CN112667573A - Redundant log deleting method and system - Google Patents
Redundant log deleting method and system Download PDFInfo
- Publication number
- CN112667573A CN112667573A CN202011535362.2A CN202011535362A CN112667573A CN 112667573 A CN112667573 A CN 112667573A CN 202011535362 A CN202011535362 A CN 202011535362A CN 112667573 A CN112667573 A CN 112667573A
- Authority
- CN
- China
- Prior art keywords
- log data
- target
- data
- result
- log
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a method and a system for deleting redundant logs. Wherein, the method comprises the following steps: acquiring target log data; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; and generating log display data according to the comparison result and carrying out visual display. The invention solves the technical problem that log deletion in the prior art can not accurately and efficiently carry out diversified log result redundant deletion.
Description
Technical Field
The invention relates to the field of log deletion, in particular to a method and a system for deleting redundant logs.
Background
With the continuous development of big data deployment, people can use the beneficial effects brought by big data in life, study and work, for example, the efficiency of log processing can be greatly improved, the accuracy and the efficiency of log process can be increased, and risk and trend prediction information in log deletion results can be generated by utilizing the diversification characteristics of a big data database through the log optimization deletion function of the big data matched with an equipment software platform.
At present, when log redundancy deletion is performed, log deletion is usually performed on locally stored data by using an inherent log deletion program at a terminal, and log deletion result data such as fault information and the like are obtained, so that the log deletion result in the process is one-sided, the analysis speed and efficiency are not high, and the technical purpose of outputting diversified analysis results through log deletion cannot be achieved.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a redundant log deleting method and a redundant log deleting system, which at least solve the technical problem that log deleting in the prior art cannot accurately and efficiently delete the redundant log result.
According to an aspect of an embodiment of the present invention, there is provided a method for deleting a redundant log, including: acquiring target log data; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; and deleting redundant log data according to the comparison result.
Optionally, the obtaining the target log data includes: and acquiring log data in real time according to target equipment software, and generating the target log data.
Optionally, the analyzing the target log data, and generating an analysis result includes: classifying the target log data to obtain a classification result; and analyzing according to the classification result through a preset rule to obtain the analysis result.
Optionally, the comparing the log data in the target database with the analysis result, and generating a comparison result includes: selecting the target database according to the target log data; and comparing the data in the target database with the analysis result to obtain the comparison result.
Optionally, the alignment result includes: fault judgment results, risk assessment results and trend prediction results.
Optionally, the redundant log data includes: repeating data and damaging data.
According to another aspect of the embodiments of the present invention, there is also provided a system for deleting a redundant log, including: the acquisition module is used for acquiring target log data; the analysis module is used for analyzing the target log data to generate an analysis result; the comparison module is used for comparing the log data in the target database with the analysis result to generate a comparison result; and the deleting module is used for deleting the redundant log data according to the comparison result.
Optionally, the obtaining module includes: and the acquisition unit is used for acquiring the log data in real time according to the target equipment software and generating the target log data.
Optionally, the analysis module includes: the classification unit is used for classifying the target log data to obtain a classification result; and the analysis unit is used for analyzing according to the classification result through a preset rule to obtain the analysis result.
Optionally, the alignment module includes: a selecting unit, configured to select the target database according to the target log data; and the comparison unit is used for comparing the data in the target database with the analysis result to obtain the comparison result.
In the embodiment of the invention, target log data are obtained; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; according to the comparison result, the redundant log data is deleted, and the log file is compared and analyzed through the big data, so that the purposes of monitoring log fault information and predicting risk and trend are achieved, and the technical problem that log deletion in the prior art cannot accurately and efficiently delete the redundant log result is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow diagram of a method for redundant log deletion according to an embodiment of the present invention;
fig. 2 is a block diagram of a redundant log deletion method according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In accordance with an embodiment of the present invention, there is provided a method embodiment of a redundant log deletion method, it should be noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions and that, although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different than that presented herein.
Example one
Fig. 1 is a flowchart of a method for deleting a redundant log according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step S102, target log data is obtained.
Specifically, in order to obtain a result of log data analysis, the embodiment of the present invention first needs to obtain target log data, where the target log data may be a log record data set to be analyzed, which is being used by a user, and the log deletion is performed based on the ELK.
