CN110569177A - Method and device for testing log coverage mechanism - Google Patents

Method and device for testing log coverage mechanism Download PDF

Info

Publication number
CN110569177A
CN110569177A CN201910916639.7A CN201910916639A CN110569177A CN 110569177 A CN110569177 A CN 110569177A CN 201910916639 A CN201910916639 A CN 201910916639A CN 110569177 A CN110569177 A CN 110569177A
Authority
CN
China
Prior art keywords
log
log file
file
main
timestamp
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910916639.7A
Other languages
Chinese (zh)
Other versions
CN110569177B (en
Inventor
吴亚男
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910916639.7A priority Critical patent/CN110569177B/en
Publication of CN110569177A publication Critical patent/CN110569177A/en
Application granted granted Critical
Publication of CN110569177B publication Critical patent/CN110569177B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3034Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a storage system, e.g. DASD based or network based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3452Performance evaluation by statistical analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention relates to a method and a device for testing a log coverage mechanism, wherein the method comprises the following steps: executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file; recording a time stamp of a first log in a master log file; repeatedly executing a preset instruction to generate and write a plurality of logs until the space of the main log file is occupied and generating a secondary log file; inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file; and responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates. The testing method of the invention not only improves the efficiency, saves the labor cost and reduces the manual error rate, but also improves the testing accuracy and can automatically store the records in the whole testing process.

Description

Method and device for testing log coverage mechanism
Technical Field
the invention relates to the technical field of server testing. The invention further relates to a method and a device for testing the log coverage mechanism.
Background
in the working process of the server, the log plays a very important role. The BMC, the BIOS or various operations of the system in operation generate corresponding records and store the records in various logs, so that subsequent checking and verification are guaranteed. The corresponding audit log also records various logs generated by various operations on the server. Therefore, ensuring the normal operation of log generation and storage plays an important role in ensuring the normal operation of the server.
therefore, the test of the log is an important link in various tests of the server. In this context, the detection of the log-overlay mechanism function is particularly important. In the traditional test method, whether each log function can be normally used is verified manually, the types and the number of generated logs are huge due to comprehensive and complex functions of a server, the traditional test process consumes time and labor, the whole test process and results are not recorded, and the subsequent checking and analysis are inconvenient.
Therefore, a convenient testing method is needed to verify the function of the log coverage mechanism, so as to ensure that the function can be normally used, thereby improving the efficiency of server testing, reducing labor cost and reducing error rate.
Disclosure of Invention
in one aspect, the present invention provides a method for testing a log coverage mechanism based on the above object, wherein the method includes the following steps:
Executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
recording a time stamp of a first log in a master log file;
Repeatedly executing a preset instruction to generate and write a plurality of logs until the space of the main log file is occupied and generating a secondary log file;
Inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
And responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
according to an embodiment of the testing method of the log coverage mechanism of the present invention, wherein repeatedly executing the preset instruction to generate and write the plurality of logs until the space of the primary log file is full and generating the secondary log file further comprises:
and monitoring the main log full keywords in the system log to judge whether the space of the main log file is occupied or not.
According to an embodiment of the testing method of the log coverage mechanism, the repeatedly executing the preset instruction to generate and write the plurality of logs until the space of the main log file is full and the generating of the secondary log file further comprises:
monitoring the size of a master log file;
in response to a sudden decrease in the size of the master log file, it is determined that the space of the master log file has reached fullness.
an embodiment of the method for testing a log coverage mechanism according to the invention is described, wherein the method further comprises:
before the preset instruction is executed for the first time to generate the log, all log files are emptied.
According to an embodiment of the testing method of the log coverage mechanism of the present invention, wherein the clearing all log files further comprises:
all log files are deleted.
according to an embodiment of the testing method of the log coverage mechanism of the present invention, wherein the clearing all log files further comprises:
and deleting all logs in the main log file and deleting the auxiliary log file through the emptying interface.
an embodiment of the method for testing a log coverage mechanism according to the invention is described, wherein the method further comprises:
monitoring the sum of the sizes of the main log file and the auxiliary log file;
and in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
in another aspect, the present invention further provides a testing apparatus for a log coverage mechanism, where the apparatus includes:
At least one processor; and
a memory storing processor-executable program instructions that, when executed by the processor, perform the steps of:
executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
recording a time stamp of a first log in a master log file;
Repeatedly executing a preset instruction to generate and write a plurality of logs until the space of the main log file is occupied and generating a secondary log file;
inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
And responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
in an embodiment of the testing apparatus of the log overlay mechanism according to the invention, the program instructions when executed by the processor further perform the steps of:
Before the preset instruction is executed for the first time to generate the log, all log files are emptied.
in an embodiment of the testing apparatus of the log overlay mechanism according to the invention, the program instructions when executed by the processor further perform the steps of:
monitoring the sum of the sizes of the main log file and the auxiliary log file;
in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
by adopting the technical scheme, the invention at least has the following beneficial effects: the scheme of the invention aims at detecting the coverage mechanism of the audit log, firstly, the log is brushed, whether the audit log can be covered when the audit log is full is dynamically verified, the old log is covered into the secondary log file, the main log file is emptied so as to write in a new log, and whether the coverage function of the audit log can be normally used is verified by adopting a mode of checking the log record according to the timestamp, so that the efficiency is improved, the labor cost is saved, the manual error rate is reduced, the test accuracy is improved, and the record in the whole test process can be automatically saved. In addition, the method has strong expandability, is not limited to the verification of the function of the audit log, can also be applied to the verification of the coverage function of various logs such as idl logs, sel logs and the like, and can also be expanded to the verification of other files with recording functions.
the present invention provides aspects of embodiments, which should not be used to limit the scope of the present invention. Other embodiments are contemplated in accordance with the techniques described herein, as will be apparent to one of ordinary skill in the art upon study of the following figures and detailed description, and are intended to be included within the scope of the present application.
embodiments of the invention are explained and described in more detail below with reference to the drawings, but they should not be construed as limiting the invention.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are required to be used in the description of the prior art and the embodiments will be briefly described below, parts in the drawings are not necessarily drawn to scale, and related elements may be omitted, or in some cases the scale may have been exaggerated in order to emphasize and clearly show the novel features described herein. In addition, the structural order may be arranged differently, as is known in the art.
Fig. 1 shows a schematic block diagram of a method of testing a log coverage mechanism according to the invention.
Detailed Description
While the present invention may be embodied in various forms, there is shown in the drawings and will hereinafter be described some exemplary and non-limiting embodiments, with the understanding that the present disclosure is to be considered an exemplification of the invention and is not intended to limit the invention to the specific embodiments illustrated.
fig. 1 shows a schematic block diagram of a method of testing a log coverage mechanism according to the invention. In the embodiment shown in the figure, the test method at least comprises the following steps:
S1: executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
S2: recording a time stamp of a first log in a master log file;
S3: repeatedly executing a preset instruction to generate and write a plurality of logs until the space of the main log file is occupied and generating a secondary log file;
S4: inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
s5: and responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
First of all, the test method of the log overlay mechanism according to the present invention can be implemented manually or in an automated scripting tool, wherein the automated scripting tool implements automated testing based on JAVA. Further, a JAVA-jar-script name-parameter is input to run the script under the CMD by using a JAVA virtual running tool. The test process and the result are displayed in real time, and can be recorded, for example, a test log is saved in a TXT form.
Specifically, according to the testing method of the log coverage mechanism of the present invention, for example, for the verification of the coverage mechanism after the audit log is full, the log in the main log file needs to be flushed first, that is, step S1 executes a preset instruction to generate the log, and writes the log and a corresponding timestamp into the main log file, where the preset instruction is preferably an instruction that can generate the log and has a fast execution speed and a small load on the server, for example, the user right with IPMI out-of-band instruction modification id of 1 is admin (ipmitool-I board-H BMCIP-U bmcucaname-P page-L private channel session 12 private 5). Subsequently, step S2 records the time stamp of the first log in the master log file, which is the key information for verification later. Step S3 repeatedly executes preset instructions to generate and write a plurality of logs until the space of the main log file reaches full and the generation of the sub log file aims to repeat the process of flushing the log to fully write the main log file and ensure the occurrence of the log overwriting mechanism. For example, the total of the sizes of the audit logs has a certain limit (about 200KB, and usually the deviation does not exceed 10KB), only the main audio log file exists by default, when the main audio log file records that the log is full, namely the log reaches a critical value (for example, about 100 KB), all the audit logs in the main audio log file are covered in the auxiliary audio log 1 file, and the main audio log file is emptied. Therefore, step S3 repeats the process of flushing the log until the main log file is full, and then the flushing is continued, so that the log recorded in the main log file is overwritten into the secondary log file. After that, step S4 inquires in the secondary log file whether there is a time stamp of the first log in the primary log file recorded in step S2 to determine whether the overlay mechanism is successfully performed. When the timestamp of the first log is queried in the secondary log file, step S5 determines and feeds back that the overlay mechanism is operating normally. Otherwise, if the timestamp of the first log cannot be inquired, the abnormal operation of the coverage mechanism is judged and fed back. In other words, according to the method of the present invention, only the timestamp of the test log is concerned in the test process, and the content of the log is not concerned, so that the test effect of the method according to the present invention is not affected by the content of the log, and the log of any instruction can be used in the test method according to the present invention, thereby not only simplifying the judgment process of the test, but also providing sufficient flexibility for the log brushing process in the previous period.
further embodiments of the present invention will be described below, it being noted that the numbering of the steps mentioned therein is used only for the convenience of unambiguously indicating the step without any particular indication, and does not limit the order of the steps described.
in some embodiments of the method for testing a log coverage mechanism of the present invention, the step S3 repeatedly executing the preset instruction to generate and write the plurality of logs until the space of the primary log file is full and generating the secondary log file further comprises:
s31: and monitoring the main log full keywords in the system log to judge whether the space of the main log file is occupied or not.
Step S31 is to monitor the system log to determine whether the space of the master log file is full, and to check whether a log with a space that is full quickly will be generated in the system log of the server. And connecting the client to the to-be-tested machine through an ssh protocol, entering an extog file, executing a cat audio log instruction to view log content, and screening full keywords of the main log, such as full. If the main log full keyword exists, the audit log is about to be flushed, and if the main log full keyword does not exist, the audit log does not reach the state about to be flushed. And when the log is determined to be about to be flushed, continuing to flush the log. Then check to see if a full space log would be generated in the server's system log. Sending an ssh instruction at the client to execute the cd/extog; log instruction, the presence of a key in the log, e.g., full, represents that the audit log has been flushed.
in several embodiments of the method for testing a log coverage mechanism of the present invention, the step S3 repeatedly executing the preset instruction to generate and write the plurality of logs until the space of the primary log file is full and generating the secondary log file further comprises:
s32: monitoring the size of a master log file;
s33: in response to a sudden decrease in the size of the master log file, it is determined that the space of the master log file has reached fullness.
Determining that the master log file is flushed may be accomplished in a number of ways, and in some embodiments, determining whether the space of the master log file is full may be accomplished by monitoring the size of the master log file in step S32. Specifically, since the main log file transfers the log thereof to another file (i.e., the secondary log file) and empties the main log file after being flushed, when it is detected that the size of the main log file is suddenly reduced, which represents that a process of fully writing the main log file and then transferring and emptying the main log file occurs, in the case that the sudden reduction of the main log file is detected, step S33 determines that the space of the main log file has been fully occupied.
in one or more embodiments of the method for testing a log coverage mechanism of the present invention, the method further comprises:
S0: before the preset instruction is executed for the first time to generate the log, all log files are emptied.
Because a certain number of audit logs are generated in the using process of the machine, when a log coverage mechanism test is required, the size, specific content and storage file name of the audit logs of the current testing machine cannot be determined, and accurate flushing cannot be performed on the premise that the current state of the audit logs is not accurately known. Therefore, in order to more accurately test the log coverage mechanism, in some embodiments, step S0 first clears all log files before the preset instructions are first executed to generate the log, i.e., before the log is first flushed.
In some embodiments of the testing method of the log coverage mechanism of the present invention, the clearing all log files in step S0 further comprises: all log files are deleted. If the server itself does not provide an interface for cleaning the log, in these embodiments, the clearing of all log files in step S0 is implemented by deleting the base file of the log.
In still other embodiments of the testing method of the log coverage mechanism of the present invention, the clearing all log files in step S0 further comprises: and deleting all logs in the main log file and deleting the auxiliary log file through the emptying interface. If the server itself already provides a clearing interface for clearing the logs, in these embodiments, clearing all log files in step S0 is implemented in such a way that all logs are deleted in the primary log file and the secondary log file is deleted through the clearing interface.
in several embodiments of the method for testing a log coverage mechanism of the present invention, the method further comprises:
S6: monitoring the sum of the sizes of the main log file and the auxiliary log file;
s7: and in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
In some cases, what needs to be verified in the log overlay mechanism includes not only overlaying the logs in the main log file into the auxiliary log file, but also including an emptying link after the main log file and the auxiliary log file are fully written, that is, the main log file is emptied after the main log file is fully written and the auxiliary log file is emptied before the logs are transferred to the auxiliary log file after the main log file is fully written again. Either or both links fail to work normally, and both links belong to a log coverage mechanism and have abnormity. In order to verify the operation of the above two links, the testing method according to the present invention further includes step S6 of monitoring the sum of the sizes of the main log file and the sub log file, and when the sum exceeds a threshold (e.g., 200KB mentioned in the foregoing example) of the sum of the sizes of the main log file and the sub log file, step S7 also judges and feeds back that the log coverage mechanism is abnormal.
in another aspect, the present invention further provides a testing apparatus for a log coverage mechanism, where the apparatus includes: at least one processor; and a memory storing program code executable by the processor, the program code, when executed by the processor, performing the steps of:
s1: executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
S2: recording a time stamp of a first log in a master log file;
s3: repeatedly executing a preset instruction to generate and write a plurality of logs until the space of the main log file is occupied and generating a secondary log file;
s4: inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
S5: and responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
an embodiment of the testing apparatus of a log overlay mechanism according to the invention is described, wherein the program code further performs the following steps when executed by the processor:
S0: before the preset instruction is executed for the first time to generate the log, all log files are emptied.
in an embodiment of the testing apparatus of the log overlay mechanism according to the invention, the program instructions when executed by the processor further perform the steps of:
S6: monitoring the sum of the sizes of the main log file and the auxiliary log file;
s7: in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
the devices and apparatuses disclosed in the embodiments of the present invention may be various electronic terminal apparatuses, such as a mobile phone, a Personal Digital Assistant (PDA), a tablet computer (PAD), a smart television, and the like, or may be a large terminal apparatus, such as a server, and therefore the scope of protection disclosed in the embodiments of the present invention should not be limited to a specific type of device and apparatus. The client disclosed in the embodiment of the present invention may be applied to any one of the above electronic terminal devices in the form of electronic hardware, computer software, or a combination of both.
the computer-readable storage media (e.g., memory) described herein may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. By way of example, and not limitation, nonvolatile memory can include Read Only Memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which can act as external cache memory. By way of example and not limitation, RAM may be available in a variety of forms such as synchronous RAM (DRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The storage devices of the disclosed aspects are intended to comprise, without being limited to, these and other suitable types of memory.
By adopting the technical scheme, the invention at least has the following beneficial effects: the scheme of the invention aims at detecting the coverage mechanism of the audit log, firstly, the log is brushed, whether the audit log can be covered when the audit log is full is dynamically verified, the old log is covered into the secondary log file, the main log file is emptied so as to write in a new log, and whether the coverage function of the audit log can be normally used is verified by adopting a mode of checking the log record according to the timestamp, so that the efficiency is improved, the labor cost is saved, the manual error rate is reduced, the test accuracy is improved, and the record in the whole test process can be automatically saved. In addition, the method has strong expandability, is not limited to the verification of the function of the audit log, can also be applied to the verification of the coverage function of various logs such as idl logs, sel logs and the like, and can also be expanded to the verification of other files with recording functions.
it is to be understood that the features listed above for the different embodiments may be combined with each other to form further embodiments within the scope of the invention, where technically feasible. Furthermore, the specific examples and embodiments described herein are non-limiting, and various modifications of the structure, steps and sequence set forth above may be made without departing from the scope of the invention.
in this application, the use of the conjunction of the contrary intention is intended to include the conjunction. The use of definite or indefinite articles is not intended to indicate cardinality. In particular, references to "the" object or "an" and "an" object are intended to mean one of many such objects possible. However, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated. Furthermore, the conjunction "or" may be used to convey simultaneous features, rather than mutually exclusive schemes. In other words, the conjunction "or" should be understood to include "and/or". The term "comprising" is inclusive and has the same scope as "comprising".
The above-described embodiments, particularly any "preferred" embodiments, are possible examples of implementations, and are presented merely for a clear understanding of the principles of the invention. Many variations and modifications may be made to the above-described embodiments without departing substantially from the spirit and principles of the technology described herein. All such modifications are intended to be included within the scope of this disclosure.

Claims (10)

1. a method for testing a log coverage mechanism, the method comprising the steps of:
executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
Recording a timestamp of a first log in the master log file;
Repeatedly executing the preset instruction to generate and write a plurality of logs until the space of the main log file is full and generating a secondary log file;
Inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
And responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
2. The method of claim 1, wherein repeatedly executing the preset instructions to generate and write a plurality of logs until the space of the primary log file is full and generating a secondary log file further comprises:
And monitoring main log full keywords in a system log to judge whether the space of the main log file is occupied or not.
3. The method of claim 1, wherein repeatedly executing the preset instructions to generate and write a plurality of logs until the space of the primary log file is full and generating a secondary log file further comprises:
Monitoring the size of the master log file;
in response to a sudden decrease in the size of the master log file, determining that the space of the master log file is up to full.
4. The method of claim 1, further comprising:
and emptying all log files before executing the preset instruction for the first time to generate the log.
5. The method of claim 4, wherein the flushing all log files further comprises:
and deleting all log files.
6. the method of claim 4, wherein the flushing all log files further comprises:
And deleting all logs in the main log file and deleting the auxiliary log file through an emptying interface.
7. the method of claim 1, further comprising:
Monitoring the sum of the sizes of the primary log file and the secondary log file;
and in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
8. An apparatus for testing a log overlay mechanism, the apparatus comprising:
At least one processor; and
A memory storing processor-executable program instructions that, when executed by the processor, perform the steps of:
executing a preset instruction to generate a log, and writing the log and a corresponding timestamp into a master log file;
recording a timestamp of a first log in the master log file;
repeatedly executing the preset instruction to generate and write a plurality of logs until the space of the main log file is full and generating a secondary log file;
Inquiring whether a timestamp of a first log in the main log file exists in the auxiliary log file;
and responding to the timestamp of the first log queried in the secondary log file, and judging that the coverage mechanism normally operates.
9. The apparatus of claim 8, wherein the program instructions, when executed by the processor, further perform the steps of:
And emptying all log files before executing the preset instruction for the first time to generate the log.
10. the apparatus of claim 8, wherein the program instructions, when executed by the processor, further perform the steps of:
Monitoring the sum of the sizes of the primary log file and the secondary log file;
And in response to the sum of the sizes exceeding a threshold, determining that the log coverage mechanism is abnormal.
CN201910916639.7A 2019-09-26 2019-09-26 Method and device for testing log coverage mechanism Active CN110569177B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910916639.7A CN110569177B (en) 2019-09-26 2019-09-26 Method and device for testing log coverage mechanism

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910916639.7A CN110569177B (en) 2019-09-26 2019-09-26 Method and device for testing log coverage mechanism

Publications (2)

Publication Number Publication Date
CN110569177A true CN110569177A (en) 2019-12-13
CN110569177B CN110569177B (en) 2022-08-19

Family

ID=68782471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910916639.7A Active CN110569177B (en) 2019-09-26 2019-09-26 Method and device for testing log coverage mechanism

Country Status (1)

Country Link
CN (1) CN110569177B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231288A (en) * 2020-09-30 2021-01-15 北京金山云网络技术有限公司 Log storage method and device and medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558327A (en) * 2018-12-04 2019-04-02 浪潮电子信息产业股份有限公司 Writing method and system of BMC log and related components
CN109783384A (en) * 2019-01-10 2019-05-21 未来电视有限公司 Log use-case test method, log use-case test device and electronic equipment
CN109933462A (en) * 2019-02-25 2019-06-25 深圳小云字符信息科技有限公司 Log information processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558327A (en) * 2018-12-04 2019-04-02 浪潮电子信息产业股份有限公司 Writing method and system of BMC log and related components
CN109783384A (en) * 2019-01-10 2019-05-21 未来电视有限公司 Log use-case test method, log use-case test device and electronic equipment
CN109933462A (en) * 2019-02-25 2019-06-25 深圳小云字符信息科技有限公司 Log information processing method

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231288A (en) * 2020-09-30 2021-01-15 北京金山云网络技术有限公司 Log storage method and device and medium

Also Published As

Publication number Publication date
CN110569177B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN104268055B (en) The monitoring method and device of a kind of program exception
US20080141221A1 (en) Using recorder technology to find defects in software applications
CN108427613B (en) Abnormal interface positioning method and device, computer equipment and storage medium
US20160283357A1 (en) Call stack relationship acquiring method and apparatus
CN110688358B (en) Log collection method, device and equipment and readable storage medium
US20080276129A1 (en) Software tracing
US8775551B2 (en) Testing a network system
CN109324961B (en) System automatic test method, device, computer equipment and storage medium
CN110727597A (en) Method for completing use case based on log troubleshooting invalid codes
JP5495310B2 (en) Information processing apparatus, failure analysis method, and failure analysis program
CN110569177B (en) Method and device for testing log coverage mechanism
CN110716843B (en) System fault analysis processing method and device, storage medium and electronic equipment
CN111984452A (en) Program failure detection method, program failure detection device, electronic device, and storage medium
CN118244989A (en) Log processing method, device, equipment and readable storage medium
CN110674145A (en) Data consistency detection method and device, computer equipment and storage medium
CN112214378B (en) Data collection method and device, electronic equipment and storage medium
US11467896B2 (en) Sections in crash dump files
CN111427777A (en) SO L test method, system, equipment and medium
CN111124881A (en) eMMC firmware test method and device
CN112486824B (en) Case code generation method, device, computer equipment and storage medium
CN106970862B (en) Memory jitter automatic test method and device
CN100561953C (en) A kind of method of recording and diagnosing data
CN112199298B (en) Single-step debugging detection method and device and computer readable storage medium
Cisco White Paper: Monitoring Cisco Unity Performance
CN114116291B (en) Log detection method, log detection device, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant