CN112035353B - Log recording method, device and equipment and computer readable storage medium - Google Patents

Log recording method, device and equipment and computer readable storage medium Download PDF

Info

Publication number
CN112035353B
CN112035353B CN202010886663.3A CN202010886663A CN112035353B CN 112035353 B CN112035353 B CN 112035353B CN 202010886663 A CN202010886663 A CN 202010886663A CN 112035353 B CN112035353 B CN 112035353B
Authority
CN
China
Prior art keywords
token
preset
target
log recording
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010886663.3A
Other languages
Chinese (zh)
Other versions
CN112035353A (en
Inventor
刘国华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Inspur Data Technology Co Ltd
Original Assignee
Beijing Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Inspur Data Technology Co Ltd filed Critical Beijing Inspur Data Technology Co Ltd
Priority to CN202010886663.3A priority Critical patent/CN112035353B/en
Publication of CN112035353A publication Critical patent/CN112035353A/en
Application granted granted Critical
Publication of CN112035353B publication Critical patent/CN112035353B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a log recording method, which comprises the following steps: receiving a target log recording request; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; and if not, performing recording operation on the target log corresponding to the target log recording request. By applying the technical scheme provided by the embodiment of the invention, the normal storage of useful log information is ensured, and the efficiency and the accuracy of problem analysis and positioning are improved. The invention also discloses a log recording device, equipment and a storage medium, which have corresponding technical effects.

Description

Log recording method, device, equipment and computer readable storage medium
Technical Field
The present invention relates to the field of computer application technologies, and in particular, to a method, an apparatus, a device, and a computer-readable storage medium for recording logs.
Background
In embedded system applications today, logging is an important functional module. The log module with good functional design can be convenient for users and developers to carry out efficient maintenance and development on products based on the embedded system.
The flow of the general implementation of the log function includes: sending log recording request information to a log module according to actual needs during software operation; after receiving the recording request, the log module writes the information to be recorded into a Dynamic Random Access Memory (DRAM) for caching; the log module synchronizes the log information cached in the dynamic random access memory to a nonvolatile storage medium such as a Flash memory (Flash) for persistent storage according to a certain strategy. When the log needs to be read, the log information stored in the nonvolatile storage medium is read out and presented to the user in a readable form.
In embedded products, the non-volatile storage media resources are very tight, the system can only allocate limited resources to record log data, and log information is generated all the time in the product life cycle. As time passes and the number of log records continues to accumulate, when the non-volatile storage medium has been exhausted and there is no free space to record a new log request, the software needs to discard the oldest log, freeing up new storage space for recording the current new log request.
In a practical scenario, especially in a product development stage, a phenomenon of log traffic overshoot due to a software BUG (BUG) or other reasons is often encountered. For example, because a certain functional module runs abnormally, a log recording request is continuously sent to the log module, the storage space will be exhausted quickly, and a user or a developer will find that all the read log data are single print log information of the abnormal module, and other useful log information is flushed, thereby greatly affecting problem analysis and positioning.
In summary, how to effectively solve the problems that a large amount of log information generated by an abnormal module causes other useful log information to be flushed, and problem analysis and positioning are affected is a problem that needs to be solved urgently by a person skilled in the art at present.
Disclosure of Invention
The invention aims to provide a log recording method, which ensures the normal storage of useful log information and improves the efficiency and the accuracy of problem analysis and positioning; another object of the present invention is to provide a logging apparatus, a device and a computer-readable storage medium.
In order to solve the technical problems, the invention provides the following technical scheme:
a logging method, comprising:
receiving a target log recording request;
judging whether the target log recording request is a repeated request;
if yes, shielding the target log recording request;
and if not, performing recording operation on the target log corresponding to the target log recording request.
In a specific embodiment of the present invention, determining whether the target log record request is a repeat request includes:
acquiring a target code line number corresponding to the target log recording request;
and judging whether the line number of the target code is a repeated code line number within a preset time interval.
In a specific embodiment of the present invention, performing a recording operation on a target log corresponding to the target log recording request includes:
calling a target token from a preset token bucket;
storing the target log into a dynamic random access memory using the target token.
In one embodiment of the present invention, the method further comprises:
and carrying out token filling operation on the preset token bucket by using a preset token machine.
In a specific embodiment of the present invention, performing token filling operation on the preset token bucket by using a preset token machine includes:
acquiring a preset token filling rate;
and carrying out token filling operation on the preset token bucket by utilizing the preset token machine based on the preset token filling rate.
In a specific embodiment of the present invention, after performing a token filling operation on the preset token bucket based on the token filling rate by using the preset token machine, the method further includes:
obtaining the number of tokens in the preset token bucket;
judging whether the number of the tokens exceeds a preset value;
if so, stopping the token filling operation.
In an embodiment of the present invention, after storing the target log in a dynamic random access memory by using the target token, the method further includes:
synchronizing the target log into a non-volatile flash memory when the dynamic random access memory is detected to be full or powered down.
A logging apparatus comprising:
a request receiving unit for receiving a target log recording request;
a first judging unit, configured to judge whether the target log recording request is a repeat request;
the request shielding unit is used for shielding the target log recording request when the target log recording request is determined to be a repeated request;
and the log recording unit is used for performing recording operation on the target log corresponding to the target log recording request when the target log recording request is determined to be a non-repeated request.
A logging device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the logging method as described above when executing the computer program.
A computer-readable storage medium having stored thereon a computer program which, when being executed by a processor, carries out the steps of the logging method as set forth above.
By applying the method provided by the embodiment of the invention, a target log recording request is received; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; and if not, performing recording operation on the target log corresponding to the target log recording request. When the target log recording request is determined to be an abnormal recording request, the target log recording request is shielded, so that the normal storage of useful log information is ensured, and the efficiency and the accuracy of problem analysis and positioning are improved.
Correspondingly, the embodiment of the invention also provides a log recording device, equipment and a computer readable storage medium corresponding to the log recording method, which have the technical effects and are not described herein again.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a flow chart of an implementation of a logging method according to an embodiment of the present invention;
FIG. 2 is a flow chart of another implementation of a logging method according to an embodiment of the present invention;
FIG. 3 is a block diagram of a log recording apparatus according to an embodiment of the present invention;
fig. 4 is a block diagram of a structure of a logging device in an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the disclosure, reference will now be made in detail to the embodiments of the disclosure as illustrated in the accompanying drawings. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first embodiment is as follows:
referring to fig. 1, fig. 1 is a flowchart of an implementation of a logging method in an embodiment of the present invention, where the method may include the following steps:
s101: a target logging request is received.
When the target log is generated, a target log recording Request is generated, and the target log recording Request is sent to a preset cache. The preset cache receives a target log record request.
S102: and judging whether the target log recording request is a repeated request, if so, executing step S103, and if not, executing step S104.
After receiving the target log recording request, the preset cache judges whether the target log recording request is a repeated request, if so, the target log recording request is a log recording request generated when a certain functional module operates abnormally, and step S103 is executed, and if not, the target log recording request is a log recording request generated when the system operates normally, and step S104 is executed.
S103: and carrying out shielding operation on the target log record request.
When the target log recording request is determined to be a repeated request, the target log recording request is a log recording request generated when a certain functional module operates abnormally to a great extent, and the target log recording request is shielded. Therefore, the phenomenon that the log storage space is exhausted by the log generated by the abnormal function module, and other useful information is flushed due to the fact that the abnormally-operated function module continuously sends the log recording request to the preset cache is avoided.
S104: and performing recording operation on the target log corresponding to the target log recording request.
When the target log recording request is determined to be a non-repeated request, the target log corresponding to the target log recording request is recorded, so that the normal storage of useful log information is ensured, the analysis and positioning operation can be performed on related problems according to the useful log information, and the efficiency and the accuracy of problem analysis and positioning are improved.
By applying the method provided by the embodiment of the invention, a target log recording request is received; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; if not, performing recording operation on the target log corresponding to the target log recording request. When the target log recording request is determined to be an abnormal recording request, the target log recording request is shielded, so that the normal storage of useful log information is ensured, and the efficiency and the accuracy of problem analysis and positioning are improved.
It should be noted that, based on the first embodiment, the embodiment of the present invention further provides a corresponding improvement scheme. In the following embodiments, steps that are the same as or correspond to those in the first embodiment may be referred to each other, and corresponding advantageous effects may also be referred to each other, which are not described in detail in the following modified embodiments.
Example two:
referring to fig. 2, fig. 2 is a flowchart of another implementation of a logging method in an embodiment of the present invention, where the method may include the following steps:
s201: a target logging request is received.
S202: and acquiring a target code line number corresponding to the target log recording request.
And each log recording request is generated based on the code of the corresponding line, and after the target log recording request is received, the target code line number corresponding to the target log recording request is obtained.
S203: and judging whether the target code line number is a repeated code line number within a preset time interval, if so, executing the step S204, and if not, executing the step S205.
The method comprises the steps of presetting a time interval for judging that two or more received same code line numbers are received as repeated code line numbers, and judging that the rest code line numbers which are the same as the code number are the repeated code line numbers in the same code line numbers except the code line number received for the first time in the preset time interval when the code line numbers corresponding to two or more log recording requests received in the preset time interval are the same.
After the target code line number corresponding to the target log recording request is obtained, whether the target code line number is a repeated code line number within a preset time interval is judged, if yes, the target log recording request is a log recording request generated when a certain function module is abnormal in operation, step S204 is executed, and if not, the target log recording request is a log recording request generated when a system is normal in operation, and step S205 is executed.
It should be noted that the time interval may be set and adjusted according to actual situations, which is not limited in the embodiment of the present invention.
S204: and carrying out shielding operation on the target log record request.
S205: and calling the target token from the preset token bucket.
The preset cache has a limited cache amount for the log recording requests, and if the number of the log recording requests generated by the abnormal function module is larger than the number of the log recording requests which can be stored by the preset cache, some repeated log recording requests can be missed, so that the repeated log recording requests cannot be successfully shielded.
Based on the above situation, a token bucket is maintained in advance, and the log record request is responded by using the token resource in the token bucket. And when the target code line number is determined to be a non-repeated code line number within a preset time interval, calling the target token from a preset token bucket.
The target token is any idle token in the preset token bucket.
S206: the target log is stored in a dynamic random access memory using the target token.
After the target token is called, the target log is stored in a dynamic random access memory by using the target token. By using the dynamic random access memory as the temporary storage address of the target log, the log recording efficiency is improved.
S207: a preset token fill rate is obtained.
And presetting a token filling rate for filling tokens in the token bucket, and acquiring the preset token filling rate. Therefore, the rate of log recording can be limited by adjusting the rate of token filling, and the token mechanism can not only achieve the purpose of current limiting, but also cope with the scene of normal log traffic burst.
S208: and carrying out token filling operation on the preset token bucket by using a preset token machine based on a preset token filling rate.
After the token filling rate is generated, the preset token machine is used for carrying out token filling operation on the preset token bucket based on the preset token filling rate, and the situation that a new log recording request cannot be responded after the token resources in the token bucket are exhausted is avoided.
S209: and acquiring the number of tokens in a preset token bucket.
And acquiring the number of tokens in the preset token bucket in the process of filling the tokens in the preset token bucket.
S210: and judging whether the number of tokens exceeds a preset value, if so, executing step S211, and if not, not processing.
And presetting a token number threshold, after obtaining the number of tokens in the preset token bucket, judging whether the number of tokens exceeds a preset value, and if so, executing a step S211. If not, no processing is carried out.
S211: the token population operation is stopped.
Because the capacity of the preset token bucket is limited, when the number of the tokens is determined to exceed the preset value, the token filling operation is stopped, and the tokens in the preset token bucket are prevented from being infinitely increased.
S212: when the dynamic random access memory is detected to be full or powered down, the target log is synchronized into the non-volatile flash memory.
And a nonvolatile flash memory for performing persistent storage on the log is preset. When the dynamic random access memory is detected to be full or powered off, the target log is synchronized into the nonvolatile flash memory, so that the log storage safety is improved, and the storage space of the dynamic random access memory is released.
The present embodiment is different from the first embodiment corresponding to the technical solution claimed in independent claim 1, and the technical solutions claimed in the dependent claims 2 to 7 are added, and of course, according to different practical situations and requirements, the technical solutions claimed in the dependent claims can be flexibly combined on the basis of not affecting the completeness of the solutions, so as to better meet the requirements of different use scenarios.
Corresponding to the above method embodiments, embodiments of the present invention further provide a log recording apparatus, and the log recording apparatus described below and the log recording method described above may be referred to in correspondence with each other.
Referring to fig. 3, fig. 3 is a block diagram of a structure of a logging apparatus according to an embodiment of the present invention, where the apparatus may include:
a request receiving unit 31 for receiving a target log recording request;
a first judgment unit 32 for judging whether the target log recording request is a repeat request;
a request masking unit 33 configured to perform a masking operation on the target log recording request when it is determined that the target log recording request is a repeat request;
and the log recording unit 34 is configured to perform a recording operation on a target log corresponding to the target log recording request when the target log recording request is determined to be a non-repeat request.
The device provided by the embodiment of the invention is applied to receive a target log recording request; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; if not, performing recording operation on the target log corresponding to the target log recording request. When the target log recording request is determined to be an abnormal recording request, the target log recording request is shielded, so that the normal storage of useful log information is ensured, and the efficiency and the accuracy of problem analysis and positioning are improved.
In one embodiment of the present invention, the first judging unit 32 includes:
a code line number obtaining subunit, configured to obtain a target code line number corresponding to the target log recording request;
and the judging subunit is used for judging whether the line number of the target code is a repeated code line number within a preset time interval.
In one embodiment of the present invention, the logging unit 34 includes:
the token calling subunit is used for calling a target token from a preset token bucket;
and the log storage subunit is used for storing the target log into the dynamic random access memory by using the target token.
In one embodiment of the present invention, the apparatus may further include:
and the token filling unit is used for performing token filling operation on the preset token bucket by utilizing a preset token machine.
In one embodiment of the present invention, a token population unit includes:
a token filling rate obtaining subunit, configured to obtain a preset token filling rate;
and the token filling subunit is used for performing token filling operation on the preset token bucket by utilizing a preset token machine based on the preset token filling rate.
In an embodiment of the present invention, the apparatus may further include:
the token number obtaining unit is used for obtaining the number of tokens in the preset token bucket after the preset token machine is used for carrying out token filling operation on the preset token bucket based on the token filling rate;
the second judgment unit is used for judging whether the number of the tokens exceeds a preset value;
and the filling stopping unit is used for stopping the token filling operation when the token number is determined to exceed the preset value.
In one embodiment of the present invention, the apparatus may further include:
and the log synchronization unit is used for synchronizing the target log into the nonvolatile flash memory when the dynamic random access memory is detected to be full or powered down after the target log is stored into the dynamic random access memory by using the target token.
Corresponding to the above method embodiment, referring to fig. 4, fig. 4 is a schematic diagram of a logging device provided by the present invention, where the logging device may include:
a memory 41 for storing a computer program;
the processor 42, when executing the computer program stored in the memory 41, may implement the following steps:
receiving a target log recording request; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; and if not, performing recording operation on the target log corresponding to the target log recording request.
For the introduction of the device provided by the present invention, please refer to the above method embodiment, which is not described herein again.
Corresponding to the above method embodiment, the present invention further provides a computer-readable storage medium having a computer program stored thereon, the computer program, when executed by a processor, implementing the steps of:
receiving a target log recording request; judging whether the target log recording request is a repeated request or not; if yes, shielding the target log recording request; if not, performing recording operation on the target log corresponding to the target log recording request.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
For the introduction of the computer-readable storage medium provided by the present invention, please refer to the above method embodiments, which are not described herein again.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device, the apparatus and the computer-readable storage medium disclosed in the embodiments correspond to the method disclosed in the embodiments, so that the description is simple, and the relevant points can be referred to the description of the method.
The principle and the implementation of the present invention are explained in the present application by using specific examples, and the above description of the embodiments is only used to help understanding the technical solution and the core idea of the present invention. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (5)

1. A method of logging, comprising:
receiving a target log recording request;
judging whether the target log recording request is a repeated request;
if yes, shielding the target log recording request;
if not, performing recording operation on the target log corresponding to the target log recording request;
judging whether the target log recording request is a repeated request, comprising the following steps:
acquiring a target code line number corresponding to the target log recording request;
judging whether the line number of the target code is a repeated code line number within a preset time interval or not;
performing a recording operation on a target log corresponding to the target log recording request, including:
calling a target token from a preset token bucket;
storing the target log into a dynamic random access memory using the target token;
further comprising: carrying out token filling operation on the preset token bucket by using a preset token machine;
utilizing a preset token machine to perform token filling operation on the preset token bucket, comprising the following steps:
acquiring a preset token filling rate;
performing token filling operation on the preset token bucket by using the preset token machine based on the preset token filling rate;
after the preset token machine is utilized to perform token filling operation on the preset token bucket based on the token filling rate, the method further comprises the following steps:
obtaining the number of tokens in the preset token bucket;
judging whether the number of the tokens exceeds a preset value;
if so, stopping the token filling operation.
2. The logging method of claim 1, further comprising, after storing the target log in a dynamic random access memory using the target token:
synchronizing the target log into a non-volatile flash memory when the dynamic random access memory is detected to be full or powered down.
3. A logging apparatus, comprising:
a request receiving unit for receiving a target log recording request;
a first judging unit, configured to judge whether the target log recording request is a repeat request;
the request shielding unit is used for shielding the target log recording request when the target log recording request is determined to be a repeated request;
the log recording unit is used for performing recording operation on a target log corresponding to the target log recording request when the target log recording request is determined to be a non-repeated request;
the first judgment unit includes:
a code line number obtaining subunit, configured to obtain a target code line number corresponding to the target log recording request;
the judging subunit is used for judging whether the line number of the target code is a repeated code line number within a preset time interval or not;
the log recording unit includes:
the token calling subunit is used for calling a target token from a preset token bucket;
a log storing subunit, configured to store the target log into the dynamic random access memory by using the target token;
the logging apparatus further includes:
the token filling unit is used for performing token filling operation on the preset token bucket by utilizing a preset token machine;
the token population unit includes:
a token filling rate obtaining subunit, configured to obtain a preset token filling rate;
the token filling subunit is used for performing token filling operation on the preset token bucket by utilizing a preset token machine based on a preset token filling rate;
the logging apparatus further includes:
the token number obtaining unit is used for obtaining the number of tokens in the preset token bucket after the preset token machine is used for carrying out token filling operation on the preset token bucket based on the token filling rate;
the second judgment unit is used for judging whether the number of tokens exceeds a preset value;
and the filling stopping unit is used for stopping the token filling operation when the token number is determined to exceed the preset value.
4. A logging device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the logging method as claimed in any one of claims 1 to 2 when executing the computer program.
5. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the logging method as claimed in any one of the claims 1 to 2.
CN202010886663.3A 2020-08-28 2020-08-28 Log recording method, device and equipment and computer readable storage medium Active CN112035353B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010886663.3A CN112035353B (en) 2020-08-28 2020-08-28 Log recording method, device and equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010886663.3A CN112035353B (en) 2020-08-28 2020-08-28 Log recording method, device and equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112035353A CN112035353A (en) 2020-12-04
CN112035353B true CN112035353B (en) 2022-06-17

Family

ID=73586211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010886663.3A Active CN112035353B (en) 2020-08-28 2020-08-28 Log recording method, device and equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112035353B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116383012B (en) * 2023-05-26 2023-08-18 苏州浪潮智能科技有限公司 Method and device for acquiring boot log and method for transmitting boot log
CN117056188B (en) * 2023-10-13 2024-01-30 西安热工研究院有限公司 Method, system, equipment and storage medium for preventing log storm on DCS controller

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282207A (en) * 2008-06-05 2008-10-08 华为技术有限公司 Method and apparatus for recording data update as well as data backup method and system
WO2015200686A1 (en) * 2014-06-26 2015-12-30 Amazon Technologies, Inc. Multi-database log with multi-item transaction support
CN108108476A (en) * 2018-01-03 2018-06-01 中科边缘智慧信息科技(苏州)有限公司 The method of work of highly reliable distributed information log system
CN108399199A (en) * 2018-01-30 2018-08-14 武汉大学 A kind of collection of the application software running log based on Spark and service processing system and method
CN109902074A (en) * 2019-04-17 2019-06-18 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN110515803A (en) * 2019-08-27 2019-11-29 联想(北京)有限公司 For the processing method of log information, device and electronic equipment
CN111143317A (en) * 2019-12-29 2020-05-12 北京浪潮数据技术有限公司 Log storage method, device and equipment and readable storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030055809A1 (en) * 2001-09-18 2003-03-20 Sun Microsystems, Inc. Methods, systems, and articles of manufacture for efficient log record access
US9619278B2 (en) * 2014-06-26 2017-04-11 Amazon Technologies, Inc. Log-based concurrency control using signatures

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101282207A (en) * 2008-06-05 2008-10-08 华为技术有限公司 Method and apparatus for recording data update as well as data backup method and system
WO2015200686A1 (en) * 2014-06-26 2015-12-30 Amazon Technologies, Inc. Multi-database log with multi-item transaction support
CN108108476A (en) * 2018-01-03 2018-06-01 中科边缘智慧信息科技(苏州)有限公司 The method of work of highly reliable distributed information log system
CN108399199A (en) * 2018-01-30 2018-08-14 武汉大学 A kind of collection of the application software running log based on Spark and service processing system and method
CN109902074A (en) * 2019-04-17 2019-06-18 江苏全链通信息科技有限公司 Log storing method and system based on data center
CN110515803A (en) * 2019-08-27 2019-11-29 联想(北京)有限公司 For the processing method of log information, device and electronic equipment
CN111143317A (en) * 2019-12-29 2020-05-12 北京浪潮数据技术有限公司 Log storage method, device and equipment and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Obtaining accurate trajectories from repeated coarse and inaccurate location logs";Ryosuke Okuda;《2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)》;20170209;第177-181页 *
"分布式环境下通用日志系统的设计与实现";阮厦城;《中国优秀硕士学位论文全文数据库•信息科技辑》;20160315;第2016年卷(第3期);第I138-4089页 *

Also Published As

Publication number Publication date
CN112035353A (en) 2020-12-04

Similar Documents

Publication Publication Date Title
CN112035353B (en) Log recording method, device and equipment and computer readable storage medium
CN104268055A (en) Program exception monitoring method and device
EP3258653A1 (en) Message pushing method and device
CN110737388A (en) Data pre-reading method, client, server and file system
CN107506266B (en) Data recovery method and system
CN108965383B (en) File synchronization method and device, computer equipment and storage medium
EP3761609A1 (en) Load adjustment method and system for resource server, and device
CN110618974A (en) Data storage method, device, equipment and storage medium
CN111858474A (en) Distributed storage system Inode number allocation management method and related components
CN109521969B (en) Solid state disk data recovery method and device and computer readable storage medium
CN112084264A (en) Log data synchronization method and device and server
CN110647498A (en) File storage method, device, equipment and computer readable storage medium
CN111552618A (en) Method and device for collecting logs
CN114237989B (en) Database service deployment and disaster tolerance method and device
CN110689442A (en) Method and system for underwriting
CN113568891B (en) Distributed ID generation method, device, server and readable storage medium
CN109344131B (en) Data storage method and device and management server
CN111104381A (en) Log management method, device and equipment and computer readable storage medium
CN109992441B (en) Firmware log collection method, system, device and medium
CN114089912A (en) Data processing method and device based on message middleware and storage medium
CN112527557A (en) Data recovery method, device and equipment and computer readable storage medium
CN114489464A (en) Data writing method and device and electronic equipment
CN113535477A (en) Method and equipment for data disaster recovery
CN111625506A (en) Distributed data deleting method, device and equipment based on deleting queue
CN110661902A (en) Method for monitoring client renewal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant