CN113760652B - Method, system, device and storage medium for full link monitoring based on application - Google Patents

Method, system, device and storage medium for full link monitoring based on application Download PDF

Info

Publication number
CN113760652B
CN113760652B CN202110929024.5A CN202110929024A CN113760652B CN 113760652 B CN113760652 B CN 113760652B CN 202110929024 A CN202110929024 A CN 202110929024A CN 113760652 B CN113760652 B CN 113760652B
Authority
CN
China
Prior art keywords
application
link
monitoring
relation
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110929024.5A
Other languages
Chinese (zh)
Other versions
CN113760652A (en
Inventor
郭涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan Inspur Data Technology Co Ltd
Original Assignee
Jinan Inspur Data Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan Inspur Data Technology Co Ltd filed Critical Jinan Inspur Data Technology Co Ltd
Priority to CN202110929024.5A priority Critical patent/CN113760652B/en
Publication of CN113760652A publication Critical patent/CN113760652A/en
Application granted granted Critical
Publication of CN113760652B publication Critical patent/CN113760652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a method, a system, equipment and a storage medium for full link monitoring based on application, wherein the method comprises the following steps: creating a plurality of applications according to service types, and adding all resources related to the applications in each application; analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarming by adopting a corresponding alarming mode according to the abnormal level. According to the invention, all resources related to the application are added into the application, so that a user can check the monitoring information of all resources related to the application through the application, the integrity is better, the data rupture is avoided, and the application is easier to use.

