CN109933462A - Log information processing method - Google Patents
Log information processing method Download PDFInfo
- Publication number
- CN109933462A CN109933462A CN201910138458.6A CN201910138458A CN109933462A CN 109933462 A CN109933462 A CN 109933462A CN 201910138458 A CN201910138458 A CN 201910138458A CN 109933462 A CN109933462 A CN 109933462A
- Authority
- CN
- China
- Prior art keywords
- file
- log information
- fixed time
- size
- backup
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of log information processing method, include the following steps: that log information is constantly written into journal file in a manner of adding;According to the size of the fixed time inspection journal file of setting;Judge whether the size of journal file reaches the threshold value of setting;If the size of journal file reaches threshold value, a delta file copy is created, log information is written into delta file copy in synchronization;Backup is carried out to journal file and generates journal file copy;Clear Log file;Stop that log information is written into delta file copy.By above embodiment, write-in log information can be continued and log information will not be lost.
Description
Technical field
The present invention relates to file processing technology field more particularly to a kind of log information processing methods.
Background technique
Log (log) is mainly used to store and record the details of running situation and user's service condition, these
Information is to look at system running state and checks the main foundation of problem.For example, there are collapse feelings in application program in some software
Condition, then corresponding record can be found from program event log, so that related technical personnel be helped to analyze and solve the problems, such as.
By taking inline system log information as an example, log information can be used to the record of service operation process and operation on line
The monitoring of program can be prompted for the mistake for occurring and being likely to occur by the log information of analysis record, be alerted, may be used also
With statistical service information, is improved for service logic and application program updating provides reliable foundation.
Currently, the truncation and backup of the lasting write-in application log for linux system, mainly there is logrorate rolling
The processing modes such as the big file cutting of the language scripts such as log, shell/python, split.
But regardless of which kind of processing mode, in the case where not triggering using heavily loaded log, (many applications are not also supported or not
Facilitate heavily loaded log), all backup first can be carried out to file with copy/split substantially or cutting is handled, then utilize truncate
Truncation null clear operation is carried out to journal file, and between the operation of this two step, in the case where log is persistently written, it there is day
The possibility that will is lost.
Summary of the invention
The present invention provides a kind of log information processing method to solve above-mentioned technical problem, can continue write-in log information
And log information will not be lost.
In order to solve the above technical problems, the present invention provides a kind of log information processing method, include the following steps: with addition
Log information is constantly written in mode into journal file;The size of the journal file according to the fixed time inspection of setting;
Judge whether the size of the journal file reaches the threshold value of setting;If the size of the journal file reaches threshold value, create
Log information is written into the delta file copy in one delta file copy, synchronization;The journal file is backed up
Generate journal file copy;Empty the journal file;Stop that log information is written into the delta file copy.
Further, after stopping the step of log information is written into the delta file copy, comprising: comparison institute
It states the log information of journal file copy and the delta file copy and removes duplicate log information and then obtain complete
Log information;Backup is carried out to the complete log information and generates backup file;Delete the journal file copy and described
Delta file copy.
Further, after carrying out the step of backup generates backup file to the complete log information, comprising: return
The shelves backup file;The corresponding backup file is cleared up according to the rule of setting.
Further, among the step of filing the backup file, comprising: three files are created, it is respectively important
Info file, warning file and the fatal file that degree successively increases;Search log in the backup file
The log critical field of information, and stored backup file into corresponding document folder according to the type of the log critical field;
Wherein, if including fatal class log critical field in the backup file, the backup file is stored to described
Fatal file;If only including warning class log critical field in the backup file, the backup file is deposited
It stores up to the warning file;If not including fatal class log critical field and warning class in the backup file
Log critical field then stores the backup file to the info file.
Further, among the step of clearing up the corresponding backup file according to the rule of setting, comprising: timing detects
Disk has used space;Wherein, the info file, the warning file and the fatal file are built on
Under the same disk;Judge the threshold value for whether reaching setting with space of the disk;If the disk has used sky
Between reach threshold value, then according to the significance level of the backup file and generate time sequencing the corresponding backup file deleted
It removes or shifts;Wherein, preferentially delete significance level it is low and generate time morning the backup file, and retain significance level height and
Generate the backup file of time closely.
Further, in searching the backup file the step of log critical field of log information, comprising: if
Finding log information in the backup file includes fatal class log critical field, then triggers alarm;According to the backup
Among the step of significance level and generation time sequencing of file are deleted or are shifted to the corresponding backup file, comprising:
Still reach threshold with space what the disk only retained the backup file that significance level is high and the time is close and the disk
Value, then trigger alarm.
Further, the mode of the triggering alarm includes any one in triggering mail, wechat, short message and phone
Communications service.
Further, described fixed among the step of size of the journal file described in the fixed time inspection according to setting
When interval be a fixed value or the fixed time interval is the changing value that can adaptively adjust.
Further, when the fixed time interval is a changing value that can adaptively adjust, to the fixed time interval from
Adapt to adjustment the step of include the following:
An initialization value, a minimum value and a maximum value are set, the initialization value is between the minimum value and the maximum
Between value;The fixed time interval is assigned a value of initialization value;According to journal file described in the fixed time inspection of setting
Size;Judge whether the size of the journal file reaches the threshold value of setting;Whether reached in the size for judging the journal file
To setting threshold value the step of in, if the size of the journal file reaches threshold value, judge that the size of the journal file is
It is no to reach n times of threshold value;If the size of the journal file reaches n times of threshold value, the fixed time interval is assigned a value of (1/n) × sheet
The secondary fixed time interval;Judge whether the fixed time interval is greater than maximum value;If the fixed time interval is less than or equal to maximum value,
The step of then entering the size of the journal file according to the fixed time inspection of setting;If the fixed time interval is greater than
The fixed time interval is then assigned a value of maximum value, and then enters the day according to the fixed time inspection of setting by maximum value
The step of size of will file;In the step of whether size for judging the journal file reaches the threshold value of setting, if institute
The size for stating journal file is less than threshold value, judges whether the size of the journal file is less than or equal to m times of threshold value;If the day
The size of will file is less than or equal to m × threshold value, and the fixed time interval is assigned a value of (1/m) × this described fixed time interval;Judgement
Whether the fixed time interval is less than minimum value;If the fixed time interval is more than or equal to minimum value, enter the institute according to setting
The step of stating the size of journal file described in fixed time inspection;If the fixed time interval is less than minimum value, will be described fixed
When interval be assigned a value of minimum value, and then enter the step of the size of the journal file according to the fixed time inspection of setting
Suddenly;Wherein, n>1,0<m<1.
In order to solve the above technical problems, the present invention also provides a kind of computer readable storage medium, it is described computer-readable
Storage medium is stored with computer program, and the computer program is configured to execute such as any of the above-described embodiment institute by processor
The step in log information processing method stated.
Log information processing method of the invention, has the following beneficial effects:
By continuing that log information is written into journal file in a manner of adding, and reach the threshold of setting in the size of journal file
When value, a newly-built delta file copy and it is synchronous be written log information into delta file copy, and in backup log file and
Just stop that log is written into delta file copy after Clear Log file, can be realized the lasting write-in of log information and not
Log information can be lost.And on backup job process on running application program entirely without influence.
In addition, memory space can be efficiently used by carrying out filing management to backup file and removing in time.
Detailed description of the invention
Fig. 1 is the flow chart of log information processing method first embodiment of the present invention.
Fig. 2 is the flow chart of log information processing method second embodiment of the present invention.
Fig. 3 is the flow chart of log information processing method 3rd embodiment of the present invention.
Fig. 4 is the flow chart of log information processing method fourth embodiment of the present invention.
Specific embodiment
The present invention is described in detail with embodiment with reference to the accompanying drawing.
The present invention provides a kind of log information processing method.The log information processing method includes the following steps:
Log information is constantly written using additional mode in step S1 into journal file.
Step S2, according to the size of the fixed time inspection journal file of setting.
Step S3, judges whether the size of journal file reaches the threshold value of setting.
In step s3, if the size of journal file reaches threshold value, S4 is entered step;And if journal file it is big
Small not up to threshold value, then enter step S2.
Step S4 creates a delta file copy, and log information is written into delta file copy in synchronization.
In step s 4, the log information being synchronously written into delta file copy and the log being written in journal file
Information is identical, namely when log file size reaches threshold value, by carrying out file truncation operation, will write to enter day
Will file or the log information being unable to get under the situations such as preservation in journal file are written in delta file copy, to avoid
The loss of log information.Log information is written in delta file copy wherein it is possible to be instructed using tail-f etc..
Step S5 carries out backup to journal file and generates journal file copy.
Wherein it is possible to be backed up using the instruction such as copy/split to journal file.
Step S6, Clear Log file.
Step S6 plays the role of discharging the memory space of journal file, in favor of being constantly written into journal file
Log information.Wherein it is possible to instruct Clear Log file using cat/dev/null > xxx.log etc..
Step S7 stops that log information is written into delta file copy.
Step S7 is carried out after step S6, effectively avoids the problem that journal file is lost when Clear Log file.Wherein,
It can use kill instruction and stop tail process.
The design of above-mentioned steps S1~S7, in the case where journal file memory space reaches capacity, by synchronous to day
Log information is written in will file and newly-built delta file copy, it can be ensured that log information is routinely written, has simultaneously
Effect prevents the loss of log information.Also, day is written into delta file copy by continuing while Clear Log file
Will information does not need the write-in for suspending log information in Clear Log file, and then is not required to after the completion of journal file empties
The write-in for restarting log information, further ensures the duration of log information write-in, while preventing the loss of log information.
In one embodiment, specifically after step s 7, comprising:
Step S8 compares the log information of journal file copy and delta file copy and removes duplicate log information to obtain
Complete log information.
Complete log information obtained is carried out backup and generates a backup file by step S9.
The setting of step S9 can obtain completely, without duplicate backup file.
Step S10 deletes journal file copy and delta file copy.
The setting of step S10, can delete redundant file.
Step S11, archival back-up file.
Step S12, according to the rule cleaning backup file of setting.
In step s 11, specifically the archival back-up file the step of among, further comprise following steps:
Step S111 creates three files, respectively info file, warning file and fatal file.
Wherein, which is
Relationship incremented by successively.Wherein, fatal file is for storing in its interior log information comprising fatal class log critical field
The backup file of such as error, invalid;Warning file is used to store in its interior log information
The backup file of warning class log critical field such as timeout, warning etc.;Info file is for storing its interior log
The backup file of fatal class log critical field and warning class log critical field is not included in information.
Step S112 searches the log critical field of log information in backup file, and according to class in log critical field
The different of type store backup file into corresponding document folder.
Wherein, namely if log information includes fatal class log critical field in backup file, file will be backed up
(referred to as fatal class backup file) is stored to fatal file;If log information only includes in backup file
Warning class log critical field then stores backup file (referred to as warning class backup file) to warning file
Folder;If log information had not only included fatal class log critical field but also had not included the log of warning class and closed in backup file
Key field then stores backup file (referred to as info class backup file) to info file.
Preferably, synchronous when will include that the backup file of fatal class log critical field is stored to fatal file
Triggering alarm is to prompt user.Wherein, citing can be accused by Communications services such as triggering mail, wechat, short message, phones
It is alert.
It in step s 12, further comprise as follows specifically among the step of clearing up backup file according to the rule of setting
Step:
Step S121, timing detection disk have used space.Wherein, three files typically set up and are stored in same disk
Under.
Step S122 judges the threshold value for whether reaching setting with space of disk.If disk is reached with space
Threshold value then enters step S123;Otherwise, S121 is entered step, namely does not need to clear up backup file, it is only necessary to be supervised again
Control disk space.
Step S123 then deletes respective backup file according to the significance level of backup file and generation time sequencing
Or transfer.
In step S123, preferably first deletion significance level is lower, generates the time backs up file earlier.For example, first deleting
Remove or shift the info class backup file being stored under info file generated before the first scheduled date;If detecting and sentencing
Break and still reach threshold value with space to disk, then deletes or what is generated before shifting for the first scheduled date is stored in warning
Warning class backup file under file;If detecting and determine disk still reaching threshold value with space, continue to delete
The info class backup file that (being later than for the first scheduled date) generates before removing or shifting the second scheduled date;If detecting and judging
Still reach threshold value with space to disk, then it is standby to continue the warning class deleted or generated before shifting for the second scheduled date
Part file ...;Until the info class backup file and warning class backup file that are generated before retaining a certain scheduled date;If
It detects and determine disk still reaches threshold value with space, then delete or what is generated before shifting the third scheduled date is stored in
Fatal class backup file under fatal file;If detecting and determine disk still reaching threshold value with space, delete
The fatal class backup file that (being later than the third scheduled date) generates before removing or shifting the 4th scheduled date;Until retaining a certain
The fatal class backup file generated before scheduled date.
Preferably, complete institute with good grounds backup file significance level with generation time sequencing to respective backup file into
Row delete or transfer the step of after, namely deleted according to preset rules can not delete or do not have transferable backup file after,
If detecting and determine disk still reaching threshold value with space, alarm is triggered to prompt user to make resolution policy.Its
In, citing again may be by the Communications services such as triggering mail, wechat, short message, phone to be alerted.
In the embodiment that one enumerates, the configuration of 70%(parameterisable is set with the threshold value in space by disk).If
It is more than then to delete the info class backup file before (parameterisable configuration) on the 30th;If delete after disk with space still
More than 70%, then the warning class backup file before (parameterisable configuration) on the 30th is deleted;If disk sky after deleting
Between still above 70%, then delete (parameterisable configuration) on the 10th before info class backup file;If disk has been used after deleting
The warning class backup file before (parameterisable configuration) on the 10th is then deleted still above 70% in space;If magnetic after deleting
Disk has used space still above 70%, then deletes the info class backup file before (parameterisable configuration) on the 3rd;If after deleting
Disk has used space still above 70%, then deletes the warning class backup file before (parameterisable configuration) on the 3rd;If deleted
Except rear disk has used space still above 70%, then the fatal class backup file before (parameterisable configuration) on the 90th is deleted;Such as
Disk has used space still above 70% after fruit is deleted, then the fatal class before deleting (parameterisable configuration) on the 30th backs up text
Part;If disk has used space still above 70% after deleting, mail or wechat alarm are triggered.
In one embodiment, the step of the size of the fixed time inspection journal file of setting is specifically pressed in step S2
Among rapid, which can be endowed as a fixed value.
In a preferred embodiment, the fixed time interval be also designed as one can be according to log writing speed and day
The changing value of adaptive (the i.e. automatic or autonomous) adjustment of relationship between the size of will file.Specifically, first setting one is initial
Change value a, a minimum value b and a maximum c, initialization value a (i.e. b < a < c) between minimum value b and maximum c, specifically
, in the step of log information constantly is written into journal file using additional mode (step S1 in embodiment illustrated in fig. 1)
Later, the variable setting of fixed time interval can be implemented by the following steps, include the following steps:
Fixed time interval T is assigned a value of initialization value a(i.e. T=a) by step S301.When first operation, fixed time interval T=a.
Step S302 detects the size S of journal file according to the fixed time interval T of setting.
Step S303, judges whether the size S of journal file reaches the threshold value V of setting.
In step S303, if the size S of journal file reaches threshold value V, S304 is entered step, and enter one newly-built
Delta file copy, and synchronous the step of log information is written into delta file copy (step S4 in embodiment illustrated in fig. 1);
And if the size S of journal file is less than threshold value V, enter step S308.
Step S304, judges whether the size S of journal file reaches n times of threshold value (i.e. nV).
In step s 304, if the size S of journal file does not reach nV, fixed time interval T does not occur at this moment
Change, still enters the step of size S of journal file is detected according to the fixed time interval T of setting, that is, enter step S302;And if
The size S of journal file reaches nV, then enters step S305.
Fixed time interval is assigned a value of (1/n) × this fixed time interval (i.e. (1/n) T) by step S305.
Step S306, judges whether fixed time interval T is less than minimum value b.
In step S306, if fixed time interval T is more than or equal to minimum value b, enter the fixed time interval T according to setting
(at this point, T=(1/n) T) detects the step of size S of journal file, that is, enters step S302;If fixed time interval T is less than minimum
Value b, then enter step S307.
Fixed time interval T is assigned a value of minimum value b by step S307.And then enter according to the fixed time interval of setting (at this point, T=
B) the step of detecting the size of journal file, that is, enter step S302.
Step S308, judges whether the size S of journal file is less than or equal to m times of threshold value (i.e. mV).
In step S308, if the size S of journal file is greater than mV, fixed time interval T does not also change at this moment
Become, still enters the step of size S of journal file is detected according to the fixed time interval T of setting, that is, enter step S302;And if day
The size S of will file is less than or equal to mV, then enters step S309.
Fixed time interval T is assigned a value of (1/m) × this fixed time interval (i.e. (1/m) T) by step S309.
Step S310, judges whether fixed time interval T is greater than maximum c.
In step s310, if fixed time interval T is less than or equal to maximum c, enter the fixed time interval T according to setting
(at this point, T=(1/m) T) detects the step of size S of journal file, that is, enters step S302;If fixed time interval T is greater than maximum
Value c, then enter step S311.
Fixed time interval T is assigned a value of maximum c by step S311.And then enter according to the fixed time interval T(of setting at this point, T=
C) the step of detecting the size S of journal file, that is, enter step S302.
Wherein, n>1,0<m<1.
According to above-mentioned steps, the present invention citing parameter can be arranged using following, a=10 (min), b=1 (min), and c=
100 (min), n=2, m=0.5.
Initial configuration T=a=10 (min);
When the size S of first time detection trigger journal file, if it find that S < 0.5V, then extend one times of (i.e. T=2T=20 for T
(min));When the size S of second of detection trigger journal file, if it has been found that S < 0.5V, T is extended again one times (i.e. T=
2T=40 (min)) ... so circulation, T can at most be extended to as c.
In the size S of first time detection trigger journal file, if it find that S >=V, on the one hand executes newly-built delta file
Copy simultaneously the step of write-in log information, on the other hand then enters into the delta file copy and judges whether S is more than or equal to 2V
The step of.If it find that S >=2V, then reduce half (i.e. T=(1/2) T=5 (min)) for T;Second of detection trigger journal file
Size S when, if T is reduced to half (i.e. T=(1/2) T=2.5 (min)) again ... such circulation, T is most it has been found that S >=2V
It can be reduced to less as b.
According to above-mentioned steps and principle, dynamic design can be carried out to fixed time interval T, to search out reasonable scanning timing
System interference is reduced, and then frequency of your backups can be scanned according to business busy situation, adjust automatically in interval.
Log information processing method of the invention, has the following beneficial effects:
By continuing that log information is written into journal file in a manner of adding, and reach the threshold of setting in the size of journal file
When value, a newly-built delta file copy and it is synchronous be written log information into delta file copy, and in backup log file and
Just stop that log is written into delta file copy after Clear Log file, can be realized the lasting write-in of log information and not
Log information can be lost.And on backup job process on running application program entirely without influence.
In addition, memory space can be efficiently used by carrying out filing management to backup file and removing in time.
The above is only embodiments of the present invention, are not intended to limit the scope of the invention, all to utilize the present invention
Equivalent structure or equivalent flow shift made by specification and accompanying drawing content is applied directly or indirectly in other relevant technologies
Field is included within the scope of the present invention.
Claims (10)
1. a kind of log information processing method, which comprises the steps of:
Log information is constantly written into journal file in a manner of adding;
The size of the journal file according to the fixed time inspection of setting;
Judge whether the size of the journal file reaches the threshold value of setting;
If the size of the journal file reaches threshold value, a delta file copy is created, it is synchronous to the delta file pair
Log information is written in this;
Backup is carried out to the journal file and generates journal file copy;
Empty the journal file;
Stop that log information is written into the delta file copy.
2. log information processing method according to claim 1, which is characterized in that stopping to the delta file copy
After the step of middle write-in log information, comprising:
It compares the log information of the journal file copy and the delta file copy and removes duplicate log information in turn
Obtain complete log information;
Backup is carried out to the complete log information and generates backup file;
Delete the journal file copy and the delta file copy.
3. log information processing method according to claim 2, which is characterized in that the complete log information into
After the step of row backup generates backup file, comprising:
File the backup file;
The corresponding backup file is cleared up according to the rule of setting.
4. log information processing method according to claim 2, which is characterized in that in the step of filing the backup file
Among, comprising:
Info file, warning file and the fatal that newly-built three files, respectively significance level successively increase
File;
The log critical field of log information in the backup file is searched, and will be standby according to the type of the log critical field
Part file is stored into corresponding document folder;
Wherein, if including fatal class log critical field in the backup file, the backup file is stored to described
Fatal file;If only including warning class log critical field in the backup file, the backup file is deposited
It stores up to the warning file;If not including fatal class log critical field and warning class in the backup file
Log critical field then stores the backup file to the info file.
5. log information processing method according to claim 4, which is characterized in that corresponding according to the rule cleaning of setting
Among the step of backup file, comprising:
Timing detection disk has used space;Wherein, the info file, the warning file and the fatal
File is built under the same disk;
Judge the threshold value for whether reaching setting with space of the disk;
If the disk reaches threshold value with space, according to the significance level of the backup file and time sequencing is generated
The corresponding backup file is deleted or shifted;
Wherein, preferentially deletion significance level is low and generates the backup file of morning time, and retains significance level height and generate
The backup file of time closely.
6. log information processing method according to claim 5, it is characterised in that:
In searching the backup file the step of log critical field of log information in, comprising: if found described standby
Log information includes fatal class log critical field in part file, then triggers alarm;
The corresponding backup file is deleted or turned according to the significance level and generation time sequencing of the backup file
Among the step of shifting, comprising: only retain significance level high and the time close backup file and the disk in the disk
Still reach threshold value with space, then trigger alarm.
7. log information processing method according to claim 6, it is characterised in that:
The mode of the triggering alarm includes triggering the Communications service of any one in mail, wechat, short message and phone.
8. log information processing method according to claim 1, it is characterised in that:
Among the step of size of the journal file described in the fixed time inspection according to setting, the fixed time interval is one solid
Definite value or the fixed time interval are the changing values that can adaptively adjust.
9. log information processing method according to claim 8, it is characterised in that:
When the fixed time interval is a changing value that can adaptively adjust, the step of to the adaptive adjustment of the fixed time interval
Include the following:
An initialization value, a minimum value and a maximum value are set, the initialization value is between the minimum value and the maximum
Between value;
The fixed time interval is assigned a value of initialization value;
According to the size of journal file described in the fixed time inspection of setting;
Judge whether the size of the journal file reaches the threshold value of setting;
In the step of whether size for judging the journal file reaches the threshold value of setting, if the size of the journal file
Reach threshold value, judges whether the size of the journal file reaches n times of threshold value;
If the size of the journal file reaches n times of threshold value, the fixed time interval is assigned a value of (1/n) × this described timing
Interval;
Judge whether the fixed time interval is greater than maximum value;
If the fixed time interval is less than or equal to maximum value, enter the text of the log according to the fixed time inspection of setting
The step of size of part;If the fixed time interval is greater than maximum value, the fixed time interval is assigned a value of maximum value, Jin Erjin
The step of entering the size of the journal file according to the fixed time inspection of setting;
In the step of whether size for judging the journal file reaches the threshold value of setting, if the size of the journal file
Less than threshold value, judge whether the size of the journal file is less than or equal to m times of threshold value;
If the size of the journal file be less than or equal to m × threshold value, by the fixed time interval be assigned a value of (1/m) × this described in
Fixed time interval;
Judge whether the fixed time interval is less than minimum value;
If the fixed time interval is more than or equal to minimum value, enter the text of the log according to the fixed time inspection of setting
The step of size of part;If the fixed time interval is less than minimum value, the fixed time interval is assigned a value of minimum value, Jin Erjin
The step of entering the size of the journal file according to the fixed time inspection of setting;
Wherein, n>1,0<m<1.
10. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer journey
Sequence, the computer program are configured to execute log information processing method as described in any one of claims 1 to 9 by processor
In step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910138458.6A CN109933462A (en) | 2019-02-25 | 2019-02-25 | Log information processing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910138458.6A CN109933462A (en) | 2019-02-25 | 2019-02-25 | Log information processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109933462A true CN109933462A (en) | 2019-06-25 |
Family
ID=66985841
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910138458.6A Pending CN109933462A (en) | 2019-02-25 | 2019-02-25 | Log information processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109933462A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110569177A (en) * | 2019-09-26 | 2019-12-13 | 苏州浪潮智能科技有限公司 | Method and device for testing log coverage mechanism |
CN110716903A (en) * | 2019-09-29 | 2020-01-21 | 中信百信银行股份有限公司 | Log file cleaning method and device |
CN111221790A (en) * | 2019-10-25 | 2020-06-02 | 苏州浪潮智能科技有限公司 | Log file processing method and device and computer readable storage medium |
CN112783849A (en) * | 2021-01-29 | 2021-05-11 | 紫光云技术有限公司 | Production environment log exporting system and method |
CN113032330A (en) * | 2019-12-09 | 2021-06-25 | 西安诺瓦星云科技股份有限公司 | File supervision method and device and multimedia broadcast control equipment |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1815451A (en) * | 2005-01-31 | 2006-08-09 | 华为技术有限公司 | Log information management method and system |
US7584230B2 (en) * | 2003-11-21 | 2009-09-01 | At&T Intellectual Property, I, L.P. | Method, systems and computer program products for monitoring files |
CN102073599A (en) * | 2009-11-23 | 2011-05-25 | 英业达股份有限公司 | System event log recording method |
US8055645B1 (en) * | 2006-12-15 | 2011-11-08 | Packeteer, Inc. | Hierarchical index for enhanced storage of file changes |
CN102594581A (en) * | 2011-01-12 | 2012-07-18 | 鼎桥通信技术有限公司 | Method for recording log data |
CN103378986A (en) * | 2012-04-28 | 2013-10-30 | 鸿富锦精密工业(深圳)有限公司 | System event log recording system and method |
CN109271355A (en) * | 2018-08-27 | 2019-01-25 | 杭州迪普科技股份有限公司 | A kind of method and device of cleaning journal file caching |
-
2019
- 2019-02-25 CN CN201910138458.6A patent/CN109933462A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7584230B2 (en) * | 2003-11-21 | 2009-09-01 | At&T Intellectual Property, I, L.P. | Method, systems and computer program products for monitoring files |
CN1815451A (en) * | 2005-01-31 | 2006-08-09 | 华为技术有限公司 | Log information management method and system |
US8055645B1 (en) * | 2006-12-15 | 2011-11-08 | Packeteer, Inc. | Hierarchical index for enhanced storage of file changes |
CN102073599A (en) * | 2009-11-23 | 2011-05-25 | 英业达股份有限公司 | System event log recording method |
CN102594581A (en) * | 2011-01-12 | 2012-07-18 | 鼎桥通信技术有限公司 | Method for recording log data |
CN103378986A (en) * | 2012-04-28 | 2013-10-30 | 鸿富锦精密工业(深圳)有限公司 | System event log recording system and method |
CN109271355A (en) * | 2018-08-27 | 2019-01-25 | 杭州迪普科技股份有限公司 | A kind of method and device of cleaning journal file caching |
Non-Patent Citations (1)
Title |
---|
川中胡子: "确保无丢失日志文件备份方案", 《CSDN》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110569177A (en) * | 2019-09-26 | 2019-12-13 | 苏州浪潮智能科技有限公司 | Method and device for testing log coverage mechanism |
CN110569177B (en) * | 2019-09-26 | 2022-08-19 | 苏州浪潮智能科技有限公司 | Method and device for testing log coverage mechanism |
CN110716903A (en) * | 2019-09-29 | 2020-01-21 | 中信百信银行股份有限公司 | Log file cleaning method and device |
CN111221790A (en) * | 2019-10-25 | 2020-06-02 | 苏州浪潮智能科技有限公司 | Log file processing method and device and computer readable storage medium |
CN113032330A (en) * | 2019-12-09 | 2021-06-25 | 西安诺瓦星云科技股份有限公司 | File supervision method and device and multimedia broadcast control equipment |
CN112783849A (en) * | 2021-01-29 | 2021-05-11 | 紫光云技术有限公司 | Production environment log exporting system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109933462A (en) | Log information processing method | |
US8161138B2 (en) | Replication system having the capability to accept commands at a standby-system site before completion of updating thereof | |
KR101054994B1 (en) | Persistence Management Methods, Devices, and Computer-readable Media | |
US7937393B2 (en) | Systems and methods for classifying and transferring information in a storage network | |
WO2015016821A1 (en) | Determining topic relevance of an email thread | |
CN107122357A (en) | Data base read-write separation method, device and system | |
CN111782707B (en) | Data query method and system | |
CN109710456B (en) | Data recovery method and device | |
CN107329859A (en) | A kind of data guard method and storage device | |
WO2018113484A1 (en) | Method and apparatus for recovering multi-replica data | |
CN105049258A (en) | Data transmission method of network disaster-tolerant system | |
CN108932271A (en) | A kind of file management method and device | |
CN112162899A (en) | Big data cluster service based monitoring method and system | |
CN103984622B (en) | The blog management method and device of GPON ONU equipments based on Linux | |
CN110287061A (en) | Computer based maintenance of information system | |
CN111342986A (en) | Distributed node management method and device, distributed system and storage medium | |
US8019799B1 (en) | Computer system operable to automatically reorganize files to avoid fragmentation | |
CN110764711B (en) | IO data classification deleting method and device and computer readable storage medium | |
US9973421B2 (en) | Method and device for connection management in a telecommunication network | |
CN110737543A (en) | method, device and storage medium for recovering distributed file system data | |
CN100419689C (en) | Processing method for interruption and apparatus thereof | |
CN1866211B (en) | Method for forced unloading of file system | |
CN115454958A (en) | Data processing method, device, equipment, system and medium based on artificial intelligence | |
CN116795587A (en) | Backup method and device of cloud host, electronic equipment and storage medium | |
CN107145501A (en) | File updating method, file copying method and corresponding system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190625 |