CN102957550A - System and method for alarming based on log detection - Google Patents
System and method for alarming based on log detection Download PDFInfo
- Publication number
- CN102957550A CN102957550A CN2011102427898A CN201110242789A CN102957550A CN 102957550 A CN102957550 A CN 102957550A CN 2011102427898 A CN2011102427898 A CN 2011102427898A CN 201110242789 A CN201110242789 A CN 201110242789A CN 102957550 A CN102957550 A CN 102957550A
- Authority
- CN
- China
- Prior art keywords
- detected
- journal file
- file
- configuration data
- situation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0686—Additional information in the notification, e.g. enhancement of specific meta-data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/085—Retrieval of network configuration; Tracking network configuration history
- H04L41/0853—Retrieval of network configuration; Tracking network configuration history by actively collecting configuration information or by backing up configuration information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a system and a method for alarming based on log detection. The method includes: reading configuration data of log detection, wherein the configuration data include to-be-detected log files, a regular expression and alarming messages; detecting the log files according to the configuration data to generate detection results; and sending the alarming messages according to the detection results. By means of the system and the method for alarming based on log detection, a uniform multi-service alarming mechanism can be realized, and flexibility, simplicity, high expansibility and wide application area can be achieved.
Description
Technical field
The present invention relates to the communications field, particularly, relate in particular to alarm method and system that a kind of Log-based detects.
Background technology
In order to guarantee the timely embodiment of system journal testing result, existing each running status professional and application system all needs monitoring, will in time send alarm for the situation that departs from normal condition.The common technique means are that the alarm platform is formulated alarm interface, and every sub-systems or module oneself detects and also produce alarm, with about stationary interface transmission warning information to the alarm platform.Also exist at present by analyzing daily record to produce the technical scheme of alarm, but the often existence of these technical schemes some can not detect simultaneously a plurality of files, can not be applicable to the problems such as all daily records or alarm discovery mechanism underaction.
The daily record of prior art detects the alarm mode can't detect a plurality of files simultaneously, and the detection mode versatility is poor, and the problem that can't expand does not flexibly also have effective solution at present.
Summary of the invention
Alarm method and system that main purpose of the present invention is to provide a kind of Log-based to detect, with solve prior art problem.
To achieve these goals, an aspect of of the present present invention, the alarm method that provides a kind of Log-based to detect.
The alarm method that Log-based of the present invention detects comprises: read the configuration data that daily record detects, configuration data comprises: journal file to be detected, regular expression and warning information; According to configuration data journal file is detected, to generate testing result; Send warning information according to testing result.
Further, according to configuration data journal file is detected, comprise to generate testing result: read the journal file to be detected in the configuration data; In the situation that journal file to be detected is not empty, file to be detected is detected; There is newly-increased log lines in the situation that detect journal file to be detected, content and the regular expression that increases log lines newly carried out matching treatment to obtain testing result.
Further, send warning information according to testing result and comprise: in the situation of testing result for the content of newly-increased log lines and matching regular expressions success, send warning information.
Further, after the journal file to be detected in reading configuration data, method also comprises:
Journal file to be detected is set to first journal file to be detected; Judge whether journal file to be detected is empty, in the situation that journal file to be detected is empty, system reads and detect journal file to be detected again after predetermined dormancy time.
Further, after sending warning information according to testing result, perhaps there is not newly-increased log lines in the situation that detect journal file to be detected, method also comprises: file to be detected is set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that journal file to be detected is last journal file, the mark of journal file to be detected is set to sky.
To achieve these goals, another aspect of the present invention, the warning system that provides a kind of Log-based to detect.
The warning system that Log-based of the present invention detects comprises: configuration module.Be used for reading the configuration data that daily record detects, configuration data comprises: journal file to be detected, regular expression and warning information; The daily record detection module is used for according to configuration data journal file being detected, to generate testing result; The alarm interface module is used for sending warning information according to testing result.
Further, the daily record detection module comprises: read module, for the journal file to be detected that reads configuration data; Detection module is used in the situation that journal file to be detected is not empty file to be detected being detected; Matching module is used for having newly-increased log lines in the situation that detect journal file to be detected, and content and the regular expression that increases log lines newly carried out matching treatment to obtain testing result.
Further, the alarm interface module comprises: alarm module is used for sending warning information in the situation of testing result for the content of newly-increased log lines and matching regular expressions success.
Further, system also comprises: detection module is set, is used for that journal file to be detected is set to first journal file and detects; The first processing module is used for judging whether journal file to be detected is empty, in the situation that journal file to be detected is empty, system reads and detect journal file to be detected again after predetermined dormancy time.
Further, system also comprises: the second processing module, be used for file to be detected and be set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that journal file to be detected is last journal file, the mark of journal file to be detected is set to sky.
By the present invention, adopt and read the configuration data that daily record detects, configuration data comprises: journal file to be detected, regular expression and warning information; According to configuration data journal file is detected, to generate testing result; Send warning information according to testing result, the daily record that has solved prior art detects the alarm mode and can't detect simultaneously a plurality of files, and the detection mode versatility is poor, the problem that can't expand flexibly, and then reached and realize unified multi-service alarming mechanism, reach flexibly simple, strong, the widely applicable effect of extensibility.
Description of drawings
Accompanying drawing described herein is used to provide a further understanding of the present invention, consists of a part of the present invention, and illustrative examples of the present invention and explanation thereof are used for explaining the present invention, do not consist of improper restriction of the present invention.In the accompanying drawings:
Fig. 1 is the structural representation according to the warning system of the Log-based detection of the embodiment of the invention;
Fig. 2 is the flow chart according to the alarm method of the Log-based detection of the embodiment of the invention; And
Fig. 3 is the detail flowchart according to the alarm method of the Log-based detection of the embodiment of the invention.
Embodiment
In order to make technical problem to be solved by this invention, technical scheme and beneficial effect clearer, clear, below in conjunction with drawings and Examples, the present invention is further elaborated.Should be appreciated that specific embodiment described herein only in order to explain the present invention, is not intended to limit the present invention.
The invention provides alarm method and system that a kind of Log-based detects.
Fig. 1 is the structural representation according to the warning system of the Log-based detection of the embodiment of the invention.As shown in Figure 1, this system comprises: configuration module, daily record detection module and alarm interface module.
Wherein, configuration module.Be used for reading the configuration data that daily record detects, configuration data comprises: journal file to be detected, regular expression and warning information; The daily record detection module is used for according to configuration data journal file being detected, to generate testing result; The alarm interface module is used for sending warning information according to testing result.
Above-described embodiment has been described the composition structure of the warning system of Log-based detection, comprises the external interface of relation, system of internal module.Have said system as can be known, system is comprised of configuration data and a program.The form of configuration can be configuration file or configuration database, and it has recorded the required configuration data of native system, comprises tested file, regular expression and warning information.Program is comprised of three modules: configuration module mainly is responsible for reading of configuration data; The daily record detection module is mainly monitored, is read each journal file, finds behind the new line increment it and regular expression to be mated; The alarm interface module is responsible for sending a warning message, and when the match is successful for log lines, produces alarm, sends to the alarming processing system by this module.This system has realized unified multi-service alarming mechanism, reaches flexibly simple, strong, the widely applicable effect of extensibility.
Concrete, configuration module in above-described embodiment can provide all required configurations of native system, comprise the target journaling file (can be a plurality of) that will detect, regular expression (being used for the coupling log lines), warning information (being used for producing when the match is successful alarm).
Wherein, journal file configuration: configuration provides the journal file that will detect quantity, and the filename of each journal file.
The regular expression configuration: regular expression is used for the coupling log lines, and applicability is strong, and very flexible.Find just can produce alarm with the log lines of matching regular expressions.Mate such as following log lines and regular expression, just can produce an alarm.Regular expression: " ^.+ [error] .+healthcheck:upstream ((.+)) stat up->down ".Log lines: " 2011/03/08 11:56:53[error] 14662#0:healthcheck:upstream (10.46.174.2:8080) stat up->down ".
Alarm interface information configuration: provide to send the required information of alarm interface, such as comprising the information such as alarm code, alarm cause, alarm description.
Daily record detection module in above-described embodiment can comprise: read module, for the journal file to be detected that reads configuration data; Detection module is used in the situation that journal file to be detected is not empty file to be detected being detected; Matching module is used for having newly-increased log lines in the situation that detect journal file to be detected, and content and the regular expression that increases log lines newly carried out matching treatment to obtain testing result.This daily record detection module has realized that duty detects journal file.
Alarm interface module in above-described embodiment can comprise: alarm module is used for sending warning information in the situation of testing result for the content of newly-increased log lines and matching regular expressions success.This alarm interface module has realized the alarm that the daily record detection module produces is sent to the external alarm treatment system.
Preferably, said system can also comprise: detection module is set, is used for that journal file to be detected is set to first journal file and detects; The first processing module is used for judging whether journal file to be detected is empty, in the situation that journal file to be detected is empty, system reads and detect journal file to be detected again after predetermined dormancy time.
Preferably, system in above-described embodiment can also comprise: the second processing module, be used for file to be detected and be set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that journal file to be detected is last journal file, the mark of journal file to be detected is set to sky.
Fig. 2 is the flow chart according to the alarm method of the Log-based detection of the embodiment of the invention; And Fig. 3 is the detail flowchart of the alarm method that detects according to the Log-based of the embodiment of the invention.
As shown in Figure 2, the alarm method of this Log-based detection comprises the steps:
Step S102. reads the configuration data that daily record detects by the configuration module among Fig. 1, and configuration data comprises: journal file to be detected, regular expression and warning information.
Step S104 comes the executive basis configuration data that journal file is detected by the daily record detection module among Fig. 1, to generate testing result.
Step S106 realizes sending warning information according to testing result by the alarm interface module among Fig. 1.
Above-described embodiment has realized that system at first obtains configuration information after startup, then detects each file, for newly-increased log lines, itself and each regular expression of setting is mated, and the match is successful then should produce the alarm of having set accordingly.Thereby realize unified multi-service alarming mechanism, reach flexibly simple, strong, the widely applicable effect of extensibility.
Journal file is detected according to configuration data in above-described embodiment can comprise to generate testing result: read the journal file to be detected in the configuration data; In the situation that journal file to be detected is not empty, file to be detected is detected; There is newly-increased log lines in the situation that detect journal file to be detected, content and the regular expression that increases log lines newly carried out matching treatment to obtain testing result.
Step in above-described embodiment: sending warning information according to testing result can comprise: in the situation of testing result for the content of newly-increased log lines and matching regular expressions success, send warning information.
Preferably, after the journal file to be detected in reading configuration data, method can also comprise: journal file to be detected is set to first journal file detects; Judge whether journal file to be detected is empty, in the situation that journal file to be detected is empty, system reads and detect journal file to be detected again after predetermined dormancy time.
Preferably, after sending warning information according to testing result, perhaps there is not newly-increased log lines in the situation that detect journal file to be detected, method can also comprise: file to be detected is set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that journal file to be detected is last journal file, the mark of journal file to be detected is set to sky.
Concrete, the detailed operation flow process of the warning system that detects based on Log-based shown in Figure 3.Its step is as follows:
Step 201, system reads configuration data, comprises journal file to be detected, regular expression, warning information.
Step 202, system will detect journal file repeatedly in order, and it is first journal file that journal file to be checked at first is set.
Step 203 judges that whether file to be checked is NULL (for NULL represents all journal files of epicycle all inspected is complete).Be not NULL to 204, otherwise turn 208.
Step 204 detects file to be checked.Comprise stamp detection time, file reading content etc.
Step 206 is mated new line increment and each regular expression, and the match is successful then sends alarm.
Step 207, putting file to be checked is next journal file.If this file to be checked is last journal file, illustrate that the epicycle All Files has all detected one time, then putting file to be checked is that NULL comes mark.
Step 208, turns 202 and continues to detect journal file program dormancy a period of time.Dormancy time is configurable according to service conditions, such as being 1 second.
Need to prove, the embodiment of the invention can be carried out in the computer system such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although there is shown logical order in flow process, but in some cases, can carry out step shown or that describe with the order that is different from herein.
From above embodiment describes, can find out, the present invention has realized following technique effect: the method and system realize the detection of a plurality of journal files is produced alarm, take matching regular expressions as detection means, flexible configuration is simple, and extensibility is strong, and is widely applicable.Beneficial effect has and shows: reduce lower deployment cost, main frame deploy one a cover native system can carry out daily record detection and alarm to all application on this main frame; Highly versatile is applicable to the types of applications system: adopting regular expression, all is effective for common daily record; And flexible configuration, any business, any alarm all are suitable for; Autgmentability is strong, and function change is convenient: only needing to revise configuration file just can increase, delete and revise functions such as the file of detection, alarms.。
Obviously, those skilled in the art should be understood that, above-mentioned each module of the present invention or each step can realize with general calculation element, they can concentrate on the single calculation element, perhaps be distributed on the network that a plurality of calculation elements form, alternatively, they can be realized with the executable program code of calculation element, thereby, they can be stored in the storage device and be carried out by calculation element, perhaps they are made into respectively a plurality of integrated circuit modules, perhaps a plurality of modules in them or step are made into the single integrated circuit module and realize.Like this, the present invention is not restricted to any specific hardware and software combination.
Above-mentioned explanation illustrates and has described a preferred embodiment of the present invention, but as previously mentioned, be to be understood that the present invention is not limited to the disclosed form of this paper, should not regard the eliminating to other embodiment as, and can be used for various other combinations, modification and environment, and can in invention contemplated scope described herein, change by technology or the knowledge of above-mentioned instruction or association area.And the change that those skilled in the art carry out and variation do not break away from the spirit and scope of the present invention, then all should be in the protection range of claims of the present invention.
Claims (10)
1. the alarm method that Log-based detects is characterized in that, comprising:
Read the configuration data that daily record detects, described configuration data comprises: journal file to be detected, regular expression and warning information;
According to described configuration data journal file is detected, to generate testing result;
Send warning information according to described testing result.
2. method according to claim 1 is characterized in that, according to described configuration data journal file is detected, and comprises to generate testing result:
Read the journal file to be detected in the described configuration data;
In the situation that described journal file to be detected is not empty, described file to be detected is detected;
There is newly-increased log lines in the situation that detect described journal file to be detected, content and the described regular expression of described newly-increased log lines carried out matching treatment to obtain testing result.
3. method according to claim 2 is characterized in that, sends warning information according to described testing result and comprises:
Be in the situation of the content of described newly-increased log lines and described matching regular expressions success in testing result, send described warning information.
4. method according to claim 2 is characterized in that, after the journal file to be detected in reading described configuration data, described method also comprises:
Described journal file to be detected is set to first journal file to be detected;
Judge whether described journal file to be detected is empty, in the situation that described journal file to be detected is empty, system reads and detect described journal file to be detected again after predetermined dormancy time.
5. method according to claim 4 is characterized in that, after sending warning information according to described testing result, does not perhaps have newly-increased log lines in the situation that detect described journal file to be detected, and described method also comprises:
Described file to be detected is set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that described journal file to be detected is last journal file, the mark of described journal file to be detected is set to sky.
6. the warning system that Log-based detects is characterized in that, comprising:
Configuration module.Be used for reading the configuration data that daily record detects, described configuration data comprises: journal file to be detected, regular expression and warning information;
The daily record detection module is used for according to described configuration data journal file being detected, to generate testing result;
The alarm interface module is used for sending warning information according to described testing result.
7. system according to claim 6 is characterized in that, described daily record detection module comprises:
Read module is for the journal file to be detected that reads described configuration data;
Detection module is used in the situation that described journal file to be detected is not empty described file to be detected being detected;
Matching module is used for having newly-increased log lines in the situation that detect described journal file to be detected, and content and the described regular expression of described newly-increased log lines carried out matching treatment to obtain testing result.
8. system according to claim 7 is characterized in that, described alarm interface module comprises:
Alarm module, being used in testing result is in the situation of the content of described newly-increased log lines and described matching regular expressions success, sends described warning information.
9. system according to claim 7 is characterized in that, described system also comprises:
Detection module is set, is used for that described journal file to be detected is set to first journal file and detects;
The first processing module is used for judging whether described journal file to be detected is empty, in the situation that described journal file to be detected is empty, system reads and detect described journal file to be detected again after predetermined dormancy time.
10. system according to claim 9 is characterized in that, described system also comprises:
The second processing module, be used for described file to be detected and be set to next journal file, and judge that this journal file to be detected is last journal file, in the situation that described journal file to be detected is last journal file, the mark of described journal file to be detected is set to sky.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102427898A CN102957550A (en) | 2011-08-23 | 2011-08-23 | System and method for alarming based on log detection |
PCT/CN2012/076955 WO2013026312A1 (en) | 2011-08-23 | 2012-06-15 | Alarming method and system based on log detection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102427898A CN102957550A (en) | 2011-08-23 | 2011-08-23 | System and method for alarming based on log detection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102957550A true CN102957550A (en) | 2013-03-06 |
Family
ID=47745901
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102427898A Pending CN102957550A (en) | 2011-08-23 | 2011-08-23 | System and method for alarming based on log detection |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN102957550A (en) |
WO (1) | WO2013026312A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104182321A (en) * | 2014-02-24 | 2014-12-03 | 无锡天脉聚源传媒科技有限公司 | Access error monitoring method and access error monitoring device |
WO2015074175A1 (en) * | 2013-11-19 | 2015-05-28 | 华为技术有限公司 | Alarm system and alarm message processing method |
CN105138593A (en) * | 2015-07-31 | 2015-12-09 | 山东蚁巡网络科技有限公司 | Method for extracting log key information in user-defined way by using regular expressions |
CN105740121A (en) * | 2016-01-26 | 2016-07-06 | 中国银行股份有限公司 | Log text monitoring and early-warning method and apparatus |
CN106817253A (en) * | 2017-01-04 | 2017-06-09 | 郑州云海信息技术有限公司 | The monitor in real time of journal file and the method and system of alarm |
CN111736579A (en) * | 2020-08-26 | 2020-10-02 | 北京安帝科技有限公司 | Industrial control equipment safety detection method based on log inquiry and retention |
CN112100660A (en) * | 2020-09-15 | 2020-12-18 | 中国建设银行股份有限公司 | Method and device for detecting sensitive information of log file |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111832260B (en) * | 2020-05-26 | 2024-03-26 | 国电南瑞南京控制系统有限公司 | Method for converting syslog log into universal alarm log of power system |
WO2023030391A1 (en) * | 2021-09-06 | 2023-03-09 | Wuhan United Imaging Healthcare Co., Ltd. | Systems and methods for failure warning |
CN115174197B (en) * | 2022-07-01 | 2024-03-29 | 阿里云计算有限公司 | Webshell file detection method, system, electronic equipment and computer storage medium |
CN116048945B (en) * | 2023-03-29 | 2023-06-23 | 摩尔线程智能科技(北京)有限责任公司 | Device performance detection method and device, electronic device and storage medium |
CN117170984B (en) * | 2023-11-02 | 2024-01-30 | 麒麟软件有限公司 | Abnormal detection method and system for stand-by state of linux system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1374550A1 (en) * | 2001-03-30 | 2004-01-02 | Nokia Corporation | System and method for configuring network access devices |
CN101610174A (en) * | 2009-07-24 | 2009-12-23 | 深圳市永达电子股份有限公司 | A kind of log correlation analysis system and method |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN100359495C (en) * | 2003-09-04 | 2008-01-02 | 上海格尔软件股份有限公司 | Information system auditing method based on data storehouse |
US8776217B2 (en) * | 2006-11-03 | 2014-07-08 | Alcatel Lucent | Methods and apparatus for detecting unwanted traffic in one or more packet networks utilizing string analysis |
-
2011
- 2011-08-23 CN CN2011102427898A patent/CN102957550A/en active Pending
-
2012
- 2012-06-15 WO PCT/CN2012/076955 patent/WO2013026312A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1374550A1 (en) * | 2001-03-30 | 2004-01-02 | Nokia Corporation | System and method for configuring network access devices |
CN101610174A (en) * | 2009-07-24 | 2009-12-23 | 深圳市永达电子股份有限公司 | A kind of log correlation analysis system and method |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2015074175A1 (en) * | 2013-11-19 | 2015-05-28 | 华为技术有限公司 | Alarm system and alarm message processing method |
CN105264825A (en) * | 2013-11-19 | 2016-01-20 | 华为技术有限公司 | Alarm system and alarm message processing method |
CN105264825B (en) * | 2013-11-19 | 2018-12-07 | 华为技术有限公司 | Warning system and method for processing alarm message |
CN104182321A (en) * | 2014-02-24 | 2014-12-03 | 无锡天脉聚源传媒科技有限公司 | Access error monitoring method and access error monitoring device |
CN105138593A (en) * | 2015-07-31 | 2015-12-09 | 山东蚁巡网络科技有限公司 | Method for extracting log key information in user-defined way by using regular expressions |
CN105740121A (en) * | 2016-01-26 | 2016-07-06 | 中国银行股份有限公司 | Log text monitoring and early-warning method and apparatus |
CN105740121B (en) * | 2016-01-26 | 2018-08-28 | 中国银行股份有限公司 | A kind of monitoring of daily record text and method for early warning, device |
CN106817253A (en) * | 2017-01-04 | 2017-06-09 | 郑州云海信息技术有限公司 | The monitor in real time of journal file and the method and system of alarm |
CN111736579A (en) * | 2020-08-26 | 2020-10-02 | 北京安帝科技有限公司 | Industrial control equipment safety detection method based on log inquiry and retention |
CN112100660A (en) * | 2020-09-15 | 2020-12-18 | 中国建设银行股份有限公司 | Method and device for detecting sensitive information of log file |
Also Published As
Publication number | Publication date |
---|---|
WO2013026312A1 (en) | 2013-02-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102957550A (en) | System and method for alarming based on log detection | |
CN110213068B (en) | Message middleware monitoring method and related equipment | |
CN104202201B (en) | A kind of log processing method, device and terminal | |
CN112486629B (en) | Micro-service state detection method, micro-service state detection device, electronic equipment and storage medium | |
CN110083391A (en) | Call request monitoring method, device, equipment and storage medium | |
CN105610648A (en) | Operation and maintenance monitoring data collection method and server | |
CN103248625A (en) | Monitoring method and system for abnormal operation of web crawler | |
CN101296135A (en) | Fault information processing method and device | |
CN106911519B (en) | Data acquisition monitoring method and device | |
CN104065526A (en) | Server fault alarming method and device thereof | |
CN105743732A (en) | Method and system for recording transmission paths and distribution conditions of files in local area network | |
CN105843916A (en) | Sensitive data detection method and equipment based on file merging | |
CN110347955B (en) | Resource detection method and device | |
CN105825641A (en) | Service alarm method and apparatus | |
CN113934617A (en) | Data processing method, device, equipment and storage medium | |
US20130179569A1 (en) | Systems and methods for gateway status information handling | |
CN104811418A (en) | Virus detection method and apparatus | |
CN114416560A (en) | Program crash analysis aggregation method and system | |
CN112882892B (en) | Data processing method and device, electronic equipment and storage medium | |
CN113965447B (en) | Online cloud diagnosis method, device, system, equipment and storage medium | |
CN103701667A (en) | Method, device and system for monitoring heartbeat of server | |
CN103684929A (en) | System and method for monitoring server status | |
CN113377627B (en) | Business server abnormality detection method, system, equipment and storage medium | |
CN105812193A (en) | Application log monitoring method and device | |
CN111107143A (en) | Network file transmission detection method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20130306 |
|
RJ01 | Rejection of invention patent application after publication |