Description

Method, system, device and storage medium for full link monitoring based on application
Technical Field
The present invention relates to the field of data monitoring, and more particularly, to a method, system, device, and storage medium for application-based full link monitoring.
Background
With the development of cloud computing, in the last decade, a user's traditional data center gradually migrates into a cloud computing environment, and application deployment also gradually migrates from a traditional physical machine into a virtualized environment, with virtual machines and containers being two virtualization approaches that are currently popular. After the application is migrated to the cloud, the performance index of the application needs to be monitored by means of monitoring and operation and maintenance capabilities so as to know the running condition of the application in time. However, with the technological change, middleware and databases are more and more diversified, and higher requirements are also put forward on the overall monitoring of applications, and a large enterprise user system may be up to tens or hundreds, so that the operation and maintenance of diverse application monitoring becomes an urgent requirement.
The existing monitoring operation and maintenance system basically monitors according to the view angle of resources, the monitoring data are split, the whole application system cannot be effectively monitored and analyzed on the whole, the position of the failure of the application system cannot be integrally positioned, and therefore the monitoring significance is lost.
Disclosure of Invention
In view of this, an object of the embodiments of the present invention is to provide a method, a system, a computer device and a computer readable storage medium for full link monitoring based on an application.
Based on the above object, an aspect of the embodiments of the present invention provides a method for full link monitoring based on application, including the following steps: creating a plurality of applications according to service types, and adding all resources related to the applications in each application; analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarming by adopting a corresponding alarming mode according to the abnormal level.
In some embodiments, the monitoring, by a proxy service, resource usage of each link in the topology graph includes: and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
In some embodiments, the method further comprises: and setting the acquisition of the service log into an interface configuration, and acquiring the log of the target object by filling an acquisition catalog in an interface.
In some embodiments, the method further comprises: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In another aspect of the embodiments of the present invention, there is provided a system for application-based full link monitoring, including: the creation module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application; the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation; the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service and judge whether the flow of the link exceeds a threshold value or the call link relation fails; and the alarm module is configured to respond to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarm is carried out by adopting a corresponding alarm mode according to the abnormal level.
In some embodiments, the monitoring module is configured to: and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
In some embodiments, the system further comprises an acquisition module configured to: and setting the acquisition of the service log into an interface configuration, and acquiring the log of the target object by filling an acquisition catalog in an interface.
In some embodiments, the system further comprises an optimization module configured to: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
In yet another aspect of the embodiment of the present invention, there is also provided a computer apparatus, including: at least one processor; and a memory storing computer instructions executable on the processor, which when executed by the processor, perform the steps of the method as above.
In yet another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium storing a computer program which, when executed by a processor, implements the method steps as described above.
The invention has at least the following beneficial technical effects:
(1) All resources related to the application are added into the application, so that a user can view monitoring information of all resources related to the application through the application, the integrity is better, data rupture is avoided, and the application is easier to use;
(2) The monitoring of the service itself, the application database and the middleware is realized through the non-invasive technology, the comprehensive monitoring of the application is truly realized, the fault frequency of the digital system is reduced, the flow bottleneck is found in advance, and the processing and checking efficiency is improved;
(3) Analyzing the behavior of a user from the application view, counting the frequently accessed functions of the user based on the operation log and the number of the accessed application program interfaces, providing a hot spot function view for a developer, and providing assistance for further analyzing the system performance and improving the usability stability of the system;
(4) The log collection function can collect all the logs of the components and services related to the application, and the logs are automatically classified by the application, so that the user can conveniently check and check the functions after the classification.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are necessary for the description of the embodiments or the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention and that other embodiments may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an embodiment of a method for application-based full link monitoring provided by the present invention;
FIG. 2 is a schematic diagram of an embodiment of an application-based full link monitoring system provided by the present invention;
FIG. 3 is a schematic hardware architecture diagram of an embodiment of a computer device for application-based full link monitoring provided by the present invention;
fig. 4 is a schematic diagram of an embodiment of a computer storage medium for application-based full link monitoring provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention will be described in further detail with reference to the accompanying drawings.
It should be noted that, in the embodiments of the present invention, all the expressions "first" and "second" are used to distinguish two entities with the same name but different entities or different parameters, and it is noted that the "first" and "second" are only used for convenience of expression, and should not be construed as limiting the embodiments of the present invention, and the following embodiments are not described one by one.
In a first aspect of the embodiment of the present invention, an embodiment of a method for application-based full link monitoring is provided. Fig. 1 is a schematic diagram of an embodiment of a method for application-based full link monitoring provided by the present invention. As shown in fig. 1, the embodiment of the present invention includes the following steps:
s1, creating a plurality of applications according to service types, and adding all resources related to the applications into each application;
s2, analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation;
s3, monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the call link relation fails; and
and S4, responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarming by adopting a corresponding alarming mode according to the abnormal level.
The present embodiment provides application management capabilities, where an application represents an application system that includes one or a set of virtual machines that deploy the application, as well as middleware, databases, etc. that deploy the application. In addition, the application also includes the services of the application system, such as the development services of the front end, and the micro-service system developed by using the popular micro-service framework at present, such as the micro-service constructed by using the spring cloud.
The embodiment provides the monitoring operation and maintenance capability of the database and the middleware, and the data acquisition of the database and the middleware is realized through the plug-in agent. In addition to databases and middleware, plug-in agent installation can also be performed for business systems written in java or python, and monitoring analysis of business layers is realized after installation.
The embodiment provides the user behavior analysis capability, and the analysis of the call chain of the API (Application Programming Interface, application program interface) can reversely infer the high-frequency operation of the user, so that the use habit of the user can be counted after the system is formally online, and the high-frequency operation can be considered for key development and optimization later so as to further perfect the product.
