CN112948202A - Application program monitoring method, device, equipment and readable storage medium - Google Patents

Application program monitoring method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN112948202A
CN112948202A CN202110144806.8A CN202110144806A CN112948202A CN 112948202 A CN112948202 A CN 112948202A CN 202110144806 A CN202110144806 A CN 202110144806A CN 112948202 A CN112948202 A CN 112948202A
Authority
CN
China
Prior art keywords
log
abnormal
level
logs
abnormality
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110144806.8A
Other languages
Chinese (zh)
Inventor
伍俊磊
段申全
袁帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Optical Network Information Technology Co Ltd
Fiberhome Telecommunication Technologies Co Ltd
Original Assignee
Wuhan Optical Network Information Technology Co Ltd
Fiberhome Telecommunication Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Optical Network Information Technology Co Ltd, Fiberhome Telecommunication Technologies Co Ltd filed Critical Wuhan Optical Network Information Technology Co Ltd
Priority to CN202110144806.8A priority Critical patent/CN112948202A/en
Publication of CN112948202A publication Critical patent/CN112948202A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data

Abstract

The invention provides an application program monitoring method, device and equipment and a readable storage medium. The method comprises the following steps: acquiring a log of an application program; searching abnormal logs from the logs, and putting the abnormal logs into a cache queue; when the time reaches a preset time, acquiring the abnormal log from the cache queue, and acquiring an abnormal index based on the abnormal level of the abnormal log; and if the abnormal index is larger than the threshold value, outputting an alarm notice. According to the invention, based on the log of the application program, the abnormal condition of the application program is quantified, and when the quantified value, namely the abnormal index, is greater than the threshold value, the alarm is given, so that a developer can know that the application program has serious abnormality or error in time, and the abnormality or error is treated in time.

Description

Application program monitoring method, device, equipment and readable storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for monitoring an application program.
Background
During the running process of the application program, the occurrence of exceptions and errors is inevitable. And these anomalies or errors are typically only noticeable when the user interacts with the interface. Therefore, when an application program which runs in a part of pure background or has less interaction with a user is abnormal or wrong, the application program is generally difficult to find in time, and the efficiency of solving the application program abnormity is low.
Disclosure of Invention
The invention mainly aims to provide an application program monitoring method, an application program monitoring device, application program monitoring equipment and a readable storage medium, and aims to solve the technical problem that the abnormality or the error of an application program cannot be found and solved in time in the prior art.
In a first aspect, the present invention provides an application monitoring method, including:
acquiring a log of an application program;
searching abnormal logs from the logs, and putting the abnormal logs into a cache queue;
when the time reaches a preset time, acquiring the abnormal log from the cache queue, and acquiring an abnormal index based on the abnormal level of the abnormal log;
and if the abnormal index is larger than the threshold value, outputting an alarm notice.
Optionally, the step of searching for an exception log from the log and placing the exception log into a cache queue includes:
matching the log with a preset regular expression to obtain key information of an abnormal log, wherein the key information comprises an abnormal object, a log object, an abnormal level, log time and abnormal content;
and packaging the key information of the abnormal log, and then putting the packaged key information into a cache queue.
Optionally, the step of obtaining an abnormality index based on the abnormality level of the abnormality log includes:
determining the number of the abnormal logs corresponding to each abnormal level based on the abnormal levels of the abnormal logs;
and obtaining an abnormality index based on the weight corresponding to each abnormality level and the number of the abnormality logs.
Optionally, after the step of determining if the abnormality index is greater than the threshold, the method further includes:
and adjusting the log output level to a preset level so that the log object of the abnormal log outputs the log with the log level higher than or equal to the preset level.
Optionally, after the step of adjusting the log output level to the preset level, the method further includes:
collecting key resource information and storing the key resource information into a folder;
and when the acquisition duration reaches the preset duration, restoring the log output level to the default level, and stopping acquiring the key resource information.
Optionally, before the step of collecting the key resource information and storing the key resource information in the folder, the method further includes:
triggering an acquisition task, and creating a folder under a system root directory by taking a timestamp when the acquisition task is triggered as a directory name.
Optionally, after the step of recovering the log output level to the default level and stopping collecting the key resource information when the collection duration reaches the preset duration, the method further includes:
and when the existing duration of the folder exceeds the effective duration, deleting the folder and the key resource information stored in the folder.
In a second aspect, the present invention further provides an application monitoring apparatus, including:
the acquisition module is used for acquiring the log of the application program;
the storage module is used for searching the abnormal logs from the logs and putting the abnormal logs into a cache queue;
the abnormity determining module is used for acquiring the abnormity log from the cache queue when the time reaches a preset time, and acquiring an abnormity index based on the abnormity level of the abnormity log;
and the alarm module is used for outputting an alarm notice if the abnormal index is larger than a threshold value.
In a third aspect, the present invention further provides an application monitoring apparatus, which includes a processor, a memory, and an application monitoring program stored on the memory and executable by the processor, wherein when the application monitoring program is executed by the processor, the steps of the application monitoring method as described above are implemented.
In a fourth aspect, the present invention further provides a readable storage medium, on which an application monitoring program is stored, wherein the application monitoring program, when executed by a processor, implements the steps of the application monitoring method as described above.
In the invention, a log of an application program is obtained; searching abnormal logs from the logs, and putting the abnormal logs into a cache queue; when the time reaches a preset time, acquiring the abnormal log from the cache queue, and acquiring an abnormal index based on the abnormal level of the abnormal log; and if the abnormal index is larger than the threshold value, outputting an alarm notice. According to the invention, based on the log of the application program, the abnormal condition of the application program is quantified, and when the quantified value, namely the abnormal index, is greater than the threshold value, the alarm is given, so that a developer can know that the application program has serious abnormality or error in time, and the abnormality or error is treated in time.
Drawings
Fig. 1 is a schematic hardware structure diagram of an application monitoring device according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of a method for monitoring an application program according to the present invention;
fig. 3 is a functional block diagram of an embodiment of an application monitoring apparatus according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In a first aspect, an embodiment of the present invention provides an application monitoring device, which may be a Personal Computer (PC), a notebook computer, a server, or the like.
Referring to fig. 1, fig. 1 is a schematic diagram of a hardware structure of an application monitoring device according to an embodiment of the present invention. In this embodiment of the present invention, the application monitoring device may include a processor 1001 (e.g., a Central Processing Unit (CPU)), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. The communication bus 1002 is used for realizing connection communication among the components; the user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard); the network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WI-FI interface, WI-FI interface); the memory 1005 may be a Random Access Memory (RAM) or a non-volatile memory (non-volatile memory), such as a magnetic disk memory, and the memory 1005 may optionally be a storage device independent of the processor 1001. Those skilled in the art will appreciate that the hardware configuration depicted in FIG. 1 is not intended to be limiting of the present invention, and may include more or less components than those shown, or some components in combination, or a different arrangement of components.
With continued reference to FIG. 1, the memory 1005 of FIG. 1, which is one type of computer storage medium, may include an operating system, a network communication module, a user interface module, and an application monitor program. The processor 1001 may call the application monitoring program stored in the memory 1005, and execute the application monitoring method provided by the embodiment of the present invention.
In a second aspect, an embodiment of the present invention provides an application monitoring method.
Referring to fig. 2, fig. 2 is a flowchart illustrating an application monitoring method according to an embodiment of the present invention. As shown in fig. 2, the application monitoring method includes:
step S10, acquiring application program logs;
in this embodiment, the application refers to an application that needs to be monitored, for example, a Web application based on JAVAEE. The journal logger used to obtain the journal of the application may be flash (free open source journal collection framework).
Step S20, searching abnormal logs from the logs, and putting the abnormal logs into a cache queue;
in this embodiment, a log including specific abnormal level information is searched from the acquired logs, the log including the specific abnormal level information is used as an abnormal log, and then the abnormal log is placed in the cache queue. Wherein the exception level information includes: error, Exception, Warn.
Step S30, when the time reaches the preset time, obtaining the abnormal log from the buffer queue, and obtaining an abnormal index based on the abnormal level of the abnormal log;
in this embodiment, the preset time is set according to actual needs, for example, a plurality of preset times are set from a zero point, where the time difference between every two preset times is 1 minute. And when the time reaches the preset time, acquiring the abnormal log from the buffer queue. For example, when the time reaches the nth preset time, the abnormal log obtained from the buffer queue is placed into the abnormal log of the buffer queue within the time period from the nth-1 th preset time to the nth preset time; similarly, when the time reaches the n +1 th preset time, the abnormal log obtained from the buffer queue is the abnormal log put into the buffer queue within the time period from the n th preset time to the n +1 th preset time.
And if m abnormal logs are obtained from the buffer queue at the moment, obtaining an abnormal index according to the abnormal levels of the m abnormal logs.
Further, in an embodiment, the step of obtaining an abnormality index based on the abnormality level of the abnormality log includes:
determining the number of the abnormal logs corresponding to each abnormal level based on the abnormal levels of the abnormal logs; and obtaining an abnormality index based on the weight corresponding to each abnormality level and the number of the abnormality logs.
In this embodiment, the Exception levels include three types, namely Error, Exception, and warning. If the number of the abnormal logs with the abnormal level of Error is a, the number of the abnormal logs with the abnormal level of Exception is b, and the number of the abnormal logs with the abnormal level of Warn is c, then:
C=a*x+b*y+c*z
wherein x is the weight corresponding to Error, y is the weight corresponding to Exception, z is the weight corresponding to Warn, and C is the abnormality index. The values of x, y and z are set according to actual needs, and are not limited herein.
And step S40, if the abnormality index is larger than the threshold value, outputting an alarm notice.
In this embodiment, if the abnormality index is greater than the threshold, it indicates that the application program has a serious abnormality or error, and therefore, an alarm notification is output, so that a developer can know that the application program has a serious abnormality or error in time, and thus, the abnormality or error is processed in time.
In this embodiment, a log of an application program is obtained; searching abnormal logs from the logs, and putting the abnormal logs into a cache queue; when the time reaches a preset time, acquiring the abnormal log from the cache queue, and acquiring an abnormal index based on the abnormal level of the abnormal log; and if the abnormal index is larger than the threshold value, outputting an alarm notice. Through the embodiment, based on the log of the application program, the abnormal condition of the application program is subjected to quantization processing, and when the quantization value, namely the abnormal index, is greater than the threshold value, an alarm is given, so that a developer can timely know that the application program has serious abnormality or error, and the abnormality or error is timely processed.
Further, in one embodiment, step S20 includes:
matching the log with a preset regular expression to obtain key information of an abnormal log, wherein the key information comprises an abnormal object, a log object, an abnormal level, log time and abnormal content; and packaging the key information of the abnormal log, and then putting the packaged key information into a cache queue.
In this embodiment, it is considered that some information in the information included in the log has little effect on the exception of the analysis program, and therefore, only some key information in the information included in the log, which is closely related to the exception of the analysis program, needs to be packaged and then placed in the cache queue. The key information comprises an abnormal object, a log object, an abnormal level, log time and abnormal content. The log time is the time when the abnormality occurs; the abnormal object is a class or an interface with abnormality, and the object is a business entity; the log object is an object for outputting the log, and the object is a log entity and controls the output level of the log; the abnormal content is log content. Further illustrating the exception object and the log object, for example, class a is a business entity, then class a will hold log object class B. When the class A is abnormal, the log output interface of the class B is called to output the log. The log information includes the abnormal time, the abnormal level and the abnormal content. Wherein class a is an exception object and class B is a log object. Of course, the specific content included in the key information may be expanded or reduced according to actual needs, which is not described herein.
In order to improve the efficiency of obtaining the key information of the abnormal log, a regular expression is utilized. Specifically, the regular expression is used to define the characteristics of the key information, then, each log obtained based on step S10 is matched one by one according to the defined characteristics of the key information, if a log is matched with the regular expression, the log is an abnormal log, and the key information of the abnormal log can be directly obtained based on the regular expression; and if the log is not matched with the regular expression, the log is a non-abnormal log, and the log is skipped.
Before the key information of each abnormal log is put into the cache queue, the key information of each abnormal log can be packaged into a uniform data structure and then put into the cache queue. For example, the key information of each abnormal log is encapsulated to obtain an abnormal log event corresponding to each abnormal log, where the abnormal event is defined as an exceptinogevent, and the included fields are exceptinogobj, logObj, exceptino level, time, and content.
It is easy to understand that, on the basis of the present embodiment, the subsequent retrieval from the cache queue is the key information of the encapsulated exception log.
Further, in an embodiment, after the step of determining if the abnormality index is greater than the threshold, the method further includes:
and adjusting the log output level to a preset level so that the log object of the abnormal log outputs the log with the log level higher than or equal to the preset level.
In this embodiment, the preset level is selected according to actual needs, for example, the preset level is a DEBUG (DEBUG) level. Specifically, the monitored application program can be connected through a JVMTI (virtual machine debugger interface) provided by a JDK (JAVA development kit), the log object in the JAVA virtual machine is obtained according to the log object in the key information of the exception log, and the log output level of the log object is changed to a DEBUG level, so that the log with the log level higher than or equal to the DEBUG level is output, which is beneficial to better performing subsequent exception analysis work.
Further, in an embodiment, after the step of adjusting the log output level to the preset level, the method further includes:
collecting key resource information and storing the key resource information into a folder; and when the acquisition duration reaches the preset duration, restoring the log output level to the default level, and stopping acquiring the key resource information.
In this embodiment, in order to provide a richer data sample for subsequent abnormal analysis work, besides adjusting the output level of the log to output more logs, key resource information is further collected and stored in the folder. The key resource information refers to key resource information of the monitored application program and a hardware entity running the application program, for example: CPU (central processing unit), memory utilization, thread dump, memory statistics, etc. The specific content included in the key resource information is not limited, and is only an exemplary description. And when the acquisition duration reaches the preset duration, restoring the log output level to the default level, and stopping acquiring the key resource information. The preset time period is set according to actual needs, for example, set to 30 minutes.
Further, in an embodiment, before the step of collecting key resource information and storing the key resource information in a folder, the method further includes:
triggering an acquisition task, and creating a folder under a system root directory by taking a timestamp when the acquisition task is triggered as a directory name.
In this embodiment, after the anomaly index is determined to be greater than the threshold value, the collection task is triggered before the key resource information is collected, and a folder is created under the system root directory by using a timestamp when the collection task is triggered as a directory name, so that the subsequently collected key resource information is stored in the folder.
Further, in an embodiment, after the step of recovering the log output level to the default level and stopping collecting the key resource information when the collection duration reaches the preset duration, the method further includes:
and when the existing duration of the folder exceeds the effective duration, deleting the folder and the key resource information stored in the folder.
In this embodiment, in order to avoid that the storage space is occupied by a folder for a long time, when the existence duration of the folder exceeds the effective duration, the folder and the key resource information stored therein are directly deleted. The method comprises the steps of detecting whether the existence duration of each folder created under a system root directory by taking a timestamp as a directory name exceeds the effective duration at a specified moment, and deleting the folder with the existence duration exceeding the effective duration and the key resource information stored in the folder.
In a third aspect, an embodiment of the present invention further provides an application monitoring apparatus.
Referring to fig. 3, fig. 3 is a functional module diagram of an embodiment of an application monitoring apparatus according to the present invention. As shown in fig. 3, the application monitoring apparatus includes:
an obtaining module 10, configured to obtain a log of an application;
the storage module 20 is configured to search an abnormal log from the logs, and place the abnormal log into a cache queue;
the anomaly determination module 30 is configured to obtain the anomaly log from the cache queue when time reaches a preset time, and obtain an anomaly index based on an anomaly level of the anomaly log;
and the alarm module 40 is used for outputting an alarm notification if the abnormality index is greater than a threshold value.
Further, in an embodiment, the storage module 20 is specifically configured to:
matching the log with a preset regular expression to obtain key information of an abnormal log, wherein the key information comprises an abnormal object, a log object, an abnormal level, log time and abnormal content;
and packaging the key information of the abnormal log, and then putting the packaged key information into a cache queue.
Further, in an embodiment, the anomaly determining module 30 is specifically configured to:
determining the number of the abnormal logs corresponding to each abnormal level based on the abnormal levels of the abnormal logs;
and obtaining an abnormality index based on the weight corresponding to each abnormality level and the number of the abnormality logs.
Further, in an embodiment, the application monitoring apparatus further includes an adjusting module, configured to:
and adjusting the log output level to a preset level so that the log object of the abnormal log outputs the log with the log level higher than or equal to the preset level.
Further, in an embodiment, the application monitoring apparatus further includes a key resource information collecting module, configured to:
collecting key resource information and storing the key resource information into a folder;
and when the acquisition duration reaches the preset duration, restoring the log output level to the default level, and stopping acquiring the key resource information.
Further, in an embodiment, the application monitoring apparatus further includes a triggering module, configured to:
triggering an acquisition task, and creating a folder under a system root directory by taking a timestamp when the acquisition task is triggered as a directory name.
Further, in an embodiment, the application monitoring apparatus further includes a deleting module, configured to:
and when the existing duration of the folder exceeds the effective duration, deleting the folder and the key resource information stored in the folder.
The function implementation of each module in the application program monitoring apparatus corresponds to each step in the application program monitoring method embodiment, and the function and implementation process thereof are not described in detail herein.
In a fourth aspect, the embodiment of the present invention further provides a readable storage medium.
The readable storage medium of the present invention stores an application monitoring program, wherein the application monitoring program, when executed by a processor, implements the steps of the application monitoring method as described above.
The method for implementing the application monitoring program when executed may refer to various embodiments of the application monitoring method of the present invention, and will not be described herein again.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing a terminal device to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An application monitoring method, comprising:
acquiring a log of an application program;
searching abnormal logs from the logs, and putting the abnormal logs into a cache queue;
when the time reaches a preset time, acquiring the abnormal log from the cache queue, and acquiring an abnormal index based on the abnormal level of the abnormal log;
and if the abnormal index is larger than the threshold value, outputting an alarm notice.
2. The application monitoring method of claim 1, wherein the step of searching the log for an exception log and placing the exception log in a cache queue comprises:
matching the log with a preset regular expression to obtain key information of an abnormal log, wherein the key information comprises an abnormal object, a log object, an abnormal level, log time and abnormal content;
and packaging the key information of the abnormal log, and then putting the packaged key information into a cache queue.
3. The application monitoring method of claim 1, wherein the step of deriving an abnormality index based on the abnormality level of the abnormality log comprises:
determining the number of the abnormal logs corresponding to each abnormal level based on the abnormal levels of the abnormal logs;
and obtaining an abnormality index based on the weight corresponding to each abnormality level and the number of the abnormality logs.
4. The application monitoring method of claim 1, further comprising, after the step of if the abnormality index is greater than a threshold value:
and adjusting the log output level to a preset level so that the log object of the abnormal log outputs the log with the log level higher than or equal to the preset level.
5. The application monitoring method of claim 4, wherein after the step of adjusting the log output level to a preset level, further comprising:
collecting key resource information and storing the key resource information into a folder;
and when the acquisition duration reaches the preset duration, restoring the log output level to the default level, and stopping acquiring the key resource information.
6. The method for monitoring an application program according to claim 5, wherein before the step of collecting key resource information and storing the key resource information in a folder, the method further comprises:
triggering an acquisition task, and creating a folder under a system root directory by taking a timestamp when the acquisition task is triggered as a directory name.
7. The method for monitoring an application program according to claim 6, wherein after the step of recovering the log output level to a default level and stopping collecting the key resource information when the collection duration reaches a preset duration, the method further comprises:
and when the existing duration of the folder exceeds the effective duration, deleting the folder and the key resource information stored in the folder.
8. An application monitoring apparatus, comprising:
the acquisition module is used for acquiring the log of the application program;
the storage module is used for searching the abnormal logs from the logs and putting the abnormal logs into a cache queue;
the abnormity determining module is used for acquiring the abnormity log from the cache queue when the time reaches a preset time, and acquiring an abnormity index based on the abnormity level of the abnormity log;
and the alarm module is used for outputting an alarm notice if the abnormal index is larger than a threshold value.
9. An application monitoring device, comprising a processor, a memory, and an application monitoring program stored on the memory and executable by the processor, wherein the application monitoring program when executed by the processor implements the steps of the application monitoring method as claimed in any one of claims 1 to 7.
10. A readable storage medium, having an application monitoring program stored thereon, wherein the application monitoring program, when executed by a processor, implements the steps of the application monitoring method as claimed in any one of claims 1 to 7.
CN202110144806.8A 2021-02-02 2021-02-02 Application program monitoring method, device, equipment and readable storage medium Pending CN112948202A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110144806.8A CN112948202A (en) 2021-02-02 2021-02-02 Application program monitoring method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110144806.8A CN112948202A (en) 2021-02-02 2021-02-02 Application program monitoring method, device, equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112948202A true CN112948202A (en) 2021-06-11

Family

ID=76241729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110144806.8A Pending CN112948202A (en) 2021-02-02 2021-02-02 Application program monitoring method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112948202A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105183609A (en) * 2015-09-16 2015-12-23 焦点科技股份有限公司 Real-time monitoring system and method applied to software system
CN105653427A (en) * 2016-03-04 2016-06-08 上海交通大学 Log monitoring method based on abnormal behavior detection
CN108897669A (en) * 2018-07-05 2018-11-27 城家网络科技有限公司 Using monitoring method and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105183609A (en) * 2015-09-16 2015-12-23 焦点科技股份有限公司 Real-time monitoring system and method applied to software system
CN105653427A (en) * 2016-03-04 2016-06-08 上海交通大学 Log monitoring method based on abnormal behavior detection
CN108897669A (en) * 2018-07-05 2018-11-27 城家网络科技有限公司 Using monitoring method and equipment

Similar Documents

Publication Publication Date Title
Miranskyy et al. Operational-log analysis for big data systems: Challenges and solutions
CN105743730B (en) The method and its system of real time monitoring are provided for the web service of mobile terminal
CN108073499B (en) Application program testing method and device
CN110401580B (en) Webpage state monitoring method based on heartbeat mechanism and related equipment
JP2010033543A (en) Software operation monitoring system, client computer, server computer thereof, and program thereof
US20180337817A1 (en) Performance evaluation of applications that access external resources
WO2019074687A1 (en) Method for replicating production behaviours in a development environment
CN111506470A (en) Browser error detection and alarm method, device, equipment and storage medium
CN110941632A (en) Database auditing method, device and equipment
CN114048099A (en) Java application monitoring method and device, storage medium and electronic equipment
CN112256532A (en) Test interface generation method and device, computer equipment and readable storage medium
CN112100035A (en) Page abnormity detection method, system and related device
CN110011845B (en) Log collection method and system
US8291389B2 (en) Automatically detecting non-modifying transforms when profiling source code
CN112948202A (en) Application program monitoring method, device, equipment and readable storage medium
CN107656849B (en) Method and device for positioning performance problem of software system
CN109271289B (en) Application interface monitoring method, device, equipment and computer readable medium
CN114816415A (en) Method and system for packet manager to analyze third-party dependence based on maven architecture
CN115098326A (en) System anomaly detection method and device, storage medium and electronic equipment
CN114385438A (en) Service operation risk early warning method, system and storage medium
CN109740386B (en) Method and device for detecting static resource file
CN112650613A (en) Error information processing method and device, electronic equipment and storage medium
CN112764990A (en) Target process monitoring method and device and computer equipment
CN112256529A (en) Web crawler monitoring method and device, computer equipment and storage medium
CN113708986A (en) Server monitoring apparatus, method and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210611