CN112650716B - Log system design method suitable for JavaEE application server - Google Patents

Log system design method suitable for JavaEE application server Download PDF

Info

Publication number
CN112650716B
CN112650716B CN202011316653.2A CN202011316653A CN112650716B CN 112650716 B CN112650716 B CN 112650716B CN 202011316653 A CN202011316653 A CN 202011316653A CN 112650716 B CN112650716 B CN 112650716B
Authority
CN
China
Prior art keywords
log
database
access
information
application server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011316653.2A
Other languages
Chinese (zh)
Other versions
CN112650716A (en
Inventor
蒋平川
李蕾
于洋
王鹏亮
黄锋
李利军
于滨峰
张春林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dongfangtong Software Co ltd
Beijing Tongtech Co Ltd
Original Assignee
Beijing Dongfangtong Software Co ltd
Beijing Tongtech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dongfangtong Software Co ltd, Beijing Tongtech Co Ltd filed Critical Beijing Dongfangtong Software Co ltd
Priority to CN202011316653.2A priority Critical patent/CN112650716B/en
Publication of CN112650716A publication Critical patent/CN112650716A/en
Application granted granted Critical
Publication of CN112650716B publication Critical patent/CN112650716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a design method of a log system suitable for a JavaEE application server, which comprises the following steps: s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server; s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker; s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database. The invention is adopted to construct the log system suitable for the JavaEE application server, can ensure the integrity of the log information recorded in the log system and provides a good basis for the effective use of the log information.

Description

Log system design method suitable for JavaEE application server
Technical Field
The invention relates to the technical field of design of a log system of a JavaEE application server, in particular to a design method of the log system suitable for the JavaEE application server.
Background
The JavaEE application server is a set of technical framework different from the traditional application development, comprises a plurality of components, and mainly can simplify and standardize the development and deployment of an application system so as to improve the portability, the safety and the reuse value. The JavaEE application server is an open source code Java application server, the core of the Java application server is a group of technical specifications and guidelines, and various components, service architectures and technical layers contained in the Java application server have common standards and specifications, so that various different platforms following the JavaEE application server architecture have good compatibility, and the dilemma that the information products used by the back end of an enterprise cannot be compatible with each other in the past, so that the internal or external of the enterprise is difficult to communicate with each other is solved. Examples of the APPLICATION SERVER supporting the JavaEE APPLICATION SERVER include IBM WEBSPHERE APPLICATION SERVER, BEA WEBLOGIC SERVER, JBOSS, ORACLE APPLICATION SERVER, and SUN ONE APPLICATION SERVER.
The log system of the application server is very important, can record the user use and the response condition of the application server, and can provide useful information such as trace tracing clues and perfect references of the application server. However, the log system of the existing JavaEE application server is fragile, and the recorded information is lost or deleted, so that the content of the log information is incomplete.
Disclosure of Invention
In order to solve the technical problem, the invention provides a design method of a log system suitable for a JavaEE application server, wherein the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
Optionally, the operation log information includes a client IP address, an access time, a visited web page, an HTTP code, a user agent, and a reference address.
Optionally, in step S100, after the access tracker is triggered by the user access, the access tracker records the client IP address and the access time of the user, calculates the access duration by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the visited web page, the HTTP code, the user agent, and the reference address, stops timing with the timer after the user quits the access, records the access duration, and then combines the recorded information and the extracted information to generate an operation log information.
Optionally, the access tracker classifies access operations according to the operation log information, the types of the access operations at least include a browsing class, a deep-query class, an error class and a referral class, and the log database is divided into a plurality of log sub-databases corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
Optionally, the method further includes step S400, in which the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if they are consistent, the process is retained, and if they are not consistent, the process proceeds to step S420.
S420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
Optionally, the backup database and the log database are provided with an access right module, and the access right module adopts a Shiro security framework to provide user authentication and/or authorization verification; and the operation log information stored in the backup database and/or the log database can be called, viewed or applied by the user authenticated and/or authorized to be verified.
The working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
Optionally, the access tracker extracts the operation log information in the following manner:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
Optionally, the log system is provided with an application analysis module, and the application analysis module can at least provide the following application analysis:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
Optionally, the specific steps of recommending the preference matching information are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
Figure BDA0002791565340000031
in the above formula, Sim (t, t)i) Representing the similarity between the ith item of information to be recommended and the user preference information; t represents user preference information; t is tiRepresenting the ith item of information to be recommended; m represents a vector dimension and refers to the number of words commonly adopted by the user preference information and the information to be recommended; a. thejRepresenting the frequency of occurrence of the jth common word in the preference information; b isijRepresenting the frequency of occurrence of the jth common word in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
Optionally, the log system is provided with a statistics output module, the statistics output module is configured to perform statistics on the operation log information according to a set condition and output a statistical result, and the process includes:
firstly, establishing coordinates in a log database, and randomly selecting two data points d1And d2Then, the following algorithm is adopted to search each piece of operation log information in the log database:
Figure BDA0002791565340000041
in the above formula, f (d)i) Representing a search algorithm heuristic function; diRepresenting an arbitrary point in the search; x is the number ofiDenotes diThe abscissa of the point; y isiDenotes diThe ordinate of the point; x is the number of1Denotes d1The abscissa of the point; y is1Denotes dhThe ordinate of the point; x is the number of2Denotes d2The abscissa of the point; y is2Denotes d2The ordinate of the point;
then extracting diComparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of an embodiment of a method for designing a log system suitable for a JavaEE application server in the embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, an embodiment of the present invention provides a method for designing a log system suitable for a JavaEE application server, where the design of the log system includes the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
The working principle and the beneficial effects of the technical scheme are as follows: the invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information. According to the scheme, the access tracker is arranged in the log system, the access tracker is used for tracking the operation of the user in real time, the access condition related to the log is recorded, and the real-time performance and the reliability of the log are enhanced.
In one embodiment, the oplog information includes a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
The working principle and the beneficial effects of the technical scheme are as follows: the range of the operation log information of the JavaEE application server is scientifically defined, so that the operation log information covers the user related information and the access condition, but does not relate to the personal privacy of the user or other information needing to be kept secret, and the operation log information meets the requirements of related laws and regulations and is easy to realize technically.
In one embodiment, in step S100, the access tracker records the client IP address and the access time of the user after being triggered by the user access, calculates the access time length by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the accessed web page, the HTTP code, the user agent, and the reference address, stops timing by the timer after the user exits from the access, records the access time length, and then combines the recorded information and the extracted information to generate an operation log information.
The working principle and the beneficial effects of the technical scheme are as follows: the scheme carries out detailed design on the generation of the operation log information, adopts an access triggering mode, follows up the access process of the user by the access tracker, extracts and records the related operation log information content during the follow-up, integrates all the information, and generates and stores the once-access operation log information of the user after the access is finished. By adopting the follow-up recording mode, the access condition of the user can be comprehensively recorded, so that the log information is more specific and more detailed, and no recording error occurs.
In one embodiment, the access tracker classifies access operations according to operation log information, the types of the access operations at least comprise a browsing class, a deep-query class, an error class and a referral class, and the log database is internally divided into a plurality of log sub-libraries corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
The working principle and the beneficial effects of the technical scheme are as follows: the method and the system have the advantages that the operation log information is classified, stored and managed, the content of the operation log information is identified, classification is carried out according to the identification result, meanwhile, the log database is correspondingly divided into the log sub-databases, logs of different types are respectively stored, the service proportion of each access type can be directly known, and accordingly corresponding matching adjustment is carried out on server resources.
In one embodiment, the method further includes step S400, where the backup database is checked against the log database periodically, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if they are consistent, the process is retained, and if they are not consistent, the process proceeds to step S420.
S420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
The working principle and the beneficial effects of the technical scheme are as follows: the above scheme checks the backup database and the log database regularly to check whether the records of the two databases are consistent, and if the records are inconsistent, the data of one of the two databases is lost, and the lost content needs to be repaired by the content which is not lost, so as to ensure the integrity of the log data.
In one embodiment, the backup database and the log database are provided with an access authority module, and the access authority module adopts a Shiro security framework to provide user authentication and/or authorization verification; and the operation log information stored in the backup database and/or the log database can be called, viewed or applied by the user authenticated and/or authorized to be verified.
The working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
The beneficial effects of the above technical scheme are: by arranging the access authority module, the safety of log data can be guaranteed, irrelevant personnel are prevented from accessing log information, and the data are effectively prevented from being damaged; in addition, the method can prevent others from obtaining information which may relate to personal privacy, such as the IP address of the visitor and the like through the information in the log, and prevent the occurrence of network infringement.
In one embodiment, the access tracker extracts the oplog information as follows:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
The working principle and the beneficial effects of the technical scheme are as follows: the log collection work is undertaken by arranging the log management module, the log collection module and the log agent module, the work load of the access tracker is reduced, the access tracker can be specially used for following the access of a user, the work related to extracting the user operation log information is completed by matching the log management module, the log collection module and the log agent module, and the incomplete log record caused by the following miss of the user access due to the fact that the access tracker has too large data processing amount can be prevented; the efficiency and the accuracy of the log system are improved.
In one embodiment, the log system provides an application analysis module capable of providing at least the following application analyses:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
The working principle and the beneficial effects of the technical scheme are as follows: the application analysis module is arranged in the log system, so that the use range and the use diversity of the operation log information can be enlarged, different log application functions are developed or created, and various different use requirements are met; the utilization rate of the operation log information is improved; the application for analyzing the running state of the server can find the imperfection of the JavaEE application server or possible unstable risk points, and is beneficial to the maintenance and improvement work of the JavaEE application server through fault risk guidance.
In one embodiment, the specific steps of the preference matching information recommendation are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
Figure BDA0002791565340000081
in the above formula, Sim (t, t)i) Representing the similarity between the ith item of information to be recommended and the user preference information; t represents user preference information; t is tiRepresenting the ith item of information to be recommended; m represents a vector dimension and refers to the number of words commonly adopted by the user preference information and the information to be recommended; a. thejRepresenting the frequency of occurrence of the jth common word in the preference information; b isijRepresenting the frequency of occurrence of the jth common word in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
The working principle and the beneficial effects of the technical scheme are as follows: by extracting the user operation log information, the preference information and the direction of the user are known, the quasi-recommendation information for the user is preliminarily circled by the preference information, the similarity value of each quasi-recommendation information and the user preference information is obtained through the algorithm, and the similarity value is compared with a preset threshold value, so that the fitting condition of the quasi-recommendation information and the user preference is judged, the fitting degree of the information recommended to the user and the user is increased, the accuracy of the recommendation information is improved, the user is prevented from feeling harassed by the recommendation information, and the counter-feeling of the user to the recommendation information behavior is reduced.
In one embodiment, the log system is provided with a statistic output module, and the statistic output module is used for counting the operation log information according to a set condition and outputting a statistic result, wherein the process is as follows:
firstly, establishing coordinates in a log database, and randomly selecting two data points d1And d2Then, the following algorithm is adopted to search each piece of operation log information in the log database:
Figure BDA0002791565340000091
in the above formula, f (d)i) Representing a search algorithm heuristic function; diRepresenting an arbitrary point in the search; x is the number ofiDenotes diThe abscissa of the point; y isiDenotes diThe ordinate of the point; x is the number of1Denotes d1The abscissa of the point; y is1Denotes d1The ordinate of the point; x is the number of2Denotes d2The abscissa of the point; y is2Denotes d2The ordinate of the point;
then extracting diComparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The working principle and the beneficial effects of the technical scheme are as follows: by arranging the statistic output module, a user can be allowed to adopt set conditions to screen and count the operation log information, and the set conditions can be independently determined by the user; the method and the device are suitable for the diversity of the use of the operation log information, the trouble of setting condition enumeration is avoided, the degree of freedom of the use of the operation log information is expanded, the understanding of a user on the operation log information can be enhanced, and the counting and using efficiency is improved. In the screening search, the Manhattan distance and Chebyshev distance algorithm is adopted, the advancing speed of the initial search is accelerated, the expanding advancement is preferentially carried out in the later period with accuracy, and the efficiency and the effectiveness of the search are improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (6)

1. A design method of a log system suitable for a JavaEE application server is characterized in that the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database;
the log system is provided with a statistic output module, the statistic output module is used for counting the operation log information according to the set conditions and outputting a statistic result, and the process comprises the following steps:
firstly, establishing coordinates in a log database, and randomly selecting two data points d1And d2Then, the following algorithm is adopted to search each piece of operation log information in the log database:
Figure FDA0002791565330000011
in the above formula, f (d)i) Representing a search algorithm heuristic function; diRepresenting an arbitrary point in the search; x is the number ofiDenotes diThe abscissa of the point; y isiDenotes diThe ordinate of the point; x is the number of1Denotes d1The abscissa of the point; y is1Denotes d1The ordinate of the point; x is the number of2Denotes d2The abscissa of the point; y is2Denotes d2The ordinate of the point;
then extracting diComparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
2. The method of claim 1, wherein the operation log information comprises a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
3. The method as claimed in claim 2, wherein in step S100, the access tracker is triggered by the user access to record the user' S client IP address and access time, calculates the access duration from the timer, tracks the user input command and open web page, extracts the visited web page, HTTP code, user agent and reference address, stops timing by the timer after the user exits from the access, records the access duration, and combines the recorded information and the extracted information to generate an operation log information.
4. The method for designing the log system suitable for the JavaEE application server as claimed in claim 1, wherein the access tracker classifies the access operation according to the operation log information, the types of the access operation at least include a browse type, a deep search type, an error type and a referral type, and the log database is divided into a plurality of log sub-libraries corresponding to the types of the access operation; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
5. The method for designing a log system of a java ee application server as claimed in claim 1, further comprising step S400, wherein the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
6. The method for designing the log system of the JavaEE application server as claimed in claim 1, wherein the backup database and the log database are provided with an access authority module, and the access authority module adopts Shiro security framework to provide user authentication and/or authorization verification; and the operation log information stored in the backup database and/or the log database can be called, viewed or applied by the user authenticated and/or authorized to be verified.
CN202011316653.2A 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server Active CN112650716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011316653.2A CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011316653.2A CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server
CN202010815166.4A CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202010815166.4A Division CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Publications (2)

Publication Number Publication Date
CN112650716A CN112650716A (en) 2021-04-13
CN112650716B true CN112650716B (en) 2021-08-24

Family

ID=72458287

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202011316653.2A Active CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server
CN202010815166.4A Active CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202010815166.4A Active CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Country Status (1)

Country Link
CN (2) CN112650716B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910980B (en) * 2021-01-27 2022-11-15 中国银联股份有限公司 Database access system and method
CN115544571B (en) * 2022-10-13 2023-08-18 上海罗盘信息科技有限公司 Data security system based on access rights

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102147907A (en) * 2010-02-09 2011-08-10 微软公司 Search auction insights for advertisers
CN103761161A (en) * 2013-12-31 2014-04-30 华为技术有限公司 Method, server and system for data recovery
CN103902604A (en) * 2012-12-28 2014-07-02 Ge医疗系统环球技术有限公司 Method and device used for searching and displaying dispersive logs
CN103942210A (en) * 2013-01-21 2014-07-23 中国移动通信集团上海有限公司 Processing method, device and system of mass log information
CN104778033A (en) * 2014-01-09 2015-07-15 大唐电信科技股份有限公司 Construction method and device of building block type software
CN106250299A (en) * 2016-07-21 2016-12-21 柳州龙辉科技有限公司 A kind of processing method of Linux daily record
CN107705574A (en) * 2017-10-09 2018-02-16 荆门程远电子科技有限公司 A kind of precisely full-automatic capturing system of quick road violation parking
CN109241022A (en) * 2018-09-11 2019-01-18 天津理工大学 A kind of archive management system and its ant search algorithm based on blue-ray storage
CN109542716A (en) * 2018-10-18 2019-03-29 北京亿赛通科技发展有限责任公司 A kind of log recording method and user-association plug-in unit based on J2EE platform
CN109582663A (en) * 2018-12-07 2019-04-05 国网安徽省电力有限公司综合服务中心 A kind of employee insurance information management system of the architectural framework based on Java EE
CN109831486A (en) * 2019-01-02 2019-05-31 技创智能科技(上海)有限公司 The background data server system and data processing method of multi-client
CN110377569A (en) * 2019-06-19 2019-10-25 中国平安人寿保险股份有限公司 Log monitoring method, device, computer equipment and storage medium
CN110544068A (en) * 2019-09-16 2019-12-06 深圳市丰巢科技有限公司 delivery path generation method, device, equipment and storage medium based on express delivery cabinet

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743029B2 (en) * 2003-12-30 2010-06-22 Sap Ag Log configuration and online deployment services
CN100586058C (en) * 2007-11-20 2010-01-27 中国人民解放军信息工程大学 J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method
CN101286888B (en) * 2008-05-21 2010-08-11 天柏宽带网络科技(北京)有限公司 Operating method of log system
CN105843702B (en) * 2015-01-14 2019-04-12 阿里巴巴集团控股有限公司 A kind of method and device for data backup
CN106339483B (en) * 2016-08-30 2020-04-21 电子科技大学 Social activity recommendation method in mobile social network
CN106982204A (en) * 2017-02-15 2017-07-25 深圳市中科智库互联网信息安全技术有限公司 Credible and secure platform
CN108090205A (en) * 2017-12-27 2018-05-29 南京熊猫电子股份有限公司 A kind of army rear service data system for unified management based on J2EE
US10706016B2 (en) * 2018-05-22 2020-07-07 International Business Machines Corporation Application tracking system
CN110069356A (en) * 2019-04-25 2019-07-30 北京东方通科技股份有限公司 A kind of application server

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102147907A (en) * 2010-02-09 2011-08-10 微软公司 Search auction insights for advertisers
CN103902604A (en) * 2012-12-28 2014-07-02 Ge医疗系统环球技术有限公司 Method and device used for searching and displaying dispersive logs
CN103942210A (en) * 2013-01-21 2014-07-23 中国移动通信集团上海有限公司 Processing method, device and system of mass log information
CN103761161A (en) * 2013-12-31 2014-04-30 华为技术有限公司 Method, server and system for data recovery
CN104778033A (en) * 2014-01-09 2015-07-15 大唐电信科技股份有限公司 Construction method and device of building block type software
CN106250299A (en) * 2016-07-21 2016-12-21 柳州龙辉科技有限公司 A kind of processing method of Linux daily record
CN107705574A (en) * 2017-10-09 2018-02-16 荆门程远电子科技有限公司 A kind of precisely full-automatic capturing system of quick road violation parking
CN109241022A (en) * 2018-09-11 2019-01-18 天津理工大学 A kind of archive management system and its ant search algorithm based on blue-ray storage
CN109542716A (en) * 2018-10-18 2019-03-29 北京亿赛通科技发展有限责任公司 A kind of log recording method and user-association plug-in unit based on J2EE platform
CN109582663A (en) * 2018-12-07 2019-04-05 国网安徽省电力有限公司综合服务中心 A kind of employee insurance information management system of the architectural framework based on Java EE
CN109831486A (en) * 2019-01-02 2019-05-31 技创智能科技(上海)有限公司 The background data server system and data processing method of multi-client
CN110377569A (en) * 2019-06-19 2019-10-25 中国平安人寿保险股份有限公司 Log monitoring method, device, computer equipment and storage medium
CN110544068A (en) * 2019-09-16 2019-12-06 深圳市丰巢科技有限公司 delivery path generation method, device, equipment and storage medium based on express delivery cabinet

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
From high availability and disaster recovery to business continuity solutions;Th. Lumpp 等;《IBM Systems Journal》;20081231;第47卷(第4期);605-619 *
基于大数据中查询日志的用户行为分析系统的设计与实现;卜晓宁;《中国优秀硕士学位论文全文数据库 信息科技辑》;20150915(第09期);I138-320 *
基于大数据的网络用户行为分析;吴宇飞;《中国优秀硕士学位论文全文数据库 经济与管理科学辑》;20180715(第07期);J157-74 *

Also Published As

Publication number Publication date
CN111680010A (en) 2020-09-18
CN111680010B (en) 2020-12-22
CN112650716A (en) 2021-04-13

Similar Documents

Publication Publication Date Title
CN100464294C (en) Reflection-based processing of input parameters for commands
KR100323551B1 (en) Information registration method and document information processing apparatus
CN110602029B (en) Method and system for identifying network attack
CN101853289B (en) Database auditing method and equipment
CN112650716B (en) Log system design method suitable for JavaEE application server
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
CN109376291B (en) Website fingerprint information scanning method and device based on web crawler
CN107257390B (en) URL address resolution method and system
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
CN107003931B (en) Decoupling test validation from test execution
US7685195B2 (en) Systems and methods for analyzing web site search terms
CN103152391A (en) Journal output method and device
US11797617B2 (en) Method and apparatus for collecting information regarding dark web
CN112650688A (en) Automated regression testing method, associated device and computer program product
CN116186759A (en) Sensitive data identification and desensitization method for privacy calculation
KR102099670B1 (en) The syntax grammar rules automatic generation method of understanding user query intention
CN104580109A (en) Method and device for generating click verification code
US20070156712A1 (en) Semantic grammar and engine framework
CN116662987A (en) Service system monitoring method, device, computer equipment and storage medium
US20210049144A1 (en) Universal self-learning database recovery
CN111046382A (en) Database auditing method, device, storage medium and device
CN116155597A (en) Access request processing method and device and computer equipment
AU2021105619A4 (en) A method for identification of duplicate security vulnerabilities using machine learning
US20210342530A1 (en) Framework for Managing Natural Language Processing Tools
CN115600201A (en) User account information safety processing method for power grid system software

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant