CN116846744A - Log collection method, device, equipment and storage medium - Google Patents

Log collection method, device, equipment and storage medium Download PDF

Info

Publication number
CN116846744A
CN116846744A CN202310859826.2A CN202310859826A CN116846744A CN 116846744 A CN116846744 A CN 116846744A CN 202310859826 A CN202310859826 A CN 202310859826A CN 116846744 A CN116846744 A CN 116846744A
Authority
CN
China
Prior art keywords
log
candidate
log file
target application
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310859826.2A
Other languages
Chinese (zh)
Inventor
代昊琦
直揽月
梁子键
刘绍光
范仲恺
刘明伟
马驰
胡路
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Original Assignee
China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Southern Power Grid Digital Platform Technology Guangdong Co ltd filed Critical China Southern Power Grid Digital Platform Technology Guangdong Co ltd
Priority to CN202310859826.2A priority Critical patent/CN116846744A/en
Publication of CN116846744A publication Critical patent/CN116846744A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a log collection method, a device, equipment and a storage medium, wherein the method is applied to a user terminal carrying a target application and comprises the following steps: under the condition that the target application is abnormal, sending a candidate log file and an abnormality detection request to a server providing functional service for the target application, so that the server responds to the abnormality detection request, and under the condition that no effective candidate log file is detected, feeding back a log uploading request to a user terminal; and re-sending the candidate log file to the server in response to the log uploading request, so that the server can perform anomaly identification on the target application according to the candidate log file in response to the anomaly detection request under the condition that the valid candidate log file is detected. The candidate log file is actively and/or passively uploaded by the user terminal, so that the convenience of log acquisition is improved, and the efficiency of solving the problem of abnormal target application is improved.

Description

Log collection method, device, equipment and storage medium
Technical Field
The embodiment of the application relates to the field of communication technology and network technology in the field of mobile internet, in particular to a remote log collection method, a device, equipment and a storage medium.
Background
With the rapid development of the mobile internet, more and more mobile devices enter people's daily lives.
Because the environment in which the mobile device is located often changes, users often experience various problems in using the mobile application, such as the inability of the application to open, etc. The current solution is that a worker locates and solves the problem according to the description of the problem by the user or by calling a log file of the user equipment.
Since most users are not professionals, only the surface phenomenon of the problem can be described, and the staff cannot know the cause and the nature of the problem according to the description of the users; while the existence of the log file is convenient for staff to solve the problem, the log file is difficult to acquire, so that space-time limitation is imposed on one hand, and privacy of a user is involved on the other hand.
Disclosure of Invention
The application provides a remote log collection method, a remote log collection device, remote log collection equipment and a storage medium, so as to realize remote log collection.
According to an aspect of the present application, there is provided a log collecting method applied to a user terminal carrying a target application, including:
sending a candidate log file and an abnormality detection request to a server providing a function service for a target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeding back a log uploading request to the user terminal under the condition that a valid candidate log file is not detected;
and re-sending the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request.
According to another aspect of the present application, there is provided a log collecting device configured in a user terminal carrying a target application, including:
the information sending module is used for sending a candidate log file and an abnormality detection request to a server providing a function service for a target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeds back a log uploading request to the user terminal under the condition that a valid candidate log file is not detected;
and the log uploading module is used for retransmitting the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request.
According to another aspect of the present application, there is provided an electronic apparatus including:
one or more processors;
a memory for storing one or more programs;
when the one or more programs are executed by the one or more processors, the one or more processors implement any one of the log collection methods provided by the embodiments of the present application.
According to another aspect of the present application, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements any one of the log collection methods provided by the embodiments of the present application.
According to the method, when the target application is abnormal, a candidate log file and an abnormality detection request are sent to a server providing functional service for the target application, so that the server responds to the abnormality detection request, and when no effective candidate log file is detected, a log uploading request is fed back to the user terminal; and re-sending the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request. The candidate log files are actively and/or passively uploaded through the user terminal, so that the server can conduct abnormal identification on the target application according to the candidate log files, remote collection of logs can be conducted without the presence of a user, convenience in log acquisition is improved, and abnormal identification efficiency is improved.
Drawings
FIG. 1 is a flow chart of a log collection method according to a first embodiment of the present application;
FIG. 2 is a flow chart of a log collection method according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of a log collecting device according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device implementing the log collection method of the present application.
Detailed Description
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In addition, it should be noted that, in the technical scheme of the application, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and the like of the candidate log files and the like all conform to the regulations of related laws and regulations and do not violate the popular regulations.
Example 1
Fig. 1 is a flowchart of a log collection method provided in an embodiment of the present application, where the embodiment is applicable to a case where a target application has an exception, and the method is applied to a user terminal that carries the target application, and may be executed by a log collection device, where the log collection device may be implemented in a form of hardware and/or software, and the log collection device may be configured in a computing device, for example, may be a carrier device of the target application. As shown in fig. 1, the method includes:
and S110, sending a candidate log file and an abnormality detection request to a server providing a function service for the target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeding back a log uploading request to the user terminal under the condition that no valid candidate log file is detected.
The abnormal condition of the target application can comprise at least one of incapability of opening an application page, incapability of logging in by a user, incapability of networking by the user, incapability of normal use of service functions and the like; the function service comprises at least one of functions which can be realized by the target application, such as message sending, audio-video call and the like; the candidate log file is used for recording various events of the target application in operation, such as at least one of an operation instruction of the target application, a network state of the target application and the like; the abnormality detection request is an instruction for instructing the server to detect an abnormality problem in the case where the target application is abnormal; the valid candidate log files refer to candidate log files related to the target application; the log upload request refers to an instruction for instructing the user terminal to re-upload the candidate log file in the case that a valid candidate log file is not detected.
The log file can record various events occurring in the application using process, the recording of the events is too complicated, and the efficiency of identifying the target application abnormality by the server can be reduced. Optionally, under the condition that the target application is abnormal, acquiring an operation instruction for the target application and a result state of the target application responding to the operation instruction; generating a candidate log file comprising an operation instruction and a corresponding result state; and sending the candidate log file to a server.
The operation instruction refers to various operations performed on the target application by a user in the process of using the target application; the result state is used to characterize at least one of a running condition of the target application, such as a network state and a stopped running state, and the embodiment of the present application is not limited in any way.
By acquiring the operation instruction and the candidate log file of the corresponding result state in real time, the effective candidate log file can be accurately and efficiently determined, and the efficiency of solving the problem of abnormal target application is improved.
The partial log file may contain private information, and direct transmission of the log file may cause disclosure of private data. Optionally, generating an initial log file including the operation instructions and the corresponding result states; and desensitizing sensitive data in the initial log file to obtain candidate log files.
The sensitive data is data related to privacy of a user, such as at least one of a mobile phone number, a password and the like; the desensitization processing refers to the deformation of the sensitive data by a desensitization rule, wherein the desensitization rule comprises at least one of substitution, rearrangement, masking and the like, and the embodiment of the application is not limited in any way.
After desensitization processing is carried out on desensitization data in the log file, candidate log files are generated, reliable protection of private data is achieved, and data security is improved.
Multiple candidate log files may exist on the user terminal carrying the target application, and at this time, multiple log files are sent simultaneously, which may cause waste of traffic and lower transmission efficiency. Optionally, if the number of the candidate log files is at least two, before sending the candidate log files to the server, compressing each candidate log file to update the candidate log files. By compressing the plurality of candidate log files before sending the candidate log files, the transmission efficiency of the log files is improved while the flow is saved.
Optionally, when the server receives the abnormality detection request, the server detects the validity of the candidate log file sent by the user terminal, and if the valid candidate log file is detected, the server performs abnormality recognition on the target application; and if the valid candidate log file is not detected, sending a log uploading request to the user terminal so that the user terminal can upload the candidate log file again.
The validity detection may include at least one of screening the candidate log file according to a date, screening the candidate log file according to an identifier of the target application, and the embodiment of the present application is not limited in any way.
And S120, resending the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request.
The anomaly identification is that the server determines, according to the operation instruction and the corresponding result state included in the candidate log file, that the target application has at least one of a problem that a page cannot be opened, a user cannot log in, a user cannot networking, and the like, which is not limited in the embodiment of the present application.
Optionally, when the server re-receives the candidate log file, the server performs validity detection on the received candidate log file, and when the valid candidate log file is detected, performs anomaly identification on the target application.
According to the technical scheme, under the condition that the target application is abnormal, a candidate log file and an abnormality detection request are sent to a server providing functional service for the target application, so that the server responds to the abnormality detection request, and under the condition that an effective candidate log file is not detected, a log uploading request is fed back to the user terminal; and re-sending the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request. The candidate log file is actively and/or passively uploaded through the user terminal, so that the server can conduct abnormal identification on the target application according to the candidate log file, remote collection of the log can be conducted without the presence of a user, convenience in log acquisition is improved, and efficiency in solving abnormal problems of the target application is improved.
Example two
Fig. 2 is a flowchart of a log collection method according to a second embodiment of the present application, where on the basis of the technical solutions of the foregoing embodiments, the "respond to the log upload request," resend the candidate log file to the server "is thinned to respond to the log upload request, and a log upload window is generated and displayed; acquiring candidate log files uploaded through the log uploading window; and retransmitting the candidate log file to the server. It should be noted that, in the embodiments of the present application, parts that are not described in detail may be referred to in the related description of other embodiments. As shown in fig. 2, the method includes:
and S210, sending a candidate log file and an abnormality detection request to a server providing function service for the target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeding back a log uploading request to the user terminal under the condition that no valid candidate log file is detected.
S220, responding to the log uploading request, and generating and displaying a log uploading window.
The log uploading window refers to an interface used by an application user to select whether to agree to upload candidate log files.
S230, acquiring candidate log files uploaded through the log uploading window.
Optionally, a log uploading intention component is added in the log uploading window; correspondingly, responding to the touch operation of the log uploading intention component, and judging whether the log uploading intention exists in an application user or not; and controlling the acquisition of the candidate log file through a log uploading window according to the judging result.
The log uploading intention is used for representing whether a user agrees to upload candidate log files or not; the determination result may include at least one of agreement or denial, or the like. The log uploading intention component refers to a component for performing touch operation on the log uploading window by an application user, and the component can comprise at least one of at least two buttons with different functions, which are displayed on the same interface, at least two buttons with different functions, which are displayed on different interfaces, and the like. The touch operation is used for representing selection of the log uploading component by the application user. For example, if the log uploading intention component is two buttons with different actions displayed on the same interface, the user clicks one of the buttons by touch operation; if the log uploading intention component is two buttons with different actions respectively displayed on two interfaces, the touch operation of the user may include clicking at least one of a button of the current first interface or selecting a drop-down switch interface, clicking a button of the second interface, and the like.
Illustratively, the log upload intent component in the log upload window is an approve and reject two buttons, respectively; when the application user touches the consent button, the application user is judged to consent to upload the candidate log file, and at the moment, the candidate log file is controlled to be obtained through a log uploading window.
By judging the log uploading intention of the application user, the personal requirement of the application user is considered, so that the log acquisition is more humanized.
Optionally, according to the determination result, controlling the acquisition of the candidate log file through the log uploading window, including: if the judgment result shows that the log uploading intention exists in the application user, triggering and executing the acquisition of the candidate log file through the log uploading window; if the judgment result shows that the application user does not have the log uploading intention, the candidate log file is not acquired through the log uploading window; and closing the log uploading window.
S240, the candidate log file is resent to the server, so that the server responds to the abnormality detection request, and if a valid candidate log file is detected, abnormality identification is carried out on the target application according to the candidate log file.
According to the technical scheme, under the condition that the target application is abnormal, a candidate log file and an abnormality detection request are sent to a server providing functional service for the target application, so that the server responds to the abnormality detection request, and under the condition that an effective candidate log file is not detected, a log uploading request is fed back to the user terminal; responding to the log uploading request, and generating and displaying a log uploading window; acquiring candidate log files uploaded through the log uploading window; and retransmitting the candidate log file to the server so that the server responds to the abnormality detection request, and carrying out abnormality recognition on the target application according to the candidate log file when a valid candidate log file is detected. The candidate log files uploaded through the log uploading window are obtained and uploaded to the server, and the passive uploading mode of the log files is refined by taking the log uploading window as a medium, so that convenience in remote log obtaining is improved.
Example III
Fig. 3 is a schematic structural diagram of a log collecting device according to a third embodiment of the present application, which is applicable to remote log collection. The log collection means may be implemented in hardware and/or software, and may be configured in a computing device, for example, a user terminal carrying the target application. As shown in fig. 3, the apparatus includes:
an information sending module 310, configured to send, in a case where an abnormality exists in a target application, a candidate log file and an abnormality detection request to a server that provides a function service for the target application, so that the server responds to the abnormality detection request, and in a case where a valid candidate log file is not detected, feeds back a log upload request to the user terminal;
and the log uploading module 320 is configured to resend the candidate log file to the server in response to the log uploading request, so that the server performs exception recognition on the target application according to the candidate log file in response to the exception detection request if a valid candidate log file is detected.
According to the technical scheme, under the condition that the target application is abnormal, a candidate log file and an abnormality detection request are sent to a server providing functional service for the target application, so that the server responds to the abnormality detection request, and under the condition that an effective candidate log file is not detected, a log uploading request is fed back to a user terminal; and re-sending the candidate log file to the server in response to the log uploading request, so that the server can perform anomaly identification on the target application according to the candidate log file in response to the anomaly detection request under the condition that the valid candidate log file is detected. The candidate log file is actively and/or passively uploaded through the user terminal, so that the server can conduct abnormal identification on the target application according to the candidate log file, remote collection of the log can be conducted without the presence of a user, convenience in log acquisition is improved, and efficiency in solving abnormal problems of the target application is improved.
Optionally, the log uploading module 320 includes:
the window generation unit is used for responding to the log uploading request and generating and displaying a log uploading window;
the log obtaining unit is used for obtaining candidate log files uploaded through the log uploading window;
and the log sending unit is used for resending the candidate log file to the server.
Optionally, a log uploading intention component is added in the log uploading window, and correspondingly, the log uploading module 320 further includes:
an intention judging unit for judging whether the log uploading intention exists in the application user or not in response to the touch operation of the log uploading intention component;
and the window control unit is used for controlling the acquisition of the candidate log file through the log uploading window according to the judging result.
Optionally, the window control unit is specifically configured to:
if the judgment result shows that the application user has the log uploading intention, triggering and executing the acquisition of the candidate log file through the log uploading window;
if the judgment result shows that the application user does not have the log uploading intention, the candidate log file is not acquired through the log uploading window;
and closing the log uploading window.
Optionally, the information sending module 310 includes:
an information acquisition unit, configured to acquire an operation instruction for the target application and a result state of the target application in response to the operation instruction, in a case where the target application has an abnormality;
the log generating unit is used for generating candidate log files comprising the operation instructions and corresponding result states;
and the log sending unit is used for sending the candidate log file to the server.
Optionally, the log generating unit is specifically configured to: generating an initial log file comprising the operation instruction and the corresponding result state; and desensitizing the sensitive data in the initial log file to obtain the candidate log file.
Optionally, the log generating unit is further specifically configured to:
and if the number of the candidate log files is at least two, before the candidate log files are sent to the server, compressing each candidate log file so as to update the candidate log files.
The log collecting device provided by the embodiment of the application can execute the log collecting method provided by any embodiment of the application, and has the corresponding functional modules and beneficial effects of executing the log collecting methods.
Example IV
Fig. 4 shows a schematic diagram of an electronic device 410 that may be used to implement an embodiment of the application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
As shown in fig. 4, the electronic device 410 includes at least one processor 411, and a memory, such as a Read Only Memory (ROM) 412, a Random Access Memory (RAM) 413, etc., communicatively connected to the at least one processor 411, wherein the memory stores computer programs executable by the at least one processor, and the processor 411 may perform various suitable actions and processes according to the computer programs stored in the Read Only Memory (ROM) 412 or the computer programs loaded from the storage unit 418 into the Random Access Memory (RAM) 413. In the RAM413, various programs and data required for the operation of the electronic device 410 may also be stored. The processor 411, the ROM 412, and the RAM413 are connected to each other through a bus 414. An input/output (I/O) interface 415 is also connected to bus 414.
Various components in the electronic device 410 are connected to the I/O interface 415, including: an input unit 416 such as a keyboard, a mouse, etc.; an output unit 417 such as various types of displays, speakers, and the like; a storage unit 418, such as a magnetic disk, optical disk, or the like; and a communication unit 419 such as a network card, modem, wireless communication transceiver, etc. The communication unit 419 allows the electronic device 410 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The processor 411 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 411 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 411 performs the various methods and processes described above, such as a log collection method.
In some embodiments, the log collection method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 418. In some embodiments, some or all of the computer program may be loaded and/or installed onto the electronic device 410 via the ROM 412 and/or the communication unit 419. When the computer program is loaded into RAM413 and executed by processor 411, one or more steps of the log collection method described above may be performed. Alternatively, in other embodiments, the processor 411 may be configured to perform the log collection method in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present application may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present application, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present application are achieved, and the present application is not limited herein.
The above embodiments do not limit the scope of the present application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application should be included in the scope of the present application.

Claims (10)

1. The log collection method is characterized by being applied to a user terminal carrying a target application and comprising the following steps of:
sending a candidate log file and an abnormality detection request to a server providing a function service for a target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeding back a log uploading request to the user terminal under the condition that a valid candidate log file is not detected;
and re-sending the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request.
2. The method of claim 1, wherein the resending the candidate log file to the server in response to the log upload request comprises:
responding to the log uploading request, and generating and displaying a log uploading window;
acquiring candidate log files uploaded through the log uploading window;
and retransmitting the candidate log file to the server.
3. The method of claim 2, wherein a log upload intent component is added to the log upload window; correspondingly, the method further comprises the steps of:
responding to the touch operation of the log uploading intention component, and judging whether the log uploading intention exists in an application user or not;
and controlling the acquisition of the candidate log file through a log uploading window according to the judging result.
4. A method according to claim 3, wherein controlling the acquisition of the candidate log file through the log uploading window according to the determination result comprises:
if the judgment result shows that the application user has the log uploading intention, triggering and executing the acquisition of the candidate log file through the log uploading window;
if the judgment result shows that the application user does not have the log uploading intention, the candidate log file is not acquired through the log uploading window;
and closing the log uploading window.
5. The method of claim 1, wherein the sending the candidate log file to the server providing the functional service for the target application in the event that there is an anomaly in the target application comprises:
acquiring an operation instruction for the target application and a result state of the target application in response to the operation instruction under the condition that the target application is abnormal;
generating a candidate log file comprising the operation instruction and the corresponding result state;
and sending the candidate log file to the server.
6. The method of claim 5, wherein generating a candidate log file comprising the operation instructions and corresponding result states comprises:
generating an initial log file comprising the operation instruction and the corresponding result state;
and desensitizing the sensitive data in the initial log file to obtain the candidate log file.
7. The method of claim 5, wherein if the number of candidate log files is at least two, before sending the candidate log files to the server, the method further comprises:
and carrying out compression processing on each candidate log file so as to update the candidate log files.
8. A log collection device, configured to a user terminal carrying a target application, comprising:
the information sending module is used for sending a candidate log file and an abnormality detection request to a server providing a function service for a target application under the condition that the target application is abnormal, so that the server responds to the abnormality detection request, and feeds back a log uploading request to the user terminal under the condition that a valid candidate log file is not detected;
and the log uploading module is used for retransmitting the candidate log file to the server in response to the log uploading request, so that the server can conduct anomaly identification on the target application according to the candidate log file under the condition that the effective candidate log file is detected in response to the anomaly detection request.
9. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the log collection method of any of claims 1-7.
10. A computer readable storage medium having stored thereon a computer program, which when executed by a processor implements the log collection method according to any of claims 1-7.
CN202310859826.2A 2023-07-12 2023-07-12 Log collection method, device, equipment and storage medium Pending CN116846744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310859826.2A CN116846744A (en) 2023-07-12 2023-07-12 Log collection method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310859826.2A CN116846744A (en) 2023-07-12 2023-07-12 Log collection method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116846744A true CN116846744A (en) 2023-10-03

Family

ID=88174108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310859826.2A Pending CN116846744A (en) 2023-07-12 2023-07-12 Log collection method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116846744A (en)

Similar Documents

Publication Publication Date Title
US10534908B2 (en) Alerts based on entities in security information and event management products
CN107390983B (en) Service instruction execution method, client and storage medium
CN112911013B (en) Cloud application processing method and device, computer equipment and storage medium
CN104679239B (en) A kind of terminal input method
CN114328132A (en) Method, device, equipment and medium for monitoring state of external data source
CN106506443A (en) A kind of information inspection method and device
CN115883647B (en) Service log recording method, system, device, terminal, server and medium
CN116450176A (en) Version updating method and device, electronic equipment and storage medium
CN116846744A (en) Log collection method, device, equipment and storage medium
CN113904853B (en) Intrusion detection method, device, electronic equipment and medium of network system
CN115062304A (en) Risk identification method and device, electronic equipment and readable storage medium
CN111177352B (en) Complaint information processing method and device, electronic equipment and readable storage medium
CN111522599B (en) Method and device for transmitting information
CN114401121A (en) Application program login method and device, electronic equipment and readable storage medium
CN111338937B (en) Method, device, equipment and medium for downloading small program intervention
CN114091909A (en) Collaborative development method, system, device and electronic equipment
CN104735240A (en) Mobile terminal information reminding method and device
CN114928540B (en) Preemption method and device, electronic equipment and storage medium
CN117251769B (en) Abnormal data identification method, device, equipment and medium based on monitoring component
US11233828B1 (en) Methods, systems, and media for protecting computer networks using adaptive security workloads
CN115150172B (en) Data processing method, device, equipment and medium
CN114461502B (en) Model monitoring method and device
CN116760741B (en) Data state monitoring method, device, equipment and medium
CN113836509B (en) Information acquisition method, device, electronic equipment and storage medium
CN115840604B (en) Data processing method, device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination