CN109325010A - Log inspection method, device, computer equipment and storage medium - Google Patents

Log inspection method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109325010A
CN109325010A CN201811123770.XA CN201811123770A CN109325010A CN 109325010 A CN109325010 A CN 109325010A CN 201811123770 A CN201811123770 A CN 201811123770A CN 109325010 A CN109325010 A CN 109325010A
Authority
CN
China
Prior art keywords
log
trigger condition
plan
checks
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811123770.XA
Other languages
Chinese (zh)
Other versions
CN109325010B (en
Inventor
刘畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201811123770.XA priority Critical patent/CN109325010B/en
Publication of CN109325010A publication Critical patent/CN109325010A/en
Application granted granted Critical
Publication of CN109325010B publication Critical patent/CN109325010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

This application involves a kind of log inspection method, device, computer equipment and storage mediums.Belong to cloud service technical field.The described method includes: receiving the generation request that plan is checked in the log that terminal is sent, service node mark is carried in the generation request;Obtain the corresponding attribute tags of the operation system node identification;Obtain the trigger condition set to match with the attribute tags;Log, which is generated, according to the trigger condition set checks plan;Check that plan obtains the log content of the service node by executing the log, and the log content pushes to terminal and shows.The efficiency that log is checked can be improved using this method.

Description

Log inspection method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of log inspection method, device, computer equipment and Storage medium.
Background technique
Network operating system can all design various journal files, such as application log, system log.Day Every a line log in will file recites network operating system each operation, operating procedure.System manager can be by looking into See that journal file carries out trace debug, program state record, crash data and restores.
It is the link that can not be obtained or lack that log, which is checked, when log is applied.Traditional log, which is checked, to require artificially to go A series of manually page operation is triggered, such as is clicked to enter, is selected log as needed, clicks downloading.When checking again When log, equally still need to repeat a series of above-mentioned manual operations.Traditional is this by repeating a large amount of manual operation Event carries out the mode that log is checked and log is made to check that efficiency is very low.
Summary of the invention
Based on this, it is necessary to which in view of the above technical problems, providing a kind of can be improved log and check that the log of efficiency is checked Method, apparatus, computer equipment and storage medium.
A kind of log inspection method, which comprises
The generation request that plan is checked in the log that terminal is sent is received, carries service node mark in the generation request;
Obtain the corresponding attribute tags of the operation system node identification;
Obtain the trigger condition set to match with the attribute tags;
Log, which is generated, according to the trigger condition set checks plan;
Check that plan obtains the log content of the service node by executing the log, and the log content pushes It is shown to terminal.
In one embodiment, described to check that plan obtains in the log of the service node by executing the log Hold, comprising:
Monitor the log and check the trigger condition set in the works, when meeting any trigger condition, call with Script is checked in the associated log of trigger condition;
It executes the log and checks script, obtain log content.
It is in one embodiment, described that plan is checked according to trigger condition set generation log, comprising:
Obtain the corresponding configuration item of each trigger condition in the trigger condition set;
The configuration item is sent to the terminal;
The configuration data for receiving the correspondence configuration item that the terminal uploads generates log according to the configuration data and looks into See plan.
In one embodiment, the method also includes:
The unexpected message that operation system is sent is received, the abnormal traffic node identification for including in the unexpected message is extracted;
It obtains the corresponding log of the abnormal traffic node identification and checks plan;
If the log checks that plan with exception-triggered condition, obtains the log and checks in the works to the exception The configuration data of trigger condition;
The corresponding log content of the abnormal traffic node identification is obtained according to the configuration information.
It is in one embodiment, described the log content is pushed into terminal to show, comprising:
It generates log and checks that link, the log check that link is associated with the log content;
The log is checked that link is sent to the terminal;
It receives the log that the terminal is sent and checks request, the log is checked that the corresponding log content of link is sent To the terminal.
A kind of log checking device, described device include:
Request receiving module, the log for receiving terminal transmission check that the generation of plan is requested, in the generation request Carry service node mark;
Attribute tags obtain module, for obtaining the corresponding attribute tags of the operation system node identification;
Trigger condition matching module, for obtaining the trigger condition set to match with the attribute tags;
Log plan generation module checks plan for generating log according to the trigger condition set;
Log content obtains module, for checking that plan obtains in the log of the service node by executing the log Hold, and the log content pushes to terminal and shows.
In one embodiment, the log content obtains module, is also used to monitor the log and checks institute in the works Trigger condition set is stated, when meeting any trigger condition, calls and checks script with the associated log of the trigger condition;It executes Script is checked in the log, obtains log content.
In one embodiment, the log plan generation module is also used to obtain each in the trigger condition set The corresponding configuration item of a trigger condition;The configuration item is sent to the terminal;It receives described in the correspondence that the terminal uploads The configuration data of configuration item generates log according to the configuration data and checks plan.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes method described above when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of method described above is realized when row.
Above-mentioned log inspection method, device, computer equipment and storage medium, by the way that business is divided into multiple service nodes And the attribute tags of each service node are pre-defined, and by pre-defining the corresponding trigger condition collection of different attribute tags It closes, so that different attribute tags correspond to different trigger conditions;And then the day of each service node is generated according to trigger condition Will checks that plan, the log of generation check that plan can be good at meeting the log monitoring to the service node, and execution journal is looked into The plan of seeing can get log content.Log checks that the automatic of plan executes instead of the operation in a series carried out manually, The log content for wanting to check can be got without manual operation by realizing, and improve log checks efficiency.
Detailed description of the invention
Fig. 1 is the application scenario diagram of log inspection method in one embodiment;
Fig. 2 is the flow diagram of log inspection method in one embodiment;
Fig. 3 is that log checks that plan generates related flow diagram in one embodiment;
Fig. 4 is to check that plan obtains flow diagram involved in log content according to log in one embodiment;
Fig. 5 is the structural block diagram of log checking device in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Log inspection method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal 102 It is communicated with server 104 by network by network.Server 104 receives the log that terminal is sent and checks that plan generation is asked It asks, server is that plan is checked in each service node generation log of request, and execution journal checks plan, obtains the service node Relevant log content.Wherein, terminal 102 can be, but not limited to be various personal computers, laptop, intelligent hand Machine, tablet computer and portable wearable device, server 104 can be formed with the either multiple servers of independent server Server cluster realize.
In one embodiment, as shown in Fig. 2, providing a kind of log inspection method, it is applied in Fig. 1 in this way It is illustrated for server, comprising the following steps:
Step 202, the generation request that plan is checked in log is received, generates and carries service node mark in request.
The log that server receiving terminal is sent checks that plan generates request, specifies specific operation system section in the request Point.Here server can be the server where operation system, be also possible to for corresponding service system log management Individual server.
Service node can be the functional module in operation system, such as game forum, financing application.It is also possible to business Login unit, unit of posting under modular unit under functional module, such as game forum, gold coin redemption unit.It can be preparatory Service node division is carried out to operation system at many levels as far as possible, and each service node is identified.Refer at many levels Including from coarseness to fine-grained multi-layer service node.In this case it when needing to check log, can select as needed The service node of different levels.
Step 204, the corresponding attribute tags of operation system node identification are searched.
The attribute tags of each service node in pre-defined operation system.I.e. based on service node in a certain latitude Characteristic information carries out the grade label that grade ownership divides the obtained dimension to service node.Such as according to the risk of service node The risk class of characteristic information division service node.Or the business that the service features information according to provided by service node divides The important level etc. of node.The attribute tags of the service node of different dimensions can be defined as needed.
Server when the log for receiving terminal transmission checks that plan generates request, check that plan generates and ask by extraction log The service node mark and grade classification dimension for asking middle carrying, it is corresponding in the grade classification dimension to search service node mark Attribute tags, if the corresponding attribute tags of Risk Dimensions are I grades (high risk) III grade of II grade (average risk) (low-risk).
In another embodiment, it if log checks that plan generates in request without carrying grade classification dimension, searches The service node identifies the attribute tags in all dimensions of definition, and comprehensive all properties label determines that the service node is final Attribute tags.
Step 206, the trigger condition set to match with attribute tags is obtained.
It may include a trigger condition in trigger condition set, also may include multiple trigger conditions.Wherein, item is triggered Part can be time trigger condition, exception-triggered condition, wherein exception-triggered condition can also be Traffic Anomaly trigger condition, Service exception-triggered condition etc..The pre-defined corresponding trigger condition of attribute tags and trigger condition set.I grades of attribute marks Sign (extremely important) corresponding time trigger condition and exception-triggered condition.(important) the corresponding exception-triggered condition of II grade of attribute tags Or the combination of exception-triggered condition and time anomaly trigger condition.
Further, if the attribute tags of service node include the attribute tags of multiple dimensions, pass through attribute tags Determining trigger condition also should be multiple or multiple groups.The attribute tags of multiple dimensions may include the category of security risk dimension Property label and the attribute tags of service provided significance level etc..Such as the attribute tags of service node A are " high risk ", " weight Service ", then obtain the corresponding trigger condition of attribute tags or trigger condition set of each dimension.As service node A is " high Risk " corresponds to Traffic Anomaly trigger condition, " critical services " corresponding with service exception-triggered condition.So service node A is corresponding Trigger condition is then Traffic Anomaly trigger condition and service exception-triggered condition.
Step 208, log is generated according to trigger condition set and checks plan.
Server is to needing the trigger condition for carrying out numerical value configuration to configure, according to the trigger condition or touching postponed Clockwork spring part combines generation log to check plan.Specifically, being configured to set out time cycle of condition time, to Traffic Anomaly The flow threshold of condition is set.I.e. generating log checks plan after setting.
Log if the log of service node A checks that plan can be, on the day before 8 points of every morning acquisition service node A File obtains the journal file in this previous hour when the flow of service node A reaches the flow threshold of configuration.
Step 210: checking that plan obtains the log content of service node by execution journal, and log content is pushed to Terminal is shown.
Trigger condition in the works is checked in monitoring log, obtains corresponding log content when a triggering condition is met, and will Log content is pushed to terminal.
In the present embodiment, the log to match is automatically generated according to the attribute information of service node and checks plan, the log The plan of checking can be good at meeting the monitoring of the log to the service node.Execution journal checks that plan can be got in log Hold, is all manually operated in a series when without wanting every time and obtain log content, log provided in this embodiment is checked What method improved log checks efficiency.
In addition, the present embodiment, which customizes different logs for different service nodes, checks plan, industry on the one hand can be obtained On the other hand the log content of the child node of each grain refined of business system is directed to the attribute definition of service node different degrees of day Will checks task, and better monitoring business node can be checked by log.Point of computer resource has also been advanced optimized simultaneously Match, more trigger conditions are customized to important service node, i.e., are put into important service node more days Will checks computer resource.
In one embodiment, as shown in figure 3, step 208, generates log according to trigger condition set and check plan, wrap It includes:
Step 302, each of the trigger condition set corresponding configuration item of trigger condition is obtained.
The corresponding configuration item of each trigger condition is pre-defined, the corresponding configuration item of trigger condition can define more as needed It is a.The configuration item of time trigger condition may include log acquisition time configuration item, Log Filter keyword etc..Exception-triggered item The configuration item of part may include outlier threshold configuration item, Log Filter keyword etc..
Step 304, configuration item is sent to terminal.
Configuration item can be pushed to terminal, the terminal display configuration page.It, can be by configuration item if configuration item has qualifications Qualifications push to terminal, and terminal generates the selection menu of configuration item according to restrictive condition.Terminal user is into the configuration page Input or the corresponding configuration data of option and installment item.
Step 308, the configuration data for receiving the correspondence configuration item that terminal uploads generates log according to configuration data and checks meter It draws.
The corresponding configuration data of configuration item that user inputs or selects is uploaded to server by terminal, and server is according to matching It sets data generation log and checks plan.
In the present embodiment, the configuration of trigger condition is completed by terminal user.User can as needed to trigger condition into Row custom-configures, and log checks the generation of plan more flexibly.
In one embodiment, step 210, check that plan obtains the log content of service node, packet by execution journal Include: trigger condition in the works is checked in monitoring log, and when a triggering condition is met, acquisition is checked with the associated log of trigger condition Script;Execution journal checks script, obtains log content.
Log is checked in server and is monitored by timer to the time configured in time trigger condition.Log is checked Whether the service that server also monitoring business node provides is normal, calculates the flow of service node in real time, monitoring business node Whether flow is more than given threshold.
Abnormal monitoring can check system itself monitor by log.It can also be by the monitoring system in operation system Lai complete At.Specifically, the prison that the log of each node is checked that plan is sent to operation system, in operation system by server is checked in log Control system checks that plan carries out abnormal monitoring to each service node according to log, when monitoring abnormal occur, can generate different Normal information.The exception information of generation is sent to log and checks server by operation system, and log checks that system extracts exception information The service node of middle carrying identifies and abnormal events information.Abnormal events information include exception-triggered condition, occur extremely when Between etc..It is matched with the exception that log checks that server calls log corresponding with the exception-triggered condition checks that script goes to obtain Log information.
Execution journal checks that script can realize that automatically execution journal checks logic.In one embodiment, log, which is checked, patrols It is volume specific to execute following steps: obtain binary log content from the local disk of the storage log of operation system, by two into The log content of format processed is converted to the log content of setting format, arranges to the log content after conversion, and output is final Log content.
It should be noted that abstract log checks that logic is without being limited thereto, it can also be other more complicated logics.
In the present embodiment, different logs is defined to different types of trigger condition and checks script, and establishes trigger condition The incidence relation between script is checked with log.The log that different logs checks that script obtains is executed for same service node Content is also not quite similar.Log checks that script corresponds to trigger condition, and log checks that script obtains day associated with trigger condition Will information.The log for such as corresponding to Traffic Anomaly trigger condition checks that script only searches log information relevant to attack traffic.It should Log check in script can define it is multiple about the relevant information searching clue of flow.Such as the day of corresponding with service exception-triggered condition Will checks that script is only searched and the abnormal relevant log information of service.The log, which is checked in script, can define multiple and service exception Relevant information searching clue.
When log, which is checked, is configured with a variety of trigger conditions in the works, server will be executed when execution journal checks plan Logic is checked in multiple logs.In the present embodiment, by configuring trigger condition, the log that different operation system nodes executes is checked Logic is different, and an operation system node may execute multiple and different logs and check logic, to realize to operation system section The log monitoring of point various dimensions.
In one embodiment, after the log content that the plan checked according to log obtains service node, server will be given birth to Check that link association log content is checked in link, log at log;And log is checked that link is sent to terminal.Terminal monitoring is used The trigger action event of link is checked at family to the log, when detecting the trigger action event, is generated log and is checked request.Eventually The log of generation is checked that request is sent to server by end, and server extracts log and checks that link is checked in the corresponding log of request, And acquisition is checked with log and links corresponding log content, and the log content that will acquire is pushed to terminal.
In the present embodiment, after generating log content, content is not pushed to terminal directly, but first push log is checked Link.When user needs to check log, clickthrough can be obtained, and log is checked more flexible convenient.
Further, as shown in figure 4, can also carry out execution journal in the following way checks plan, specifically:
Step 402, the unexpected message that operation system is sent is received, the service node mark for including in unexpected message is extracted.
Exception information includes at least service node mark and abnormal events information.Wherein, abnormal events information includes abnormal Type, the time occurred extremely etc..Exception Type can be service exception, Traffic Anomaly etc..For example, exception information can be with It is " 2018.8.13 withdraw deposit node Traffic Anomaly occur ".
Operation system is monitored each service node whether normal operation, when detecting one or more business section When service exception or Traffic Anomaly occurs in point, the log to the application checks that server sends unexpected message, the unexpected message In indicate abnormal traffic node identification.One unexpected message may include multiple service node marks.
Step 404: obtaining the corresponding log of service node mark and check plan.
Step 406: if it includes exception-triggered condition that log is checked in the works, obtaining log and check in the works to exception The configuration data of trigger condition.
Log is in the works returned terminal in the as upper one embodiment of the configuration information of exception-triggered condition based on server The configuration information for the configuration item typing returned.It can be for from being filtered out in all log informations in the corresponding log of exception-triggered condition Configuration information required for holding such as may include time configuration information (setting time section before and after abnormal time of origin), screening Configuration information etc..
In one embodiment, the exception information that operation system is directed to some node is received as long as can be, held The corresponding log of the row node checks that logic is checked in the corresponding log of exception-triggered condition in the works.In another embodiment In, it can also be and determine pending exception-triggered condition according to the Exception Type in exception information, only execution and Exception Type Logic is checked in the corresponding log of corresponding exception-triggered condition.
The corresponding exception-triggered condition of node of such as withdrawing deposit includes servicing exception-triggered condition and Traffic Anomaly trigger condition, when When receiving the exception information for being directed to node of withdrawing deposit of operation system transmission, log checks that server obtains service exception-triggered item The corresponding configuration data of part simultaneously calls service abnormal log to check script, obtains the node and believes to the abnormal relevant log of service Breath, the also corresponding configuration data of acquisition Traffic Anomaly trigger condition simultaneously call Traffic Anomaly log to check script, obtain the node Log information relevant to Traffic Anomaly.Log checks that server can also only carry out " Traffic Anomaly " type in exception information The relevant log information of corresponding Traffic Anomaly trigger condition.
Step 408, the corresponding log content of abnormal traffic node identification is obtained according to configuration information.
It obtains the corresponding log of abnormal traffic node identification and checks plan, if log is checked defines exception-triggered in the works Condition then executes the log and checks that task is checked in the corresponding log of exception-triggered condition in the works, obtains the abnormal traffic section The corresponding log content of point.If log is checked does not define exception-triggered condition in the works, it is not processed.
Further, it generates the corresponding log of the log content and checks link, the log of exception information and generation is looked into See that link push to terminal is shown.
Further, when including multiple abnormal traffic nodes in exception information, and the corresponding log of multiple service nodes is looked into The plan of seeing is each equipped with abnormal monitoring trigger condition, then meter is checked in the log for implementing each service node by the way of multithreading Logic is checked in the corresponding log of abnormal monitoring trigger condition in drawing.I.e. per thread is gone to obtain and be corresponded to according to the step in Fig. 4 The corresponding log content of abnormal page node.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of log checking device, comprising:
The generation request of plan, the generation request are checked in request receiving module 502, the log for receiving terminal transmission Middle carrying service node mark.
Attribute tags obtain module 504, for obtaining the corresponding attribute tags of the operation system node identification.
Trigger condition matching module 506, for obtaining the trigger condition set to match with the attribute tags.
Log plan generation module 508 checks plan for generating log according to the trigger condition set.
Log content obtains module 510, for checking that plan obtains the day of the service node by executing the log Will content, and the log content pushes to terminal and shows.
In one embodiment, the log content obtains module 510, is also used to monitor the log and checks in the works Trigger condition is called when meeting the trigger condition and checks script with the associated log of the trigger condition;Execute the day Will checks script, obtains log content.
In one embodiment, the log plan generation module 508, is also used to obtain in the trigger condition set The corresponding configuration item of each trigger condition;The configuration item is sent to the terminal;Receive that the terminal uploads based on The configuration data of the configuration item generates log according to the configuration data and checks plan.
In one embodiment, the log content obtains module 510, and the exception for being also used to receive operation system transmission disappears Breath, extracts the abnormal traffic node identification for including in the unexpected message;Obtain the corresponding institute of the abnormal traffic node identification It states log and checks plan;If the log checks plan with exception-triggered condition, obtain the log check it is right in the works The configuration data of the exception-triggered condition;The corresponding log of the abnormal traffic node identification is obtained according to the configuration information Content.
In one embodiment, log content obtains module 510, is also used to check that plan obtains by executing the log The log content of the service node;It generates log and checks that link, the log check that link is associated with the log content;By institute It states log and checks that link is sent to the terminal;It receives the log that the terminal is sent and checks request, the log is checked It links corresponding log content and is sent to the terminal.
Specific about log checking device limits the restriction that may refer to above for log inspection method, herein not It repeats again.Modules in above-mentioned log checking device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment checks plan for storing log.The network interface of the computer equipment is used to pass through with external terminal Network connection communication.To realize a kind of log inspection method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of the log that reception terminal is sent and check plan when executing computer program Request is generated, carries service node mark in the generation request;Obtain the corresponding attribute mark of the operation system node identification Label;Obtain the trigger condition set to match with the attribute tags;Log, which is generated, according to the trigger condition set checks meter It draws;Check that plan obtains the log content of the service node by executing the log, and the log content pushes to end End display.
In one embodiment, the monitoring log is also performed the steps of when processor executes computer program to check The trigger condition set in the works, when meeting any trigger condition, calling is looked into the associated log of the trigger condition See script;It executes the log and checks script, obtain log content.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains the trigger condition The corresponding configuration item of each trigger condition in set;The configuration item is sent to the terminal;The terminal is received to upload The correspondence configuration item configuration data, according to the configuration data generate log check plan.
In one embodiment, it is also performed the steps of when processor executes computer program and receives operation system transmission Unexpected message, extract the abnormal traffic node identification for including in the unexpected message;Obtain the abnormal traffic node identification Plan is checked in the corresponding log;If the log checks that plan with exception-triggered condition, obtains the log and checks In the works to the configuration data of the exception-triggered condition;The abnormal traffic node identification pair is obtained according to the configuration information The log content answered.
In one embodiment, generation log is also performed the steps of when processor executes computer program checks link, The log checks that link is associated with the log content;The log is checked that link is sent to the terminal;It receives described Request is checked in the log that terminal is sent, and the log is checked that the corresponding log content of link is sent to the terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor receives the generation request that plan is checked in the log that terminal is sent, the life It is identified at service node is carried in request;Obtain the corresponding attribute tags of the operation system node identification;It obtains and the category The trigger condition set that property label matches;Log, which is generated, according to the trigger condition set checks plan;Described in executing Log checks that plan obtains the log content of the service node, and the log content pushes to terminal and shows.
In one embodiment, the monitoring log is also performed the steps of when computer program is executed by processor to look into It sees the trigger condition set in the works, when meeting any trigger condition, calls and the associated log of the trigger condition Check script;It executes the log and checks script, obtain log content.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains the triggering item The corresponding configuration item of each trigger condition in part set;The configuration item is sent to the terminal;It receives in the terminal The configuration data of the correspondence of the biography configuration item generates log according to the configuration data and checks plan.
In one embodiment, it is also performed the steps of when computer program is executed by processor and receives operation system hair The unexpected message sent extracts the abnormal traffic node identification for including in the unexpected message;Obtain the abnormal traffic node mark Know the corresponding log and checks plan;If the log checks that plan with exception-triggered condition, obtains the log and looks into It sees in the works to the configuration data of the exception-triggered condition;The abnormal traffic node identification is obtained according to the configuration information Corresponding log content.
In one embodiment, generation log is also performed the steps of when computer program is executed by processor checks chain It connects, the log checks that link is associated with the log content;The log is checked that link is sent to the terminal;Receive institute Request is checked in the log for stating terminal transmission, and the log is checked that the corresponding log content of link is sent to the terminal.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of log inspection method, which comprises
The generation request that plan is checked in the log that terminal is sent is received, carries service node mark in the generation request;
Obtain the corresponding attribute tags of the operation system node identification;
Obtain the trigger condition set to match with the attribute tags;
Log, which is generated, according to the trigger condition set checks plan;
Check that plan obtains the log content of the service node by executing the log, and the log content pushes to end End display.
2. the method according to claim 1, wherein described checked described in plan acquisition by executing the log The log content of service node, comprising:
Monitor the log and check the trigger condition set in the works, when meeting any trigger condition, call with it is described Script is checked in the associated log of trigger condition;
It executes the log and checks script, obtain log content.
3. the method according to claim 1, wherein described check according to trigger condition set generation log Plan, comprising:
Obtain the corresponding configuration item of each trigger condition in the trigger condition set;
The configuration item is sent to the terminal;
The configuration data for receiving the correspondence configuration item that the terminal uploads generates log according to the configuration data and checks meter It draws.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The unexpected message that operation system is sent is received, the abnormal traffic node identification for including in the unexpected message is extracted;
It obtains the corresponding log of the abnormal traffic node identification and checks plan;
If the log checks that plan with exception-triggered condition, obtains the log and checks in the works to the exception-triggered The configuration data of condition;
The corresponding log content of the abnormal traffic node identification is obtained according to the configuration information.
5. the log content is pushed to terminal showing the method according to claim 1, wherein described, wrap It includes:
It generates log and checks that link, the log check that link is associated with the log content;
The log is checked that link is sent to the terminal;
It receives the log that the terminal is sent and checks request, the log is checked that the corresponding log content of link is sent to institute State terminal.
6. a kind of log checking device, which is characterized in that described device includes:
Request receiving module, the log for receiving terminal transmission are checked the generation request of plan, are carried in the generation request Service node mark;
Attribute tags obtain module, for obtaining the corresponding attribute tags of the operation system node identification;
Trigger condition matching module, for obtaining the trigger condition set to match with the attribute tags;
Log plan generation module checks plan for generating log according to the trigger condition set;
Log content obtains module, for checking that plan obtains the log content of the service node by executing the log, And the log content pushes to terminal and shows.
7. device according to claim 6, which is characterized in that the log content obtains module, is also used to monitor described The trigger condition set in the works is checked in log, and when meeting any trigger condition, calling is associated with the trigger condition Log check script;It executes the log and checks script, obtain log content.
8. device according to claim 6, which is characterized in that the log plan generation module is also used to obtain described The corresponding configuration item of each trigger condition in trigger condition set;The configuration item is sent to the terminal;Described in reception The configuration data for the correspondence configuration item that terminal uploads generates log according to the configuration data and checks plan.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 5 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 5 is realized when being executed by processor.
CN201811123770.XA 2018-09-26 2018-09-26 Log checking method, device, computer equipment and storage medium Active CN109325010B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811123770.XA CN109325010B (en) 2018-09-26 2018-09-26 Log checking method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811123770.XA CN109325010B (en) 2018-09-26 2018-09-26 Log checking method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109325010A true CN109325010A (en) 2019-02-12
CN109325010B CN109325010B (en) 2023-08-04

Family

ID=65265717

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811123770.XA Active CN109325010B (en) 2018-09-26 2018-09-26 Log checking method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109325010B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162512A (en) * 2019-05-05 2019-08-23 中国银行股份有限公司 A kind of log searching method, apparatus and storage medium
CN111124815A (en) * 2019-12-05 2020-05-08 京东数字科技控股有限公司 Log checking method, device, equipment and storage medium
CN111190871A (en) * 2019-12-18 2020-05-22 中移(杭州)信息技术有限公司 Log generation method and device, computer equipment and storage medium
CN111193619A (en) * 2019-12-20 2020-05-22 视联动力信息技术股份有限公司 Method and device for collecting log files
CN111737088A (en) * 2020-06-30 2020-10-02 中国工商银行股份有限公司 Log obtaining method and device, electronic equipment and medium
CN113918526A (en) * 2021-10-12 2022-01-11 平安国际智慧城市科技股份有限公司 Log processing method and device, computer equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311314B1 (en) * 1999-04-27 2001-10-30 Hewlett-Packard Company System and method for evaluating the loading of a clock driver
US20060224603A1 (en) * 2005-04-05 2006-10-05 Wal-Mart Stores, Inc. System and methods for facilitating a linear grid database with data organization by dimension
CN101527736A (en) * 2009-04-09 2009-09-09 中兴通讯股份有限公司 Service content processing method and updating method in distributed file system and device thereof
US20150195718A1 (en) * 2014-01-06 2015-07-09 Puneet K. Jain Techniques for communication between interworking function and short message service nodes for device trigger replacement/recall
CN107330034A (en) * 2017-06-26 2017-11-07 百度在线网络技术(北京)有限公司 A kind of log analysis method and device, computer equipment, storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6311314B1 (en) * 1999-04-27 2001-10-30 Hewlett-Packard Company System and method for evaluating the loading of a clock driver
US20060224603A1 (en) * 2005-04-05 2006-10-05 Wal-Mart Stores, Inc. System and methods for facilitating a linear grid database with data organization by dimension
CN101527736A (en) * 2009-04-09 2009-09-09 中兴通讯股份有限公司 Service content processing method and updating method in distributed file system and device thereof
US20150195718A1 (en) * 2014-01-06 2015-07-09 Puneet K. Jain Techniques for communication between interworking function and short message service nodes for device trigger replacement/recall
CN107330034A (en) * 2017-06-26 2017-11-07 百度在线网络技术(北京)有限公司 A kind of log analysis method and device, computer equipment, storage medium

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162512A (en) * 2019-05-05 2019-08-23 中国银行股份有限公司 A kind of log searching method, apparatus and storage medium
CN111124815A (en) * 2019-12-05 2020-05-08 京东数字科技控股有限公司 Log checking method, device, equipment and storage medium
CN111190871A (en) * 2019-12-18 2020-05-22 中移(杭州)信息技术有限公司 Log generation method and device, computer equipment and storage medium
CN111193619A (en) * 2019-12-20 2020-05-22 视联动力信息技术股份有限公司 Method and device for collecting log files
CN111737088A (en) * 2020-06-30 2020-10-02 中国工商银行股份有限公司 Log obtaining method and device, electronic equipment and medium
CN111737088B (en) * 2020-06-30 2024-05-31 中国工商银行股份有限公司 Log acquisition method and device, electronic equipment and medium
CN113918526A (en) * 2021-10-12 2022-01-11 平安国际智慧城市科技股份有限公司 Log processing method and device, computer equipment and storage medium
CN113918526B (en) * 2021-10-12 2024-06-25 深圳平安智慧医健科技有限公司 Log processing method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN109325010B (en) 2023-08-04

Similar Documents

Publication Publication Date Title
CN109325010A (en) Log inspection method, device, computer equipment and storage medium
CN110399293B (en) System test method, device, computer equipment and storage medium
CN112910945B (en) Request link tracking method and service request processing method
CN111752799B (en) Service link tracking method, device, equipment and storage medium
CN109947646A (en) Interface test method, device, computer equipment and storage medium
US10642913B2 (en) Intent and bot based query guidance
CN111475376B (en) Method, apparatus, computer device and storage medium for processing test data
CN111143163B (en) Data monitoring method, device, computer equipment and storage medium
CN112506894A (en) Service chain log processing method and device based on link tracking and computer equipment
CN108446362A (en) Data cleansing processing method, device, computer equipment and storage medium
CN110825820B (en) Real-time data tag acquisition method, device, computer equipment and storage medium
CN110287119A (en) A kind of automatic interface testing method and device based on python
CN112650688B (en) Automated regression testing method, associated device and computer program product
CN112491659B (en) Flow playback test method and device, computer equipment and storage medium
CN110610376A (en) Behavior data response method and device, computer equipment and storage medium
CN109542764B (en) Webpage automatic testing method and device, computer equipment and storage medium
CN111881014A (en) System test method, device, storage medium and electronic equipment
CN112540887A (en) Fault drilling method and device, electronic equipment and storage medium
CN109491885A (en) Test problem localization method, device, computer equipment and storage medium
CN108920357A (en) Operation system detection method, device, computer equipment and storage medium
CN116302989A (en) Pressure testing method and system, storage medium and computer equipment
CN114356257A (en) Log printing method, apparatus, computer device, storage medium, and program product
CN113157754B (en) Method, device and equipment for displaying flow form data and storage medium
CN114371884A (en) Method, device, equipment and storage medium for processing Flink calculation task
CN114185798A (en) Interface test case detection method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant