CN109325010A - Log inspection method, device, computer equipment and storage medium - Google Patents
Log inspection method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109325010A CN109325010A CN201811123770.XA CN201811123770A CN109325010A CN 109325010 A CN109325010 A CN 109325010A CN 201811123770 A CN201811123770 A CN 201811123770A CN 109325010 A CN109325010 A CN 109325010A
- Authority
- CN
- China
- Prior art keywords
- log
- trigger condition
- plan
- checks
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Debugging And Monitoring (AREA)
Abstract
This application involves a kind of log inspection method, device, computer equipment and storage mediums.Belong to cloud service technical field.The described method includes: receiving the generation request that plan is checked in the log that terminal is sent, service node mark is carried in the generation request;Obtain the corresponding attribute tags of the operation system node identification;Obtain the trigger condition set to match with the attribute tags;Log, which is generated, according to the trigger condition set checks plan;Check that plan obtains the log content of the service node by executing the log, and the log content pushes to terminal and shows.The efficiency that log is checked can be improved using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of log inspection method, device, computer equipment and
Storage medium.
Background technique
Network operating system can all design various journal files, such as application log, system log.Day
Every a line log in will file recites network operating system each operation, operating procedure.System manager can be by looking into
See that journal file carries out trace debug, program state record, crash data and restores.
It is the link that can not be obtained or lack that log, which is checked, when log is applied.Traditional log, which is checked, to require artificially to go
A series of manually page operation is triggered, such as is clicked to enter, is selected log as needed, clicks downloading.When checking again
When log, equally still need to repeat a series of above-mentioned manual operations.Traditional is this by repeating a large amount of manual operation
Event carries out the mode that log is checked and log is made to check that efficiency is very low.
Summary of the invention
Based on this, it is necessary to which in view of the above technical problems, providing a kind of can be improved log and check that the log of efficiency is checked
Method, apparatus, computer equipment and storage medium.
A kind of log inspection method, which comprises
The generation request that plan is checked in the log that terminal is sent is received, carries service node mark in the generation request;
Obtain the corresponding attribute tags of the operation system node identification;
Obtain the trigger condition set to match with the attribute tags;
Log, which is generated, according to the trigger condition set checks plan;
Check that plan obtains the log content of the service node by executing the log, and the log content pushes
It is shown to terminal.
In one embodiment, described to check that plan obtains in the log of the service node by executing the log
Hold, comprising:
Monitor the log and check the trigger condition set in the works, when meeting any trigger condition, call with
Script is checked in the associated log of trigger condition;
It executes the log and checks script, obtain log content.
It is in one embodiment, described that plan is checked according to trigger condition set generation log, comprising:
Obtain the corresponding configuration item of each trigger condition in the trigger condition set;
The configuration item is sent to the terminal;
The configuration data for receiving the correspondence configuration item that the terminal uploads generates log according to the configuration data and looks into
See plan.
In one embodiment, the method also includes:
The unexpected message that operation system is sent is received, the abnormal traffic node identification for including in the unexpected message is extracted;
It obtains the corresponding log of the abnormal traffic node identification and checks plan;
If the log checks that plan with exception-triggered condition, obtains the log and checks in the works to the exception
The configuration data of trigger condition;
The corresponding log content of the abnormal traffic node identification is obtained according to the configuration information.
It is in one embodiment, described the log content is pushed into terminal to show, comprising:
It generates log and checks that link, the log check that link is associated with the log content;
The log is checked that link is sent to the terminal;
It receives the log that the terminal is sent and checks request, the log is checked that the corresponding log content of link is sent
To the terminal.
A kind of log checking device, described device include:
Request receiving module, the log for receiving terminal transmission check that the generation of plan is requested, in the generation request
Carry service node mark;
Attribute tags obtain module, for obtaining the corresponding attribute tags of the operation system node identification;
Trigger condition matching module, for obtaining the trigger condition set to match with the attribute tags;
Log plan generation module checks plan for generating log according to the trigger condition set;
Log content obtains module, for checking that plan obtains in the log of the service node by executing the log
Hold, and the log content pushes to terminal and shows.
In one embodiment, the log content obtains module, is also used to monitor the log and checks institute in the works
Trigger condition set is stated, when meeting any trigger condition, calls and checks script with the associated log of the trigger condition;It executes
Script is checked in the log, obtains log content.
In one embodiment, the log plan generation module is also used to obtain each in the trigger condition set
The corresponding configuration item of a trigger condition;The configuration item is sent to the terminal;It receives described in the correspondence that the terminal uploads
The configuration data of configuration item generates log according to the configuration data and checks plan.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes method described above when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of method described above is realized when row.
Above-mentioned log inspection method, device, computer equipment and storage medium, by the way that business is divided into multiple service nodes
And the attribute tags of each service node are pre-defined, and by pre-defining the corresponding trigger condition collection of different attribute tags
It closes, so that different attribute tags correspond to different trigger conditions;And then the day of each service node is generated according to trigger condition
Will checks that plan, the log of generation check that plan can be good at meeting the log monitoring to the service node, and execution journal is looked into
The plan of seeing can get log content.Log checks that the automatic of plan executes instead of the operation in a series carried out manually,
The log content for wanting to check can be got without manual operation by realizing, and improve log checks efficiency.
Detailed description of the invention
Fig. 1 is the application scenario diagram of log inspection method in one embodiment;
Fig. 2 is the flow diagram of log inspection method in one embodiment;
Fig. 3 is that log checks that plan generates related flow diagram in one embodiment;
Fig. 4 is to check that plan obtains flow diagram involved in log content according to log in one embodiment;
Fig. 5 is the structural block diagram of log checking device in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Log inspection method provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal 102
It is communicated with server 104 by network by network.Server 104 receives the log that terminal is sent and checks that plan generation is asked
It asks, server is that plan is checked in each service node generation log of request, and execution journal checks plan, obtains the service node
Relevant log content.Wherein, terminal 102 can be, but not limited to be various personal computers, laptop, intelligent hand
Machine, tablet computer and portable wearable device, server 104 can be formed with the either multiple servers of independent server
Server cluster realize.
In one embodiment, as shown in Fig. 2, providing a kind of log inspection method, it is applied in Fig. 1 in this way
It is illustrated for server, comprising the following steps:
Step 202, the generation request that plan is checked in log is received, generates and carries service node mark in request.
The log that server receiving terminal is sent checks that plan generates request, specifies specific operation system section in the request
Point.Here server can be the server where operation system, be also possible to for corresponding service system log management
Individual server.
Service node can be the functional module in operation system, such as game forum, financing application.It is also possible to business
Login unit, unit of posting under modular unit under functional module, such as game forum, gold coin redemption unit.It can be preparatory
Service node division is carried out to operation system at many levels as far as possible, and each service node is identified.Refer at many levels
Including from coarseness to fine-grained multi-layer service node.In this case it when needing to check log, can select as needed
The service node of different levels.
Step 204, the corresponding attribute tags of operation system node identification are searched.
The attribute tags of each service node in pre-defined operation system.I.e. based on service node in a certain latitude
Characteristic information carries out the grade label that grade ownership divides the obtained dimension to service node.Such as according to the risk of service node
The risk class of characteristic information division service node.Or the business that the service features information according to provided by service node divides
The important level etc. of node.The attribute tags of the service node of different dimensions can be defined as needed.
Server when the log for receiving terminal transmission checks that plan generates request, check that plan generates and ask by extraction log
The service node mark and grade classification dimension for asking middle carrying, it is corresponding in the grade classification dimension to search service node mark
Attribute tags, if the corresponding attribute tags of Risk Dimensions are I grades (high risk) III grade of II grade (average risk) (low-risk).
In another embodiment, it if log checks that plan generates in request without carrying grade classification dimension, searches
The service node identifies the attribute tags in all dimensions of definition, and comprehensive all properties label determines that the service node is final
Attribute tags.
Step 206, the trigger condition set to match with attribute tags is obtained.
It may include a trigger condition in trigger condition set, also may include multiple trigger conditions.Wherein, item is triggered
Part can be time trigger condition, exception-triggered condition, wherein exception-triggered condition can also be Traffic Anomaly trigger condition,
Service exception-triggered condition etc..The pre-defined corresponding trigger condition of attribute tags and trigger condition set.I grades of attribute marks
Sign (extremely important) corresponding time trigger condition and exception-triggered condition.(important) the corresponding exception-triggered condition of II grade of attribute tags
Or the combination of exception-triggered condition and time anomaly trigger condition.
Further, if the attribute tags of service node include the attribute tags of multiple dimensions, pass through attribute tags
Determining trigger condition also should be multiple or multiple groups.The attribute tags of multiple dimensions may include the category of security risk dimension
Property label and the attribute tags of service provided significance level etc..Such as the attribute tags of service node A are " high risk ", " weight
Service ", then obtain the corresponding trigger condition of attribute tags or trigger condition set of each dimension.As service node A is " high
Risk " corresponds to Traffic Anomaly trigger condition, " critical services " corresponding with service exception-triggered condition.So service node A is corresponding
Trigger condition is then Traffic Anomaly trigger condition and service exception-triggered condition.
Step 208, log is generated according to trigger condition set and checks plan.
Server is to needing the trigger condition for carrying out numerical value configuration to configure, according to the trigger condition or touching postponed
Clockwork spring part combines generation log to check plan.Specifically, being configured to set out time cycle of condition time, to Traffic Anomaly
The flow threshold of condition is set.I.e. generating log checks plan after setting.
Log if the log of service node A checks that plan can be, on the day before 8 points of every morning acquisition service node A
File obtains the journal file in this previous hour when the flow of service node A reaches the flow threshold of configuration.
Step 210: checking that plan obtains the log content of service node by execution journal, and log content is pushed to
Terminal is shown.
Trigger condition in the works is checked in monitoring log, obtains corresponding log content when a triggering condition is met, and will
Log content is pushed to terminal.
In the present embodiment, the log to match is automatically generated according to the attribute information of service node and checks plan, the log
The plan of checking can be good at meeting the monitoring of the log to the service node.Execution journal checks that plan can be got in log
Hold, is all manually operated in a series when without wanting every time and obtain log content, log provided in this embodiment is checked
What method improved log checks efficiency.
In addition, the present embodiment, which customizes different logs for different service nodes, checks plan, industry on the one hand can be obtained
On the other hand the log content of the child node of each grain refined of business system is directed to the attribute definition of service node different degrees of day
Will checks task, and better monitoring business node can be checked by log.Point of computer resource has also been advanced optimized simultaneously
Match, more trigger conditions are customized to important service node, i.e., are put into important service node more days
Will checks computer resource.
In one embodiment, as shown in figure 3, step 208, generates log according to trigger condition set and check plan, wrap
It includes:
Step 302, each of the trigger condition set corresponding configuration item of trigger condition is obtained.
The corresponding configuration item of each trigger condition is pre-defined, the corresponding configuration item of trigger condition can define more as needed
It is a.The configuration item of time trigger condition may include log acquisition time configuration item, Log Filter keyword etc..Exception-triggered item
The configuration item of part may include outlier threshold configuration item, Log Filter keyword etc..
Step 304, configuration item is sent to terminal.
Configuration item can be pushed to terminal, the terminal display configuration page.It, can be by configuration item if configuration item has qualifications
Qualifications push to terminal, and terminal generates the selection menu of configuration item according to restrictive condition.Terminal user is into the configuration page
Input or the corresponding configuration data of option and installment item.
Step 308, the configuration data for receiving the correspondence configuration item that terminal uploads generates log according to configuration data and checks meter
It draws.
The corresponding configuration data of configuration item that user inputs or selects is uploaded to server by terminal, and server is according to matching
It sets data generation log and checks plan.
In the present embodiment, the configuration of trigger condition is completed by terminal user.User can as needed to trigger condition into
Row custom-configures, and log checks the generation of plan more flexibly.
In one embodiment, step 210, check that plan obtains the log content of service node, packet by execution journal
Include: trigger condition in the works is checked in monitoring log, and when a triggering condition is met, acquisition is checked with the associated log of trigger condition
Script;Execution journal checks script, obtains log content.
Log is checked in server and is monitored by timer to the time configured in time trigger condition.Log is checked
Whether the service that server also monitoring business node provides is normal, calculates the flow of service node in real time, monitoring business node
Whether flow is more than given threshold.
Abnormal monitoring can check system itself monitor by log.It can also be by the monitoring system in operation system Lai complete
At.Specifically, the prison that the log of each node is checked that plan is sent to operation system, in operation system by server is checked in log
Control system checks that plan carries out abnormal monitoring to each service node according to log, when monitoring abnormal occur, can generate different
Normal information.The exception information of generation is sent to log and checks server by operation system, and log checks that system extracts exception information
The service node of middle carrying identifies and abnormal events information.Abnormal events information include exception-triggered condition, occur extremely when
Between etc..It is matched with the exception that log checks that server calls log corresponding with the exception-triggered condition checks that script goes to obtain
Log information.
Execution journal checks that script can realize that automatically execution journal checks logic.In one embodiment, log, which is checked, patrols
It is volume specific to execute following steps: obtain binary log content from the local disk of the storage log of operation system, by two into
The log content of format processed is converted to the log content of setting format, arranges to the log content after conversion, and output is final
Log content.
It should be noted that abstract log checks that logic is without being limited thereto, it can also be other more complicated logics.
In the present embodiment, different logs is defined to different types of trigger condition and checks script, and establishes trigger condition
The incidence relation between script is checked with log.The log that different logs checks that script obtains is executed for same service node
Content is also not quite similar.Log checks that script corresponds to trigger condition, and log checks that script obtains day associated with trigger condition
Will information.The log for such as corresponding to Traffic Anomaly trigger condition checks that script only searches log information relevant to attack traffic.It should
Log check in script can define it is multiple about the relevant information searching clue of flow.Such as the day of corresponding with service exception-triggered condition
Will checks that script is only searched and the abnormal relevant log information of service.The log, which is checked in script, can define multiple and service exception
Relevant information searching clue.
When log, which is checked, is configured with a variety of trigger conditions in the works, server will be executed when execution journal checks plan
Logic is checked in multiple logs.In the present embodiment, by configuring trigger condition, the log that different operation system nodes executes is checked
Logic is different, and an operation system node may execute multiple and different logs and check logic, to realize to operation system section
The log monitoring of point various dimensions.
In one embodiment, after the log content that the plan checked according to log obtains service node, server will be given birth to
Check that link association log content is checked in link, log at log;And log is checked that link is sent to terminal.Terminal monitoring is used
The trigger action event of link is checked at family to the log, when detecting the trigger action event, is generated log and is checked request.Eventually
The log of generation is checked that request is sent to server by end, and server extracts log and checks that link is checked in the corresponding log of request,
And acquisition is checked with log and links corresponding log content, and the log content that will acquire is pushed to terminal.
In the present embodiment, after generating log content, content is not pushed to terminal directly, but first push log is checked
Link.When user needs to check log, clickthrough can be obtained, and log is checked more flexible convenient.
Further, as shown in figure 4, can also carry out execution journal in the following way checks plan, specifically:
Step 402, the unexpected message that operation system is sent is received, the service node mark for including in unexpected message is extracted.
Exception information includes at least service node mark and abnormal events information.Wherein, abnormal events information includes abnormal
Type, the time occurred extremely etc..Exception Type can be service exception, Traffic Anomaly etc..For example, exception information can be with
It is " 2018.8.13 withdraw deposit node Traffic Anomaly occur ".
Operation system is monitored each service node whether normal operation, when detecting one or more business section
When service exception or Traffic Anomaly occurs in point, the log to the application checks that server sends unexpected message, the unexpected message
In indicate abnormal traffic node identification.One unexpected message may include multiple service node marks.
Step 404: obtaining the corresponding log of service node mark and check plan.
Step 406: if it includes exception-triggered condition that log is checked in the works, obtaining log and check in the works to exception
The configuration data of trigger condition.
Log is in the works returned terminal in the as upper one embodiment of the configuration information of exception-triggered condition based on server
The configuration information for the configuration item typing returned.It can be for from being filtered out in all log informations in the corresponding log of exception-triggered condition
Configuration information required for holding such as may include time configuration information (setting time section before and after abnormal time of origin), screening
Configuration information etc..
In one embodiment, the exception information that operation system is directed to some node is received as long as can be, held
The corresponding log of the row node checks that logic is checked in the corresponding log of exception-triggered condition in the works.In another embodiment
In, it can also be and determine pending exception-triggered condition according to the Exception Type in exception information, only execution and Exception Type
Logic is checked in the corresponding log of corresponding exception-triggered condition.
The corresponding exception-triggered condition of node of such as withdrawing deposit includes servicing exception-triggered condition and Traffic Anomaly trigger condition, when
When receiving the exception information for being directed to node of withdrawing deposit of operation system transmission, log checks that server obtains service exception-triggered item
The corresponding configuration data of part simultaneously calls service abnormal log to check script, obtains the node and believes to the abnormal relevant log of service
Breath, the also corresponding configuration data of acquisition Traffic Anomaly trigger condition simultaneously call Traffic Anomaly log to check script, obtain the node
Log information relevant to Traffic Anomaly.Log checks that server can also only carry out " Traffic Anomaly " type in exception information
The relevant log information of corresponding Traffic Anomaly trigger condition.
Step 408, the corresponding log content of abnormal traffic node identification is obtained according to configuration information.
It obtains the corresponding log of abnormal traffic node identification and checks plan, if log is checked defines exception-triggered in the works
Condition then executes the log and checks that task is checked in the corresponding log of exception-triggered condition in the works, obtains the abnormal traffic section
The corresponding log content of point.If log is checked does not define exception-triggered condition in the works, it is not processed.
Further, it generates the corresponding log of the log content and checks link, the log of exception information and generation is looked into
See that link push to terminal is shown.
Further, when including multiple abnormal traffic nodes in exception information, and the corresponding log of multiple service nodes is looked into
The plan of seeing is each equipped with abnormal monitoring trigger condition, then meter is checked in the log for implementing each service node by the way of multithreading
Logic is checked in the corresponding log of abnormal monitoring trigger condition in drawing.I.e. per thread is gone to obtain and be corresponded to according to the step in Fig. 4
The corresponding log content of abnormal page node.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively
It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately
It executes.
In one embodiment, as shown in figure 5, providing a kind of log checking device, comprising:
The generation request of plan, the generation request are checked in request receiving module 502, the log for receiving terminal transmission
Middle carrying service node mark.
Attribute tags obtain module 504, for obtaining the corresponding attribute tags of the operation system node identification.
Trigger condition matching module 506, for obtaining the trigger condition set to match with the attribute tags.
Log plan generation module 508 checks plan for generating log according to the trigger condition set.
Log content obtains module 510, for checking that plan obtains the day of the service node by executing the log
Will content, and the log content pushes to terminal and shows.
In one embodiment, the log content obtains module 510, is also used to monitor the log and checks in the works
Trigger condition is called when meeting the trigger condition and checks script with the associated log of the trigger condition;Execute the day
Will checks script, obtains log content.
In one embodiment, the log plan generation module 508, is also used to obtain in the trigger condition set
The corresponding configuration item of each trigger condition;The configuration item is sent to the terminal;Receive that the terminal uploads based on
The configuration data of the configuration item generates log according to the configuration data and checks plan.
In one embodiment, the log content obtains module 510, and the exception for being also used to receive operation system transmission disappears
Breath, extracts the abnormal traffic node identification for including in the unexpected message;Obtain the corresponding institute of the abnormal traffic node identification
It states log and checks plan;If the log checks plan with exception-triggered condition, obtain the log check it is right in the works
The configuration data of the exception-triggered condition;The corresponding log of the abnormal traffic node identification is obtained according to the configuration information
Content.
In one embodiment, log content obtains module 510, is also used to check that plan obtains by executing the log
The log content of the service node;It generates log and checks that link, the log check that link is associated with the log content;By institute
It states log and checks that link is sent to the terminal;It receives the log that the terminal is sent and checks request, the log is checked
It links corresponding log content and is sent to the terminal.
Specific about log checking device limits the restriction that may refer to above for log inspection method, herein not
It repeats again.Modules in above-mentioned log checking device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment checks plan for storing log.The network interface of the computer equipment is used to pass through with external terminal
Network connection communication.To realize a kind of log inspection method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of the log that reception terminal is sent and check plan when executing computer program
Request is generated, carries service node mark in the generation request;Obtain the corresponding attribute mark of the operation system node identification
Label;Obtain the trigger condition set to match with the attribute tags;Log, which is generated, according to the trigger condition set checks meter
It draws;Check that plan obtains the log content of the service node by executing the log, and the log content pushes to end
End display.
In one embodiment, the monitoring log is also performed the steps of when processor executes computer program to check
The trigger condition set in the works, when meeting any trigger condition, calling is looked into the associated log of the trigger condition
See script;It executes the log and checks script, obtain log content.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains the trigger condition
The corresponding configuration item of each trigger condition in set;The configuration item is sent to the terminal;The terminal is received to upload
The correspondence configuration item configuration data, according to the configuration data generate log check plan.
In one embodiment, it is also performed the steps of when processor executes computer program and receives operation system transmission
Unexpected message, extract the abnormal traffic node identification for including in the unexpected message;Obtain the abnormal traffic node identification
Plan is checked in the corresponding log;If the log checks that plan with exception-triggered condition, obtains the log and checks
In the works to the configuration data of the exception-triggered condition;The abnormal traffic node identification pair is obtained according to the configuration information
The log content answered.
In one embodiment, generation log is also performed the steps of when processor executes computer program checks link,
The log checks that link is associated with the log content;The log is checked that link is sent to the terminal;It receives described
Request is checked in the log that terminal is sent, and the log is checked that the corresponding log content of link is sent to the terminal.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of when being executed by processor receives the generation request that plan is checked in the log that terminal is sent, the life
It is identified at service node is carried in request;Obtain the corresponding attribute tags of the operation system node identification;It obtains and the category
The trigger condition set that property label matches;Log, which is generated, according to the trigger condition set checks plan;Described in executing
Log checks that plan obtains the log content of the service node, and the log content pushes to terminal and shows.
In one embodiment, the monitoring log is also performed the steps of when computer program is executed by processor to look into
It sees the trigger condition set in the works, when meeting any trigger condition, calls and the associated log of the trigger condition
Check script;It executes the log and checks script, obtain log content.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains the triggering item
The corresponding configuration item of each trigger condition in part set;The configuration item is sent to the terminal;It receives in the terminal
The configuration data of the correspondence of the biography configuration item generates log according to the configuration data and checks plan.
In one embodiment, it is also performed the steps of when computer program is executed by processor and receives operation system hair
The unexpected message sent extracts the abnormal traffic node identification for including in the unexpected message;Obtain the abnormal traffic node mark
Know the corresponding log and checks plan;If the log checks that plan with exception-triggered condition, obtains the log and looks into
It sees in the works to the configuration data of the exception-triggered condition;The abnormal traffic node identification is obtained according to the configuration information
Corresponding log content.
In one embodiment, generation log is also performed the steps of when computer program is executed by processor checks chain
It connects, the log checks that link is associated with the log content;The log is checked that link is sent to the terminal;Receive institute
Request is checked in the log for stating terminal transmission, and the log is checked that the corresponding log content of link is sent to the terminal.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of log inspection method, which comprises
The generation request that plan is checked in the log that terminal is sent is received, carries service node mark in the generation request;
Obtain the corresponding attribute tags of the operation system node identification;
Obtain the trigger condition set to match with the attribute tags;
Log, which is generated, according to the trigger condition set checks plan;
Check that plan obtains the log content of the service node by executing the log, and the log content pushes to end
End display.
2. the method according to claim 1, wherein described checked described in plan acquisition by executing the log
The log content of service node, comprising:
Monitor the log and check the trigger condition set in the works, when meeting any trigger condition, call with it is described
Script is checked in the associated log of trigger condition;
It executes the log and checks script, obtain log content.
3. the method according to claim 1, wherein described check according to trigger condition set generation log
Plan, comprising:
Obtain the corresponding configuration item of each trigger condition in the trigger condition set;
The configuration item is sent to the terminal;
The configuration data for receiving the correspondence configuration item that the terminal uploads generates log according to the configuration data and checks meter
It draws.
4. according to the method described in claim 3, it is characterized in that, the method also includes:
The unexpected message that operation system is sent is received, the abnormal traffic node identification for including in the unexpected message is extracted;
It obtains the corresponding log of the abnormal traffic node identification and checks plan;
If the log checks that plan with exception-triggered condition, obtains the log and checks in the works to the exception-triggered
The configuration data of condition;
The corresponding log content of the abnormal traffic node identification is obtained according to the configuration information.
5. the log content is pushed to terminal showing the method according to claim 1, wherein described, wrap
It includes:
It generates log and checks that link, the log check that link is associated with the log content;
The log is checked that link is sent to the terminal;
It receives the log that the terminal is sent and checks request, the log is checked that the corresponding log content of link is sent to institute
State terminal.
6. a kind of log checking device, which is characterized in that described device includes:
Request receiving module, the log for receiving terminal transmission are checked the generation request of plan, are carried in the generation request
Service node mark;
Attribute tags obtain module, for obtaining the corresponding attribute tags of the operation system node identification;
Trigger condition matching module, for obtaining the trigger condition set to match with the attribute tags;
Log plan generation module checks plan for generating log according to the trigger condition set;
Log content obtains module, for checking that plan obtains the log content of the service node by executing the log,
And the log content pushes to terminal and shows.
7. device according to claim 6, which is characterized in that the log content obtains module, is also used to monitor described
The trigger condition set in the works is checked in log, and when meeting any trigger condition, calling is associated with the trigger condition
Log check script;It executes the log and checks script, obtain log content.
8. device according to claim 6, which is characterized in that the log plan generation module is also used to obtain described
The corresponding configuration item of each trigger condition in trigger condition set;The configuration item is sent to the terminal;Described in reception
The configuration data for the correspondence configuration item that terminal uploads generates log according to the configuration data and checks plan.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 5 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 5 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811123770.XA CN109325010B (en) | 2018-09-26 | 2018-09-26 | Log checking method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811123770.XA CN109325010B (en) | 2018-09-26 | 2018-09-26 | Log checking method, device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109325010A true CN109325010A (en) | 2019-02-12 |
CN109325010B CN109325010B (en) | 2023-08-04 |
Family
ID=65265717
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811123770.XA Active CN109325010B (en) | 2018-09-26 | 2018-09-26 | Log checking method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109325010B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162512A (en) * | 2019-05-05 | 2019-08-23 | 中国银行股份有限公司 | A kind of log searching method, apparatus and storage medium |
CN111124815A (en) * | 2019-12-05 | 2020-05-08 | 京东数字科技控股有限公司 | Log checking method, device, equipment and storage medium |
CN111190871A (en) * | 2019-12-18 | 2020-05-22 | 中移(杭州)信息技术有限公司 | Log generation method and device, computer equipment and storage medium |
CN111193619A (en) * | 2019-12-20 | 2020-05-22 | 视联动力信息技术股份有限公司 | Method and device for collecting log files |
CN111737088A (en) * | 2020-06-30 | 2020-10-02 | 中国工商银行股份有限公司 | Log obtaining method and device, electronic equipment and medium |
CN113918526A (en) * | 2021-10-12 | 2022-01-11 | 平安国际智慧城市科技股份有限公司 | Log processing method and device, computer equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6311314B1 (en) * | 1999-04-27 | 2001-10-30 | Hewlett-Packard Company | System and method for evaluating the loading of a clock driver |
US20060224603A1 (en) * | 2005-04-05 | 2006-10-05 | Wal-Mart Stores, Inc. | System and methods for facilitating a linear grid database with data organization by dimension |
CN101527736A (en) * | 2009-04-09 | 2009-09-09 | 中兴通讯股份有限公司 | Service content processing method and updating method in distributed file system and device thereof |
US20150195718A1 (en) * | 2014-01-06 | 2015-07-09 | Puneet K. Jain | Techniques for communication between interworking function and short message service nodes for device trigger replacement/recall |
CN107330034A (en) * | 2017-06-26 | 2017-11-07 | 百度在线网络技术(北京)有限公司 | A kind of log analysis method and device, computer equipment, storage medium |
-
2018
- 2018-09-26 CN CN201811123770.XA patent/CN109325010B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6311314B1 (en) * | 1999-04-27 | 2001-10-30 | Hewlett-Packard Company | System and method for evaluating the loading of a clock driver |
US20060224603A1 (en) * | 2005-04-05 | 2006-10-05 | Wal-Mart Stores, Inc. | System and methods for facilitating a linear grid database with data organization by dimension |
CN101527736A (en) * | 2009-04-09 | 2009-09-09 | 中兴通讯股份有限公司 | Service content processing method and updating method in distributed file system and device thereof |
US20150195718A1 (en) * | 2014-01-06 | 2015-07-09 | Puneet K. Jain | Techniques for communication between interworking function and short message service nodes for device trigger replacement/recall |
CN107330034A (en) * | 2017-06-26 | 2017-11-07 | 百度在线网络技术(北京)有限公司 | A kind of log analysis method and device, computer equipment, storage medium |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110162512A (en) * | 2019-05-05 | 2019-08-23 | 中国银行股份有限公司 | A kind of log searching method, apparatus and storage medium |
CN111124815A (en) * | 2019-12-05 | 2020-05-08 | 京东数字科技控股有限公司 | Log checking method, device, equipment and storage medium |
CN111190871A (en) * | 2019-12-18 | 2020-05-22 | 中移(杭州)信息技术有限公司 | Log generation method and device, computer equipment and storage medium |
CN111193619A (en) * | 2019-12-20 | 2020-05-22 | 视联动力信息技术股份有限公司 | Method and device for collecting log files |
CN111737088A (en) * | 2020-06-30 | 2020-10-02 | 中国工商银行股份有限公司 | Log obtaining method and device, electronic equipment and medium |
CN111737088B (en) * | 2020-06-30 | 2024-05-31 | 中国工商银行股份有限公司 | Log acquisition method and device, electronic equipment and medium |
CN113918526A (en) * | 2021-10-12 | 2022-01-11 | 平安国际智慧城市科技股份有限公司 | Log processing method and device, computer equipment and storage medium |
CN113918526B (en) * | 2021-10-12 | 2024-06-25 | 深圳平安智慧医健科技有限公司 | Log processing method, device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109325010B (en) | 2023-08-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109325010A (en) | Log inspection method, device, computer equipment and storage medium | |
CN110399293B (en) | System test method, device, computer equipment and storage medium | |
CN112910945B (en) | Request link tracking method and service request processing method | |
CN111752799B (en) | Service link tracking method, device, equipment and storage medium | |
CN109947646A (en) | Interface test method, device, computer equipment and storage medium | |
US10642913B2 (en) | Intent and bot based query guidance | |
CN111475376B (en) | Method, apparatus, computer device and storage medium for processing test data | |
CN111143163B (en) | Data monitoring method, device, computer equipment and storage medium | |
CN112506894A (en) | Service chain log processing method and device based on link tracking and computer equipment | |
CN108446362A (en) | Data cleansing processing method, device, computer equipment and storage medium | |
CN110825820B (en) | Real-time data tag acquisition method, device, computer equipment and storage medium | |
CN110287119A (en) | A kind of automatic interface testing method and device based on python | |
CN112650688B (en) | Automated regression testing method, associated device and computer program product | |
CN112491659B (en) | Flow playback test method and device, computer equipment and storage medium | |
CN110610376A (en) | Behavior data response method and device, computer equipment and storage medium | |
CN109542764B (en) | Webpage automatic testing method and device, computer equipment and storage medium | |
CN111881014A (en) | System test method, device, storage medium and electronic equipment | |
CN112540887A (en) | Fault drilling method and device, electronic equipment and storage medium | |
CN109491885A (en) | Test problem localization method, device, computer equipment and storage medium | |
CN108920357A (en) | Operation system detection method, device, computer equipment and storage medium | |
CN116302989A (en) | Pressure testing method and system, storage medium and computer equipment | |
CN114356257A (en) | Log printing method, apparatus, computer device, storage medium, and program product | |
CN113157754B (en) | Method, device and equipment for displaying flow form data and storage medium | |
CN114371884A (en) | Method, device, equipment and storage medium for processing Flink calculation task | |
CN114185798A (en) | Interface test case detection method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |