CN110297738A - Monitoring method, device, equipment and the storage medium of system service - Google Patents
Monitoring method, device, equipment and the storage medium of system service Download PDFInfo
- Publication number
- CN110297738A CN110297738A CN201910428277.7A CN201910428277A CN110297738A CN 110297738 A CN110297738 A CN 110297738A CN 201910428277 A CN201910428277 A CN 201910428277A CN 110297738 A CN110297738 A CN 110297738A
- Authority
- CN
- China
- Prior art keywords
- system service
- monitored
- log information
- information
- identification number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/302—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Quality & Reliability (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Computer Hardware Design (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention belongs to software supervision technical fields, disclose monitoring method, device, equipment and the storage medium of a kind of system service.This method comprises: receiving system service access request, the identification number of accessed the first system service is extracted from system service access request;The system service table to be monitored constructed according to identification number and in advance, determines whether the first system service is system service to be monitored;If the first system service is system service to be monitored, response system service access request acquires the log information of the first system service creation during the first system service is accessed;Log information is analyzed, by obtained real-time analysis result storage to corresponding data management system.By the above-mentioned means, solving can not support whole log informations storages and development difficulty big the monitoring of system service in the prior art, the slow technical problem of data analyzing speed.
Description
Technical field
The present invention relates to software supervision technical field more particularly to a kind of monitoring method of system service, device, equipment and
Storage medium.
Background technique
With the rapid development of development of Mobile Internet technology, the web application suitable for intelligent terminal is increasingly
It is more.Also, in order to enable these web applications preferably to provide service for user, the same of web application is being released
When, the monitoring scheme of monitoring web application can be released.The prison carried out when currently, servicing web application calling system
Prosecutor case is normally based on Spring (the design level frame of an open source code), and is aided with Pinpoint (a java
Application performance management tool) and the mode of Dubbo (one open source distributed service framework) realize.
Although this monitoring scheme can be collected into system clothes when web application accesses corresponding system service
The log information that business generates, enables research staff when web application is abnormal, and is believed according to the log being collected into
Breath positioning is abnormal, to handle abnormal problem.But the monitoring scheme based on Spring frame can not show it is whole
Log information, so cause it is subsequent exception can not be accurately positioned, and since Spring frame is larger, more money can be occupied
Source causes operation not smooth enough;And Pinpoint frame is then to be analyzed based on bytecode injection mode system performance,
Operator is thus needed to have higher professional knowledge, operation is relative complex, is unfavorable for realizing;And Dubbo frame is due to it
It can not directly use, thus just can be used after being modified, customize on the basis of being needed during realization in open source, thus
Cost of access is relatively high.
So it is urgent to provide a kind of monitoring methods of system service for solving above-mentioned technical problem.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill
Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of monitoring method of system service, device, equipment and storage medium, purports
It is solving whole log informations storages and development difficulty can not be supported big the monitoring of system service in the prior art, data
Analyze slow-footed technical problem.
To achieve the above object, the present invention provides a kind of monitoring methods of system service, and the method includes following steps
It is rapid:
System service access request is received, accessed the first system service is extracted from the system service access request
Identification number;
The system service table to be monitored constructed according to the identification number and in advance, determine the first system service whether be
System service to be monitored;
If the first system service is the system service to be monitored, the system service access request is responded,
The log information of the first system service creation is acquired during the first system service is accessed;
The log information is analyzed, by obtained real-time analysis result storage to corresponding data management system.
Preferably, before the step of reception system service access request, the method also includes:
Construct the system service table to be monitored;
Wherein, the step of building system service table to be monitored, comprising:
According to business demand, at least one second system service is compiled based on Guice frame;
According to the attribute of the business demand and the second system service, determine whether the second system service needs
It is monitored;
It is system to be monitored clothes by the second system service mark if the second system service needs are monitored
Business;
The identification number for obtaining the system service to be monitored, according to the building of the identification number of the system service to be monitored
System service table to be monitored.
Preferably, the system service table to be monitored constructed according to the identification number and in advance, determines first system
The step of whether system service is system service to be monitored, comprising:
The system service table to be monitored is traversed, the identification number is taken with the current system to be monitored traversed
The identification number of business compares;
If the identification number is matched with the identification number of the current system service to be monitored traversed, it is determined that first system
System service is the system service to be monitored.
Preferably, the data management system includes relevant database management subsystem, distributed storage management subsystem
System and distributed file management subsystem;
It is described that the log information is analyzed, by obtained real-time analysis result storage to corresponding data management system
The step of system, comprising:
Using big data analysis technology, the log information is analyzed, obtains the corresponding model of the log information
Information and threshold information for being judged the log information;
The model information is added to the distributed storage management subsystem, the threshold information is added to described
The log information is added to the distributed file management subsystem by relevant database management subsystem.
Preferably, before described the step of using big data analysis technology, analyzing the log information, the side
Method further include:
According to preset processing rule, pretreatment operation is carried out to the log information, obtains the day of removal interference information
Will information;
Wherein, described to use big data analysis technology, the step of analysis the log information, comprising:
Using big data analysis technology, the log information of the removal interference information is analyzed.
Preferably, described to use big data analysis technology, the log information of the removal interference information is analyzed
Before step, the method also includes:
The log information of the removal interference information is added to the distributed post constructed in advance and subscribes to message queue;
Wherein, the step described to use big data analysis technology, that the log information of the removal interference information is analyzed
Suddenly, comprising:
The log information that message queue is successively read the removal interference information is subscribed to from the distributed post;
Using big data analysis technology, the log information of the removal interference information is analyzed.
Preferably, described that the log information is analyzed, by obtained real-time analysis result storage to corresponding number
After the step of management system, the method also includes:
According to preset displaying style, the real-time analysis result is shown.
In addition, to achieve the above object, the present invention also proposes a kind of monitoring device of system service, described device includes:
Extraction module extracts accessed for receiving system service access request from the system service access request
The first system service identification number;
Determining module, the system service table to be monitored for constructing according to the identification number and in advance, determines described first
Whether system service is system service to be monitored;
Acquisition module, for when the first system service is the system service to be monitored, responding the system clothes
It is engaged in access request, and acquires the log letter of the first system service creation during the first system service is accessed
Breath;
Analysis module stores obtained real-time analysis result to corresponding for analyzing the log information
Data management system.
In addition, to achieve the above object, the present invention also proposes that a kind of monitoring device of system service, the equipment include:
Memory, processor and the monitoring programme for being stored in the system service that can be run on the memory and on the processor,
The monitoring programme of the system service is arranged for carrying out the step of monitoring method of system service as described above.
In addition, to achieve the above object, the present invention also proposes a kind of storage medium, system is stored on the storage medium
The monitoring programme of the monitoring programme of service, the system service realizes system service as described above when being executed by processor
The step of monitoring method.
The monitoring scheme of system service provided by the invention, by constructing system service table to be monitored in advance, to be monitored
Addition needs the system service to be monitored being monitored in advance in system service table, to ask receiving system service access
It asks, and after the identification number for extracting accessed the first system service in system service access request, it can direct basis
Identification number and the system service table to be monitored constructed in advance determine whether the first system service is system service to be monitored,
It when determining that the first system service is system service to be monitored, just responds, while interviewed in the first system service
The log information of the first system service creation is acquired during asking.In this way, it realizes only to needing to monitor
The first system service be monitored, to ensure that the first system service that collected log information only needs to monitor
Log information greatly reduces the quantity of the subsequent log information analyzed, enables subsequent analysis more added with needle
To property, and quickly.
Further, since the log information for the first system service that collected log information only needs to be monitored, because
And under the premise of the controllable quantity of log information, in the case where do not increase development cost and difficulty, analysis can be obtained
All real-time analysis results obtained are stored, to realize the storage to whole log informations of the first system service, greatly
Positioning of the subsequent research staff to the first system service abnormal problem is facilitated greatly.
Detailed description of the invention
Fig. 1 is the structural representation of the monitoring device of the system service for the hardware running environment that the embodiment of the present invention is related to
Figure;
Fig. 2 is the flow diagram of the monitoring method first embodiment of present system service;
Fig. 3 is the specific implementation flow schematic diagram of step S40 in the monitoring method first embodiment of present system service;
Fig. 4 is the flow diagram of the monitoring method second embodiment of present system service;
Fig. 5 is the structural block diagram of the monitoring device first embodiment of present system service.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that described herein, specific examples are only used to explain the present invention, is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the monitoring device knot of the system service for the hardware running environment that the embodiment of the present invention is related to
Structure schematic diagram.
As shown in Figure 1, the monitoring device of the system service may include: processor 1001, such as central processing unit
(Central Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory
1005.Wherein, communication bus 1002 is for realizing the connection communication between these components.User interface 1003 may include display
Shield (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include that the wired of standard connects
Mouth, wireless interface.Network interface 1004 optionally may include standard wireline interface and wireless interface (such as Wireless Fidelity
(WIreless-FIdelity, WI-FI) interface).Memory 1005 can be the random access memory (Random of high speed
Access Memory, RAM) memory, be also possible to stable nonvolatile memory (Non-Volatile Memory,
), such as magnetic disk storage NVM.Memory 1005 optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that structure shown in Fig. 1 is not constituted to the monitoring device of system service
It limits, may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
As shown in Figure 1, as may include operating system, network communication mould in a kind of memory 1005 of storage medium
Block, Subscriber Interface Module SIM and the monitoring programme of system service.
In the monitoring device of system service shown in Fig. 1, network interface 1004 is mainly used for carrying out with network server
Data communication;User interface 1003 is mainly used for carrying out data interaction with user;In the monitoring device of present system service
Processor 1001, memory 1005 can be set in the monitoring device of system service, and the monitoring device of the system service is logical
It crosses processor 1001 and calls the monitoring programme of the system service stored in memory 1005, and execute provided in an embodiment of the present invention
The monitoring method of system service.
The embodiment of the invention provides a kind of monitoring methods of system service, and referring to Fig. 2, Fig. 2 is a kind of system of the present invention
The flow diagram of the monitoring method first embodiment of service.
In the present embodiment, the monitoring method of the system service the following steps are included:
Step S10 receives system service access request, extracts accessed first from the system service access request
The identification number of system service.
Specifically, the executing subject of the present embodiment is the server for being deployed with the monitoring programme of the system service.
It should be understood that in practical applications, the server for disposing the monitoring programme of the system service can be biography
The physical server of system occupies the server in actual physics space, is also possible to virtual Cloud Server, specific selection side
Formula, those skilled in the art, which can according to need, to be configured, herein with no restrictions.
Correspondingly, the system service access request received can be what any communication apparatus was sent, for example make for user
Intelligent terminal, such as mobile phone, tablet computer, wearable device, are also possible to personal computer, and server etc. is set
It is standby, it will not enumerate herein, also with no restrictions to this.
However, it should be understood that the above-mentioned described identification number for being used to identify the first system service, specially grinds
For hair personnel when compiling the first system service, one for its distribution is used to identify the Services Code of its uniqueness, specifically
Format can be configured as needed by those skilled in the art, herein with no restrictions.
In addition, it is noted that in practical applications, in order to guarantee that the operation of subsequent step S20 can be gone on smoothly,
Before executing above-mentioned steps S10, the system service table to be monitored that needs to need to use in first construction step S20.
Specifically, in the present embodiment, in order to be reduced as far as possible to the monitoring programme for disposing the system service
The occupancy of the system resource of server, while the transmission speed of data is promoted, when constructing the system service table to be monitored, tool
Body is to be realized based on Guice frame, and be not based on Spring frame, Pinpoint frame and Dubbo frame.
So-called Guice frame is that a have general type and annotation characteristic, and the code compilation frame that structure is small and fast.
Therefore, not only size of code is small for the second system service compiled out based on Guice frame, it is few to occupy server resource, and have
Cheer and bright annotation information, thus the reading of staff can be significantly facilitated during the monitoring of whole system service,
To reduce the degree of difficulty of follow-up maintenance.
And Spring frame can occupy more resource since its own code structure is larger, so as to cause operation
It is not smooth enough, influence the monitoring to system service;Pinpoint frame is then that bytecode injection mode is based on due to it to system
Performance is analyzed, thus needs operator to have higher professional knowledge during realization, and operation is relative complex, therefore not
Conducive to realization;Dubbo frame then can not be used directly due to it, thus be carried out on the basis of being needed during realization in open source
It just can be used after change, customization, thus cost of access is relatively high.
Through foregoing description it is not difficult to find that in the present embodiment when compiling second system service, by using Guice frame
Frame, and it is not based on Spring frame, Pinpoint frame and Dubbo frame, process is not only simplified, it is difficult to reduce compiling
Degree, it is often more important that the usage mode of the second system service and existing system service that compile out, working method is completely not
It is identical, and it is based on this difference, so that the monitoring process of whole system service greatly facilitates readding for staff
It reads, reduces the degree of difficulty of follow-up maintenance.
In order to make it easy to understand, the operation for constructing the system service table to be monitored carries out below for Guice frame is based on
Illustrate, specific implementation step approximately as:
(1) according to business demand, at least one second system service is compiled based on Guice frame.
It should be understood that business described herein needs, it is in practical applications specifically by being responsible for system service monitoring
The technical staff of work, it is predetermined according to web application to be monitored.
It, can be with for the service condition of counting user for example, when a certain web application releases a new function
The prespecified subsequent second system service for needing to carry out system service monitoring needs to include the system service for monitoring the new function.
That is, compiling any second system service of acquisition, system architecture is lightweight in above-mentioned steps (1)
Guice frame, i.e., there is cheer and bright annotation to believe for the log information that generates during the second system service is accessed
Breath.
Meanwhile the second system service meets business demand as defined in technical staff, i.e. specified a certain function again
Or business.
(2) according to the attribute of the business demand and the second system service, system service to be monitored is determined.
Specifically, the attribute according to the business demand and the second system service described in above-mentioned steps (2),
Determine the operation of system service to be monitored, it substantially can be as described below:
Firstly, determining that the second system service is according to the attribute of the business demand and the second system service
No needs are monitored.
It should be understood that the function of supporting is numerous since a certain web application is in released version, that is,
It is multiple to say that the second system service compiled out can have, such as the corresponding second system service of a function.But in reality
In, not each function requires to monitor, therefore not all requires to be supervised in the second system service compiled
Control needs the business demand provided according to technical staff and the attribute of the second system service just at this time to judge that compiling obtains
The first system service, which need be monitored.
It correspondingly, is wait supervise by the second system service mark if second system service needs are monitored
Control system service.
In order to make it easy to understand, being illustrated below in conjunction with example:
Such as a certain web application is in use, is related to A, B, C, this 5 second system services of D, E,
Provided according to business demand, second system service A, second system service B and second system service D needed in access process into
Row monitoring, second system service C and second system service E do not need, it is determined that system service to be monitored be second system
It services A, second system service B and second system and services D.
(3) identification number for obtaining the system service to be monitored, constructs according to the identification number of the system service to be monitored
The system service table to be monitored.
It is still illustrated with above-mentioned case, for example the identification number of second system service A is A100, second system services B's
Identification number is B100, the identification number of second system service D is D100, then when constructing the system service table to be monitored, specifically
It can be one account document of creation or account table, the account for successively creating identification number A100, B100 and D100 typing
Document or account table, can obtain the system service table to be monitored.
It should be understood that being given above only a kind of concrete implementation mode, not to technical solution of the present invention
Any restriction is constituted, in practical applications, those skilled in the art, which can according to need, to be configured, herein with no restrictions.
In addition, in the present embodiment, " first " in above-mentioned described " the first system service " is only used for difference should
System service and other systems service, do not cause to limit to system service itself, and the first system service can for based on
Any one system service at least one second system service of Guice frame compiling.
Correspondingly, " second " in described " second system service ", is also only used for distinguishing the system service and other
System service does not cause to limit to system service itself, and at least one second system compiled in advance based on Guice frame
In service, at least one second system service is the first system service.
Step S20, the system service table to be monitored constructed according to the identification number and in advance determine the first system clothes
Whether business is system service to be monitored.
Specifically, a kind of concrete implementation mode is given below in the operation executed in step S20 in order to facilitate understanding,
Approximately as:
Firstly, being traversed to the system service table to be monitored, i.e., sequentially read from the system service table to be monitored
Take the identification number of the system service to be monitored of record.
Then, the identification number and the identification number of the current system service to be monitored traversed are compared.
Specifically, if by comparison, determine the identification number of the first system service with traverse it is current to be monitored
The identification number of system service matches, it is determined that the first system service is the system service to be monitored, enters step S30;
If determining the identification number of the first system service and the mark of any system service to be monitored traversed by comparison
It number mismatches, then only in response to the system access request, without being acquired during the first system service is accessed
The log information of the first system service creation.
It should be understood that being given above only a kind of concrete implementation mode, not to technical solution of the present invention
Any restriction is constituted, in practical applications, those skilled in the art, which can according to need, to be configured, herein with no restrictions.
Step S30 responds the system service access if the first system service is the system service to be monitored
Request acquires the log information of the first system service creation during the first system service is accessed.
Specifically, collected log information in the present embodiment, mainly include traceId, spanId,
annotation。
It should be noted that the traceId, when certain is primary accessed, is corresponded to for identifying a certain system service
Specific system access request ID, herein refer to be carry the identification number of the first system service system access ask
The ID asked.
In order to make it easy to understand, being briefly described below to the traceId.
Specifically, the traceId is after the system access request of user's triggering enters system, in remote process tune
It is generated when calling the first layer of network with (Remote Procedure Call, RPC) interface, and the traceId has entirely
Office's uniqueness, and as each layer of RPC is called, it can constantly transmit backward, in this way by acquiring the first system service
The traceId generated during accessed, so that it may a user is requested the paths in series called in systems, thus
It grasps which operation this request has been carried out, and then facilitates the positioning of subsequent abnormal problem.
In addition, above-mentioned described spanId, is the position being invoked in distributed request for identifying a RPC.
For example, after the system access request of user enters system, when being in the first layer A of RPC calling network,
The initial value of spanId can be 0, and when entering next layer of RPC calling B, spanId is 0.1, goes successively to next layer of RPC tune
When with C, spanId is 0.1.1;And when calling E with the B RPC for being in same layer, spanId can be 0.2.In this way, passing through
SpanId can position certain RPC request the location of in system calling and its upstream and downstream dependence is respectively
Who.
In addition, above-mentioned described annotation, refers to that research staff is customized in the corresponding code of system service
Point data is buried, this buries point data, and to can be business interested, it is desirable to upload to the data of rear end, such as the user once requested
Identity information.
By foregoing description it is not difficult to find that in practical applications, may be implemented to connect according to collected traceId a certain
The information in the secondary all paths for requesting to pass through in systems may be implemented to call between the service of compartment system difference according to spanId
Precedence relationship, any data can be obtained according to business needs according to annotation.
About in above-mentioned log information traceId and spanId be using after Guice Development of Framework, in triggering system clothes
When access request of being engaged in, obtain automatically.
And annotation, then it is bury a little in the corresponding code of system service by previewing, to be in triggering
After service access request of uniting, during accessing system service, when accessed system service goes to the generation for being arranged and burying a little
After code, RPC will be called automatically, obtained point data of burying is sent to by next link by RPC.
It is very simple about the realization principle buried a little, specifically initialized in the web application of user's operation or interface
When, initialize third party's data analysis service quotient Software Development Kit (Software Development Kit,
SDK), corresponding data transmission interface inside SDK is then just called to send data when some event occurs.For example, we think
The number of clicks of some button inside statistics network application program can be corresponding in this button then when the button is clicked
OnClick function inside call the SDK to provide data transmission interface send data.
It should be understood that the above is only for example, any restriction is not constituted to technical solution of the present invention, in reality
In the application of border, those skilled in the art, which can according to need, to be configured, herein with no restrictions.
Step S40 analyzes the log information, by obtained real-time analysis result storage to corresponding data pipe
Reason system.
Specifically, when analyzing the log information, available a plurality of types of analyses are as a result, for side
Just subsequent query, the data management system for storing analysis result would also vary from.
In the present embodiment, data management system can substantially be divided into following three subsystem: relational data depositary management
Manage subsystem, distributed storage management subsystem and distributed file management subsystem.
Correspondingly, described that the log information is analyzed, by obtained real-time analysis result storage to corresponding number
According to can specifically be refined as two sub-steps shown in Fig. 3 the step of management system, it is specific as follows shown in:
Sub-step S401 analyzes the log information using big data analysis technology, obtains the log information
Corresponding model information and threshold information for being judged the log information.
Specifically, in practical applications, the analysis to the log information for convenience, can use big data analysis
Technology and machine learning algorithm construct an analysis model in advance.
Correspondingly, when analyzing the log information, the log information is directly input to the analysis mould
Type can fast and accurately export the corresponding model information of the log information and for sentencing to the log information
Disconnected threshold information.
About the building of the analysis model, specifically may is that
Firstly, constructing a training pattern according to the training data that each big data platform stores.
Then, based on the machine learning algorithm of selection, the training pattern is trained, until inputting a certain log letter
Breath, can be obtained the corresponding model information of the log information and the threshold information position for being judged the log information
It sets, the training to the training pattern can be completed.
Correspondingly, training pattern this moment is the analysis model.
The model information is added to the distributed storage management subsystem, the threshold value is believed by sub-step S402
Breath is added to the relevant database management subsystem, and the log information is added to the distributed file management subsystem
System.
Specifically, it about above-mentioned described relevant database management subsystem, can select in practical applications
Mysql database;Above-mentioned described distributed storage management subsystem, can select with high reliability, high-performance, towards
Column, telescopic Hadoop Database (usually said HBase);Above-mentioned described distributed file management subsystem, can
To select Hadoop Distributed File System (usually said HDFS).
Through foregoing description it is not difficult to find that after being analyzed and processed to log information, divided in real time by what will be obtained
Result storage is analysed to different data administration subsystems, the various models obtained will be such as analyzed in real time and stores into Hbase, it will be real
When the lesser control data of data volumes such as switch, the threshold value analyzed store into Mysql, by complete original log information
It stores in HDFS, so that the subsequent positioning to abnormal problem, can quickly search different data management subsystems as needed
System, thus speed up processing.
It should be understood that the above is only for example, any restriction is not constituted to technical solution of the present invention, in reality
In the application of border, those skilled in the art, which can according to need, to be configured, herein with no restrictions.
The monitoring method of the system service provided in the present embodiment, by constructing system service table to be monitored in advance, to
Addition needs the system service to be monitored being monitored in advance in monitoring system agent list, thus receiving system service access
Request, and after the identification number for extracting accessed the first system service in system service access request, it can direct root
The system service table to be monitored constructed according to identification number and in advance determines whether the first system service is system service to be monitored,
It when determining the first system service is system service to be monitored, just responds, while servicing quilt in the first system
The log information of the first system service creation is acquired during access.In this way, it realizes only to needing to supervise
The first system service of control is monitored, to ensure that the first system service that collected log information only needs to monitor
Log information, greatly reduce the quantity of the subsequent log information analyzed, enable subsequent analysis more added with
Specific aim, and quickly.
Further, since the log information for the first system service that collected log information only needs to be monitored, because
And under the premise of the controllable quantity of log information, in the case where do not increase development cost and difficulty, analysis can be obtained
All real-time analysis results obtained are stored, to realize the storage to whole log informations of the first system service, greatly
Positioning of the subsequent research staff to the first system service abnormal problem is facilitated greatly.
It further, in practical applications, can also be according to preset in order to more intuitive monitoring system service
It shows style, the real-time analysis result is shown, so that research staff checks, such as with the figure of different-style, or
Person is shown with the charts of different dimensions.
With reference to Fig. 4, Fig. 4 is a kind of flow diagram of the monitoring method second embodiment of system service of the present invention.
Based on above-mentioned first embodiment, the monitoring method of the present embodiment system service is before the sub-step S402, also
Include:
Sub-step S403 carries out pretreatment operation to the log information, it is dry to obtain removal according to preset processing rule
Disturb the log information of information;
Specifically, in practical applications, the log letter generated during the first system service is accessed
Often there are some pairs of subsequent analysis exceptions in breath, the useless information of orientation problem, thus in order to guarantee collected log
Information is effective as far as possible, avoid increase analysis burden, impact analysis as a result, it is desirable to execute use big data analysis technology,
Before the step of analyzing the log information, series of preprocessing behaviour first is carried out to the collected log information
Make.
Such as in preset processing rule to carry out data cleansing operation, then root to the data in the log information
According to the processing rule, after carrying out data cleansing operation to the log information, the log of obtained removal interference information is believed
Breath is to eliminate log information wrong existing for duplicate message, correction, ensures that subsequent log analysis process in this way
In, obtained analysis result is more accurate.
Further, in practical applications, the pretreatment operation can also need to be set as to the day according to business
Will information is grouped processing.
It should be understood that having the above is only for example, not constituting any restriction to technical solution of the present invention
In body application, those skilled in the art, which can according to need, to be configured, and the present invention is without limitation.
The log information of the removal interference information is added to the distributed post constructed in advance and subscribed to by sub-step S404
Message queue.
Specifically, in the present embodiment, above-mentioned described distributed post is subscribed to message queue and is substantially known as
Kafka message queue.
Due to Kafka have persistence, stability, the high pass amount of spitting, support server and consumption cluster come subregion message with
And support the characteristic of distributed system parallel data load, therefore select Kafka message queue to cache the removal interference letter
The log information of breath can avoid as far as possible a large amount of log informations from being stacked into log analysis node, so as to prevent thread
Obstruction, ensure that the processing speed of log analysis.
In addition, being the open source stream process platform that Apache Software Foundation is developed by Kafka, about its user
Formula have been relatively mature, and those skilled in the art in the concrete realization, can voluntarily realize by searching for relevant documentation, this
Place repeats no more.
Correspondingly, operation performed in atomic step S401, the operation for becoming sub-step S401' in Fig. 4 of adaptability:
For the first time, the log information that message queue is successively read the removal interference information is subscribed to from the distributed post;Then, it uses
Big data analysis technology analyzes the log information of the removal interference information.
It should be understood that being given above only a kind of concrete implementation mode, not to technical solution of the present invention
Any restriction is constituted, in a particular application, those skilled in the art, which can according to need, to be configured, such as in log information
Controllably, quantity is smaller, analyze the faster situation of processing speed under, to collected log information carry out pretreatment operation it
Afterwards, can not say removal interference information log information be added to Kafka message queue, but be directly transferred to analysis node into
Row log analysis.
By foregoing description it is not difficult to find that the monitoring method of the system service provided in the present embodiment, is using big data
Analytical technology, before analyzing the log information, by being carried out to the log information according to preset processing rule
Pretreatment operation to obtain the log information of removal interference information, and the log information of the removal interference information is added to
The distributed post constructed in advance is subscribed to message queue and is cached, so as to effectively avoid a large amount of log informations heap simultaneously
Product arrives the node of log analysis, solves the problems, such as thread block, and then greatly improve processing speed.
In addition, the embodiment of the present invention also proposes a kind of storage medium, the prison of system service is stored on the storage medium
Program is controlled, the monitoring programme of the system service realizes the monitoring method of system service as described above when being executed by processor
The step of.
It is the structural block diagram of the monitoring device first embodiment of present system service referring to Fig. 5, Fig. 5.
As shown in figure 5, the monitoring device for the system service that the embodiment of the present invention proposes includes: extraction module 5001, determines
Module 5002, acquisition module 5003 and analysis module 5004.
Wherein, the extraction module 5001, for receiving system service access request, from the system service access request
The middle identification number for extracting accessed the first system service;The determining module 5002, for according to the identification number and in advance
The system service table to be monitored of building, determines whether the first system service is system service to be monitored;The acquisition module
5003, for responding the system service access request when the first system service is the system service to be monitored, and
The log information of the first system service creation is acquired during the first system service is accessed;The analysis mould
Block 5004, for analyzing the log information, by obtained real-time analysis result storage to corresponding data management system
System.
However, it should be understood that in practical applications, in order to guarantee that the determining module 5002 can quickly, precisely
The determination the first system service whether be system service to be monitored, the monitoring device of the system service further include: building
Module.
Correspondingly, the building module, for constructing institute before the extraction module 5001 receives system service request
State system service table to be monitored.
In addition, it is noted that in order to reduce the system clothes of the monitoring device of system service execution as far as possible
The monitoring programme of business promotes data to the occupancy of the system resource of the equipment for the monitoring programme for disposing the system service
Transmission speed specifically can be in the following way when constructing the system service table to be monitored:
Firstly, compiling at least one second system service based on Guice frame according to business demand;
Then, according to the attribute of the business demand and the second system service, determine that the second system service is
No needs are monitored;
It then, is to be monitored by the second system service mark if second system service needs are monitored
System service;
Finally, the identification number of the system service to be monitored is obtained, according to the identification number structure of the system service to be monitored
Build the system service table to be monitored.
By foregoing description it is not difficult to find that being specifically based on lightweight in the present embodiment when constructing second system service
Guice frame, and be not based on Spring frame, Pinpoint frame and Dubbo frame.
Therefore, the usage mode of the second system service and existing system service that compile out, working method is complete
It is different.
In addition, the system to be monitored that the determining module 5002 is constructed according to the identification number and in advance in order to facilitate understanding
Agent list, determine the first system service whether be system service to be monitored operation, a kind of concrete implementation is given below
Mode, approximately as:
Firstly, traversed to the system service table to be monitored, by the identification number with traverse it is current to be monitored
The identification number of system service compares;
Then, if the identification number is matched with the identification number of the current system service to be monitored traversed, it is determined that described
The first system service is the system service to be monitored.
In addition, closing data management system described in this present embodiment, it can substantially be divided into following three subsystem: close
It is type data base management subsystem, distributed storage management subsystem and distributed file management subsystem.
Correspondingly, the analysis module 5004 analyzes the log information, and obtained real-time analysis result is deposited
The operation of corresponding data management system is stored up, can substantially be refined as following steps:
Firstly, analyzing using big data analysis technology the log information, it is corresponding to obtain the log information
Model information and threshold information for being judged the log information;
Then, the model information is added to the distributed storage management subsystem, the threshold information is added
To the relevant database management subsystem, the log information is added to the distributed file management subsystem.
It should be understood that being given above only a kind of concrete implementation mode, not to technical solution of the present invention
Any restriction is constituted, in a particular application, those skilled in the art, which can according to need, to be configured, and the present invention does not do this
Limitation.
By foregoing description it is not difficult to find that the monitoring device of the system service provided in the present embodiment, by constructing in advance
System service table to be monitored, addition needs the system service to be monitored being monitored in advance in system service table to be monitored, from
And system service access request is being received, and accessed the first system service is extracted from system service access request
After identification number, the system service table to be monitored that can directly construct according to identification number and in advance determines the first system service
Whether it is system service to be monitored, when determining the first system service is system service to be monitored, just responds, simultaneously
The log information of the first system service creation is acquired during the first system service is accessed.Pass through this side
Formula realizes the first system service only monitored to needs and is monitored, to ensure that collected log information is only to need
The log information for the first system service to be monitored greatly reduces the quantity of the subsequent log information analyzed, makes
Obtaining subsequent analysis can be more targeted, and quickly.
Further, since the log information for the first system service that collected log information only needs to be monitored, because
And under the premise of the controllable quantity of log information, in the case where do not increase development cost and difficulty, analysis can be obtained
All real-time analysis results obtained are stored, to realize the storage to whole log informations of the first system service, greatly
Positioning of the subsequent research staff to the first system service abnormal problem is facilitated greatly.
It further, in practical applications, can also be according to preset in order to more intuitive monitoring system service
It shows style, the real-time analysis result is shown, so that research staff checks, such as with the figure of different-style, or
Person is shown with the charts of different dimensions.
It should be noted that workflow described above is only schematical, not to protection model of the invention
Enclose composition limit, in practical applications, those skilled in the art can select according to the actual needs part therein or
It all achieves the purpose of the solution of this embodiment, herein with no restrictions.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to provided by any embodiment of the invention
The monitoring method of system service, details are not described herein again.
The first embodiment of monitoring device based on above system service proposes the monitoring device the of present system service
Two embodiments.
In the present embodiment, in order to guarantee the validity of collected log information as far as possible, the system service
Monitoring device further include: preprocessing module.
Wherein, the preprocessing module, for carrying out pretreatment behaviour to the log information according to preset processing rule
Make, obtains the log information of removal interference information.
Correspondingly, the analysis module is using big data analysis technology, when analyzing the log information, essence
On be to be analyzed the log information of the removal interference information using big data analysis technology.
In addition, it is noted that in the present embodiment, it is clear to can be data to the pretreatment operation of the log information
Wash operation.By data cleansing, the duplicate message in log information can be deleted, and corrects existing mistake, to ensure that
The consistency and accuracy of data needed for subsequent analysis.
Further, in practical applications, the pretreatment operation can also need to be set as to the day according to business
Will information is grouped processing.
It should be understood that having the above is only for example, not constituting any restriction to technical solution of the present invention
In body application, those skilled in the art, which can according to need, to be configured, and the present invention is without limitation.
In addition, causing thread block to avoid a large amount of log informations to be stacked into the analysis module as far as possible, influence
Processing speed, the monitoring device of the system service can also include: cache module.
Wherein, the cache module, for the log information of the removal interference information to be added to point constructed in advance
Cloth distribution subscription message queue.
Correspondingly, the analysis module is using big data analysis technology, to the log information of the removal interference information
When being analyzed, need first to subscribe to the log letter that message queue is successively read the removal interference information from the distributed post
Then breath is using big data analysis technology, analyze the log information of the removal interference information.
Disappear it should be noted that above-mentioned described distributed post subscribes to the Kafka that message queue is specifically known as
Cease queue.
It should be understood that being given above only a kind of concrete implementation mode, not to technical solution of the present invention
Any restriction is constituted, in a particular application, those skilled in the art, which can according to need, to be configured, and the present invention does not do this
Limitation.
By foregoing description it is not difficult to find that the monitoring device of the system service provided in the present embodiment, is using big data
Analytical technology, before analyzing the log information, by being carried out to the log information according to preset processing rule
Pretreatment operation to obtain the log information of removal interference information, and the log information of the removal interference information is added to
The distributed post constructed in advance is subscribed to message queue and is cached, so as to effectively avoid a large amount of log informations heap simultaneously
Product arrives the node of log analysis, solves the problems, such as thread block, and then greatly improve processing speed.
It should be noted that workflow described above is only schematical, not to protection model of the invention
Enclose composition limit, in practical applications, those skilled in the art can select according to the actual needs part therein or
It all achieves the purpose of the solution of this embodiment, herein with no restrictions.
In addition, the not technical detail of detailed description in the present embodiment, reference can be made to provided by any embodiment of the invention
The monitoring method of system service, details are not described herein again.
In addition, it should be noted that, herein, the terms "include", "comprise" or its any other variant are intended to contain
Lid non-exclusive inclusion, so that process, method, article or system including a series of elements are not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or system
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or system including the element.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as read-only memory (Read Only Memory, ROM)/RAM, magnetic disk, CD), including some instructions are used so that one
Terminal device (can be mobile phone, computer, server or the network equipment etc.) executes side described in each embodiment of the present invention
Method.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of monitoring method of system service, which is characterized in that the described method includes:
System service access request is received, the mark of accessed the first system service is extracted from the system service access request
Knowledge number;
The system service table to be monitored constructed according to the identification number and in advance, determines whether the first system service is wait supervise
Control system service;
If the first system service is the system service to be monitored, the system service access request is responded, described
The log information of the first system service creation is acquired during the first system service is accessed;
The log information is analyzed, by obtained real-time analysis result storage to corresponding data management system.
2. the method as described in claim 1, which is characterized in that before the step of the reception system service access request, institute
State method further include:
Construct the system service table to be monitored;
Wherein, the step of building system service table to be monitored, comprising:
According to business demand, at least one second system service is compiled based on Guice frame;
According to the attribute of the business demand and the second system service, determine whether the second system service needs to carry out
Monitoring;
It is system service to be monitored by the second system service mark if the second system service needs are monitored;
The identification number for obtaining the system service to be monitored, it is described wait supervise according to the building of the identification number of the system service to be monitored
Control system service table.
3. method according to claim 2, which is characterized in that the system to be monitored constructed according to the identification number and in advance
System agent list, determines the step of whether the first system service is system service to be monitored, comprising:
The system service table to be monitored is traversed, by the identification number and the current system service to be monitored that traverses
Identification number compares;
If the identification number is matched with the identification number of the current system service to be monitored traversed, it is determined that the first system clothes
Business is the system service to be monitored.
4. method as described in any one of claims 1 to 3, which is characterized in that the data management system includes relationship type number
According to library management subsystem, distributed storage management subsystem and distributed file management subsystem;
It is described that the log information is analyzed, by obtained real-time analysis result storage to corresponding data management system
Step, comprising:
Using big data analysis technology, the log information is analyzed, obtains the corresponding model information of the log information
With the threshold information for being judged the log information;
The model information is added to the distributed storage management subsystem, the threshold information is added to the relationship
The log information is added to the distributed file management subsystem by type data base management subsystem.
5. method as claimed in claim 4, which is characterized in that it is described to use big data analysis technology, to the log information
Before the step of being analyzed, the method also includes:
According to preset processing rule, pretreatment operation is carried out to the log information, obtains the log letter of removal interference information
Breath;
Wherein, described to use big data analysis technology, the step of analysis the log information, comprising:
Using big data analysis technology, the log information of the removal interference information is analyzed.
6. method as claimed in claim 5, which is characterized in that it is described to use big data analysis technology, the removal is interfered
Before the step of log information of information is analyzed, the method also includes:
The log information of the removal interference information is added to the distributed post constructed in advance and subscribes to message queue;
Wherein, described to use big data analysis technology, the step of analysis the log information of the removal interference information, packet
It includes:
The log information that message queue is successively read the removal interference information is subscribed to from the distributed post;
Using big data analysis technology, the log information of the removal interference information is analyzed.
7. method as described in any one of claims 1 to 3, which is characterized in that it is described that the log information is analyzed, it will
After the step of obtained real-time analysis result storage is to corresponding data management system, the method also includes:
According to preset displaying style, the real-time analysis result is shown.
8. a kind of monitoring device of system service, which is characterized in that described device includes:
Extraction module extracts accessed for receiving system service access request from the system service access request
The identification number of one system service;
Determining module, the system service table to be monitored for constructing according to the identification number and in advance, determines the first system
Whether service is system service to be monitored;
Acquisition module, for responding the system service and visiting when the first system service is the system service to be monitored
It asks request, and acquires the log information of the first system service creation during the first system service is accessed;
Analysis module, for analyzing the log information, by obtained real-time analysis result storage to corresponding data
Management system.
9. a kind of monitoring device of system service, which is characterized in that the equipment includes: memory, processor and is stored in institute
The monitoring programme for the system service that can be run on memory and on the processor is stated, the monitoring programme of the system service is matched
The step of being set to the monitoring method for realizing the system service as described in any one of claims 1 to 7.
10. a kind of storage medium, which is characterized in that be stored with the monitoring programme of system service, the system on the storage medium
The monitoring programme of system service realizes the monitoring side of system service as described in any one of claim 1 to 7 when being executed by processor
The step of method.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910428277.7A CN110297738A (en) | 2019-05-21 | 2019-05-21 | Monitoring method, device, equipment and the storage medium of system service |
PCT/CN2019/122324 WO2020233077A1 (en) | 2019-05-21 | 2019-12-02 | System service monitoring method, device, and apparatus, and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910428277.7A CN110297738A (en) | 2019-05-21 | 2019-05-21 | Monitoring method, device, equipment and the storage medium of system service |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110297738A true CN110297738A (en) | 2019-10-01 |
Family
ID=68027122
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910428277.7A Pending CN110297738A (en) | 2019-05-21 | 2019-05-21 | Monitoring method, device, equipment and the storage medium of system service |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN110297738A (en) |
WO (1) | WO2020233077A1 (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990213A (en) * | 2019-10-22 | 2020-04-10 | 北京国电通网络技术有限公司 | Method and device for monitoring user logs in cluster environment in real time |
CN111209165A (en) * | 2020-01-05 | 2020-05-29 | 光大兴陇信托有限责任公司 | Two-stage monitoring processing method based on channel |
CN111464390A (en) * | 2020-03-31 | 2020-07-28 | 中国建设银行股份有限公司 | Network application system monitoring and early warning method and system |
WO2020233077A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | System service monitoring method, device, and apparatus, and storage medium |
CN112286762A (en) * | 2020-10-30 | 2021-01-29 | 深圳壹账通智能科技有限公司 | System information analysis method and device based on cloud environment, electronic equipment and medium |
CN113111261A (en) * | 2021-04-20 | 2021-07-13 | 树根互联股份有限公司 | Data processing method of cloud platform, cloud platform and panoramic analysis system |
Families Citing this family (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112540906B (en) * | 2020-12-24 | 2024-04-26 | 北京志翔信息技术有限公司 | Intelligent analysis method and system for business and data relationship based on probe |
CN112948378A (en) * | 2021-02-04 | 2021-06-11 | 上海中通吉网络技术有限公司 | Data processing method, device and equipment based on HBase |
CN113094342A (en) * | 2021-04-02 | 2021-07-09 | 上海中通吉网络技术有限公司 | Data persistence method, device and equipment and storage medium |
CN113157523B (en) * | 2021-04-21 | 2022-11-11 | 平安付科技服务有限公司 | Service monitoring method and device, computer equipment and storage medium |
CN113485891A (en) * | 2021-06-30 | 2021-10-08 | 中国民航信息网络股份有限公司 | Service log monitoring method and device, storage medium and electronic equipment |
CN113806127B (en) * | 2021-09-12 | 2024-02-13 | 济南浪潮数据技术有限公司 | Server log collection method, device and readable storage medium |
CN114328083B (en) * | 2021-11-30 | 2023-11-14 | 苏州浪潮智能科技有限公司 | WDT monitoring method, device and medium |
CN114760221B (en) * | 2022-03-31 | 2024-02-23 | 深信服科技股份有限公司 | Service monitoring method, system and storage medium |
CN114900444A (en) * | 2022-04-25 | 2022-08-12 | 北京奇艺世纪科技有限公司 | Data monitoring method and device, electronic equipment and storage medium |
CN114760312B (en) * | 2022-04-27 | 2024-06-18 | 泽拓科技(深圳)有限责任公司 | Distributed task coordination method, device, equipment and medium |
CN114816932A (en) * | 2022-05-09 | 2022-07-29 | 中冶赛迪重庆信息技术有限公司 | Method, system, medium and electronic device for managing algorithm |
CN114880407B (en) * | 2022-05-30 | 2024-06-21 | 上海九方云智能科技有限公司 | User intelligent identification method and system based on strong and weak relation network |
CN115277133B (en) * | 2022-07-13 | 2024-03-15 | 国家电网有限公司信息通信分公司 | Equipment management method and device |
CN115426281A (en) * | 2022-07-22 | 2022-12-02 | 中银金融科技有限公司 | Application state monitoring method and device, electronic equipment and storage medium |
CN115473833A (en) * | 2022-09-14 | 2022-12-13 | 康键信息技术(深圳)有限公司 | Client performance monitoring method, device and system and readable storage medium |
CN115934480B (en) * | 2023-03-15 | 2023-06-16 | 浪潮电子信息产业股份有限公司 | Task monitoring method, system, device and computer readable storage medium |
CN116980474B (en) * | 2023-07-31 | 2024-04-02 | 深圳市亲邻科技有限公司 | Log data subscription management method of data pushing system |
CN117591381B (en) * | 2024-01-18 | 2024-04-09 | 南京研利科技有限公司 | Data reporting method and device |
CN118331823A (en) * | 2024-04-23 | 2024-07-12 | 中国科学院空间应用工程与技术中心 | Method and system for managing and monitoring alarm of space engineering business operation log |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103973749A (en) * | 2013-02-05 | 2014-08-06 | 腾讯科技(深圳)有限公司 | Cloud server and website processing method based on same |
CN104508628A (en) * | 2012-07-31 | 2015-04-08 | 惠普发展公司,有限责任合伙企业 | Monitoring for managed services |
CN104915599A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Application program monitoring method and terminal |
WO2017101488A1 (en) * | 2015-12-18 | 2017-06-22 | 乐视控股(北京)有限公司 | Real-time transcoding monitoring method and real-time transcoding system |
CN108268485A (en) * | 2016-12-30 | 2018-07-10 | 亿阳安全技术有限公司 | A kind of daily record real-time analysis method and system |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8973136B2 (en) * | 2011-08-02 | 2015-03-03 | Quick Heal Technologies Private Limited | System and method for protecting computer systems from malware attacks |
CN105207806A (en) * | 2015-08-20 | 2015-12-30 | 百度在线网络技术(北京)有限公司 | Monitoring method and apparatus of distributed service |
CN108512689B (en) * | 2017-12-15 | 2021-08-27 | 中国平安财产保险股份有限公司 | Micro-service monitoring method and server |
CN109284267A (en) * | 2018-09-26 | 2019-01-29 | 深圳壹账通智能科技有限公司 | Blog management method and terminal device based on abnormal monitoring |
CN110297738A (en) * | 2019-05-21 | 2019-10-01 | 深圳壹账通智能科技有限公司 | Monitoring method, device, equipment and the storage medium of system service |
-
2019
- 2019-05-21 CN CN201910428277.7A patent/CN110297738A/en active Pending
- 2019-12-02 WO PCT/CN2019/122324 patent/WO2020233077A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104508628A (en) * | 2012-07-31 | 2015-04-08 | 惠普发展公司,有限责任合伙企业 | Monitoring for managed services |
CN103973749A (en) * | 2013-02-05 | 2014-08-06 | 腾讯科技(深圳)有限公司 | Cloud server and website processing method based on same |
CN104915599A (en) * | 2015-05-30 | 2015-09-16 | 广东欧珀移动通信有限公司 | Application program monitoring method and terminal |
WO2017101488A1 (en) * | 2015-12-18 | 2017-06-22 | 乐视控股(北京)有限公司 | Real-time transcoding monitoring method and real-time transcoding system |
CN108268485A (en) * | 2016-12-30 | 2018-07-10 | 亿阳安全技术有限公司 | A kind of daily record real-time analysis method and system |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2020233077A1 (en) * | 2019-05-21 | 2020-11-26 | 深圳壹账通智能科技有限公司 | System service monitoring method, device, and apparatus, and storage medium |
CN110990213A (en) * | 2019-10-22 | 2020-04-10 | 北京国电通网络技术有限公司 | Method and device for monitoring user logs in cluster environment in real time |
CN110990213B (en) * | 2019-10-22 | 2024-01-23 | 北京国电通网络技术有限公司 | Method and device for monitoring user logs of cluster environment in real time |
CN111209165A (en) * | 2020-01-05 | 2020-05-29 | 光大兴陇信托有限责任公司 | Two-stage monitoring processing method based on channel |
CN111209165B (en) * | 2020-01-05 | 2021-03-16 | 光大兴陇信托有限责任公司 | Two-stage monitoring processing method based on channel |
CN111464390A (en) * | 2020-03-31 | 2020-07-28 | 中国建设银行股份有限公司 | Network application system monitoring and early warning method and system |
CN112286762A (en) * | 2020-10-30 | 2021-01-29 | 深圳壹账通智能科技有限公司 | System information analysis method and device based on cloud environment, electronic equipment and medium |
CN113111261A (en) * | 2021-04-20 | 2021-07-13 | 树根互联股份有限公司 | Data processing method of cloud platform, cloud platform and panoramic analysis system |
Also Published As
Publication number | Publication date |
---|---|
WO2020233077A1 (en) | 2020-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110297738A (en) | Monitoring method, device, equipment and the storage medium of system service | |
CN108363602B (en) | Intelligent UI (user interface) layout method and device, terminal equipment and storage medium | |
US10152488B2 (en) | Static-analysis-assisted dynamic application crawling architecture | |
US11403333B2 (en) | User interface search tool for identifying and summarizing data | |
CN106067080B (en) | Configurable workflow capabilities are provided | |
CN109684370A (en) | Daily record data processing method, system, equipment and storage medium | |
US10922282B2 (en) | On-demand collaboration user interfaces | |
CN110431545A (en) | Inquiry is executed for structural data and unstructured data | |
US20130254196A1 (en) | Cost-based optimization of configuration parameters and cluster sizing for hadoop | |
CN111625452A (en) | Flow playback method and system | |
CN108804299A (en) | Application exception processing method and processing device | |
CN110147327B (en) | Multi-granularity-based web automatic test management method | |
US11106713B2 (en) | Sampling data using inverted indexes in response to grouping selection | |
WO2021254101A1 (en) | Information recommendation method and apparatus, and electronic device | |
CN106874763A (en) | The Android software malicious act triggering system and method for modelling customer behavior | |
CN109033109A (en) | Data processing method and system | |
US11126785B1 (en) | Artificial intelligence system for optimizing network-accessible content | |
CN110298000A (en) | Acquisition methods, terminal device and the medium of page parameter | |
CN112949172A (en) | Data processing method and device, machine readable medium and equipment | |
CN114265680A (en) | Mass data processing method and device, electronic equipment and storage medium | |
CN114153688A (en) | Distributed monitoring method and device based on cloud platform | |
CN106559498A (en) | Air control data collection platform and its collection method | |
CN105354189A (en) | Method and system for searching for software applicationst | |
CN111782672A (en) | Multi-field data management method and related device | |
CN111767473B (en) | Object selection method and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20191001 |
|
WD01 | Invention patent application deemed withdrawn after publication |