CN113051222A - Log storage method and device, computer readable storage medium and electronic equipment - Google Patents

Log storage method and device, computer readable storage medium and electronic equipment Download PDF

Info

Publication number
CN113051222A
CN113051222A CN202011629104.0A CN202011629104A CN113051222A CN 113051222 A CN113051222 A CN 113051222A CN 202011629104 A CN202011629104 A CN 202011629104A CN 113051222 A CN113051222 A CN 113051222A
Authority
CN
China
Prior art keywords
log
character string
generating
logs
index
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011629104.0A
Other languages
Chinese (zh)
Inventor
龚升俊
王志海
喻波
王志华
秦凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wondersoft Technology Co Ltd
Original Assignee
Beijing Wondersoft Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wondersoft Technology Co Ltd filed Critical Beijing Wondersoft Technology Co Ltd
Priority to CN202011629104.0A priority Critical patent/CN113051222A/en
Publication of CN113051222A publication Critical patent/CN113051222A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/172Caching, prefetching or hoarding of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a log storage method and device, a computer readable storage medium and electronic equipment, and belongs to the technical field of computers. The method comprises the following steps: when user behavior data are acquired, converting the user behavior data into a character string log with a specified length; generating a log index corresponding to the character string log; when the number of the generated character string logs reaches the specified number, generating a log file according to the character string logs and corresponding log indexes; and storing the log file. According to the scheme, the user behavior data are converted into the character string logs with the specified length, the corresponding log indexes are generated for the character string logs, and the specified number of the character string logs are stored into the log files, so that the storage resources required for storing the log files are reduced by standardizing the formats of the log files, the logs can be inquired through the log indexes, and the stored log files can be conveniently and uniformly managed.

Description

Log storage method and device, computer readable storage medium and electronic equipment
Technical Field
The present application belongs to the field of computer technologies, and in particular, to a log storage method and apparatus, a computer-readable storage medium, and an electronic device.
Background
The log audit is a technology for comprehensively collecting logs (including operation, alarm, operation, message, status, and the like) generated by security devices, network devices, databases, servers, application systems, hosts, and other devices, which are common in network systems, and storing, monitoring, auditing, analyzing, alarming, responding, and reporting the logs.
However, the log files collected from the network system in the current log audit are different in form and not standardized, and if the log files are stored in a centralized manner, a large amount of storage resources are occupied and the unified management of the log files is not facilitated.
Disclosure of Invention
In view of the above, the present application provides a log storage method, a log storage device, a computer-readable storage medium, and an electronic device, which solve the problem that log files collected from a network system in the prior art have different and non-standard forms, and if the log files are stored in a centralized manner, not only a large amount of storage resources need to be occupied, but also unified management of the log files is not facilitated to a certain extent.
According to a first aspect of the present application, there is provided a log storage method, which may include:
a method of log storage, the method comprising:
when user behavior data are acquired, converting the user behavior data into a character string log with a specified length;
generating a log index corresponding to the character string log;
when the number of the generated character string logs reaches the specified number, generating a log file according to the character string logs and corresponding log indexes;
and storing the log file.
Optionally, when the user behavior data includes a log attachment, the converting the user behavior data into a string log of a specified length includes:
generating an attachment identification for the log attachment;
and generating a character string log with a specified length according to the value of the accessory identifier.
Optionally, before the generating the accessory identification of the log accessory, the method further comprises:
acquiring an installation path of the log attachment;
and creating an installation task of the log attachment in an installation directory according to the installation path so as to obtain the log attachment.
Optionally, the storing the log file includes:
and sending the preset number of character string logs and corresponding log indexes in the log file to a storage device for storage at intervals of a specified time period.
Optionally, the generating a log file according to the character string log and the corresponding log index includes:
and taking the character string logs as log texts, and taking the number of the character string logs, the log indexes and the total data volume as log headers to generate a log file.
Optionally, the generating the log index corresponding to the string log includes:
obtaining description information of user behavior data, wherein the description information at least comprises: system information, module information, action information;
and generating a primary log index according to the system information, generating a secondary log index according to the module information, and generating a tertiary log index according to the action information.
According to a second aspect of the present application, there is provided a log storage apparatus, which may include:
the log generation module is used for converting the user behavior data into a character string log with a specified length when the user behavior data is acquired;
the index generating module is used for generating a log index corresponding to the character string log;
the file generation module is used for generating a log file according to the character string logs and the corresponding log indexes when the number of the generated character string logs reaches a specified number;
and the storage module is used for storing the log file.
Optionally, when the user behavior data includes a log attachment, the log generation module is further configured to:
generating an attachment identification for the log attachment;
and generating a character string log with a specified length according to the value of the accessory identifier.
Optionally, the apparatus further comprises:
an acquisition module to:
acquiring an installation path of the log attachment;
and creating an installation task of the log attachment in an installation directory according to the installation path so as to obtain the log attachment.
Optionally, the storage module is further configured to:
and sending the preset number of character string logs and corresponding log indexes in the log file to a storage device for storage at intervals of a specified time period.
Optionally, the file generating module is further configured to:
and taking the character string logs as log texts, and taking the number of the character string logs, the log indexes and the total data volume as log headers to generate a log file.
Optionally, the log index includes a first-level log index, a second-level log index, and a third-level log index, and the index generation module is further configured to:
obtaining description information of user behavior data, wherein the description information at least comprises: system information, module information, action information;
and generating a primary log index according to the system information, generating a secondary log index according to the module information, and generating a tertiary log index according to the action information.
In a third aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the log storage method according to the first aspect.
In a fourth aspect, the present application provides an electronic device comprising: a processor, a memory and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the log storing method according to the first aspect when executing the program.
Aiming at the prior art, the method has the following advantages:
the embodiment of the application provides a log storage method and device, a computer-readable storage medium and electronic equipment.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flowchart illustrating steps of a method for storing a log according to an embodiment of the present disclosure;
FIG. 2 is a schematic structural diagram of a journal storage system according to an embodiment of the present disclosure;
FIG. 3 is a flowchart illustrating steps of another log storage method according to an embodiment of the present disclosure;
fig. 4 is a block diagram illustrating a structure of a log storage device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The following describes in detail a log storage method in the embodiment of the present application.
Fig. 1 is a flowchart of steps of a log storage method provided in an embodiment of the present application, and as shown in fig. 1, the method may include:
step 101, when user behavior data is acquired, converting the user behavior data into a character string log with a specified length.
In this embodiment of the present application, the behavior data may be operation data generated by an operation behavior performed on the client by a user, for example: type of user operation, time, object, input information, and the like. The string log is a string used for reflecting user behavior data, for example, a JSON (JavaScript Object Notation, JS Object Notation, a lightweight data exchange format) string or other language-based string format such as C, C + +, and the like, and may be specifically set according to actual requirements, which is not limited herein. The specified length is a uniform amount of data for the string log.
In order to reduce the data volume of the subsequently generated log, the user behavior data is converted into the character string log with the specified length, so that the storage resource required by the log can be effectively reduced, and the data volume of the generated log file can be conveniently controlled subsequently due to the fact that the length of each character string log is specified.
And 102, generating a log index corresponding to the character string log.
In the embodiment of the application, the log index is a data structure for querying the character string log, and the user behavior data needs to be converted into the form of the character string log according to the scheme, so that the specific character string log can be conveniently queried in a subsequently generated log file by creating the log index of each character string log.
And 103, when the number of the generated character string logs reaches the specified number, generating a log file according to the character string logs and the corresponding log indexes.
In the embodiment of the application, if the number of the obtained character string logs is less than or equal to the number threshold, the character string logs and the log indexes corresponding to the character string logs are placed in one log file, and if the number of the obtained character string logs is greater than the number threshold, the character string logs with the number threshold and the log indexes corresponding to the character string logs are placed in one log file, and the rest character string logs are placed in another log file, so that the number of the obtained log files does not exceed the number threshold.
And 104, storing the log file.
In the embodiment of the present application, the log file may be uploaded to a storage device for storage, or may be stored locally in the log file, which may be specifically set according to an actual requirement, and is not limited herein.
According to the log storage method provided by the embodiment of the application, the user behavior data are converted into the character string logs with the specified length, the corresponding log indexes are generated for the character string logs, and the specified number of the character string logs are stored as the log files, so that the storage resources required for storing the log files are reduced by standardizing the format of the log files, the logs can be inquired through the log indexes, and the stored log files can be conveniently and uniformly managed.
Fig. 2 is a schematic structural diagram of a log storage system according to an embodiment of the present application, where a terminal behavior control module, when monitoring user behavior data of a user terminal operation, sends the user behavior data to a terminal log collection module to generate a log file, and then the terminal behavior control module continues to send the user behavior data to a terminal operation module for processing.
According to the log storage method provided by the embodiment of the application, the time evaluation score obtained based on the evaluation time is adopted to reflect the enthusiasm of the user processing task and the number evaluation score obtained based on the evaluation number is collected to reflect the efficiency of the user processing task on the basis that the average evaluation score reflects the quality of the user processing task, and the comprehensive evaluation score obtained by combining the three is combined, so that the quality, the efficiency and the enthusiasm of the user processing task can be reasonably comprehensively evaluated.
Fig. 3 is a flowchart of steps of another log storage method provided in an embodiment of the present application, and as shown in fig. 2, the method may include:
step 201, obtaining the installation path of the log attachment.
In this embodiment of the application, the installation path is a download address of the log attachment, and may be specifically extracted from the user behavior data.
Step 202, creating an installation task of the log attachment in an installation directory according to the installation path to obtain the log attachment.
In the embodiment of the application, the log attachment is stored in a manner of directly downloading the log attachment, considering that the log attachment cannot be acquired when the log file is viewed because the installation path of the log attachment is directly written into the log due to restrictions such as permission.
Step 203, when the user behavior data is obtained, converting the user behavior data into a character string log with a specified length.
This step can refer to the detailed description of step 101, which is not repeated herein.
Step 204, generating an attachment identifier of the log attachment.
In the embodiment of the application, the fid handle of the log attachment can be calculated as the attachment identifier of the log attachment, and is used for indicating the acquisition address of the log attachment.
And step 205, generating a character string log with a specified length according to the value of the accessory identifier.
In the embodiment of the present application, the string log of the log attachment can be obtained by assigning the obtained fid handle to the string.
Optionally, the log index includes a primary log index, a secondary log index, and a tertiary log index.
Step 206, obtaining description information of the user behavior data, where the description information at least includes: system information, module information, action information.
In this embodiment of the application, the description information of the user behavior data may include system information of a system to which the user behavior data belongs, module information of the functional module, action information of a corresponding operation action, and other index data that may reflect characteristics of the user behavior data, and may be specifically set according to an actual requirement, which is not limited herein.
And step 207, generating a primary log index according to the system information, generating a secondary log index according to the module information, and generating a tertiary log index according to the action information.
In the embodiment of the application, the obtained log character strings can be classified by setting a three-level log index mode, so that the log character strings in the log file can be conveniently inquired.
For example, the first-level log index, the second-level log index, and the third-level log index may be set in table 1 for classification and editing:
Figure RE-RE-GDA0003080166450000071
Figure RE-RE-GDA0003080166450000081
Figure RE-RE-GDA0003080166450000091
TABLE 1
Of course, this is merely an exemplary illustration, and the specific hierarchical index may be set according to actual requirements, and is not limited herein.
And step 208, taking the character string logs as log texts, and taking the number, the log indexes and the total data volume of the character string logs as log headers to generate log files.
In the embodiment of the present application, a log file may be generated by the log structure shown in fig. 3, wherein the size of the log file is controlled to 512MB, and a single log file can support 65535 pieces of log data in units of log character strings at most. The log file is divided into a log head and a log body, wherein the head can store basic information of the log, including total data volume of the log, log index and log number; the log content is stored in the log text, each piece of log data content does not exceed 8KB, which is only an exemplary description, and the specific number, the log index and the total data volume can be set according to the actual requirement, which is not limited herein.
Step 209, sending the preset number of character string logs and corresponding log indexes in the log file to a storage device for storage at intervals of a specified time period.
In the embodiment of the application, the acquired preset number of log character strings can be checked through a specified time period, and the log character strings are uploaded to the storage device once if the log character strings are not checked once. For example, when a log character string generated by scanning a snapshot or a log attachment exists, 10 pieces of data can be detected each time and uploaded to a storage device for storage, and at most 10 pieces of data can be uploaded at one time, so that the log uploading efficiency and occupied resources are improved.
According to the other log storage method provided by the embodiment of the application, the user behavior data is converted into the character string logs with the specified length, the corresponding log indexes are generated for the character string logs, and the specified number of the character string logs are stored as the log files, so that the storage resources required for storing the log files are reduced by standardizing the format of the log files, the logs can be inquired through the log indexes, and the stored log files can be conveniently and uniformly managed.
Fig. 4 is a block diagram of a log storage device 30 according to an embodiment of the present disclosure, and as shown in fig. 4, the log storage device 30 may include:
the log generation module 301 is configured to, when user behavior data is acquired, convert the user behavior data into a string log of a specified length;
an index generating module 302, configured to generate a log index corresponding to the string log;
the file generation module 303 is configured to generate a log file according to the generated string logs and corresponding log indexes when the number of the generated string logs reaches a specified number;
a storage module 304, configured to store the log file.
Optionally, when the user behavior data includes a log attachment, the log generating module 301 is further configured to:
generating an attachment identification for the log attachment;
and generating a character string log with a specified length according to the value of the accessory identifier.
Optionally, the apparatus further comprises:
an acquisition module to:
acquiring an installation path of the log attachment;
and creating an installation task of the log attachment in an installation directory according to the installation path so as to obtain the log attachment.
Optionally, the storage module 304 is further configured to:
and sending the preset number of character string logs and corresponding log indexes in the log file to a storage device for storage at intervals of a specified time period.
Optionally, the file generating module 303 is further configured to:
and taking the character string logs as log texts, and taking the number of the character string logs, the log indexes and the total data volume as log headers to generate a log file.
Optionally, the log indexes include a primary log index, a secondary log index, and a tertiary log index, and the index generation module 302 is further configured to:
obtaining description information of user behavior data, wherein the description information at least comprises: system information, module information, action information;
and generating a primary log index according to the system information, generating a secondary log index according to the module information, and generating a tertiary log index according to the action information.
The log storage device provided by the embodiment of the application is provided with a functional module corresponding to the log storage method, can execute the log storage method provided by any one of the first embodiment to the ninth embodiment of the application, and can achieve the same beneficial effects.
In another embodiment provided by the present application, there is also provided an electronic device, which may include: the processor executes the program to realize the processes of the log storage method embodiment, and can achieve the same technical effect, and the details are not repeated here in order to avoid repetition. For example, as shown in fig. 5, the electronic device may specifically include: a processor 401, a storage device 402, a display screen 403 with touch functionality, an input device 404, an output device 405, and a communication device 406. The number of the processors 401 in the electronic device may be one or more, and one processor 401 is taken as an example in fig. 5. The processor 401, the storage means 402, the display 403, the input means 404, the output means 405 and the communication means 406 of the electronic device may be connected by a bus or other means.
In yet another embodiment provided by the present application, a computer-readable storage medium is further provided, which has instructions stored therein, and when the instructions are executed on a computer, the instructions cause the computer to execute the log storage method described in any one of the above embodiments.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the log storage method of any of the above embodiments.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application are included in the protection scope of the present application.

Claims (10)

1. A method of log storage, the method comprising:
when user behavior data are acquired, converting the user behavior data into a character string log with a specified length;
generating a log index corresponding to the character string log;
when the number of the generated character string logs reaches the specified number, generating a log file according to the character string logs and corresponding log indexes;
and storing the log file.
2. The method of claim 1, wherein when the user behavior data comprises a log attachment, the converting the user behavior data into a string log of a specified length comprises:
generating an attachment identification for the log attachment;
and generating a character string log with a specified length according to the value of the accessory identifier.
3. The method of claim 2, wherein prior to the generating the accessory identification for the log accessory, the method further comprises:
acquiring an installation path of the log attachment;
and creating an installation task of the log attachment in an installation directory according to the installation path so as to obtain the log attachment.
4. The method of claim 1, wherein storing the log file comprises:
and sending the preset number of character string logs and corresponding log indexes in the log file to a storage device for storage at intervals of a specified time period.
5. The method of claim 1, wherein generating a log file from the string log and a corresponding log index comprises:
and taking the character string logs as log texts, and taking the number of the character string logs, the log indexes and the total data volume as log headers to generate a log file.
6. The method of claim 1, wherein the log index comprises a primary log index, a secondary log index and a tertiary log index, and wherein the generating the log index corresponding to the string log comprises:
obtaining description information of user behavior data, wherein the description information at least comprises: system information, module information, action information;
and generating a primary log index according to the system information, generating a secondary log index according to the module information, and generating a tertiary log index according to the action information.
7. A log storage apparatus, the apparatus comprising:
the log generation module is used for converting the user behavior data into a character string log with a specified length when the user behavior data is acquired;
the index generating module is used for generating a log index corresponding to the character string log;
the file generation module is used for generating a log file according to the character string logs and the corresponding log indexes when the number of the generated character string logs reaches a specified number;
and the storage module is used for storing the log file.
8. The apparatus of claim 7, wherein when the user behavior data comprises a log attachment, the log generation module is further configured to:
generating an attachment identification for the log attachment;
and generating a character string log with a specified length according to the value of the accessory identifier.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the log storage method according to any one of claims 1 to 6.
10. An electronic device, comprising:
processor, memory and computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the log storing method according to any of claims 1 to 6 when executing the program.
CN202011629104.0A 2020-12-30 2020-12-30 Log storage method and device, computer readable storage medium and electronic equipment Pending CN113051222A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011629104.0A CN113051222A (en) 2020-12-30 2020-12-30 Log storage method and device, computer readable storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011629104.0A CN113051222A (en) 2020-12-30 2020-12-30 Log storage method and device, computer readable storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113051222A true CN113051222A (en) 2021-06-29

Family

ID=76508585

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011629104.0A Pending CN113051222A (en) 2020-12-30 2020-12-30 Log storage method and device, computer readable storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113051222A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115328878A (en) * 2022-10-17 2022-11-11 成都卫士通信息产业股份有限公司 Log data storage system, method, device and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990352A (en) * 2019-12-09 2020-04-10 华青融天(北京)软件股份有限公司 Method and device for determining data extraction rule, computer equipment and medium
CN111444155A (en) * 2020-04-15 2020-07-24 中国银行股份有限公司 Log text processing method and device, electronic equipment and computer storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110990352A (en) * 2019-12-09 2020-04-10 华青融天(北京)软件股份有限公司 Method and device for determining data extraction rule, computer equipment and medium
CN111444155A (en) * 2020-04-15 2020-07-24 中国银行股份有限公司 Log text processing method and device, electronic equipment and computer storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115328878A (en) * 2022-10-17 2022-11-11 成都卫士通信息产业股份有限公司 Log data storage system, method, device and medium
CN115328878B (en) * 2022-10-17 2023-04-07 成都卫士通信息产业股份有限公司 Log data storage system, method, device and medium

Similar Documents

Publication Publication Date Title
US9852041B2 (en) Systems and methods for categorizing exceptions and logs
CN108039959B (en) Data situation perception method, system and related device
EP3425524A1 (en) Cloud platform-based client application data calculation method and device
CN110515912A (en) Log processing method, device, computer installation and computer readable storage medium
CN108509326B (en) Service state statistical method and system based on nginx log
CN112636957B (en) Early warning method and device based on log, server and storage medium
CN112347165B (en) Log processing method and device, server and computer readable storage medium
CN110795756A (en) Data desensitization method and device, computer equipment and computer readable storage medium
CN110147470B (en) Cross-machine-room data comparison system and method
CN112632129A (en) Code stream data management method, device and storage medium
CN112882900B (en) Method and device for recording service data change log
CN112084249A (en) Access record extraction method and device
CN113051222A (en) Log storage method and device, computer readable storage medium and electronic equipment
CN111338888A (en) Data statistical method and device, electronic equipment and storage medium
CN113778810A (en) Log collection method, device and system
KR100984282B1 (en) An enterprise security management system using an memory cache
CN103532737A (en) Method, device and system for processing various types of alarms
CN113297245A (en) Method and device for acquiring execution information
CN107341086B (en) Method and system for monitoring running state of server
CN112347066B (en) Log processing method and device, server and computer readable storage medium
CN108959041B (en) Method for transmitting information, server and computer readable storage medium
CN112346938B (en) Operation auditing method and device, server and computer readable storage medium
CN114969450A (en) User behavior analysis method, device, equipment and storage medium
CN113704203A (en) Log file processing method and device
CN110263082B (en) Data distribution analysis method and device of database, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination