CN110750410A - Method and device for monitoring database logs - Google Patents

Method and device for monitoring database logs Download PDF

Info

Publication number
CN110750410A
CN110750410A CN201810820483.8A CN201810820483A CN110750410A CN 110750410 A CN110750410 A CN 110750410A CN 201810820483 A CN201810820483 A CN 201810820483A CN 110750410 A CN110750410 A CN 110750410A
Authority
CN
China
Prior art keywords
log
slave
slave library
library
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810820483.8A
Other languages
Chinese (zh)
Other versions
CN110750410B (en
Inventor
刘诏
杨丽敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201810820483.8A priority Critical patent/CN110750410B/en
Publication of CN110750410A publication Critical patent/CN110750410A/en
Application granted granted Critical
Publication of CN110750410B publication Critical patent/CN110750410B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a method and a device for monitoring database logs, and relates to the technical field of computers. One embodiment of the method comprises: determining an information fingerprint according to a log newly generated by a first slave library; according to the information fingerprint, determining the position of a log which is newly generated by the first slave library and corresponds to the second slave library; and monitoring logs of a second slave library from the position. The embodiment overcomes the technical defects of low efficiency and incapability of seamless monitoring in switching and monitoring the logs of the slave database in the prior art, and further achieves the beneficial effects of seamless monitoring of the database and improvement of monitoring efficiency in switching and monitoring the slave database.

Description

Method and device for monitoring database logs
Technical Field
The invention relates to the technical field of computers, in particular to a method and a device for monitoring database logs.
Background
When a log of a slave library in a database is monitored in the prior art, if the slave library is down, log files of a monitoring part are often loaded, and repeated monitoring is performed after a slave database is switched, so that the technical effect of not losing messages is achieved.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
1. repeatedly monitoring the log files of the loading part, which causes the technical defect of low efficiency;
2. the seamless monitoring can not be realized, and the technical defects of repeated messages can be generated.
Disclosure of Invention
In view of this, the embodiment of the present invention provides a method for monitoring database logs, which can overcome the technical defects that the efficiency is low and seamless monitoring cannot be performed when the logs of the slave database are switched and monitored in the prior art, thereby achieving the beneficial effects of seamlessly monitoring the database and improving the efficiency of switching and monitoring the slave database.
To achieve the above object, according to an aspect of an embodiment of the present invention, there is provided a method for listening to a database log, including:
determining an information fingerprint according to a log newly generated by a first slave library;
according to the information fingerprint, determining the position of a log which is newly generated by the first slave library and corresponds to the second slave library;
and monitoring logs of a second slave library from the position.
Optionally, the information fingerprint is a group of words extracted from the log, or extracted from the log
And the weight of each word is determined by an extraction algorithm.
Optionally, the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
Optionally, determining, according to the information fingerprint and according to the information fingerprint, that the log newly generated by the first slave library corresponds to a location in a second slave library, includes:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
According to another aspect of the embodiments of the present invention, there is provided an apparatus for listening to a database log, including:
the fingerprint determining module is used for determining an information fingerprint according to the log which is generated newly from the first slave library;
the position determining module is used for determining the position of the latest generated log of the first slave library corresponding to the second slave library according to the information fingerprint;
and the monitoring module is used for monitoring the log of the second slave library from the position.
Optionally, the information fingerprint is determined by an extraction algorithm from a group of words extracted from the log, or from a group of words extracted from the log and a weight of each word.
Optionally, the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
Optionally, determining, according to the information fingerprint, that the log newly generated by the first slave library corresponds to a location in a second slave library, includes:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
According to another aspect of the embodiments of the present invention, there is provided an electronic device for listening to a database log, including:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of listening for database logs of the present invention.
According to another aspect of embodiments of the present invention, there is provided a computer readable medium, on which a computer program is stored, which when executed by a processor, implements the method of listening for database logs of the present invention.
One embodiment of the above invention has the following advantages or benefits:
according to the method and the device, the information fingerprint is utilized to determine the position, corresponding to the newly generated log, of the second slave library and the first slave library, so that the technical means of continuing monitoring the log after the matched position is facilitated, the technical defect that seamless monitoring cannot be carried out when the monitored slave database is switched in the prior art is overcome, and the advantages that repeated log monitoring is not needed, and the efficiency of switching and monitoring the slave database is improved are achieved.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
FIG. 1 is a schematic diagram of a main flow of a method of listening for database logs according to an embodiment of the invention;
FIG. 2 is a diagram of a particular embodiment of a method of listening for database logs, according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of the main modules of an apparatus listening for database logs according to an embodiment of the present invention;
FIG. 4 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 5 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram of a main flow of a method of listening to a database log according to an embodiment of the present invention, as shown in fig. 1,
step S101, determining an information fingerprint according to a log which is newly generated from a first slave library;
step S102, according to the information fingerprint, determining the position of a log which is newly generated by the first slave library and corresponds to a second slave library;
and step S103, monitoring the log of the second slave library from the position.
In the relational database, a master-slave multi-slave mode is implemented, namely a master library and a plurality of slave databases (called slave libraries for short), and a master-slave copy and incremental recovery inside the relational database are recorded by relying on logs between the master and the slave. The logs are stored and copied in strict sequence, and if the sequence is wrong, the data recorded by the logs can be inconsistent. However, the position (position) of the log at different times in each slave database is self-increment, so that the log with the same content cannot be directly found according to the position in different slave databases.
The invention aims to: when the original slave database cannot be monitored continuously, the logs of other slave databases are monitored seamlessly, so that the technical defects that the efficiency is low and the seamless monitoring cannot be realized when the logs of the databases are monitored in the prior art are overcome.
The first slave database refers to a slave database which is originally monitored in the relational database;
the second slave database refers to a slave database or a master database except the slave database which is originally listened to.
The information fingerprint is characteristic information extracted from the first log generated from the library latest, and can represent the latest log but cannot represent other logs. After the log of the second slave library is matched with the information fingerprint, the position of the log can be determined, and the subsequent monitoring of the log behind the position of the second slave library is facilitated.
According to the method and the device, the technical means that the position of the newly generated log of the first slave library corresponding to the position of the second slave library is determined by using the information fingerprint is adopted, the technical effect that the log can be monitored continuously after the matched position is achieved conveniently, and the technical defect that seamless monitoring cannot be achieved due to the fact that repeated logs need to be obtained when the log is monitored by the database in the prior art is overcome. The invention can achieve the technical effect of seamless monitoring without repeatedly monitoring logs, thereby achieving the beneficial effect of improving the efficiency of switching and monitoring the slave database.
Optionally, the information fingerprint is determined by an extraction algorithm from a group of words extracted from the log, or from a group of words extracted from the log and a weight of each word.
Due to the invariance of the logs, the characteristic information of the logs can be extracted to facilitate the identification of the logs corresponding to the logs generated latest by the first slave library in the second slave library. By extracting the information fingerprint from the latest log in the first slave library, the corresponding log can be inquired in the second slave library only by using the information fingerprint, the technical defect that a large number of repeated logs need to be monitored again in the prior art is overcome, and the technical effects of saving the inquiry cost and improving the inquiry efficiency are achieved.
Optionally, the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
The consistency of the generated information fingerprint can be ensured by employing MD5(Message Digest Algorithm 5), Sha1 Algorithm (Secure Hash Algorithm), or bloom filter Algorithm.
Optionally, determining, according to the information fingerprint, that the log newly generated by the first slave library corresponds to a location in a second slave library, includes:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
The same logs are different in position in different slave databases, so that when the fingerprint information is positioned in the second slave database, the logs corresponding to the logs newly generated in the first slave database are determined in the second slave database according to the comparison of the generated information fingerprints one by one, and then the matched position is determined in the second slave database, so that the technical effect of accurate positioning is achieved. Since the position of the matching log is determined in the second slave library, monitoring can be started from the log behind the matching position, and the technical effect of seamless monitoring is achieved.
The method is described in detail below with reference to a specific example.
Fig. 2 is a schematic diagram of a specific embodiment of a method for listening to a database log according to an embodiment of the present invention. As shown in fig. 2, it is assumed that a server sending a short message when a bank withdraws money needs to monitor a binary log (binlog) of a MySQL database to determine the sending of the short message. In the figure, slave 1, slave 2, slave 3 and slave 4 represent four slave banks. The server may first masquerade as a binary log listening from 5 to 4. But when slave 4 crashes suddenly, the server has to listen to the binary logs of the other slave or master libraries. In the present embodiment, it is assumed that the switch is to listen to the binary log from 2. As shown in FIG. 2, each slave library represents the same "Update set row 1" of the binary log; and the position (position) of each slave library when expressing the same binary log is different, and the data in the database can be rewritten at each moment. Therefore, the information fingerprint can be determined by using the binary log which is acquired newly in the server, and then the log corresponding to the information fingerprint is inquired from the step 2, so that the position of the log corresponding to the information fingerprint is determined. And after the corresponding position in the slave 2 is determined, monitoring the subsequent binary log from the position continuously, thereby achieving the technical effect of seamless monitoring. The method for extracting information fingerprints used in this embodiment is MD5, and the language for implementing the code is Java. The specific codes are as follows:
MessageDigest md5=MessageDigest.getInstance("MD5");
byte[]bytes=md5.digest(binlog.getBytes());
the above codes can be understood as: messagedigest is a class in Java; messagedigest. getinstance ("MD5"), which is an example of obtaining the MD5 algorithm, can be considered to create a tool; in md5.digest (binlog. getbytes ()), binlog. getbytes () is a binary log of mysql changes. And processing the binary log by the created tool to obtain the information fingerprint.
According to still another aspect of the embodiments of the present invention, there is provided an apparatus 300 for listening to a database log, including:
the module 301 and the fingerprint determining module are used for determining an information fingerprint according to a log which is generated newly by a first slave library;
the module 302 and the position determining module are configured to determine, according to the information fingerprint, a position in a second slave repository corresponding to a newly generated log of the first slave repository;
module 303, a monitoring module, configured to monitor a log of a second slave library from the location.
Optionally, the information fingerprint is determined by an extraction algorithm from a group of words extracted from the log, or from a group of words extracted from the log and a weight of each word.
Optionally, the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
Optionally, determining, according to the information fingerprint, that the log newly generated by the first slave library corresponds to a location in a second slave library, includes:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
Fig. 4 illustrates an exemplary system architecture 400 of a method of listening for database logs or an apparatus listening for database logs to which embodiments of the present invention may be applied.
As shown in fig. 4, the system architecture 400 may include terminal devices 401, 402, 403, a network 404, and a server 405 (this architecture is merely an example, and the components included in a particular architecture may be adapted according to application specific circumstances). The network 404 serves as a medium for providing communication links between the terminal devices 401, 402, 403 and the server 405. Network 404 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use terminal devices 401, 402, 403 to interact with a server 405 over a network 404 to receive or send messages or the like. The terminal devices 401, 402, 403 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 401, 402, 403 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 405 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 401, 402, 403. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the method for listening to the database log provided by the embodiment of the present invention is generally performed by the server 405, and accordingly, the apparatus for listening to the database log is generally disposed in the server 405.
It should be understood that the number of terminal devices, networks, and servers in fig. 4 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 5, shown is a block diagram of a computer system 500 suitable for use with a terminal device implementing an embodiment of the present invention. The terminal device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a sending module, an obtaining module, a determining module, and a first processing module. The names of these modules do not form a limitation on the modules themselves in some cases, and for example, the sending module may also be described as a "module sending a picture acquisition request to a connected server".
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to comprise:
determining an information fingerprint according to a log newly generated by a first slave library;
according to the information fingerprint, determining the position of a log which is newly generated by the first slave library and corresponds to the second slave library;
and monitoring logs of a second slave library from the position.
According to the technical scheme of the embodiment of the invention, the following beneficial effects can be achieved:
the invention determines the position corresponding to the latest generated log in the second slave library and the first slave library by utilizing the information fingerprint, is convenient for the technical means of continuing monitoring after the matched position, overcomes the technical defect that the prior art can not carry out seamless monitoring, and achieves the beneficial effects of not needing to repeatedly monitor the log, not generating repeated messages and improving the efficiency of switching and monitoring the slave databases.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method of listening to database logs, comprising:
determining an information fingerprint according to a log newly generated by a first slave library;
according to the information fingerprint, determining the position of a log which is newly generated by the first slave library and corresponds to the second slave library;
and monitoring logs of a second slave library from the position.
2. The method of claim 1, wherein the information fingerprint is determined by an extraction algorithm from a set of words extracted from the log or a set of words extracted from the log and a weight of each word.
3. The method of claim 2, wherein the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
4. The method of any of claims 1-3, wherein determining that the most recently generated log of the first slave repository corresponds to a location in a second slave repository based on the information fingerprint comprises:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
5. An apparatus for listening to database logs, comprising:
the fingerprint determining module is used for determining an information fingerprint according to the log which is generated newly from the first slave library;
the position determining module is used for determining the position of the latest generated log of the first slave library corresponding to the second slave library according to the information fingerprint;
and the monitoring module is used for monitoring the log of the second slave library from the position.
6. The apparatus of claim 5, wherein the information fingerprint is determined by an extraction algorithm from a set of words extracted from the log or a set of words extracted from the log and a weight of each word.
7. The apparatus of claim 6, wherein the algorithm comprises: MD5, Sha1 algorithm, or bloom filter algorithm.
8. The apparatus of any of claims 5-7, wherein determining that the most recently generated log of the first slave repository corresponds to a location in a second slave repository based on the information fingerprint comprises:
acquiring a log in a second slave library;
comparing the logs in the second slave library with the information fingerprints one by one;
and when determining that one log in the second slave library is matched with the information fingerprint, determining the position corresponding to the log in the second slave library as the position corresponding to the log newly generated by the first slave library in the second slave library.
9. A listening database log apparatus, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-4.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-4.
CN201810820483.8A 2018-07-24 2018-07-24 Method and device for monitoring database logs Active CN110750410B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810820483.8A CN110750410B (en) 2018-07-24 2018-07-24 Method and device for monitoring database logs

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810820483.8A CN110750410B (en) 2018-07-24 2018-07-24 Method and device for monitoring database logs

Publications (2)

Publication Number Publication Date
CN110750410A true CN110750410A (en) 2020-02-04
CN110750410B CN110750410B (en) 2024-04-12

Family

ID=69275389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810820483.8A Active CN110750410B (en) 2018-07-24 2018-07-24 Method and device for monitoring database logs

Country Status (1)

Country Link
CN (1) CN110750410B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020243A (en) * 2012-12-18 2013-04-03 新浪网技术(中国)有限公司 Method and device for master-slave replication structure replacement of database
CN104951474A (en) * 2014-03-31 2015-09-30 阿里巴巴集团控股有限公司 Method and device for acquiring MySQL binlog incremental logs
US20150310044A1 (en) * 2014-02-03 2015-10-29 Codefutures Corporation Database device and processing of data in a database
CN105760552A (en) * 2016-03-25 2016-07-13 北京奇虎科技有限公司 Data management method and device
CN106021593A (en) * 2016-06-07 2016-10-12 浪潮电子信息产业股份有限公司 Copying processing method in take-over process of first database and second database
CN107016014A (en) * 2016-09-30 2017-08-04 阿里巴巴集团控股有限公司 The method of data synchronization and device of heterogeneous database
CN107122426A (en) * 2017-04-11 2017-09-01 上海众开信息科技有限公司 The monitoring acquisition methods and device of Operation Log information based on database
CN107291926A (en) * 2017-06-29 2017-10-24 搜易贷(北京)金融信息服务有限公司 A kind of binlog analysis methods
CN107958010A (en) * 2016-10-18 2018-04-24 北京京东尚科信息技术有限公司 Method and system for online data migration

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103020243A (en) * 2012-12-18 2013-04-03 新浪网技术(中国)有限公司 Method and device for master-slave replication structure replacement of database
US20150310044A1 (en) * 2014-02-03 2015-10-29 Codefutures Corporation Database device and processing of data in a database
CN104951474A (en) * 2014-03-31 2015-09-30 阿里巴巴集团控股有限公司 Method and device for acquiring MySQL binlog incremental logs
CN105760552A (en) * 2016-03-25 2016-07-13 北京奇虎科技有限公司 Data management method and device
CN106021593A (en) * 2016-06-07 2016-10-12 浪潮电子信息产业股份有限公司 Copying processing method in take-over process of first database and second database
CN107016014A (en) * 2016-09-30 2017-08-04 阿里巴巴集团控股有限公司 The method of data synchronization and device of heterogeneous database
CN107958010A (en) * 2016-10-18 2018-04-24 北京京东尚科信息技术有限公司 Method and system for online data migration
CN107122426A (en) * 2017-04-11 2017-09-01 上海众开信息科技有限公司 The monitoring acquisition methods and device of Operation Log information based on database
CN107291926A (en) * 2017-06-29 2017-10-24 搜易贷(北京)金融信息服务有限公司 A kind of binlog analysis methods

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郑萌: "基于Zabbix的云监控系统的设计与实现", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》, pages 140 - 1317 *

Also Published As

Publication number Publication date
CN110750410B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
CN110262807B (en) Cluster creation progress log acquisition system, method and device
CN108846753B (en) Method and apparatus for processing data
CN109657174B (en) Method and device for updating data
CN110795315A (en) Method and device for monitoring service
CN107844488B (en) Data query method and device
CN110909022A (en) Data query method and device
CN111338834B (en) Data storage method and device
CN112597126A (en) Data migration method and device
CN112948498A (en) Method and device for generating global identification of distributed system
CN112148705A (en) Data migration method and device
CN112100168A (en) Method and device for determining data association relationship
CN111723063A (en) Method and device for processing offline log data
CN114912111A (en) Cloud host virus detection method, device and system
CN113347052B (en) Method and device for counting user access data through access log
CN110750410B (en) Method and device for monitoring database logs
CN114116675A (en) Data archiving method and device
CN109087097B (en) Method and device for updating same identifier of chain code
CN110647623B (en) Method and device for updating information
CN110019445B (en) Data synchronization method and device, computing equipment and storage medium
CN109657481B (en) Data management method and device
CN113760861A (en) Data migration method and device
CN112835609A (en) Method and device for modifying dependent package download address
CN113760860B (en) Data reading method and device
CN113268488B (en) Method and device for data persistence
CN113535478B (en) Data backup method and device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant