[go: up one dir, main page]

CN119938153B - Data processing method, device, equipment and medium - Google Patents

Data processing method, device, equipment and medium

Info

Publication number
CN119938153B
CN119938153B CN202411997123.7A CN202411997123A CN119938153B CN 119938153 B CN119938153 B CN 119938153B CN 202411997123 A CN202411997123 A CN 202411997123A CN 119938153 B CN119938153 B CN 119938153B
Authority
CN
China
Prior art keywords
agent
inspection
checking
text
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411997123.7A
Other languages
Chinese (zh)
Other versions
CN119938153A (en
Inventor
王宇桐
常远
时晓厚
宋雅奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Original Assignee
China Telecom Technology Innovation Center
China Telecom Corp Ltd
Filing date
Publication date
Application filed by China Telecom Technology Innovation Center, China Telecom Corp Ltd filed Critical China Telecom Technology Innovation Center
Priority to CN202411997123.7A priority Critical patent/CN119938153B/en
Publication of CN119938153A publication Critical patent/CN119938153A/en
Application granted granted Critical
Publication of CN119938153B publication Critical patent/CN119938153B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The embodiment of the application discloses a data processing method, a device, equipment and a medium. Inputting a file to be inspected into an inspection agent group, wherein the inspection agent group comprises a master agent and a functional agent, the functional agent comprises a text whole inspection agent and a text block inspection agent, then, performing global inspection on the text in the file to be inspected through the text whole inspection agent to obtain a first inspection result, performing block division on the text in the file to be inspected through the text block inspection agent according to functions to obtain a plurality of functional text blocks, performing local inspection on the plurality of functional text blocks to obtain a second inspection result, and then, generating a target inspection result of the file to be inspected through the master agent based on the first inspection result and the second inspection result. The technical scheme of the application improves the reliability of inspection and ensures the reliability of data processing in an application operation and maintenance management scene.

Description

Data processing method, device, equipment and medium
Technical Field
The present application relates to the field of computer technology, and in particular, to a data processing method, a data processing apparatus, an electronic device, and a computer readable medium.
Background
Currently, in an application operation and maintenance management scenario, inspection of various related files is generally involved, so that corresponding operation and maintenance management decisions can be performed according to inspection results. In the related art, various related files are usually checked manually, but the efficiency and the accuracy of manual checking are low.
Therefore, how to improve the reliability of the inspection to ensure the reliability of the data processing in the application operation and maintenance management scenario is a problem to be solved.
Disclosure of Invention
The data processing method, the device, the equipment and the medium provided by the embodiment of the application have the advantages that the checking reliability is improved, and the data processing reliability in the application operation and maintenance management scene is ensured.
According to the method, a file to be inspected is input into an inspection agent group, the inspection agent group comprises a master agent and a function agent, the function agent comprises a text whole inspection agent and a text block inspection agent, the text in the file to be inspected is subjected to global inspection through the text whole inspection agent to obtain a first inspection result, the text in the file to be inspected is subjected to block division according to functions through the text block inspection agent to obtain a plurality of function text blocks, the plurality of function text blocks are subjected to local inspection to obtain a second inspection result, and a target inspection result of the file to be inspected is generated through the master agent based on the first inspection result and the second inspection result.
In a second aspect, an embodiment of the present application provides a data processing apparatus, where the apparatus includes an input module configured to input a file to be inspected into an inspection agent group, where the inspection agent group includes a master agent and a functional agent, and the functional agent includes a text overall inspection agent and a text block inspection agent, an inspection module configured to perform a global inspection on a text in the file to be inspected through the text overall inspection agent to obtain a first inspection result, and perform a functional block on the text in the file to be inspected through the text block inspection agent to obtain a plurality of functional text blocks, and perform a local inspection on the plurality of functional text blocks to obtain a second inspection result, and a generation module configured to generate a target inspection result of the file to be inspected through the master agent based on the first inspection result and the second inspection result.
In one embodiment of the application, based on the foregoing scheme, the input module is specifically configured to obtain a type corresponding to the file to be inspected, select a target inspection agent group matching the type from a plurality of inspection agent groups, and input the file to be inspected into the target inspection agent group.
In one embodiment of the application, based on the foregoing scheme, the apparatus further includes a creation module configured to create an inspection agent group for inspecting the file of the pre-operation and maintenance resource allocation type, create an inspection agent group for inspecting the file of the mid-operation and maintenance service deployment type, and create an inspection agent group for inspecting the file of the post-operation and maintenance service log type.
In one embodiment of the application, based on the above scheme, the checking module is specifically configured to check the relationships among the plurality of functional text blocks to obtain a text block relationship checking result, check texts in each functional text block to obtain a text block checking result corresponding to each functional text block, and integrate the text block relationship checking result and the text block checking result corresponding to each functional text block to generate the second checking result.
In one embodiment of the application, based on the scheme, the checking module is further specifically configured to generate checking tasks corresponding to the plurality of functional text blocks respectively, and execute the checking tasks corresponding to the plurality of functional text blocks respectively in parallel to realize parallel checking of texts in the plurality of functional text blocks.
In one embodiment of the present application, based on the foregoing solution, the generating module is specifically configured to integrate, by the master agent, the first inspection result and the second inspection result to generate an integrated result, and analyze the integrated result to generate a target inspection result of the document to be inspected;
In one embodiment of the application, based on the scheme, the device further comprises a management module configured to output the target inspection result and perform operation and maintenance management based on the target inspection result.
In one embodiment of the application, based on the foregoing scheme, the management module is specifically configured to execute a resource configuration operation if the file to be checked is a resource configuration type and the target checking result characterizes the checking pass, execute a service deployment operation if the file to be checked is a service deployment type and the target checking result characterizes the checking pass, and generate script file modification information based on the target checking result if the file to be checked is a service running log type, where the script file modification information is used for providing a modification suggestion for the script file.
In a third aspect, an embodiment of the present application provides an electronic device comprising one or more processors, a memory for storing one or more computer programs, which when executed by the one or more processors, cause the electronic device to implement a data processing method as described above.
In a fourth aspect, embodiments of the present application provide a computer readable medium having stored thereon a computer program which, when executed by a processor, implements a data processing method as described above.
In a fifth aspect, embodiments of the present application provide a computer program product comprising computer instructions which, when executed by a processor, implement a data processing method as described above.
According to the technical scheme provided by the embodiment of the application, the inspection of the file is realized by means of the inspection intelligent agent group, so that the phenomenon that the efficiency and the accuracy of the inspection are low due to the manual inspection is avoided, the reliability of the inspection is improved, and the reliability of data processing in an application operation and maintenance management scene is ensured; and the checking agent group comprises a leading agent and a functional agent, wherein the integrity checking of the file is realized through the text integral checking agent in the functional agent, the context linkage of the file is more intimate, the locality checking of the file is realized through the text block checking agent in the functional agent, the fine granularity is higher, and the integrity checking result and the locality checking result are integrated through the leading agent, so that the checking reliability is comprehensively improved, and the reliability of data processing in an application operation and maintenance management scene is further ensured.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
FIG. 1 is a schematic diagram of an exemplary implementation environment in which the techniques of embodiments of the present application may be applied.
FIG. 2 is a flow chart of a data processing method according to an exemplary embodiment of the application.
FIG. 3 is a schematic diagram of a data processing system shown in accordance with an exemplary embodiment of the present application.
Fig. 4 is a schematic diagram of an inspection agent group, shown in accordance with an exemplary embodiment of the present application.
Fig. 5 is a flow chart of a data processing method shown in another exemplary embodiment of the application.
Fig. 6 is a flowchart illustrating a data processing method according to another exemplary embodiment of the present application.
Fig. 7 is a block diagram of a data processing apparatus according to an exemplary embodiment of the present application.
Fig. 8 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations identical to the present application. Rather, they are merely examples of apparatus and methods that are identical to some aspects of the present application as detailed in the appended claims.
In the present embodiment, the term "module" or "unit" refers to a computer program or a part of a computer program having a predetermined function and working together with other relevant parts to achieve a predetermined object, and may be implemented in whole or in part by using software, hardware (such as a processing circuit or a memory), or a combination thereof. Also, a processor (or multiple processors or memories) may be used to implement one or more modules or units. Furthermore, each module or unit may be part of an overall module or unit that incorporates the functionality of the module or unit.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
In the present application, the term "plurality" means two or more. "and/or" describes the association relationship of the association object, and indicates that there may be three relationships, for example, a and/or B may indicate that there are three cases of a alone, a and B together, and B alone. The character "/" generally indicates that the context-dependent object is an "or" relationship.
Currently, in an application operation and maintenance management scenario, inspection of various related files is generally involved, so that corresponding operation and maintenance management decisions can be performed according to inspection results. In the related art, various related files are usually checked manually, but the efficiency and the accuracy of manual checking are low.
Therefore, in order to improve the checking reliability and ensure the reliability of data processing in the application operation and maintenance management scene, the application provides a data processing scheme. Referring to fig. 1, fig. 1 is a schematic diagram of an implementation environment according to the present application. The implementation environment mainly comprises a terminal device 101 and a server 102, wherein:
The terminal device 101 includes, but is not limited to, an augmented reality device (virtual reality device, augmented reality device, mixed reality device, etc.), a mobile phone, a computer (tablet computer, notebook computer, desktop computer, etc.), a smart home device (television, refrigerator, air conditioner, washing machine, sweeping robot, etc.), a smart wearable device (bracelet, watch, etc.), and the like.
The server 102 may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers, where the server cluster or the distributed system includes a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, a content delivery network (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms, and the like.
It will be appreciated that the communication connection is established between the terminal device 101 and the server 102 via a wired or wireless network. The wireless network or wired network illustratively uses standard communication techniques and/or protocols. The network is typically the Internet, but may be any other network including, but not limited to, a local area network (Local Area Network, LAN), metropolitan area network (Metropolitan Area Network, MAN), wide area network (Wide Area Network, WAN), a mobile, wired or wireless network, a private network, or any combination of virtual private networks, etc.
In one embodiment of the present application, the data processing method may be executed by the server 102, specifically, the server 102 inputs the file to be inspected into an inspection agent group, the inspection agent group includes a master agent and a functional agent, the functional agent includes a text overall inspection agent and a text block inspection agent, then the text in the file to be inspected is globally inspected through the text overall inspection agent to obtain a first inspection result, and the text in the file to be inspected is blocked according to the function through the text block inspection agent to obtain a plurality of functional text blocks, and the plurality of functional text blocks are locally inspected to obtain a second inspection result, and then a target inspection result of the file to be inspected is generated based on the first inspection result and the second inspection result through the master agent.
In other embodiments of the present application, the data processing method may be performed by the terminal device 101 alone, or performed by the terminal device 101 and the server 102 together, and in practical applications, the execution body of the data processing method may be flexibly adjusted according to a specific application scenario.
It should be clear that the number of terminal devices 101 and servers 102 in fig. 1 is only illustrative and that any number of terminal devices 101 and servers 102 may be provided according to actual needs.
According to the embodiment of the application, the file is inspected by means of the inspection intelligent agent group, so that the phenomenon that the efficiency and the accuracy of the inspection are low due to manual inspection is avoided, the reliability of the inspection is improved, and the reliability of data processing in an application operation and maintenance management scene is ensured; and the checking agent group comprises a leading agent and a functional agent, wherein the integrity checking of the file is realized through the text integral checking agent in the functional agent, the context linkage of the file is more intimate, the locality checking of the file is realized through the text block checking agent in the functional agent, the fine granularity is higher, and the integrity checking result and the locality checking result are integrated through the leading agent, so that the checking reliability is comprehensively improved, and the reliability of data processing in an application operation and maintenance management scene is further ensured.
Various implementation details of the technical solution of the embodiment of the present application are set forth in detail below:
referring to fig. 2, fig. 2 is a flowchart illustrating a data processing method according to an embodiment of the application.
As shown in fig. 2, the data processing method at least includes S201 to S203, which are described in detail as follows:
s201, inputting a file to be inspected into an inspection agent group, wherein the inspection agent group comprises a leading agent and a functional agent, and the functional agent comprises a text integral inspection agent and a text block inspection agent.
In the embodiment of the application, the file to be checked refers to the file to be checked. It can be understood that in the application operation and maintenance management scenario, the whole stage can be divided into an operation and maintenance management early stage, an operation and maintenance management middle stage and an operation and maintenance management later stage, wherein the file to be checked can be the file involved in any stage. For example, the earlier stage of operation and maintenance management is most likely to relate to a resource configuration class file, the middle stage of operation and maintenance management is most likely to relate to a service deployment class file, and the later stage of operation and maintenance management is most likely to relate to a service running log class file, etc., alternatively, the file to be checked can be at least one of a resource configuration class file, a service deployment class file, a service running log class file, etc.
In the embodiment of the application, the checking agent group is an agent group for checking a file to be checked, wherein the agent group comprises a master agent and a functional agent, the functional agent comprises a text whole checking agent and a text block checking agent, the text whole checking agent is an agent for checking texts to realize text whole checking (also called global checking, long text checking and the like), the text block checking agent is an agent for checking a plurality of functional text blocks after the texts are blocked according to functions to realize text partial checking (also called local checking, block checking and the like), and the master agent is an agent for integrating the checking result of the text whole checking agent and the checking result of the text block checking agent to obtain a final checking result.
It will be appreciated that agents (agents) are an important concept in artificial intelligence (ARTIFICIAL INTELLIGENCE, AI) and computer science, which refers to autonomous systems that achieve a certain goal in a certain environment by sensing and acting, that agents have three parts of sensing (persistence), reasoning (Reasoning) and acting (Action) so that decisions can be made based on their perceived environmental information and influence or change the environment by some Action, not just a passive tool, but an active and adaptive tool whose design goal is to mimic some intelligent behavior of humans or animals to achieve more efficient, intelligent operation, and which typically have large language model (Large Language Model, LLM) capabilities.
In one embodiment of the present application, before the process of inputting the file to be inspected into the inspection agent group in S201, it may further include creating an inspection agent group for inspecting the file of the pre-operation and maintenance resource allocation type, creating an inspection agent group for inspecting the file of the mid-operation and maintenance service deployment type, and creating an inspection agent group for inspecting the file of the post-operation and maintenance service operation log type.
That is, in an alternative embodiment, an inspection agent group for inspecting a resource configuration class file is created when the resource configuration class file is related to the early stage of operation and maintenance management, an inspection agent group for inspecting a service deployment class file is created when the service deployment class file is related to the middle stage of operation and maintenance management, and an inspection agent group for inspecting a service operation log class file is created when the service operation log class file is related to the later stage of operation and maintenance management.
For ease of understanding, please refer to table 1, which is an example of multiple audit agent sets.
Resource configuration class file Checking agent group A
Service deployment class files Checking agent group B
Service operation log class file Checking agent group C
TABLE 1
By implementing the alternative embodiment, the corresponding checking agent group is independently established for each stage of operation and maintenance management, so that the checking agent group is more targeted, has high independence, and is convenient for later maintenance and the like.
It can be understood that in the alternative embodiment, only the most representative file of each stage of operation and maintenance management is taken as an example, in practical application, the files required to be checked in each stage of operation and maintenance management can be used as references, and corresponding checking agent groups can be created, and meanwhile, the creation sequence among a plurality of checking agent groups can be arbitrary.
In one embodiment of the present application, the process of inputting the file to be inspected into the inspection agent group in S201 may include obtaining a type corresponding to the file to be inspected, selecting a target inspection agent group matching the type from a plurality of inspection agent groups, and inputting the file to be inspected into the target inspection agent group.
As described in the foregoing embodiments, a plurality of inspection agent groups may be created in advance, where the inspection agent groups are related to the operation and maintenance management stage, and the operation and maintenance management stage usually involves a specific type of file, so that the inspection agent groups substantially correspond to the file types, and thus, in an alternative embodiment, when the file to be inspected exists, the type of the file to be inspected may be acquired first, then a target inspection agent group matching the type of the file to be inspected may be selected from the plurality of inspection agent groups, and then the file to be inspected may be input into the target inspection agent group for inspection.
In the alternative embodiment, the target checking agent group refers to a checking agent group matched with the type of the file to be checked in the plurality of checking agent groups. For example, in the foregoing table 1, the file to be inspected is set as the resource allocation file, the inspection agent group a is the target inspection agent group at this time, and then the file to be inspected is input into the inspection agent group a for inspection, the file to be inspected is set as the service deployment file, the inspection agent group B is the target inspection agent group at this time, and then the file to be inspected is input into the inspection agent group B for inspection, the file to be inspected is set as the service operation log file, and the inspection agent group C is the target inspection agent group at this time, and then the file to be inspected is input into the service operation log file for inspection.
Thus, by implementing the alternative embodiment, the target inspection agent group can be simply and accurately obtained, so that the inspection of the document to be inspected can be simply and accurately realized.
S202, performing global inspection on the text in the file to be inspected through the text integral inspection agent to obtain a first inspection result, performing functional partitioning on the text in the file to be inspected through the text partitioning inspection agent to obtain a plurality of functional text blocks, and performing local inspection on the functional text blocks to obtain a second inspection result.
In the embodiment of the application, the file to be inspected is input into the inspection agent group, and the text in the file to be inspected is subjected to global inspection by the text integral inspection agent, so that a first inspection result is obtained.
It should be clear that the first inspection result refers to the inspection result of the text integrity inspection by the text integrity inspection agent, and the integrity inspection refers to the inspection of all the texts in the document to be inspected by the text integrity inspection agent, that is, the text integrity inspection agent is more prone to semantic understanding based on the text integrity so as to realize the inspection.
In the embodiment of the application, the file to be inspected is input into the inspection agent group, the text in the file to be inspected is segmented according to the function by the text segmentation inspection agent, a plurality of functional text blocks are obtained, and the plurality of functional text blocks are locally inspected, so that a second inspection result is obtained.
It should be clear that the second inspection result refers to an inspection result of the text segmentation inspection agent outputting a partial inspection for the text, and the partial inspection refers to that the text segmentation inspection agent performs segmentation processing on the text in the file to be inspected and inspects a plurality of functional text blocks after the segmentation processing, that is, the text parts (i.e., the functional text blocks) are more prone to semantic understanding based on the text parts so as to realize the inspection.
For easy understanding of the overall and partial inspection, for example, the text of the document to be inspected includes 1000 paragraphs, wherein the text overall inspection agent inspects the 1000 paragraphs, and simultaneously, paragraphs 0-99 correspond to functional text blocks 1, paragraphs 100-699 correspond to functional text blocks 2, and paragraphs 700-999 correspond to functional text blocks 3, and accordingly, the text block inspection agent can obtain the 3 functional text blocks of the functional text blocks 1, 2 and 3 functional text blocks of the functional text blocks 3, and then inspect the 3 functional text blocks.
In one embodiment of the present application, the step S202 of locally inspecting the plurality of functional text blocks to obtain a second inspection result may include inspecting a relationship between the plurality of functional text blocks to obtain a text block relationship inspection result, inspecting a text in each functional text block to obtain a text block inspection result corresponding to each functional text block, and integrating the text block relationship inspection result and the text block inspection result corresponding to each functional text block to generate the second inspection result.
That is, in an alternative embodiment, one aspect of the text block checking agent checks the relationships among the plurality of functional text blocks to obtain a text block relationship checking result, and another aspect of the text block checking agent checks the text in each functional text block to obtain a text block checking result corresponding to each functional text block, and further integrates the text block relationship checking result and the text block checking result corresponding to each functional text block to obtain a second checking result.
Wherein, the text block checking agent can be a plurality of in alternative embodiments, wherein there can be text block checking agent dedicated to checking the relation among a plurality of functional text blocks, and text block checking agent dedicated to checking the text in each functional text block, in practical application, the number of the text block checking agent can be flexibly adjusted.
Therefore, by implementing the alternative embodiment, whether the problems of conflict, contradiction and the like exist among the functional text blocks can be determined by checking the association relation among the functional text blocks, and meanwhile, the texts in each functional text block can be checked more accurately, so that the check granularity is smaller, and the check accuracy is improved.
In one embodiment of the application, the process of checking the text in each functional text block to obtain the text block checking result corresponding to each functional text block can comprise the steps of generating checking tasks corresponding to a plurality of functional text blocks respectively, and executing the checking tasks corresponding to the functional text blocks respectively in parallel to realize the parallel checking of the text in the functional text blocks.
That is, in the alternative embodiment, when the text block checking agent checks the text in each functional text block, the checking task corresponding to each functional text block may be generated first, that is, a plurality of checking tasks are obtained, and then the plurality of checking tasks are executed in parallel, so that the parallel checking of the text in the plurality of functional text blocks is realized through the plurality of checking tasks executed in parallel.
By implementing the alternative embodiment, the parallel checking of the texts in the plurality of functional text blocks is realized, and the checking efficiency is improved.
In one embodiment of the present application, if the file to be checked is a resource configuration type file, the text in the file to be checked may be globally checked/compared/verified by the text whole checking agent based on the resource configuration standard file, so as to obtain a first checking result, and meanwhile, the text in the file to be checked may be segmented according to functions by the text segmentation checking agent based on the resource configuration standard file, so as to obtain a plurality of functional text blocks, and the plurality of functional text blocks may be locally checked/compared/verified, so as to obtain a second checking result.
In one embodiment of the application, if the file to be checked is a service deployment type file, the text in the file to be checked can be globally checked/compared/verified by a text integral checking agent based on a service deployment standard file to obtain a first checking result, meanwhile, the text in the file to be checked can be segmented according to functions by a text segmentation checking agent based on the service deployment standard file to obtain a plurality of functional text blocks, and the plurality of functional text blocks are locally checked/compared/verified to obtain a second checking result, wherein the service deployment standard file can be a manual type file, and the manual comprises at least one of a service deployment instruction manual, an obstacle removing manual and the like.
In one embodiment of the present application, if the file to be checked is a service running log file, global analysis may be performed on the text in the file to be checked by the text whole checking agent, so as to obtain a first checking result, and meanwhile, the text in the file to be checked may be blocked by the text block checking agent according to functions, so as to obtain a plurality of functional text blocks, and local analysis may be performed on the plurality of functional text blocks, so as to obtain a second checking result.
S203, generating a target inspection result of the file to be inspected based on the first inspection result and the second inspection result by the master agent.
In the embodiment of the application, the first inspection result is obtained by integrally inspecting the intelligent agent through the text, the second inspection result is obtained by inspecting the intelligent agent through the text in blocks, and then the target inspection result of the file to be inspected can be generated by the master intelligent agent based on the first inspection result and the second inspection result.
The target inspection result in the embodiment of the application refers to an inspection result integrating the integrity inspection result and the locality inspection result outputted by the main intelligent agent.
In one embodiment of the present application, the process of generating the target inspection result of the document to be inspected based on the first inspection result and the second inspection result by the master agent in S203 may include integrating the first inspection result and the second inspection result by the master agent, generating an integrated result, and analyzing the integrated result to generate the target inspection result of the document to be inspected.
That is, in an alternative embodiment, the primary agent integrates the first inspection result and the second inspection result, generates an integrated result, and analyzes the integrated result to generate the target inspection result.
In the alternative embodiment, the master agent can continuously adjust and check the cooperation mode among the agents in the agent group, so as to improve the adaptability of the check, etc.
Thus by implementing alternative embodiments, more accurate target inspection results can be generated based on analysis of the integrated results.
In one embodiment of the present application, after the process of generating the target inspection result of the document to be inspected based on the first inspection result and the second inspection result by the master agent in S203, it may further include outputting the target inspection result and performing operation and maintenance management based on the target inspection result.
That is, in an alternative embodiment, the target inspection result generated by the main agent may be in a report form, and the target inspection result in the report form is displayed or sent to the designated device, so that the inspection condition of the file to be inspected can be clarified by checking the target inspection result in the report form, thereby performing corresponding operation and maintenance management, such as troubleshooting, performance tuning, security reinforcement, and the like.
By implementing the alternative embodiment, the efficiency and the accuracy of the target inspection result generation are higher, so that the efficiency and the accuracy of operation management are improved, namely the reliability of operation management is high, and meanwhile, the operation management related staff bring convenience.
In one embodiment of the application, the operation and maintenance management process based on the target inspection result can comprise the steps of executing resource configuration operation if the file to be inspected is of a resource configuration type and the target inspection result represents that the inspection is passed, executing service deployment operation if the file to be inspected is of a service deployment type and the target inspection result represents that the inspection is passed, and generating script file modification information based on the target inspection result if the file to be inspected is of a service running log type, wherein the script file modification information is used for providing modification suggestions for the script file.
In an alternative embodiment, if the file to be checked is a resource configuration file and the target checking result indicates that the checking is passed, the resource configuration operation may be executed at this time, if the file to be checked is a service deployment type and the target checking result indicates that the checking is passed, the service deployment operation may be executed at this time, and if the file to be checked is a service running log file, script file modification information may be generated based on the target checking result at this time, where the script file modification information is used to provide a modification suggestion for the script file.
In this way, by implementing the alternative embodiment, after the target inspection result is that the inspection is passed, the operation and maintenance management operation with the matched file types to be inspected is executed, so that the accuracy of executing the corresponding operation and maintenance management operation is improved, and the reliability of operation and management is improved.
According to the embodiment of the application, the file is inspected by means of the inspection intelligent agent group, so that the phenomenon that the efficiency and the accuracy of the inspection are low due to manual inspection is avoided, the reliability of the inspection is improved, and the reliability of data processing in an application operation and maintenance management scene is ensured; and the checking agent group comprises a leading agent and a functional agent, wherein the integrity checking of the file is realized through the text integral checking agent in the functional agent, the context linkage of the file is more intimate, the locality checking of the file is realized through the text block checking agent in the functional agent, the fine granularity is higher, and the integrity checking result and the locality checking result are integrated through the leading agent, so that the checking reliability is comprehensively improved, and the reliability of data processing in an application operation and maintenance management scene is further ensured.
The following describes the specific scenario of the embodiment of the present application in detail:
Referring now to FIG. 3, FIG. 3 is a diagram illustrating a data processing system according to one embodiment of the present application. As shown in fig. 3, the data processing system is used for performing operation and maintenance management, and is also called an intelligent operation and maintenance management system, and mainly comprises an operation and maintenance portal layer, an operation and maintenance scene layer, an automation engine layer and an operation and maintenance object layer, wherein:
The operation portal layer is an entrance module of the intelligent operation management system and provides a unified interaction interface and operation entrance for operation staff. The layer is mainly responsible for providing operation and maintenance states, task progress, abnormal alarm information and the like to the outside, supporting multi-user role management and authority control, providing Key Performance Indexes (KPIs) for monitoring operation and maintenance environments in real time, enabling operation and maintenance personnel to perform corresponding operations through an operation and maintenance portal layer, including but not limited to business monitoring, resource monitoring, log auditing, fault recovery, safety protection and the like, and enabling an operation and maintenance scene-oriented layer to open capabilities of intelligent agent collaborative design, prompt word management, workflow management and the like so as to adapt to different operation and maintenance management requirements.
The operation and maintenance scene layer is a scene implementation of intelligent operation and maintenance management and mainly comprises resource configuration auditing, service instruction auditing, production log analysis and the like, and is driven by a predefined template or custom configuration to support the scheduling and execution of diversified operation and maintenance management tasks.
Optionally, resource configuration auditing is primarily responsible for auditing various resource configurations in a cloud environment to ensure that the resource configurations can meet best practices, enterprise security standards, compliance requirements, etc., including, but not limited to, virtual private cloud (Virtual Private Cloud, VPC) configuration auditing (e.g., checking whether public and private subnets are properly partitioned for subnet configuration (Subnets), to ensure that the subnet's Internet protocol (Internet Protocol, IP) address range is reasonable and no conflict occurs, checking whether routing rules meet network communication requirements for routing Tables (Route Tables), especially involving external Internet access, Access between VPCs, VPN connections, etc., checking whether network access control policies and Security Group rules are reasonable for a network access control list (Network Access Control List, ACL) and Security Group (Security Group) to avoid exposing unnecessary ports and services, checking whether connections across VPCs are properly configured for a VPC peer-to-peer connection (VPC PEERING) and transport gateway (TRANSIT GATEWAY) to ensure that no unsafe access or unnecessary resource sharing occurs, checking whether external access is properly restricted for a network address translation gateway (NAT GATEWAY)/internet gateway (INTERNET GATEWAY), and ensuring that necessary access paths are properly configured, etc.), a network access control policy and Security Group rules are checked for a network access control list (Network Access Control List, ACL) and Security Group (Security Group) to avoid exposing unnecessary ports and services, a network access control policy and Security Group policy is checked for a Security Group (Security Group) and Security Group policy, and Security Group policy is checked for a Security access policy, The simple storage service (Simple Storage Service, S3) configures auditing (e.g., checking the authority settings of the storage buckets for Bucket (Bucket) rights to ensure that there are no unnecessary public read-write rights, avoiding leakage of sensitive data, checking whether versioning is enabled for preventing data loss or misdeletion, version control (Versioning), encryption (Encryption) to ensure that object data in the Bucket enables an Encryption mechanism (e.g., SSE-S3 or SSE-KMS) to prevent data leakage, lifecycle policy (LIFECYCLE POLICIES) checking whether a data lifecycle management policy is reasonably configured to ensure that unused data is properly archived or deleted to optimize storage costs, access log (Access Logs) checking whether access log is open for monitoring and auditing data access activities, etc.), security policy (management policy) and the like, Elastic computing cloud (Elastic Compute Cloud, EC 2) configuration auditing (e.g., checking whether selected instance types meet workload requirements for instance types to ensure that there are no excessive or insufficient resource configurations, checking security group rules for security group rules to ensure that there are no unnecessary open ports or too loose access rights, checking whether the used image is an authorized, compliant image for Amazon MACHINE IMAGE, AMI, and whether there are regularly updated operating system and application patches for Amazon machine images), checking root and additional volume configurations for elastic block (Elastic Block Store, EBS) configurations to ensure that storage is reasonably allocated, and taking care of storage encryption, Backup and the like, checking whether the configuration of an automatic expansion strategy is reasonable for automatic expansion (Auto Scaling) to ensure that the number of instances can be automatically adjusted when the load changes, and the like), and auditing the node images (such as verifying whether the used images are from a trusted source and have regular updating and security patches for image sources, checking whether the version of an operating system in the images is up-to-date and meets the security and compliance requirements of enterprises for operating system versions, checking software packages and services installed in the images for software and service configuration to ensure that only necessary software is contained in the images, reducing the risk of security vulnerabilities, ensuring that configuration automation scripts in the images are correct for automatic configuration to avoid errors caused by manual configuration, and ensuring that the images meet the compliance requirements of industries for compliance and security references (such as CIS references), ISO 27001, etc.), and the like.
Optionally, service deployment (also called service instructions) auditing is mainly responsible for auditing and checking the configuration and operation of IT services to ensure compliance with predetermined standards, policies, compliance requirements, etc., including but not limited to version control (e.g., by using version control (e.g., git), can check change records of codes, configuration files, service instructions, etc., ensure no non-compliant modifications or omissions during development and operation and maintenance, etc.), software deployment (e.g., by CI/CD pipelining tools (e.g., jenkins, gitLab CI, etc.), ensure that all steps such as configuration file modifications, environment variable settings, dependency installation, etc., are recorded, and comply with established deployment policies), k8s service creation (e.g., check whether service definitions comply with specifications, whether resource configurations are reasonable, service exposure mode complies with security requirements, and network policy is proper, etc.), dependency management (e.g., check whether all dependency terms have explicit version numbers for dependency version control, avoid incompatible or outdated dependencies; checking whether external dependencies have known security vulnerabilities for security audit to ensure that the used libraries and frameworks are secure and updated, verifying whether dependency management policies meet organizational compliance requirements for compliance checking, avoiding use of unauthorized or non-policy-compliant dependencies, ensuring that base images used in container images and their dependencies are up-to-date and trusted, etc. for containerized services for containerized and environment consistency), etc.
Optionally, service operation logs (also called production logs) are analyzed and mainly responsible for collecting, analyzing and monitoring various logs generated in the production environment to help operation staff find problems, optimize performance, ensure stable operation of the system and the like in time, including but not limited to Yun Jiedian logs (for example, when a cloud node is abnormal or fails, the problem can be rapidly located by analyzing the node logs to find the root cause of the failure, and/or by analyzing the operation logs of the cloud node, the use condition of resources (for example, a central processing unit (Central Processing Unit, CPU), a memory, a disk and the like) of the monitoring node can be further found to further find performance bottlenecks or overload conditions, and/or by analyzing information (for example, log in records, access logs and the like) related to safety to help find potential safety problems or malicious activities and the like), resource monitoring (for example, by continuously monitoring the use condition of the resources, timely finding overload (for example, the CPU occupancy is too high) or insufficient (for example, memory leakage) of the resources and taking measures to optimize or expand the capacity, and/or by historical resource data analysis can predict future resource requirements, help capacity and optimization, and/or automatic performance of the resources can be automatically predicted by team, and/or automatic performance of the user performance of the system is triggered by the error log is triggered or the abnormal operation performance of the user is triggered (such as a user has a normal operation is scheduled or has a normal performance or has a threshold or a normal performance or is triggered, the method can provide valuable feedback for product optimization and user experience improvement, and/or check business layer anomalies (such as abnormal call frequency of a certain interface, excessive failure rate of a certain transaction), etc., load equalizer (LB) monitoring (such as logging flow distribution, analyzing the logs can help to know how flow is distributed among different service instances, whether flow inclination or uneven distribution exists, and/or periodically carrying out health check on back-end service instances, analyzing health check logs can help to find that certain instances are unavailable or overloaded, and/or monitoring indexes such as response time, error rate, etc. of the Load equalizer can judge whether performance bottlenecks, service overtime, etc., and/or logging flow entry points, analyzing the logs can check whether abnormal flow modes, potential attack behaviors, etc.), etc.
It should be clear that, for resource configuration auditing, service instruction auditing, and production log analysis, corresponding inspection agent groups may be used, where the inspection agent groups include a master agent (i.e., a master agent) and a functional agent, and the functional agent includes a text whole inspection agent (i.e., a long text agent) and a text block inspection agent (i.e., a block agent), and specific inspection processes are not described herein. Meanwhile, the checking agent group has LLM capabilities (including but not limited to natural Language understanding capabilities, language generating capabilities, reasoning capabilities, etc.), and optionally, the checking agent group includes at least one of a Language big Model (Language Model), a multi-modal big Model (Multimodal Large Models), etc.
For ease of understanding, please refer to fig. 4. As shown in fig. 4, on the basis of LLM capability, the long text agent realizes long text inspection based on the knowledge base engine to obtain an analysis conclusion, and meanwhile, the partitioned agents (including a plurality of partitioned agents, such as partitioned agent1, partitioned agent2, and partitioned agent 3) perform partitioned search based on the knowledge base engine to realize partitioned inspection to obtain an analysis conclusion, and then the dominant agent integrates the analysis conclusion of the long text agent and the analysis conclusion of the partitioned agents to obtain a final analysis conclusion.
The automation engine layer is mainly responsible for managing the execution between the output of the operation and maintenance scene layer and the operation and maintenance object, has the capabilities of flow job scheduling, parameter management, script execution and the like, and mainly comprises a configuration engine, a flow job scheduling engine and a knowledge base engine. Optionally, the configuration engine mainly comprises script/command, parameter management, object targets and the like, the flow job scheduling engine mainly comprises an execution engine and related protocols (such as Secure Shell (SSH), telnet (Telecommunication Network), simple network management protocol (Simple Network Management Protocol, SNMp)) and the like, and the knowledge base engine mainly comprises an operation and maintenance manual, a configuration manual, a cloud product manual, an obstacle avoidance manual and the like.
The operation and maintenance object layer is oriented to bottom layer software and hardware resources, realizes unified access and management of operation and maintenance objects through a standardized interface, supports comprehensive monitoring and operation of cloud components such as VPC (virtual private network), EC2 examples and the like, and K8S services and the like, and mainly comprises various operation and maintenance targets such as an operating system, a database, middleware, an application, a cloud platform, a network and the like.
Referring to fig. 5 based on the system shown in fig. 3, fig. 5 is a flowchart of a data processing method according to an embodiment of the present application. As shown in fig. 5, the data processing method at least includes S501 to S506, which are described in detail as follows:
S501, inputting the resource configuration script file into a corresponding checking agent group, performing full-text auditing on the resource configuration script file based on a resource configuration standard manual through a long text agent to obtain a first auditing result, performing block auditing on the resource configuration script file based on the resource configuration standard manual through a block agent to obtain a second auditing result, and integrating the first auditing result and the second auditing result through a master agent to obtain a final auditing result.
S502, if the final auditing result of the resource configuration script file represents that auditing passes, executing the resource configuration operation.
S503, inputting the service instruction script file into a corresponding checking agent group, performing full-text auditing on the service instruction script file based on a service instruction standard manual through a long text agent to obtain a first auditing result, performing block auditing on the service instruction script file based on the service instruction standard manual through a block agent to obtain a second auditing result, and integrating the first auditing result and the second auditing result through a leading agent to obtain a final auditing result.
S504, if the final auditing result of the service instruction script file represents that the auditing is passed, executing service deployment operation.
S505, inputting the production log files into the corresponding checking agent groups, performing full-text analysis on the production log files through a long text agent to obtain a first analysis result, performing block analysis on the production log files through a block agent based on a production log standard manual to obtain a second analysis result, and integrating the first analysis result and the second analysis result through a master agent to obtain a final analysis result.
S506, generating a log analysis report based on the final analysis result of the production log class file for operation and maintenance optimization.
For ease of understanding, please refer to fig. 6, wherein:
1, for the operation and maintenance management earlier stage:
firstly, starting the system, and then carrying out initialization setting on the system to ensure that all components are in a correct working state.
1.1, Receiving a resource configuration request, and acquiring a resource configuration class script file based on the resource configuration request.
1.2, Auditing the resource configuration script file.
The method comprises the steps of enabling a long text agent group to audit the whole text of a resource configuration script file, namely using the long text agent to comprehensively check instructions in the resource configuration script file and feed back an audit result, enabling a block agent group to audit instruction blocks, namely using the block agent to check the instruction blocks in the resource configuration script file one by one and feed back the audit result, enabling a leading agent to output an audit conclusion, namely using the leading agent to integrate the audit result of the long text agent and the audit result of the block agent, and generating a final audit result.
And 1.3, judging whether the configuration is compliant, if so, executing 1.4, and if not, returning to 1.1 to modify the resource configuration script file.
And 1.4, carrying out resource allocation.
2, Aiming at the mid-term of operation and maintenance management:
2.1, receiving a service deployment request, and acquiring a service instruction script-like file based on the service deployment request.
And 2.2, auditing the service instruction script file.
The method comprises the steps of enabling a long text agent group to audit a service instruction script file, namely using the long text agent to comprehensively check instructions in the service instruction script file and feed back an audit result, enabling a block agent group to audit instruction blocks, namely using the block agent to check the instruction blocks in the service instruction script file one by one and feed back the audit result, enabling a leading agent to output an audit conclusion, namely using the leading agent to integrate the audit result of the long text agent and the audit result of the block agent, and generating a final audit result.
And 2.3, judging whether the configuration is compliant, if so, executing 2.4, and if not, returning to 2.1 to modify the service instruction script file.
And 2.4, performing service deployment.
Up to this point, the service is formally put into operation.
3, Aiming at the later operation and maintenance management period:
And 3.1, receiving a log analysis request and acquiring a production log class file based on the log analysis request.
And 3.2, analyzing the production log type file.
The method comprises the steps of analyzing the whole text of a production log file by a long text agent group, namely using the long text agent to comprehensively check instructions in the production log file and feed back analysis results, analyzing instruction blocks by a block agent group, namely using the block agent to check the instruction blocks in the production log file one by one and feed back analysis results, and then outputting an analysis conclusion by a leading agent, namely using the leading agent to synthesize the analysis results of the long text agent and the analysis results of the block agent, and generating final analysis results.
And 3.3, judging whether an abnormality exists, if so, executing 3.4, and if not, returning to 3.1.
And 3.4, outputting an abnormality report so as to improve, optimize and the like the abnormality.
So far, after all the processes are completed, the system finishes running.
The technical scheme provided by the embodiment of the application has at least the following beneficial effects:
the layered system architecture is adopted, so that the specific division of responsibilities of different layers is realized, the high modularization of functions is promoted, the system has better maintainability and expansibility, the processing efficiency and the response speed are improved, and the life cycle management of the system is more efficient due to the cooperation among the layers.
The system introduces a mechanism for the cooperative work of a leading intelligent agent and a functional intelligent agent, can process a long text auditing task and a block auditing task, and performs final comprehensive analysis and decision making, thereby improving the intelligent level of an operation and maintenance management system, enhancing the processing capacity for complex operation and maintenance tasks, simultaneously realizing the efficient automatic auditing of resource configuration script files and service instruction script files, ensuring the correctness and safety of resource configuration and service deployment, further realizing the efficient automatic analysis of production log files, ensuring the safety of service operation management, greatly reducing the time cost and error rate of manual auditing/analysis, remarkably improving the efficiency, accuracy, safety, flexibility and the like of operation and maintenance management, and having high reliability of operation and maintenance management.
FIG. 7 is a block diagram of a data processing apparatus according to an embodiment of the present application. As shown in fig. 7, the apparatus includes:
an input module 701 configured to input a file to be inspected into an inspection agent group including a master agent and a functional agent including a text whole inspection agent and a text block inspection agent;
The checking module 702 is configured to perform global checking on the text in the file to be checked through the text integral checking agent to obtain a first checking result, perform functional blocking on the text in the file to be checked through the text blocking checking agent to obtain a plurality of functional text blocks, and perform local checking on the functional text blocks to obtain a second checking result;
A generating module 703 configured to generate, by the master agent, a target inspection result of the document to be inspected based on the first inspection result and the second inspection result.
In one embodiment of the present application, based on the foregoing solution, the input module 701 is specifically configured to obtain a type corresponding to the file to be inspected, select a target inspection agent group matching the type from a plurality of inspection agent groups, and input the file to be inspected into the target inspection agent group.
In one embodiment of the application, based on the foregoing scheme, the apparatus further comprises a creation module configured to create an inspection agent group for inspecting the file of the pre-operation and maintenance management resource allocation type, create an inspection agent group for inspecting the file of the mid-operation and maintenance management service deployment type, and create an inspection agent group for inspecting the file of the post-operation and maintenance management service log type.
In one embodiment of the present application, based on the foregoing solution, the inspection module 702 is specifically configured to inspect the relationships between the plurality of functional text blocks to obtain a text block relationship inspection result, inspect the text in each functional text block to obtain a text block inspection result corresponding to each functional text block, and integrate the text block relationship inspection result and the text block inspection result corresponding to each functional text block to generate the second inspection result.
In one embodiment of the present application, based on the foregoing solution, the inspection module 702 is further specifically configured to generate inspection tasks corresponding to the plurality of functional text blocks, and execute the inspection tasks corresponding to the plurality of functional text blocks in parallel, so as to implement parallel inspection of the text in the plurality of functional text blocks.
In one embodiment of the present application, based on the foregoing solution, the generating module 703 is specifically configured to integrate the first inspection result and the second inspection result through the master agent, generate an integrated result, and analyze the integrated result to generate a target inspection result of the file to be inspected;
in one embodiment of the application, based on the scheme, the device further comprises a management module configured to output the target inspection result and perform operation and maintenance management based on the target inspection result.
In one embodiment of the application, based on the foregoing scheme, the management module is specifically configured to execute a resource configuration operation if the file to be checked is a resource configuration type and the target checking result characterizes the checking pass, execute a service deployment operation if the file to be checked is a service deployment type and the target checking result characterizes the checking pass, and generate script file modification information based on the target checking result if the file to be checked is a service running log type, where the script file modification information is used for providing a modification suggestion for the script file.
It should be noted that the apparatus provided in the foregoing embodiment and the method provided in the foregoing embodiment belong to the same concept, and the specific manner in which the respective modules and units perform the operations have been described in detail in the method embodiment.
Embodiments of the present application also provide an electronic device comprising one or more processors and a memory for storing one or more computer programs that, when executed by the one or more processors, cause the electronic device to implement a data processing method as before.
Fig. 8 is a schematic diagram of a computer system suitable for use in an electronic device (e.g., a terminal device or server as shown in fig. 1) for implementing an embodiment of the application.
It should be noted that, the computer system 800 of the electronic device shown in fig. 8 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 8, the computer system 800 includes a central processing unit (Central Processing Unit, CPU) 801 that can perform various appropriate actions and processes, such as performing the methods in the above-described embodiments, according to a computer program stored in a Read-Only Memory (ROM) 802 or a computer program loaded from a storage section 808 into a random access Memory (Random Access Memory, RAM) 803. In the RAM 803, various computer programs and data required for system operation are also stored. The CPU 801, ROM 802, and RAM 803 are connected to each other by a bus 804. An Input/Output (I/O) interface 805 is also connected to bus 804.
Connected to the I/O interface 805 are an input section 806 including a keyboard, a mouse, and the like, an output section 807 including a display such as a Cathode Ray Tube (CRT), a Liquid crystal display (Liquid CRYSTAL DISPLAY, LCD), and a speaker, a storage section 808 including a hard disk, and the like, and a communication section 809 including a network interface card such as a LAN (Local Area Network) card, a modem, and the like. The communication section 809 performs communication processing via a network such as the internet. The drive 810 is also connected to the I/O interface 805 as needed. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as needed so that a computer program read out therefrom is mounted into the storage section 808 as needed.
In particular, according to embodiments of the present application, the process described above with reference to the flowcharts may be implemented as a computer program. For example, embodiments of the application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program containing computer instructions for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication section 809, and/or installed from the removable media 811. When executed by a Central Processing Unit (CPU) 801, performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable medium can be, for example, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of a computer-readable medium may include, but are not limited to, an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), a flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable medium may be any tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with a computer-readable computer program embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer-readable signal medium may also be any computer-readable medium that is not a computer-readable storage medium and that can transmit, propagate, or transport a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer program embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
Another aspect of the application also provides a computer readable medium having stored thereon a computer program which, when executed by a processor, implements a data processing method as before. The computer-readable medium may be included in the electronic device described in the above embodiment or may exist alone without being incorporated in the electronic device.
Yet another aspect of the application provides a computer program product or computer program comprising computer instructions stored in a computer readable medium. The processor of the electronic device reads the computer instructions from the computer-readable medium, and the processor executes the computer instructions, so that the electronic device performs the data processing method provided in the above-described respective embodiments.
The foregoing is merely illustrative of the preferred embodiments of the present application and is not intended to limit the embodiments of the present application, and those skilled in the art can easily make corresponding variations or modifications according to the main concept and spirit of the present application, so that the protection scope of the present application shall be defined by the claims.

Claims (10)

1. A method of data processing, comprising:
Inputting a file to be inspected into an inspection agent group, wherein the inspection agent group comprises a leading agent and a functional agent, and the functional agent comprises a text integral inspection agent and a text block inspection agent;
global checking is carried out on the text in the file to be checked through the text integral checking agent to obtain a first checking result, the text in the file to be checked is blocked according to functions through the text blocking checking agent to obtain a plurality of functional text blocks, and local checking is carried out on the functional text blocks to obtain a second checking result;
And generating a target inspection result of the file to be inspected based on the first inspection result and the second inspection result by the master intelligent agent.
2. The method of claim 1, wherein the inputting the document to be inspected into the group of inspection agents comprises:
acquiring the type corresponding to the file to be checked;
Selecting a target inspection agent group matched with the type from a plurality of inspection agent groups;
and inputting the file to be checked into the target checking agent group.
3. The method of claim 2, wherein prior to said selecting a target set of inspection agents from the plurality of sets of inspection agents that matches the type, the method further comprises:
Creating an inspection agent group for inspecting the file of the resource allocation type in the earlier stage of operation and maintenance management;
Creating an inspection agent group for inspecting the file of the service deployment type in the middle of operation and maintenance management;
an audit agent group is created for audit of the file of the operation and maintenance management later service operation log type.
4. The method according to claim 1, wherein the locally inspecting the plurality of functional text blocks to obtain a second inspection result includes:
Checking the relation among the plurality of functional text blocks to obtain a text block relation checking result, and checking texts in each functional text block to obtain a text block checking result corresponding to each functional text block;
and integrating the text block relation checking result and the text block checking result corresponding to each functional text block to generate the second checking result.
5. The method of claim 4, wherein the checking the text in each functional text block to obtain a text block check result corresponding to each functional text block includes:
generating inspection tasks respectively corresponding to the functional text blocks;
and executing the checking tasks corresponding to the functional text blocks in parallel so as to realize the parallel checking of the texts in the functional text blocks.
6. The method of claim 1, wherein the generating, by the master agent, a target inspection result of the document to be inspected based on the first inspection result and the second inspection result, comprises:
Integrating the first inspection result and the second inspection result through the master intelligent agent to generate an integrated result, and analyzing the integrated result to generate a target inspection result of the file to be inspected;
after the generating, by the master agent, a target inspection result of the document to be inspected based on the first inspection result and the second inspection result, the method further includes:
outputting the target inspection result;
and carrying out operation and maintenance management based on the target inspection result.
7. The method of claim 6, wherein the performing operation and maintenance management based on the target inspection result comprises:
if the file to be checked is of a resource allocation type and the target checking result represents that the checking is passed, executing resource allocation operation;
if the file to be checked is of a service deployment type and the target checking result represents that the checking is passed, executing service deployment operation;
And if the file to be checked is of a service running log type, generating script file modification information based on the target checking result, wherein the script file modification information is used for providing modification suggestions for the script file.
8. A data processing apparatus, comprising:
The input module is configured to input a file to be inspected into an inspection agent group, wherein the inspection agent group comprises a master agent and a functional agent, and the functional agent comprises a text integral inspection agent and a text block inspection agent;
the checking module is configured to perform global checking on the texts in the files to be checked through the text integral checking agent to obtain a first checking result, perform functional partitioning on the texts in the files to be checked through the text partitioning checking agent to obtain a plurality of functional text blocks, and perform local checking on the functional text blocks to obtain a second checking result;
the generation module is configured to generate a target inspection result of the file to be inspected based on the first inspection result and the second inspection result through the main intelligent agent.
9. An electronic device, comprising:
One or more processors;
a memory for storing one or more computer programs that, when executed by the electronic device, cause the electronic device to implement the data processing method of any of claims 1-7.
10. A computer readable medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the data processing method according to any one of claims 1 to 7.
CN202411997123.7A 2024-12-31 Data processing method, device, equipment and medium Active CN119938153B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411997123.7A CN119938153B (en) 2024-12-31 Data processing method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411997123.7A CN119938153B (en) 2024-12-31 Data processing method, device, equipment and medium

Publications (2)

Publication Number Publication Date
CN119938153A CN119938153A (en) 2025-05-06
CN119938153B true CN119938153B (en) 2025-10-10

Family

ID=

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333442A (en) * 2023-09-27 2024-01-02 广东省人民医院 Method and device for rapid analysis of pathological images based on magnification alignment Transformer

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117333442A (en) * 2023-09-27 2024-01-02 广东省人民医院 Method and device for rapid analysis of pathological images based on magnification alignment Transformer

Similar Documents

Publication Publication Date Title
US8261354B2 (en) System, method and program product for dynamically performing an audit and security compliance validation in an operating environment
US10762452B2 (en) System and method for designing and executing control loops in a cloud environment
US20130291052A1 (en) Trusted public infrastructure grid cloud
US11057276B2 (en) Bulk service mapping
US11743155B2 (en) Systems and methods of monitoring and controlling remote assets
AU2020241610B2 (en) Systems and methods for license analysis
US20050204333A1 (en) Integrated system-of-systems modeling environment and related methods
US11805021B1 (en) Network path recommendations for services executing on cloud platforms
US11277303B1 (en) Declarative specification based override mechanism for customizing data centers deployed on cloud platforms
US11157292B2 (en) Instance mapping engine and tools
US10942787B2 (en) Instance mapping engine and tools
Pintz et al. PARMA: a Platform Architecture to enable Automated, Reproducible, and Multi-party Assessments of AI Trustworthiness
US10713153B1 (en) Method and system for testing an extended pattern using an automatic pattern testing engine
US20240223455A1 (en) Automated preventative controls in digital workflow
US11805146B2 (en) System and method for detection promotion
US12223084B1 (en) Data center monitoring and management operation including a protected data tag operation
CN119938153B (en) Data processing method, device, equipment and medium
US20250077485A1 (en) Data Center Monitoring and Management Operation Including a Data Tag Management Operation
US10680895B1 (en) Method and system for automatic patterns generation and testing
CN119938153A (en) Data processing method, device, equipment and medium
Soldani et al. Offline mining of microservice-based architectures (extended version)
US12379866B2 (en) Data center monitoring and management operation including a data tag association tracking operation
US20250111074A1 (en) System and Methods for Dynamic Tags
US12423279B2 (en) User-configurable autotagging policies
US12224923B1 (en) Data center cluster performance forecasting via a data center monitoring and management operation

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
GR01 Patent grant