The embodiment provides log collection capability, can collect the log of the whole application system from the application angle, prevents the log from being lost after the application is down, and can further analyze the log when the system has problems, thereby enhancing the safety of the whole system.
A plurality of applications are created according to the service type, and all resources related to the applications are added in each application. An application system is a view presentation that a user can create an application and specify the name of the application. Virtual machines, containers, etc. associated with the application may be added to the application system, including middleware, databases, etc., that is, all components associated with the entire application system may be added to the application. This process is manually ensured and maintained by the developer. When the application is deleted, only the application itself is deleted, and resources such as the application-related virtual machine and the like cannot be automatically deleted, and if synchronous deletion is required, synchronous deletion resources are required to be selected at the time of deletion.
And analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation. The topology map is generated by using an automatic topology generation technology based on a call chain, and the technology can automatically form a topology map by automatically analyzing the call chain relation of the background. The topological graph can show the calling relation of the whole system, the relation between the service and the service in a very vivid way.
And monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the traffic of the link exceeds a threshold value or the calling link relation fails. After clicking an application, the user can enter the details of the application, and in the details, not only the monitoring information of the medium (virtual machine) for deploying the application, such as a CPU memory disk IO (input output) and a network IO, but also the whole link information of the application is displayed, wherein the link information is displayed in a topological diagram form.
In some embodiments, the monitoring, by a proxy service, resource usage of each link in the topology graph includes: and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
In the embodiment, a pinpoint-based automatic installation proxy service link monitoring technology is adopted, the technology is compatible with CGLIB, java ssast and ASM operation technology probes, supports application probe health detection, and provides the functions of non-invasive call chain monitoring, method execution detail checking, application state information monitoring and the like. At present, pinpoint is a mature technology, and is selected based on that components supported by the pinpoint are abundant and mature, but injection of the pinpoint is different in configuration for each application, and the configuration is complex and not easy to use. In the embodiment, the agent installation is automated while the pinpoint is supported, a plurality of plug-ins are arranged in the system, and a developer can install the agent into the component after clicking and downloading. Taking tomcat as an example for explanation, if a user wants to track a link of the tomcat, after clicking and downloading, the system automatically identifies the installation directory of the tomcat and finds a starting script of the tomcat, and support for agents is added in the script as follows:
profiler.collector.ip=pinpointserver_IP
CATALINA_OPTS="$CATALINA_OPTS-javaagent:/data/pp-agent/pinpoint-bootstrap-1.5.2.jar"
CATALINA_OPTS="$CATALINA_OPTS-Dpinpoint.agentId=XXXXX"
CATALINA_OPTS="$CATALINA_OPTS-Dpinpoint.applicationName=XXXX
the link monitoring of the tomcat can be achieved by restarting the tomcat. The system is internally provided with the support of springBoot, mysql, python and other components, so that the development and the use of users are greatly facilitated.
And responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarming by adopting a corresponding alarming mode according to the abnormal level. When the flow of a certain link is large or the calling relationship fails, a link failure or congestion prompt is generated, and an alarm is generated, so that a user can know the application risk in time. And, different alarm modes can be adopted according to the abnormal level, for example, only an alarm can be sent out when the abnormal level is low, and the user can be informed by means of a short message, a telephone and the like when the abnormal level is high.
In some embodiments, the method further comprises: and setting the acquisition of the service log into an interface configuration, and acquiring the log of the target object by filling an acquisition catalog in an interface.
The log collection and storage can provide later analysis for a developer, and after the system is down, the log collection and storage can be used as a data for debugging analysis. The journal collection of the embodiment adopts a structure scheme of filecoat+logstack+es which is common in the industry, and the scheme is developed and matured in the industry. The optimization point of the embodiment is that the interface configuration is made for each service log acquisition, the user does not need to enter each service, change the acquisition catalog of the filebox and the like, only the acquisition catalog is filled in the interface, and the configuration can be automatically issued to the filebox. In addition, the log is displayed by taking the application as a unit, most of the log acquisition schemes in the industry are all stored in the ES for word segmentation and the like, if query and search are required, the log information related to the application is automatically filtered after the application is taken as a view angle, and other irrelevant logs are automatically removed, so that a user can conveniently search the log.
In some embodiments, the method further comprises: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
The embodiment provides a behavior analysis method based on the combination of a user operation log and an access interface. The operation log in this embodiment records information such as time, success or failure of a user to operate a function, an operation object, operation behavior, description, and the like in detail. Each operation corresponds to an operation code, the background can identify the uniqueness of the operation according to the operation code, the high-frequency behavior of the user can be counted through statistical analysis, and the operation typical scene of the user is analyzed by combining the context of the operation behavior. In addition, statistics can be performed in combination with the background access to the application program interfaces, and the application program interface statistics mainly comprise the operation frequency of each application program interface and the average response time of the application program interfaces. Through the combination of the two, the daily operation of the user and the corresponding background interface can be analyzed, and based on the daily operation of the user and the corresponding background interface, the functions of the system can be further optimized. The performance and stability of the product are continuously improved, and the competitiveness of the product is improved.
According to the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, data splitting is avoided, and the application is easier to use; according to the embodiment, the monitoring of the service, the application database and the middleware is realized through a non-invasive technology, the comprehensive monitoring of the application can be truly realized, the fault frequency of the digital system is reduced, the flow bottleneck is found in advance, and the processing and checking efficiency is improved; according to the embodiment, the behavior of the user is analyzed from the application view, the frequently accessed functions of the user are counted based on the operation log and the number of the accessed application program interfaces, a hot spot function view is provided for a developer, and assistance is provided for further analyzing the system performance and improving the usability stability of the system; the log collection function of the embodiment can collect all the logs of the components and services related to the application, and the logs are automatically classified by the application, so that the user can conveniently check and check the functions after the classification.
It should be noted that, the steps in the embodiments of the method for full link monitoring based on application may be intersected, replaced, added and deleted, so that the method for full link monitoring based on application with reasonable permutation and combination is also included in the protection scope of the present invention, and the protection scope of the present invention should not be limited to the embodiments.
Based on the above object, a second aspect of the embodiment of the present invention proposes a system for full link monitoring based on application. As shown in fig. 2, the system 200 includes the following modules: the creation module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application; the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation; the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service and judge whether the flow of the link exceeds a threshold value or the call link relation fails; and the alarm module is configured to respond to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarm is carried out by adopting a corresponding alarm mode according to the abnormal level.
In some embodiments, the monitoring module is configured to: and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
In some embodiments, the system further comprises an acquisition module (not shown in the figures) configured to: and setting the acquisition of the service log into an interface configuration, and acquiring the log of the target object by filling an acquisition catalog in an interface.
In some embodiments, the system further comprises an optimization module (not shown in the figures) configured to: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
According to the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, data splitting is avoided, and the application is easier to use; according to the embodiment, at least the monitoring of the service, the application database and the middleware is realized through a non-invasive technology, the comprehensive monitoring of the application can be truly realized, the fault frequency of a digital system is reduced, the flow bottleneck is found in advance, and the processing and checking efficiency is improved; according to the embodiment, the behavior of the user is analyzed from the application view, the frequently accessed functions of the user are counted based on the operation log and the number of the accessed application program interfaces, a hot spot function view is provided for a developer, and assistance is provided for further analyzing the system performance and improving the usability stability of the system; the log collection function of the embodiment can collect all the logs of the components and services related to the application, and the logs are automatically classified by the application, so that the user can conveniently check and check the functions after the classification.
In view of the above object, a third aspect of the embodiments of the present invention provides a computer device, including: at least one processor; and a memory storing computer instructions executable on the processor, the instructions being executable by the processor to perform the steps of: s1, creating a plurality of applications according to service types, and adding all resources related to the applications into each application; s2, analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation; s3, monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the call link relation fails; and S4, responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, and alarming by adopting a corresponding alarming mode according to the abnormal level.
In some embodiments, the monitoring, by a proxy service, resource usage of each link in the topology graph includes: and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
In some embodiments, the steps further comprise: and setting the acquisition of the service log into an interface configuration, and acquiring the log of the target object by filling an acquisition catalog in an interface.
In some embodiments, the steps further comprise: and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
According to the embodiment, all resources related to the application are added into the application, and a user can check monitoring information of all resources related to the application through the application, so that the integrity is better, data splitting is avoided, and the application is easier to use; the embodiment can realize the monitoring of the service itself, the application database and the middleware through the non-invasive technology, truly realize the comprehensive monitoring of the application, reduce the fault frequency of the digital system, discover the flow bottleneck in advance, and improve the processing and checking efficiency; according to the embodiment, the behavior of the user is analyzed from the application view, the frequently accessed functions of the user are counted based on the operation log and the number of the accessed application program interfaces, a hot spot function view is provided for a developer, and assistance is provided for further analyzing the system performance and improving the usability stability of the system; the log collection function of the embodiment can collect all the logs of the components and services related to the application, and the logs are automatically classified by the application, so that the user can conveniently check and check the functions after the classification.
As shown in fig. 3, a hardware structure diagram of an embodiment of the above-mentioned application-based full-link monitoring computer device according to the present invention is shown.
Taking the example of the device shown in fig. 3, a processor 301 and a memory 302 are included in the device.
The processor 301 and the memory 302 may be connected by a bus or otherwise, for example in fig. 3.
The memory 302 serves as a non-volatile computer readable storage medium, and may be used to store non-volatile software programs, non-volatile computer executable programs, and modules, such as program instructions/modules corresponding to the method of application-based full link monitoring in the embodiments of the present application. The processor 301 executes various functional applications of the server and data processing, i.e. the method of implementing the application-based full link monitoring of the above-described method embodiments, by running non-volatile software programs, instructions and modules stored in the memory 302.
Memory 302 may include a storage program area that may store an operating system, at least one application program required for functionality, and a storage data area; the storage data area may store data created according to the use of the application-based full link monitoring method, etc. In addition, memory 302 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid-state storage device. In some embodiments, memory 302 may optionally include memory located remotely from processor 301, which may be connected to the local module via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Computer instructions 303 corresponding to one or more methods of application-based full link monitoring are stored in memory 302 that, when executed by processor 301, perform the methods of application-based full link monitoring in any of the method embodiments described above.
Any one embodiment of a computer device that performs the above-described method of application-based full link monitoring may achieve the same or similar effects as any of the previously described method embodiments corresponding thereto.
The invention also provides a computer readable storage medium storing a computer program which when executed by a processor performs a method of full link monitoring based on an application as above.
As shown in fig. 4, a schematic diagram of an embodiment of the above-mentioned application-based full-link monitoring computer storage medium is provided in the present invention. Taking a computer storage medium as shown in fig. 4 as an example, the computer readable storage medium 401 stores a computer program 402 that when executed by a processor performs the above method.
Finally, it should be noted that, as will be appreciated by those skilled in the art, all or part of the procedures in the methods of the embodiments described above may be implemented by a computer program to instruct related hardware, and the program of the method for full link monitoring based on the application may be stored in a computer readable storage medium, and the program may include the procedures of the embodiments of the methods described above when executed. The storage medium of the program may be a magnetic disk, an optical disk, a read-only memory (ROM), a random-access memory (RAM), or the like. The computer program embodiments described above may achieve the same or similar effects as any of the method embodiments described above.
The foregoing is an exemplary embodiment of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that as used herein, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The foregoing embodiment of the present invention has been disclosed with reference to the number of embodiments for the purpose of description only, and does not represent the advantages or disadvantages of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, and the program may be stored in a computer readable storage medium, where the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those of ordinary skill in the art will appreciate that: the above discussion of any embodiment is merely exemplary and is not intended to imply that the scope of the disclosure of embodiments of the invention, including the claims, is limited to such examples; combinations of features of the above embodiments or in different embodiments are also possible within the idea of an embodiment of the invention, and many other variations of the different aspects of the embodiments of the invention as described above exist, which are not provided in detail for the sake of brevity. Therefore, any omission, modification, equivalent replacement, improvement, etc. of the embodiments should be included in the protection scope of the embodiments of the present invention.

Claims (6)

1. A method for full link monitoring based on application, comprising the steps of:
creating a plurality of applications according to service types, and adding all resources related to the applications in each application;
analyzing the call chain relation of the application according to all the resources, and forming a topological graph of the application according to the call chain relation;
monitoring the resource use condition of each link in the topological graph through proxy service, and judging whether the flow of the link exceeds a threshold value or the calling link relation fails; and
responding to the condition that the flow of the existing link exceeds a threshold value and/or the calling link relation fails, alarming by adopting a corresponding alarming mode according to the abnormal level,
the method further comprises the steps of:
setting the collection of service logs into an interface configuration, collecting the logs of target objects by filling a collection catalog in an interface,
and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
2. The method of claim 1, wherein monitoring resource usage of each link in the topology map via a proxy service comprises:
and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
3. A system for application-based full link monitoring, comprising:
the creation module is configured to create a plurality of applications according to service types and add all resources related to the applications in each application;
the analysis module is configured to analyze the call chain relation of the application according to all the resources and form a topological graph of the application according to the call chain relation;
the monitoring module is configured to monitor the resource use condition of each link in the topological graph through proxy service and judge whether the flow of the link exceeds a threshold value or the call link relation fails; and
an alarm module configured to respond to the existence of the link flow exceeding the threshold value and/or the failure of the call link relationship, alarm by adopting a corresponding alarm mode according to the abnormal level,
the system further comprises an acquisition module configured to:
setting the collection of service logs into an interface configuration, collecting the logs of target objects by filling a collection catalog in an interface,
the system further comprises an optimization module configured to:
and acquiring the operating frequency of each application program interface and the average response time of the application program interface from the log, and optimizing the application program interface according to the operating frequency and the average response time.
4. A system according to claim 3, wherein the monitoring module is configured to:
and acquiring an installation catalog of the target link, and adding an agent in the installation catalog.
5. A computer device, comprising:
at least one processor; and
a memory storing computer instructions executable on the processor, which when executed by the processor, perform the steps of the method of any one of claims 1-2.
6. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method of any one of claims 1-2.
CN202110929024.5A 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application Active CN113760652B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110929024.5A CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110929024.5A CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Publications (2)

Publication Number Publication Date
CN113760652A CN113760652A (en) 2021-12-07
CN113760652B true CN113760652B (en) 2023-12-26

Family

ID=78789225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110929024.5A Active CN113760652B (en) 2021-08-13 2021-08-13 Method, system, device and storage medium for full link monitoring based on application

Country Status (1)

Country Link
CN (1) CN113760652B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114328139A (en) * 2021-12-17 2022-04-12 江苏银承网络科技股份有限公司 Monitoring method and device for hall interface, storage medium and server
CN114826864A (en) * 2022-03-11 2022-07-29 阿里巴巴(中国)有限公司 Architecture determination method and apparatus for application system, electronic device, and computer-readable storage medium
CN116737514B (en) * 2023-08-15 2023-12-22 南京国睿信维软件有限公司 Automatic operation and maintenance method based on log and probe analysis

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224445A (en) * 2015-10-28 2016-01-06 北京汇商融通信息技术有限公司 Distributed tracking system
WO2018137254A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Call chain-based concurrency control method, device, and control node
CN109873717A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Monitoring method, device, computer equipment and storage medium
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
WO2020220638A1 (en) * 2019-04-29 2020-11-05 平安科技(深圳)有限公司 Method and apparatus for associating link system with log system, and storage medium
CN112346930A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Method and system for monitoring full link based on CAT
CN112596974A (en) * 2020-12-10 2021-04-02 长沙市到家悠享网络科技有限公司 Full link monitoring method, device, equipment and storage medium
CN112653586A (en) * 2019-10-12 2021-04-13 苏州工业园区测绘地理信息有限公司 Time-space big data platform application performance management method based on full link monitoring

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224445A (en) * 2015-10-28 2016-01-06 北京汇商融通信息技术有限公司 Distributed tracking system
WO2018137254A1 (en) * 2017-01-26 2018-08-02 华为技术有限公司 Call chain-based concurrency control method, device, and control node
CN109873717A (en) * 2019-01-18 2019-06-11 深圳壹账通智能科技有限公司 Monitoring method, device, computer equipment and storage medium
WO2020147419A1 (en) * 2019-01-18 2020-07-23 深圳壹账通智能科技有限公司 Monitoring method and apparatus, computer device and storage medium
WO2020220638A1 (en) * 2019-04-29 2020-11-05 平安科技(深圳)有限公司 Method and apparatus for associating link system with log system, and storage medium
CN110245035A (en) * 2019-05-20 2019-09-17 平安普惠企业管理有限公司 A kind of link trace method and device
CN112653586A (en) * 2019-10-12 2021-04-13 苏州工业园区测绘地理信息有限公司 Time-space big data platform application performance management method based on full link monitoring
CN112346930A (en) * 2020-10-30 2021-02-09 银盛支付服务股份有限公司 Method and system for monitoring full link based on CAT
CN112596974A (en) * 2020-12-10 2021-04-02 长沙市到家悠享网络科技有限公司 Full link monitoring method, device, equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Research on Network Traffic Anomaly Detection Based on Stream Characteristics in Unsaturated Link;Jun Han等;2019 IEEE 4th International Conference on Advanced Robotics and Mechatronics (ICARM);全文 *
一种云环境下分布式应用业务态势感知系统设计方法;郭杰;王磊;王建纲;;冶金自动化(第04期);全文 *
一种基于APM应用全链路监控工具设计;刘霞霞;高阿朋;任春雷;文建军;史金奇;;网络安全技术与应用(第06期);全文 *
分布式系统服务链追踪与监控;郑邦峰;;工业技术创新(第02期);全文 *

Also Published As

Publication number Publication date
CN113760652A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
CN113760652B (en) Method, system, device and storage medium for full link monitoring based on application
US20220206889A1 (en) Automatic correlation of dynamic system events within computing devices
US20180365085A1 (en) Method and apparatus for monitoring client applications
CN110908879B (en) Reporting method, reporting device, reporting terminal and recording medium of buried point data
CN105743730B (en) The method and its system of real time monitoring are provided for the web service of mobile terminal
CN107704360B (en) Monitoring data processing method, equipment, server and storage medium
CN110309029B (en) Abnormal data acquisition method and device, computer equipment and storage medium
WO2015009405A1 (en) Systems and methods for filtering low utility value messages from system logs
CN112350854B (en) Flow fault positioning method, device, equipment and storage medium
CN105589782A (en) User behavior collection method based on browser
WO2022063032A1 (en) Distributed system-oriented fault information association reporting method, and related device
CN116107846B (en) Linux system event monitoring method and device based on EBPF
CN108462598A (en) A kind of daily record generation method, log analysis method and device
CN113835836B (en) System, method, computer device and medium for dynamic publishing container service
US11635972B2 (en) Multi-tenant java agent instrumentation system
CN112685270A (en) System monitoring log acquisition method and device, electronic equipment and medium
CN114697232A (en) Skywalking probe index data acquisition system and method and electronic equipment
US10180914B2 (en) Dynamic domain name service caching
US10644971B2 (en) Graph search in structured query language style query
CN108959041B (en) Method for transmitting information, server and computer readable storage medium
CN114816914A (en) Data processing method, equipment and medium based on Kubernetes
CN115174350A (en) Operation and maintenance warning method, device, equipment and medium
CN113282557A (en) Big data log analysis method and system based on Spring framework
CN115729727A (en) Fault repairing method, device, equipment and medium
US10296967B1 (en) System, method, and computer program for aggregating fallouts in an ordering system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant