CN107301115A - Application exception is monitored and restoration methods and equipment - Google Patents
Application exception is monitored and restoration methods and equipment Download PDFInfo
- Publication number
- CN107301115A CN107301115A CN201710494314.5A CN201710494314A CN107301115A CN 107301115 A CN107301115 A CN 107301115A CN 201710494314 A CN201710494314 A CN 201710494314A CN 107301115 A CN107301115 A CN 107301115A
- Authority
- CN
- China
- Prior art keywords
- program
- default
- exception rules
- application
- exception
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3065—Monitoring arrangements determined by the means or processing involved in reporting the monitored data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/32—Monitoring with visual or acoustical indication of the functioning of the machine
- G06F11/324—Display of status information
- G06F11/327—Alarm or error message display
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
It is of the invention that the problem of application exception monitoring and restoration methods and equipment are used to solve the deficiency of traditional house dog program presence is provided.Wherein method includes:According to default decimation rule, the information in application log file is extracted, is recorded information in tables of data;Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation fault recovery instruction.The method of the present invention need not embedded code in the application, and realize monitoring of the keyword to application program in the daily record exported by recognition application, relative to based on modes such as interacting message mode, the work of process report, monitoring programme itself reduces the coupling and unstability of program without being implanted into the monitoring category code unrelated with business.
Description
Technical field
The present invention relates to computer technology, and in particular to application exception is monitored and restoration methods and equipment.
Background technology
Application program operation is deployed in production environment, to improve program reliability, it is ensured that when program occurs abnormal can and
Shi Huifu, typically can set house dog program.Traditional house dog program, its core thinking is all to being monitored by the cycle
Program process running status is monitored, it is ensured that monitoring process running status is normal, once there is exception, then to institute's monitoring programme
Restarted.Its monitor mode mainly has following several:
(1) mode based on interacting message, realizes the communication between monitoring process and monitored process, is monitored the process cycle
Message is sent to monitoring process;
(2) process report work instruction mode, the process that is monitored and monitoring process agreement intercommunication report are lived and instructed, and pass through the cycle
Report instruction interaction living;
(3) mode is monitored to monitored program process PID.By to the program process PID that is monitored in operating system
It is monitored, it is normal that PID has then program.
Traditional house dog program has the following disadvantages:
(1) on the one hand, either, to realize monitoring function, all needed based on interacting message mode or process report work mode
The monitoring class method code unrelated with business is implanted into monitoring programme, increases the coupling and unstability of code;Meanwhile,
To realize monitoring to multiple application programs, it is necessary to which increase monitors category code in each program, scalability is poor;
(2) on the other hand, the type of application program error is complicated, and it is to expect at the beginning of programming that some error types, which are,
Arrive, and these unexpected exceptions, existing house dog program is difficult to monitor.For example for some application class methods, by
The mistake exceeded in application programming interfaces number formulary according to message error, instruction errors etc. outside both sides' programming once occurs, its
Program process dispaly state is normal, but it has been unable to other follow-up message datas of normal process.
The content of the invention
In view of the above problems, the present invention proposes the application for overcoming above mentioned problem or solving the above problems at least in part
Program exception is monitored and restoration methods and equipment.
For this purpose, in a first aspect, the present invention propose application exception monitoring and restoration methods, including:
According to default decimation rule, the information in application log file is extracted, tables of data is recorded information to
In;
Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation event
Barrier recovers instruction.
Alternatively, the fault message produced according to analysis result to the application program monitored is recorded, and passes through net
One or more modes in page pop-up, short message or mail carry out failure prompting to user.
Alternatively, the default exception rules include illegal keyword rule, legal keyword rule.Single communication is non-
The first exception rules for being used to recognize abnormality that method keyword and/or the illegal keyword of multiple communications are constituted;
Default exception rules include at least one first exception rules;
The default exception rules are also included by the legal keyword of single communication and/or the legal keyword of any number of communications
The second exception rules for being used to recognize normal condition constituted.Default exception rules include at least one second exception rules.Can
Selection of land, the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
Second aspect, the present invention provides a kind of computer-readable recording medium, is stored thereon with computer program, the program
The step of as above any methods described being realized when being executed by processor.
The third aspect, the present invention provides a kind of computer equipment, including memory, processor and is stored in the storage
On device and the computer program that can perform on the processor, as above any institute is realized during the computing device described program
The step of stating method.
As shown from the above technical solution, method of the invention need not embedded code in the application, and realize and pass through
Monitoring of the keyword to application program in the daily record of recognition application output, relative to based on interacting message mode, process
The mode such as living is reported, monitoring programme itself reduces the coupling and shakiness of program without being implanted into the monitoring category code unrelated with business
It is qualitative.In addition, the method for the present invention can realize the monitoring of multiple programs simultaneously, Application Monitoring service application is simple, extension
Property is strong.The present invention can be achieved to program process dispaly state just relative to the watchdog system of process PID monitor modes
Often, but its business processing abnormal program class is monitored.
Above be to provide to the present invention some in terms of understanding simplified summary.This part neither the present invention and
The detailed statement of its various embodiment is nor the statement of exhaustion.It is both not used in identification the present invention important or key feature or
Do not limit the scope of the present invention, but the selected principle of the present invention provided with a kind of reduced form, as to it is given below more
The brief introduction specifically described.It should be appreciated that either alone or in combination using one for being set forth above or being detailed below or
Multiple features, other embodiments of the invention are also possible.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the schematic flow sheet that performs in one embodiment of the present of invention.
Embodiment
Below in conjunction with the exemplary System describe present invention.
As shown in figure 1, the present invention proposes application exception monitoring and restoration methods, including:
S101, according to default decimation rule, extract the information in application log file, record information to number
According in table;
S102, information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
It is raw according to analysis result and default recovery policy if S103, daily record data are matched with default exception rules
Into fault recovery instruction.
For example for java application application program, its operationally, some exceptions are can be by try { }/catch () side
Formula is captured and handled, and some exceptions can be captured but can not handled by try { }/catch () mode, but try { }/
Catch () mode can output journal after capturing these exceptions.Herein exactly according to the calculating logic of these application programs and its
The method of the log design of the output present invention.These most cause program work abnormal at last extremely, finally deviate program
The mode that designer is expected is run, therefore, by being monitored to such exception, and carries out reboot operation to program in time,
Can recovery routine normal work in time.
In some embodiments of the invention, the keyword extracted in daily record can pass through:With log4j etc tool records
Running log, by acquisition module, (acquisition module gathers keyword according to decimation rule, and decimation rule is according to application program
What the characteristics of function, arithmetic logic and daily record, was designed) to communication keyword, the illegal keyword of communication and log timestamp data
It is acquired, and recorded in tables of data.
It is appreciated that, it is necessary to default decimation rule, exception rules and recovery plan before the present processes are performed
Slightly, it in configuration parameter is to be configured that these, which can be,.
If daily record data is matched with default exception rules, the application program for drawing error, fault recovery can be analyzed
Instruction is the application program for recovering error, the recovery can be restart, can also be after collecting error data, according to going out
The recovering step that wrong data are performed.
It is default to recover instruction, recovers to instruct according to analysis result Selection and call is corresponding.For example with the side of the present invention
Method to being monitored to wireless network module, then according to preset rules extract wireless network module export daily record in letter
Breath, is recorded information in tables of data;The information of extraction can be the record of the combination formation of keyword and timestamp;To data
Information is analyzed in table, and whether analysis daily record data matches with default exception rules.
For example, in one embodiment of this invention, if including CONNECTED in one daily record of default exception rules,
The wireless network name (i.e. ssid titles) connected should also be included in this daily record, found even in daily record
The content of this daily record and timestamp, then be stored in tables of data by CONNECTED keywords, and analyses whether to include wireless network
Title, if the content of the daily record is as follows:ParcelableExtra==========[type:WIFI[],
state:CONNECTED/CONNECTED,reason:(unspecified),extra:<unknown ssid>,roaming:
false,failover:false,isAvailable:true,isConnectedToProvisioningNetwork:
False], the wireless network name connected due to not recording wherein, and only show extra:<unknown ssid>, therefore with
Default exception rules matching, identifies exception.Now, wireless network, generation weight are restarted if default recovery policy is basis
The new instruction for starting wireless network.
It is appreciated that only illustrated in above-described embodiment identifies abnormal situation according to a daily record.In actual prison
During control, an exception may be identified according to a plurality of daily record, such as by repeating 3 keyword X, day after 1 minute
Occur keyword Y in will program, then recognize exception z now occur.For example during application program normal work, generally it is required for periodically
Instruction access is carried out, and obtains response data, these request/response keywords are all recorded in journal file;Connected applications journey
The business demand of sequence, component requests/response is that periodic law occurs to data, and component requests/response is only sent out data in request
Occur after going out, the regular expression that request/response keyword occurs in daily record can be taken out, these keyword, keywords
Regular expression carries out start-up loading by configuration parameter load-on module.Log analysis module is by the daily record data and keyword of collection
Regular expression is matched, and string analysis is carried out by such as regular expression parser, can accurate monitoring programme number
It is whether normal according to communications status.
The method of the present invention need not embedded code in the application, and realize the day by recognition application output
Monitoring of the keyword to application program in will, relative to based on modes such as interacting message mode, the work of process report, monitoring programme is certainly
Body reduces the coupling and unstability of program without being implanted into the monitoring category code unrelated with business.
In addition, the method for the present invention can realize the monitoring of multiple programs simultaneously, Application Monitoring service application is simple, expand
Malleability is strong.The present invention can be achieved to program process dispaly state just relative to the watchdog system of process PID monitor modes
Often, but its business processing abnormal program class is monitored.
In some embodiments of the present invention, enter in the fault message produced according to analysis result to the application program monitored
Row record, and carry out failure prompting to user by one or more modes in web page popup window, short message or mail.In order to
Family carries out daily record and checks, analyzes in time.
Alternatively, the default exception rules include illegal keyword rule, legal keyword rule.Single communication is non-
The first exception rules for being used to recognize abnormality that method keyword and/or the illegal keyword of multiple communications are constituted;First is abnormal
Rule is also referred to as illegal state rule.Even meet the first exception rules, then it is assumed that in abnormal shape during the application program of monitoring
State.
The default exception rules also include being made up of the legal keyword of single communication and/or the legal keyword of multiple communications
Be used for recognize the second exception rules of normal condition.Second exception rules are also referred to as legal state rule, even meet second
Exception rules, then it is assumed that normal condition is in during the application program of monitoring.
Herein, such as first and second or the like relational terms are used merely to an entity or operated and another
One entity or operation make a distinction, and not necessarily require or imply between these entities or operation there is any this reality
Relation or order.
Single keyword is continuous character string, single to represent measure word.Single keyword is referred to as keyword.Keyword can be with
It is the keyword in the information that daily record intermediate range sort run is exported, such as keyword is probably directory name, script name, program
Class name of code etc..Relation between keyword and keyword constitutes exception rules, it is to be appreciated that in exception rules
Also include fault-tolerant rule.I.e. in certain embodiments, exception rules can be represented with a state machine, is advised according to default extract
The keyword in daily record is then extracted, according to the keyword being drawn into, the state of state machine is determined.
Herein single crucial combinatorics on words includes the combination that multiple keywords are formed in order, even in daily record in order
There are these keywords, then it is assumed that meet exception rules.First exception rules or the are belonged to according to single crucial combinatorics on words
When two exception rules, application program to recognize monitoring normal condition is in abnormality.It is appreciated that many
Individual crucial contamination also includes constituting the combination with temporal aspect by multiple keywords.It is real for example at one of the present invention
Apply in example, including the exception rules formed by the combination of multi-key word, i.e., it is regular:Repeat 3 keyword X, 1 minute
There is keyword Y in daily record program afterwards.
In other embodiments of the present invention, keyword is extracted from daily record, according to default single keyword or pass
Key word combines the rule to be formed, and may recognize that whether monitored application program is in normal condition.The single key
Word or the rule of key combination formation are also referred to as fault-tolerant rule.
Alternatively, the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
The present invention provides a kind of computer-readable recording medium, is stored thereon with computer program, the program is by processor
The step of as above any methods described being realized during execution.
The present invention provides a kind of computer equipment, including memory, processor and is stored on the memory and can
The computer program performed on the processor, realizes as above any methods described during the computing device described program
Step.
" monitoring " used herein includes any kind of function relevant with being observed, recording or being detected with instrument,
These instruments do not have any influence to monitored element or the operation of element group or state.
" at least one " used herein, " one or more " and "and/or" are open statements, when in use
It can be united and separation.For example, " in A, B and C at least one ", " in A, B or C at least one ", " in A, B and C
It is one or more " and " one or more of A, B or C " refer to only A, only B, only C, A and B together, A and C together,
B and C together or A, B and C together.
Term " one " entity refers to one or more entities.Thus term " one ", " one or more " and " extremely
Few one " be herein defined as can be with used interchangeably.It should also be noted that term " comprising ", "comprising" and " having " are also can be mutual
Change what is used.
Term " automatic " used herein and its modification refer to not have when performing processing or operating tangible artificial
Any processing or operation completed in the case of input.However, having used the execution place when performing processing or operating
The substantive or immaterial artificial input received before reason or operation, the processing or operation can also be automatic.If
How the input influence processing or operation will be carried out, then will be substantive depending on the artificial input.The processing or operation are not influenceed
The artificial input carried out is not to be taken as substantive.
Term " computer-readable medium " used herein refers to participate in providing instructions to any of computing device
Tangible storage device and/or transmission medium.During computer-readable medium can be network transmission (such as SOAP) on ip networks
The serial command collection of coding.Such medium can take many forms, and including but not limited to non-volatile media, volatibility is situated between
Matter and transmission medium.Non-volatile media includes such as NVRAM or magnetically or optically disk.Volatile media includes such as main storage
Dynamic memory (such as RAM).The common form of computer-readable medium includes such as floppy disk, flexible disk, hard disk, tape or appointed
What its magnetizing mediums, magnet-optical medium, CD-ROM, any other optical medium, punched card, paper tape, it is any other have hole shape pattern
Physical medium, RAM, PROM, EPROM, FLASH-EPROM, the solid state medium of such as storage card, any other storage chip or
Any other medium that cassette, the carrier wave described below or computer can be read.The digital file attachment of Email or
Other self-contained news files or archive set are considered as the distribution medium equivalent to tangible media.Work as computer-readable medium
When being configured as database, it should be appreciated that the database can be any kind of database, such as relational database, number of levels
According to storehouse, OODB Object Oriented Data Base etc..Correspondingly, it is believed that the present invention includes tangible media or distribution medium and existing skill
Equivalent known to art and the medium of following exploitation, store the software implementation of the present invention in these media.
Term used herein " it is determined that ", " computing " and " calculating " and its modification can be with used interchangeably, and including appointing
Method, processing, mathematical operation or the technology of what type.More specifically, the explanation that such term can include such as BPEL is advised
Then or rule language, wherein logic be not hard coded but in the rule file that can be read, explained, compiled and performed table
Show.
Term " module " used herein or " instrument " refer to hardware that is any of or developing later, software, consolidated
Part, artificial intelligence, fuzzy logic or be able to carry out the function related to the element hardware and software combination.In addition, though
The present invention is described with illustrative embodiments, it is to be understood that each aspect of the present invention can individually be claimed.
It should be noted that term " comprising ", "comprising" or its any other variant are intended to the bag of nonexcludability
Contain, so that process, method, article or terminal device including a series of key elements not only include those key elements, but also
Including other key elements being not expressly set out, or also include for this process, method, article or terminal device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence " including ... " or " including ... ", it is not excluded that
Also there is other key element in the process including the key element, method, article or terminal device.In addition, herein,
" being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. be interpreted as including this number.
Although the various embodiments described above are described, those skilled in the art once know basic wound
The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only,
Not thereby the scope of patent protection of the present invention, the equivalent structure that every utilization description of the invention and accompanying drawing content are made are limited
Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, similarly it is included in the patent of the present invention
Within protection domain.
Claims (6)
1. application exception is monitored and restoration methods, it is characterised in that including:
According to default decimation rule, the information in application log file is extracted, is recorded information in tables of data;
Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation failure is extensive
Multiple instruction.
2. according to the method described in claim 1, it is characterised in that the application program monitored is produced according to analysis result
Fault message is recorded, and is carried by one or more modes in web page popup window, short message or mail to user's progress failure
Wake up.
3. according to the method described in claim 1, it is characterised in that the default exception rules include being closed by single communication is illegal
The first exception rules for being used to recognize abnormality that key word and/or the illegal keyword of multiple communications are constituted;Default exception rules
Include at least one the first exception rules;
The default exception rules also include the use being made up of the legal keyword of single communication and/or the legal keyword of multiple communications
In the second exception rules of identification normal condition;
Default exception rules include at least one second exception rules.
4. according to the method described in claim 1, it is characterised in that the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
5. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor
The step of methods described as any such as Claims 1-4 is realized during row.
6. a kind of computer equipment, including memory, processor and it is stored on the memory and can be in the processor
The computer program of upper execution, it is characterised in that realized during the computing device described program as Claims 1-4 is any
The step of methods described.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710494314.5A CN107301115B (en) | 2017-06-26 | 2017-06-26 | Application program exception monitoring and recovery method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710494314.5A CN107301115B (en) | 2017-06-26 | 2017-06-26 | Application program exception monitoring and recovery method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107301115A true CN107301115A (en) | 2017-10-27 |
CN107301115B CN107301115B (en) | 2020-12-18 |
Family
ID=60135575
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710494314.5A Active CN107301115B (en) | 2017-06-26 | 2017-06-26 | Application program exception monitoring and recovery method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107301115B (en) |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107886242A (en) * | 2017-11-10 | 2018-04-06 | 平安科技(深圳)有限公司 | Data monitoring method, device, computer equipment and storage medium |
CN108052452A (en) * | 2017-12-29 | 2018-05-18 | 北京酷我科技有限公司 | The visual optimization method that a kind of daily record is checked and accepted |
CN108255623A (en) * | 2018-01-22 | 2018-07-06 | 深圳市卓讯信息技术有限公司 | Realize the data exchange monitoring method and device of thread inside and outside dual reconciliation mechanism |
CN108282517A (en) * | 2017-12-21 | 2018-07-13 | 福建天泉教育科技有限公司 | A kind of method and terminal of web services upgrading |
CN108345518A (en) * | 2018-03-12 | 2018-07-31 | 张立江 | A kind of data recovery system after software crash and its restoration methods |
CN108363762A (en) * | 2018-02-05 | 2018-08-03 | 广州阿里巴巴文学信息技术有限公司 | A kind of collection processing method of user trajectory, device and terminal device |
CN108762966A (en) * | 2018-06-05 | 2018-11-06 | 中国平安人寿保险股份有限公司 | System exception hold-up interception method, device, computer equipment and storage medium |
CN109344060A (en) * | 2018-09-20 | 2019-02-15 | 迈普通信技术股份有限公司 | A kind of analysis method and device of automatic test |
CN109460343A (en) * | 2018-09-10 | 2019-03-12 | 平安科技(深圳)有限公司 | System exception monitoring method, device, equipment and storage medium based on log |
CN109726272A (en) * | 2018-12-20 | 2019-05-07 | 杭州数梦工场科技有限公司 | Audit regulation recommended method and device |
CN110032487A (en) * | 2018-11-09 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Keep Alive supervision method, apparatus and electronic equipment |
CN110059491A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Data import monitoring method, device, equipment and readable storage medium storing program for executing |
CN110267215A (en) * | 2019-05-21 | 2019-09-20 | 深圳壹账通智能科技有限公司 | A kind of data detection method, equipment and storage medium |
CN110690992A (en) * | 2019-09-16 | 2020-01-14 | 中盈优创资讯科技有限公司 | Network cutover abnormity identification method and device |
CN110764977A (en) * | 2019-09-27 | 2020-02-07 | 赛诺贝斯(北京)营销技术股份有限公司 | Alarm method and device for realizing system safety |
CN110825611A (en) * | 2018-08-14 | 2020-02-21 | 深圳兆日科技股份有限公司 | Abnormal program analysis method and device and computer readable storage medium |
CN111290927A (en) * | 2018-12-06 | 2020-06-16 | 北京京东尚科信息技术有限公司 | Data monitoring method and device |
CN111309584A (en) * | 2018-12-11 | 2020-06-19 | 迈普通信技术股份有限公司 | Data processing method and device, electronic equipment and storage medium |
WO2020237877A1 (en) * | 2019-05-27 | 2020-12-03 | 平安科技(深圳)有限公司 | Log monitoring method and apparatus, terminal, and storage medium |
CN112464066A (en) * | 2020-11-25 | 2021-03-09 | 中国信息安全测评中心 | Method and system for monitoring data crawling process |
CN112685045A (en) * | 2020-12-28 | 2021-04-20 | 北京达佳互联信息技术有限公司 | Page source file processing method and device, electronic equipment and storage medium |
CN112925675A (en) * | 2021-02-26 | 2021-06-08 | 北京百度网讯科技有限公司 | Recovery method and device for small program |
CN113268377A (en) * | 2021-04-25 | 2021-08-17 | 山东英信计算机技术有限公司 | Abnormal state data backup method, system and storage medium |
WO2021212409A1 (en) * | 2020-04-23 | 2021-10-28 | Citrix Systems, Inc. | Identification of log events for computing systems |
CN113778780A (en) * | 2020-11-27 | 2021-12-10 | 北京京东尚科信息技术有限公司 | Application stability determination method and device, electronic equipment and storage medium |
CN114629786A (en) * | 2022-03-22 | 2022-06-14 | 康键信息技术(深圳)有限公司 | Log real-time analysis method, device, storage medium and system |
CN114816942A (en) * | 2022-06-29 | 2022-07-29 | 智者四海(北京)技术有限公司 | Mobile terminal application stability monitoring method and device, electronic equipment and storage medium |
CN117493127A (en) * | 2023-12-29 | 2024-02-02 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7137041B2 (en) * | 2003-06-20 | 2006-11-14 | International Business Machines Corporation | Methods, systems and computer program products for resolving problems in an application program utilizing a situational representation of component status |
CN101060436A (en) * | 2007-06-05 | 2007-10-24 | 杭州华三通信技术有限公司 | A fault analyzing method and device for communication equipment |
CN102981943A (en) * | 2012-10-29 | 2013-03-20 | 新浪技术(中国)有限公司 | Method and system for monitoring application logs |
CN103793288A (en) * | 2014-02-14 | 2014-05-14 | 北京邮电大学 | Software watchdog system and method |
US8762797B2 (en) * | 2011-04-29 | 2014-06-24 | Google Inc. | Method and apparatus for detecting memory access faults |
CN104503892A (en) * | 2014-12-19 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Terminal exception processing method and device and terminal |
CN105004957A (en) * | 2015-07-31 | 2015-10-28 | 福州瑞芯微电子股份有限公司 | SD card test method and test device |
CN105224443A (en) * | 2015-10-09 | 2016-01-06 | 广州视睿电子科技有限公司 | A kind of method and apparatus of Android terminal show log information |
CN105743712A (en) * | 2016-04-12 | 2016-07-06 | 中国铁道科学研究院电子计算技术研究所 | PIS (Passenger Information System) external interface monitoring system and method |
-
2017
- 2017-06-26 CN CN201710494314.5A patent/CN107301115B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7137041B2 (en) * | 2003-06-20 | 2006-11-14 | International Business Machines Corporation | Methods, systems and computer program products for resolving problems in an application program utilizing a situational representation of component status |
CN101060436A (en) * | 2007-06-05 | 2007-10-24 | 杭州华三通信技术有限公司 | A fault analyzing method and device for communication equipment |
US8762797B2 (en) * | 2011-04-29 | 2014-06-24 | Google Inc. | Method and apparatus for detecting memory access faults |
CN102981943A (en) * | 2012-10-29 | 2013-03-20 | 新浪技术(中国)有限公司 | Method and system for monitoring application logs |
CN103793288A (en) * | 2014-02-14 | 2014-05-14 | 北京邮电大学 | Software watchdog system and method |
CN104503892A (en) * | 2014-12-19 | 2015-04-08 | 宇龙计算机通信科技(深圳)有限公司 | Terminal exception processing method and device and terminal |
CN105004957A (en) * | 2015-07-31 | 2015-10-28 | 福州瑞芯微电子股份有限公司 | SD card test method and test device |
CN105224443A (en) * | 2015-10-09 | 2016-01-06 | 广州视睿电子科技有限公司 | A kind of method and apparatus of Android terminal show log information |
CN105743712A (en) * | 2016-04-12 | 2016-07-06 | 中国铁道科学研究院电子计算技术研究所 | PIS (Passenger Information System) external interface monitoring system and method |
Non-Patent Citations (1)
Title |
---|
王彤彤;韩文报;王航: "基于API监控的服务程序防御技术", 《计算机工程与科学》 * |
Cited By (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107886242A (en) * | 2017-11-10 | 2018-04-06 | 平安科技(深圳)有限公司 | Data monitoring method, device, computer equipment and storage medium |
CN108282517A (en) * | 2017-12-21 | 2018-07-13 | 福建天泉教育科技有限公司 | A kind of method and terminal of web services upgrading |
CN108052452A (en) * | 2017-12-29 | 2018-05-18 | 北京酷我科技有限公司 | The visual optimization method that a kind of daily record is checked and accepted |
CN108255623A (en) * | 2018-01-22 | 2018-07-06 | 深圳市卓讯信息技术有限公司 | Realize the data exchange monitoring method and device of thread inside and outside dual reconciliation mechanism |
CN108255623B (en) * | 2018-01-22 | 2022-03-15 | 深圳市卓讯信息技术有限公司 | Data exchange monitoring method and device for realizing internal and external double account checking mechanism of thread |
CN108363762A (en) * | 2018-02-05 | 2018-08-03 | 广州阿里巴巴文学信息技术有限公司 | A kind of collection processing method of user trajectory, device and terminal device |
CN108345518A (en) * | 2018-03-12 | 2018-07-31 | 张立江 | A kind of data recovery system after software crash and its restoration methods |
CN108762966A (en) * | 2018-06-05 | 2018-11-06 | 中国平安人寿保险股份有限公司 | System exception hold-up interception method, device, computer equipment and storage medium |
CN110825611A (en) * | 2018-08-14 | 2020-02-21 | 深圳兆日科技股份有限公司 | Abnormal program analysis method and device and computer readable storage medium |
CN109460343A (en) * | 2018-09-10 | 2019-03-12 | 平安科技(深圳)有限公司 | System exception monitoring method, device, equipment and storage medium based on log |
CN109344060A (en) * | 2018-09-20 | 2019-02-15 | 迈普通信技术股份有限公司 | A kind of analysis method and device of automatic test |
CN110032487A (en) * | 2018-11-09 | 2019-07-19 | 阿里巴巴集团控股有限公司 | Keep Alive supervision method, apparatus and electronic equipment |
CN111290927A (en) * | 2018-12-06 | 2020-06-16 | 北京京东尚科信息技术有限公司 | Data monitoring method and device |
CN111309584B (en) * | 2018-12-11 | 2024-02-23 | 迈普通信技术股份有限公司 | Data processing method, device, electronic equipment and storage medium |
CN111309584A (en) * | 2018-12-11 | 2020-06-19 | 迈普通信技术股份有限公司 | Data processing method and device, electronic equipment and storage medium |
CN109726272A (en) * | 2018-12-20 | 2019-05-07 | 杭州数梦工场科技有限公司 | Audit regulation recommended method and device |
CN110059491A (en) * | 2019-03-16 | 2019-07-26 | 平安城市建设科技(深圳)有限公司 | Data import monitoring method, device, equipment and readable storage medium storing program for executing |
CN110267215A (en) * | 2019-05-21 | 2019-09-20 | 深圳壹账通智能科技有限公司 | A kind of data detection method, equipment and storage medium |
CN110267215B (en) * | 2019-05-21 | 2022-07-08 | 深圳壹账通智能科技有限公司 | Data detection method, equipment and storage medium |
WO2020237877A1 (en) * | 2019-05-27 | 2020-12-03 | 平安科技(深圳)有限公司 | Log monitoring method and apparatus, terminal, and storage medium |
CN110690992B (en) * | 2019-09-16 | 2022-03-29 | 中盈优创资讯科技有限公司 | Network cutover abnormity identification method and device |
CN110690992A (en) * | 2019-09-16 | 2020-01-14 | 中盈优创资讯科技有限公司 | Network cutover abnormity identification method and device |
CN110764977B (en) * | 2019-09-27 | 2023-11-10 | 赛诺贝斯(北京)营销技术股份有限公司 | Alarm method and device for realizing system safety |
CN110764977A (en) * | 2019-09-27 | 2020-02-07 | 赛诺贝斯(北京)营销技术股份有限公司 | Alarm method and device for realizing system safety |
WO2021212409A1 (en) * | 2020-04-23 | 2021-10-28 | Citrix Systems, Inc. | Identification of log events for computing systems |
CN112464066A (en) * | 2020-11-25 | 2021-03-09 | 中国信息安全测评中心 | Method and system for monitoring data crawling process |
CN112464066B (en) * | 2020-11-25 | 2024-03-15 | 中国信息安全测评中心 | Monitoring method and system for data crawling process |
CN113778780A (en) * | 2020-11-27 | 2021-12-10 | 北京京东尚科信息技术有限公司 | Application stability determination method and device, electronic equipment and storage medium |
CN113778780B (en) * | 2020-11-27 | 2024-05-17 | 北京京东尚科信息技术有限公司 | Application stability determining method and device, electronic equipment and storage medium |
CN112685045A (en) * | 2020-12-28 | 2021-04-20 | 北京达佳互联信息技术有限公司 | Page source file processing method and device, electronic equipment and storage medium |
CN112925675A (en) * | 2021-02-26 | 2021-06-08 | 北京百度网讯科技有限公司 | Recovery method and device for small program |
CN112925675B (en) * | 2021-02-26 | 2023-08-01 | 北京百度网讯科技有限公司 | Recovery method and device for applet |
CN113268377A (en) * | 2021-04-25 | 2021-08-17 | 山东英信计算机技术有限公司 | Abnormal state data backup method, system and storage medium |
CN114629786A (en) * | 2022-03-22 | 2022-06-14 | 康键信息技术(深圳)有限公司 | Log real-time analysis method, device, storage medium and system |
CN114816942B (en) * | 2022-06-29 | 2022-09-02 | 智者四海(北京)技术有限公司 | Mobile terminal application stability monitoring method and device, electronic equipment and storage medium |
CN114816942A (en) * | 2022-06-29 | 2022-07-29 | 智者四海(北京)技术有限公司 | Mobile terminal application stability monitoring method and device, electronic equipment and storage medium |
CN117493127A (en) * | 2023-12-29 | 2024-02-02 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
CN117493127B (en) * | 2023-12-29 | 2024-04-05 | 太平金融科技服务(上海)有限公司 | Application program detection method, device, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN107301115B (en) | 2020-12-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107301115A (en) | Application exception is monitored and restoration methods and equipment | |
Du et al. | Spell: Streaming parsing of system event logs | |
US8069374B2 (en) | Fingerprinting event logs for system management troubleshooting | |
US10810074B2 (en) | Unified error monitoring, alerting, and debugging of distributed systems | |
CN109240886B (en) | Exception handling method, exception handling device, computer equipment and storage medium | |
Mirgorodskiy et al. | Problem diagnosis in large-scale computing environments | |
Xu et al. | Largescale system problem detection by mining console logs | |
EP3674918B1 (en) | Column lineage and metadata propagation | |
CN101882102A (en) | Be used for the system that automated computer is supported | |
Xu et al. | Experience mining Google's production console logs | |
CN101639803A (en) | Exception handling method and exception handling device for multithread application system | |
CN104636130A (en) | Method and system for generating event trees | |
CN102819489A (en) | Software reliability designing method driven by defects | |
US8918765B2 (en) | Auto-documenting based on real-time analysis of code execution | |
CN108089978A (en) | A kind of diagnostic method for analyzing ASP.NET application software performance and failure | |
He et al. | An empirical study of log analysis at Microsoft | |
CN109992476A (en) | A kind of analysis method of log, server and storage medium | |
CN103152219A (en) | Event monitoring system and event monitoring method of computer network system | |
Lu et al. | Iaso: an autonomous fault-tolerant management system for supercomputers | |
He et al. | Using software dependency to bug prediction | |
US20170270038A1 (en) | Methods and systems for anomaly detection | |
Murtaza et al. | On the comparison of user space and kernel space traces in identification of software anomalies | |
CN112685370B (en) | Log collection method, device, equipment and medium | |
Tibermacine et al. | A process to identify relevant substitutes for healing failed WS-* orchestrations | |
CN113806178A (en) | Cluster node fault detection method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |