CN111680010A - Log system design method suitable for JavaEE application server - Google Patents
Log system design method suitable for JavaEE application server Download PDFInfo
- Publication number
- CN111680010A CN111680010A CN202010815166.4A CN202010815166A CN111680010A CN 111680010 A CN111680010 A CN 111680010A CN 202010815166 A CN202010815166 A CN 202010815166A CN 111680010 A CN111680010 A CN 111680010A
- Authority
- CN
- China
- Prior art keywords
- log
- information
- application server
- database
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/1734—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1448—Management of the data involved in backup or backup restore
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Data Mining & Analysis (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a design method of a log system suitable for a JavaEE application server, which comprises the following steps: s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server; s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker; s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database. The invention is adopted to construct the log system suitable for the JavaEE application server, can ensure the integrity of the log information recorded in the log system and provides a good basis for the effective use of the log information.
Description
Technical Field
The invention relates to the technical field of design of a log system of a JavaEE application server, in particular to a design method of the log system suitable for the JavaEE application server.
Background
The JavaEE application server is a set of technical framework different from the traditional application development, comprises a plurality of components, and mainly can simplify and standardize the development and deployment of an application system so as to improve the portability, the safety and the reuse value. The JavaEE application server is an open source code Java application server, the core of the Java application server is a group of technical specifications and guidelines, and various components, service architectures and technical layers contained in the Java application server have common standards and specifications, so that various different platforms following the JavaEE application server architecture have good compatibility, and the dilemma that the information products used by the back end of an enterprise cannot be compatible with each other in the past, so that the internal or external of the enterprise is difficult to communicate with each other is solved. The APPLICATION SERVERs supporting JavaEE APPLICATION SERVER include IBMWEBSPHERE APPLICATION SERVER, BEA WEBLOGIC SERVER, JBOSS, ORACLE APPLICATION SERVER, SUN ONE APPLICATION SERVER, etc.
The log system of the application server is very important, can record the user use and the response condition of the application server, and can provide useful information such as trace tracing clues and perfect references of the application server. However, the log system of the existing JavaEE application server is fragile, and the recorded information is lost or deleted, so that the content of the log information is incomplete.
Disclosure of Invention
In order to solve the technical problem, the invention provides a design method of a log system suitable for a JavaEE application server, wherein the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
Optionally, the operation log information includes a client IP address, an access time, a visited web page, an HTTP code, a user agent, and a reference address.
Optionally, in step S100, after the access tracker is triggered by the user access, the access tracker records the client IP address and the access time of the user, calculates the access duration by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the visited web page, the HTTP code, the user agent, and the reference address, stops timing with the timer after the user quits the access, records the access duration, and then combines the recorded information and the extracted information to generate an operation log information.
Optionally, the access tracker classifies access operations according to the operation log information, the types of the access operations at least include a browsing class, a deep-query class, an error class and a referral class, and the log database is divided into a plurality of log sub-databases corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
Optionally, the method further includes step S400, in which the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
Optionally, the backup database and the log database are provided with an access right module, and the access right module adopts a Shiro security framework to provide user authentication and/or authorization verification; the user who passes the user authentication and/or authorization verification can call, view or apply the operation log information stored in the backup database and/or the log database;
the working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
Optionally, the access tracker extracts the operation log information in the following manner:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
Optionally, the log system is provided with an application analysis module, and the application analysis module can at least provide the following application analysis:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
Optionally, the specific steps of recommending the preference matching information are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
in the above formula, the first and second carbon atoms are,representing the similarity between the ith item of information to be recommended and the user preference information;representing user preference information;representing the ith item of information to be recommended;representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;is shown asFrequency of occurrence of individual common words in the preference information;is shown asThe frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
Optionally, the log system is provided with a statistics output module, the statistics output module is configured to perform statistics on the operation log information according to a set condition and output a statistical result, and the process includes:
coordinates are first established in the log database, and two data points are arbitrarily selectedAndthen, the following algorithm is adopted to search each piece of operation log information in the log database:
in the above formula, the first and second carbon atoms are,representing a search algorithm heuristic function;representing an arbitrary point in the search;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;
then extractingComparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The technical solution of the present invention is further described in detail by the accompanying drawings and embodiments.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a flowchart of an embodiment of a method for designing a log system suitable for a JavaEE application server in the embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
As shown in fig. 1, an embodiment of the present invention provides a method for designing a log system suitable for a JavaEE application server, where the design of the log system includes the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
The working principle and the beneficial effects of the technical scheme are as follows: the invention is adopted to construct the log system suitable for the JavaEE application server, the backup database is arranged to backup the log information while constructing, if the log information is lost, the content in the backup database can be adopted to repair the log information, thereby ensuring the integrity of the log information recorded in the log system and providing a good basis for the effective use of the log information. According to the scheme, the access tracker is arranged in the log system, the access tracker is used for tracking the operation of the user in real time, the access condition related to the log is recorded, and the real-time performance and the reliability of the log are enhanced.
In one embodiment, the oplog information includes a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
The working principle and the beneficial effects of the technical scheme are as follows: the range of the operation log information of the JavaEE application server is scientifically defined, so that the operation log information covers the user related information and the access condition, but does not relate to the personal privacy of the user or other information needing to be kept secret, and the operation log information meets the requirements of related laws and regulations and is easy to realize technically.
In one embodiment, in step S100, the access tracker records the client IP address and the access time of the user after being triggered by the user access, calculates the access time length by starting to work with a timer, tracks the user input instruction and the opened web page, extracts the accessed web page, the HTTP code, the user agent, and the reference address, stops timing by the timer after the user exits from the access, records the access time length, and then combines the recorded information and the extracted information to generate an operation log information.
The working principle and the beneficial effects of the technical scheme are as follows: the scheme carries out detailed design on the generation of the operation log information, adopts an access triggering mode, follows up the access process of the user by the access tracker, extracts and records the related operation log information content during the follow-up, integrates all the information, and generates and stores the once-access operation log information of the user after the access is finished. By adopting the follow-up recording mode, the access condition of the user can be comprehensively recorded, so that the log information is more specific and more detailed, and no recording error occurs.
In one embodiment, the access tracker classifies access operations according to operation log information, the types of the access operations at least comprise a browsing class, a deep-query class, an error class and a referral class, and the log database is internally divided into a plurality of log sub-libraries corresponding to the types of the access operations; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
The working principle and the beneficial effects of the technical scheme are as follows: the method and the system have the advantages that the operation log information is classified, stored and managed, the content of the operation log information is identified, classification is carried out according to the identification result, meanwhile, the log database is correspondingly divided into the log sub-databases, logs of different types are respectively stored, the service proportion of each access type can be directly known, and accordingly corresponding matching adjustment is carried out on server resources.
In one embodiment, the method further includes step S400, where the backup database is checked against the log database periodically, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
The working principle and the beneficial effects of the technical scheme are as follows: the above scheme checks the backup database and the log database regularly to check whether the records of the two databases are consistent, and if the records are inconsistent, the data of one of the two databases is lost, and the lost content needs to be repaired by the content which is not lost, so as to ensure the integrity of the log data.
In one embodiment, the backup database and the log database are provided with an access authority module, and the access authority module adopts a Shiro security framework to provide user authentication and/or authorization verification; and the operation log information stored in the backup database and/or the log database can be called, viewed or applied by the user authenticated and/or authorized to be verified.
The working principle of the technical scheme is as follows: the Shiro security framework is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management.
The beneficial effects of the above technical scheme are: by arranging the access authority module, the safety of log data can be guaranteed, irrelevant personnel are prevented from accessing log information, and the data are effectively prevented from being damaged; in addition, the method can prevent others from obtaining information which may relate to personal privacy, such as the IP address of the visitor and the like through the information in the log, and prevent the occurrence of network infringement.
In one embodiment, the access tracker extracts the oplog information as follows:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and dynamically configuring the size of the log collection module according to the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
The working principle and the beneficial effects of the technical scheme are as follows: the log collection work is undertaken by arranging the log management module, the log collection module and the log agent module, the work load of the access tracker is reduced, the access tracker can be specially used for following the access of a user, the work related to extracting the user operation log information is completed by matching the log management module, the log collection module and the log agent module, and the incomplete log record caused by the following miss of the user access due to the fact that the access tracker has too large data processing amount can be prevented; the efficiency and the accuracy of the log system are improved.
In one embodiment, the log system provides an application analysis module capable of providing at least the following application analyses:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
The working principle and the beneficial effects of the technical scheme are as follows: the application analysis module is arranged in the log system, so that the use range and the use diversity of the operation log information can be enlarged, different log application functions are developed or created, and various different use requirements are met; the utilization rate of the operation log information is improved; the application for analyzing the running state of the server can find the imperfection of the JavaEE application server or possible unstable risk points, and is beneficial to the maintenance and improvement work of the JavaEE application server through fault risk guidance.
In one embodiment, the specific steps of the preference matching information recommendation are as follows:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
in the above formula, the first and second carbon atoms are,representing the similarity between the ith item of information to be recommended and the user preference information;representing user preference information;representing the ith item of information to be recommended;representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;is shown asFrequency of occurrence of individual common words in the preference information;is shown asThe frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference fit information, extracting the client IP address of the user from the operation log information, and pushing the preference fit information.
The working principle and the beneficial effects of the technical scheme are as follows: by extracting the user operation log information, the preference information and the direction of the user are known, the quasi-recommendation information for the user is preliminarily circled by the preference information, the similarity value of each quasi-recommendation information and the user preference information is obtained through the algorithm, and the similarity value is compared with a preset threshold value, so that the fitting condition of the quasi-recommendation information and the user preference is judged, the fitting degree of the information recommended to the user and the user is increased, the accuracy of the recommendation information is improved, the user is prevented from feeling harassed by the recommendation information, and the counter-feeling of the user to the recommendation information behavior is reduced.
In one embodiment, the log system is provided with a statistic output module, and the statistic output module is used for counting the operation log information according to a set condition and outputting a statistic result, wherein the process is as follows:
coordinates are first established in the log database, and two data points are arbitrarily selectedAndthen the following algorithm is used to search each operation in the log databaseLog information:
in the above formula, the first and second carbon atoms are,representing a search algorithm heuristic function;representing an arbitrary point in the search;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;
then extractingComparing the operation log information stored in the point with the set conditions, skipping the operation log information which does not accord with the set conditions, counting the operation log information which accords with the set conditions, and outputting statistical data.
The working principle and the beneficial effects of the technical scheme are as follows: by arranging the statistic output module, a user can be allowed to adopt set conditions to screen and count the operation log information, and the set conditions can be independently determined by the user; the method and the device are suitable for the diversity of the use of the operation log information, the trouble of setting condition enumeration is avoided, the degree of freedom of the use of the operation log information is expanded, the understanding of a user on the operation log information can be enhanced, and the counting and using efficiency is improved. In the screening search, the Manhattan distance and Chebyshev distance algorithm is adopted, the advancing speed of the initial search is accelerated, the expanding advancement is preferentially carried out in the later period with accuracy, and the efficiency and the effectiveness of the search are improved.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A design method of a log system suitable for a JavaEE application server is characterized in that the design method of the log system comprises the following steps:
s100, constructing an access tracker aiming at the JavaEE application server, wherein the access tracker is connected with an access port of the JavaEE application server and is used for extracting and recording operation log information of a user on the JavaEE application server;
s200, constructing a log database, wherein the log database is connected with the access tracker and is used for storing operation log information recorded by the access tracker;
s300, establishing a backup database, wherein the backup database and the log database are stored in different physical memories, the backup database is connected with the log database, and the backup database is used for backing up data in the log database.
2. The method of claim 1, wherein the operation log information comprises a client IP address, an access time, a visited web page, HTTP code, a user agent, and a reference address.
3. The method as claimed in claim 2, wherein in step S100, the access tracker is triggered by the user access to record the user' S client IP address and access time, calculates the access duration from the timer, tracks the user input command and open web page, extracts the visited web page, HTTP code, user agent and reference address, stops timing by the timer after the user exits from the access, records the access duration, and combines the recorded information and the extracted information to generate an operation log information.
4. The method for designing the log system suitable for the JavaEE application server as claimed in claim 1, wherein the access tracker classifies the access operation according to the operation log information, the types of the access operation at least include a browse type, a deep search type, an error type and a referral type, and the log database is divided into a plurality of log sub-libraries corresponding to the types of the access operation; the log sub-library is used for storing operation log information of the corresponding type of access operation; and the JavaEE application server performs corresponding matching adjustment on server resources according to the proportion of different types of access operations.
5. The method for designing a log system of a java ee application server as claimed in claim 1, further comprising step S400, wherein the backup database is periodically checked against the log database, and the process is as follows:
s410, the JavaEE application server compares the operation log information stored in the backup database and the log database in a set period; if the two are consistent, the step is kept, and if the two are inconsistent, the step S420 is executed;
s420, judging whether the information of the backup database and the log database is more complete, and if the log database is more complete, updating the information stored in the backup database on the basis of the operation log information stored in the log database; and on the contrary, the log database is repaired on the basis of the backup database.
6. The design method of the log system suitable for the JavaEE application server as claimed in claim 1, wherein the backup database and the log database are provided with an access authority module, and the access authority module adopts Shiro security framework to provide user authentication and/or authorization verification; the user passing the user authentication and/or authorization verification can call, view or apply the operation log information stored in the backup database and/or the log database.
7. The method for designing a log system of a JavaEE application server as claimed in claim 1, wherein the access tracker extracts the operation log information as follows:
the log system is provided with a log management module, a log collection module and a log agent module, wherein the log management module runs on a JavaEE application server node and is used for managing and coordinating the log collection module and the log agent module, and the log management module is integrated into the service flow of the JavaEE application server in an embedded mode;
the log collection module is connected with the access tracker, runs on a JavaEE application server node, and is used for collecting and managing data pushed by a plurality of log agent modules, storing the data into a log database in a classified manner, and configuring the size of the log collection module according to the dynamic state of the JavaEE application server;
the log agent module runs on each node of the JavaEE application server and is used for collecting the log of the JavaEE application server on the node and pushing the log to the log collection module.
8. The method for designing a log system of a JavaEE application server as claimed in claim 7, wherein the log system is provided with an application analysis module capable of providing at least the following application analyses:
firstly, analyzing user preference according to operation log information of a user accessing a JavaEE application server, and then providing corresponding preference matching information for the user;
secondly, analyzing the running state of the JavaEE application server according to the JavaEE application server reaction when the user visits, and prompting to eliminate the found bad running or fault risk.
9. The method for designing a log system of a java ee application server as claimed in claim 8, wherein the preference matching information is provided by the following steps:
firstly, using information with highest user access frequency or longest access time as preference information, and searching and determining information to be recommended by keywords of the preference information or synonyms of the keywords;
secondly, calling the quasi-recommendation information and the user preference information, and calculating the similarity between the quasi-recommendation information and the user preference information according to the following formula:
in the above formula, the first and second carbon atoms are,representing the similarity between the ith item of information to be recommended and the user preference information;representing user preference information;representing the ith item of information to be recommended;representing vector dimensions, namely the quantity of words commonly adopted by the user preference information and the information to be recommended;is shown asFrequency of occurrence of individual common words in the preference information;is shown asThe frequency of occurrence of the common words in the ith item of information to be recommended;
and finally, taking the information to be recommended with the similarity higher than a set threshold value as the selected preference matching information, extracting the client IP address of the user from the operation log information, and providing the preference matching information.
10. The method for designing a log system suitable for a JavaEE application server as claimed in any one of claims 1 to 9, wherein the log system is provided with a statistical output module, the statistical output module is used for performing statistics on operation log information according to set conditions and outputting statistical results, and the process is as follows:
coordinates are first established in the log database, and two data points are arbitrarily selectedAndthen, the following algorithm is adopted to search each piece of operation log information in the log database:
in the above formula, the first and second carbon atoms are,representing a search algorithm heuristic function;representing an arbitrary point in the search;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;to representThe abscissa of the point;to representThe ordinate of the point;
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010815166.4A CN111680010B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
CN202011316653.2A CN112650716B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010815166.4A CN111680010B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011316653.2A Division CN112650716B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111680010A true CN111680010A (en) | 2020-09-18 |
CN111680010B CN111680010B (en) | 2020-12-22 |
Family
ID=72458287
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010815166.4A Active CN111680010B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
CN202011316653.2A Active CN112650716B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011316653.2A Active CN112650716B (en) | 2020-08-14 | 2020-08-14 | Log system design method suitable for JavaEE application server |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN111680010B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112910980A (en) * | 2021-01-27 | 2021-06-04 | 中国银联股份有限公司 | Database access system and method |
CN115544571A (en) * | 2022-10-13 | 2022-12-30 | 广西柳州晨生信息科技有限公司 | Data security system based on access authority |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101159539A (en) * | 2007-11-20 | 2008-04-09 | 中国人民解放军信息工程大学 | J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method |
CN101286888A (en) * | 2008-05-21 | 2008-10-15 | 天柏宽带网络科技(北京)有限公司 | Operating method of log system |
US7743029B2 (en) * | 2003-12-30 | 2010-06-22 | Sap Ag | Log configuration and online deployment services |
CN106250299A (en) * | 2016-07-21 | 2016-12-21 | 柳州龙辉科技有限公司 | A kind of processing method of Linux daily record |
CN106339483A (en) * | 2016-08-30 | 2017-01-18 | 电子科技大学 | Social activity recommendation algorithm in mobile social network |
CN106982204A (en) * | 2017-02-15 | 2017-07-25 | 深圳市中科智库互联网信息安全技术有限公司 | Credible and secure platform |
CN108090205A (en) * | 2017-12-27 | 2018-05-29 | 南京熊猫电子股份有限公司 | A kind of army rear service data system for unified management based on J2EE |
CN109542716A (en) * | 2018-10-18 | 2019-03-29 | 北京亿赛通科技发展有限责任公司 | A kind of log recording method and user-association plug-in unit based on J2EE platform |
CN109582663A (en) * | 2018-12-07 | 2019-04-05 | 国网安徽省电力有限公司综合服务中心 | A kind of employee insurance information management system of the architectural framework based on Java EE |
CN110069356A (en) * | 2019-04-25 | 2019-07-30 | 北京东方通科技股份有限公司 | A kind of application server |
Family Cites Families (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20110196746A1 (en) * | 2010-02-09 | 2011-08-11 | Microsoft Corporation | Search auction insights for advertisers |
CN103902604B (en) * | 2012-12-28 | 2020-11-10 | Ge医疗系统环球技术有限公司 | Method and apparatus for searching and displaying scatter log |
CN103942210B (en) * | 2013-01-21 | 2018-05-04 | 中国移动通信集团上海有限公司 | Processing method, device and the system of massive logs information |
CN103761161B (en) * | 2013-12-31 | 2017-01-04 | 华为技术有限公司 | Recover the method for data, server and system |
CN104778033B (en) * | 2014-01-09 | 2017-12-05 | 大唐电信科技股份有限公司 | The construction method and device of a kind of building software |
CN105843702B (en) * | 2015-01-14 | 2019-04-12 | 阿里巴巴集团控股有限公司 | A kind of method and device for data backup |
CN107705574A (en) * | 2017-10-09 | 2018-02-16 | 荆门程远电子科技有限公司 | A kind of precisely full-automatic capturing system of quick road violation parking |
US10706016B2 (en) * | 2018-05-22 | 2020-07-07 | International Business Machines Corporation | Application tracking system |
CN109241022A (en) * | 2018-09-11 | 2019-01-18 | 天津理工大学 | A kind of archive management system and its ant search algorithm based on blue-ray storage |
CN109831486A (en) * | 2019-01-02 | 2019-05-31 | 技创智能科技(上海)有限公司 | The background data server system and data processing method of multi-client |
CN110377569B (en) * | 2019-06-19 | 2023-07-28 | 中国平安人寿保险股份有限公司 | Log monitoring method, device, computer equipment and storage medium |
CN110544068B (en) * | 2019-09-16 | 2023-01-24 | 深圳市丰巢科技有限公司 | Delivery path generation method, device, equipment and storage medium based on express delivery cabinet |
-
2020
- 2020-08-14 CN CN202010815166.4A patent/CN111680010B/en active Active
- 2020-08-14 CN CN202011316653.2A patent/CN112650716B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7743029B2 (en) * | 2003-12-30 | 2010-06-22 | Sap Ag | Log configuration and online deployment services |
CN101159539A (en) * | 2007-11-20 | 2008-04-09 | 中国人民解放军信息工程大学 | J2EE middleware criterion based tolerant inbreak application server and tolerant inbreak method |
CN101286888A (en) * | 2008-05-21 | 2008-10-15 | 天柏宽带网络科技(北京)有限公司 | Operating method of log system |
CN106250299A (en) * | 2016-07-21 | 2016-12-21 | 柳州龙辉科技有限公司 | A kind of processing method of Linux daily record |
CN106339483A (en) * | 2016-08-30 | 2017-01-18 | 电子科技大学 | Social activity recommendation algorithm in mobile social network |
CN106982204A (en) * | 2017-02-15 | 2017-07-25 | 深圳市中科智库互联网信息安全技术有限公司 | Credible and secure platform |
CN108090205A (en) * | 2017-12-27 | 2018-05-29 | 南京熊猫电子股份有限公司 | A kind of army rear service data system for unified management based on J2EE |
CN109542716A (en) * | 2018-10-18 | 2019-03-29 | 北京亿赛通科技发展有限责任公司 | A kind of log recording method and user-association plug-in unit based on J2EE platform |
CN109582663A (en) * | 2018-12-07 | 2019-04-05 | 国网安徽省电力有限公司综合服务中心 | A kind of employee insurance information management system of the architectural framework based on Java EE |
CN110069356A (en) * | 2019-04-25 | 2019-07-30 | 北京东方通科技股份有限公司 | A kind of application server |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112910980A (en) * | 2021-01-27 | 2021-06-04 | 中国银联股份有限公司 | Database access system and method |
CN112910980B (en) * | 2021-01-27 | 2022-11-15 | 中国银联股份有限公司 | Database access system and method |
CN115544571A (en) * | 2022-10-13 | 2022-12-30 | 广西柳州晨生信息科技有限公司 | Data security system based on access authority |
CN115544571B (en) * | 2022-10-13 | 2023-08-18 | 上海罗盘信息科技有限公司 | Data security system based on access rights |
Also Published As
Publication number | Publication date |
---|---|
CN112650716B (en) | 2021-08-24 |
CN111680010B (en) | 2020-12-22 |
CN112650716A (en) | 2021-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN100464294C (en) | Reflection-based processing of input parameters for commands | |
CN111522922B (en) | Log information query method and device, storage medium and computer equipment | |
EP2244418B1 (en) | Database security monitoring method, device and system | |
CN110602029B (en) | Method and system for identifying network attack | |
CN111625809B (en) | Data authorization method and device, electronic equipment and storage medium | |
CN109376291B (en) | Website fingerprint information scanning method and device based on web crawler | |
CN111680010B (en) | Log system design method suitable for JavaEE application server | |
CN107257390B (en) | URL address resolution method and system | |
Wu et al. | A countermeasure to SQL injection attack for cloud environment | |
CN107003931B (en) | Decoupling test validation from test execution | |
CN107704369B (en) | Operation log recording method, electronic device, storage medium and system | |
CN103152391A (en) | Journal output method and device | |
US11797617B2 (en) | Method and apparatus for collecting information regarding dark web | |
CN112650688A (en) | Automated regression testing method, associated device and computer program product | |
CN116186759A (en) | Sensitive data identification and desensitization method for privacy calculation | |
CN111459577A (en) | Application installation source tracking method, device, equipment and storage medium | |
CN111046382A (en) | Database auditing method, device, storage medium and device | |
CN116155597A (en) | Access request processing method and device and computer equipment | |
CN115600201A (en) | User account information safety processing method for power grid system software | |
CN113434588B (en) | Data mining analysis method and device based on mobile communication ticket | |
CN114500122A (en) | Specific network behavior analysis method and system based on multi-source data fusion | |
CN115827589A (en) | Authority verification method and device, electronic equipment and storage medium | |
CN111324796A (en) | Domain name crawling method and device based on block chain and SDN edge computing network system | |
CN113037724B (en) | Method and device for detecting illegal access | |
KR101194392B1 (en) | A real user searching system using database log information and application log information and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |