CN109062774A - Log processing method, device and storage medium, server - Google Patents

Log processing method, device and storage medium, server Download PDF

Info

Publication number
CN109062774A
CN109062774A CN201810642922.0A CN201810642922A CN109062774A CN 109062774 A CN109062774 A CN 109062774A CN 201810642922 A CN201810642922 A CN 201810642922A CN 109062774 A CN109062774 A CN 109062774A
Authority
CN
China
Prior art keywords
log
target traffic
compression
server
analysis
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810642922.0A
Other languages
Chinese (zh)
Inventor
韩琪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201810642922.0A priority Critical patent/CN109062774A/en
Priority to PCT/CN2018/108058 priority patent/WO2019242148A1/en
Publication of CN109062774A publication Critical patent/CN109062774A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to traffic, computer networks to calculate, data analysis, retrieval, storage, redundancy technique field, more particularly to a kind of log processing method provided in an embodiment of the present invention, it include: by target traffic Log backup into corresponding network memory, network memory is assigned internet protocol address;The server for being used to analyze target traffic log is linked to internet protocol address, so that the server analyzes target traffic log;Target traffic log compression after analysis is obtained into compression log, the filing path specified according to network memory is stored log is compressed.Log is replicated away by proprietary network and is analyzed again, it ensure that timeliness also reduces the excessive occupancy analysis of log analysis and compression all occupies the resources such as cpu, by the way that log compression is backuped to network memory, and the server for analyzing log is hung to the path of the network memory of backup log, it realizes distributed analysis and compression, solves the performance bottleneck of analysis.

Description

Log processing method, device and storage medium, server
Technical field
The present invention relates to traffic, computer networks to calculate, data analysis, retrieval, storage, redundancy technique field, specifically relates to And a kind of log processing method, device and computer readable storage medium, server.
Background technique
With the fast development of internet industry, the especially sudden emergence of mobile terminal application, the data explosion of a new round The gate in epoch oneself through opening, the mutual competition mouth of all kinds of application on site becomes from thermalization.Wherein, partial log can not only be anti- The operation conditions of server is answered, another part log is even more to provide the important indicator of development plan for business.Particularly, it is talking about In business system, due to needing to analyze abnormal speech channel, or inquiry of the inquiry user for traffic, it can only pass through tserver days Will is analyzed, complete different due to log-structured and web, and is divided into active and standby log, and active and standby can all be exported Log, need to distinguish it is active and standby, analysis become extremely difficult, in addition further relate to cross-platform telephone traffic transfer, call-data analysis caused to become Must be difficult, it can be cleaned additionally, due to log, program itself does not back up.In addition the log amount generated in a full platform is non- Chang great, the tserver log of single platform log amount per second all occupy cpu higher in 5M or so, analysis and compression, and separate unit can not expire Foot becomes the bottleneck of traffic log analysis and positioning so as to cause the tserver log analysis of single platform.
Summary of the invention
To overcome the above technical problem, the tserver log analysis of especially single platform becomes traffic log analysis and determines The problem of bottleneck of position, spy propose following technical scheme:
A kind of log processing method provided in an embodiment of the present invention, comprising:
By target traffic Log backup into corresponding network memory, the network memory is assigned network protocol Address;
The server for being used to analyze the target traffic log is linked to the internet protocol address, so that the clothes Business device analyzes the target traffic log;
Target traffic log compression after analysis is obtained into compression log, the filing road specified according to the network memory Diameter stores the compression log.
Further, described by the server for being used to analyze the target traffic log with being linked to the network protocol Location, so that after the server analyzes the target traffic log, further includes:
The critical field in the target traffic log after extraction and analysis, by critical field storage to database In.
Preferably, the critical field is stored in the database with indexed mode.
Further, the compression log is stored in the filing path specified according to the network memory Later, further includes:
The target traffic log after deleting the analysis in the network memory.
Further, the compression log is stored in the filing path specified according to the network memory In after, further includes:
Construct log corresponding with web-query interface and that the compression log can be got from the network memory Query interface.
Further, described by target traffic Log backup into corresponding network memory before, further includes:
Determine whether current log is the target for needing to be backed up according to default key message and preset matching rule Traffic log;
When determining the current log is the target traffic log for needing to be backed up, the target traffic will be backed up The server of log is switched to server corresponding with the target traffic log.
Preferably, the preset matching rule is canonical matching rule.
Further, it is obtained among compression log in the target traffic log compression by after analysis, further includes:
The log of target traffic is temporally divided into the target traffic log of unit interval;Two neighboring unit interval Target traffic log in, the target traffic log of previous unit interval, comprising the latter unit interval target words The target traffic log content of front preset time period in business log, and mark the target traffic log content coherent as the time Property verification content;The target traffic log of the unit interval is compressed respectively.
A kind of log processing device is additionally provided in the embodiment of the present invention, comprising:
Backup module is used for by target traffic Log backup into corresponding network memory, the network memory quilt It is assigned internet protocol address;
Link module, for by the server for being used to analyze the target traffic log with being linked to the network protocol Location, so that the server analyzes the target traffic log;
Compression module obtains compression log for the target traffic log compression after analyzing, according to the network storage The specified filing path of device stores the compression log.
A kind of computer readable storage medium is additionally provided in the embodiment of the present invention, on the computer readable storage medium It is stored with computer program, which realizes log processing method described in any technical solution when being executed by processor.
A kind of server is additionally provided in the embodiment of the present invention includes:
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and quilt It is configured to be executed by one or more of processors, one or more of application programs are configured to carry out according to any skill Log processing method described in art scheme.
Compared with the prior art, the present invention has the following beneficial effects:
1, a kind of log processing method provided in an embodiment of the present invention, comprising: by target traffic Log backup to corresponding In network memory, the network memory is assigned internet protocol address;The target traffic log will be used to analyze Server is linked to the internet protocol address, so that the server analyzes the target traffic log;It will divide Target traffic log compression after analysis obtains compression log, and the filing path specified according to the network memory is by the compression Log is stored.Log is replicated away by proprietary network and is analyzed again, and it is excessive to ensure that timeliness also reduces log analysis Occupancy analysis and compression all occupy the resources such as cpu, by the way that log compression is backuped to network memory, and log will be analyzed Server hangs the path of the network memory of backup log, enables and stores log memory and analyze the server one of log One is corresponding, when needing to analyze log, is just able to achieve the analysis to log by the network memory path of extension, realizes distributed Analysis and compression, solve the performance bottleneck of analysis.
2, a kind of log processing method provided in an embodiment of the present invention will be used to analyze the target traffic log described Server be linked to the internet protocol address so that the server carries out analyzing it to the target traffic log Afterwards, further includes: the critical field in the target traffic log after extraction and analysis deposits the critical field with indexed mode It stores up in database.By extracting the critical field in the log after analysis, when needing to position traffic, just First it can determine that log corresponds to the time of traffic generation, event, node particularly can pass through table according to critical field Form directly shows the practical table of two dimension relevant to corresponding log, and the call will be shown on time by such as clicking specific call Between and object two-dimensional practical table, clicking will call after specific event long-range rpc interface to pass through file name and file Pointer and byte obtain log content;And then the function of quickly positioning is realized, but also user can be determined by critical field Key message in log.
3, a kind of log processing method provided in an embodiment of the present invention is returned described according to what the network memory was specified Shelves path by the compression log stored in after, further includes: construct corresponding with web-query interface and can be from the net The log query interface of the compression log is got in network memory.Due to log-structured and web complete different, and Be divided into active and standby log, and it is active and standby all can output journal, by developing web-query interface, so that can not only pass through Tserver log is analyzed, can be with query and search network by the web interface after the web-query page inputs critical field Log in memory inquires the corresponding logic of traffic, reaches quick analyzing and positioning, and by log interface, obtains compression The detailed data of corresponding log inside log.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is a kind of flow diagram of embodiment in the exemplary embodiments of log processing method of the present invention;
Fig. 2 is the flow diagram of another embodiment in the exemplary embodiments of log processing method of the present invention;
Fig. 3 is log recording example in the exemplary embodiments of log processing method of the present invention;
Fig. 4 is the flow diagram of another embodiment in the exemplary embodiments of log processing method of the present invention;
Fig. 5 is the database table structure of key message in traffic log in the embodiment of the present invention;
Fig. 6 is the flow diagram of another embodiment in the exemplary embodiments of log processing method of the present invention;
Fig. 7 is the structural schematic diagram of the exemplary embodiments of log processing device of the present invention;
Fig. 8 is an example structure schematic diagram of server of the present invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refers to that there are the feature, integer, step, operations, but it is not excluded that in the presence of or addition it is one or more other Feature, integer, step, operation.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
It will be appreciated by those skilled in the art that so-called " application ", " application program ", " application software " and class of the invention It is same concept well known to those skilled in the art like the concept of statement, refers to and instructed by series of computation machine and related data The computer software for being suitable for electronics operation of the organic construction of resource.Unless specified, this name itself is not by programming language Type, rank, the operating system of operation of also not rely by it or platform are limited.In the nature of things, this genus also not by appoint The terminal of what form is limited.
A kind of log processing method provided in the embodiment of the present invention, is mainly used in genesys environment, by this hair The log processing method provided in bright embodiment, by being pre-processed to log, so that analyzing abnormal traffic or inquiry words Business logic becomes more simple, reduces the resource occupied during log analysis, accelerates the speed of call-data analysis.
The embodiment of the present invention provides a kind of log processing method, in a kind of wherein embodiment, as shown in Figure 1, including S100 to S300.
S100: by target traffic Log backup into corresponding network memory, the network memory is assigned net Network protocol address.
The analysis for the logical AND log content that the embodiment of the present invention is generated mainly for the log of identical product.In log In structure, it is divided into master log and standby log, and both output journals, in order to reduce the difficulty of analysis log, in advance by Lord's Day Will is copied in network memory (NAS) by reproducer, therefore at least one corresponding NAS of each product can pass through It is arranged and partial log is stored in specified NAS.NAS (Network Attached Storage) network storage is based on standard Network protocol realizes data transmission, is the computer of the various different operating systems such as the Windows/Linux/Mac OS in network File-sharing and data backup are provided.Itself or a kind of special installation that use is directly connected with network medium realize data storage Mechanism, the network memory is assigned internet protocol address, i.e., the equipment is assigned IP address, so client computer is by filling When the server of data gateway can carry out access visit to it, or even in some cases, any intermediate medium visitor is not needed Family machine can also directly access these equipment.Specifically, further including other steps before by target traffic Log backup into NAS Suddenly, Details as Follows:
Further, in a kind of wherein embodiment, as shown in Fig. 2, it is described by target traffic Log backup to pair Before in the network memory answered, further includes:
S101: according to preset key message and preset matching rule determine current log whether be need to be backed up it is described Target traffic log;
S102: when determining the current log is the target traffic log for needing to be backed up, the mesh will be backed up The server of mark traffic log is switched to server corresponding with the target traffic log.
The log of target traffic is to need analyzed log, since log includes master log and standby log, in determination When target traffic log, by presetting key message and determining whether current log is to need to be analyzed with preset matching rule Target traffic log, by analyzing current log, can determine if log is current such as when target traffic log is master log Based on, deposited inside tserver or sipserver log ' HA Role:Primary' keyword, that is to say, that ' HA Role: Primary' is key message.It just can determine that the log is master log by the key message, due to the service of backup log Device is corresponding with master log and backup log respectively, is determining that current log is the target traffic log for needing analyzed backup When (master log), Role changed to (primary/backup) is being generated, if the server of current backup is not and Lord's Day When the corresponding primary server of will, determines and the server of current backup is switched to primary server corresponding with master log;If When the server of current backup is primary server corresponding with master log, then without switching.When target traffic log is standby When log, processing is identical, and this will not be repeated here.It in addition is not in that above-mentioned switching is crucial inside route service log Word, but according to canonical match request to d+ and do not include that the determination of RequestRegisterAddress keyword is No is master log.
Preferably, the preset matching rule is canonical matching rule.
Canonical matching rule mainly passes through regular expression and is matched, and regular expression is a kind of for operation and checkout The matching tool of string data can carry out text the operation such as matching for a string of special characters, regular expression Matching grammer can be referring specifically to network address: http://www.regular-expressions.infoj.For example, for Fig. 3's Log recording can construct following regular expression and be matched.
Pl=[" Processing s+ (w+) # (w+) s (for s+ ((d+) { 3 } d+) s+at s+ (d+- D+- d+ s d+: d+: d+)) and s+ [(w+)] n+ (Parameters: .+) ", controller, method, client_P,timestamp,http_method,content]。
The data gone out by regular expression matching are by the data as field location corresponding in log profile.Above In regular expression example, the value of controller field correspond to " w+ ", the value of method field corresponds to " w+ ", The value of client_IP field correspond to " (d+) { 3 } d+ ", the value of timestamp field correspond to " d+- d+- d+ s D+: d+: d+ ", the value of http_method field corresponds to " w+ ", and the value of content field corresponds to " Parameters:\.+".It by the matching rule of regular expression, can be matched with log recording, so as to parse simultaneously Extract the daily record data in log recording.Therefore, regular expression can be parsed and be extracted dynamic in log content State data.Preferably, in other implementations, when log is structural data, the preset matching rule can be with It is realized by character string template, character string template is a kind of template matching engine, supports java, the language such as C#, Python, character The matching grammer of string template may refer to network address: http://www.stringtemplate.org/.The matching of character string template It is different with regular expression, however the two can achieve the effect that counterpart will record is extracted, i.e., in a large amount of log In determine whether for target traffic log.
S200: being linked to the internet protocol address for the server for being used to analyze the target traffic log, so that The server analyzes the target traffic log.
After determining the log of target traffic and server corresponding with target traffic log, by the server by mesh Traffic Log backup (duplication) is marked into network memory, in order to enable the server of analysis target traffic log can be correct Target traffic log is found, the server of target traffic log described in link analysis to the internet protocol address, i.e. analysis institute The server for stating target traffic log hangs network memory path identical with storage target traffic log network memory, is needing When analyzing log, analyzing the server of log by the path just can determine position where target traffic log, and according to The log inside network memory is analyzed according to the path.Specifically the server for analyzing log and the path NAS are linked Get up, when carrying out log analysis, analyzes the server just invocation target traffic log directly from NAS of log, or analysis The server of log analyzes target traffic log directly in NAS, and then convenient for target traffic log analysis.In conjunction with above-mentioned Illustrate, after the log of target traffic is copied in network memory by its corresponding proprietary network, then to target traffic log It is analyzed, ensure that the timeliness of log analysis, while also avoided log analysis and occupying the resources such as production system CPU.
S300: the target traffic log compression after analysis is obtained into compression log, is specified according to the network memory Filing path stores the compression log.
Further, in a kind of wherein embodiment, in the filing path specified according to the network memory After the compression log is stored, further includes:
The target traffic log after deleting the analysis in the network memory.
After the completion of log analysis, by the log after analysis by the modes compress backup such as gzip, NAS then will be backuped to In and the log that has been analyzed delete, can be by the Central Plains NAS due to being compressed the log after analysis The log of target traffic is deleted after some analyses, and compression log can reduce the storage sky that log occupies database or index structure Between, the log compressed after the corresponding original of log is analyzed is deleted, the memory space that log occupies database is further decreased, keeps away Exempting from insufficient memory reduces the speed of subsequent query log.Preferably, can rapidly be determined by interface for the ease of subsequent Position inquires compression log, and therefore, compression log is stored according to the filing path that network memory is specified.
Further, in a kind of wherein embodiment, as shown in figure 4, will be used to analyze the target traffic described The server of log is linked to the internet protocol address, so that the server analyzes the target traffic log Later, further includes:
S210: the critical field in the target traffic log after extraction and analysis, by the critical field with the side of index Formula is stored into database.
When analyzing the log in NAS, an index structure (index data base), keyword in extraction and analysis log are constructed Section deposit database (index structure) after the critical field structuring in log, and establishes incidence relation.By the pass in log Key field is for constructing index structure (details such as Fig. 5).The data of each layer substantially need to be configured in index structure with user, It such as can be with the data on entitled index structure top, using number and ID as lower layer of top data arranged side by side;It can certainly Name is referred to as the data on lower layer of top by the data of number and/or ID as top index structure top.It has read in log Key message, such as title of the event of call, number, id and related information etc., and have recorded the finger of the information hereof Pin position and content byte number.The data type at the end of different log top layers is the same.Index data base can be with form exhibition Show, show critical field in the table, each critical field is associated with other critical fielies such as: object, time, event. In Fig. 5, using tbl_files_log as the data form on the entire top relevant to log of index structure, respectively at The data on the peripheries such as tbl_app, tbl_logserver, tbl_ts_log, tbl_rels_log are associated, in each data Data corresponding thereto are all respectively provided in table, the gauge outfit of each table can be used as the top in index structure, pass through Tbl_files_log inquires corresponding gauge outfit, can obtain data corresponding with the gauge outfit according to the gauge outfit.Wherein, in Fig. 5 In, the main and standby relation of tbl_app record application and the corresponding relationship of the application and the server of tbl_logserver.In this way may be used It active and standby be applied to bottom not have to distinguish which is currently main.It can all inquire.Tbl_files_log record log file name and The real time point that the log generates is with log application type and is associated with the application of tbl_app.Tbl_ts_log passes through scanning Tserver log generates traffic time, event title, the index of the key messages such as node, and is associated with tbl_files_log's File id.The on-hook index that tbl_rels_log is generated by scanning tserver log, and it is associated with tbl_files_log's File id.Tbl_uuid_log is associated with tbl_files_ by scanning the uuid and connid relationship that tserver log generates The file id of log.The switching front and back connid relationship that tbl_connid_log is generated by scanning tserver log, and be associated with The file id of tbl_files_log.The time for the sip that tbl_sip_log is generated by scanning sipserver log, event name Claim, ip, and is associated with the file id of tbl_files_log.Tbl_callid_log is generated by scanning sipserver log Callid and uuid relationship, and it is associated with the file id of tbl_files_log.Tbl_urs_log is generated by scanning urs log Time, event title, node, and it is associated with the file id of tbl_files_log.Tbl_mcp_log is generated by scanning mcp log Time, content, and be associated with tbl_files_log file id.Tbl_mcpsession_log is generated by scanning mcp log Uuid and sessionid relationship, and be associated with tbl_files_log file id.Preferably, the critical field is with the side of index Formula stores in the database.
On the basis of above-mentioned, by the critical field recorded in index structure relationship and index structure, looked into the page The content (user inquires a period of time in traffic query page) for asking a period of time generation, will be by the pass in above-mentioned index structure Key field shows relevant to tbl_files_log file table, click specific traffic will show the traffic temporally with The two-dimensional practical table of object will call long-range rpc interface to pass through file name and file pointer after clicking specific event And byte, log content is obtained, actual interface is read from nas by 3 parameters (source_dir, dist_path, fn2) Simultaneously returned content comes out for compression log.Therefore 90% space can be saved by compression (100M is compressed to 10M), additionally it is possible to real Now quickly inquiry, subsequent query just directly extract compressed log.It is of course also possible in the search of query page Engine input critical field is inquired.Simultaneously because the log in original telephone traffic system under genesys environment can not be protected for a long time It deposits, compress backup inside network memory will be aimed at day by the application realizes log keeping for a long time;In addition, in telephone traffic system Problem escalation has time delay, provides foundation by compress backup to analyze passing problem.It should be noted that in the present invention In the embodiment of offer, be only recorded in index structure the key content in target traffic log is a small amount of, it is practical also Many contents are not recorded in index structure, wherein greatly also in target traffic journal file.Therefore, subsequent Query steps in, can be matched by the critical field in the key message and index structure of input, successful match When, corresponding traffic logic just can be found, or determine the corresponding position of traffic logic, the time such as occurred, event Title, node etc..
Further, in a kind of wherein embodiment, as shown in fig. 6, described specified according to the network memory Filing path by the compression log stored in after, further includes:
S310: building is corresponding with web-query interface and the compression log can be got from the network memory Log query interface.
Exploitation constructs log query interface corresponding with web-query interface, in order to which user can be looked by web interface Ask corresponding traffic logic and analyze it positioning etc., so that can not only be analyzed by tserver log, it can also To compress the detailed data in log by web-query log, acquisition, so that cross-platform switching is easy.It inputs and closes in web-query Key field, since it is corresponding with log query interface, the content that web-query interface is inputted passes through the log query Interface gets the detailed data of the corresponding log inside corresponding compression log, that is, inquires the corresponding logic of traffic, real Now rapidly reach quick analyzing and positioning.Specifically, for example, one section of program is arranged in interface, input is crucial in web-query When field (critical field is one or more), that is, starts the section or call this section of program, obtained by corresponding path Compressed package.The file of compression has specific Naming conventions, wherein can receive in log with Apply Names times, web interface To the filename and file pointer and byte-sized of log, interface, which passes through filename specification after receiving, can navigate to this document. Wherein, critical field, the log file name including tserver component, file corresponding application name, corresponding event, event If the time, client's number, the connid of call, queuing message, is related to switching and meeting and cross-platform switching at object Connid, the calluuid for being associated with sip log, client request id, file pointer and byte Sipserver component are except above-mentioned In addition there are also sip signaling key message include the time of signaling, event title, the direction interacted with sip, callid, to and The address from, ip, the log file name of file pointer and byte Urs component, the corresponding application name of file, corresponding event, thing Time of part, object, client's number, call connid client request id, file pointer and byte.Provided by the invention In embodiment, define 2 kinds of functions according to function and realize that one is the detailed content interface for obtaining corresponding event is as follows: interface is passed Enter is one or more of filename, character string, file pointer, numeric type, byte, numeric type.It spreads out of and is One or more of log content, character string type.A kind of interface is the compressed file of acquisition original log, and interface is such as Under: interface is passed to as filename, and character string outflow is file stream, can remain the form of file.Specifically, in conjunction with above Illustrate, in embodiments herein, Details as Follows as follows using code is realized for interface:
Further, it in a kind of wherein embodiment, is pressed in the target traffic log compression by after analysis Among contracting log, further includes:
The log of target traffic is temporally divided into the target traffic log of unit interval;Two neighboring unit interval Target traffic log in, the target traffic log of previous unit interval, comprising the latter unit interval target words The target traffic log content of front preset time period in business log, and mark the target traffic log content coherent as the time Property verification content;The target traffic log of the unit interval is compressed respectively.
For multithreading compressed package situation simultaneously, for example, 3 packets of acquisition segmentation, are followed successively by 9 points packets, 10 points 1 Packet, 11 points packets, three threads compress simultaneously, and generally prior time has first compressed, it is likely that 10 points of packet is very big, leads 11 points of packet is caused first to compress;In decompression, may cause before 11 points of packet comes at 10 points.To solve this problem, each The content of packet, including one section before packet content below, for example, 10 point packets, backmost include 11 0-5 minutes contents of point.Then In decompression, 10 point packets with 11 points of packet can proofread, so that it is determined that 10 points of packet including 11 0-5 minutes contents of point Before 11 points, then again according to time sequence.
A kind of log processing device is also provided in the embodiment of the present invention, in a kind of wherein embodiment, such as Fig. 7 institute Show, comprising:
Backup module 100 is used for by target traffic Log backup into corresponding network memory, the network memory It is assigned internet protocol address;
Link module 200, for the server for being used to analyze the target traffic log to be linked to the network protocol Address, so that the server analyzes the target traffic log;
Compression module 300 obtains compression log for the target traffic log compression after analyzing, deposits according to the network The specified filing path of reservoir stores the compression log.
Further, as shown in fig. 7, a kind of log processing device provided in the embodiment of the present invention, further includes: extract mould Block 210 is deposited the critical field with indexed mode for the critical field in the target traffic log after extraction and analysis It stores up in database.Removing module 310, for deleting the target traffic log after the analysis in the network memory. Module 320 is constructed, for constructing corresponding with web-query interface and the compression day can be got from the network memory The log query interface of will.Judgment module 101, for determining that current log is according to default key message and preset matching rule The no target traffic log being backed up for needs;Switching module 102, for standby to need when determining the current log When the target traffic log of part, the server for backing up the target traffic log is switched to and the target traffic log Corresponding server.Preferably, the preset matching rule is canonical matching rule;Cutting unit 301, by target traffic day Will is temporally divided into the target traffic log of unit interval;It is preceding in the target traffic log of two neighboring unit interval The target traffic log of one unit interval, front preset time period in the target traffic log comprising the latter unit interval Target traffic log content, and mark the target traffic log content as time continuity check content;It compresses respectively The target traffic log of the unit interval.
The embodiment of above-mentioned log processing method may be implemented in a kind of log processing device provided in an embodiment of the present invention, tool Body function realizes the explanation referred in embodiment of the method, and details are not described herein.
A kind of computer readable storage medium provided in an embodiment of the present invention stores on the computer readable storage medium There is computer program, log processing method described in any one technical solution is realized when which is executed by processor.Wherein, institute Stating computer readable storage medium includes but is not limited to any kind of disk (including floppy disk, hard disk, CD, CD-ROM and magneto-optic Disk), ROM (Read-Only Memory, read-only memory), RAM (Random AcceSS Memory, immediately memory), EPROM (EraSable Programmable Read-Only Memory, Erarable Programmable Read only Memory), EEPROM (Electrically EraSable Programmable Read-Only Memory, Electrically Erasable Programmable Read-Only Memory), Flash memory, magnetic card or light card.It is, storage equipment includes by equipment (for example, computer, mobile phone) can read Any medium of form storage or transmission information can be read-only memory, disk or CD etc..
A kind of computer readable storage medium provided in an embodiment of the present invention can intelligently realize above-mentioned log processing side The embodiment of method, log are replicated away by proprietary network and are analyzed again, and it is excessive to ensure that timeliness also reduces log analysis It occupies analysis and compression all occupies the resources such as cpu, by the way that log compression is backuped to network memory, and the clothes that will analyze log Business device hangs the path of the network memory of backup log, enables and stores log memory and analyze the server of log one by one It is corresponding, when needing to analyze log, the analysis to log is just able to achieve by the network memory path of extension, realizes distributed point Analysis and compression, solve the performance bottleneck of analysis;A kind of log processing method is also provided in the embodiment of the present invention, and target is talked about Log backup be engaged in into corresponding network memory, the network memory is assigned internet protocol address;It will be used to analyze institute The server for stating target traffic log is linked to the internet protocol address, so that the server is to the target traffic day Will is analyzed;Target traffic log compression after analysis is obtained into compression log, is returned according to what the network memory was specified Shelves path stores the compression log.In embodiment provided by the invention, by the log of identical product (such as same app) It copies in network memory in time, and then reduces the memory of end product where log occupies app, while by that will analyze The server of the product log is suspended to the path of the network memory of storage log, and day can be analyzed in network memory by realizing Will reduces the resources such as cpu of end product where analysis log occupies app, the log after analysis is compressed, and having divided The log of analysis and compressed backup is deleted, and the memory that log occupies network memory is reduced, and then reduces memory to analysis The influence of log speed.Different product or the different types of log of identical product are respectively stored into corresponding network memory In, and the analysis of progress log and compress backup in its corresponding network memory, realize distributed analysis and compression Backup log, and then solve the bottleneck directly in terminal analysis log, improve the speed of analysis log.Log compression is standby Part, the memory that log occupies network memory can be reduced, corresponding log can be found when ensure that the inquiry of subsequent traffic, After avoiding log in application program from being deleted, the case where appearance cannot carry out traffic inquiry and analysis again.
The embodiment of above-mentioned log processing method may be implemented in computer readable storage medium provided in an embodiment of the present invention, Concrete function realizes the explanation referred in embodiment of the method, and details are not described herein.
In addition, the present invention also provides a kind of servers, as shown in figure 8, the server process in another embodiment The devices such as device 503, memory 505, input unit 507 and display unit 509.It will be understood by those skilled in the art that Fig. 8 shows Structure devices out do not constitute the restriction to Servers-all, may include than illustrating more or fewer components or group Close certain components.Memory 505 can be used for storing application program 501 and each functional module, and the operation of processor 503 is stored in The application program 501 of reservoir 505, thereby executing the various function application and data processing of equipment.Memory 505 can be interior Memory or external memory, or including both built-in storage and external memory.Built-in storage may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), flash Device or random access memory.External memory may include hard disk, floppy disk, ZIP disk, USB flash disk, tape etc..It is disclosed in this invention to deposit Reservoir includes but is not limited to the memory of these types.Memory 505 disclosed in this invention is only used as example rather than as limit It is fixed.
Input unit 507 be used for receive signal input and user entered keyword section and user input execute inquiry The operational order of retrieval.Input unit 507 may include touch panel and other input equipments.Touch panel collects client and exists On or near it touch operation (such as client using any suitable object or attachment such as finger, stylus on touch panel Or the operation near touch panel), and corresponding attachment device is driven according to a pre-set procedure;Other input equipments can To include but is not limited to physical keyboard, function key (such as broadcasting control button, switch key etc.), trace ball, mouse, operating stick Deng one of or it is a variety of.Display unit 509 can be used for showing the information of client's input or be supplied to the information and meter of client Calculate the various menus of machine equipment.The forms such as liquid crystal display, Organic Light Emitting Diode can be used in display unit 509.Processor 503 It is the control centre of computer equipment, using the various pieces of various interfaces and the entire computer of connection, by running or holding The software program and/or module that row is stored in memory 503, and the data being stored in memory are called, it executes various Function and processing data.One or more processors 503 shown in fig. 8 are able to carry out, realize backup module shown in fig. 7 100 function, the function of link module 200, the function of compression module 300, the function of extraction module 210, removing module 310 Function, the building function of module 320, the function of judgment module 101, the function of switching module 102, the function of cutting unit 301.
In one embodiment, the server includes one or more processors 503, and one or more storages Device 505, one or more application program 501, wherein one or more of application programs 501 are stored in memory 505 And be configured as being executed by one or more of processors 503, one or more of application programs 301 are configured to carry out Log processing method described in above embodiments.
A kind of server provided in an embodiment of the present invention can intelligently realize the embodiment of above-mentioned log processing method, Log is replicated away by proprietary network and is analyzed again, ensure that timeliness also reduces the excessive occupancy analysis and pressure of log analysis Contracting all occupies the resources such as cpu, by the way that log compression is backuped to network memory, and the server for analyzing log is hung backup day The path of the network memory of will enables storage log memory and the server of analysis log to correspond, is needing When analyzing log, the analysis to log is just able to achieve by the network memory path of extension, realizes distributed analysis and compression, solution Determined analysis performance bottleneck;A kind of log processing method is also provided in the embodiment of the present invention, by target traffic Log backup Into corresponding network memory, the network memory is assigned internet protocol address;The target words will be used to analyze The server of business log is linked to the internet protocol address, so that the server divides the target traffic log Analysis;Target traffic log compression after analysis is obtained into compression log, the filing path specified according to the network memory will The compression log is stored.It is in embodiment provided by the invention, the log of identical product (such as same app) is multiple in time It makes in network memory, and then reduces the memory of end product where log occupies app, while by the way that the product day will be analyzed The server of will is suspended to the path of the network memory of storage log, and log can be analyzed in network memory by realizing, and reduces The resources such as cpu for analyzing end product where log occupies app, the log after analysis is compressed, and analyzed and by The log of the backup of compression is deleted, and the memory that log occupies network memory is reduced, and then reduces memory to analysis log speed The influence of degree.Different product or the different types of log of identical product are respectively stored into corresponding network memory, and Analysis and the compress backup that log is carried out in its corresponding network memory realize distributed analysis and compress backup day Will, and then solve the bottleneck directly in terminal analysis log, improve the speed of analysis log.Log compression is backed up, it can To reduce the memory that log occupies network memory, corresponding log can be found when ensure that the inquiry of subsequent traffic, is avoided After log in application program is deleted, the case where appearance cannot carry out traffic inquiry and analysis again.
The embodiment of the log processing method of above-mentioned offer, specific function may be implemented in server provided in an embodiment of the present invention It is able to achieve the explanation referred in embodiment of the method, details are not described herein.
The above is only some embodiments of the invention, it is noted that for the ordinary skill people of the art For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered It is considered as protection scope of the present invention.

Claims (10)

1. a kind of log processing method characterized by comprising
By target traffic Log backup into corresponding network memory, the network memory is with being assigned network protocol Location;
The server for being used to analyze the target traffic log is linked to the internet protocol address, so that the server The target traffic log is analyzed;
Target traffic log compression after analysis is obtained into compression log, the filing path specified according to the network memory will The compression log is stored.
2. log processing method according to claim 1, which is characterized in that will be used to analyze the target traffic described The server of log is linked to the internet protocol address, so that the server analyzes the target traffic log Later, further includes:
The critical field in the target traffic log after extraction and analysis stores the critical field to number with indexed mode According in library.
3. log processing method according to claim 1, which is characterized in that described specified according to the network memory Filing path the compression log is stored after, further includes:
The target traffic log after deleting the analysis in the network memory.
4. log processing method according to claim 1, which is characterized in that described specified according to the network memory Filing path by the compression log stored in after, further includes:
Construct log query corresponding with web-query interface and that the compression log can be got from the network memory Interface.
5. log processing method according to claim 1, which is characterized in that it is described by target traffic Log backup to pair Before in the network memory answered, further includes:
Determine whether current log is the target traffic for needing to be backed up according to default key message and preset matching rule Log;
When determining the current log is the target traffic log for needing to be backed up, the target traffic log will be backed up Server be switched to server corresponding with the target traffic log.
6. log processing method according to claim 5, which is characterized in that the preset matching rule is canonical matching rule Then.
7. log processing method according to claim 5, which is characterized in that in the target traffic log by after analysis Compression obtains among compression log, further includes:
The target traffic log is temporally divided into the target traffic log of unit interval;When two neighboring unit Between section target traffic log in, the target traffic log of previous unit interval, the mesh comprising the latter unit interval The target traffic log content of front preset time period in traffic log is marked, and marks the target traffic log content as the time Continuity check content;The target traffic log of the unit interval is compressed respectively.
8. a kind of log processing device characterized by comprising
Backup module, for, into corresponding network memory, the network memory to be assigned by target traffic Log backup There is internet protocol address;
Link module, for the server for being used to analyze the target traffic log to be linked to the internet protocol address, with So that the server analyzes the target traffic log;
Compression module obtains compression log for the target traffic log compression after analyzing, refers to according to the network memory Fixed filing path stores the compression log.
9. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes claim 1 to 7 described in any item log processing methods when the program is executed by processor.
10. a kind of server characterized by comprising
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and are configured To be executed by one or more of processors, one or more of application programs are configured to carry out according to claim 1 The step of to 7 described in any item log processing methods.
CN201810642922.0A 2018-06-21 2018-06-21 Log processing method, device and storage medium, server Pending CN109062774A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810642922.0A CN109062774A (en) 2018-06-21 2018-06-21 Log processing method, device and storage medium, server
PCT/CN2018/108058 WO2019242148A1 (en) 2018-06-21 2018-09-27 Log processing method and apparatus, and storage medium and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810642922.0A CN109062774A (en) 2018-06-21 2018-06-21 Log processing method, device and storage medium, server

Publications (1)

Publication Number Publication Date
CN109062774A true CN109062774A (en) 2018-12-21

Family

ID=64821281

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810642922.0A Pending CN109062774A (en) 2018-06-21 2018-06-21 Log processing method, device and storage medium, server

Country Status (2)

Country Link
CN (1) CN109062774A (en)
WO (1) WO2019242148A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110536031A (en) * 2019-08-30 2019-12-03 上海浦东发展银行股份有限公司信用卡中心 A kind of association of traffic data and integration method
CN111414613A (en) * 2020-03-18 2020-07-14 杭州迪普科技股份有限公司 Log processing method and device
CN111488314A (en) * 2020-03-30 2020-08-04 北京中电华大电子设计有限责任公司 Simulation log analysis method based on Python
CN113064752A (en) * 2019-12-16 2021-07-02 华晨宝马汽车有限公司 Method, system, and computer readable medium for archiving logs
CN113190726A (en) * 2021-04-16 2021-07-30 珠海格力精密模具有限公司 Method for reading CAE (computer aided engineering) modular flow analysis data, electronic equipment and storage medium
CN113297008A (en) * 2021-05-19 2021-08-24 阿里巴巴新加坡控股有限公司 Data processing method and system
CN114697070A (en) * 2021-12-31 2022-07-01 成都思维世纪科技有限责任公司 Method and system for dynamic compression and storage of HTTP (hyper text transport protocol) traffic
CN114936615A (en) * 2022-07-25 2022-08-23 南京大数据集团有限公司 Small sample log information anomaly detection method based on characterization consistency correction

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1199970A (en) * 1998-05-13 1998-11-25 广东省邮电科学技术研究院 Central operation and maintenance system of analog movable communication network B
CN101552842A (en) * 2008-01-09 2009-10-07 埃森哲环球服务有限公司 Call center application data and interoperation architecture for a telecommunication service center
CN102750196A (en) * 2011-04-20 2012-10-24 大连兆阳软件科技有限公司 Data storage and backup system and method
CN103200037A (en) * 2013-04-11 2013-07-10 深圳市共进电子股份有限公司 System log (syslog) storing method
CN105824744A (en) * 2016-03-21 2016-08-03 焦点科技股份有限公司 Real-time log collection and analysis method on basis of B2B (Business to Business) platform
CN107885817A (en) * 2017-11-06 2018-04-06 余帝乾 A kind of method and apparatus based on big data networks congestion control

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9729671B2 (en) * 2014-10-05 2017-08-08 YScope Inc. Systems and processes for computer log analysis
CN106649336B (en) * 2015-10-30 2019-10-25 华为数字技术(苏州)有限公司 A kind of log compression method and log processing equipment, log processing system
CN106897187A (en) * 2017-01-23 2017-06-27 北京思特奇信息技术股份有限公司 A kind of terminal data location mode and device
CN107622084A (en) * 2017-08-10 2018-01-23 深圳前海微众银行股份有限公司 Blog management method, system and computer-readable recording medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1199970A (en) * 1998-05-13 1998-11-25 广东省邮电科学技术研究院 Central operation and maintenance system of analog movable communication network B
CN101552842A (en) * 2008-01-09 2009-10-07 埃森哲环球服务有限公司 Call center application data and interoperation architecture for a telecommunication service center
CN102750196A (en) * 2011-04-20 2012-10-24 大连兆阳软件科技有限公司 Data storage and backup system and method
CN103200037A (en) * 2013-04-11 2013-07-10 深圳市共进电子股份有限公司 System log (syslog) storing method
CN105824744A (en) * 2016-03-21 2016-08-03 焦点科技股份有限公司 Real-time log collection and analysis method on basis of B2B (Business to Business) platform
CN107885817A (en) * 2017-11-06 2018-04-06 余帝乾 A kind of method and apparatus based on big data networks congestion control

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110536031A (en) * 2019-08-30 2019-12-03 上海浦东发展银行股份有限公司信用卡中心 A kind of association of traffic data and integration method
CN113064752B (en) * 2019-12-16 2023-11-21 华晨宝马汽车有限公司 Method, system and computer readable medium for archiving logs
CN113064752A (en) * 2019-12-16 2021-07-02 华晨宝马汽车有限公司 Method, system, and computer readable medium for archiving logs
CN111414613A (en) * 2020-03-18 2020-07-14 杭州迪普科技股份有限公司 Log processing method and device
CN111414613B (en) * 2020-03-18 2023-12-26 杭州迪普科技股份有限公司 Log processing method and device
CN111488314A (en) * 2020-03-30 2020-08-04 北京中电华大电子设计有限责任公司 Simulation log analysis method based on Python
CN111488314B (en) * 2020-03-30 2023-06-30 北京中电华大电子设计有限责任公司 Python-based simulation log analysis method
CN113190726A (en) * 2021-04-16 2021-07-30 珠海格力精密模具有限公司 Method for reading CAE (computer aided engineering) modular flow analysis data, electronic equipment and storage medium
CN113297008A (en) * 2021-05-19 2021-08-24 阿里巴巴新加坡控股有限公司 Data processing method and system
CN113297008B (en) * 2021-05-19 2023-12-12 阿里巴巴新加坡控股有限公司 Data processing method and system
CN114697070A (en) * 2021-12-31 2022-07-01 成都思维世纪科技有限责任公司 Method and system for dynamic compression and storage of HTTP (hyper text transport protocol) traffic
CN114697070B (en) * 2021-12-31 2024-04-02 成都思维世纪科技有限责任公司 Method and system for dynamically compressing and storing HTTP protocol traffic
CN114936615A (en) * 2022-07-25 2022-08-23 南京大数据集团有限公司 Small sample log information anomaly detection method based on characterization consistency correction

Also Published As

Publication number Publication date
WO2019242148A1 (en) 2019-12-26

Similar Documents

Publication Publication Date Title
CN109062774A (en) Log processing method, device and storage medium, server
CN109034993B (en) Account checking method, account checking equipment, account checking system and computer readable storage medium
US10462002B2 (en) Automatically determining requirements for provisioning a hosted computing environment
US10560465B2 (en) Real time anomaly detection for data streams
US10447772B2 (en) Managed function execution for processing data streams in real time
US10776174B2 (en) Managing hosted resources across different virtualization platforms
US11775501B2 (en) Trace and span sampling and analysis for instrumented software
US7827191B2 (en) Discovering web-based multimedia using search toolbar data
US8504597B2 (en) Distributed file system consistency mechanism extension for enabling internet video broadcasting
CN108471366A (en) A kind of stereoscopic monitoring system of facing cloud native applications
CN109800207B (en) Log analysis method, device and equipment and computer readable storage medium
CN101454764A (en) Independent actionscript analytics tools and techniques
US20180329799A1 (en) Analyzing analytic element network traffic
CN109710767B (en) Multilingual big data service platform
CN108900547B (en) Source returning control method and device
CN113656673A (en) Master-slave distributed content crawling robot for advertisement delivery
CN114546756A (en) Method and system for monitoring link data in micro-service architecture system
CN116974948B (en) Service system testing method, system, equipment and medium
CN112685270A (en) System monitoring log acquisition method and device, electronic equipment and medium
EP3010194B1 (en) Method of tracing a transaction in a network
US20230138113A1 (en) System for retrieval of large datasets in cloud environments
CN112486796B (en) Method and device for collecting information of vehicle-mounted intelligent terminal
WO2023278574A1 (en) Streaming analytics using a serverless compute system
CN111782428B (en) Data calling system and method
CN114338494B (en) Service dependency topological relation obtaining method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181221