CN110737639A - Audit log method, device, computer equipment and storage medium - Google Patents

Audit log method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110737639A
CN110737639A CN201911015531.7A CN201911015531A CN110737639A CN 110737639 A CN110737639 A CN 110737639A CN 201911015531 A CN201911015531 A CN 201911015531A CN 110737639 A CN110737639 A CN 110737639A
Authority
CN
China
Prior art keywords
audit
information
collector
server
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911015531.7A
Other languages
Chinese (zh)
Inventor
刘倍材
李柏
黄波
潘孝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanlianyi Information Technology Service Co Ltd
Priority to CN201911015531.7A priority Critical patent/CN110737639A/en
Publication of CN110737639A publication Critical patent/CN110737639A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • G06F16/24573Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2462Approximate or statistical queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The invention relates to audit log methods, devices, computer equipment and storage media, wherein the method comprises the steps of obtaining an audit log request, recording audit information of specified operation after application service is started according to the audit log request, sending the collected audit information to a collector of an audit server, receiving the audit information through the collector of the audit server, storing the audit information into a storage component of the audit server, and providing inquiry of the audit log through an Application Program Interface (API).

Description

Audit log method, device, computer equipment and storage medium
Technical Field
The invention relates to the technical field of computers, in particular to audit log methods, devices, computer equipment and storage media.
Background
In systems, the log is important functional components, which can record all the behaviors generated by the system and express the behaviors according to a certain specification, specifically, the information recorded by the log can be used for debugging the system, optimizing the performance of the system or adjusting the behavior of the system according to the information, in the security field, the log can reflect a plurality of security attack behaviors, such as login errors, abnormal access and the like, and the log can also tell you a plurality of information about events occurring in the network, including performance information, fault detection and intrusion detection.
Moreover, the journal can even become a good source of "forensic" information to ascertain "what has occurred" after an accident, which is the origin of the audit journal (or audit trail) is security-related time series records, record groups, and/or record sources and targets as a written file of sequence activities that affect special operations at any time.
Disclosure of Invention
In view of the above, it is necessary to provide audit log methods, apparatuses, computer devices and storage media for addressing the above technical problems.
an audit log method, the method comprising:
obtaining an audit log request;
recording audit information of specified operation after the application service is started according to the audit log request;
sending the collected audit information to a collector of an audit server;
receiving the audit information through a collector of the audit server, and storing the audit information into a storage component of the audit server;
and providing the inquiry of the audit log through the API.
In embodiments, the step of recording audit information of a specified operation after the application service is started according to the audit log request further includes:
providing an annotation class, wherein the annotation class is usable on a class or a method;
performing AOP on the class or the method using the annotation class;
necessary audit information is extracted during the AOP process.
In embodiments, the step of receiving the audit information by the collector of the audit server and storing the audit information in a storage component of the audit server comprises:
receiving, by a collector of the audit server, the audit information;
converting the audit information into a format processed inside an audit server to support subsequent storage, analysis and display;
and storing the information processed by the audit collector into a storage medium component, wherein the storage medium component provides Database and ES mode storage.
In embodiments, the step of sending the collected audit information to the collector of the audit server further comprises:
setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and sending the audit information to a collector of the audit server according to the set transmission mode.
an audit log apparatus, the apparatus comprising:
the acquisition module is used for acquiring an audit log request;
the recording module is used for recording audit information of specified operation after the application service is started according to the audit log request;
the sending module is used for sending the collected audit information to a collector of an audit server;
the receiving and storing module is used for receiving the audit information through a collector of the audit server and storing the audit information into a storage component of the audit server;
and the query module is used for querying externally provided audit logs through an API.
In embodiments, the recording module is further to:
providing an annotation class, wherein the annotation class is usable on a class or a method;
performing AOP on the class or the method using the annotation class;
necessary audit information is extracted during the AOP process.
In embodiments, the receive storage module is further to:
receiving, by a collector of the audit server, the audit information;
converting the audit information into a format processed inside an audit server to support subsequent storage, analysis and display;
and storing the information processed by the audit collector into a storage medium component, wherein the storage medium component provides Database and ES mode storage.
In embodiments, the sending module is further configured to:
setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and sending the audit information to a collector of the audit server according to the set transmission mode.
computer apparatus comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the computer program performing the steps of any of the methods of above.
computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of any of the methods of above.
The invention provides technical schemes of audit logs based on the definition of the audit logs, which can record calling ID of request operation, called service name, called class name and method name, request parameter, execution time, execution duration, client IP and return result (including success or failure) and can know who has done what operation, measure application performance and count application use frequency.
Drawings
FIG. 1 is a diagram of an application environment of an audit log method in embodiments;
FIG. 2 is a schematic diagram of the data flow in the audit log method in embodiments;
FIG. 3 is a schematic flow chart of an audit log method in embodiments;
FIG. 4 is a schematic flow chart of an audit log method in another embodiments;
FIG. 5 is a schematic flow chart of an audit log method in another embodiments;
FIG. 6 is a schematic flow chart of an audit log method in yet another embodiments;
FIG. 7 is a block diagram of the structure of an audit log device in embodiments;
fig. 8 is an internal structural view of a computer device in embodiments.
Detailed Description
For purposes of making the present application more readily apparent, the technical solutions and advantages thereof, reference is now made to the following detailed description taken in conjunction with the accompanying drawings and examples, it being understood that the specific examples described herein are for purposes of illustration only and are not intended to limit the application.
In embodiments, as shown in FIG. 3, there are provided audit log methods comprising:
step 302, obtaining an audit log request;
step 304, recording audit information of specified operation after the application service is started according to the audit log request;
step 306, sending the collected audit information to a collector of an audit server;
step 308, receiving the audit information through a collector of the audit server, and storing the audit information into a storage component of the audit server;
and step 310, providing the audit log inquiry to the outside through the API.
Specifically, the audit log method provided in this embodiment may be applied to an application environment as shown in fig. 1, and specifically in a framework of the application environment, the method may include:
audio Client: the client component is introduced into the application program and is mainly used for setting a transmission mode of the audit information. A Collector: and the collector component is mainly used for processing Audit log information sent from an external system and then converting the information into a format processed inside the Audit Server so as to support subsequent functions of storage, analysis, display and the like. Storage: and the storage component is mainly used for storing the information processed by the processing collector into a storage medium. Restful Api: and the API component is mainly used for providing an external access interface, such as the use frequency of statistical operation and the like. Web UI: and the UI component is used for realizing upper-layer application based on the API component, and a user can conveniently inquire and analyze the audit log through the UI component. StorageMedium: the storage medium component is mainly used for storing audit log records and providing two modes of Database and ES for storage.
With reference to the schematic diagram of the data flow direction in the audit log method shown in fig. 2, in this embodiment, first, an audit log request is obtained. And then, recording audit information of specified operation after the application service is started according to the audit log request. In particular, an audio Client (Client component) resides in the application (transparent to the user) and after normal startup of the application service, records Audit information for specified operations. Then, the data is transmitted by, for example: HTTP or MQ, etc. to the Collector component (Collector) of the audit server. And finally, receiving the audit information through a collector of the audit server, and storing the audit information into a storage component of the audit server. Specifically, the audit server stores the audit log information, and the audit log information can be stored in different storage devices according to needs and is externally queried by an API. The API component is mainly used to provide an external access interface, such as the frequency of usage of statistical operations. It will be appreciated that the audit log may also be conveniently queried and analyzed by a user through an upper layer application implemented based on an API component, such as a UI component.
In the embodiment, by obtaining an audit log request, recording audit information of specified operation after application service is started according to the audit log request, sending the collected audit information to a collector of an audit server, receiving the audit information through the collector of the audit server, storing the audit information into a storage component of the audit server, and providing inquiry of the audit log through an API (application programming interface). the embodiment provides technical schemes of the audit log based on the definition of the audit log, and can record information such as calling increased ID of requested operation, called service name, called class name and method name, request parameters, execution time, execution duration, client IP (Internet protocol) and return results (including success or failure).
In embodiments, as shown in fig. 4, audit log methods are provided, in which the step of recording audit information of a specified operation after the application service is started according to an audit log request further includes:
step 402, providing an annotation class, wherein the annotation class can be used on a class or a method;
step 404, performing AOP on the class or method using the annotation class;
necessary audit information is extracted during AOP processing, step 406.
In this embodiment, a specific process of recording audit information of a specified operation in an audit log method specifically includes:
first, an annotation class @ audio is provided, which may be used on a class or method.
Next, AOP (aspect ordered Programming) processing is performed on the class or method using the annotation class.
Finally, necessary audit information is extracted in the AOP.
In the embodiment, the audit information of the specified operation is recorded through the steps.
In embodiments, as shown in FIG. 5, there are provided audit log methods wherein the steps of receiving audit information by a collector of an audit server and storing the audit information in a storage component of the audit server include:
step 502, receiving audit information through a collector of an audit server;
step 504, converting the audit information into a format for internal processing of the audit server so as to support subsequent storage, analysis and display;
step 506, storing the information processed by the audit collector into a storage medium component, wherein the storage medium component provides Database and ES mode storage.
In this embodiment, the collector component processes the Audit log information sent from the external system, and then converts the information into a format processed inside the audio Server, so as to support subsequent functions of storage, analysis, presentation, and the like. Meanwhile, the information processed by the processing collector is stored in a storage medium through a storage component, and particularly, the storage medium component is mainly used for storing audit log records and providing data base and ES storage.
In embodiments, as shown in FIG. 6, audit log methods are provided in which sending collected audit information to a collector of an audit server further comprises:
step 602, setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and step 604, sending the audit information to a collector of the audit server according to the set transmission mode.
In this embodiment, the transmission mode of the audit information is set by the client component introduced in the application program, and specific transmission methods include HTTP (hypertext transfer protocol) and MQ (message queue). Then, the data is sent to the collector component of the auditing server through a set transmission mode such as HTTP or MQ, so that the efficient transmission of the auditing information is realized.
It should be understood that although the various steps in the flow charts of fig. 3-6 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in the order indicated by the arrows, unless explicitly stated herein, the steps may be performed in other sequences without strict order limitations, and further, at least the portion of the steps in fig. 3-6 may include multiple sub-steps or stages that are not necessarily performed at the same time , but may be performed at different times, the order of performance of the sub-steps or stages may not necessarily be performed in sequence, but may be rotated or alternated with at least portions of other steps or sub-steps of other steps.
In embodiments, as shown in FIG. 7, there are provided audit log arrangements 700 including:
an obtaining module 701, configured to obtain an audit log request;
a recording module 702, configured to record, after the application service is started according to the audit log request, audit information of a specified operation;
a sending module 703, configured to send the collected audit information to a collector of the audit server;
the receiving and storing module 704 is used for receiving the audit information through the collector of the audit server and storing the audit information into a storage component of the audit server;
and the query module 705 is configured to provide query of the audit log to the outside through an API.
In embodiments, the recording module 702 is further configured to:
providing annotation classes, wherein the annotation classes can be used on classes or methods;
performing AOP processing on the classes or methods using the annotation class;
necessary audit information is extracted during AOP processing.
In embodiments, the receive storage module 704 is further configured to:
receiving audit information through a collector of an audit server;
converting the audit information into a format processed inside an audit server to support subsequent storage, analysis and display;
and storing the information processed by the audit collector into a storage medium assembly, wherein the storage medium assembly provides data base and ES mode storage.
In embodiments, the sending module 703 is further configured to:
setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and sending the audit information to a collector of the audit server according to the set transmission mode.
For the specific definition of the audit log device, reference may be made to the above definition of the audit log method, which is not described herein again.
In embodiments, there are computer devices whose internal structure diagrams can be as shown in FIG. 8, the computer devices include a processor, a memory, and a network interface connected by a system bus, wherein the processor of the computer device is used to provide computing and control capabilities.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In embodiments, computer devices are provided, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method embodiments when executing the computer program.
In embodiments, computer readable storage media are provided, on which a computer program is stored, which when executed by a processor implements the steps in the above respective method embodiments.
It will be understood by those of ordinary skill in the art that all or a portion of the processes of the methods of the embodiments described above may be implemented by a computer program that may be stored in a non-volatile computer-readable storage medium, which when executed, may include the processes of the embodiments of the methods described above, wherein any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1, an audit log method, characterized in that the method comprises:
obtaining an audit log request;
recording audit information of specified operation after the application service is started according to the audit log request;
sending the collected audit information to a collector of an audit server;
receiving the audit information through a collector of the audit server, and storing the audit information into a storage component of the audit server;
and providing the inquiry of the audit log through the API.
2. The audit log method of claim 1, wherein the step of recording audit information for a specified operation after application service initiation according to the audit log request further comprises:
providing an annotation class, wherein the annotation class is usable on a class or a method;
performing AOP on the class or the method using the annotation class;
necessary audit information is extracted during the AOP process.
3. The audit log method of claim 1, wherein the step of receiving the audit information by a collector of the audit server and storing the audit information in a storage component of the audit server comprises:
receiving, by a collector of the audit server, the audit information;
converting the audit information into a format processed inside an audit server to support subsequent storage, analysis and display;
and storing the information processed by the audit collector into a storage medium component, wherein the storage medium component provides Database and ES mode storage.
4. The audit log method of any of claims 1-3, wherein the step of sending the collected audit information to a collector of an audit server further comprises:
setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and sending the audit information to a collector of the audit server according to the set transmission mode.
An audit log apparatus of the kind , said apparatus comprising:
the acquisition module is used for acquiring an audit log request;
the recording module is used for recording audit information of specified operation after the application service is started according to the audit log request;
the sending module is used for sending the collected audit information to a collector of an audit server;
the receiving and storing module is used for receiving the audit information through a collector of the audit server and storing the audit information into a storage component of the audit server;
and the query module is used for querying externally provided audit logs through an API.
6. The audit log apparatus of claim 5, wherein the logging module is further to:
providing an annotation class, wherein the annotation class is usable on a class or a method;
performing AOP on the class or the method using the annotation class;
necessary audit information is extracted during the AOP process.
7. The audit log apparatus of claim 5, wherein the receive storage module is further to:
receiving, by a collector of the audit server, the audit information;
converting the audit information into a format processed inside an audit server to support subsequent storage, analysis and display;
and storing the information processed by the audit collector into a storage medium component, wherein the storage medium component provides Database and ES mode storage.
8. The audit log apparatus of of any of claims 5-7, wherein the sending module is further to:
setting a transmission mode of audit information through a client component, wherein the transmission mode comprises HTTP and MQ;
and sending the audit information to a collector of the audit server according to the set transmission mode.
Computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when executing the computer program.
10, computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of claims 1 to 4, wherein is defined.
CN201911015531.7A 2019-10-24 2019-10-24 Audit log method, device, computer equipment and storage medium Pending CN110737639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911015531.7A CN110737639A (en) 2019-10-24 2019-10-24 Audit log method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911015531.7A CN110737639A (en) 2019-10-24 2019-10-24 Audit log method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110737639A true CN110737639A (en) 2020-01-31

Family

ID=69271177

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911015531.7A Pending CN110737639A (en) 2019-10-24 2019-10-24 Audit log method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110737639A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666205A (en) * 2020-04-24 2020-09-15 杭州传化智能制造科技有限公司 Data auditing method, system, computer equipment and storage medium
CN111984743A (en) * 2020-07-31 2020-11-24 招联消费金融有限公司 Audit service data display method and device, computer equipment and storage medium
CN112181773A (en) * 2020-09-29 2021-01-05 银盛支付服务股份有限公司 Method for automatically collecting module logs
CN112202835A (en) * 2020-09-03 2021-01-08 北京金山云网络技术有限公司 Processing method and system for cloud computing operation audit information
CN112434054A (en) * 2020-12-09 2021-03-02 杭州海量存储技术有限公司 Audit log updating method and device
CN112699411A (en) * 2021-01-04 2021-04-23 北京金山云网络技术有限公司 Method and device for storing operation audit information and computer readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338260A (en) * 2013-07-04 2013-10-02 武汉世纪金桥安全技术有限公司 Distributed analytical system and analytical method for URL logs in network auditing
CN103559118A (en) * 2013-10-12 2014-02-05 福建亿榕信息技术有限公司 Security auditing method based on aspect oriented programming (AOP) and annotation information system
CN108763957A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of safety auditing system of database, method and server
CN109325044A (en) * 2018-09-20 2019-02-12 快云信息科技有限公司 A kind of the audit log processing method and relevant apparatus of database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103338260A (en) * 2013-07-04 2013-10-02 武汉世纪金桥安全技术有限公司 Distributed analytical system and analytical method for URL logs in network auditing
CN103559118A (en) * 2013-10-12 2014-02-05 福建亿榕信息技术有限公司 Security auditing method based on aspect oriented programming (AOP) and annotation information system
CN108763957A (en) * 2018-05-29 2018-11-06 电子科技大学 A kind of safety auditing system of database, method and server
CN109325044A (en) * 2018-09-20 2019-02-12 快云信息科技有限公司 A kind of the audit log processing method and relevant apparatus of database

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111666205A (en) * 2020-04-24 2020-09-15 杭州传化智能制造科技有限公司 Data auditing method, system, computer equipment and storage medium
CN111984743A (en) * 2020-07-31 2020-11-24 招联消费金融有限公司 Audit service data display method and device, computer equipment and storage medium
CN111984743B (en) * 2020-07-31 2024-02-02 招联消费金融有限公司 Audit business data display method, audit business data display device, audit business data display computer equipment and audit business data storage medium
CN112202835A (en) * 2020-09-03 2021-01-08 北京金山云网络技术有限公司 Processing method and system for cloud computing operation audit information
CN112202835B (en) * 2020-09-03 2023-03-17 北京金山云网络技术有限公司 Processing method and system for cloud computing operation audit information
CN112181773A (en) * 2020-09-29 2021-01-05 银盛支付服务股份有限公司 Method for automatically collecting module logs
CN112434054A (en) * 2020-12-09 2021-03-02 杭州海量存储技术有限公司 Audit log updating method and device
CN112699411A (en) * 2021-01-04 2021-04-23 北京金山云网络技术有限公司 Method and device for storing operation audit information and computer readable storage medium
CN112699411B (en) * 2021-01-04 2024-04-09 北京金山云网络技术有限公司 Method and device for storing operation audit information and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN110737639A (en) Audit log method, device, computer equipment and storage medium
US10122575B2 (en) Log collection, structuring and processing
US10891552B1 (en) Automatic parser selection and usage
US9646088B1 (en) Data collection and transmission
US8862537B1 (en) Selective structure preserving obfuscation
CA2629279C (en) Log collection, structuring and processing
US9930098B2 (en) Method and system for ISP network performance monitoring and fault detection
US9876813B2 (en) System and method for web-based log analysis
US7913233B2 (en) Performance analyzer
US10621209B1 (en) Automatic parser generation
CN111522703B (en) Method, apparatus and computer program product for monitoring access requests
US8661456B2 (en) Extendable event processing through services
US10915510B2 (en) Method and apparatus of collecting and reporting database application incompatibilities
US10775751B2 (en) Automatic generation of regular expression based on log line data
US8745010B2 (en) Data storage and archiving spanning multiple data storage systems
US20150120903A1 (en) System for monitoring XMPP-based communication services
US20170223136A1 (en) Any Web Page Reporting and Capture
JP2007200047A (en) Access log-displaying system and method
US8825843B2 (en) System and methods for monitoring a geographic information system
US20240070037A1 (en) Multi-Computer System for Maintaining Application Programming Interface Stability with Shared Computing Infrastructure
Chainourov Log Analysis Using Splunk Hadoop Connect
WO2019220480A1 (en) Monitoring device, monitoring method, and program
JP2008305289A (en) Application finding method
US10846149B1 (en) Event context service
CN114760218A (en) Link sampling method and related device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination