<template>
  <AtTimeLine :timeLineData='timeData'>
  </AtTimeLine> 
</template>
<script>
export default {
  // your code
  data () {
    return {
      timeData: [
        {
          time: '2017-06-19 13:54:23',
          type: 'maliciouscode',
          title: '恶意代码',
          info: '针对C&C进行历史搜索'
        },{
          time: '2017-06-19 13:54:23',
          type: 'c2',
          title: 'C&C',
          info: '针对C&C进行历史搜索'
        }, {
          time: '2017-06-19 13:54:23',
          type: 'net-intrusion',
          title: '网络入侵',
          info: '资产 <span style="color: #5f9eff">192.168.1.1</span> 通过 HTTP,TCP 协议访问 指控中心/未登记 的资产<span style="color: #5f9eff">192.168.10.10</span>,发现EEFB0E816885B2151C81031F092E98E5等恶意代码传输行为 ,域名为 192.168.10.10,URL为 http://192.168.10.10/sample/tmp/148432E21A2945DCECE790DC7B7D6AAE.D82FDFCA,',
          label: ['风险软件']
        }, {
          time: '2017-06-19 13:54:23',
          type: 'unfix',
          title: '漏洞',
          info: '针对C&C进行历史搜索'
        }, {
          time: '2017-06-19 13:54:23',
          type: 'maliciouscode',
          title: '恶意代码',
          info: '针对C&C进行历史搜索'
        },{
          time: '2017-06-19 13:54:23',
          type: 'c2',
          title: 'C&C',
          info: '针对C&C进行历史搜索'
        }, {
          time: '2017-06-19 13:54:23',
          type: 'net-intrusion',
          title: '网络入侵',
          info: '资产 192.168.1.1 通过 HTTP,TCP 协议访问 指控中心/未登记 的资产192.168.10.10,发现EEFB0E816885B2151C81031F092E98E5等恶意代码传输行为 ,域名为 192.168.10.10,URL为 http://192.168.10.10/sample/tmp/148432E21A2945DCECE790DC7B7D6AAE.D82FDFCA,',
          label: ['风险软件']
        }, {
          time: '2017-06-19 13:54:23',
          type: 'unfix',
          title: '漏洞',
          info: '针对C&C进行历史搜索'
        },
      ]
    }
  }
}
</script>