CN114036533A - Log transmission method and device, electronic equipment and storage medium - Google Patents

Log transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114036533A
CN114036533A CN202111124026.3A CN202111124026A CN114036533A CN 114036533 A CN114036533 A CN 114036533A CN 202111124026 A CN202111124026 A CN 202111124026A CN 114036533 A CN114036533 A CN 114036533A
Authority
CN
China
Prior art keywords
log file
processor
storage path
log
attribute information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111124026.3A
Other languages
Chinese (zh)
Inventor
王洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing CHJ Automotive Information Technology Co Ltd
Original Assignee
Beijing CHJ Automotive Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing CHJ Automotive Information Technology Co Ltd filed Critical Beijing CHJ Automotive Information Technology Co Ltd
Priority to CN202111124026.3A priority Critical patent/CN114036533A/en
Publication of CN114036533A publication Critical patent/CN114036533A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a log transmission method and device, electronic equipment and a storage medium, relates to the technical field of data processing, and is applied to a master processor for receiving a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same equipment; acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor or not; and if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor can transmit the log file to external equipment. Compared with the prior art, the log file of the slave processor is uploaded to the master processor and then transmitted to the external equipment by the master processor, and the threat of network security can be effectively reduced by reducing the way of exposing the IP address of the slave processor to the outside.

Description

Log transmission method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a method and an apparatus for transmitting a log, an electronic device, and a storage medium.
Background
Logs are used to record the course of events as an important source of event data. Particularly, with the development of the vehicle-mounted electronic industry, in order to improve the usability of the vehicle-mounted electronic, event data needs to be acquired from a log to continuously improve the vehicle-mounted electronic.
In order to improve computing power, a plurality of identical processors are often disposed on a Printed Circuit Board (PCB) card, and the logs are uploaded by the plurality of processors. However, multiple processors expose multiple Internet Protocol addresses (IP) to the outside, which is likely to cause network security problem.
Disclosure of Invention
The disclosure provides a log transmission method and device, electronic equipment and a storage medium. The main purpose of the present disclosure is to reduce the occurrence of network security threats due to multiple processors exposing more IP addresses to the outside.
According to an aspect of the present disclosure, there is provided a log transmission method applied to a main processor, the method including:
receiving a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same equipment;
acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor or not;
if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor transmits the log file to an external device.
Optionally, the method further includes:
if the storage path does not exist, a storage path of the log file is newly established in the main processor;
and storing the log file according to the storage path of the newly-built log file.
Optionally, the method further includes:
and uploading the log file to a cloud server.
Optionally, if the log file is a vehicle-mounted log file, the method further includes:
and uploading the log file to a vehicle-mounted central control system so that the vehicle-mounted central control system uploads the log file to the cloud server.
Optionally, before uploading the log file to the cloud server, the method further includes:
and sending the log file to a message cache queue, and uploading the log file according to the priority order after a preset transmission threshold value of the message cache queue is reached.
Optionally, the method further includes:
and issuing a control command of real-time uploading of the log file to each slave processor so that the slave processors send the log files according to the control command of real-time uploading.
Optionally, the method further includes:
and receiving a modification instruction of each slave processor to the log file, and modifying the log file in the master processor according to the modification instruction.
Optionally, the receiving at least one log file sent from the processor includes:
and receiving at least one encrypted log file sent from the processor.
According to another aspect of the present disclosure, there is provided a log transmission apparatus applied to a main processor, the apparatus including:
the device comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving a log file sent by at least one slave processor, and the master processor and the at least one slave processor are in the same device;
an obtaining unit, configured to obtain attribute information carried in the log file, where the attribute information is used to identify whether a storage path exists in the log file in the main processor;
the confirming unit is used for confirming the storage path of the log file according to the attribute information when the storage path exists;
and the processing unit is used for storing the log file according to the storage path so that the main processor transmits the log file to external equipment.
Optionally, the apparatus further comprises:
the newly-built unit is used for newly building a storage path of the log file in the main processor when the storage path does not exist;
and the storage unit is used for storing the log file according to the storage path of the newly-built log file.
Optionally, the apparatus further comprises:
the first uploading unit is used for uploading the log file to a cloud server.
Optionally, if the log file is a vehicle-mounted log file, the apparatus further includes:
and the second uploading unit is used for uploading the log file to a vehicle-mounted central control system so that the vehicle-mounted central control system uploads the log file to the cloud server.
Optionally, the apparatus further comprises:
the sending unit is used for sending the log file to a message cache queue before the first uploading unit uploads the log file to a cloud server, and uploading the log file according to the priority order after a preset transmission threshold value of the message cache queue is reached.
Optionally, the apparatus further comprises:
and the issuing unit is used for issuing the control command for uploading the log file in real time to each slave processor so that the slave processor sends the log file according to the control command for uploading in real time.
Optionally, the apparatus further comprises:
and the second receiving unit is used for receiving a modification instruction of each slave processor for the log file and modifying the log file in the master processor according to the modification instruction.
Optionally, the first receiving unit is further configured to receive at least one encrypted log file sent from the slave processor.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the preceding aspect.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of the preceding aspect.
According to another aspect of the present disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the steps of the method according to the preceding aspect.
According to the log transmission method and device, the electronic device and the storage medium, a main processor receives a log file sent by at least one slave processor, wherein the main processor and the at least one slave processor are in the same device; acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor or not; if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor transmits the log file to an external device. Compared with the prior art, the log file of the slave processor is uploaded to the master processor and then transmitted to the external equipment by the master processor, and the threat of network security can be effectively reduced by reducing the way of exposing the IP address of the slave processor to the outside.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a schematic flowchart of a log transmission method according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram of a log file provided in an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of another log file provided by an embodiment of the present disclosure;
fig. 4 is a schematic view illustrating uploading of a log in a vehicle scene according to an embodiment of the present disclosure;
fig. 5 is a framework diagram of log transmission provided by an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a log transmission apparatus according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of another log transmission apparatus according to an embodiment of the present disclosure;
fig. 8 is a schematic block diagram of an example electronic device 300 provided by embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
A transmission method and apparatus of a log, an electronic device, and a storage medium according to embodiments of the present disclosure are described below with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart of a log transmission method according to an embodiment of the present disclosure.
As shown in fig. 1, the method is applied to a main processor, and comprises the following steps:
101. receiving a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same equipment.
In order to solve the security problem caused by exposing the IP addresses of the multiple slave processors in the related art, the master processor according to the embodiment of the disclosure is respectively interconnected with the multiple slave processors through an http protocol, and the slave processors do not have the capability of independently processing data and need to process data according to the received operation command of the master controller. At least one slave processor and the master processor are in the same device, and the safety of log file transmission can be ensured in the log file transmission process.
In practical application, the slave processor monitors a log file in the slave processor through an inotify mechanism provided by a linux system, determines whether the log file has file deletion, creation, renaming, closing and other operations, and uploads the log file to the master processor if the log file exists.
102. And acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor.
The attribute information is contained in the log file, and the purpose is to enable the main processor to clearly acquire the storage position of the log file at a glance according to the attribute information, so that the transmission efficiency of the log file is improved.
For convenience of understanding, please refer to fig. 2 and fig. 3, fig. 2 adopts a tree-shaped storage path form, fig. 3 adopts a lattice-shaped storage path form, and the attribute information may be added with the identification information of the slave processor besides the storage path identified in the master processor, so as to clarify the source of the log file.
103. And if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor can transmit the log file to external equipment.
According to the transmission method of the log, a master processor receives a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same device, attribute information carried in the log file is obtained, the attribute information is used for identifying whether a storage path exists in the master processor or not, if the storage path exists, the storage path of the log file is confirmed according to the attribute information, and the log file is stored according to the storage path, so that the master processor can transmit the log file to an external device. Compared with the prior art, the log file of the slave processor is uploaded to the master processor and then transmitted to the outside by the master processor, and the threat of network security is reduced by reducing the way that the processor exposes the IP address to the outside.
With the method shown in fig. 1, when the main processor determines that the storage path of the log file does not exist in the main processor, a storage path of a newly-built log file is locally created in the main processor, and the log file is stored according to the storage path of the newly-built log file.
In order to facilitate the unified management of the log files, after the main processor receives the log files sent by the slave processor in real time, the log files are synchronously sent to the cloud server, so that the cloud server can perform related data processing or unified management.
Providing an achievable application scenario, as shown in fig. 4, fig. 4 shows a schematic diagram of uploading a log in a vehicle scenario provided by an embodiment of the present disclosure; when the log file is a vehicle-mounted log file generated by a vehicle event, the log file is sent to a main processor through an http protocol by a plurality of slave processors arranged on a Printed Circuit Board (PCB), the main processor uploads the log file to a vehicle-mounted central control system, and the vehicle-mounted central control system uploads the log file to a cloud server.
In order not to affect the processing speed of uploading the log file to the cloud end by the main processor, in practical application, the log file is uploaded to a message cache queue according to the priority order of the message cache queue. As an implementation of the embodiment of the present disclosure, the priority order of sending log files may be determined according to the priority order of slave processing; as another implementation manner of the embodiment of the present disclosure, a priority order of sending log files may be determined according to a category of the log files, or may also be determined according to occupation of network resources, and further, a priority order of sending log files may also be determined according to a file size of the log files, which may be flexibly set according to different application scenarios, and this is not limited in the embodiment of the present disclosure.
As can be seen from the foregoing embodiments, the slave processors do not have the capability of independently processing data, and the operation of the slave processors is performed based on the control command of the master processor, which specifically includes: and issuing a real-time uploading control command of the log file to each slave processor in sequence, detecting the dynamic change of the log file by the slave processor based on an inotify mechanism, and uploading the log file in real time when the change of the log file is detected.
For example, detecting dynamic changes to the log file from the processor based on the inotify mechanism includes modifications to the log file or log file, including edits, deletions, closings, replacements, and the like. In order to synchronize the log files in the slave processor and the master processor with the log files, after the slave processor modifies the log files, a modification instruction of the log files is sent to the master processor, and the master processor synchronously modifies the log files in the master processor according to the modification instruction, so that the log files are conveniently and uniformly managed.
For clearly illustrating the present embodiment, the present embodiment provides a framework of log transmission shown in fig. 5, as shown in fig. 5, after acquiring corresponding log files from a generation subject (bottom layer) of the log files in sequence from a processor, the log files are uploaded to a main processor, and the generation subject of the log files shown in fig. 5 is only an exemplary example, and is not a specific limitation on the generation subject of the log files.
In order to further ensure the security of data transmission, when the slave processors transmit the log file, the log file is transmitted after being encrypted, and the master processor receives the encrypted log files from the plurality of slave processors respectively.
As a first possible implementation manner, when the slave processor encrypts the log file, a symmetric Encryption algorithm, such as a des (data Encryption standard) Encryption algorithm, a 3des (triple des) Encryption algorithm, or the like, may be used; as a second possible implementation, when the log file is encrypted from the processor, an asymmetric encryption Algorithm, such as MD5(Message Digest Algorithm), may also be used.
It should be noted that, according to different scenarios, one of the first possible implementation manner and the second possible implementation manner may be executed, or a combination of the first possible implementation manner and the second possible implementation manner may be executed, so that the flexibility of the encryption manner may meet different requirements of the user.
The log transmission mode can solve the problem that a plurality of IP addresses are exposed to the outside among a plurality of processors to cause network security, can also solve the problem that a plurality of processors upload simultaneously and network resources compete, and can also perform unified management on data of the processors.
Fig. 6 is a schematic structural diagram of a log transmission apparatus according to an embodiment of the present disclosure, as shown in fig. 6, including:
a first receiving unit 21, configured to receive a log file sent by at least one slave processor, where the master processor and the at least one slave processor are in the same device;
an obtaining unit 22, configured to obtain attribute information carried in the log file, where the attribute information is used to identify whether a storage path exists in the log file in the main processor;
a confirming unit 23, configured to, when the storage path exists, confirm the storage path of the log file according to the attribute information;
and the processing unit 24 is configured to store the log file according to the storage path, so that the main processor transmits the log file to an external device.
According to the transmission device for the log, a master processor receives a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same equipment; acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor or not; and if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor can transmit the log file to external equipment. Compared with the prior art, the log file of the slave processor is uploaded to the master processor and then transmitted to the outside by the master processor, and the threat of network security is reduced by reducing the way that the processor exposes the IP address to the outside.
According to an implementation manner of the embodiment of the present disclosure, as shown in fig. 7, the apparatus further includes:
a newly-built unit 25, configured to newly build a storage path of a log file in the main processor when the storage path does not exist;
and the storage unit 26 is used for storing the log file according to the storage path of the newly-built log file.
According to an implementation manner of the embodiment of the present disclosure, as shown in fig. 7, the apparatus further includes:
the first uploading unit 27 is configured to upload the log file to a cloud server.
According to an implementation manner of the embodiment of the present disclosure, as shown in fig. 7, the apparatus further includes:
and the second uploading unit 28 is configured to upload the log file to the vehicle-mounted central control system, so that the vehicle-mounted central control system uploads the log file to the cloud server.
According to an implementation manner of the embodiment of the present disclosure, as shown in fig. 7, the apparatus further includes:
the sending unit 29 is configured to send the log file to a message cache queue before the first uploading unit uploads the log file to a cloud server, and upload the log file according to a priority order after a preset transmission threshold of the message cache queue is reached.
Optionally, the apparatus further comprises:
the issuing unit 210 is configured to issue a control command for uploading the log file to each slave processor in real time, so that the slave processor sends the log file according to the control command for uploading in real time.
Optionally, the apparatus further comprises:
the second receiving unit 211 is configured to receive a modification instruction of each slave processor for the log file, and modify the log file in the master processor according to the modification instruction.
Optionally, the first receiving unit 21 is further configured to receive at least one encrypted log file sent from the processor.
It should be noted that the foregoing explanation of the method embodiment is also applicable to the apparatus of the present embodiment, and the principle is the same, and the present embodiment is not limited thereto.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 8 shows a schematic block diagram of an example electronic device 300 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 8, the device 300 includes a computing unit 301 that can perform various appropriate actions and processes in accordance with a computer program stored in a ROM (Read-Only Memory) 302 or a computer program loaded from a storage unit 308 into a RAM (Random Access Memory) 303. In the RAM 303, various programs and data required for the operation of the device 300 can also be stored. The calculation unit 301, the ROM 302, and the RAM 303 are connected to each other via a bus 304. An I/O (Input/Output) interface 305 is also connected to the bus 304.
Various components in device 300 are connected to I/O interface 305, including: an input unit 306 such as a keyboard, a mouse, or the like; an output unit 307 such as various types of displays, speakers, and the like; a storage unit 308 such as a magnetic disk, optical disk, or the like; and a communication unit 309 such as a network card, modem, wireless communication transceiver, etc. The communication unit 309 allows the device 300 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing Unit 301 include, but are not limited to, a CPU (Central Processing Unit), a GPU (graphics Processing Unit), various dedicated AI (Artificial Intelligence) computing chips, various computing Units running machine learning model algorithms, a DSP (Digital Signal Processor), and any suitable Processor, microprocessor, and the like. The calculation unit 301 executes the respective methods and processes described above, such as the transmission method of the log. For example, in some embodiments, the transmission method of the log may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 308. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 300 via ROM 302 and/or communication unit 309. When the computer program is loaded into RAM 303 and executed by the computing unit 301, one or more steps of the method described above may be performed. Alternatively, in other embodiments, the computing unit 301 may be configured to perform the aforementioned log transmission method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be realized in digital electronic circuitry, Integrated circuitry, FPGAs (Field Programmable Gate arrays), ASICs (Application-Specific Integrated circuits), ASSPs (Application Specific Standard products), SOCs (System On Chip, System On a Chip), CPLDs (Complex Programmable Logic devices), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or processors of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or processors, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a RAM, a ROM, an EPROM (Electrically Programmable Read-Only-Memory) or flash Memory, an optical fiber, a CD-ROM (Compact Disc Read-Only-Memory), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a Display device (e.g., a CRT (Cathode Ray Tube) or LCD (Liquid Crystal Display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: LAN (Local Area Network), WAN (Wide Area Network), internet, and blockchain Network.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The Server can be a cloud Server, also called a cloud computing Server or a cloud host, and is a host product in a cloud computing service system, so as to solve the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service ("Virtual Private Server", or simply "VPS"). The server may also be a server of a distributed system, or a server incorporating a blockchain.
It should be noted that artificial intelligence is a subject for studying a computer to simulate some human thinking processes and intelligent behaviors (such as learning, reasoning, thinking, planning, etc.), and includes both hardware and software technologies. Artificial intelligence hardware technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing, and the like; the artificial intelligence software technology mainly comprises a computer vision technology, a voice recognition technology, a natural language processing technology, machine learning/deep learning, a big data processing technology, a knowledge map technology and the like.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (12)

1. A log transmission method applied to a main processor, the method comprising:
receiving a log file sent by at least one slave processor, wherein the master processor and the at least one slave processor are in the same equipment;
acquiring attribute information carried in the log file, wherein the attribute information is used for identifying whether a storage path exists in the log file in the main processor or not;
if the storage path exists, confirming the storage path of the log file according to the attribute information, and storing the log file according to the storage path so that the main processor transmits the log file to an external device.
2. The method of claim 1, further comprising:
if the storage path does not exist, a storage path of the log file is newly established in the main processor;
and storing the log file according to the storage path of the newly-built log file.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
and uploading the log file to a cloud server.
4. The method of claim 3, wherein if the log file is an in-vehicle log file, the method further comprises:
and uploading the log file to a vehicle-mounted central control system so that the vehicle-mounted central control system uploads the log file to the cloud server.
5. The method of claim 3, wherein prior to uploading the log file to a cloud server, the method further comprises:
and sending the log file to a message cache queue, and uploading the log file according to the priority order after a preset transmission threshold value of the message cache queue is reached.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
and issuing a control command of real-time uploading of the log file to each slave processor so that the slave processors send the log files according to the control command of real-time uploading.
7. The method according to claim 1 or 2, characterized in that the method further comprises:
and receiving a modification instruction of each slave processor to the log file, and modifying the log file in the master processor according to the modification instruction.
8. The method of claim 1 or 2, wherein receiving at least one log file sent from a processor comprises:
and receiving at least one encrypted log file sent from the processor.
9. A log transmission apparatus applied to a main processor, the apparatus comprising:
the device comprises a first receiving unit, a second receiving unit and a third receiving unit, wherein the first receiving unit is used for receiving a log file sent by at least one slave processor, and the master processor and the at least one slave processor are in the same device;
an obtaining unit, configured to obtain attribute information carried in the log file, where the attribute information is used to identify whether a storage path exists in the log file in the main processor;
the confirming unit is used for confirming the storage path of the log file according to the attribute information when the storage path exists;
and the processing unit is used for storing the log file according to the storage path so as to transmit the log file to external equipment by the main processor.
10. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-8.
11. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-8.
12. A computer program product comprising a computer program which, when being executed by a processor, carries out the steps of the method according to any one of claims 1-8.
CN202111124026.3A 2021-09-24 2021-09-24 Log transmission method and device, electronic equipment and storage medium Pending CN114036533A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111124026.3A CN114036533A (en) 2021-09-24 2021-09-24 Log transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111124026.3A CN114036533A (en) 2021-09-24 2021-09-24 Log transmission method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114036533A true CN114036533A (en) 2022-02-11

Family

ID=80140525

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111124026.3A Pending CN114036533A (en) 2021-09-24 2021-09-24 Log transmission method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114036533A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114490164A (en) * 2022-04-02 2022-05-13 深圳市云视机器人有限公司 Log collection method, system, device and computer storage medium
CN114968962A (en) * 2022-08-01 2022-08-30 中瓴智行(成都)科技有限公司 Log management method and system based on multi-core communication and electronic equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114490164A (en) * 2022-04-02 2022-05-13 深圳市云视机器人有限公司 Log collection method, system, device and computer storage medium
CN114968962A (en) * 2022-08-01 2022-08-30 中瓴智行(成都)科技有限公司 Log management method and system based on multi-core communication and electronic equipment

Similar Documents

Publication Publication Date Title
CN114036533A (en) Log transmission method and device, electronic equipment and storage medium
CN112911013B (en) Cloud application processing method and device, computer equipment and storage medium
US20230020324A1 (en) Task Processing Method and Device, and Electronic Device
US20230297557A1 (en) Method for monitoring a state of an external data source, device, and medium
US11070577B2 (en) Data determination device, data determination method, and data determination program
JP2022095860A (en) Signal lamp failure monitoring method, signal lamp failure monitoring apparatus, electronic device, and storage medium
CN115631273A (en) Big data duplicate removal method, device, equipment and medium
US20160112274A1 (en) Real time simulation monitoring
US20230144949A1 (en) Virtual-machine cold migration method and apparatus, electronic device and storage medium
EP2942711A2 (en) Dynamic generation of proxy connections
CN112860796B (en) Method, apparatus, device and storage medium for synchronizing data
US9413684B2 (en) Provisioning legacy systems network architecture resource communications through a group of servers in a data center
CN114070889A (en) Configuration method, traffic forwarding method, device, storage medium, and program product
CN114139605A (en) Distributed model training method, system, device and storage medium
CN113656812A (en) Data management system and method based on big data technology
CN113411271A (en) Data access method, device, equipment and storage medium
CN112860811A (en) Method and device for determining data blood relationship, electronic equipment and storage medium
CN110262756B (en) Method and device for caching data
US11772681B2 (en) Method and apparatus for processing autonomous driving simulation data, and electronic device
CN112560462B (en) Event extraction service generation method, device, server and medium
WO2024051273A1 (en) Cloud technology-based internet of things device information display method, and cloud management platform
CN113868208A (en) File sharing method and device based on RPA and AI
CN115756532A (en) Configuration file updating method and device and electronic equipment
CN115396436A (en) Service access method, device, electronic equipment and medium
JP2022088626A (en) Application communication method, application communication apparatus, electronic device and recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination