CN107301115A - Application exception is monitored and restoration methods and equipment - Google Patents

Application exception is monitored and restoration methods and equipment Download PDF

Info

Publication number
CN107301115A
CN107301115A CN201710494314.5A CN201710494314A CN107301115A CN 107301115 A CN107301115 A CN 107301115A CN 201710494314 A CN201710494314 A CN 201710494314A CN 107301115 A CN107301115 A CN 107301115A
Authority
CN
China
Prior art keywords
program
default
exception rules
application
exception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710494314.5A
Other languages
Chinese (zh)
Other versions
CN107301115B (en
Inventor
汪晓臣
夏德春
张铭
杜呈欣
陈栋
阚庭明
吴卉
孙同庆
黄志威
田源
赵伟慧
孟宇坤
王志飞
韦登荣
蔡晓蕾
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Railway Sciences Corp Ltd CARS
Institute of Computing Technologies of CARS
Beijing Jingwei Information Technology Co Ltd
Original Assignee
China Academy of Railway Sciences Corp Ltd CARS
Institute of Computing Technologies of CARS
Beijing Jingwei Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Railway Sciences Corp Ltd CARS, Institute of Computing Technologies of CARS, Beijing Jingwei Information Technology Co Ltd filed Critical China Academy of Railway Sciences Corp Ltd CARS
Priority to CN201710494314.5A priority Critical patent/CN107301115B/en
Publication of CN107301115A publication Critical patent/CN107301115A/en
Application granted granted Critical
Publication of CN107301115B publication Critical patent/CN107301115B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • G06F11/324Display of status information
    • G06F11/327Alarm or error message display

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

It is of the invention that the problem of application exception monitoring and restoration methods and equipment are used to solve the deficiency of traditional house dog program presence is provided.Wherein method includes:According to default decimation rule, the information in application log file is extracted, is recorded information in tables of data;Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation fault recovery instruction.The method of the present invention need not embedded code in the application, and realize monitoring of the keyword to application program in the daily record exported by recognition application, relative to based on modes such as interacting message mode, the work of process report, monitoring programme itself reduces the coupling and unstability of program without being implanted into the monitoring category code unrelated with business.

Description

Application exception is monitored and restoration methods and equipment
Technical field
The present invention relates to computer technology, and in particular to application exception is monitored and restoration methods and equipment.
Background technology
Application program operation is deployed in production environment, to improve program reliability, it is ensured that when program occurs abnormal can and Shi Huifu, typically can set house dog program.Traditional house dog program, its core thinking is all to being monitored by the cycle Program process running status is monitored, it is ensured that monitoring process running status is normal, once there is exception, then to institute's monitoring programme Restarted.Its monitor mode mainly has following several:
(1) mode based on interacting message, realizes the communication between monitoring process and monitored process, is monitored the process cycle Message is sent to monitoring process;
(2) process report work instruction mode, the process that is monitored and monitoring process agreement intercommunication report are lived and instructed, and pass through the cycle Report instruction interaction living;
(3) mode is monitored to monitored program process PID.By to the program process PID that is monitored in operating system It is monitored, it is normal that PID has then program.
Traditional house dog program has the following disadvantages:
(1) on the one hand, either, to realize monitoring function, all needed based on interacting message mode or process report work mode The monitoring class method code unrelated with business is implanted into monitoring programme, increases the coupling and unstability of code;Meanwhile, To realize monitoring to multiple application programs, it is necessary to which increase monitors category code in each program, scalability is poor;
(2) on the other hand, the type of application program error is complicated, and it is to expect at the beginning of programming that some error types, which are, Arrive, and these unexpected exceptions, existing house dog program is difficult to monitor.For example for some application class methods, by The mistake exceeded in application programming interfaces number formulary according to message error, instruction errors etc. outside both sides' programming once occurs, its Program process dispaly state is normal, but it has been unable to other follow-up message datas of normal process.
The content of the invention
In view of the above problems, the present invention proposes the application for overcoming above mentioned problem or solving the above problems at least in part Program exception is monitored and restoration methods and equipment.
For this purpose, in a first aspect, the present invention propose application exception monitoring and restoration methods, including:
According to default decimation rule, the information in application log file is extracted, tables of data is recorded information to In;
Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation event Barrier recovers instruction.
Alternatively, the fault message produced according to analysis result to the application program monitored is recorded, and passes through net One or more modes in page pop-up, short message or mail carry out failure prompting to user.
Alternatively, the default exception rules include illegal keyword rule, legal keyword rule.Single communication is non- The first exception rules for being used to recognize abnormality that method keyword and/or the illegal keyword of multiple communications are constituted;
Default exception rules include at least one first exception rules;
The default exception rules are also included by the legal keyword of single communication and/or the legal keyword of any number of communications The second exception rules for being used to recognize normal condition constituted.Default exception rules include at least one second exception rules.Can Selection of land, the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
Second aspect, the present invention provides a kind of computer-readable recording medium, is stored thereon with computer program, the program The step of as above any methods described being realized when being executed by processor.
The third aspect, the present invention provides a kind of computer equipment, including memory, processor and is stored in the storage On device and the computer program that can perform on the processor, as above any institute is realized during the computing device described program The step of stating method.
As shown from the above technical solution, method of the invention need not embedded code in the application, and realize and pass through Monitoring of the keyword to application program in the daily record of recognition application output, relative to based on interacting message mode, process The mode such as living is reported, monitoring programme itself reduces the coupling and shakiness of program without being implanted into the monitoring category code unrelated with business It is qualitative.In addition, the method for the present invention can realize the monitoring of multiple programs simultaneously, Application Monitoring service application is simple, extension Property is strong.The present invention can be achieved to program process dispaly state just relative to the watchdog system of process PID monitor modes Often, but its business processing abnormal program class is monitored.
Above be to provide to the present invention some in terms of understanding simplified summary.This part neither the present invention and The detailed statement of its various embodiment is nor the statement of exhaustion.It is both not used in identification the present invention important or key feature or Do not limit the scope of the present invention, but the selected principle of the present invention provided with a kind of reduced form, as to it is given below more The brief introduction specifically described.It should be appreciated that either alone or in combination using one for being set forth above or being detailed below or Multiple features, other embodiments of the invention are also possible.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is the schematic flow sheet that performs in one embodiment of the present of invention.
Embodiment
Below in conjunction with the exemplary System describe present invention.
As shown in figure 1, the present invention proposes application exception monitoring and restoration methods, including:
S101, according to default decimation rule, extract the information in application log file, record information to number According in table;
S102, information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
It is raw according to analysis result and default recovery policy if S103, daily record data are matched with default exception rules Into fault recovery instruction.
For example for java application application program, its operationally, some exceptions are can be by try { }/catch () side Formula is captured and handled, and some exceptions can be captured but can not handled by try { }/catch () mode, but try { }/ Catch () mode can output journal after capturing these exceptions.Herein exactly according to the calculating logic of these application programs and its The method of the log design of the output present invention.These most cause program work abnormal at last extremely, finally deviate program The mode that designer is expected is run, therefore, by being monitored to such exception, and carries out reboot operation to program in time, Can recovery routine normal work in time.
In some embodiments of the invention, the keyword extracted in daily record can pass through:With log4j etc tool records Running log, by acquisition module, (acquisition module gathers keyword according to decimation rule, and decimation rule is according to application program What the characteristics of function, arithmetic logic and daily record, was designed) to communication keyword, the illegal keyword of communication and log timestamp data It is acquired, and recorded in tables of data.
It is appreciated that, it is necessary to default decimation rule, exception rules and recovery plan before the present processes are performed Slightly, it in configuration parameter is to be configured that these, which can be,.
If daily record data is matched with default exception rules, the application program for drawing error, fault recovery can be analyzed Instruction is the application program for recovering error, the recovery can be restart, can also be after collecting error data, according to going out The recovering step that wrong data are performed.
It is default to recover instruction, recovers to instruct according to analysis result Selection and call is corresponding.For example with the side of the present invention Method to being monitored to wireless network module, then according to preset rules extract wireless network module export daily record in letter Breath, is recorded information in tables of data;The information of extraction can be the record of the combination formation of keyword and timestamp;To data Information is analyzed in table, and whether analysis daily record data matches with default exception rules.
For example, in one embodiment of this invention, if including CONNECTED in one daily record of default exception rules, The wireless network name (i.e. ssid titles) connected should also be included in this daily record, found even in daily record The content of this daily record and timestamp, then be stored in tables of data by CONNECTED keywords, and analyses whether to include wireless network Title, if the content of the daily record is as follows:ParcelableExtra==========[type:WIFI[], state:CONNECTED/CONNECTED,reason:(unspecified),extra:<unknown ssid>,roaming: false,failover:false,isAvailable:true,isConnectedToProvisioningNetwork: False], the wireless network name connected due to not recording wherein, and only show extra:<unknown ssid>, therefore with Default exception rules matching, identifies exception.Now, wireless network, generation weight are restarted if default recovery policy is basis The new instruction for starting wireless network.
It is appreciated that only illustrated in above-described embodiment identifies abnormal situation according to a daily record.In actual prison During control, an exception may be identified according to a plurality of daily record, such as by repeating 3 keyword X, day after 1 minute Occur keyword Y in will program, then recognize exception z now occur.For example during application program normal work, generally it is required for periodically Instruction access is carried out, and obtains response data, these request/response keywords are all recorded in journal file;Connected applications journey The business demand of sequence, component requests/response is that periodic law occurs to data, and component requests/response is only sent out data in request Occur after going out, the regular expression that request/response keyword occurs in daily record can be taken out, these keyword, keywords Regular expression carries out start-up loading by configuration parameter load-on module.Log analysis module is by the daily record data and keyword of collection Regular expression is matched, and string analysis is carried out by such as regular expression parser, can accurate monitoring programme number It is whether normal according to communications status.
The method of the present invention need not embedded code in the application, and realize the day by recognition application output Monitoring of the keyword to application program in will, relative to based on modes such as interacting message mode, the work of process report, monitoring programme is certainly Body reduces the coupling and unstability of program without being implanted into the monitoring category code unrelated with business.
In addition, the method for the present invention can realize the monitoring of multiple programs simultaneously, Application Monitoring service application is simple, expand Malleability is strong.The present invention can be achieved to program process dispaly state just relative to the watchdog system of process PID monitor modes Often, but its business processing abnormal program class is monitored.
In some embodiments of the present invention, enter in the fault message produced according to analysis result to the application program monitored Row record, and carry out failure prompting to user by one or more modes in web page popup window, short message or mail.In order to Family carries out daily record and checks, analyzes in time.
Alternatively, the default exception rules include illegal keyword rule, legal keyword rule.Single communication is non- The first exception rules for being used to recognize abnormality that method keyword and/or the illegal keyword of multiple communications are constituted;First is abnormal Rule is also referred to as illegal state rule.Even meet the first exception rules, then it is assumed that in abnormal shape during the application program of monitoring State.
The default exception rules also include being made up of the legal keyword of single communication and/or the legal keyword of multiple communications Be used for recognize the second exception rules of normal condition.Second exception rules are also referred to as legal state rule, even meet second Exception rules, then it is assumed that normal condition is in during the application program of monitoring.
Herein, such as first and second or the like relational terms are used merely to an entity or operated and another One entity or operation make a distinction, and not necessarily require or imply between these entities or operation there is any this reality Relation or order.
Single keyword is continuous character string, single to represent measure word.Single keyword is referred to as keyword.Keyword can be with It is the keyword in the information that daily record intermediate range sort run is exported, such as keyword is probably directory name, script name, program Class name of code etc..Relation between keyword and keyword constitutes exception rules, it is to be appreciated that in exception rules Also include fault-tolerant rule.I.e. in certain embodiments, exception rules can be represented with a state machine, is advised according to default extract The keyword in daily record is then extracted, according to the keyword being drawn into, the state of state machine is determined.
Herein single crucial combinatorics on words includes the combination that multiple keywords are formed in order, even in daily record in order There are these keywords, then it is assumed that meet exception rules.First exception rules or the are belonged to according to single crucial combinatorics on words When two exception rules, application program to recognize monitoring normal condition is in abnormality.It is appreciated that many Individual crucial contamination also includes constituting the combination with temporal aspect by multiple keywords.It is real for example at one of the present invention Apply in example, including the exception rules formed by the combination of multi-key word, i.e., it is regular:Repeat 3 keyword X, 1 minute There is keyword Y in daily record program afterwards.
In other embodiments of the present invention, keyword is extracted from daily record, according to default single keyword or pass Key word combines the rule to be formed, and may recognize that whether monitored application program is in normal condition.The single key Word or the rule of key combination formation are also referred to as fault-tolerant rule.
Alternatively, the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
The present invention provides a kind of computer-readable recording medium, is stored thereon with computer program, the program is by processor The step of as above any methods described being realized during execution.
The present invention provides a kind of computer equipment, including memory, processor and is stored on the memory and can The computer program performed on the processor, realizes as above any methods described during the computing device described program Step.
" monitoring " used herein includes any kind of function relevant with being observed, recording or being detected with instrument, These instruments do not have any influence to monitored element or the operation of element group or state.
" at least one " used herein, " one or more " and "and/or" are open statements, when in use It can be united and separation.For example, " in A, B and C at least one ", " in A, B or C at least one ", " in A, B and C It is one or more " and " one or more of A, B or C " refer to only A, only B, only C, A and B together, A and C together, B and C together or A, B and C together.
Term " one " entity refers to one or more entities.Thus term " one ", " one or more " and " extremely Few one " be herein defined as can be with used interchangeably.It should also be noted that term " comprising ", "comprising" and " having " are also can be mutual Change what is used.
Term " automatic " used herein and its modification refer to not have when performing processing or operating tangible artificial Any processing or operation completed in the case of input.However, having used the execution place when performing processing or operating The substantive or immaterial artificial input received before reason or operation, the processing or operation can also be automatic.If How the input influence processing or operation will be carried out, then will be substantive depending on the artificial input.The processing or operation are not influenceed The artificial input carried out is not to be taken as substantive.
Term " computer-readable medium " used herein refers to participate in providing instructions to any of computing device Tangible storage device and/or transmission medium.During computer-readable medium can be network transmission (such as SOAP) on ip networks The serial command collection of coding.Such medium can take many forms, and including but not limited to non-volatile media, volatibility is situated between Matter and transmission medium.Non-volatile media includes such as NVRAM or magnetically or optically disk.Volatile media includes such as main storage Dynamic memory (such as RAM).The common form of computer-readable medium includes such as floppy disk, flexible disk, hard disk, tape or appointed What its magnetizing mediums, magnet-optical medium, CD-ROM, any other optical medium, punched card, paper tape, it is any other have hole shape pattern Physical medium, RAM, PROM, EPROM, FLASH-EPROM, the solid state medium of such as storage card, any other storage chip or Any other medium that cassette, the carrier wave described below or computer can be read.The digital file attachment of Email or Other self-contained news files or archive set are considered as the distribution medium equivalent to tangible media.Work as computer-readable medium When being configured as database, it should be appreciated that the database can be any kind of database, such as relational database, number of levels According to storehouse, OODB Object Oriented Data Base etc..Correspondingly, it is believed that the present invention includes tangible media or distribution medium and existing skill Equivalent known to art and the medium of following exploitation, store the software implementation of the present invention in these media.
Term used herein " it is determined that ", " computing " and " calculating " and its modification can be with used interchangeably, and including appointing Method, processing, mathematical operation or the technology of what type.More specifically, the explanation that such term can include such as BPEL is advised Then or rule language, wherein logic be not hard coded but in the rule file that can be read, explained, compiled and performed table Show.
Term " module " used herein or " instrument " refer to hardware that is any of or developing later, software, consolidated Part, artificial intelligence, fuzzy logic or be able to carry out the function related to the element hardware and software combination.In addition, though The present invention is described with illustrative embodiments, it is to be understood that each aspect of the present invention can individually be claimed.
It should be noted that term " comprising ", "comprising" or its any other variant are intended to the bag of nonexcludability Contain, so that process, method, article or terminal device including a series of key elements not only include those key elements, but also Including other key elements being not expressly set out, or also include for this process, method, article or terminal device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence " including ... " or " including ... ", it is not excluded that Also there is other key element in the process including the key element, method, article or terminal device.In addition, herein, " being more than ", " being less than ", " exceeding " etc. are interpreted as not including this number;" more than ", " following ", " within " etc. be interpreted as including this number.
Although the various embodiments described above are described, those skilled in the art once know basic wound The property made concept, then can make other change and modification to these embodiments, so embodiments of the invention are the foregoing is only, Not thereby the scope of patent protection of the present invention, the equivalent structure that every utilization description of the invention and accompanying drawing content are made are limited Or equivalent flow conversion, or other related technical fields are directly or indirectly used in, similarly it is included in the patent of the present invention Within protection domain.

Claims (6)

1. application exception is monitored and restoration methods, it is characterised in that including:
According to default decimation rule, the information in application log file is extracted, is recorded information in tables of data;
Information in tables of data is analyzed, whether analysis daily record data matches with default exception rules;
If daily record data is matched with default exception rules, according to analysis result and default recovery policy, generation failure is extensive Multiple instruction.
2. according to the method described in claim 1, it is characterised in that the application program monitored is produced according to analysis result Fault message is recorded, and is carried by one or more modes in web page popup window, short message or mail to user's progress failure Wake up.
3. according to the method described in claim 1, it is characterised in that the default exception rules include being closed by single communication is illegal The first exception rules for being used to recognize abnormality that key word and/or the illegal keyword of multiple communications are constituted;Default exception rules Include at least one the first exception rules;
The default exception rules also include the use being made up of the legal keyword of single communication and/or the legal keyword of multiple communications In the second exception rules of identification normal condition;
Default exception rules include at least one second exception rules.
4. according to the method described in claim 1, it is characterised in that the generation fault recovery instruction includes:
The recovery instruction of thread-level is generated, for recovering to there is abnormal thread;
Generation program level restoration, restarts the exception that could recover to that must enter line program, generates program instruction of restarting.
5. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is held by processor The step of methods described as any such as Claims 1-4 is realized during row.
6. a kind of computer equipment, including memory, processor and it is stored on the memory and can be in the processor The computer program of upper execution, it is characterised in that realized during the computing device described program as Claims 1-4 is any The step of methods described.
CN201710494314.5A 2017-06-26 2017-06-26 Application program exception monitoring and recovery method and device Active CN107301115B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710494314.5A CN107301115B (en) 2017-06-26 2017-06-26 Application program exception monitoring and recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710494314.5A CN107301115B (en) 2017-06-26 2017-06-26 Application program exception monitoring and recovery method and device

Publications (2)

Publication Number Publication Date
CN107301115A true CN107301115A (en) 2017-10-27
CN107301115B CN107301115B (en) 2020-12-18

Family

ID=60135575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710494314.5A Active CN107301115B (en) 2017-06-26 2017-06-26 Application program exception monitoring and recovery method and device

Country Status (1)

Country Link
CN (1) CN107301115B (en)

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107886242A (en) * 2017-11-10 2018-04-06 平安科技(深圳)有限公司 Data monitoring method, device, computer equipment and storage medium
CN108052452A (en) * 2017-12-29 2018-05-18 北京酷我科技有限公司 The visual optimization method that a kind of daily record is checked and accepted
CN108255623A (en) * 2018-01-22 2018-07-06 深圳市卓讯信息技术有限公司 Realize the data exchange monitoring method and device of thread inside and outside dual reconciliation mechanism
CN108282517A (en) * 2017-12-21 2018-07-13 福建天泉教育科技有限公司 A kind of method and terminal of web services upgrading
CN108345518A (en) * 2018-03-12 2018-07-31 张立江 A kind of data recovery system after software crash and its restoration methods
CN108363762A (en) * 2018-02-05 2018-08-03 广州阿里巴巴文学信息技术有限公司 A kind of collection processing method of user trajectory, device and terminal device
CN108762966A (en) * 2018-06-05 2018-11-06 中国平安人寿保险股份有限公司 System exception hold-up interception method, device, computer equipment and storage medium
CN109344060A (en) * 2018-09-20 2019-02-15 迈普通信技术股份有限公司 A kind of analysis method and device of automatic test
CN109460343A (en) * 2018-09-10 2019-03-12 平安科技(深圳)有限公司 System exception monitoring method, device, equipment and storage medium based on log
CN109726272A (en) * 2018-12-20 2019-05-07 杭州数梦工场科技有限公司 Audit regulation recommended method and device
CN110032487A (en) * 2018-11-09 2019-07-19 阿里巴巴集团控股有限公司 Keep Alive supervision method, apparatus and electronic equipment
CN110059491A (en) * 2019-03-16 2019-07-26 平安城市建设科技(深圳)有限公司 Data import monitoring method, device, equipment and readable storage medium storing program for executing
CN110267215A (en) * 2019-05-21 2019-09-20 深圳壹账通智能科技有限公司 A kind of data detection method, equipment and storage medium
CN110690992A (en) * 2019-09-16 2020-01-14 中盈优创资讯科技有限公司 Network cutover abnormity identification method and device
CN110764977A (en) * 2019-09-27 2020-02-07 赛诺贝斯(北京)营销技术股份有限公司 Alarm method and device for realizing system safety
CN110825611A (en) * 2018-08-14 2020-02-21 深圳兆日科技股份有限公司 Abnormal program analysis method and device and computer readable storage medium
CN111290927A (en) * 2018-12-06 2020-06-16 北京京东尚科信息技术有限公司 Data monitoring method and device
CN111309584A (en) * 2018-12-11 2020-06-19 迈普通信技术股份有限公司 Data processing method and device, electronic equipment and storage medium
WO2020237877A1 (en) * 2019-05-27 2020-12-03 平安科技(深圳)有限公司 Log monitoring method and apparatus, terminal, and storage medium
CN112464066A (en) * 2020-11-25 2021-03-09 中国信息安全测评中心 Method and system for monitoring data crawling process
CN112685045A (en) * 2020-12-28 2021-04-20 北京达佳互联信息技术有限公司 Page source file processing method and device, electronic equipment and storage medium
CN112925675A (en) * 2021-02-26 2021-06-08 北京百度网讯科技有限公司 Recovery method and device for small program
CN113268377A (en) * 2021-04-25 2021-08-17 山东英信计算机技术有限公司 Abnormal state data backup method, system and storage medium
WO2021212409A1 (en) * 2020-04-23 2021-10-28 Citrix Systems, Inc. Identification of log events for computing systems
CN113778780A (en) * 2020-11-27 2021-12-10 北京京东尚科信息技术有限公司 Application stability determination method and device, electronic equipment and storage medium
CN114629786A (en) * 2022-03-22 2022-06-14 康键信息技术(深圳)有限公司 Log real-time analysis method, device, storage medium and system
CN114816942A (en) * 2022-06-29 2022-07-29 智者四海(北京)技术有限公司 Mobile terminal application stability monitoring method and device, electronic equipment and storage medium
CN117493127A (en) * 2023-12-29 2024-02-02 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7137041B2 (en) * 2003-06-20 2006-11-14 International Business Machines Corporation Methods, systems and computer program products for resolving problems in an application program utilizing a situational representation of component status
CN101060436A (en) * 2007-06-05 2007-10-24 杭州华三通信技术有限公司 A fault analyzing method and device for communication equipment
CN102981943A (en) * 2012-10-29 2013-03-20 新浪技术(中国)有限公司 Method and system for monitoring application logs
CN103793288A (en) * 2014-02-14 2014-05-14 北京邮电大学 Software watchdog system and method
US8762797B2 (en) * 2011-04-29 2014-06-24 Google Inc. Method and apparatus for detecting memory access faults
CN104503892A (en) * 2014-12-19 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Terminal exception processing method and device and terminal
CN105004957A (en) * 2015-07-31 2015-10-28 福州瑞芯微电子股份有限公司 SD card test method and test device
CN105224443A (en) * 2015-10-09 2016-01-06 广州视睿电子科技有限公司 A kind of method and apparatus of Android terminal show log information
CN105743712A (en) * 2016-04-12 2016-07-06 中国铁道科学研究院电子计算技术研究所 PIS (Passenger Information System) external interface monitoring system and method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7137041B2 (en) * 2003-06-20 2006-11-14 International Business Machines Corporation Methods, systems and computer program products for resolving problems in an application program utilizing a situational representation of component status
CN101060436A (en) * 2007-06-05 2007-10-24 杭州华三通信技术有限公司 A fault analyzing method and device for communication equipment
US8762797B2 (en) * 2011-04-29 2014-06-24 Google Inc. Method and apparatus for detecting memory access faults
CN102981943A (en) * 2012-10-29 2013-03-20 新浪技术(中国)有限公司 Method and system for monitoring application logs
CN103793288A (en) * 2014-02-14 2014-05-14 北京邮电大学 Software watchdog system and method
CN104503892A (en) * 2014-12-19 2015-04-08 宇龙计算机通信科技(深圳)有限公司 Terminal exception processing method and device and terminal
CN105004957A (en) * 2015-07-31 2015-10-28 福州瑞芯微电子股份有限公司 SD card test method and test device
CN105224443A (en) * 2015-10-09 2016-01-06 广州视睿电子科技有限公司 A kind of method and apparatus of Android terminal show log information
CN105743712A (en) * 2016-04-12 2016-07-06 中国铁道科学研究院电子计算技术研究所 PIS (Passenger Information System) external interface monitoring system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王彤彤;韩文报;王航: "基于API监控的服务程序防御技术", 《计算机工程与科学》 *

Cited By (38)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107886242A (en) * 2017-11-10 2018-04-06 平安科技(深圳)有限公司 Data monitoring method, device, computer equipment and storage medium
CN108282517A (en) * 2017-12-21 2018-07-13 福建天泉教育科技有限公司 A kind of method and terminal of web services upgrading
CN108052452A (en) * 2017-12-29 2018-05-18 北京酷我科技有限公司 The visual optimization method that a kind of daily record is checked and accepted
CN108255623A (en) * 2018-01-22 2018-07-06 深圳市卓讯信息技术有限公司 Realize the data exchange monitoring method and device of thread inside and outside dual reconciliation mechanism
CN108255623B (en) * 2018-01-22 2022-03-15 深圳市卓讯信息技术有限公司 Data exchange monitoring method and device for realizing internal and external double account checking mechanism of thread
CN108363762A (en) * 2018-02-05 2018-08-03 广州阿里巴巴文学信息技术有限公司 A kind of collection processing method of user trajectory, device and terminal device
CN108345518A (en) * 2018-03-12 2018-07-31 张立江 A kind of data recovery system after software crash and its restoration methods
CN108762966A (en) * 2018-06-05 2018-11-06 中国平安人寿保险股份有限公司 System exception hold-up interception method, device, computer equipment and storage medium
CN110825611A (en) * 2018-08-14 2020-02-21 深圳兆日科技股份有限公司 Abnormal program analysis method and device and computer readable storage medium
CN109460343A (en) * 2018-09-10 2019-03-12 平安科技(深圳)有限公司 System exception monitoring method, device, equipment and storage medium based on log
CN109344060A (en) * 2018-09-20 2019-02-15 迈普通信技术股份有限公司 A kind of analysis method and device of automatic test
CN110032487A (en) * 2018-11-09 2019-07-19 阿里巴巴集团控股有限公司 Keep Alive supervision method, apparatus and electronic equipment
CN111290927A (en) * 2018-12-06 2020-06-16 北京京东尚科信息技术有限公司 Data monitoring method and device
CN111309584B (en) * 2018-12-11 2024-02-23 迈普通信技术股份有限公司 Data processing method, device, electronic equipment and storage medium
CN111309584A (en) * 2018-12-11 2020-06-19 迈普通信技术股份有限公司 Data processing method and device, electronic equipment and storage medium
CN109726272A (en) * 2018-12-20 2019-05-07 杭州数梦工场科技有限公司 Audit regulation recommended method and device
CN110059491A (en) * 2019-03-16 2019-07-26 平安城市建设科技(深圳)有限公司 Data import monitoring method, device, equipment and readable storage medium storing program for executing
CN110267215A (en) * 2019-05-21 2019-09-20 深圳壹账通智能科技有限公司 A kind of data detection method, equipment and storage medium
CN110267215B (en) * 2019-05-21 2022-07-08 深圳壹账通智能科技有限公司 Data detection method, equipment and storage medium
WO2020237877A1 (en) * 2019-05-27 2020-12-03 平安科技(深圳)有限公司 Log monitoring method and apparatus, terminal, and storage medium
CN110690992B (en) * 2019-09-16 2022-03-29 中盈优创资讯科技有限公司 Network cutover abnormity identification method and device
CN110690992A (en) * 2019-09-16 2020-01-14 中盈优创资讯科技有限公司 Network cutover abnormity identification method and device
CN110764977B (en) * 2019-09-27 2023-11-10 赛诺贝斯(北京)营销技术股份有限公司 Alarm method and device for realizing system safety
CN110764977A (en) * 2019-09-27 2020-02-07 赛诺贝斯(北京)营销技术股份有限公司 Alarm method and device for realizing system safety
WO2021212409A1 (en) * 2020-04-23 2021-10-28 Citrix Systems, Inc. Identification of log events for computing systems
CN112464066A (en) * 2020-11-25 2021-03-09 中国信息安全测评中心 Method and system for monitoring data crawling process
CN112464066B (en) * 2020-11-25 2024-03-15 中国信息安全测评中心 Monitoring method and system for data crawling process
CN113778780A (en) * 2020-11-27 2021-12-10 北京京东尚科信息技术有限公司 Application stability determination method and device, electronic equipment and storage medium
CN113778780B (en) * 2020-11-27 2024-05-17 北京京东尚科信息技术有限公司 Application stability determining method and device, electronic equipment and storage medium
CN112685045A (en) * 2020-12-28 2021-04-20 北京达佳互联信息技术有限公司 Page source file processing method and device, electronic equipment and storage medium
CN112925675A (en) * 2021-02-26 2021-06-08 北京百度网讯科技有限公司 Recovery method and device for small program
CN112925675B (en) * 2021-02-26 2023-08-01 北京百度网讯科技有限公司 Recovery method and device for applet
CN113268377A (en) * 2021-04-25 2021-08-17 山东英信计算机技术有限公司 Abnormal state data backup method, system and storage medium
CN114629786A (en) * 2022-03-22 2022-06-14 康键信息技术(深圳)有限公司 Log real-time analysis method, device, storage medium and system
CN114816942B (en) * 2022-06-29 2022-09-02 智者四海(北京)技术有限公司 Mobile terminal application stability monitoring method and device, electronic equipment and storage medium
CN114816942A (en) * 2022-06-29 2022-07-29 智者四海(北京)技术有限公司 Mobile terminal application stability monitoring method and device, electronic equipment and storage medium
CN117493127A (en) * 2023-12-29 2024-02-02 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium
CN117493127B (en) * 2023-12-29 2024-04-05 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium

Also Published As

Publication number Publication date
CN107301115B (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN107301115A (en) Application exception is monitored and restoration methods and equipment
Du et al. Spell: Streaming parsing of system event logs
US8069374B2 (en) Fingerprinting event logs for system management troubleshooting
US10810074B2 (en) Unified error monitoring, alerting, and debugging of distributed systems
CN109240886B (en) Exception handling method, exception handling device, computer equipment and storage medium
Mirgorodskiy et al. Problem diagnosis in large-scale computing environments
Xu et al. Largescale system problem detection by mining console logs
EP3674918B1 (en) Column lineage and metadata propagation
CN101882102A (en) Be used for the system that automated computer is supported
Xu et al. Experience mining Google's production console logs
CN101639803A (en) Exception handling method and exception handling device for multithread application system
CN104636130A (en) Method and system for generating event trees
CN102819489A (en) Software reliability designing method driven by defects
US8918765B2 (en) Auto-documenting based on real-time analysis of code execution
CN108089978A (en) A kind of diagnostic method for analyzing ASP.NET application software performance and failure
He et al. An empirical study of log analysis at Microsoft
CN109992476A (en) A kind of analysis method of log, server and storage medium
CN103152219A (en) Event monitoring system and event monitoring method of computer network system
Lu et al. Iaso: an autonomous fault-tolerant management system for supercomputers
He et al. Using software dependency to bug prediction
US20170270038A1 (en) Methods and systems for anomaly detection
Murtaza et al. On the comparison of user space and kernel space traces in identification of software anomalies
CN112685370B (en) Log collection method, device, equipment and medium
Tibermacine et al. A process to identify relevant substitutes for healing failed WS-* orchestrations
CN113806178A (en) Cluster node fault detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant