期刊文献+

实时日志分析系统在河南气象信息化中的应用 被引量:2

Application of real-time log analysis system in Henan meteorological informatization
下载PDF
导出
摘要 文章从河南省气象发展现状出发,结合中国气象信息化建设要求,提出了基于Elastic Search Logstash Kibana(ELK)的实时日志分析系统,应用于气象大数据的运行和维护。该系统对多台服务器的日志集中化管理,可以对大量日志信息进行采集、存储、分析和展示。通过河南省气象探测数据中心ELK平台的建设,为气象大数据提供了可靠的运行和维护技术方案。 From the current situation of Henan meteorological development,combined with Chinas meteorological information construction requirements,this paper proposes the real-time log analysis system based on Elastic Search Logstash Kibana(ELK),which is applied in meteorological big data operation and maintenance.This system centralized manages the logs of multiple servers.A large number of log information can be collected,stored,analyzed and displayed.Through the ELK platform construction of the meteorological observation data center in Henan,it provides a reliable operation and maintenance technology plan for the meteorological big data.
作者 王立柱 朱茜 Wang Lizhu;Zhu Qian(Henan Meteorological Observation Data Center,Zhengzhou 45000)
出处 《气象水文海洋仪器》 2018年第3期65-69,共5页 Meteorological,Hydrological and Marine Instruments
关键词 ELK 实时日志分析 气象信息化 气象大数据 ELK;real-time log analysis;meteorological informatization;meteorological big data
  • 相关文献

参考文献8

二级参考文献36

  • 1姜传菊.网络日志分析在网络安全中的作用[J].现代图书情报技术,2004(12):58-60. 被引量:19
  • 2Han J W,Pei J,Yin Y W.Mining frequent patterns without candidate generation:A frequent-pattern tree approach[EB/OL].http://www.sce.carleton.ca/faculty/ajila/5703/Database-Mining/F-tree-mining.pdf.2000.
  • 3Chen M S,Park J S,Yu P S.Efficient data mining for path traversal patterns[J].Knowledge and Data Engineering,1998,10(2):209-221.
  • 4Agrawal R,Srikant R.Fast algorithms for mining association rules[EB/OL].http://www.almaden.ibm.com/software/quest/Publications/papers/vldb94.pdf.1994.
  • 5Zhang Yun-tao,Gong Ling,Wang Yong-cheng.An improved TF-IDF approach for text classification[J]. Journal of Zhejiang University SCIENCE A . 2005 (1)
  • 6ZHONG S,Khoshgoftaar T M,SELIYA N.Clustering-based network intrusion detection. International Journal of Reliability,Quality and Safety Engineering . 2007
  • 7Chi mphlee W,Abdullah A H,Noor M.Unsupervised anomaly detection with unlabeled data using clustering. Postgraduate Annual Research Seminar . 2005
  • 8HANJia-wei,Kamber Micheline.Data mining concepts andtechniques. . 2001
  • 9YUJ X,Yuming Ou,ZHANG C,et al.Identifying in-teresting visitors through Web log classification. Intelligent Systems,IEEE . 2005
  • 10GUAN Y,GHORBANI A A,BELACEL N.Y-means:A clustering method for intrusion detection. CCECE2003Canadian Conference on Electri-cal and Computer Engineering . 2003

共引文献89

同被引文献29

引证文献2

二级引证文献14

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部