It should be noted that the elastic search in the ELK is an open source distributed search engine, and its features are: distributed, zero configuration, automatic discovery, index automatic fragmentation, index copy mechanism, restful style interface, multiple data sources, automatic search load, etc. He is a fully open source tool that he can collect, filter, and store your logs for later use (e.g., searching). Kibana is also an open source and free tool, and Kibana can delete friendly Web interfaces for logs provided by Logstash and ElasticSearch, and can collect, analyze and search important data logs. Log deletion is a main means for solving system faults and finding problems by operation and maintenance engineers. The log includes various types including a program log, a system log, a security log, and the like. By deleting the log, the occurrence of the fault is pre-sent, and when the fault occurs, spider silk horse traces can be found to quickly locate the fault point. And timely solving. Specifically, in the embodiment of the present invention, the ELK assembly structure may be: elastic search: the method is an open-source distributed real-time analysis search engine, is established on the basis of a full-text search engine library Apache Lucene, and simultaneously hides the complexity of the Apache Lucene. The Elasticissearch packs all functions into an independent cartoon, an index copy mechanism, a RESTful style interface and multiple data sources. Automatic search, and the like. Logstash: the method is a completely open-source tool, is mainly used for collecting logs, can process data and output the data to an ElasticchichKibana: and is a completely open source tool, kibana can provide graphical log deletion for logstack and Elasticsearch. And the Web interface can collect, analyze and search important data logs.
It should be further noted that the log deleting method based on ELK may be to deploy logstash on all services that need to collect logs, where the logstash agent (logstash consumer) is used to monitor and filter the collected logs, send the filtered content to Redis, then collect the logs together by logstash index and deliver the collected logs to a full-text search service, and perform a page display by performing a custom search with an ElasticSearch through kbana in combination with the custom search.
Optionally, the obtaining the target log data includes: and acquiring log data in real time according to target equipment software, and generating the target log data.
And step S104, analyzing the target log data to generate an analysis result.
Specifically, after the target log data is obtained, the log data needs to be analyzed through a processor, and a corresponding data analysis result is obtained, and the result is used for displaying functions such as subsequent risk prediction, wherein the target log data can be collected in a real-time collection and storage mode, and the log data is transmitted and analyzed within a certain preset period, so that the efficiency and the uniformity of the whole target log data analysis are improved.
Optionally, the analyzing the target log data, and generating an analysis result includes: classifying the target log data to obtain a classification result; and analyzing according to the classification result through a preset rule to obtain the analysis result.
Specifically, since the target log data obtained from the target device software platform are complex and multi-type, the obtained target log data needs to be classified, and different types of data in the target log data are labeled with labels of corresponding types, for example, if cache release record data exists in the target log file, the cache release record data belongs to the cache label, so that when the target log data is classified, the cache release record data needs to be labeled with the "cache" label, and all log data with the "cache" label are classified and uniformly collected to form a "cache" set. And finally, analyzing the classification result through a preset rule, and analyzing the analysis results of different types of log data for subsequent processing.
It should be noted that the preset rule may be a rule matrix preset in the processor according to the requirement of the user on the log data, and is used to input the classification result of the target log data and obtain a corresponding operation result according to the data content of the classification result. For example, in the classification result cache set, after analysis is performed through a preset rule matrix, an analysis result "normal cache release" is obtained.
And step S106, comparing the log data in the target database with the analysis result to generate a comparison result.
Optionally, the comparing the log data in the target database with the analysis result, and generating a comparison result includes: selecting the target database according to the target log data; and comparing the data in the target database with the analysis result to obtain the comparison result.
Specifically, the target database may be a diversified database data source based on big data, and since the analysis result is generated according to the classification result, the analysis result of the target log data is also diversified, the required information may be extracted from the big database according to different result types in the analysis result, and the information may be compared with the locally obtained analysis result to verify and calibrate the locally obtained log data analysis result, so that the comparison result corresponding to the local analysis result has diversified data characteristics for subsequent output and display.
Optionally, the alignment result includes: fault judgment results, risk assessment results and trend prediction results.
Specifically, through the process of comparing the big data database with the analysis result, an accurate fault judgment result, a risk evaluation result and a trend prediction result can be obtained, wherein the fault judgment result can include information such as whether a fault exists, the time when the fault occurs, the fault degree and the like, the risk evaluation result can include the risk index of the fault, and the trend prediction result can be how the trend of various stable and unstable conditions may appear in the log running on the target device software platform.
And S108, deleting the redundant log data according to the comparison result.
Optionally, the redundant log data includes: repeating data and damaging data.
Specifically, through the comparison result, the display data generated according to the comparison result is visually displayed through the display screen, in addition, the log data belonging to the repeated data and the damaged data are deleted, wherein the display data can be arranged according to the comparison result and have graphical fault information, risk information and trend information, and finally, the various information are displayed through the display equipment, so that a user can visually see the log data analysis condition.
Through the steps, the technical effect of accurately and efficiently displaying the ELK log deletion result through the big data can be achieved.
Example two
Fig. 2 is a block diagram of a redundant log deleting method according to an embodiment of the present invention, and as shown in fig. 2, the system includes:
and an obtaining module 20, configured to obtain the target log data.
Specifically, in order to obtain a result of log data analysis, the embodiment of the present invention first needs to obtain target log data, where the target log data may be a log record data set to be analyzed, which is being used by a user, and the log deletion is performed based on the ELK.
It should be noted that the elastic search in the ELK is an open source distributed search engine, and its features are: distributed, zero configuration, automatic discovery, index automatic fragmentation, index copy mechanism, restful style interface, multiple data sources, automatic search load, etc. He is a fully open source tool that he can collect, filter, and store your logs for later use (e.g., searching). Kibana is also an open source and free tool, and Kibana can delete friendly Web interfaces for logs provided by Logstash and ElasticSearch, and can collect, analyze and search important data logs. Log deletion is a main means for solving system faults and finding problems by operation and maintenance engineers. The log includes various types including a program log, a system log, a security log, and the like. By deleting the log, the occurrence of the fault is pre-sent, and when the fault occurs, spider silk horse traces can be found to quickly locate the fault point. And timely solving. Specifically, in the embodiment of the present invention, the ELK assembly structure may be: elastic search: the method is an open-source distributed real-time analysis search engine, is established on the basis of a full-text search engine library Apache Lucene, and simultaneously hides the complexity of the Apache Lucene. The Elasticissearch packs all functions into an independent cartoon, an index copy mechanism, a RESTful style interface and multiple data sources. Automatic search, and the like. Logstash: the method is a completely open-source tool, is mainly used for collecting logs, can process data and output the data to an ElasticchichKibana: and is a completely open source tool, kibana can provide graphical log deletion for logstack and Elasticsearch. And the Web interface can collect, analyze and search important data logs.
It should be further noted that the log deleting method based on ELK may be to deploy logstash on all services that need to collect logs, where the logstash agent (logstash consumer) is used to monitor and filter the collected logs, send the filtered content to Redis, then collect the logs together by logstash index and deliver the collected logs to a full-text search service, and perform a page display by performing a custom search with an ElasticSearch through kbana in combination with the custom search.
Optionally, the obtaining module includes: and the acquisition unit is used for acquiring the log data in real time according to the target equipment software and generating the target log data.
And the analysis module 22 is configured to analyze the target log data to generate an analysis result.
Specifically, after the target log data is obtained, the log data needs to be analyzed through a processor, and a corresponding data analysis result is obtained, and the result is used for displaying functions such as subsequent risk prediction, wherein the target log data can be collected in a real-time collection and storage mode, and the log data is transmitted and analyzed within a certain preset period, so that the efficiency and the uniformity of the whole target log data analysis are improved.
Optionally, the analysis module includes: the classification unit is used for classifying the target log data to obtain a classification result; and the analysis unit is used for analyzing according to the classification result through a preset rule to obtain the analysis result.
Specifically, since the target log data obtained from the target device software platform are complex and multi-type, the obtained target log data needs to be classified, and different types of data in the target log data are labeled with labels of corresponding types, for example, if cache release record data exists in the target log file, the cache release record data belongs to the cache label, so that when the target log data is classified, the cache release record data needs to be labeled with the "cache" label, and all log data with the "cache" label are classified and uniformly collected to form a "cache" set. And finally, analyzing the classification result through a preset rule, and analyzing the analysis results of different types of log data for subsequent processing.
It should be noted that the preset rule may be a rule matrix preset in the processor according to the requirement of the user on the log data, and is used to input the classification result of the target log data and obtain a corresponding operation result according to the data content of the classification result. For example, in the classification result cache set, after analysis is performed through a preset rule matrix, an analysis result "normal cache release" is obtained.
And the comparison module 24 is configured to compare the log data in the target database with the analysis result to generate a comparison result.
Optionally, the alignment module includes: a selecting unit, configured to select the target database according to the target log data; and the comparison unit is used for comparing the data in the target database with the analysis result to obtain the comparison result.
Specifically, the target database may be a diversified database data source based on big data, and since the analysis result is generated according to the classification result, the analysis result of the target log data is also diversified, the required information may be extracted from the big database according to different result types in the analysis result, and the information may be compared with the locally obtained analysis result to verify and calibrate the locally obtained log data analysis result, so that the comparison result corresponding to the local analysis result has diversified data characteristics for subsequent output and display.
Optionally, the alignment result includes: fault judgment results, risk assessment results and trend prediction results.
Specifically, through the process of comparing the big data database with the analysis result, an accurate fault judgment result, a risk evaluation result and a trend prediction result can be obtained, wherein the fault judgment result can include information such as whether a fault exists, the time when the fault occurs, the fault degree and the like, the risk evaluation result can include the risk index of the fault, and the trend prediction result can be how the trend of various stable and unstable conditions may appear in the log running on the target device software platform.
And the deleting module 26 is configured to delete the redundant log data according to the comparison result.
Optionally, the redundant log data includes: repeating data and damaging data.
Specifically, through the comparison result, the display data generated according to the comparison result is visually displayed through the display screen, wherein the display data can be arranged according to the comparison result and have graphical fault information, risk information and trend information, and finally, the various information is displayed through the display device, so that a user can visually see the log data analysis condition.
According to another aspect of embodiments of the present invention, there is also provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform a method of redundant log deletion.
Specifically, the method for deleting the redundant log includes: acquiring target log data; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; and generating log display data according to the comparison result and carrying out visual display.
According to another aspect of the embodiments of the present invention, there is also provided a non-volatile storage medium, where the non-volatile storage medium includes a stored program, and the program controls a device in which the non-volatile storage medium is located to execute a redundant log deletion method when running.
Specifically, the method for deleting the redundant log includes: acquiring target log data; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; and generating log display data according to the comparison result and carrying out visual display.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including a processor and a memory; the memory has stored therein computer readable instructions for execution by the processor, wherein the computer readable instructions when executed perform a method of redundant log deletion.
Specifically, the method for deleting the redundant log includes: acquiring target log data; analyzing the target log data to generate an analysis result; comparing the log data in the target database with the analysis result to generate a comparison result; and generating log display data according to the comparison result and carrying out visual display.
Through the steps, the technical effect of accurately and efficiently displaying the ELK log deletion result through the big data can be achieved.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed technology can be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units may be a logical division, and in actual implementation, there may be another division, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (10)
1. A method for deleting redundant logs, comprising:
acquiring target log data;
analyzing the target log data to generate an analysis result;
comparing the log data in the target database with the analysis result to generate a comparison result;
and deleting redundant log data according to the comparison result.
2. The method of claim 1, wherein obtaining target log data comprises: and acquiring log data in real time according to target equipment software, and generating the target log data.
3. The method of claim 1, wherein analyzing the target log data and generating an analysis result comprises:
classifying the target log data to obtain a classification result;
and analyzing according to the classification result through a preset rule to obtain the analysis result.
4. The method of claim 1, wherein comparing the log data in the target database with the analysis result and generating a comparison result comprises:
selecting the target database according to the target log data;
and comparing the data in the target database with the analysis result to obtain the comparison result.
5. The method of claim 4, wherein the aligning comprises: fault judgment results, risk assessment results and trend prediction results.
6. The method of claim 1, wherein the redundant log data comprises: repeating data and damaging data.
7. A redundant log deletion system, comprising:
the acquisition module is used for acquiring target log data;
the analysis module is used for analyzing the target log data to generate an analysis result;
the comparison module is used for comparing the log data in the target database with the analysis result to generate a comparison result;
and the deleting module is used for deleting the redundant log data according to the comparison result.
8. The system of claim 7, wherein the acquisition module comprises: and the acquisition unit is used for acquiring the log data in real time according to the target equipment software and generating the target log data.
9. The system of claim 7, wherein the analysis module comprises:
the classification unit is used for classifying the target log data to obtain a classification result;
and the analysis unit is used for analyzing according to the classification result through a preset rule to obtain the analysis result.
10. The system of claim 7, wherein the alignment module comprises:
a selecting unit, configured to select the target database according to the target log data;
and the comparison unit is used for comparing the data in the target database with the analysis result to obtain the comparison result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535362.2A CN112667573A (en) | 2020-12-23 | 2020-12-23 | Redundant log deleting method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011535362.2A CN112667573A (en) | 2020-12-23 | 2020-12-23 | Redundant log deleting method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112667573A true CN112667573A (en) | 2021-04-16 |
Family
ID=75407981
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011535362.2A Pending CN112667573A (en) | 2020-12-23 | 2020-12-23 | Redundant log deleting method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112667573A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140096936A (en) * | 2013-01-29 | 2014-08-06 | (주)소만사 | System and Method for Big Data Processing of DLP System |
CN107391746A (en) * | 2017-08-10 | 2017-11-24 | 深圳前海微众银行股份有限公司 | Log analysis method, equipment and computer-readable recording medium |
CN108319719A (en) * | 2018-02-12 | 2018-07-24 | 腾讯科技(深圳)有限公司 | Database data method of calibration, device, computer equipment and storage medium |
CN108804497A (en) * | 2018-04-02 | 2018-11-13 | 北京国电通网络技术有限公司 | A kind of big data analysis method based on daily record |
CN110716910A (en) * | 2019-10-14 | 2020-01-21 | 中国建设银行股份有限公司 | Log management method, device, equipment and storage medium |
CN111159280A (en) * | 2020-01-02 | 2020-05-15 | 南京欣网通信科技股份有限公司 | Big data processing system |
-
2020
- 2020-12-23 CN CN202011535362.2A patent/CN112667573A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20140096936A (en) * | 2013-01-29 | 2014-08-06 | (주)소만사 | System and Method for Big Data Processing of DLP System |
CN107391746A (en) * | 2017-08-10 | 2017-11-24 | 深圳前海微众银行股份有限公司 | Log analysis method, equipment and computer-readable recording medium |
CN108319719A (en) * | 2018-02-12 | 2018-07-24 | 腾讯科技(深圳)有限公司 | Database data method of calibration, device, computer equipment and storage medium |
CN108804497A (en) * | 2018-04-02 | 2018-11-13 | 北京国电通网络技术有限公司 | A kind of big data analysis method based on daily record |
CN110716910A (en) * | 2019-10-14 | 2020-01-21 | 中国建设银行股份有限公司 | Log management method, device, equipment and storage medium |
CN111159280A (en) * | 2020-01-02 | 2020-05-15 | 南京欣网通信科技股份有限公司 | Big data processing system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110321371B (en) | Log data anomaly detection method, device, terminal and medium | |
CN106980573B (en) | Method, device and system for constructing test case request object | |
CN109120429B (en) | Risk identification method and system | |
CN109120428B (en) | Method and system for wind control analysis | |
US7908239B2 (en) | System for storing event data using a sum calculator that sums the cubes and squares of events | |
US11201802B2 (en) | Systems and methods for providing infrastructure metrics | |
CN111614483A (en) | Link monitoring method and device, storage medium and computer equipment | |
CN108763091A (en) | Method, apparatus and system for regression test | |
KR101266930B1 (en) | A visualization system for Forensics audit data | |
CN109408361A (en) | Monkey tests restored method, device, electronic equipment and computer readable storage medium | |
CN104657437A (en) | Monitoring method and monitoring device for promotion status data | |
CN111861537A (en) | Operation analysis method and system | |
CN111865673A (en) | Automatic fault management method, device and system | |
US11232463B2 (en) | Systems and methods for finding an interaction subset within a set of interactions | |
US20160188676A1 (en) | Collaboration system for network management | |
CN112685376A (en) | Massive log data analysis method and system | |
CN112347068A (en) | Log analysis method and system based on ELK | |
CN111342994A (en) | Network management system and method | |
CN112667573A (en) | Redundant log deleting method and system | |
CN115794545A (en) | Automatic processing method of operation and maintenance data and related equipment thereof | |
CN115580528A (en) | Fault root cause positioning method, device, equipment and readable storage medium | |
CN112667572A (en) | Log calibration method and device | |
CN112667574A (en) | Method and system for screening mass log data | |
CN113360313A (en) | Behavior analysis method based on massive system logs | |
CN112862598A (en) | Channel information management method and device, electronic equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210416 |
|
RJ01 | Rejection of invention patent application after publication |