CN116755914A - Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium - Google Patents

Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium Download PDF

Info

Publication number
CN116755914A
CN116755914A CN202310713901.4A CN202310713901A CN116755914A CN 116755914 A CN116755914 A CN 116755914A CN 202310713901 A CN202310713901 A CN 202310713901A CN 116755914 A CN116755914 A CN 116755914A
Authority
CN
China
Prior art keywords
log
log information
atomic service
abnormal
atomic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310713901.4A
Other languages
Chinese (zh)
Inventor
吴艳兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202310713901.4A priority Critical patent/CN116755914A/en
Publication of CN116755914A publication Critical patent/CN116755914A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application relates to the technical field of data processing, and discloses an anomaly log investigation method, an anomaly log investigation device, computer equipment and a readable storage medium. The method comprises the following steps: acquiring the project source codes of the bank project to be tested from a bank project code management warehouse through a gitclone command, and acquiring a plurality of log information according to the atomic business logic of the project source codes; traversing normal atomic service logs in the atomic service log template list through a log template filter, and judging whether each log information is matched with the normal atomic service logs; if not, judging whether each log information is matched with an abnormal atomic service log in the atomic service log template list; if the log information is matched with the abnormal log information, the corresponding log information is determined to be the abnormal log information, and the abnormal log information is output. The application only stores the abnormal log information, not only can ensure that the financial system ensures stable operation, but also can ensure the correct operation of the minimum atomic business of the system, thereby ensuring the stability and the correctness of the system.

Description

Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to an anomaly log investigation method, an anomaly log investigation device, a computer device, and a readable storage medium.
Background
In the development process of the financial system software, the output of a program running log is added to the software program which is already in online running, so that the method is very effective in verifying whether the software program runs normally or not. Meanwhile, when the software program is abnormal, the problem can be rapidly and effectively positioned through the log output by the software program, the software defect is repaired, and the loss is reduced. Since errors in financial system software do not only affect the user experience, but are likely to cause significant economic loss, repair timeliness is very important. In the running process of the program, a large amount of running logs are output, if all log information is stored, a large amount of disk space is required to be consumed, and if problems occur, the logs are very difficult to find.
In the prior art, log information in a certain time period is set and stored, and historical log information is continuously covered, so that although a certain disk storage space can be reduced, the following problems still exist: (1) occupies a relatively large disk space; (2) failing to query historical exception log information; (3) Because a large amount of normal log information exists in the log file, interference is caused to the abnormal log of the investigation program.
Disclosure of Invention
In view of the above, the present application aims to overcome the shortcomings in the prior art, and provides an anomaly log checking method, an anomaly log checking device, a computer device and a readable storage medium applicable to the fields of finance technology or other technologies.
The application provides the following technical scheme:
in a first aspect, an embodiment of the present disclosure provides an exception log checking method, where the method includes:
acquiring an item source code of a bank item to be detected from a bank item code management warehouse through a gitclone command, and acquiring a plurality of log information according to an atomic business logic of the item source code;
traversing normal atomic service logs in an atomic service log template list through a log template filter, and judging whether each piece of log information is matched with the normal atomic service log;
if the log information is not matched with the normal atomic service log, judging whether the log information is matched with an abnormal atomic service log in the atomic service log template list or not;
and if the log information is matched with the abnormal atom service log, determining the corresponding log information as abnormal log information, and outputting the abnormal log information.
Further, before the obtaining the project source code of the bank project to be tested from the bank project code management warehouse through the gitcone command, the method further includes:
and constructing the bank project to be tested into a jar package or a war package which can be independently deployed and operated through the mvn package command.
Further, the acquiring a plurality of log information according to the atomic business logic of the project source code includes:
acquiring an atomic service logic name of the project source code, and operating corresponding atomic service logic according to the atomic service logic name;
and acquiring a plurality of log information generated when the atomic service logic runs to each logic node.
Further, the determining whether each log information matches the normal atomic service log includes:
for any normal atomic service log in the atomic service log template list, if the log information contains each word in the normal atomic service log, determining that any normal atomic service log is matched with the log information, otherwise, determining that the normal atomic service log is not matched with the log information.
Further, after the determining whether each log information is matched with the normal atomic service log, the method further includes:
and if the log information is matched with the normal atomic service log, determining the corresponding log information as normal log information, and not outputting the normal log information.
Further, the outputting the anomaly log information includes:
setting a log matching regular expression, wherein the log matching regular expression outputs corresponding abnormal log information according to the atomic business logic.
Further, after the outputting the anomaly log information, the method further includes:
creating a corresponding abnormal atomic service log template based on the atomic service logic and the output format of the abnormal log information, and adding the abnormal atomic service log template to the atomic service log template list.
In a second aspect, in an embodiment of the present disclosure, there is provided an exception log checking apparatus, including:
the acquisition module is used for acquiring the project source codes of the bank project to be tested from the bank project code management warehouse through the gitcone command and acquiring a plurality of log information according to the atomic business logic of the project source codes;
the first judging module is used for traversing normal atomic service logs in the atomic service log template list through a log template filter and judging whether each piece of log information is matched with the normal atomic service logs or not;
the second judging module is used for judging whether each piece of log information is matched with an abnormal atomic service log in the atomic service log template list or not if each piece of log information is not matched with the normal atomic service log;
and the output module is used for determining the corresponding log information as abnormal log information if each log information is matched with the abnormal atomic service log and outputting the abnormal log information.
In a third aspect, in an embodiment of the present disclosure, there is provided a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the anomaly log investigation method in the first aspect when the processor executes the computer program.
In a fourth aspect, in an embodiment of the present disclosure, there is provided a computer device, including a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the anomaly log investigation method in the first aspect when the processor executes the computer program.
Embodiments of the present application have the following advantages:
according to the abnormal log checking method provided by the embodiment of the application, the project source codes of the bank project to be checked are acquired from the bank project code management warehouse through the gitclone command, and a plurality of log information are acquired according to the atomic business logic of the project source codes; traversing normal atomic service logs in an atomic service log template list through a log template filter, and judging whether each piece of log information is matched with the normal atomic service log; if the log information is not matched with the normal atomic service log, judging whether the log information is matched with an abnormal atomic service log in the atomic service log template list or not; and if the log information is matched with the abnormal atom service log, determining the corresponding log information as abnormal log information, and outputting the abnormal log information. The method filters normal log information during program operation by configuring the atomic business log template in the financial system, and only saves abnormal log information produced during program operation, thereby ensuring stable operation of the financial system and correct operation of the minimum atomic business of the system, and further ensuring stability and correctness of the system.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 shows a flowchart of an exception log investigation method provided by an embodiment of the present application;
FIG. 2 is a flowchart illustrating another method for exception log investigation according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an abnormality log checking device according to an embodiment of the present application;
fig. 4 shows a schematic diagram of a hardware architecture of a computer device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the application.
It will be understood that when an element is referred to as being "fixed to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present. In contrast, when an element is referred to as being "directly on" another element, there are no intervening elements present. The terms "vertical," "horizontal," "left," "right," and the like are used herein for illustrative purposes only.
In the present application, unless explicitly specified and limited otherwise, the terms "mounted," "connected," "secured," and the like are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communicated with the inside of two elements or the interaction relationship of the two elements. The specific meaning of the above terms in the present application can be understood by those of ordinary skill in the art according to the specific circumstances.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include one or more such feature. In the description of the present application, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used in the description of the templates herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The term "and/or" as used herein includes any and all combinations of one or more of the associated listed items.
Example 1
As shown in fig. 1, a flowchart of an anomaly log checking method in an embodiment of the present application, which can be applied to, for example, the field of financial technology or other technical fields, includes the following steps:
step S110, acquiring the project source codes of the bank project to be tested from a bank project code management warehouse through a gitclone command, and acquiring a plurality of pieces of log information according to the atomic business logic of the project source codes.
According to the method, firstly, a to-be-tested bank project is constructed into a jar package or a war package capable of being independently deployed and operated through an mvn package command, and then a project source code of the to-be-tested bank project is obtained from a bank project code management warehouse gitlab through a gitclone command.
Further, in the main financial business logic of the bank project, the atomic business logic name of the project source code is obtained according to the atomic business logic (loan approval, loan, bill stage, loan stage, repayment in advance, etc.) of the project source code, when the atomic business logic is started, the corresponding atomic business logic is operated according to the atomic business logic name, and when the program is operated to each logic node, a plurality of log information in the corresponding format is output.
In an alternative embodiment, as shown in fig. 2, step S110 includes:
step S111, the atomic service logic name of the project source code is obtained, and corresponding atomic service logic is operated according to the atomic service logic name.
Step S112, obtaining a plurality of log information generated when the atomic service logic operates to each logic node.
The correctness of the atomic business of the financial system is ensured from the bottom layer, so that the correctness of the whole financial system software is ensured.
Step S120, traversing normal atomic service logs in an atomic service log template list through a log template filter, and judging whether each piece of log information is matched with the normal atomic service log.
Further, by developing a log template filter based on a financial system in advance, before log output, traversing normal atomic service logs in an atomic service log template list, and judging whether each log information is matched with the normal atomic service logs.
It should be noted that, in this embodiment, the atomic service log includes a plurality of words, and for any normal atomic service log in the atomic service log template list, if the log information includes each word in the normal atomic service log, it is determined that any normal atomic service log is matched with the log information, otherwise, it is determined that the normal atomic service log is not matched with the log information.
By configuring the atomic service log template in the financial system, the normal log information during program running can be effectively filtered, so that a large amount of disk space is saved, and a large amount of normal log information is not saved.
Step S130, if each piece of log information is not matched with the normal atomic service log, determining whether each piece of log information is matched with an abnormal atomic service log in the atomic service log template list.
Further, if each log information is matched with the normal atomic service log, determining the corresponding log information as normal log information, and not outputting the normal log information. If the log information is not matched with the normal atomic service log, judging whether the log information is matched with the abnormal atomic service log in the atomic service log template list.
Only the abnormal log information produced during the program running is saved, a large amount of disk space can be saved, so that the problem investigation personnel can more quickly and effectively inquire the effective information, and the investigation efficiency is improved.
Step S140, if each log information is matched with the abnormal atomic service log, determining the corresponding log information as abnormal log information, and outputting the abnormal log information.
Further, if each log information is matched with the abnormal atomic service log, determining the corresponding log information as abnormal log information, setting a log matching regular expression, and outputting the corresponding abnormal log information according to the atomic service logic by the log matching regular expression.
After no problem is found by manual investigation, a corresponding abnormal atomic service log template is created based on the output format of the atomic service logic and the abnormal log information, and the atomic service log template corresponding to the abnormal log information is added to an atomic service log template list.
In the application, the log information is classified into two types, namely normal log information and abnormal log information, the normal log information is filtered when the log is collected, and the abnormal log information is collected when the log is collected, so that the stable operation of the financial system can be ensured, and the minimum atomic business of the financial system can be ensured to operate correctly, thereby ensuring the stability and the correctness of the system.
Because the normal log information output in the running program is generally output through the control of the built-in program code, the content of the log output and the format of the log output can meet the set log template. Therefore, a large amount of disk space is saved, and only abnormal log information which does not accord with the log template is saved because a large amount of normal log information is not saved.
When a program has problems, the method enables the log investigation to be more convenient and quick, and can rapidly locate the problems, and because the interference of normal log information is eliminated, only the abnormal log information of the program is required to be focused, so that the problem investigation personnel can more rapidly and effectively inquire the effective information.
According to the abnormal log checking method provided by the embodiment of the application, the project source codes of the bank project to be checked are acquired from the bank project code management warehouse through the gitclone command, and a plurality of log information are acquired according to the atomic business logic of the project source codes; traversing normal atomic service logs in an atomic service log template list through a log template filter, and judging whether each piece of log information is matched with the normal atomic service log; if the log information is not matched with the normal atomic service log, judging whether the log information is matched with an abnormal atomic service log in the atomic service log template list or not; and if the log information is matched with the abnormal atom service log, determining the corresponding log information as abnormal log information, and outputting the abnormal log information. The method filters normal log information during program operation by configuring the atomic business log template in the financial system, and only saves abnormal log information produced during program operation, thereby ensuring stable operation of the financial system and correct operation of the minimum atomic business of the system, and further ensuring stability and correctness of the system.
Example 2
Fig. 3 is a schematic structural diagram of an abnormality log checking device 300 according to an embodiment of the present application, where the device includes:
the acquiring module 310 is configured to acquire an item source code of a bank item to be tested from a bank item code management warehouse through a gitcone command, and acquire a plurality of log information according to an atomic business logic of the item source code;
a first judging module 320, configured to traverse the normal atomic service logs in the atomic service log template list through a log template filter, and judge whether each piece of log information is matched with the normal atomic service log;
a second judging module 330, configured to judge whether each log information is matched with an abnormal atomic service log in the atomic service log template list if each log information is not matched with the normal atomic service log;
and an output module 340, configured to determine the corresponding log information as the abnormal log information if each log information matches the abnormal atomic service log, and output the abnormal log information.
Optionally, the anomaly log investigation apparatus 300 may further include:
the construction module is used for constructing the bank project to be tested into a jar package or a war package which can be independently deployed and operated through the mvn package command.
Optionally, the anomaly log investigation apparatus 300 may further include:
the operation module is used for acquiring the atomic service logic name of the project source code and operating the corresponding atomic service logic according to the atomic service logic name;
and the acquisition sub-module is used for acquiring a plurality of log information generated when the atomic service logic operates to each logic node.
Optionally, the anomaly log investigation apparatus 300 may further include:
the first determining module is configured to determine, for any normal atomic service log in the atomic service log template list, if the log information includes each word in the normal atomic service log, that the any normal atomic service log is matched with the log information, or else, that the normal atomic service log is not matched with the log information.
Optionally, the anomaly log investigation apparatus 300 may further include:
and the second determining module is used for determining the corresponding log information as normal log information if each log information is matched with the normal atomic service log, and not outputting the normal log information.
Optionally, the anomaly log investigation apparatus 300 may further include:
the setting module is used for setting a log matching regular expression, and the log matching regular expression outputs corresponding abnormal log information according to the atomic business logic.
Optionally, the anomaly log investigation apparatus 300 may further include:
and the adding module is used for creating a corresponding abnormal atomic service log template based on the atomic service logic and the output format of the abnormal log information, and adding the abnormal atomic service log template to the atomic service log template list.
The abnormal log checking device provided by the embodiment of the application filters the normal log information during the program running by configuring the atomic business log template in the financial system, and only saves the abnormal log information produced during the program running, so that the financial system can be ensured to run stably, and the correct running of the minimum atomic business of the system can be ensured, thereby ensuring the stability and the correctness of the system.
Example 3
Fig. 4 shows a schematic hardware architecture of a computer device provided by the present application, where the computer device includes a memory and a processor, and the memory stores a computer program, and the processor implements the steps of the anomaly log investigation method described in embodiment 1 when executing the computer program.
In this embodiment, the computer device 400 is a device capable of automatically performing numerical calculation and/or information processing in accordance with instructions set or stored in advance. For example, it may be a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of a plurality of servers), etc. As shown in fig. 4, computer device 400 includes at least, but is not limited to: memory 410, processor 420, and network interface 430 may be communicatively linked to each other via a system bus. Wherein:
the memory 410 includes at least one type of computer-readable storage medium including flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), programmable read-only memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the memory 410 may be an internal storage module of the computer device 400, such as a hard disk or memory of the computer device 400. In other embodiments, the memory 410 may also be an external storage device of the computer device 400, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card) or the like, which are provided on the computer device 400. Of course, the memory 410 may also include both internal memory modules of the computer device 400 and external memory devices.
In this embodiment, the memory 410 is typically used to store an operating system and various types of application software installed on the computer device 400, such as program codes of a video playing method. In addition, the memory 410 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 420 may be a central processing unit (Central Processing Unit, simply CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 420 is generally used to control the overall operation of the computer device 400, such as performing control and processing related to data interaction or communication with the computer device 400, and the like. In this embodiment, the processor 420 is used to execute program code or process data stored in the memory 410.
The network interface 430 may include a wireless network interface or a wired network interface, the network interface 430 typically being used to establish a communication link between the computer device 400 and other computer devices. For example, the network interface 430 is used to connect the computer device 400 to an external terminal through a network, establish a data transmission channel and a communication link between the computer device 400 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a global system for mobile communications (GlobalSystem of Mobile communication, abbreviated as GSM), wideband code division multiple access (Wideband Code DivisionMultiple Access, abbreviated as WCDMA), a 4G network, a 5G network, bluetooth (Bluetooth), wi-Fi, etc.
It should be noted that FIG. 4 only shows a computer device having components 410-430, but it should be understood that not all of the illustrated components are required to be implemented and that more or fewer components may be implemented instead.
In this embodiment, the exception log checking method stored in the memory 410 may be further divided into one or more program modules and executed by one or more processors (the processor 420 in this embodiment) to complete the present application.
Example 4
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the anomaly log investigation method in the embodiment.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of a computer device, such as a hard disk or a memory of the computer device.
In other embodiments, the computer readable storage medium may also be an external storage device of a computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card), etc. that are provided on the computer device. Of course, the computer-readable storage medium may also include both internal storage units of a computer device and external storage devices. In this embodiment, the computer-readable storage medium is typically used to store an operating system and various types of application software installed on a computer device. Furthermore, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.
Any particular values in all examples shown and described herein are to be construed as merely illustrative and not a limitation, and thus other examples of exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application.

Claims (10)

1. An exception log troubleshooting method, the method comprising:
acquiring an item source code of a bank item to be detected from a bank item code management warehouse through a gitclone command, and acquiring a plurality of log information according to an atomic business logic of the item source code;
traversing normal atomic service logs in an atomic service log template list through a log template filter, and judging whether each piece of log information is matched with the normal atomic service log;
if the log information is not matched with the normal atomic service log, judging whether the log information is matched with an abnormal atomic service log in the atomic service log template list or not;
and if the log information is matched with the abnormal atom service log, determining the corresponding log information as abnormal log information, and outputting the abnormal log information.
2. The anomaly log investigation method of claim 1, wherein before the obtaining the project source code of the bank project to be tested from the bank project code management warehouse through the gitclone command, further comprises:
and constructing the bank project to be tested into a jar package or a war package which can be independently deployed and operated through the mvn package command.
3. The method for exception log investigation according to claim 1, wherein the obtaining a plurality of log information according to the atomic business logic of the item source code comprises:
acquiring an atomic service logic name of the project source code, and operating corresponding atomic service logic according to the atomic service logic name;
and acquiring a plurality of log information generated when the atomic service logic runs to each logic node.
4. The abnormal log checking method according to claim 1, wherein the determining whether each of the log information and the normal atomic traffic log match comprises:
for any normal atomic service log in the atomic service log template list, if the log information contains each word in the normal atomic service log, determining that any normal atomic service log is matched with the log information, otherwise, determining that the normal atomic service log is not matched with the log information.
5. The abnormal log checking method according to claim 1, wherein after determining whether each of the log information and the normal atomic traffic log match, further comprising:
and if the log information is matched with the normal atomic service log, determining the corresponding log information as normal log information, and not outputting the normal log information.
6. The abnormality log troubleshooting method according to claim 1, characterized in that said outputting said abnormality log information includes:
setting a log matching regular expression, wherein the log matching regular expression outputs corresponding abnormal log information according to the atomic business logic.
7. The abnormality log troubleshooting method according to claim 1, characterized by further comprising, after said outputting said abnormality log information:
creating a corresponding abnormal atomic service log template based on the atomic service logic and the output format of the abnormal log information, and adding the abnormal atomic service log template to the atomic service log template list.
8. An abnormality log investigation apparatus, characterized by comprising:
the acquisition module is used for acquiring the project source codes of the bank project to be tested from the bank project code management warehouse through the gitcone command and acquiring a plurality of log information according to the atomic business logic of the project source codes;
the first judging module is used for traversing normal atomic service logs in the atomic service log template list through a log template filter and judging whether each piece of log information is matched with the normal atomic service logs or not;
the second judging module is used for judging whether each piece of log information is matched with an abnormal atomic service log in the atomic service log template list or not if each piece of log information is not matched with the normal atomic service log;
and the output module is used for determining the corresponding log information as abnormal log information if each log information is matched with the abnormal atomic service log and outputting the abnormal log information.
9. A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the steps of the anomaly log investigation method of any of claims 1-7 when the computer program is executed.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program which, when executed by a processor, implements the steps of the anomaly log investigation method of any of claims 1-7.
CN202310713901.4A 2023-06-15 2023-06-15 Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium Pending CN116755914A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310713901.4A CN116755914A (en) 2023-06-15 2023-06-15 Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310713901.4A CN116755914A (en) 2023-06-15 2023-06-15 Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN116755914A true CN116755914A (en) 2023-09-15

Family

ID=87956584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310713901.4A Pending CN116755914A (en) 2023-06-15 2023-06-15 Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN116755914A (en)

Similar Documents

Publication Publication Date Title
CN112183782B (en) Fault work order processing method and equipment
CN110222535B (en) Processing device, method and storage medium for block chain configuration file
CN113010413B (en) Automatic interface testing method and device
CN110990233A (en) Method and system for displaying SOAR by using Gantt chart
CN112561370A (en) Software version management method and device, computer equipment and storage medium
CN113407525B (en) K-line data inspection method and device, computer equipment and readable storage medium
CN112632330A (en) Method and device for routing inspection of ATM equipment, computer equipment and storage medium
CN111884858B (en) Equipment asset information verification method, device, system and medium
CN110069382B (en) Software monitoring method, server, terminal device, computer device and medium
CN110362553B (en) Method for processing large-batch credit investigation data, electronic device and computer equipment
CN112181836A (en) Test case generation method, system, device and storage medium
CN116957764A (en) Account data processing method and device, electronic equipment and storage medium
CN112363939A (en) Method, system and equipment for quickly generating fuzzy test network protocol template
CN116755914A (en) Abnormality log investigation method, abnormality log investigation device, computer equipment and readable storage medium
CN112416648A (en) Data verification method and device
CN110795308A (en) Server inspection method, device, equipment and storage medium
CN110543394A (en) server sensor information consistency testing method, system, terminal and storage medium
CN112817953A (en) Data verification method and device, computer equipment and computer-readable storage medium
CN113010424B (en) Interface automatic test processing method, system, computer equipment and storage medium
CN116610585A (en) Bank project page detection method, device, equipment and storage medium
CN112464088B (en) Recommendation request response method and device and recommendation system development method
CN116016158B (en) Hybrid cloud aPaaS platform deployment method, device, equipment and computer storage medium
CN112559238B (en) Troubleshooting strategy generation method and device for Oracle database, processor and storage medium
CN117076479A (en) SQL sentence generation method, device, computer equipment and readable storage medium
US20230324878A1 (en) Information processing device, information processing method, and computer program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination