CN114328408B - Log screening method, system, equipment and medium - Google Patents

Log screening method, system, equipment and medium Download PDF

Info

Publication number
CN114328408B
CN114328408B CN202111510829.2A CN202111510829A CN114328408B CN 114328408 B CN114328408 B CN 114328408B CN 202111510829 A CN202111510829 A CN 202111510829A CN 114328408 B CN114328408 B CN 114328408B
Authority
CN
China
Prior art keywords
log
screened
distance
current
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111510829.2A
Other languages
Chinese (zh)
Other versions
CN114328408A (en
Inventor
张权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202111510829.2A priority Critical patent/CN114328408B/en
Publication of CN114328408A publication Critical patent/CN114328408A/en
Application granted granted Critical
Publication of CN114328408B publication Critical patent/CN114328408B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a log screening method, which comprises the following steps: acquiring a log file to be screened and a list log file; calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively; the logs corresponding to the first LD distance smaller than a first threshold value are calculated to be the second LD distance with the current logs to be screened again; and responding to the second LD distance being smaller than a second threshold value, and storing the current log to be screened to a preset position. The invention also discloses a system, computer equipment and a readable storage medium. The scheme provided by the invention can screen the log files (such as BMC log and OS system log), and is not influenced by updating the list log files while improving the screening precision.

Description

Log screening method, system, equipment and medium
Technical Field
The invention relates to the field of logs, in particular to a log screening method, a system, equipment and a storage medium.
Background
The stability of a server is one of the important indicators for measuring the quality of the server. Stability testing may be described as repeating operations of powering on and off and logging for a certain time or a certain number of times. During this period, a large number of logs are generated under the OS, and some logs record that the OS is normally powered on and off, and some logs are during this period, the server generates a problem error log. While part of the error logs are negligible logs under the OS, the rest of the logs are the real problems in the server test process. Only if these non-negligible logs are found can it be determined if an anomaly has occurred at the server.
In the prior art, all logs under the OS can be recorded into one file by running a log check script. And a black-and-white list which is set in advance exists in the script, the logs generated by the OS are screened through the list, and finally the selected logs are the machine problems.
However, in the prior art, the black-and-white list is used for screening, the screening speed is low, the accuracy is not high, and the BMC logs cannot be screened because the logs can be screened only under the OS. Because the log check script is not updated in real time, a certain period of time exists, but the negligible log under the OS is updated in real time, which results in that the log screened by the log check script still has the negligible log. Meanwhile, black and white lists corresponding to different log check scripts are different, and cannot be suitable for all scenes.
Disclosure of Invention
In view of this, in order to overcome at least one aspect of the above-mentioned problems, an embodiment of the present invention provides a log screening method, including the following steps:
acquiring a log file to be screened and a list log file;
calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
the logs corresponding to the first LD distance smaller than a first threshold value are calculated to be the second LD distance with the current logs to be screened again;
and responding to the second LD distance being smaller than a second threshold value, and storing the current log to be screened to a preset position.
In some embodiments, calculating the first LD distance using the preset proportion of the content of the current log to be screened in the log file to be screened and the preset proportion of the content of each log in the list log file respectively further includes:
judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not;
and responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion.
In some embodiments, further comprising:
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors;
calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file;
screening a plurality of logs from the list log file according to the cosine distance;
respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened;
and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
In some embodiments, calculating the first LD distance using the preset proportion of the content of the current log to be screened in the log file to be screened and the preset proportion of the content of each log in the list log file respectively further includes:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a log screening system, including:
the acquisition module is configured to acquire the log files to be screened and the list log files;
the first calculation module is configured to calculate a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
the second calculation module is configured to calculate a second LD distance from the log corresponding to the first LD distance smaller than a first threshold value and the current log to be screened again;
and the storage module is configured to store the current log to be screened to a preset position in response to the fact that the second LD distance is smaller than a second threshold value.
In some embodiments, the first computing module is further configured to:
judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not;
and responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion.
In some embodiments, the first computing module is further configured to:
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors;
calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file;
screening a plurality of logs from the list log file according to the cosine distance;
respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened;
and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
In some embodiments, the first computing module is further configured to:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program executable on the processor, wherein the processor performs the steps of any one of the log screening methods described above when the program is executed.
Based on the same inventive concept, according to another aspect of the present invention, there is also provided a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any one of the log screening methods described above.
The invention has one of the following beneficial technical effects: the scheme provided by the invention can screen the log files (such as BMC log and OS system log), and is not influenced by updating the list log files while improving the screening precision.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a log screening method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a log screening system according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a computer device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention will be described in further detail with reference to the accompanying drawings.
It should be noted that, in the embodiments of the present invention, all the expressions "first" and "second" are used to distinguish two entities with the same name but different entities or different parameters, and it is noted that the "first" and "second" are only used for convenience of expression, and should not be construed as limiting the embodiments of the present invention, and the following embodiments are not described one by one.
The LD algorithm (Levenshtein Distance) is also referred to as an Edit Distance algorithm (Edit Distance). The number of operations during this period represents the difference value between the two character strings by inserting a character, deleting a character, replacing a character, and changing the character into another character string B. The lower the difference value, the higher the character string matching degree. For example, string a: kitten becomes string B: and (5) setting. The first step: kitten— sitten. k is replaced by s. And a second step of: sitten— sittin. e is replaced with i. And a third step of: setin— seting. G is inserted at the end. So the edit distance of kitten and sitting is 3.
According to an aspect of the present invention, an embodiment of the present invention proposes a log screening method, as shown in fig. 1, which may include the steps of:
s1, acquiring a log file to be screened and a list log file;
s2, calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
s3, calculating a second LD distance from the log corresponding to the first LD distance smaller than a first threshold value and the current log to be screened again;
and S4, responding to the fact that the second LD distance is smaller than a second threshold value, and storing the current log to be screened to a preset position.
The scheme provided by the invention can screen the log files (such as BMC log and OS system log), and is not influenced by updating the list log files while improving the screening precision.
In some embodiments, in step S1, the log file to be filtered and the list log file are obtained, specifically, the log file to be filtered and the list log file may be saved to a preset address in advance, then the corresponding file is obtained by selecting different addresses, and after the selection is finished, the path of the file is displayed on the interface, that is, the file can be read by using the QT getOpenFileName function.
In some embodiments, S2, calculating the first LD distance using the preset proportion of the content of the current log to be screened in the log file to be screened and the preset proportion of the content of each log in the list log file, further includes:
judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not;
and responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion.
Specifically, whether the size of the content of the preset proportion of the current log to be screened in the log file to be screened is larger than a preset value or not can be judged first, if not, the fact that the size of the content of the current log to be screened is proper is indicated, and the first LD distance is calculated by directly utilizing the content of the preset proportion of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file respectively. For example, the LD distance corresponding to the first half of the contents of the two may be calculated first, if the compiling distance is smaller than the first threshold value, which represents that the two are very close, and the LD value needs to be calculated again by using the complete data. When the compiling distance is greater than the first threshold value, it is represented that the two are dissimilar, so that calculation does not need to be continued. By this operation, the execution time of 1/3 can be shortened as compared with the manner of directly performing data calculation.
It should be noted that, from the practical application scenario, the log contents are compared, and if the portions with the preset sizes are different, the log contents and the log contents are not similar in whole.
In some embodiments, further comprising:
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors;
calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file;
screening a plurality of logs from the list log file according to the cosine distance;
respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened;
and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
Specifically, when the compared data is too large, the calculation time is extremely long due to the cyclic calculation, so that the initial screening can be performed by using a cosine similarity algorithm, letters and numbers are sequentially assigned from 0 according to the ASCII code sequence, two vectors are finally obtained, a cosine value is calculated by a cosine formula, a cosine distance threshold value can be set, when the calculated cosine value is greater than the threshold value, the two vectors are quite similar, so that judgment is not needed, and under the other conditions, judgment is needed to be continued, and the next operation is continued, namely a plurality of logs are screened out from the list log file according to the cosine distance; respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened; and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
In some embodiments, calculating the first LD distance using the preset proportion of the content of the current log to be screened in the log file to be screened and the preset proportion of the content of each log in the list log file respectively further includes:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
Specifically, the same data of the content of the current log to be screened with the content of the log of the preset proportion in the same position of each log in the list log file can be screened out and deleted, and the rest data is stored in a new array. Since LD (i, j) =ld (i-1, j-1) will exist when calculating LD distance using LD algorithm, deleting this part of data will not affect the value of LD distance, but the amount of data calculated can be greatly reduced. And the important data in the log only contains numbers and letters, and the rest of special characters are not in the reference range, so that the data can be compared with ASCII codes thereof and deleted identically. Further reducing the amount of data calculated. For example, the content of the log to be screened with the preset proportion is ABCD, the content of one log in the list file with the preset proportion is ACD, the same data of the same position is a, and after deleting a, only the LD distance between BCD and CD needs to be calculated, and the LD distance between BCD and CD is 1.
Therefore, each log in the log files to be screened is screened through the scheme provided by the invention, so that the logs similar to the logs in the list log files are screened, and the screening precision can be improved and the influence of updating of the list log files is avoided.
Based on the same inventive concept, according to another aspect of the present invention, there is further provided a log screening system 400, as shown in fig. 2, including:
an obtaining module 401 configured to obtain a log file to be screened and a manifest log file;
a first calculating module 402, configured to calculate a first LD distance by using a preset proportion of contents of a current log to be screened in the log file to be screened and the preset proportion of contents of each log in the list log file respectively;
a second calculation module 403, configured to calculate a second LD distance from the log corresponding to the first LD distance smaller than the first threshold and the current log to be filtered again;
and a saving module 404, configured to save the current log to be screened to a preset position in response to the second LD distance being smaller than a second threshold.
In some embodiments, the first computing module 402 is further configured to:
judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not;
and responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion.
In some embodiments, the first computing module 402 is further configured to:
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors;
calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file;
screening a plurality of logs from the list log file according to the cosine distance;
respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened;
and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
In some embodiments, the first computing module 402 is further configured to:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 3, an embodiment of the present invention further provides a computer apparatus 501, including:
at least one processor 520; and
the memory 510, the memory 510 stores a computer program 511 executable on a processor, and the processor 520 executes the steps of any of the log screening methods described above when executing the program.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 4, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610 when executed by a processor perform the steps of any of the log screening methods as above.
Finally, it should be noted that, as will be appreciated by those skilled in the art, all or part of the procedures in implementing the methods of the embodiments described above may be implemented by a computer program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, and the program may include the procedures of the embodiments of the methods described above when executed.
Further, it should be appreciated that the computer-readable storage medium (e.g., memory) herein can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, where the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.

Claims (6)

1. A log screening method, comprising the steps of:
acquiring a log file to be screened and a list log file;
calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
calculating a second LD distance from the complete data of the log in the list log file corresponding to the first LD distance smaller than a first threshold value and the complete data of the current log to be screened again;
responding to the second LD distance being smaller than a second threshold value, and storing the current log to be screened to a preset position;
the method for calculating the first LD distance by using the content of the current log to be screened in the log file to be screened in the preset proportion and the content of each log in the list log file in the preset proportion, further comprises the steps of: judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not; responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors; calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file; screening a plurality of logs from the list log file according to the cosine distance; respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened; and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
2. The method of claim 1, wherein calculating a first LD distance using a preset proportion of content of a current log to be screened in the log file to be screened and the preset proportion of content of each log in the manifest log file, respectively, further comprises:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
3. A log screening system, comprising:
the acquisition module is configured to acquire the log files to be screened and the list log files;
the first calculation module is configured to calculate a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
the second calculation module is configured to calculate a second LD distance from the complete data of the log in the list log file corresponding to the first LD distance smaller than a first threshold value and the complete data of the current log to be screened again;
the storage module is configured to store the current log to be screened to a preset position in response to the fact that the second LD distance is smaller than a second threshold value;
wherein the first computing module is further configured to: judging whether the size of the content of the preset proportion of the current log to be screened is larger than a preset value or not; responding to the preset value, and calculating a first LD distance by using the content of the current log to be screened in the log file to be screened in a preset proportion and the content of each log in the list log file in the preset proportion respectively;
in response to the current log to be screened and the list log file, respectively and sequentially assigning letters and numbers in each log from 0 according to the ASCII code sequence of the current log to be screened and the list log file to obtain corresponding vectors; calculating cosine distances between vectors corresponding to the current logs to be screened and vectors corresponding to each log in the list log file; screening a plurality of logs from the list log file according to the cosine distance; respectively calculating the LD distance between each log in the plurality of logs and the current log to be screened; and responding to the LD distance being smaller than the second threshold value, and storing the current log to be screened to a preset position.
4. The system of claim 3, wherein the first computing module is further configured to:
and responding to the fact that the content of the current log to be screened in the log file to be screened and the content of the preset proportion of each log in the list log file have the same data at the same position, and respectively deleting the same data at the same position and then calculating the first LD distance.
5. A computer device, comprising:
at least one processor; and
a memory storing a computer program executable on the processor, wherein the processor performs the steps of the method of any of claims 1-2 when the program is executed.
6. A computer readable storage medium storing a computer program, which when executed by a processor performs the steps of the method according to any one of claims 1-2.
CN202111510829.2A 2021-12-10 2021-12-10 Log screening method, system, equipment and medium Active CN114328408B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111510829.2A CN114328408B (en) 2021-12-10 2021-12-10 Log screening method, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111510829.2A CN114328408B (en) 2021-12-10 2021-12-10 Log screening method, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN114328408A CN114328408A (en) 2022-04-12
CN114328408B true CN114328408B (en) 2024-01-16

Family

ID=81051515

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111510829.2A Active CN114328408B (en) 2021-12-10 2021-12-10 Log screening method, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN114328408B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024987A (en) * 2014-04-30 2015-11-04 中国移动通信集团设计院有限公司 Web service log monitoring method and apparatus
CN112445912A (en) * 2020-11-06 2021-03-05 苏州浪潮智能科技有限公司 Fault log classification method, system, device and medium
CN113626232A (en) * 2021-06-30 2021-11-09 苏州浪潮智能科技有限公司 Method, device and equipment for checking server logs and readable medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11372841B2 (en) * 2020-01-30 2022-06-28 International Business Machines Corporation Anomaly identification in log files

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105024987A (en) * 2014-04-30 2015-11-04 中国移动通信集团设计院有限公司 Web service log monitoring method and apparatus
CN112445912A (en) * 2020-11-06 2021-03-05 苏州浪潮智能科技有限公司 Fault log classification method, system, device and medium
CN113626232A (en) * 2021-06-30 2021-11-09 苏州浪潮智能科技有限公司 Method, device and equipment for checking server logs and readable medium

Also Published As

Publication number Publication date
CN114328408A (en) 2022-04-12

Similar Documents

Publication Publication Date Title
KR102214297B1 (en) Conditional validation rules
US9921948B2 (en) Software commit risk level
US9141519B2 (en) Accurate identification of software tests based on changes to computer software code
US8140911B2 (en) Dynamic software tracing
CN111382070B (en) Compatibility testing method and device, storage medium and computer equipment
US9384117B2 (en) Machine and methods for evaluating failing software programs
US20090222646A1 (en) Method and apparatus for detecting processor behavior using instruction trace data
JP2006031109A (en) Management system and management method
US10169218B2 (en) Method for automatically validating data against a predefined data specification
US20070245327A1 (en) Method and System for Producing Process Flow Models from Source Code
US8286141B2 (en) Instruction-trace generation program, instruction-trace generating device, and instruction-trace generating method
CN114328408B (en) Log screening method, system, equipment and medium
US20070174816A1 (en) Categorizing images of software failures
CN111159028A (en) Webpage testing method and device
US11740895B2 (en) Generation of software program repair explanations
CN111581019B (en) Test method and device for storage fault recovery
JP2016167180A (en) Debug support apparatus, debug support system, debug support method and debug support program
JP7380851B2 (en) Test script generation device, test script generation method and program
CN115705297A (en) Code call detection method, device, computer equipment and storage medium
CN111309598A (en) Test case execution environment recovery method, system, terminal and storage medium
CN107102938B (en) Test script updating method and device
CN112130838A (en) Transaction data processing method and device
CN112527265A (en) Method for automatically injecting logs and computer equipment
JP6583033B2 (en) Driver generation program, apparatus, and method
CN112860544B (en) Code detection method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant