets in the grabbed traffic are acquired, and the acquired assets are configured in an asset table after the assets are subjected to audit classification, wherein the audit classification of the assets comprises classification of the assets as newly discovered assets, non-discovered assets or differential assets, the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the traffic, the non-discovered assets are the assets which exist in the asset table but the traffic when access to the assets does not occur in the traffic, and the differential is that the access type in the traffic is inconsistent with the service type corresponding to the assets.
According to another aspect of the application, a link configuration processing device of a software system is provided, which comprises a grabbing module, a first acquisition module and a second acquisition module, wherein the grabbing module is used for grabbing data traffic generated when the software system runs in the running process of the software system, the first acquisition module is used for acquiring a new function configured in the software system, wherein the new function is a software function which is beneficial to an existing service and/or data in the software system and is provided for a user, the second acquisition module is used for acquiring preset data and/or service of the software system which needs to be used by the new function, the analysis module is used for analyzing the grabbed data traffic, the analysis is used for searching preset traffic using the preset data and/or service from the data traffic, and the configuration module is used for acquiring a link capable of accessing the preset data and/or service from the preset traffic and configuring the link accessing the preset data and/or service to the new function.
Further, the data traffic includes at least one of data traffic between each server of the software system, and data traffic between a client and each server.
Further, the configuration module is configured to obtain whether an asset corresponding to a link capable of accessing the predetermined data and/or service is in an asset table, where the asset includes a network address and/or a port number, and if the asset is not in the asset table, search for another link capable of accessing the predetermined data and/or service until the asset corresponding to the searched link is in the asset table, and configure the searched link to the new function.
Further, the configuration module is further used for acquiring all the assets in the grabbed traffic, and after the assets are subjected to audit classification, configuring the acquired assets in an asset table, wherein the audit classification of the assets comprises classification of the assets as newly discovered assets, non-occurrence of the assets or difference assets, the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the traffic, the non-occurrence of the assets are the assets existing in the asset table, but the traffic which does not access the assets does not occur in the traffic, and the difference is that the access type in the traffic is inconsistent with the service type corresponding to the assets.
According to another aspect of the present application, there is also provided an electronic device comprising a memory and a processor, wherein the memory is adapted to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement the above-described method steps.
According to another aspect of the present application there is also provided a readable storage medium having stored thereon computer instructions which when executed by a processor perform the above-mentioned method steps.
In the embodiment of the application, the data traffic generated when the software system is operated is grabbed in the process of operating the software system, the new function configured in the software system is acquired, wherein the new function is a software function which is beneficial to the existing service and/or data in the software system and is provided for a user, the preset data and/or service of the software system which is needed to be used by the new function is acquired, the grabbed data traffic is analyzed, the analysis is used for searching the preset traffic using the preset data and/or service from the data traffic, the link which can access the preset data and/or service is acquired from the preset traffic, and the link which can access the preset data and/or service is configured to the new function. The application solves the problem that the configuration efficiency is lower by operation and maintenance personnel when the functions in the software system are expanded, thereby improving the link configuration efficiency to a certain extent.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application. In the drawings:
FIG. 1 is a schematic diagram of a software system architecture according to an embodiment of the application, and
Fig. 2 is a flowchart of a link configuration processing method of a software system according to an embodiment of the present application.
Detailed Description
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
In the following embodiment, a software system is split into three parts, namely a database, a data interface (also simply referred to as an interface) and an application system, wherein the application system can be understood as a system for interacting with a user, for example, in a BS system, the interaction system is a WEB page, the user selects a required function through the WEB page, and then the data of the database is called and displayed to the user. The data interface is presented for use by a developer through which the developer can process data in the database. The database is used for storing data. Databases and application systems need to be serviced by servers, which may be real servers or cloud services. The database and application system will be configured with corresponding network addresses (IP addresses) and ports (ports), which in the following embodiments will be referred to as assets. The application system and the data interface are connected to the database by a link. It should be noted that, the data interface may also access the database through the application system, that is, the data interface may be directly connected to the database, or may access the database through a service provided by a server where the application system is located, for example, the application system is a web page system, the service is provided through an 80 port of a predetermined IP address, the user may access the 80 port of the IP address through a browser to use the application system, the software developer may also pass parameters through the 80 port of the predetermined IP address (i.e., the data interface), etc., and after the application system obtains the parameters, access the database, and process the data in the database.
Fig. 1 is a schematic view of a software system architecture according to an embodiment of the present application, as shown in fig. 1, in fig. 1 there are an application system a, an application system B, a database C, a database D, an interface E, and an interface F, where a user (through a terminal) can access the application system a and the application system B (the terminal can also access the application system through an agent), and the interface E accesses the database through the application system a and the application system B, and the interface F can directly access the database. It should be noted that, although two application systems, databases, and interfaces are illustrated in fig. 1, one or more application systems, databases, and interfaces may be used. The network connection between the application, the database and the interface may be referred to as a link. The application system, database, and interface of fig. 1 may be configured with IP addresses and ports, and thus may also be referred to as assets. In fig. 1, the application system a and the database C may implement a complete service function, and in the following embodiments, the application system a and the database C are also referred to as service subsystems, and a software system may include a plurality of service subsystems. In addition to the code related to the completion, when a new service subsystem is created, a server, a database, etc. capable of supporting the application system need to be arranged for the new service subsystem, and at this time, an IP address and a port need to be allocated for the server, the database, etc. are also needed, and links between the server and the database, such as link capacity, backup links, etc. can be considered. The selection and configuration of the IP addresses, ports and links can be performed by an administrator, but the manual configuration workload is increased, the manual configuration workload also depends on human experience, and the efficiency is low.
Two ways are provided in the following embodiments for configuring resources for a new business system. In one mode, the creation of the subsystem is accomplished based on link reachability, for example, by designating an portal service to quickly complete the creation of the subsystem based on a list of assets recommended by link reachability. In a second mode, the subsystem creation process based on the data content, for example, knowing the personal information of Zhang-III, can construct the subsystem according to the links related to Zhang-III personal information in the access process. For links, each link may also implement labeling of link traffic according to the capabilities of the large model based on behavioral sampling (SQL/URL) involved in the link.
This is illustrated below.
The user needs to add a function to the software system, for example, to the medical system to add a function of the patient's path of travel in the hospital, which may be referred to as a software subsystem (or business subsystem). The system needs to acquire information such as registration time and treatment time of patients in various departments of the hospital, time of various operations of the patients on various self-service machines of the hospital and the like, the information needs to be read from a database, and the data are stored in a database A and a database B. After configuring these functions the user does not need to know in which databases these data are, nor the IP addresses and port numbers of these databases.
The usual procedure here is to let an administrator of the software system perform the configuration of database a and database B, but this configuration is relatively inefficient. In order to solve this problem, a link configuration processing method of a software system is provided in the following embodiment, fig. 2 is a flowchart of a link configuration processing method of a software system according to an embodiment of the present application, and steps involved in the method in fig. 2 are described below.
Step S202, capturing data traffic generated during the running of the software system in the running process of the software system, wherein the data traffic comprises at least one of data traffic between each service end of the software system and data traffic between a client and each service end.
There are many ways to capture data traffic. The following description is made with reference to examples.
The example provides a flow grabbing method based on memory design optimization, which specifically comprises the steps of starting a packet grabbing process, carrying out packet grabbing processing on data flow, obtaining a plurality of data packets according to a single-thread reading and single-thread writing mode, caching the plurality of example data packets into a shared memory annular buffer pool, carrying out circular scheduling on the memory of the example shared memory annular buffer pool, analyzing data reading and writing conditions in real time, carrying out data pulling packet processing when the data reading and writing are needed, obtaining the pulled plurality of data packets, starting an analysis process, and analyzing the plurality of example data packets according to the single-thread reading and single-thread writing mode.
The method comprises the steps of receiving a packet grabbing process signal, determining the number of CPU cores, carrying out multi-thread packet grabbing capture according to the packet grabbing process signal and the number of the CPU cores to obtain a plurality of data packets, and distributing the data packets of a plurality of examples. The method comprises the steps of caching a plurality of example data packets into a shared memory annular buffer pool, circularly scheduling the memory of the example shared memory annular buffer pool, analyzing data reading and writing conditions in real time, and when data reading and writing are needed, carrying out pulling data packet processing.
The example of circularly scheduling the memory of the example shared memory ring buffer pool specifically comprises the steps of performing ring traversal memory call on the shared memory ring buffer pool, and re-overlaying the memory in the example shared memory ring buffer pool when the shared memory ring buffer pool is full. The method specifically comprises the steps of obtaining a plurality of pulled data packets, receiving analysis process signals, and carrying out multi-thread analysis on the plurality of example data packets according to the analysis process signals and the CPU core number.
Step S204, a new function configured in the software system is obtained, wherein the new function is a software function which is beneficial to the service in the software system to provide for the user.
Step S206, obtaining predetermined data and/or services of the software system that need to be used by the new function.
And step S208, analyzing the grabbed data traffic, wherein the analysis is used for searching the predetermined traffic using the predetermined data and/or service from the data traffic.
Step S210, obtaining a link capable of accessing the preset data and/or service from the preset flow, and configuring the link capable of accessing the preset data and/or service to the new function.
Here, since the traffic is publicly available, various access links (links here include interfaces, etc.) exposed to the traffic are also secure to the software system, since the administrator does not expose links that can pose a security threat to the software system, and thus the links that are analyzed by the traffic that is available for the normal access and use. At the same time, no configuration is required for each newly added function administrator, which can be done automatically by the software. Therefore, the problem that operation and maintenance personnel are needed to perform configuration efficiency in function expansion in a software system is solved through the steps, so that link configuration efficiency can be improved to a certain extent.
As an optional implementation manner, when searching a link corresponding to predetermined data, if a plurality of links are searched, an access path of the predetermined data is constructed according to the start points and the end points of the links, and at least one point in the access path is determined according to the access path and the new function to be configured for the new function.
Optionally, the step of configuring the link capable of accessing the predetermined data and/or service to the new function referred to in fig. 2 may further include the step of acquiring whether an asset corresponding to the link capable of accessing the predetermined data and/or service is in an asset table, where the asset includes a network address and/or a port number, if the asset is not in the asset table, searching for another link capable of accessing the predetermined data and/or service until the asset corresponding to the searched link is in the asset table, and configuring the searched link to the new function.
Optionally, the method further comprises the steps of obtaining all the assets in the grabbed flow, and after the assets are subjected to audit classification, configuring the obtained assets in an asset table, wherein the audit classification of the assets comprises the steps of classifying the assets into newly discovered assets, non-occurrence assets or difference assets, wherein the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the flow, the non-occurrence assets are the assets which are in the asset table, but the flow which is accessed to the assets does not occur in the flow, and the difference is that the access type in the flow is inconsistent with the service type corresponding to the assets. For example, the configuration is always (ip+port consistent), but the service configuration is inconsistent (as Mysql in the asset table, the actual traffic presents the Oracle access protocol). Through the mechanism, the asset table is iterated, so that the asset table is consistent with the actual situation.
MySQL is a relational database management system. MySQL is one of the most popular relational database management systems, and MySQL is one of the better relational database management systems (Relational Database MANAGEMENT SYSTEM, abbreviated as RDBMS) and application software in WEB applications. MySQL is a relational database management system that keeps data in different tables rather than placing all data in one large warehouse, which increases speed and flexibility. The SQL language used by MySQL is the most commonly used standardized language for accessing databases. MySQL software adopts a double-authorization policy and is divided into a community version and a commercial version, and because of the characteristics of small size, high speed and low total possession cost, especially the open source code, mySQL is generally selected as a website database for developing small and medium-sized websites and large-sized websites.
Oracle-Database, also known as Oracle-RDBMS, or Oracle for short. Is a relational database management system of oracle corporation. It has good portability, convenient use and strong function, and is suitable for various microcomputer environments of large, medium and small. The method is an efficient, reliable and high-throughput-adaptive database scheme.
For the above examples of database a and database B, the method shown in fig. 2 is used to find the traffic related to accessing database a and database B by the collected traffic, and then the new function is configured according to the access link in the traffic, so that the new function can access database a and database B, and the new function is realized. In the above step S210, a link capable of accessing the predetermined data and/or service is acquired from the predetermined traffic, and the link capable of accessing the predetermined data and/or service is configured to the new function. In an alternative implementation, a plurality of links capable of accessing the predetermined data and/or service are acquired from the predetermined traffic, the links are ordered, the ordered links are configured to the new function, wherein the new function preferentially uses a first link of the ordered links to access the predetermined data and/or service, and uses a second link after the first link of the ordered links to access the predetermined data and/or service in case of abnormality of the use of the first link, and so on.
The method for sorting the multiple links is various, and as an optional implementation manner, the method for sorting the multiple links includes the steps of obtaining the number of times that each link in the multiple links appears in the traffic, counting as one time when the link appears in one complete data packet in the traffic, scoring according to the number to obtain a first score, wherein the number of times is higher when the score is higher, averaging the sizes of all the data packets appearing in the link, scoring according to the average sizes to obtain a second score, wherein the number of times that each link appears in the whole data packet is higher when the second score is higher, weighting the first score and the second score to obtain a score, and sorting according to the score corresponding to each link, wherein the score is higher when the score is higher, the sorting is higher.
In the step S208, the analysis of the grabbed data traffic to obtain the predetermined traffic using the predetermined data and/or service may be implemented in many ways, for example, the analysis of the grabbed data traffic to obtain the predetermined traffic using the predetermined data and/or service includes obtaining indication information of the predetermined data and/or service used by the new function, where the indication information is used to indicate a name or attribute of the predetermined data and/or service, analyzing a tag corresponding to the data traffic to obtain a data traffic with a similarity between the tag and the indication information exceeding a threshold, and taking the data traffic exceeding the threshold as the predetermined traffic, where the tag is used to indicate a function of a link where the data traffic is located.
There are various ways of labeling the functions of links in data traffic, for example, a neural network model may be trained, which is trained using multiple sets of training data, where each set of training data includes data traffic on a link and a label for indicating the function of the link, and after training converges, the data traffic to be labeled is input into the neural network model, and the label output by the neural network model is used as the label of the link. In this example, each link may implement labeling of link traffic (which may also be understood as link functionality) according to the capabilities of the large model, based on behavioral sampling (SQL/URL) involved in the link. For example, the link labeling functions may include obtaining data, querying public data, reporting exchanged data, and so forth.
By the implementation mode, the problem that configuration efficiency is low due to the fact that operation and maintenance personnel are needed for configuration when functions in a software system are expanded is solved, and therefore link configuration efficiency can be improved to a certain extent.
In this embodiment, there is provided an electronic device including a memory in which a computer program is stored, and a processor configured to run the computer program to perform the method in the above embodiment.
The above-described programs may be run on a processor or may also be stored in memory (or referred to as computer-readable media), including both permanent and non-permanent, removable and non-removable media, and information storage may be implemented by any method or technique. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks and/or block diagram block or blocks, and corresponding steps may be implemented in different modules.
Such an apparatus or system is provided in this embodiment. The device is called a link configuration processing device of a software system and comprises a grabbing module, a first acquisition module and a second acquisition module, wherein the grabbing module is used for grabbing data traffic generated when the software system runs in the running process of the software system, the first acquisition module is used for acquiring a new function configured in the software system, the new function is a software function which is beneficial to existing service and/or data in the software system and is provided for a user, the second acquisition module is used for acquiring preset data and/or service of the software system which needs to be used by the new function, the analysis module is used for analyzing the grabbed data traffic, the analysis is used for searching preset traffic using the preset data and/or service from the data traffic, and the configuration module is used for acquiring a link which can access the preset data and/or service from the preset traffic and configuring the link which can access the preset data and/or service to the new function.
The system or the device is used for realizing the functions of the method in the above embodiment, and each module in the system or the device corresponds to each step in the method, which has been described in the method, and will not be described herein.
Optionally, the data traffic comprises at least one of data traffic between each server of the software system, and data traffic between a client and each server.
Optionally, the configuration module is configured to obtain whether an asset corresponding to a link capable of accessing the predetermined data and/or service is in an asset table, where the asset includes a network address and/or a port number, and if the asset is not in the asset table, search for another link capable of accessing the predetermined data and/or service until the asset corresponding to the searched link is in the asset table, and configure the searched link to the new function.
Optionally, the configuration module is further configured to acquire all the assets in the grabbed traffic, and configure the acquired assets in an asset table after the assets are subjected to audit classification, wherein the audit classification of the assets includes classifying the assets as newly discovered assets, non-occurrence assets or difference assets, the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the traffic, the non-occurrence assets are the assets existing in the asset table, but the traffic which is accessed to the assets does not occur in the traffic, and the difference is that the access type in the traffic is inconsistent with the service type corresponding to the assets.
The problem that operation and maintenance personnel are needed to perform configuration efficiency in function expansion in a software system is solved through the embodiment, so that link configuration efficiency can be improved to a certain extent.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (10)

1. A link configuration processing method of a software system, comprising:
capturing data flow generated when the software system operates in the running process of the software system;
Acquiring a new function configured in the software system, wherein the new function is a software function which is beneficial to the existing service and/or data in the software system and is provided for a user;
Acquiring predetermined data and/or services of the software system to be used by the new function;
Analyzing the grabbed data traffic, wherein the analysis is used for searching the preset traffic using the preset data and/or service from the data traffic;
The method comprises the steps of acquiring a link capable of accessing preset data and/or service from preset traffic, configuring the link capable of accessing the preset data and/or service to a new function, wherein when searching the link corresponding to the preset data, if a plurality of links are searched, constructing an access path of the preset data according to the starting points and the ending points of the links, determining at least one point in the access path according to the access path and the new function, configuring the new function, acquiring a plurality of links capable of accessing the preset data and/or service from the preset traffic, sequencing the links and configuring the sequenced links to the new function, wherein the new function preferentially uses a first link of the sequenced links to access the preset data and/or service, and uses a second link behind the first link of the sequenced links to access the preset data and/or service when using the first link to be abnormal, and so on.
2. The method of claim 1, wherein the data traffic comprises at least one of:
And the data flow between each server side of the software system and the data flow between the client side and each server side.
3. The method according to claim 1, characterized in that the step of configuring the new function with links having access to the predetermined data and/or services comprises:
acquiring whether an asset corresponding to a link capable of accessing the preset data and/or service is in an asset table, wherein the asset comprises a network address and/or a port number, if the asset is not in the asset table, searching for another link capable of accessing the preset data and/or service until the asset corresponding to the searched link is in the asset table, and configuring the searched link to the new function.
4. A method according to claim 3, further comprising:
and after the obtained assets are subjected to audit classification, configuring the obtained assets in an asset table, wherein the audit classification of the assets comprises classifying the assets into newly discovered assets, non-discovered assets or differential assets, wherein the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the traffic, the non-discovered assets are the assets which exist in the asset table but the traffic which does not access the assets does not occur in the traffic, and the differential is that the access type in the traffic is inconsistent with the service type corresponding to the assets.
5. A link configuration processing apparatus of a software system, comprising:
The grabbing module is used for grabbing data flow generated when the software system runs in the running process of the software system;
A first obtaining module, configured to obtain a new function configured in the software system, where the new function is a software function that facilitates an existing service and/or data in the software system to provide to a user;
The second acquisition module is used for acquiring preset data and/or services of the software system which are required to be used by the new function;
The analysis module is used for analyzing the grabbed data traffic, wherein the analysis is used for searching the preset traffic using the preset data and/or service from the data traffic;
The configuration module is used for acquiring links capable of accessing the preset data and/or service from the preset flow, configuring the links accessing the preset data and/or service to the new function, wherein when searching the links corresponding to the preset data, if a plurality of links are searched, an access path of the preset data is constructed according to the starting points and the ending points of the links, at least one point in the access path is determined according to the access path and the new function, and the new function is configured, wherein a plurality of links capable of accessing the preset data and/or service are acquired from the preset flow, the links are ordered, the ordered links are configured to the new function, the new function preferentially uses the first links of the ordered links to access the preset data and/or service, and uses the second links behind the first links of the ordered links to access the preset data and/or service when the first links are abnormal, and the new function is used to access the preset data and/or service sequentially.
6. The apparatus of claim 5, wherein the data traffic comprises at least one of:
And the data flow between each server side of the software system and the data flow between the client side and each server side.
7. The apparatus of claim 5, wherein the configuration module is configured to:
acquiring whether an asset corresponding to a link capable of accessing the preset data and/or service is in an asset table, wherein the asset comprises a network address and/or a port number, if the asset is not in the asset table, searching for another link capable of accessing the preset data and/or service until the asset corresponding to the searched link is in the asset table, and configuring the searched link to the new function.
8. The apparatus of claim 7, wherein the configuration module is further configured to:
and after the obtained assets are subjected to audit classification, configuring the obtained assets in an asset table, wherein the audit classification of the assets comprises classifying the assets into newly discovered assets, non-discovered assets or differential assets, wherein the newly discovered assets are network addresses and/or port numbers which are not included in the asset table when access to the assets occurs in the traffic, the non-discovered assets are the assets which exist in the asset table but the traffic which does not access the assets does not occur in the traffic, and the differential is that the access type in the traffic is inconsistent with the service type corresponding to the assets.
9. An electronic device comprising a memory and a processor, wherein the memory is configured to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement the method steps of any of claims 1 to 4.
10. A readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the method steps of any of claims 1 to 4.
CN202510812808.8A 2025-06-18 Link configuration processing method and device for software system Active CN120342857B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202510812808.8A CN120342857B (en) 2025-06-18 Link configuration processing method and device for software system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202510812808.8A CN120342857B (en) 2025-06-18 Link configuration processing method and device for software system

Publications (2)

Publication Number Publication Date
CN120342857A CN120342857A (en) 2025-07-18
CN120342857B true CN120342857B (en) 2025-09-30

Family

ID=

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117785602A (en) * 2023-12-05 2024-03-29 中国银联股份有限公司 Method, device, equipment and medium for determining call relationship
CN118521405A (en) * 2024-04-23 2024-08-20 郑州云智信安安全技术有限公司 Asset relationship discriminating method and system based on data flow

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117785602A (en) * 2023-12-05 2024-03-29 中国银联股份有限公司 Method, device, equipment and medium for determining call relationship
CN118521405A (en) * 2024-04-23 2024-08-20 郑州云智信安安全技术有限公司 Asset relationship discriminating method and system based on data flow

Similar Documents

Publication Publication Date Title
US20230126005A1 (en) Consistent filtering of machine learning data
US11775501B2 (en) Trace and span sampling and analysis for instrumented software
CN111881011B (en) Log management method, platform, server and storage medium
US11196756B2 (en) Identifying notable events based on execution of correlation searches
US11100420B2 (en) Input processing for machine learning
US8977623B2 (en) Method and system for search engine indexing and searching using the index
US12189644B1 (en) Creating dashboards for viewing data in a data storage system based on natural language requests
US10901811B2 (en) Creating alerts associated with a data storage system based on natural language requests
US11681707B1 (en) Analytics query response transmission
CN109033188A (en) A kind of metadata acquisition method, apparatus, server and computer-readable medium
US11822578B2 (en) Matching machine generated data entries to pattern clusters
US11494381B1 (en) Ingestion and processing of both cloud-based and non-cloud-based data by a data intake and query system
CN110287338B (en) Industry hot spot determination method, device, equipment and medium
CN108512726A (en) A kind of method and apparatus of data monitoring
US11836146B1 (en) Storing indexed fields per source type as metadata at the bucket level to facilitate search-time field learning
CN114595363A (en) Business log processing method, system, storage medium and terminal based on lightweight architecture
CN120342857B (en) Link configuration processing method and device for software system
CN110019045A (en) Method and device is landed in log
CN116820874A (en) Enterprise-level big data component and method for monitoring and alarming application
CN120342857A (en) A link configuration processing method and device for a software system
US11720591B1 (en) Virtual metrics
US11714799B1 (en) Automated testing of add-on configurations for searching event data using a late-binding schema
CN116610695A (en) Database session display method and device, computer equipment and storage medium
CN112131215B (en) Bottom-up database information acquisition method and device
CN114519059A (en) Data processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant