CN113760652A - Method, system, device and storage medium for full link monitoring based on application - Google Patents

Method, system, device and storage medium for full link monitoring based on application Download PDF

Info

Publication number
CN113760652A
CN113760652A CN202110929024.5A CN202110929024A CN113760652A CN 113760652 A CN113760652 A CN 113760652A CN 202110929024 A CN202110929024 A CN 202110929024A CN 113760652 A CN113760652 A CN 113760652A
Authority
CN
China
Prior art keywords
application
link
monitoring
relation
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110929024.5A
Other languages
Chinese (zh)
Other versions
CN113760652B (en
Inventor
郭涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Inspur Data Technology Co Ltd
Original Assignee
Jinan Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Inspur Data Technology Co Ltd filed Critical Jinan Inspur Data Technology Co Ltd
Priority to CN202110929024.5A priority Critical patent/CN113760652B/en
Publication of CN113760652A publication Critical patent/CN113760652A/en
Application granted granted Critical
Publication of CN113760652B publication Critical patent/CN113760652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Evolutionary Computation (AREA)
  • Evolutionary Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Artificial Intelligence (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method, a system, equipment and a storage medium for full link monitoring based on application, wherein the method comprises the following steps: creating a plurality of applications according to the service type, and adding all resources related to the applications in each application; analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and in response to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level. According to the invention, all resources related to the application are added into the application, so that a user can check the monitoring information of all resources related to the application through the application, the integrity is better, the data splitting is avoided, and the application is easier.

Description

Method, system, device and storage medium for full link monitoring based on application
Technical Field
The present invention relates to the field of data monitoring, and more particularly, to a method, system, device and storage medium for full link monitoring based on applications.
Background
With the development of cloud computing, in the last decade, the traditional data center of a user gradually migrates into a cloud computing environment, and application deployment also gradually migrates from a traditional physical machine into a virtualization environment, wherein a virtual machine and a container are two popular virtualization modes at present. After the application is migrated to the cloud, the performance index of the application needs to be monitored by means of monitoring and operation and maintenance capabilities, so that the running condition of the application can be known in time. However, with the technology changing day by day, the middleware and the database are more and more diversified, and higher requirements are also put forward on the overall monitoring of the application, a large-scale enterprise user system can be dozens of or even hundreds of, and the diversified application monitoring operation and maintenance becomes urgent requirements.
The existing monitoring operation and maintenance system basically monitors according to the visual angle of resources, monitoring data are split, the whole application system cannot be effectively monitored and analyzed on the whole, the position of the application system with a fault cannot be positioned on the whole, and therefore the monitoring significance is lost.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, a system, a computer device, and a computer-readable storage medium for full link monitoring based on an application, in which all resources related to the application are added to the application, so that a user can check monitoring information of all resources related to the application through the application, and the method and the system have better integrity, avoid data fragmentation, and are easier to use.
Based on the above object, an aspect of the embodiments of the present invention provides a method for monitoring a full link based on an application, including the following steps: creating a plurality of applications according to the service type, and adding all resources related to the applications in each application; analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and in response to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level.
In some embodiments, the monitoring, by the proxy service, the resource usage of each link in the topology graph includes: and acquiring an installation directory of the target link, and adding an agent in the installation directory.
In some embodiments, the method further comprises: and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
In some embodiments, the method further comprises: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In another aspect of the embodiments of the present invention, a system for monitoring a full link based on an application is provided, including: the system comprises a creating module, a processing module and a processing module, wherein the creating module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application; the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation; the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service, and judge whether the flow of the link exceeds a threshold value or the calling link relation fails; and the alarm module is configured to respond to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarm by adopting a corresponding alarm mode according to the abnormal level.
In some embodiments, the monitoring module is configured to: and acquiring an installation directory of the target link, and adding an agent in the installation directory.
In some embodiments, the system further comprises an acquisition module configured to: and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
In some embodiments, the system further comprises an optimization module configured to: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In another aspect of the embodiments of the present invention, there is also provided a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of the method as above.
In a further aspect of the embodiments of the present invention, a computer-readable storage medium is also provided, in which a computer program for implementing the above method steps is stored when the computer program is executed by a processor.
The invention has at least the following beneficial technical effects:
(1) all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, the data splitting is avoided, and the application is easier;
(2) the service, the application database and the middleware are monitored by a non-intrusive technology, so that the all-around monitoring of the application is really realized, the fault frequency of a digital system is reduced, the flow bottleneck is found in advance, and the processing and troubleshooting efficiency is improved;
(3) analyzing the behavior of the user from the application perspective, counting the frequently accessed functions of the user on the basis of the operation logs and the number of the accessed application program interfaces, providing a hotspot function view for developers, and providing help for further analyzing the system performance and improving the system usability and stability;
(4) the log collection function can collect all logs of the components and the services related to the application, automatically classify the applications, and facilitate user viewing and function troubleshooting after classification.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained by using the drawings without creative efforts.
FIG. 1 is a schematic diagram of an embodiment of a method for application-based full link monitoring provided by the present invention;
FIG. 2 is a schematic diagram of an embodiment of a system for application-based full link monitoring provided by the present invention;
FIG. 3 is a schematic hardware structure diagram of an embodiment of a computer device for full link monitoring based on an application provided in the present invention;
FIG. 4 is a schematic diagram of an embodiment of a computer storage medium for application-based full link monitoring provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are merely for convenience of description and should not be construed as limitations of the embodiments of the present invention, and they are not described in any more detail in the following embodiments.
In a first aspect of the embodiments of the present invention, an embodiment of a method for full link monitoring based on an application is provided. Fig. 1 is a schematic diagram illustrating an embodiment of a method for full link monitoring based on an application according to the present invention. As shown in fig. 1, the embodiment of the present invention includes the following steps:
s1, creating a plurality of applications according to the service types, and adding all resources related to the applications in each application;
s2, analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation;
s3, monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and
and S4, responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and adopting a corresponding alarm mode to alarm according to the abnormal level.
The embodiment provides application management capability, and an application represents an application system, and the application system comprises one or a group of virtual machines for deploying the application, middleware, a database and the like for deploying the application. Besides, the application also includes the services of the application system itself, such as the development service of the front end, and the microservice system developed by using the currently popular microservice framework, such as the microservice constructed by using springCloud.
The embodiment provides the monitoring operation and maintenance capacity of the database and the middleware, and realizes the data acquisition of the database and the middleware through the plug-in agent. Besides the database and the middleware, plug-in agent installation can be carried out on the business system written by java or python, and monitoring analysis of the business layer is realized after installation.
The embodiment provides the user behavior analysis capability, and the high-frequency operation of the user can be reversely inferred through the analysis of an Application Programming Interface (API) call chain, so that the use habit of the user can be counted after the system is formally online, and the high-frequency operation can be considered in the later period to perform key development and optimization so as to further perfect the product.
The embodiment provides the log collection capability, the logs of the whole application system can be collected in an application angle, the logs are prevented from being lost after the application is down, and the logs can be further analyzed when the system has problems, so that the safety of the whole system is enhanced.
Creating a plurality of applications according to the service type, and adding all resources related to the applications in each application. An application system is a view presentation, and a user can create an application and indicate the name of the application. Virtual machines, containers, etc. associated with the application, including middleware, databases, etc., may be added to the application system, i.e., all components associated with the entire application system may be added to the application. This process is manually assured and maintained by developers. When the application is deleted, the application itself is only deleted, resources such as a virtual machine related to the application cannot be automatically deleted, and if synchronous deletion is desired, synchronous deletion resources need to be selected when the synchronous deletion is performed.
And analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation. The generation of the topological graph uses an automatic topological generation technology based on a call chain, and the technology can automatically form a topological graph through automatically analyzing the call chain relation of a background. The topological graph can visually show the calling relation of the whole system, and the relation between services.
And monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails. After a user clicks one application, the user enters the details of the application, and not only the monitoring information of a medium (virtual machine) for deploying the application, including, for example, CPU memory disk IO (input/output) and network IO, etc., but also the entire link information of the application is shown in the details, and the link information is shown in a form of a topological graph.
In some embodiments, the monitoring, by the proxy service, the resource usage of each link in the topology graph includes: and acquiring an installation directory of the target link, and adding an agent in the installation directory.
In the embodiment, a pinpoint-based automatic installation agent service link monitoring technology is adopted, the technology is compatible with a plurality of byte code operation technology probes of CGLIB, Java Javassist and ASM, the health detection of an application probe is supported, and functions of non-invasive call chain monitoring, method execution detail checking, application state information monitoring and the like are provided. At present, pinpoint is a mature technology, and the reason for selecting pinpoint as a basis is that the pinpoint supports rich components and mature technologies, but the injection of pinpoint is different for each application, and the configuration is complex and difficult to use. According to the method, while pinpoint is supported, agent installation is automated, a plurality of plug-ins are arranged in the system, and research personnel can click to download and then install the plug-ins, so that the agent can be installed in the component. Taking tomcat as an example for explanation, if a user wants to perform link tracking on tomcat, the system will automatically identify the installation directory of tomcat after clicking download, and find the start script of tomcat, and add support for the agent in the script, as follows:
profiler.collector.ip=pinpointserver_IP
CATALINA_OPTS="$CATALINA_OPTS-javaagent:/data/pp-agent/pinpoint-bootstrap-1.5.2.jar"
CATALINA_OPTS="$CATALINA_OPTS-Dpinpoint.agentId=XXXXX"
CATALINA_OPTS="$CATALINA_OPTS-Dpinpoint.applicationName=XXXX
and then restarting tomcat to realize the link monitoring of tomcat. The system is internally provided with the support of the components such as springBoot, mysql, python and the like, and great convenience is brought to the development and use of users.
And in response to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level. When the flow of a certain link is large or the calling relation fails, a link failure or congestion prompt is given, an alarm is generated, and a user can know the application risk in time. And, different alarm modes can be adopted according to the abnormal grade, for example, when the abnormal grade is lower, only an alarm can be sent out, and when the abnormal grade is higher, the alarm can be sent out, and the user can be informed in a short message mode, a telephone mode and the like.
In some embodiments, the method further comprises: and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
The log collection and storage can provide later analysis for developers, and after the system is down, the log collection and storage can be reserved as evidence for debugging analysis. The log collection in this embodiment adopts a architecture scheme of filebeat + logstack + ES, which is common in the industry, and the scheme is developed in the industry more mature. The optimization point of this embodiment is that an interface configuration is made for each service log acquisition, and a user does not need to enter each service, change the acquisition catalog of the filebeat, and the like, and only needs to fill the acquisition catalog in the interface, and can automatically issue the configuration to the filebeat. In addition, the logs are displayed by taking the application as a unit, most of log collection schemes in the industry are completely stored in the ES for word segmentation and the like, and if the users want to inquire and search, the users are very inconvenient.
In some embodiments, the method further comprises: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
The embodiment provides a behavior analysis method based on combination of a user operation log and an access interface. The operation log in this embodiment records information such as time, success or failure, operation object, operation behavior, description, and the like of a function operated by a user in detail. Each operation corresponds to an operation code, the background can perform uniqueness recognition on the operation according to the operation code, high-frequency behaviors of the user can be counted through statistical analysis, and a typical operation scene of the user is analyzed in combination with the context of the operation behaviors. In addition, statistics can be performed by combining with background access application program interfaces, and the application program interface statistics mainly include the operating frequency of each application program interface and the average response time of the application program interfaces. By combining the two interfaces, the daily operation of the user and the corresponding background interface can be analyzed, and further optimization can be performed on the functions of the system on the basis of the daily operation and the corresponding background interface. The performance and stability of the product are continuously improved, and the competitiveness of the product is improved.
In the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, the data splitting is avoided, and the application is easier; the embodiment realizes the monitoring of the service, the application database and the middleware through a non-intrusive technology, can really realize the all-around monitoring of the application, reduces the fault frequency of a digital system, finds the flow bottleneck in advance, and improves the processing and troubleshooting efficiency; the embodiment analyzes the user behavior from the application view, counts the frequently accessed functions of the user on the basis of the operation logs and the number of the accessed application program interfaces, provides a hotspot function view for developers, and provides help for further analyzing the system performance and improving the system usability and stability; the log collection function of the embodiment can collect all logs of the components and the services related to the application, automatically classify the applications, and facilitate user viewing and function investigation after classification.
It should be particularly noted that, the steps in the embodiments of the method for application-based full link monitoring described above can be mutually intersected, replaced, added, and deleted, so that these reasonable permutation and combination transformations for the method for application-based full link monitoring also belong to the scope of the present invention, and should not limit the scope of the present invention to the embodiments.
In view of the above, a second aspect of the embodiments of the present invention provides a system for full link monitoring based on applications. As shown in fig. 2, the system 200 includes the following modules: the system comprises a creating module, a processing module and a processing module, wherein the creating module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application; the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation; the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service, and judge whether the flow of the link exceeds a threshold value or the calling link relation fails; and the alarm module is configured to respond to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarm by adopting a corresponding alarm mode according to the abnormal level.
In some embodiments, the monitoring module is configured to: and acquiring an installation directory of the target link, and adding an agent in the installation directory.
In some embodiments, the system further comprises an acquisition module (not shown in the figures) configured to: and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
In some embodiments, the system further comprises an optimization module (not shown in the figures) configured to: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, the data splitting is avoided, and the application is easier; the embodiment at least realizes the monitoring of the service, the application database and the middleware through a non-intrusive technology, can really realize the all-around monitoring of the application, reduces the fault frequency of a digital system, finds the flow bottleneck in advance, and improves the processing and troubleshooting efficiency; the embodiment analyzes the user behavior from the application view, counts the frequently accessed functions of the user on the basis of the operation logs and the number of the accessed application program interfaces, provides a hotspot function view for developers, and provides help for further analyzing the system performance and improving the system usability and stability; the log collection function of the embodiment can collect all logs of the components and the services related to the application, automatically classify the applications, and facilitate user viewing and function investigation after classification.
In view of the above object, a third aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, creating a plurality of applications according to the service types, and adding all resources related to the applications in each application; s2, analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; s3, monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and S4, in response to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level.
In some embodiments, the monitoring, by the proxy service, the resource usage of each link in the topology graph includes: and acquiring an installation directory of the target link, and adding an agent in the installation directory.
In some embodiments, the steps further comprise: and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
In some embodiments, the steps further comprise: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, data splitting is avoided, and the application is easier; the embodiment can also realize the monitoring of the service, the application database and the middleware through a non-intrusive technology, really realize the all-around monitoring of the application, reduce the fault frequency of a digital system, discover the flow bottleneck in advance and improve the processing and troubleshooting efficiency; the embodiment analyzes the user behavior from the application view, counts the frequently accessed functions of the user on the basis of the operation logs and the number of the accessed application program interfaces, provides a hotspot function view for developers, and provides help for further analyzing the system performance and improving the system usability and stability; the log collection function of the embodiment can collect all logs of the components and the services related to the application, automatically classify the applications, and facilitate user viewing and function investigation after classification.
Fig. 3 is a schematic hardware structural diagram of an embodiment of the computer device for full link monitoring based on application provided in the present invention.
Taking the device shown in fig. 3 as an example, the device includes a processor 301 and a memory 302.
The processor 301 and the memory 302 may be connected by a bus or other means, such as the bus connection in fig. 3.
The memory 302, which is a non-volatile computer-readable storage medium, may be used for storing non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the method for application-based full link monitoring in the embodiments of the present application. The processor 301 executes various functional applications of the server and data processing by running nonvolatile software programs, instructions and modules stored in the memory 302, i.e. implements the method of application-based full link monitoring of the above-described method embodiments.
The memory 302 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to the use of the application-based full link monitoring method, and the like. Further, the memory 302 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 302 optionally includes memory located remotely from processor 301, which may be connected to a local module via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Computer instructions 303 corresponding to one or more methods of application-based full link monitoring are stored in the memory 302 and when executed by the processor 301 perform the method of application-based full link monitoring in any of the method embodiments described above.
Any embodiment of a computer device implementing the method for application-based full link monitoring described above may achieve the same or similar effects as any of the preceding method embodiments corresponding thereto.
The present invention also provides a computer readable storage medium storing a computer program which, when executed by a processor, performs the method of application-based full link monitoring as described above.
Fig. 4 is a schematic diagram of an embodiment of the computer storage medium for full link monitoring based on applications according to the present invention. Taking the computer storage medium as shown in fig. 4 as an example, the computer readable storage medium 401 stores a computer program 402 which, when executed by a processor, performs the method as described above.
Finally, it should be noted that, as one of ordinary skill in the art can appreciate that all or part of the processes of the methods of the above embodiments can be implemented by a computer program to instruct related hardware, and the program of the method for full link monitoring based on an application can be stored in a computer readable storage medium, and when executed, the program can include the processes of the embodiments of the methods described above. The storage medium of the program may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like. The embodiments of the computer program may achieve the same or similar effects as any of the above-described method embodiments.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant to be exemplary only, and is not intended to intimate that the scope of the disclosure, including the claims, of embodiments of the invention is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A method for monitoring a full link based on an application is characterized by comprising the following steps:
creating a plurality of applications according to the service type, and adding all resources related to the applications in each application;
analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation;
monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and
and in response to the fact that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level.
2. The method of claim 1, wherein monitoring resource usage of each link in the topology graph by a proxy service comprises:
and acquiring an installation directory of the target link, and adding an agent in the installation directory.
3. The method of claim 1, further comprising:
and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
4. The method of claim 3, further comprising:
and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
5. A system for application-based full link monitoring, comprising:
the system comprises a creating module, a processing module and a processing module, wherein the creating module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application;
the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation;
the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service, and judge whether the flow of the link exceeds a threshold value or the calling link relation fails; and
and the alarm module is configured to respond to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarm by adopting a corresponding alarm mode according to the abnormal level.
6. The system of claim 5, wherein the monitoring module is configured to:
and acquiring an installation directory of the target link, and adding an agent in the installation directory.
7. The system of claim 5, further comprising an acquisition module configured to:
and setting the collection of the service logs into an interface configuration, and filling a collection catalog in the interface to collect the logs of the target object.
8. The system of claim 7, further comprising an optimization module configured to:
and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
9. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, the instructions when executed by the processor implementing the steps of the method of any one of claims 1 to 4.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
CN202110929024.5A 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application Active CN113760652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110929024.5A CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110929024.5A CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Publications (2)

Publication Number Publication Date
CN113760652A true CN113760652A (en) 2021-12-07
CN113760652B CN113760652B (en) 2023-12-26

Family

ID=78789225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110929024.5A Active CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Country Status (1)

Country Link
CN (1) CN113760652B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114328139A (en) * 2021-12-17 2022-04-12 江苏银承网络科技股份有限公司 Monitoring method and device for hall interface, storage medium and server
CN114826864A (en) * 2022-03-11 2022-07-29 阿里巴巴(中国)有限公司 Architecture determination method and apparatus for application system, electronic device, and computer-readable storage medium
CN116737514A (en) * 2023-08-15 2023-09-12 南京国睿信维软件有限公司 Automatic operation and maintenance method based on log and probe analysis

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224445A (en) * 2015-10-28 2016-01-06 北京汇商融通信息技术有限公司 Distributed tracking system
WO2018137254A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Call chain-based concurrency control method, device, and control node
CN109873717A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Monitoring method, device, computer equipment and storage medium
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
WO2020220638A1 (en) * 2019-04-29 2020-11-05 平安科技(深圳)有限公司 Method and apparatus for associating link system with log system, and storage medium
CN112346930A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Method and system for monitoring full link based on CAT
CN112596974A (en) * 2020-12-10 2021-04-02 长沙市到家悠享网络科技有限公司 Full link monitoring method, device, equipment and storage medium
CN112653586A (en) * 2019-10-12 2021-04-13 苏州工业园区测绘地理信息有限公司 Time-space big data platform application performance management method based on full link monitoring

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224445A (en) * 2015-10-28 2016-01-06 北京汇商融通信息技术有限公司 Distributed tracking system
WO2018137254A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Call chain-based concurrency control method, device, and control node
CN109873717A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Monitoring method, device, computer equipment and storage medium
WO2020147419A1 (en) * 2019-01-18 2020-07-23 深圳壹账通智能科技有限公司 Monitoring method and apparatus, computer device and storage medium
WO2020220638A1 (en) * 2019-04-29 2020-11-05 平安科技(深圳)有限公司 Method and apparatus for associating link system with log system, and storage medium
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
CN112653586A (en) * 2019-10-12 2021-04-13 苏州工业园区测绘地理信息有限公司 Time-space big data platform application performance management method based on full link monitoring
CN112346930A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Method and system for monitoring full link based on CAT
CN112596974A (en) * 2020-12-10 2021-04-02 长沙市到家悠享网络科技有限公司 Full link monitoring method, device, equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JUN HAN等: "Research on Network Traffic Anomaly Detection Based on Stream Characteristics in Unsaturated Link", 2019 IEEE 4TH INTERNATIONAL CONFERENCE ON ADVANCED ROBOTICS AND MECHATRONICS (ICARM) *
刘霞霞;高阿朋;任春雷;文建军;史金奇;: "一种基于APM应用全链路监控工具设计", 网络安全技术与应用, no. 06 *
郑邦峰;: "分布式系统服务链追踪与监控", 工业技术创新, no. 02 *
郭杰;王磊;王建纲;: "一种云环境下分布式应用业务态势感知系统设计方法", 冶金自动化, no. 04 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114328139A (en) * 2021-12-17 2022-04-12 江苏银承网络科技股份有限公司 Monitoring method and device for hall interface, storage medium and server
CN114826864A (en) * 2022-03-11 2022-07-29 阿里巴巴(中国)有限公司 Architecture determination method and apparatus for application system, electronic device, and computer-readable storage medium
CN116737514A (en) * 2023-08-15 2023-09-12 南京国睿信维软件有限公司 Automatic operation and maintenance method based on log and probe analysis
CN116737514B (en) * 2023-08-15 2023-12-22 南京国睿信维软件有限公司 Automatic operation and maintenance method based on log and probe analysis

Also Published As

Publication number Publication date
CN113760652B (en) 2023-12-26

Similar Documents

Publication Publication Date Title
CN113760652B (en) Method, system, device and storage medium for full link monitoring based on application
US20180365085A1 (en) Method and apparatus for monitoring client applications
CN105743730B (en) The method and its system of real time monitoring are provided for the web service of mobile terminal
CN107704360B (en) Monitoring data processing method, equipment, server and storage medium
CN114363042B (en) Log analysis method, device, equipment and readable storage medium
US20110239050A1 (en) System and Method of Collecting and Reporting Exceptions Associated with Information Technology Services
CN105589782A (en) User behavior collection method based on browser
CN111382023A (en) Code fault positioning method, device, equipment and storage medium
WO2022063032A1 (en) Distributed system-oriented fault information association reporting method, and related device
US20230214229A1 (en) Multi-tenant java agent instrumentation system
CN112069049A (en) Data monitoring management method and device, server and readable storage medium
CN116107846A (en) Linux system event monitoring method and device based on EBPF
WO2015187001A2 (en) System and method for managing resources failure using fast cause and effect analysis in a cloud computing system
CN111339466A (en) Interface management method and device, electronic equipment and readable storage medium
CN115729727A (en) Fault repairing method, device, equipment and medium
CN112149975B (en) APM monitoring system and method based on artificial intelligence
US10644971B2 (en) Graph search in structured query language style query
US20180314765A1 (en) Field name recommendation
CN108959041B (en) Method for transmitting information, server and computer readable storage medium
CN111698109A (en) Method and device for monitoring log
CN114816914A (en) Data processing method, equipment and medium based on Kubernetes
CN114138720A (en) Log processing method, log processing device, electronic device and storage medium
CN113765717A (en) Operation and maintenance management system based on secret-related special computing platform
CN113824601A (en) Electric power marketing monitored control system based on service log
CN113282557A (en) Big data log analysis method and system based on Spring framework

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant