CN113704192A - Log analysis method and device, computer equipment and storage medium - Google Patents

Log analysis method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113704192A
CN113704192A CN202110893584.XA CN202110893584A CN113704192A CN 113704192 A CN113704192 A CN 113704192A CN 202110893584 A CN202110893584 A CN 202110893584A CN 113704192 A CN113704192 A CN 113704192A
Authority
CN
China
Prior art keywords
file
error
information
acquiring
abnormal content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110893584.XA
Other languages
Chinese (zh)
Inventor
陈兴吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Bee Internet Technology Co ltd
Original Assignee
Shenzhen Bee Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Bee Internet Technology Co ltd filed Critical Shenzhen Bee Internet Technology Co ltd
Priority to CN202110893584.XA priority Critical patent/CN113704192A/en
Publication of CN113704192A publication Critical patent/CN113704192A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • G06F16/164File meta data generation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a log analysis method, which classifies intercepted error level logs to obtain custom abnormal content and thrown abnormal content, determines a unified object according to the custom abnormal content and the thrown abnormal content, analyzes the unified object to obtain a source code file, and can determine submission information of the error code line information according to the source code file and the error code line information, wherein the submission information comprises information of a submitter, so that the submission information of the error code can be conveniently positioned by the method, and subsequent information processing is facilitated.

Description

Log analysis method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of log processing, and in particular, to a log analysis method, apparatus, computer device, and storage medium.
Background
In the existing code error analysis method, when a code submitter is located, the number of log stack lines needs to be determined first, and then the log stack lines return to the code to be queried so as to know the code submitter, so that the operation is complex.
Disclosure of Invention
In view of the above, there is a need to provide a log analysis method, apparatus, computer device and storage medium capable of quickly determining a code submitter in response to the above technical problems.
A method of log analysis, the method comprising:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
In one embodiment, the determining a uniform object according to the custom exception class content and the thrown exception class content includes:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
In one embodiment, the parsing the unified object to obtain the source code file includes:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
In one embodiment, the obtaining the corresponding file code according to the file identifier includes:
acquiring corresponding address information according to the file identification;
and acquiring the file code through the address information.
In one embodiment, the determining the submission information of the error code line information according to the source code file and the error code line information includes:
acquiring submission information of each line in the source code file according to a preset tool;
and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
A log analysis device, the device comprising:
the classification module is used for classifying the intercepted error level logs to obtain custom abnormal content and throw-out abnormal content;
the object determining module is used for determining a uniform object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
the analysis module is used for analyzing the unified object to obtain a source code file;
and the submission information determining module is used for determining the submission information of the error code line information according to the source code file and the error code line information.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
The log analysis method, the log analysis device, the computer equipment and the storage medium classify the intercepted error level logs to obtain the self-defined abnormal content and the thrown abnormal content, determine the unified object according to the self-defined abnormal content and the thrown abnormal content, analyze the unified object, obtain the source code file, and determine the submission information of the error code line information according to the source code file and the error code line information, wherein the submission information comprises the information of a submitter, so that the submission information of the error code can be conveniently positioned by the method, and the subsequent information processing is convenient.
Drawings
FIG. 1 is a schematic flow chart diagram of a method for log analysis in one embodiment;
FIG. 2 is a block diagram showing the structure of a log analysis device according to an embodiment;
FIG. 3 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
In an embodiment, as shown in fig. 1, a log analysis method is provided, which specifically includes the following steps:
step S10: classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
in the embodiment of the present application, the log level includes Debug, Info, Warn, Error, and Fatal. The Error level log in this application denotes Error. Optionally, the Error level log includes Error and Fatal.
In the embodiment of the application, an interceptor TurboFilter is preset, and the interceptor can intercept all logs, wherein the interceptor can be used for intercepting the error level logs from log data and classifying the error level logs.
In the embodiment of the application, the error level logs are classified to obtain abnormal business content and non-abnormal business content, the abnormal business content is further analyzed, and the abnormal business content is divided into custom abnormal content and thrown abnormal content according to whether the abnormal business content is thrawable or not.
Step S11: determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
the unified object field contains current file identification (which may be a project name), error class packet path, error classification, exception type, request information (obtained from a stack), exception content, exception line number, and error method name.
Optionally, in step S11, determining a unified object according to the custom exception class content and the thrown exception class content, including:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
In the embodiment of the application, if the abnormal content is customized, the printing stack is obtained from the current thread; and if the abnormal content is thrown out, acquiring an abnormal position error stack. The print stack and the exception location error stack are assembled into a unified object.
Step S12: analyzing the unified object to obtain a source code file;
in the embodiment of the application, after the business system determines the uniform object, the business system asynchronously transmits the uniform object to the analysis system in a thread pool creating mode. And the analysis system analyzes the unified object to obtain a source code file.
Optionally, step S12 is to parse the uniform object, and obtain a source code file, where the step includes:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
In the embodiment of the application, corresponding address information is obtained according to the file identifier; and acquiring the file code through the address information.
In the embodiment of the application, address information corresponding to the file identifier is configured in the mysql table in advance, and the address information comprises a git address and a login credential. The analysis system analyzes the uniform object to obtain a file identifier, obtains the git address and the certificate through the file identifier, and then obtains a file code from the git private server according to the git address and the certificate, wherein the file code is stored on the git private server.
And after the file code is pulled, storing the file code in a specified directory.
Step S13: and determining the submission information of the error code line information according to the source code file and the error code line information.
Optionally, the step S13 determines, according to the source code file and the error code line information, submission information of the error code line information, including:
acquiring submission information of each line in the source code file according to a preset tool;
and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
In the embodiment of the application, the error package path in the unified object is used for finding the source code file corresponding to the file code, and the source code file is used for analyzing the code submission information. And acquiring the submission information of each line in the source code file by using a jgit blamt method, unifying the error code line information in the object, and comparing the error code line information with the submission information of each line in the source code file, so that the submission information of the error code line information can be obtained.
The log analysis method comprises the steps of classifying intercepted error level logs to obtain custom abnormal content and thrown abnormal content, determining a unified object according to the custom abnormal content and the thrown abnormal content, analyzing the unified object to obtain a source code file, and determining submission information of the error code line information according to the source code file and the error code line information, wherein the submission information comprises information of a submitter.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 1 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 2, there is provided a log analyzing apparatus including: a classification module 20, an object determination module 21, an analysis module 22, and a submission information determination module 23, wherein:
a classification module 20, configured to classify the intercepted error level log to obtain a user-defined abnormal content and a thrown abnormal content;
an object determining module 21, configured to determine a unified object according to the custom exception content and the thrown exception content; the unified object comprises error code line information;
the analysis module 22 is used for analyzing the unified object to obtain a source code file;
and a submission information determining module 23, configured to determine, according to the source code file and the error code line information, submission information of the error code line information.
In one embodiment, the object determining module 21 is configured to, if the content is the custom exception type content, obtain a print stack from a current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack; and determining the unified object according to the printing stack and/or the abnormal position error stack.
In an embodiment, the parsing module 22 is configured to parse the uniform object to obtain a file identifier; acquiring a corresponding file code according to the file identifier; and acquiring a source code file corresponding to the file code.
In an embodiment, the parsing module 22 is further configured to obtain corresponding address information according to the file identifier; and acquiring the file code through the address information.
In an embodiment, the submission-information determining module 23 is configured to obtain submission information of each line in the source code file according to a preset tool; and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
For the specific limitations of the log analysis device, reference may be made to the above limitations of the log analysis method, which are not described herein again. The modules in the log analysis device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 3. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a log analysis method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, can also be an external keyboard, a touch pad or a mouse and the like, and can also be an interface, the interface is connected with an external device, and data sent by the external device is sent to a processor of the computer and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 3 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring corresponding address information according to the file identification;
and acquiring the file code through the address information.
In one embodiment, the processor, when executing the computer program, further performs the steps of:
acquiring submission information of each line in the source code file according to a preset tool;
and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
In one embodiment, the computer program when executed by the processor further performs the steps of:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring corresponding address information according to the file identification;
and acquiring the file code through the address information.
In one embodiment, the computer program when executed by the processor further performs the steps of:
acquiring submission information of each line in the source code file according to a preset tool;
and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method of log analysis, the method comprising:
classifying the intercepted error level logs to obtain user-defined abnormal content and thrown abnormal content;
determining a unified object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
analyzing the unified object to obtain a source code file;
and determining the submission information of the error code line information according to the source code file and the error code line information.
2. The log analysis method of claim 1, wherein determining a uniform object according to the custom exception class content and the thrown exception class content comprises:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
3. The log analysis method of claim 1, wherein parsing the unified object to obtain a source code file comprises:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
4. The log analysis method according to claim 3, wherein the obtaining of the corresponding file code according to the file identifier comprises:
acquiring corresponding address information according to the file identification;
and acquiring the file code through the address information.
5. The log analysis method of claim 1, wherein the determining the commit information of the error code line information according to the source code file and the error code line information comprises:
acquiring submission information of each line in the source code file according to a preset tool;
and determining the submission information of the error code line information according to the submission information of each line in the source code file and the error code line information.
6. An apparatus for log analysis, the apparatus comprising:
the classification module is used for classifying the intercepted error level logs to obtain custom abnormal content and throw-out abnormal content;
the object determining module is used for determining a uniform object according to the user-defined abnormal content and the thrown abnormal content; the unified object comprises error code line information;
the analysis module is used for analyzing the unified object to obtain a source code file;
and the submission information determining module is used for determining the submission information of the error code line information according to the source code file and the error code line information.
7. The log analysis device of claim 6, wherein the object determination module is to:
if the custom abnormal content is the custom abnormal content, acquiring a printing stack from the current thread; if the abnormal content is thrown out, acquiring an abnormal position error stack;
and determining the unified object according to the printing stack and/or the abnormal position error stack.
8. The log analysis method of claim 6, wherein the parsing module is configured to:
analyzing the unified object to obtain a file identifier;
acquiring a corresponding file code according to the file identifier;
and acquiring a source code file corresponding to the file code.
9. A computer device comprising a memory and a processor, the memory having stored thereon a computer program operable on the processor, wherein the processor, when executing the computer program, performs the steps of the method of any of claims 1 to 5.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202110893584.XA 2021-08-04 2021-08-04 Log analysis method and device, computer equipment and storage medium Pending CN113704192A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110893584.XA CN113704192A (en) 2021-08-04 2021-08-04 Log analysis method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110893584.XA CN113704192A (en) 2021-08-04 2021-08-04 Log analysis method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113704192A true CN113704192A (en) 2021-11-26

Family

ID=78651625

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110893584.XA Pending CN113704192A (en) 2021-08-04 2021-08-04 Log analysis method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113704192A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528316A (en) * 2016-11-10 2017-03-22 霍尔果斯霹雳互动网络科技有限公司 Anti-crash method and system of online game server
US20190188070A1 (en) * 2017-12-15 2019-06-20 Wipro Limited Method and system for resolving error in open stack operating system
CN113010401A (en) * 2019-12-19 2021-06-22 广州凡科互联网科技股份有限公司 SSM system-based exception capture processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106528316A (en) * 2016-11-10 2017-03-22 霍尔果斯霹雳互动网络科技有限公司 Anti-crash method and system of online game server
US20190188070A1 (en) * 2017-12-15 2019-06-20 Wipro Limited Method and system for resolving error in open stack operating system
CN113010401A (en) * 2019-12-19 2021-06-22 广州凡科互联网科技股份有限公司 SSM system-based exception capture processing method

Similar Documents

Publication Publication Date Title
CN109446068B (en) Interface test method, device, computer equipment and storage medium
CN109474578B (en) Message checking method, device, computer equipment and storage medium
CN108446116B (en) Application program page generation method and device, computer equipment and storage medium
CN110647438B (en) Event monitoring method and device, computer equipment and storage medium
CN110290212B (en) Service call recording method, device, computer equipment and storage medium
CN110209652B (en) Data table migration method, device, computer equipment and storage medium
CN110008455B (en) Table editing method, apparatus, computer device and storage medium
CN109766256B (en) Method and device for testing H5 page performance in application program and computer equipment
CN108427613B (en) Abnormal interface positioning method and device, computer equipment and storage medium
CN109753418B (en) Performance test method and device, computer equipment and storage medium
CN107329894B (en) Application program system testing method and device and electronic equipment
CN109039751B (en) Method, device, computer equipment and storage medium for configuring route
CN108256322B (en) Security testing method and device, computer equipment and storage medium
CN110781070A (en) Big data test verification method and device, computer equipment and storage medium
WO2019071891A1 (en) Code coverage analysis method and application server
CN109766483B (en) Regular expression generation method, device, computer equipment and storage medium
CN110727567A (en) Software quality detection method and device, computer equipment and storage medium
CN111475376A (en) Method and device for processing test data, computer equipment and storage medium
CN111290919A (en) Log file generation method and device, computer equipment and storage medium
CN113472803A (en) Vulnerability attack state detection method and device, computer equipment and storage medium
CN111324375A (en) Code management method and device, computer equipment and storage medium
CN110516172B (en) Resource calling method and device, computer equipment and storage medium
CN110231921B (en) Log printing method, device, equipment and computer readable storage medium
CN113704192A (en) Log analysis method and device, computer equipment and storage medium
CN108667919B (en) Data processing method, data processing device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination