CN111680010A - Log system design method suitable for JavaEE application server - Google Patents

Log system design method suitable for JavaEE application server Download PDF

Info

Publication number
CN111680010A
CN111680010A CN202010815166.4A CN202010815166A CN111680010A CN 111680010 A CN111680010 A CN 111680010A CN 202010815166 A CN202010815166 A CN 202010815166A CN 111680010 A CN111680010 A CN 111680010A
Authority
CN
China
Prior art keywords
log
information
application server
database
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010815166.4A
Other languages
Chinese (zh)
Other versions
CN111680010B (en
Inventor
黄锋
李蕾
于洋
王鹏亮
蒋平川
李利军
于滨峰
张春林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dongfangtong Software Co ltd
Beijing Tongtech Co Ltd
Original Assignee
Beijing Dongfangtong Software Co ltd
Beijing Tongtech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dongfangtong Software Co ltd, Beijing Tongtech Co Ltd filed Critical Beijing Dongfangtong Software Co ltd
Priority to CN202010815166.4A priority Critical patent/CN111680010B/en
Priority to CN202011316653.2A priority patent/CN112650716B/en
Publication of CN111680010A publication Critical patent/CN111680010A/en
Application granted granted Critical
Publication of CN111680010B publication Critical patent/CN111680010B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a design method of a log system suitable for a JavaEE application server, which comprises the following steps: s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server; s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker; s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database. The invention is adopted to construct the log system suitable for the JavaEE application server, can ensure the integrity of the log information recorded in the log system and provides a good basis for the effective use of the log information.

Description

Log system design method suitable for JavaEE application server
Technical Field
The invention relates to the technical field of design of a log system of a JavaEE application server, in particular to a design method of the log system suitable for the JavaEE application server.
Background
The JavaEE application server is a set of technical framework different from the traditional application development, comprises a plurality of components, and mainly can simplify and standardize the development and deployment of an application system so as to improve the portability, the safety and the reuse value. The JavaEE application server is an open source code Java application server, the core of the Java application server is a group of technical specifications and guidelines, and various components, service architectures and technical layers contained in the Java application server have common standards and specifications, so that various different platforms following the JavaEE application server architecture have good compatibility, and the dilemma that the information products used by the back end of an enterprise cannot be compatible with each other in the past, so that the internal or external of the enterprise is difficult to communicate with each other is solved. The APPLICATION SERVERs supporting JavaEE APPLICATION SERVER include IBMWEBSPHERE APPLICATION SERVER, BEA WEBLOGIC SERVER, JBOSS, ORACLE APPLICATION SERVER, SUN ONE APPLICATION SERVER, etc.
The log system of the application server is very important, can record the user use and the response condition of the application server, and can provide useful information such as trace tracing clues and perfect references of the application server. However, the log system of the existing JavaEE application server is fragile, and the recorded information is lost or deleted, so that the content of the log information is incomplete.
Disclosure of Invention
In order to solve the technical problem, the invention provides a design method of a log system suitable for a JavaEE application server, wherein the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
Optionally, the operation log information includes a client IP address, an access time, a visited web page, an HTTP code, a user agent, and a reference address.
Optionally, in step S100, after the access tracker is triggered by the user access, the access tracker records the client IP address and the access time of the user, calculates the access duration by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the visited web page, the HTTP code, the user agent, and the reference address, stops timing with the timer after the user quits the access, records the access duration, and then combines the recorded information and the extracted information to generate an operation log information.
Optionally, the access tracker classifies access operations according to the operation log information, the types of the access operations at least include a browsing class, a deep-query class, an error class and a referral class, and the log database is divided into a plurality of log sub-databases corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
Optionally, the method further includes step S400, in which the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
Optionally, the backup database and the log database are provided with an access right module, and the access right module adopts a Shiro security framework to provide user authentication and/or authorization verification; the user who passes the user authentication and/or authorization verification can call, view or apply the operation log information stored in the backup database and/or the log database;
the working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
Optionally, the access tracker extracts the operation log information in the following manner:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
Optionally, the log system is provided with an application analysis module, and the application analysis module can at least provide the following application analysis:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
Optionally, the specific steps of recommending the preference matching information are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
Figure 987194DEST_PATH_IMAGE001
in the above formula, the first and second carbon atoms are,
Figure 232231DEST_PATH_IMAGE002
representing the similarity between the ith item of information to be recommended and the user preference information;
Figure 526815DEST_PATH_IMAGE003
representing user preference information;
Figure 781079DEST_PATH_IMAGE004
representing the ith item of information to be recommended;
Figure 142921DEST_PATH_IMAGE005
representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;
Figure 699804DEST_PATH_IMAGE006
is shown as
Figure 763575DEST_PATH_IMAGE007
Frequency of occurrence of individual common words in the preference information;
Figure 73727DEST_PATH_IMAGE008
is shown as
Figure 539344DEST_PATH_IMAGE007
The frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
Optionally, the log system is provided with a statistics output module, the statistics output module is configured to perform statistics on the operation log information according to a set condition and output a statistical result, and the process includes:
coordinates are first established in the log database, and two data points are arbitrarily selected
Figure 267128DEST_PATH_IMAGE009
And
Figure 568928DEST_PATH_IMAGE010
then, the following algorithm is adopted to search each piece of operation log information in the log database:
Figure 164994DEST_PATH_IMAGE011
in the above formula, the first and second carbon atoms are,
Figure 734384DEST_PATH_IMAGE012
representing a search algorithm heuristic function;
Figure 633070DEST_PATH_IMAGE013
representing an arbitrary point in the search;
Figure 733750DEST_PATH_IMAGE014
to represent
Figure 556344DEST_PATH_IMAGE013
The abscissa of the point;
Figure 668657DEST_PATH_IMAGE015
to represent
Figure 862877DEST_PATH_IMAGE013
The ordinate of the point;
Figure 906313DEST_PATH_IMAGE016
to represent
Figure 453969DEST_PATH_IMAGE009
The abscissa of the point;
Figure 748684DEST_PATH_IMAGE017
to represent
Figure 130118DEST_PATH_IMAGE009
The ordinate of the point;
Figure 549598DEST_PATH_IMAGE018
to represent
Figure 228841DEST_PATH_IMAGE010
The abscissa of the point;
Figure 689647DEST_PATH_IMAGE019
to represent
Figure 101037DEST_PATH_IMAGE020
The ordinate of the point;
then extracting
Figure 335709DEST_PATH_IMAGE013
Comparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of an embodiment of a method for designing a log system suitable for a JavaEE application server in the embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, an embodiment of the present invention provides a method for designing a log system suitable for a JavaEE application server, where the design of the log system includes the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
The working principle and the beneficial effects of the technical scheme are as follows: the invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information. According to the scheme, the access tracker is arranged in the log system, the access tracker is used for tracking the operation of the user in real time, the access condition related to the log is recorded, and the real-time performance and the reliability of the log are enhanced.
In one embodiment, the oplog information includes a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
The working principle and the beneficial effects of the technical scheme are as follows: the range of the operation log information of the JavaEE application server is scientifically defined, so that the operation log information covers the user related information and the access condition, but does not relate to the personal privacy of the user or other information needing to be kept secret, and the operation log information meets the requirements of related laws and regulations and is easy to realize technically.
In one embodiment, in step S100, the access tracker records the client IP address and the access time of the user after being triggered by the user access, calculates the access time length by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the accessed web page, the HTTP code, the user agent, and the reference address, stops timing by the timer after the user exits from the access, records the access time length, and then combines the recorded information and the extracted information to generate an operation log information.
The working principle and the beneficial effects of the technical scheme are as follows: the scheme carries out detailed design on the generation of the operation log information, adopts an access triggering mode, follows up the access process of the user by the access tracker, extracts and records the related operation log information content during the follow-up, integrates all the information, and generates and stores the once-access operation log information of the user after the access is finished. By adopting the follow-up recording mode, the access condition of the user can be comprehensively recorded, so that the log information is more specific and more detailed, and no recording error occurs.
In one embodiment, the access tracker classifies access operations according to operation log information, the types of the access operations at least comprise a browsing class, a deep-query class, an error class and a referral class, and the log database is internally divided into a plurality of log sub-libraries corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
The working principle and the beneficial effects of the technical scheme are as follows: the method and the system have the advantages that the operation log information is classified, stored and managed, the content of the operation log information is identified, classification is carried out according to the identification result, meanwhile, the log database is correspondingly divided into the log sub-databases, logs of different types are respectively stored, the service proportion of each access type can be directly known, and accordingly corresponding matching adjustment is carried out on server resources.
In one embodiment, the method further includes step S400, where the backup database is checked against the log database periodically, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
The working principle and the beneficial effects of the technical scheme are as follows: the above scheme checks the backup database and the log database regularly to check whether the records of the two databases are consistent, and if the records are inconsistent, the data of one of the two databases is lost, and the lost content needs to be repaired by the content which is not lost, so as to ensure the integrity of the log data.
In one embodiment, the backup database and the log database are provided with an access authority module, and the access authority module adopts a Shiro security framework to provide user authentication and/or authorization verification; and the operation log information stored in the backup database and/or the log database can be called, viewed or applied by the user authenticated and/or authorized to be verified.
The working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
The beneficial effects of the above technical scheme are: by arranging the access authority module, the safety of log data can be guaranteed, irrelevant personnel are prevented from accessing log information, and the data are effectively prevented from being damaged; in addition, the method can prevent others from obtaining information which may relate to personal privacy, such as the IP address of the visitor and the like through the information in the log, and prevent the occurrence of network infringement.
In one embodiment, the access tracker extracts the oplog information as follows:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
The working principle and the beneficial effects of the technical scheme are as follows: the log collection work is undertaken by arranging the log management module, the log collection module and the log agent module, the work load of the access tracker is reduced, the access tracker can be specially used for following the access of a user, the work related to extracting the user operation log information is completed by matching the log management module, the log collection module and the log agent module, and the incomplete log record caused by the following miss of the user access due to the fact that the access tracker has too large data processing amount can be prevented; the efficiency and the accuracy of the log system are improved.
In one embodiment, the log system provides an application analysis module capable of providing at least the following application analyses:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
The working principle and the beneficial effects of the technical scheme are as follows: the application analysis module is arranged in the log system, so that the use range and the use diversity of the operation log information can be enlarged, different log application functions are developed or created, and various different use requirements are met; the utilization rate of the operation log information is improved; the application for analyzing the running state of the server can find the imperfection of the JavaEE application server or possible unstable risk points, and is beneficial to the maintenance and improvement work of the JavaEE application server through fault risk guidance.
In one embodiment, the specific steps of the preference matching information recommendation are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
Figure 366113DEST_PATH_IMAGE001
in the above formula, the first and second carbon atoms are,
Figure 307525DEST_PATH_IMAGE002
representing the similarity between the ith item of information to be recommended and the user preference information;
Figure 217712DEST_PATH_IMAGE003
representing user preference information;
Figure 142942DEST_PATH_IMAGE004
representing the ith item of information to be recommended;
Figure 367250DEST_PATH_IMAGE005
representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;
Figure 428747DEST_PATH_IMAGE006
is shown as
Figure 434137DEST_PATH_IMAGE007
Frequency of occurrence of individual common words in the preference information;
Figure 581085DEST_PATH_IMAGE008
is shown as
Figure 405821DEST_PATH_IMAGE007
The frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
The working principle and the beneficial effects of the technical scheme are as follows: by extracting the user operation log information, the preference information and the direction of the user are known, the quasi-recommendation information for the user is preliminarily circled by the preference information, the similarity value of each quasi-recommendation information and the user preference information is obtained through the algorithm, and the similarity value is compared with a preset threshold value, so that the fitting condition of the quasi-recommendation information and the user preference is judged, the fitting degree of the information recommended to the user and the user is increased, the accuracy of the recommendation information is improved, the user is prevented from feeling harassed by the recommendation information, and the counter-feeling of the user to the recommendation information behavior is reduced.
In one embodiment, the log system is provided with a statistic output module, and the statistic output module is used for counting the operation log information according to a set condition and outputting a statistic result, wherein the process is as follows:
coordinates are first established in the log database, and two data points are arbitrarily selected
Figure 430147DEST_PATH_IMAGE009
And
Figure 354240DEST_PATH_IMAGE010
then the following algorithm is used to search each operation in the log databaseLog information:
Figure 50801DEST_PATH_IMAGE021
in the above formula, the first and second carbon atoms are,
Figure 961119DEST_PATH_IMAGE012
representing a search algorithm heuristic function;
Figure 262788DEST_PATH_IMAGE013
representing an arbitrary point in the search;
Figure 623362DEST_PATH_IMAGE014
to represent
Figure 652891DEST_PATH_IMAGE013
The abscissa of the point;
Figure 491534DEST_PATH_IMAGE015
to represent
Figure 178867DEST_PATH_IMAGE013
The ordinate of the point;
Figure 320130DEST_PATH_IMAGE016
to represent
Figure 663386DEST_PATH_IMAGE009
The abscissa of the point;
Figure 430354DEST_PATH_IMAGE017
to represent
Figure 487041DEST_PATH_IMAGE009
The ordinate of the point;
Figure 720576DEST_PATH_IMAGE018
to represent
Figure 816708DEST_PATH_IMAGE010
The abscissa of the point;
Figure 528312DEST_PATH_IMAGE019
to represent
Figure 472128DEST_PATH_IMAGE020
The ordinate of the point;
then extracting
Figure 470040DEST_PATH_IMAGE013
Comparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The working principle and the beneficial effects of the technical scheme are as follows: by arranging the statistic output module, a user can be allowed to adopt set conditions to screen and count the operation log information, and the set conditions can be independently determined by the user; the method and the device are suitable for the diversity of the use of the operation log information, the trouble of setting condition enumeration is avoided, the degree of freedom of the use of the operation log information is expanded, the understanding of a user on the operation log information can be enhanced, and the counting and using efficiency is improved. In the screening search, the Manhattan distance and Chebyshev distance algorithm is adopted, the advancing speed of the initial search is accelerated, the expanding advancement is preferentially carried out in the later period with accuracy, and the efficiency and the effectiveness of the search are improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A design method of a log system suitable for a JavaEE application server is characterized in that the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
2. The method of claim 1, wherein the operation log information comprises a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
3. The method as claimed in claim 2, wherein in step S100, the access tracker is triggered by the user access to record the user' S client IP address and access time, calculates the access duration from the timer, tracks the user input command and open web page, extracts the visited web page, HTTP code, user agent and reference address, stops timing by the timer after the user exits from the access, records the access duration, and combines the recorded information and the extracted information to generate an operation log information.
4. The method for designing the log system suitable for the JavaEE application server as claimed in claim 1, wherein the access tracker classifies the access operation according to the operation log information, the types of the access operation at least include a browse type, a deep search type, an error type and a referral type, and the log database is divided into a plurality of log sub-libraries corresponding to the types of the access operation; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
5. The method for designing a log system of a java ee application server as claimed in claim 1, further comprising step S400, wherein the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
6. The design method of the log system suitable for the JavaEE application server as claimed in claim 1, wherein the backup database and the log database are provided with an access authority module, and the access authority module adopts Shiro security framework to provide user authentication and/or authorization verification; the user passing the user authentication and/or authorization verification can call, view or apply the operation log information stored in the backup database and/or the log database.
7. The method for designing a log system of a JavaEE application server as claimed in claim 1, wherein the access tracker extracts the operation log information as follows:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and configuring the size of the log collection module according to the dynamic state of the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
8. The method for designing a log system of a JavaEE application server as claimed in claim 7, wherein the log system is provided with an application analysis module capable of providing at least the following application analyses:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
9. The method for designing a log system of a java ee application server as claimed in claim 8, wherein the preference matching information is provided by the following steps:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
Figure 288805DEST_PATH_IMAGE001
in the above formula, the first and second carbon atoms are,
Figure 538520DEST_PATH_IMAGE002
representing the similarity between the ith item of information to be recommended and the user preference information;
Figure 320532DEST_PATH_IMAGE003
representing user preference information;
Figure 630290DEST_PATH_IMAGE004
representing the ith item of information to be recommended;
Figure 701014DEST_PATH_IMAGE005
representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;
Figure 206951DEST_PATH_IMAGE006
is shown as
Figure 46731DEST_PATH_IMAGE007
Frequency of occurrence of individual common words in the preference information;
Figure 527391DEST_PATH_IMAGE008
is shown as
Figure 196663DEST_PATH_IMAGE007
The frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference matching information, extracting the client IP address of the user from the operation log information, and providing the preference matching information.
10. The method for designing a log system suitable for a JavaEE application server as claimed in any one of claims 1 to 9, wherein the log system is provided with a statistical output module, the statistical output module is used for performing statistics on operation log information according to set conditions and outputting statistical results, and the process is as follows:
coordinates are first established in the log database, and two data points are arbitrarily selected
Figure 53761DEST_PATH_IMAGE009
And
Figure 544785DEST_PATH_IMAGE010
then, the following algorithm is adopted to search each piece of operation log information in the log database:
Figure 196346DEST_PATH_IMAGE011
in the above formula, the first and second carbon atoms are,
Figure 241662DEST_PATH_IMAGE012
representing a search algorithm heuristic function;
Figure 89401DEST_PATH_IMAGE013
representing an arbitrary point in the search;
Figure 638195DEST_PATH_IMAGE014
to represent
Figure 726236DEST_PATH_IMAGE013
The abscissa of the point;
Figure 993270DEST_PATH_IMAGE015
to represent
Figure 67536DEST_PATH_IMAGE013
The ordinate of the point;
Figure 470835DEST_PATH_IMAGE016
to represent
Figure 729778DEST_PATH_IMAGE009
The abscissa of the point;
Figure 280845DEST_PATH_IMAGE017
to represent
Figure 17857DEST_PATH_IMAGE009
The ordinate of the point;
Figure 541243DEST_PATH_IMAGE018
to represent
Figure 449984DEST_PATH_IMAGE019
The abscissa of the point;
Figure 426030DEST_PATH_IMAGE020
to represent
Figure 966733DEST_PATH_IMAGE019
The ordinate of the point;
then extracting
Figure 406942DEST_PATH_IMAGE013
Comparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
CN202010815166.4A 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server Active CN111680010B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010815166.4A CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server
CN202011316653.2A CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010815166.4A CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202011316653.2A Division CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Publications (2)

Publication Number Publication Date
CN111680010A true CN111680010A (en) 2020-09-18
CN111680010B CN111680010B (en) 2020-12-22

Family

ID=72458287

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010815166.4A Active CN111680010B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server
CN202011316653.2A Active CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202011316653.2A Active CN112650716B (en) 2020-08-14 2020-08-14 Log system design method suitable for JavaEE application server

Country Status (1)

Country Link
CN (2) CN111680010B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910980A (en) * 2021-01-27 2021-06-04 中国银联股份有限公司 Database access system and method
CN115544571A (en) * 2022-10-13 2022-12-30 广西柳州晨生信息科技有限公司 Data security system based on access authority

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101159539A (en) * 2007-11-20 2008-04-09 中国人民解放军信息工程大学 J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method
CN101286888A (en) * 2008-05-21 2008-10-15 天柏宽带网络科技(北京)有限公司 Operating method of log system
US7743029B2 (en) * 2003-12-30 2010-06-22 Sap Ag Log configuration and online deployment services
CN106250299A (en) * 2016-07-21 2016-12-21 柳州龙辉科技有限公司 A kind of processing method of Linux daily record
CN106339483A (en) * 2016-08-30 2017-01-18 电子科技大学 Social activity recommendation algorithm in mobile social network
CN106982204A (en) * 2017-02-15 2017-07-25 深圳市中科智库互联网信息安全技术有限公司 Credible and secure platform
CN108090205A (en) * 2017-12-27 2018-05-29 南京熊猫电子股份有限公司 A kind of army rear service data system for unified management based on J2EE
CN109542716A (en) * 2018-10-18 2019-03-29 北京亿赛通科技发展有限责任公司 A kind of log recording method and user-association plug-in unit based on J2EE platform
CN109582663A (en) * 2018-12-07 2019-04-05 国网安徽省电力有限公司综合服务中心 A kind of employee insurance information management system of the architectural framework based on Java EE
CN110069356A (en) * 2019-04-25 2019-07-30 北京东方通科技股份有限公司 A kind of application server

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110196746A1 (en) * 2010-02-09 2011-08-11 Microsoft Corporation Search auction insights for advertisers
CN103902604B (en) * 2012-12-28 2020-11-10 Ge医疗系统环球技术有限公司 Method and apparatus for searching and displaying scatter log
CN103942210B (en) * 2013-01-21 2018-05-04 中国移动通信集团上海有限公司 Processing method, device and the system of massive logs information
CN103761161B (en) * 2013-12-31 2017-01-04 华为技术有限公司 Recover the method for data, server and system
CN104778033B (en) * 2014-01-09 2017-12-05 大唐电信科技股份有限公司 The construction method and device of a kind of building software
CN105843702B (en) * 2015-01-14 2019-04-12 阿里巴巴集团控股有限公司 A kind of method and device for data backup
CN107705574A (en) * 2017-10-09 2018-02-16 荆门程远电子科技有限公司 A kind of precisely full-automatic capturing system of quick road violation parking
US10706016B2 (en) * 2018-05-22 2020-07-07 International Business Machines Corporation Application tracking system
CN109241022A (en) * 2018-09-11 2019-01-18 天津理工大学 A kind of archive management system and its ant search algorithm based on blue-ray storage
CN109831486A (en) * 2019-01-02 2019-05-31 技创智能科技(上海)有限公司 The background data server system and data processing method of multi-client
CN110377569B (en) * 2019-06-19 2023-07-28 中国平安人寿保险股份有限公司 Log monitoring method, device, computer equipment and storage medium
CN110544068B (en) * 2019-09-16 2023-01-24 深圳市丰巢科技有限公司 Delivery path generation method, device, equipment and storage medium based on express delivery cabinet

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7743029B2 (en) * 2003-12-30 2010-06-22 Sap Ag Log configuration and online deployment services
CN101159539A (en) * 2007-11-20 2008-04-09 中国人民解放军信息工程大学 J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method
CN101286888A (en) * 2008-05-21 2008-10-15 天柏宽带网络科技(北京)有限公司 Operating method of log system
CN106250299A (en) * 2016-07-21 2016-12-21 柳州龙辉科技有限公司 A kind of processing method of Linux daily record
CN106339483A (en) * 2016-08-30 2017-01-18 电子科技大学 Social activity recommendation algorithm in mobile social network
CN106982204A (en) * 2017-02-15 2017-07-25 深圳市中科智库互联网信息安全技术有限公司 Credible and secure platform
CN108090205A (en) * 2017-12-27 2018-05-29 南京熊猫电子股份有限公司 A kind of army rear service data system for unified management based on J2EE
CN109542716A (en) * 2018-10-18 2019-03-29 北京亿赛通科技发展有限责任公司 A kind of log recording method and user-association plug-in unit based on J2EE platform
CN109582663A (en) * 2018-12-07 2019-04-05 国网安徽省电力有限公司综合服务中心 A kind of employee insurance information management system of the architectural framework based on Java EE
CN110069356A (en) * 2019-04-25 2019-07-30 北京东方通科技股份有限公司 A kind of application server

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910980A (en) * 2021-01-27 2021-06-04 中国银联股份有限公司 Database access system and method
CN112910980B (en) * 2021-01-27 2022-11-15 中国银联股份有限公司 Database access system and method
CN115544571A (en) * 2022-10-13 2022-12-30 广西柳州晨生信息科技有限公司 Data security system based on access authority
CN115544571B (en) * 2022-10-13 2023-08-18 上海罗盘信息科技有限公司 Data security system based on access rights

Also Published As

Publication number Publication date
CN112650716B (en) 2021-08-24
CN111680010B (en) 2020-12-22
CN112650716A (en) 2021-04-13

Similar Documents

Publication Publication Date Title
CN100464294C (en) Reflection-based processing of input parameters for commands
CN111522922B (en) Log information query method and device, storage medium and computer equipment
EP2244418B1 (en) Database security monitoring method, device and system
CN110602029B (en) Method and system for identifying network attack
CN111625809B (en) Data authorization method and device, electronic equipment and storage medium
CN109376291B (en) Website fingerprint information scanning method and device based on web crawler
CN111680010B (en) Log system design method suitable for JavaEE application server
CN107257390B (en) URL address resolution method and system
Wu et al. A countermeasure to SQL injection attack for cloud environment
CN107003931B (en) Decoupling test validation from test execution
CN107704369B (en) Operation log recording method, electronic device, storage medium and system
CN103152391A (en) Journal output method and device
US11797617B2 (en) Method and apparatus for collecting information regarding dark web
CN112650688A (en) Automated regression testing method, associated device and computer program product
CN116186759A (en) Sensitive data identification and desensitization method for privacy calculation
CN111459577A (en) Application installation source tracking method, device, equipment and storage medium
CN111046382A (en) Database auditing method, device, storage medium and device
CN116155597A (en) Access request processing method and device and computer equipment
CN115600201A (en) User account information safety processing method for power grid system software
CN113434588B (en) Data mining analysis method and device based on mobile communication ticket
CN114500122A (en) Specific network behavior analysis method and system based on multi-source data fusion
CN115827589A (en) Authority verification method and device, electronic equipment and storage medium
CN111324796A (en) Domain name crawling method and device based on block chain and SDN edge computing network system
CN113037724B (en) Method and device for detecting illegal access
KR101194392B1 (en) A real user searching system using database log information and application log information and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant