CN109359094A - A kind of full link tracing method and device of distributed system journal - Google Patents

A kind of full link tracing method and device of distributed system journal Download PDF

Info

Publication number
CN109359094A
CN109359094A CN201810877216.4A CN201810877216A CN109359094A CN 109359094 A CN109359094 A CN 109359094A CN 201810877216 A CN201810877216 A CN 201810877216A CN 109359094 A CN109359094 A CN 109359094A
Authority
CN
China
Prior art keywords
data
cluster
configuration
server
cluster server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810877216.4A
Other languages
Chinese (zh)
Other versions
CN109359094B (en
Inventor
丁海苗
郭雅雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dig Wealth Network Technology Co Ltd
Original Assignee
Dig Wealth Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dig Wealth Network Technology Co Ltd filed Critical Dig Wealth Network Technology Co Ltd
Priority to CN201810877216.4A priority Critical patent/CN109359094B/en
Publication of CN109359094A publication Critical patent/CN109359094A/en
Application granted granted Critical
Publication of CN109359094B publication Critical patent/CN109359094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The present invention relates to a kind of full link tracing method and devices of distributed system journal.The described method includes: S1, creation configuration file configures system, executes by following below scheme: configuration cluster server;Configure cluster dependence;Configuration data logical relation;S2 is read by application program and parses configuration file acquisition key message;S3 obtains the life course of system data according to key message.Described device includes system configuration unit, information acquisition unit and cluster Traversal Unit.The full link tracing of data logging is abstracted into three configuration files, by corresponding application programs read and parse these configuration files can obtain the corresponding server info of each cluster, system upstream and downstream sequence system data between logical relation these key messages, it may be implemented to bury a little in no code, the one-touch life course for obtaining a system data, and the problem of encountered in position line or in test process.

Description

A kind of full link tracing method and device of distributed system journal
Technical field
The present invention relates to log tracing system field more particularly to a kind of full link tracing method of distributed system journal and Device.
Background technique
There is a large amount of distributed server in present Internet company, can be through excessive after each request is routed through A operation system simultaneously tracks, and generates the access of many DB, but the data of these dispersions are located at different servers, by Different development group management all helps problem investigation or process optimization limited.Once going wrong on line, will go out Now all development groups being related to are added to the queue of problem investigation, waste valuable exploit natural resources.If there is set of system energy The time of problem generation, place, by the solution efficiency for the problem that greatly improves, when shortening the influence of problem on line is accurately positioned Between.The complete calling link of each request is tracked, the business datum of each service in call chain road is collected, location data occurs different Normal reason also becomes each company's urgent need.
Log management platform is built using ELK by current numerous companies, and ELK includes that (data store, is fast ElasticSearch Quick checking is ask), logstash (log collections), the kibana graphical interfaces of ElasticSearch data (displaying).Kibana is one A graphical interfaces can be stored in the inner data of ElasticSearch (ES) by conditional information retrieval above, be equivalent to and provide ES's Visualized operation manager.
There is the log tracing system built based on Elasticsearch at present, wherein needing to use log transmission tool, mesh Preceding available delivery means have: Logstash, Filebeat, Fluentd, rsyslog, syslog-ng and Logagent.Base In the Log Analysis System of logstash+Elasticsearch+kibana combination.For logstash, the packet that needs to configure It includes: 1, data source 2, definition data format 3, output configuration (being output to elasticsearch).The above configuration will be saved in Then logstash.conf runs logstash, it can be seen that logstash can inquire the ownership place of IP automatically, and will ask The device field of the inside is asked to be analyzed.It is required to be configured with for Elasticsearch and kibana: 1, Elasticsearch uses default configuration, configuration name config/elasticsearch.yml.Wherein Elasticsearch default is monitored in 9200 ports, can it be inquired and be managed.2, Kibana does not need special match yet It sets, default is monitored in 5601 ports.
The major advantage of Logstash is its flexible configuration, possesses a variety of customizable plug-in units, such as: input, filtering Device, output are stored so as to obtain data abundant and send it to target.But the disadvantage of logstash simultaneously Clearly, cross-system data cannot be associated by being mainly reflected in one, second is that key inquiry cannot be customized, third is that performance and money Source consumption problem, speed can be slow when big data quantity.So needing when selecting logstash in view of clothes The performance of business device.If server performance is poor, the log transmission tool substitution an of lightweight is just needed at this time logstash。
Know by above-mentioned analysis, Log Administration System can be realized inquiry and record to different serve logs, but not Processing and circulation can quickly and conveniently be obtained in the data of each system.
It is buried in code a little, is also able to achieve full link to flow into the scheme of data creation one unique id of next system Log query, but the program needs to put into more manpower and material resources, modifies original code, not only influenced the performance of system but also It is possible that introducing new problem to system.
Summary of the invention
To solve the above-mentioned problems, the purpose of the present invention is to provide a kind of full link tracing methods of distributed system journal And device.The full link tracing of data logging is abstracted into three configuration files, i.e. cluster server configures, and cluster dependence is matched It sets and is configured with data logical relation, each cluster pair can be obtained by being read by corresponding application programs and parsing these configuration files These key messages of logical relation between the upstream and downstream sequence and system data of the server info, system answered, according to above pass Key information may be implemented to bury a little in no code, utmostly reduce the intervention of exploitation, tester, and one-touch acquisition one is The life course for data of uniting, and the problem of encountered in position line or in test process.
In order to achieve the above purpose, the embodiment of the present application is achieved in that
A kind of full link tracing method of distributed system journal provided by the embodiments of the present application, comprising:
S1, creation configuration file configure system, execute by following below scheme:
Configure cluster server;
Configure cluster dependence;
Configuration data logical relation;
S2 is read by application program and parses configuration file acquisition key message;
S3 obtains the life course of system data according to key message.
As optimal technical scheme, the configuration cluster server, comprising:
Define the unique identification of every group of cluster server;
Increase and decrease server under every group of cluster server.
As optimal technical scheme, the configuration cluster dependence, comprising:
Define upstream cluster server and downstream cluster server;
Establish the corresponding relationship between upstream cluster server and downstream cluster server.
As optimal technical scheme, a upstream cluster server can correspond to one or more downstream cluster servers.
As optimal technical scheme, the configuration data logical relation, comprising:
Define data line index;
Configuring has the server of data variation from upstream cluster server and/or downstream cluster server under every data line Obtain the rule of data;
Wherein, the rule includes the transition rule of data and the processing rule of data.
As optimal technical scheme, the key message in the S2 includes: the corresponding server info of each cluster, every group Logical relation between the upstream and downstream sequence and system data of cluster server.
As optimal technical scheme, the S3 includes:
S31 provides a system data;
S32 traverses corresponding cluster service in cluster server configuration file using the key message as querying condition Device;
S33 exports the data line where the system data.
As optimal technical scheme, the S32 is executed by following below scheme:
The system data provided using in critical data obtained in S2 and S31 writes functional based method as function parameter, Servers-all is traversed, affairs relevant to the system data in S1 are inquired;
Upstream and downstream cluster server is inquired according to cluster dependence configuration file, is divided in two branch Ergodic Theories Remaining cluster server, a branch are upstream searched one by one, and another branch downstream searches one by one;Search upstream or under When swimming cluster server, needs to read mathematical logic relation configuration file and obtain currently between upstream or downstream cluster server Data conversion relationship.
As optimal technical scheme, in S2, after traversing warning message or error message, traversal is jumped out.
The full link tracing device of a kind of distributed system journal provided by the embodiments of the present application, comprising:
System configuration unit, for create configuration file configuration system, the configuration file include cluster server configuration, The configuration of cluster dependence and the configuration of data logical relation;
Information acquisition unit obtains key message for configuration file to be read and parsed by application program;
Cluster Traversal Unit is used for input system data, the life course of the system data is obtained according to key message.
The present invention has the advantages that
1. this programme is the scheme of complete set inquired the full link of critical data log, data warp can be provided Cross the information that each cluster server leaves, warning and mistake etc..
2. this programme application is simple, it is not required to bury a little in original system code, it is a large amount of does not need developer's investment Manpower and material resources.
The problem of 3. this programme is easy to operate, can be to encounter in one-touch position line or in test process, orientation problem The time of saving is also directly proportional to the quantity of cluster.If there are five systems, it will save for 4/5 log query time.
Detailed description of the invention
Fig. 1 is the flow chart of method in the present invention.
Fig. 2 is the flow chart of S3 in the method for the present invention.
Fig. 3 is the system architecture diagram of the embodiment of the present invention.
Fig. 4 is the schematic diagram that the present invention executes S3.
Fig. 5 is the functional block diagram of apparatus of the present invention.
Specific embodiment
The preferred embodiment of this patent is described in further detail with reference to the accompanying drawing.
It is as shown in Figure 1 a kind of implementation of a kind of full link tracing method of distributed system journal, this method comprises:
S1, creation configuration file configure system, execute by following below scheme:
Configure cluster server;
Configure cluster dependence;
Configuration data logical relation.
Wherein, configuration cluster server includes the unique identification for defining every group of cluster server;In every group of cluster server Lower increase and decrease server.
For example, generating cluster server profile using xml, the extension name of cluster server configuration file is .clusters, cluster server configuration file xml node is as follows: including in father node clusters, child node cluseter Id and servers.Id is the unique identification of the cluster server, not reproducible, cluster server only one id.Increase and decrease Server operates under servers node.For example, SystemA and SystemB is used to carry out mark two group cluster clothes as id Be engaged in device, be associated with the two-server that IP is 192.168.1.1 and 192.168.1.2 under SystemA, above-mentioned SystemA and SystemB gives a definition in child node cluseter, increases the two-server that IP is 192.168.1.1 and 192.168.1.2 Operation is given a definition in servers.
Wherein, configuration cluster server includes defining upstream cluster server and downstream cluster server;Establish upstream collection Corresponding relationship between group's server and downstream cluster server.One upstream cluster server can correspond under one or more Swim cluster server.
For example, generating cluster dependence configuration file using xml, the extension name of cluster dependence configuration file is .relations, cluster dependence configuration file xml node is as follows: in father node relations, child node relation Include upstream and downstream.Using upstream node definition upstream cluster server, saved using downstream The value of point definition downstream cluster server, upstream and downstream must be that cluster server configuration file has existed Id.For example, giving a definition the upstream-downstream relationship of SystemA and SystemB in a relation node, wherein SystemA exists Upstream node is given a definition, and SystemB gives a definition in downstream node, then knows that SystemA is the upper of SystemB Trip.Give a definition the upstream-downstream relationship of SystemB and SystemC in another relation node, wherein SystemB exists Upstream node is given a definition, and SystemB gives a definition in downstream node, then knows that SystemB is the upper of SystemC Trip.The upstream-downstream relationship between any two cluster server can be defined in a manner described.In addition, a upstream cluster server Multiple downstream cluster servers can also be corresponded to, for example, a relation node give a definition SystemA, SystemB and The upstream-downstream relationship of SystemC, wherein SystemA gives a definition in upstream node, and SystemB and SystemC exist Downstream node is given a definition, then knows that SystemA is the upstream of SystemB and SystemC.Wherein, SystemA, SystemB and SystemC is id defined in cluster server configuration file.
Wherein, configuration data logical relation includes defining data line index;Configuring under every data line has data variation Server obtains the rule of data from upstream cluster server and/or downstream cluster server;As shown in figure 3, the rule packet Include the transition rule of data and the processing rule of data.
For example, generating mathematical logic relation configuration file using xml, the extension name of mathematical logic relation configuration file is .logics.Defaulting all data is not no transformational relation, i.e. form and value of the data in all cluster servers are all It is the same.We need to configure .logics file after being processed or shifting in some cluster server.Mathematical logic relationship Configuration file xml node is as follows: this document father node is logics, in child node logic comprising businessId and transfer.One businessId represents a data line, and multiple data lines will configure multiple logic.It is saved in Transfer The variation pattern for needing to list the system data under point has the cluster needs of data variation to provide from upstream and downstream and obtains data Mode, wherein from upstream obtain data mode give a definition in fromUpStream node, from upstream obtain data mode Give a definition in fromDownStream node, no matter providing data in which cluster in this way, we can be obtained on the cluster The data in trip or downstream.Some data be in transmittance process will not the changed or data be located at a number According to the initiation cluster on line and terminate cluster, therefore under a Transfer node, fromUpStream and FromDownStream can only occur one.Transfer node is the specific implementation of outbound logic above and below data, it is defined The data of paternal system (fromUpStream) and subsystem (fromDownStream) how are inquired by the data of present node. For example, the data of paternal system store in the database, can be come out according to the data query of current system, we can make With sentence SELECT Id_A FROM SystemA WHERE Id_B=Value_B.The Id_A checked out is exactly our systems The upstream data of the corresponding data of A and Value_B.Similarly, we can also inquire downstream and correspond to Id_C.Certainly herein Should support a variety of data modes, if only simple mathematical computations, our formulations.If upstream Id obtains downstream id divided by 2, we can directly be write as<fromUpStream>systemA/2</fromUpStream>.These Configuration can allow program to go parsing using which kind of data mode.
S2 is read by application program and parses configuration file acquisition key message.
There is the configuration file of above-mentioned creation, so that it may which newly-built java or other kinds of application program read and parse These configuration files.We will obtain following information: the corresponding server info of every group of cluster, every group of cluster server up and down Logical relation between trip sequence and system data.
S3 obtains the life course of system data according to key message.
The life course of the data refers to flowing of the data in whole life cycle: from creation and initial storage, It is out-of-date deleted to it.
As shown in Figure 2 and Figure 4, S3 includes:
S31 provides the data C in a system data, such as SystemC.For example, systematic name is selected by webUI, Business keyword name (for example buisinessId) is worth (for example: P123456).
S32 traverses corresponding cluster service in cluster server configuration file using the key message as querying condition Device.The S32 is executed by following below scheme:
The system data provided using in critical data obtained in S2 and S31 writes functional based method as function parameter, Servers-all is traversed, after inquiring affairs relevant to the system data in S1, warning message or error message, is jumped out time It goes through;Once detecting warning message or error message, current system title, machine name and specific warning or mistake are printed Log.
Upstream and downstream cluster server is inquired according to cluster dependence configuration file, is divided in two branch Ergodic Theories Remaining cluster server, a branch are upstream searched one by one, and another branch downstream searches one by one;Search upstream or under When swimming cluster server, needs to read mathematical logic relation configuration file and obtain currently between upstream or downstream cluster server Data conversion relationship.
S33 exports the data line where the system data.
The specific executive mode of S3 is illustrated by taking java application program as an example:
The method for designing three parameters of a band, for example queryDataFlow (String systemId, String BusinessId, String value).
Corresponding server in .clusers file is obtained according to systemId, functional based method traversal is write and enters all services Device inquires info associated with the data and jumps out traversal after warning and mistake.BusinessId is in inquiry upstream and downstream system System relationship can be used as condition.
Upstream and downstream system is inquired according to .relations, two branches is divided to go to traverse remaining cluster.One branch to Upstream is searched one by one, and another branch downstream searches one by one.
.logics configuration file is read when searching upstream (or downstream) cluster, obtain current and upstream (or downstream) Data conversion relationship between cluster, if the relationship can be embodied from database, after can use data base querying conversion Then data arrive the inquiry associated info of translated data in upstream (or downstream) cluster, warning and mistake;If the relationship It is calculated by specific algorithm, then only needs to add the corresponding method of the algorithm in our program code, then call This method come obtain conversion after data.
The full link tracing of a kind of distributed system journal as shown in Figure 5, shown device include:
System configuration unit 51, for creating configuration file configuration system, the configuration file includes that cluster server is matched It sets, the configuration of cluster dependence and data logical relation configure;
Information acquisition unit 52 obtains key message for configuration file to be read and parsed by application program;
Cluster Traversal Unit 53 is used for input system data, the life course of the system data is obtained according to key message.

Claims (10)

1. a kind of full link tracing method of distributed system journal characterized by comprising
S1, creation configuration file configure system, execute by following below scheme:
Configure cluster server;
Configure cluster dependence;
Configuration data logical relation;
S2 is read by application program and parses configuration file acquisition key message;
S3 obtains the life course of system data according to key message.
2. a kind of full link tracing method of distributed system journal according to claim 1, which is characterized in that the configuration Cluster server, comprising:
Define the unique identification of every group of cluster server;
Increase and decrease server under every group of cluster server.
3. a kind of full link tracing method of distributed system journal according to claim 1, which is characterized in that the configuration Cluster dependence, comprising:
Define upstream cluster server and downstream cluster server;
Establish the corresponding relationship between upstream cluster server and downstream cluster server.
4. a kind of full link tracing method of distributed system journal according to claim 3, which is characterized in that a upstream Cluster server can correspond to one or more downstream cluster servers.
5. a kind of full link tracing method of distributed system journal according to claim 1, which is characterized in that the configuration Mathematical logic relationship, comprising:
Define data line index;
Configuring has the server of data variation to obtain from upstream cluster server and/or downstream cluster server under every data line The rule of data;
Wherein, the rule includes the transition rule of data and the processing rule of data.
6. a kind of full link tracing method of distributed system journal according to claim 1, which is characterized in that in the S2 Key message include: the corresponding server info of every group of cluster, the upstream and downstream sequence of every group of cluster server and system data Between logical relation.
7. a kind of full link tracing method of distributed system journal according to claim 1, which is characterized in that the S3 packet It includes: S31 and provides a system data;
S32 traverses corresponding cluster server in cluster server configuration file using the key message as querying condition;
S33 exports the data line where the system data.
8. a kind of full link tracing method of distributed system journal according to claim 7, which is characterized in that the S32 It is executed by following below scheme:
The system data provided using in critical data obtained in S2 and S31 writes functional based method as function parameter, traversal Servers-all inquires affairs relevant to the system data in S1;
Upstream and downstream cluster server is inquired according to cluster dependence configuration file, is divided to remaining in two branch Ergodic Theories Cluster server, a branch are upstream searched one by one, and another branch downstream searches one by one;Searching upstream or downstream collection When group's server, needs to read mathematical logic relation configuration file and obtain the currently number between upstream or downstream cluster server According to transformational relation.
9. a kind of full link tracing method of distributed system journal according to claim 7, which is characterized in that in S3, time It goes through to after warning message or error message, jumps out traversal.
10. a kind of full link tracing device of distributed system journal characterized by comprising
System configuration unit, for creating configuration file configuration system, the configuration file includes cluster server configuration, cluster Dependence configuration and the configuration of data logical relation;
Information acquisition unit obtains key message for configuration file to be read and parsed by application program;
Cluster Traversal Unit is used for input system data, the life course of the system data is obtained according to key message.
CN201810877216.4A 2018-08-03 2018-08-03 Distributed system log full-link tracking method and device Active CN109359094B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810877216.4A CN109359094B (en) 2018-08-03 2018-08-03 Distributed system log full-link tracking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810877216.4A CN109359094B (en) 2018-08-03 2018-08-03 Distributed system log full-link tracking method and device

Publications (2)

Publication Number Publication Date
CN109359094A true CN109359094A (en) 2019-02-19
CN109359094B CN109359094B (en) 2021-04-16

Family

ID=65349818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810877216.4A Active CN109359094B (en) 2018-08-03 2018-08-03 Distributed system log full-link tracking method and device

Country Status (1)

Country Link
CN (1) CN109359094B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
CN110636112A (en) * 2019-08-22 2019-12-31 达疆网络科技(上海)有限公司 ES double-cluster solution and method for realizing final data consistency
CN110716842A (en) * 2019-10-09 2020-01-21 北京小米移动软件有限公司 Cluster fault detection method and device
CN111158995A (en) * 2019-11-29 2020-05-15 武汉物易云通网络科技有限公司 Method and system for realizing cross-system log tracking query based on skywalk and ELK platform
CN111638973A (en) * 2020-05-11 2020-09-08 紫光云技术有限公司 Method for tracing execution sequence of calculation by link
CN112363855A (en) * 2020-11-13 2021-02-12 北京基调网络股份有限公司 Call chain data generation method, topology generation method and system and computer equipment
CN112486786A (en) * 2020-11-12 2021-03-12 贝壳技术有限公司 Calling link tracking method and device
CN112737856A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Link tracking method and device, storage medium and electronic device
CN114691707A (en) * 2022-05-27 2022-07-01 云账户技术(天津)有限公司 Online cluster service configuration method, system, network equipment and storage medium
CN114817340A (en) * 2022-06-30 2022-07-29 深圳红途科技有限公司 Data tracing method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain
CN108183927A (en) * 2017-11-22 2018-06-19 链家网(北京)科技有限公司 The monitoring method and system that a kind of distributed system link calls
CN108228432A (en) * 2016-12-12 2018-06-29 阿里巴巴集团控股有限公司 A kind of distributed link tracking, analysis method and server, global scheduler
US20180191811A1 (en) * 2016-12-31 2018-07-05 UBTECH Robotics Corp. Distributed server systems and data processing methods
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108228432A (en) * 2016-12-12 2018-06-29 阿里巴巴集团控股有限公司 A kind of distributed link tracking, analysis method and server, global scheduler
US20180191811A1 (en) * 2016-12-31 2018-07-05 UBTECH Robotics Corp. Distributed server systems and data processing methods
CN108183927A (en) * 2017-11-22 2018-06-19 链家网(北京)科技有限公司 The monitoring method and system that a kind of distributed system link calls
CN108038389A (en) * 2017-12-08 2018-05-15 福建亿榕信息技术有限公司 Method and device based on the storage e-file audit-trail daily record of block chain
CN108304724A (en) * 2018-01-25 2018-07-20 中国地质大学(武汉) Document is traced to the source device, system and method

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
CN110636112A (en) * 2019-08-22 2019-12-31 达疆网络科技(上海)有限公司 ES double-cluster solution and method for realizing final data consistency
CN110716842B (en) * 2019-10-09 2023-11-21 北京小米移动软件有限公司 Cluster fault detection method and device
CN110716842A (en) * 2019-10-09 2020-01-21 北京小米移动软件有限公司 Cluster fault detection method and device
CN111158995A (en) * 2019-11-29 2020-05-15 武汉物易云通网络科技有限公司 Method and system for realizing cross-system log tracking query based on skywalk and ELK platform
CN111158995B (en) * 2019-11-29 2020-12-29 武汉物易云通网络科技有限公司 Method and system for realizing cross-system log tracking query based on skywalk and ELK platform
CN111638973A (en) * 2020-05-11 2020-09-08 紫光云技术有限公司 Method for tracing execution sequence of calculation by link
CN112486786A (en) * 2020-11-12 2021-03-12 贝壳技术有限公司 Calling link tracking method and device
CN112363855A (en) * 2020-11-13 2021-02-12 北京基调网络股份有限公司 Call chain data generation method, topology generation method and system and computer equipment
CN112737856B (en) * 2020-12-31 2023-02-03 青岛海尔科技有限公司 Link tracking method and device, storage medium and electronic device
CN112737856A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Link tracking method and device, storage medium and electronic device
CN114691707A (en) * 2022-05-27 2022-07-01 云账户技术(天津)有限公司 Online cluster service configuration method, system, network equipment and storage medium
CN114817340A (en) * 2022-06-30 2022-07-29 深圳红途科技有限公司 Data tracing method and device, computer equipment and storage medium
CN114817340B (en) * 2022-06-30 2022-09-13 深圳红途科技有限公司 Data tracing method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109359094B (en) 2021-04-16

Similar Documents

Publication Publication Date Title
CN109359094A (en) A kind of full link tracing method and device of distributed system journal
Hartig SPARQL for a Web of Linked Data: Semantics and computability
US11163731B1 (en) Autobuild log anomaly detection methods and systems
US6941557B1 (en) System and method for providing a global real-time advanced correlation environment architecture
US9374278B2 (en) Graphic user interface based network management system to define and execute troubleshooting procedure
CN107451034A (en) A kind of big data cluster log management apparatus, method and system
CN102196478B (en) Diagnosis method and system for failure of network management system
CN113067883B (en) Data transmission method, device, computer equipment and storage medium
CN105095048A (en) Processing method for alarm correlation of monitoring system based on business rules
CN106062751A (en) Managing data profiling operations related to data type
CN110866029B (en) sql statement construction method, device, server and readable storage medium
CN114265945A (en) Blood relationship extraction method and device and electronic equipment
US20230040635A1 (en) Graph-based impact analysis of misconfigured or compromised cloud resources
CN110019158A (en) A kind of method and apparatus of monitoring data quality
CN115827380A (en) Cloud platform monitoring method and cloud platform monitoring system
US20090157674A1 (en) Device level performance monitoring and analysis
CN108345658A (en) Algorithm calculates decomposing process, server and the storage medium of track
CN114817389A (en) Data processing method, data processing device, storage medium and electronic equipment
JP2006025434A (en) System and method for high capacity fault correlation
US20080222381A1 (en) Storage optimization method
CN110806973A (en) Automatic generation method and device of interface message
CN115617750A (en) Log display method and device, electronic equipment and nonvolatile storage medium
CN110750582A (en) Data processing method, device and system
Le Zou et al. On synchronizing with web service evolution
CN113824589B (en) RESTful-based slicing capability open interface mapping method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant