WO2019129957A1 - Method for controlling the management of event traces in the execution of a computer application on a computing machine - Google Patents

Method for controlling the management of event traces in the execution of a computer application on a computing machine Download PDF

Info

Publication number
WO2019129957A1
WO2019129957A1 PCT/FR2018/053446 FR2018053446W WO2019129957A1 WO 2019129957 A1 WO2019129957 A1 WO 2019129957A1 FR 2018053446 W FR2018053446 W FR 2018053446W WO 2019129957 A1 WO2019129957 A1 WO 2019129957A1
Authority
WO
WIPO (PCT)
Prior art keywords
event
traces
internal
application
manager
Prior art date
Application number
PCT/FR2018/053446
Other languages
French (fr)
Inventor
Sébastien MIQUEE
Pierre VIGNERAS
Original Assignee
Bull Sas
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull Sas filed Critical Bull Sas
Publication of WO2019129957A1 publication Critical patent/WO2019129957A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • G06F11/3072Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/86Event-based monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Definitions

  • the invention relates to the field of control methods for the management of event traces in the execution of a computer application on a computer machine.
  • a so-called “log” mechanism that is to say a mechanism for managing event traces, makes it possible to trace what is happening within an application, in particular in order to be able to find the source more quickly. a problem when it occurs.
  • a “log” contains a set of information, such as the name of the program, the date of issue of the "log", a message and a level of criticality.
  • a “log” is often displayed either directly to the user on the console, or redirected to a file or multiple files.
  • the configuration of the "logs" concerning the level of detail, criticality and outputs to be used is determined at the launch of the program or application. Then, to modify this configuration, it is necessary to stop and restart the program or the application with the new configuration.
  • the progress of the generation of event traces by the event trace manager and the use of these event traces by the recipient processes corresponds to a configuration of the management of these event traces relative to the event trace manager. application concerned.
  • An event trace management controller monitors the progress of event trace management by receiving information from the event trace manager by receiving communication.
  • log4j log management library for example available at the following Internet address: http://logging.apache.Org/log4i/2.x/manual/index.html
  • This library of "logs” management is useful but it does not provide remote reconfiguration allowing to add on the fly outputs of "logs”, and it does not propose any mechanism allowing, also well on the local machine than on remote machines, a client to connect to remote applications although these have not been configured a priori, while avoiding restarting applications to perform the management of traces of events.
  • This second prior art is generally not better than the first prior art.
  • This other library has the same characteristics as the library “Log4j”, which is also based largely on it, and therefore has the same limitations. More generally, other programming languages, such as “Python” and “Ruby”, also offer a “log” library offering advanced features such as the implementation of event trace handlers and Event trace handler controllers, internal socket ("socket" in English) for sending and receiving "logs", usually with filtering functionality.
  • This third prior art is also not generally better than the first prior art.
  • the object of the present invention is to provide an event trace management control method at least partially overcoming the aforementioned drawbacks.
  • the invention aims to provide an event trace management control method that allows a reconfiguration of the receiver processes associated with the event trace manager without stopping or disrupting the execution of the application.
  • the invention proposes, on the one hand, the opening of at least one internal control port of the event trace manager, which will be located outside the application, and on the other hand the possibility, by which internal control port, for the management controller, can send messages to the receiving processes of the event trace manager associated with the application being executed, without going through this application in the process of s execute.
  • the management controller will use at least part of the functionality of the event trace manager without the interaction of this event trace manager with its associated application being executed.
  • This event trace manager is then structured from the outset to ensure such communication between the management controller and the recipient processes, without disturbing its own current interaction with its associated application itself being executed.
  • the event trace manager includes a dedicated remote management module ("remote handler" in English) with which will be able to dialogue with the management controller.
  • the management controller then has, on the one hand, a gateway to the recipient processes that is generated so as to be independent of the interaction between the event trace manager and the associated application being executed, and on the other hand a possibility of interaction with the event trace manager, with tools of the event trace manager, which is planned from the outset to be independent of the current interaction between event trace manager and associated application running.
  • the present invention proposes a method for controlling the management of event traces in the execution of a computer application on a computer machine, comprising: a step of managing event traces including: a first communication internal to this computer machine, between on the one hand the application and on the other hand its event trace manager, so as to generate the event traces, a second communication, internal to this computer machine, between on the one hand an internal port of the event trace manager and one or several internal ports of one or more receiving processes storing event traces from the event trace manager, a step of controlling event trace management including: opening at least one port internal control of the event traces manager, a third communication, between on the one hand an event trace management controller located outside the application and outside the event traces manager and on the other hand the or the receiving processes, by one or more messages sent via said internal control port of the event trace manager, this third communication allowing the management controller to Event traces dynamically reconfigure the receiving process (es) without reconfiguring the application and without restarting the application.
  • an architecture and tools are proposed to allow visualization and interaction with the "logs” for remote applications, allowing both visualization in real time “logs”, filtering them eventually, and changing their configuration on the fly, that is to say without stopping or disrupt running applications, and this for a potentially large number of applications.
  • the invention comprises one or more of the following features which may be used separately or in partial combination with each other or in full combination with one another.
  • said internal control port of the event trace manager is an internal only local port of this computer machine, inaccessible directly from the outside of this computer machine, said third communication remaining internal to this computer machine.
  • a management controller located inside the computer machine can dynamically reconfigure the recipient processes without disrupting the execution of the application.
  • said internal port of control of the event trace manager is also open to the outside of this computer machine and allows said third communicating externally to an event trace management controller located on another remote computer machine of this computer machine.
  • a management controller located outside the computer machine can dynamically reconfigure the recipient processes without disrupting the execution of the application.
  • the event trace management control step also includes: opening a relay connected to the internal control port of the event trace manager of said application, or connected to each of the ports internal control respectively event trace handlers of multiple running applications on this computer machine, said relay being adapted to: first send, to an internal port of a management controller event traces, where appropriate via an internal control port of the manager or managers of the traces of events also open to the outside of this computer machine, the identifier of the identifier or identifiers of said internal control ports to which it is connected and to which it can connect the internal port of this event trace management controller, then connect the internal port of this event trace management controller, said or one of said internal control ports to which it is connected, at the request of this event trace management controller.
  • said relay is connected to each of the internal control ports or event trace handlers of several applications running on this computer machine.
  • this management controller can do so without knowing the topography, inside the computer machine , different applications and their associated event trace managers, and advantageously this management controller can do all this from outside the computer machine, that is to say for example from a remote machine or remote by report to the computer machine on which the applications run whose processes receiving event trace managers are to be reconfigured during the execution of these same applications.
  • said relay is connected to a smaller number of internal control ports of the event trace managers also open towards the outside of this computer machine than internal control ports or event trace managers of several applications running on this computer machine, said relay being advantageously connected to a single internal control port of event trace managers also open to the outside of this computer machine.
  • the management controller can manage several running applications, without knowing their topography, and possibly from outside the computer machine on which these applications run, with a small or very small number of ports. internal control open.
  • said dynamic reconfiguration of the recipient process (es) without reconfiguring the application and without restarting the application includes dynamic reconfiguration of all or part of the filter (s) used at the receiving process (s).
  • this or these filters may in particular filter on one or more of the following criteria: a criterion of origin of the event, a criterion of criticality of the event, a criterion of issuer of the event.
  • the sender is the name of the program or application.
  • the origin is the name of a library within the program or application that contains more than one (such libraries).
  • said dynamic reconfiguration of the receiving process (es) without reconfiguring the application and without restarting the application includes the addition of one or more recipient processes storing the event traces from the event trace manager.
  • said second communication is carried out in a form of publication / subscription, the event traces being published by the event trace manager, the recipient processes subscribing to this publication to store only what concerns them respectively .
  • the dynamic reconfiguration at the level of the receiving processes will become particularly simple, by reducing itself to changing the list of information to be retained by each recipient process in the complete information group received, this complete information group received being the same for all the receiving processes attached to the same event trace manager.
  • said opening of the internal port (s) control (s) is performed by a specific module in an event trace management library dedicated to the application.
  • the event trace manager is particularly well placed to open this internal management control port, since it is this same event trace manager that will ensure internal communication to the computer machine between this internal port of control and the recipient processes attached to it.
  • an event trace comprises one or more of the following elements: a description of the event, an identifier of the issuer of the event, a condition of occurrence of the event, a level of criticality of the event , a dating of the event, a context of the event.
  • each receiving process can be configured to retain only what is useful, and the dynamic reconfiguration ensures that the period of time during which it could possibly be required to store too much information, or too much information, depending on the situation, will be very reduced, and all cases will be much smaller than the execution time of the application, since this reconfiguration is dynamic, it will not require waiting for the end of the execution of the application concerned, to be performed.
  • the event trace manager is a communication library, preferably the ZeroMQ library.
  • this communication library is particularly well adapted to be easily modified so as to then allow dynamic reconfiguration of the recipient processes without disrupting the execution of the application for which it manages the event traces.
  • the invention also relates to a computer failure management method incorporating a control method according to the invention.
  • FIG. 1 schematically represents a first example of a computer system enabling the implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention. .
  • FIG. 2 diagrammatically represents a second example of a computer system allowing the remote implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention .
  • FIG. 3 diagrammatically represents a third example of a computer system allowing the remote implementation of the event trace management control method in the execution of several computer applications on a computer machine according to one embodiment of the invention.
  • FIG. 1 schematically represents a first example of a computer system enabling the implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention. .
  • an application 2 is executed.
  • an event trace manager 3 called "BXI log” (for "Bull eXscale Interconnect” in English).
  • This manager 3 opens a first event trace receiver process 4 which is for example a file for storing event traces generated by the manager 3.
  • the manager 3 opens an internal control port 6 of the event trace manager 3.
  • the manager 3 is structured to allow communication between, on the one hand, this internal control port 6 and, on the other hand, the first recipient process 4, this communication on the one hand causing a dynamic reconfiguration of the first recipient process 4 and on the other hand can be done without stopping or disrupting the progress of the application 2 which can continue to run without difficulty on the computer machine 1.
  • the manager 3 is also structured to allow communication between on the one hand this internal control port 6 and on the other hand itself so as to create a second recipient process 5, this communication on the one hand causing the creation of the second recipient process 5 with the desired configuration and on the other hand can be performed without stopping or disrupting the progress of the application 2 which can continue to s' to execute without difficulty on the computer machine 1.
  • the second receiving process 5 can then also be dynamically reconfigured without disturbing or stopping the application 2 continuing to run on the computer machine 1, always by communication via the internal control port 6.
  • the dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 6 and is performed by an event trace management controller 7, located on the computer machine 1 for FIG. 1.
  • the reconfiguration information of the recipient process therefore flows first from the management controller 7 to the internal control port 6, then from the internal control port 6 to the manager 3, then from the manager 3 to the first recipient process 4 and / or to the second recipient process 5, which recipient process, 4 and / or 5, is reconfigured according to this reconfiguration information recipient process which includes for example a request for creation of the second recipient process 5 or a request to change the filtering criteria at the receiving process 4 and / or 5.
  • the computer machine 1 is a physical computer machine that can host one or more different virtual computer machines and / or one or more different containers and / or one or more different virtual machines each hosting one or more different containers.
  • the user uses a management controller 7 on the local computer machine 1.
  • the application 2 uses an event trace manager 3 which can be for example a "BXI Log” library.
  • the event trace manager 3 includes a dedicated remote management module ("remote handler" in English) with which will 7.
  • remote management module "remote handler” in English) with which will 7.
  • the "logs" or event traces are sent to a file 4, and an internal control port 6 is opened locally only.
  • this computer machine 1 can be executed locally a management control program launched on a management controller 7 ("monitor" in Figure 1) which will connect to the internal control port 6 of the application 2.
  • the user will then be able to consult live "logs" of the application 2 by applying the filters that interest him, and this in a dynamic manner, therefore without having to restart either the application 2 or the program of management control of the management controller 7, and / or change the level of "logs" and the filtering of what is written in the file 4, and / or create a new output to a second file 5 with for example a specific filtering different from the one used for the output to the first file 4.
  • FIG. 2 diagrammatically represents a second example of a computer system allowing the remote implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention .
  • FIG. 1 All that concerns FIG. 1, but which is not repeated in FIG. 2, while remaining compatible with FIG. 2, remains valid, notably like the physical computer machine 1 which may comprise several virtual machines and / or several containers and as dynamic creation and / or dynamic reconfiguration of a new recipient process 5.
  • an application 2 is executed.
  • this application 2 is associated a manager 3 of event traces.
  • This manager 3 opens a first event trace receiver process 4 which is for example a file for storing event traces generated by the manager 3.
  • the manager 3 first opens the same internal control port 6 of the event trace manager 3 as in FIG.
  • the manager 3 also opens an internal control port 8 of the event trace manager 3. This internal control port 8 is also open to the outside of the computer machine 1.
  • the manager 3 is structured to allow communication between, on the one hand, this internal control port 8 and, on the other hand, the first recipient process 4, this communication on the one hand causing a dynamic reconfiguration of the first receiving process 4 and secondly can be performed without stopping or disrupting the progress of the application 2 which can continue to run without difficulty on the computer machine 1.
  • the manager 3 is also structured to allow communication between on the one hand this internal control port 8 and on the other hand itself so as to create a second non-receiving process.
  • this communication on the one hand causing the creation of the second receiving process with the desired configuration and on the other hand can be performed without stopping or disrupt the course of the application 2 which can continue to run without difficulty on the computer machine 1.
  • the second receiving process can then also be dynamically reconfigured without disruption or stopping the application 2 continuing to run on the computer machine 1, by communication via the internal control port 8 open to the outside.
  • the dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 8 open to the outside and is performed by an event trace management controller 7, located on another local computer machine 9, the computer machines 1 and 9 being spaced apart from one another, that is to say located at different physical locations and distant from each other, by example of different rooms, or different buildings, or even different cities, one of the computer machines 9 and 1 being called the local machine, on which is performed the management control, and the other the remote machine, on which are running the applications.
  • the reconfiguration information of the recipient processes therefore flows first from the management controller 7 to the internal control port 8 open to the outside, then from the internal control port 8 open outwards to the manager 3, then from the manager 3 to the first recipient process 4 and / or to a second unrepresented recipient process, which recipient process 4, for example, is reconfigured in accordance with this reconfiguration information of the recipient processes which comprises for example a request for modification of the filter criteria at level of the recipient process 4.
  • the user uses a management controller 7 on the local computer machine 1, which represents the use of the remote management control functionality of the remote computer machine 9 on which the application 2 executes using a manager 3 traces of events (for example a library "BXI Log"), with as for Figure 1 an output to a local file 4 and a purely local control port 6 local.
  • the event trace manager 3 comprises a dedicated remote management module ("remote handler" in English) with which the management controller 7 can interact.
  • An internal control port 8 open to the outside has also been configured. , thus allowing access to the management controller 7 running on a local computer machine 9 remote from the remote computer machine 1, to allow the user to be able to connect and perform the same operations as if he was connecting on the purely local internal control port 6, as in FIG.
  • FIG. 3 diagrammatically represents a third example of a computer system allowing the remote implementation of the event trace management control method in the execution of several computer applications on a computer machine according to one embodiment of the invention.
  • FIG. 1 All that concerns FIG. 1, but which is not repeated at the level of FIG. 3, while remaining compatible with FIG. 3, remains valid, notably like the physical computer machine 1 which may comprise several virtual machines and / or several containers and as dynamic creation and / or dynamic reconfiguration of a new recipient process 5.
  • traces of events which are for example files for storing event traces generated by the managers 3, 13, 23 and 33.
  • the managers 3, 13, 23 and 33 first open internal control ports 6, 16, 26 and 36, managers 3, 13, 23 and 33, traces of events, similar to the internal port 6 of Figure 1 and that of Figure 2.
  • the handlers 3, 13, 23 and 33 are all attached to a relay 10 which opens an internal control port 8 open to the outside similar to that of Figure 2.
  • the communications can be transmitted bi-directionally between this relay 10 and the internal control port 8 open to the outside.
  • This internal control port 8 is open to the outside of the computer machine 1.
  • the managers 3, 13, 23 and 33 are structured to allow communication between the relay 10 on the one hand and the one on the other hand of the first recipient processes 4, 14, 24 and 34, this communication on the one hand causing a dynamic reconfiguration of the first receiving process concerned 4, 14, 24 or 34, and on the other hand can be performed without stopping or disrupting the progress of the corresponding application, 2 12, 22 or 32, who can continue to run without difficulty on the computer machine 1.
  • the handlers 3, 13, 23 and 33 are also structured to allow communication between on the one hand this relay 10 and on the other hand respectively themselves so as to create a second recipient process not shown in Figure 2 for reasons of simplicity, this communication on the one hand causing the creation of the second receiving process with the desired configuration and on the other hand can be done without stopping or disrupt the respective course of the application 2, 12, 22 or 32, which can continue to run without difficulty on the computer machine 1.
  • the second receiving process can then also be reconfigured dynamically without disruption or shutdown of the application 2, 12, 22 or 32, continuing to run on the computer machine 1, always p ar communication via first the internal control port 8, then via the relay 10, from the management controller 7 located on the computer machine 9.
  • the dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 8 open to the outside and is performed by an event trace management controller 7, located on another local computer machine 9, the computer machines 1 and 9 are spaced relative to each other, that is to say, located at different physical locations and distant from each other, one of the computer machines 9 and 1 being called the local machine and the other the remote machine.
  • the reconfiguration information of the recipient processes therefore flows first from the management controller 7 to the internal control port 8 open to the outside and then from the internal control port 8 outward towards the relay 10, finally from the relay 10 to the manager concerned 3, 13, 23 or 33, then from the manager concerned 3, 13, 23 or 33, to the first recipient process concerned 4, 14, 24 or 34, and / or to a second non-represented recipient process concerned, which receiving process 4, 14, 24 or 34 for example, is reconfigured in accordance with this reconfiguration information of the recipient processes which comprises for example a request for modification of the criteria of filtering at the recipient process 4, 14, 24 or 34.
  • the use of the relay 10 on the remote computer machine 1 allows the user, through the use of an internal control port 8 open outside the remote computer machine 1, to expose the internal control ports, 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the computer machine 1 remote.
  • Relay 10 connects to all internal control ports 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the same computer machine 1 distant than this relay 10.
  • the manager 3 of event traces includes a dedicated remote management module ("remote handler" in English) with which the management controller 7. can interact.
  • the management controller 7 executing on the local computer machine 9 can, in connecting to a single external control port 8 open to the outside and remote, access the "logs", that is to say the event traces, all remote applications 2, 12, 22 and 32, running on the remote computer machine 1, similarly to the operation of Figure 2, but this time for several applications 2, 12, 22 and 32 at a time.
  • This implementation of this pair consisting of the relay 10 on the one hand and the internal control port 8 open on the other hand, allows the management controller 7 and the user who controls it to be able to save resources such as internal control ports, whether local or open to the outside, up to allowing the use of a single internal control port 8 open to the outside instead of four of them respectively dedicated to each of the applications 2, 12, 22 and 32, which run on the remote computer machine 1, and / or to be able to access the "logs" of an application 2, 12, 22 or 32, remote, even if it was not configured for this at startup, because for example because of a forgetfulness of the user or a change of need running this application.
  • relay 10 and its implementation can also be implemented in the case of several applications 2 not executing or not all running on the same computer machine 1, requiring in this case a relay 10 by the same group. applications 2 running on the same computer machine 1.
  • relay 10 can also be implemented on a computer machine 1, even in the case of Figure 1, where the management controller 7 is also located on the same computer machine 1.
  • a relay service 10 may also be deployed on the computer machine 1 to allow connection to the internal control ports 6, 16, 26 and / or 36, local from another computer machine 9 remote from the computer machine 1.
  • C ' is for this reason that by default is open a local internal control port 6, so just start a relay service 10 to be able to access it without having to reconfigure and restart the application 2, 12, 22 or 32, to which it is desired to connect.
  • This relay service 10 connects to all internal control ports 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the computer machine 1, and opens an internal port of control 8 open to the outside of this computer machine 1, allowing the management controller 7 to connect to it and thus access any internal control port 6, 16, 26 or 36, from any which application 2, 12, 22 or 32, running on the computer machine 1.
  • a user can act on the configuration of the "logs" of the corresponding application 2, 12, 22 or 32.
  • the user can then observe in real time the "logs" of the chosen application, applying live filter configurations, such as the level of the logs, the sub-parts of logs, or others, and / or or change the configuration of the other receptive outputs or processes, such as writing to one or more files, writing to a "syslog” daemon, to a console, for example by changing the level of the "logs", and / or add and / or delete outputs on the fly, such as files, output to a "syslog” daemon.

Abstract

The invention relates to a method for controlling the management of event traces in the execution of a computer application (2) on a computing machine (1), comprising: a step of managing the event traces including: a first communication, internal to this computing machine (1), between the application (2), on the one hand, and its event trace manager (3), so as to generate the event traces, a second communication, internal to this computing machine (1), between an internal port of the event trace manager (3), and one or more internal ports of one or more receiver processes (4, 5) storing the event traces from the event trace manager (3), a step of controlling the management of the event traces including: opening at least one internal control port (6, 8) of the event trace manager (3), a third communication, between an event trace management controller (7) located outside the application (2) and outside the event trace manager (3), and the receiver process or processes (4, 5), on the other hand, through one or more messages sent via said internal control port (6, 8) of the event trace manager (3), this third communication allowing the event trace management controller (7) to dynamically reconfigure the receiver process or processes (4, 5) without reconfiguring the application (2) and without restarting the application (2).

Description

PROCEDE DE CONTROLE DE LA GESTION DES TRACES D’EVENEMENTS DANS L’EXECUTION D’UNE APPLICATION INFORMATIQUE SUR UNE MACHINE INFORMATIQUE  METHOD FOR CONTROLLING THE MANAGEMENT OF TRACES OF EVENTS IN THE EXECUTION OF A COMPUTER APPLICATION ON A COMPUTER MACHINE
DOMAINE DE L’INVENTION FIELD OF THE INVENTION
L’invention concerne le domaine des procédés de contrôle de la gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique. The invention relates to the field of control methods for the management of event traces in the execution of a computer application on a computer machine.
CONTEXTE DE L’INVENTION BACKGROUND OF THE INVENTION
Un mécanisme dit de « log », c’est-à-dire un mécanisme de gestion de traces d’événements, permet de tracer ce qui se passe au sein d’une application, en particulier dans le but pouvoir trouver plus rapidement la source d’un problème lorsqu’il survient. Un « log » contient un ensemble d’informations, notamment telles que le nom du programme, la date d’émission du « log », un message et un niveau de criticité. Un « log » est souvent soit affiché directement à l’utilisateur sur la console, soit redirigé dans un fichier ou dans plusieurs fichiers. De manière générale, la configuration des « logs » concernant le niveau de détails, de criticité et les sorties à utiliser est déterminée au lancement du programme ou de l’application. Puis, pour modifier cette configuration, il faut stopper et relancer le programme ou l’application avec la nouvelle configuration. Ensuite, lorsqu’un programme ou une application s’exécute sur une machine distante, souvent les « logs » sont redirigés vers un fichier et l’utilisateur ne dispose pas de moyen efficace pour les visionner en temps réel tout en modifiant le filtrage sur ces « logs », en utilisant un mécanisme basé par exemple sur le niveau de criticité ou sur le nom du module qui est à l’origine du « log ». Selon un premier art antérieur, par exemple décrit dans la demande de brevet WO2016038272, incorporée par référence, il est connu un procédé de gestion de traces d’événements incluant un procédé de contrôle de gestion des traces d’événements. Des processus receveurs stockent les traces d’événements en provenance du gestionnaire de traces d’événements. Le déroulement de la génération des traces d’événements par le gestionnaire de traces d’événements et de l’utilisation de ces traces d’événements par les processus receveurs correspond à une configuration de la gestion de ces traces d’événements relative à l’application concernée. Un contrôleur de gestion de traces d’événements permet la surveillance du déroulement de la gestion des traces d’événements en recevant des informations de la part du gestionnaire de traces d’événements, par une communication réceptrice. A so-called "log" mechanism, that is to say a mechanism for managing event traces, makes it possible to trace what is happening within an application, in particular in order to be able to find the source more quickly. a problem when it occurs. A "log" contains a set of information, such as the name of the program, the date of issue of the "log", a message and a level of criticality. A "log" is often displayed either directly to the user on the console, or redirected to a file or multiple files. In general, the configuration of the "logs" concerning the level of detail, criticality and outputs to be used is determined at the launch of the program or application. Then, to modify this configuration, it is necessary to stop and restart the program or the application with the new configuration. Then, when a program or an application runs on a remote machine, often the "logs" are redirected to a file and the user does not have an effective way to view them in real time while modifying the filtering on them. "Logs", using a mechanism based for example on the level of criticality or on the name of the module which is at the origin of the "log". According to a first prior art, for example described in the patent application WO2016038272, incorporated by reference, there is known a method of managing event traces including an event trace management control method. Receiving processes store event traces from the Event Log Manager. The progress of the generation of event traces by the event trace manager and the use of these event traces by the recipient processes corresponds to a configuration of the management of these event traces relative to the event trace manager. application concerned. An event trace management controller monitors the progress of event trace management by receiving information from the event trace manager by receiving communication.
Cependant, il n’est pas possible de modifier cette configuration pendant l’exécution de l’application. Il faut d’abord attendre l’arrêt de l’application, puis reconfigurer l’application et relancer l’application. Il n’est donc pas possible de modifier cette configuration sans arrêter ni sans perturber l’exécution de cette application. En effet, la seule communication émettrice que peut effectuer le contrôleur de gestion de traces d’événements à destination des processus receveurs en passant par le gestionnaire de traces d’événements est une communication passant par l’application en train d’être exécutée, à laquelle est associé le gestionnaire de traces d’événements, entraînant alors l’arrêt ou la perturbation de l’exécution de cette application. La capacité d’action sur les processus receveurs associés ou la capacité de reconfiguration des processus receveurs associés de reconfiguration des processus receveurs associés sont donc limitées.  However, it is not possible to modify this configuration during the execution of the application. First, wait for the application to stop, then reconfigure the application and restart the application. It is therefore not possible to modify this configuration without stopping or disrupting the execution of this application. Indeed, the only transmitting communication that can be performed by the event trace management controller to the recipient processes via the event trace manager is a communication passing through the application being executed, which is associated with the event trace manager, thus causing the execution of this application to be stopped or interrupted. The ability to act on the associated recipient processes or the ability to reconfigure the associated recipient processes to reconfigure the associated recipient processes is therefore limited.
Selon un deuxième art antérieur, il existe une bibliothèque de gestion de logs dénommée « Log4j » par exemple disponible à l’adresse internet suivante : http://logging.apache.Org/log4i/2.x/manual/index.html  According to a second prior art, there is a log management library called "Log4j" for example available at the following Internet address: http://logging.apache.Org/log4i/2.x/manual/index.html
Cette bibliothèque de gestion de « logs » est utile mais elle ne fournit pas de reconfiguration à distance permettant d’ajouter à la volée des sorties de « logs », et elle ne propose pas non plus de mécanisme permettant, aussi bien sur la machine locale que sur des machines distantes, à un client de se connecter aux applications distantes bien que celles-ci n’aient pas été configurées a priori, tout en évitant de redémarrer les applications pour pouvoir effectuer la gestion de traces d’événements. Ce deuxième art antérieur n’est globalement pas meilleur que le premier art antérieur. This library of "logs" management is useful but it does not provide remote reconfiguration allowing to add on the fly outputs of "logs", and it does not propose any mechanism allowing, also well on the local machine than on remote machines, a client to connect to remote applications although these have not been configured a priori, while avoiding restarting applications to perform the management of traces of events. This second prior art is generally not better than the first prior art.
Selon un troisième art antérieur, il existe une autre bibliothèque de « log », elle aussi en Java, qui est dénommée la bibliothèque « java.util.logging », disponible à l’adresse internet suivante :  According to a third prior art, there is another library of "log", also in Java, which is called the library "java.util.logging", available at the following internet address:
https://docs.oracle.com/iavase/7/docs/api/iava/util/logging/package- summary.html  https://docs.oracle.com/iavase/7/docs/api/iava/util/logging/package- summary.html
Cette autre bibliothèque présente les mêmes caractéristiques que la bibliothèque « Log4j », qui est d’ailleurs basée en grande partie sur elle, et elle présente donc les mêmes limitations. De manière plus générale, d’autres langages de programmation, comme par exemple « Python » et « Ruby », proposent également une bibliothèque de « log » proposant des fonctionnalités avancées telles que la mise en place de gestionnaires de traces d’événements et de contrôleurs de gestionnaires de traces d’événements, de port interne (« socket » en langue anglaise) d’envoi et de réception des « logs », avec généralement une fonctionnalité de filtrage. Ce troisième art antérieur n’est globalement pas non plus meilleur que le premier art antérieur.  This other library has the same characteristics as the library "Log4j", which is also based largely on it, and therefore has the same limitations. More generally, other programming languages, such as "Python" and "Ruby", also offer a "log" library offering advanced features such as the implementation of event trace handlers and Event trace handler controllers, internal socket ("socket" in English) for sending and receiving "logs", usually with filtering functionality. This third prior art is also not generally better than the first prior art.
RESUME DE L’INVENTION Le but de la présente invention est de fournir un procédé de contrôle de gestion des traces d’événements palliant au moins partiellement les inconvénients précités. SUMMARY OF THE INVENTION The object of the present invention is to provide an event trace management control method at least partially overcoming the aforementioned drawbacks.
Plus particulièrement, l’invention vise à fournir un procédé de contrôle de gestion des traces d’événements qui permette une reconfiguration des processus receveurs associés au gestionnaire des traces d’événements sans arrêter ni perturber l’exécution de l’application. Pour cela, l’invention propose, d’une part l’ouverture d’au moins un port interne de contrôle du gestionnaire des traces d’événements, qui sera localisé hors de l’application, et d’autre part la possibilité, par lequel port interne de contrôle, pour le contrôleur de gestion, de pouvoir envoyer des messages à destination des processus receveurs du gestionnaire de traces d’événements associé à l’application en train de s’exécuter, sans passer par cette application en train de s’exécuter. More particularly, the invention aims to provide an event trace management control method that allows a reconfiguration of the receiver processes associated with the event trace manager without stopping or disrupting the execution of the application. For this purpose, the invention proposes, on the one hand, the opening of at least one internal control port of the event trace manager, which will be located outside the application, and on the other hand the possibility, by which internal control port, for the management controller, can send messages to the receiving processes of the event trace manager associated with the application being executed, without going through this application in the process of s execute.
Le contrôleur de gestion va pour cela utiliser au moins une partie des fonctionnalités du gestionnaire de traces d’événements sans que l’interaction de ce gestionnaire de traces d’événements avec son application associée en cours d’exécution n’en soit perturbée.  For this purpose, the management controller will use at least part of the functionality of the event trace manager without the interaction of this event trace manager with its associated application being executed.
Ce gestionnaire de traces d’événements est alors structuré dès le départ pour assurer une telle communication entre le contrôleur de gestion et les processus receveurs, sans perturber sa propre interaction en cours avec son application associée elle-même en cours d’exécution. Avantageusement, le gestionnaire de traces d’événements comprend un module dédié de gestion distante (« remote handler » en langue anglaise) avec lequel va pouvoir dialoguer le contrôleur de gestion.  This event trace manager is then structured from the outset to ensure such communication between the management controller and the recipient processes, without disturbing its own current interaction with its associated application itself being executed. Advantageously, the event trace manager includes a dedicated remote management module ("remote handler" in English) with which will be able to dialogue with the management controller.
Le contrôleur de gestion dispose alors, d’une part d’une porte d’entrée vers les processus receveurs qui est générée de manière à être indépendante de l’interaction entre gestionnaire de traces d’événements et application associée en cours d’exécution, et d’autre part d’une possibilité d’interaction avec le gestionnaire de traces d’événements, en disposant d’outils du gestionnaire de traces d’événements, qui est prévue dès le départ pour être indépendante de l’interaction en cours entre gestionnaire de traces d’événements et application associée en cours d’exécution.  The management controller then has, on the one hand, a gateway to the recipient processes that is generated so as to be independent of the interaction between the event trace manager and the associated application being executed, and on the other hand a possibility of interaction with the event trace manager, with tools of the event trace manager, which is planned from the outset to be independent of the current interaction between event trace manager and associated application running.
A cette fin, la présente invention propose un procédé de contrôle de la gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique, comprenant : une étape de gestion des traces d’événements incluant : une première communication, interne à cette machine informatique, entre d’une part l’application et d’autre part son gestionnaire de traces d’événements, de manière à générer les traces d’événements, une deuxième communication, interne à cette machine informatique, entre d’une part un port interne du gestionnaire de traces d’événements et un ou plusieurs ports internes d’un ou de plusieurs processus receveurs stockant les traces d’événements en provenance du gestionnaire de traces d’événements, une étape de contrôle de la gestion des traces d’événements incluant : l’ouverture d’au moins un port interne de contrôle du gestionnaire des traces d’événements, une troisième communication, entre d’une part un contrôleur de gestion des traces d’événements localisé hors de l’application et hors du gestionnaire des traces d’événements et d’autre part le ou les processus receveurs, par un ou plusieurs messages envoyés via ledit port interne de contrôle du gestionnaire des traces d’événements, cette troisième communication permettant au contrôleur de gestion des traces d’événements de reconfigurer dynamiquement le ou les processus receveurs sans reconfigurer l’application et sans redémarrer l’application. To this end, the present invention proposes a method for controlling the management of event traces in the execution of a computer application on a computer machine, comprising: a step of managing event traces including: a first communication internal to this computer machine, between on the one hand the application and on the other hand its event trace manager, so as to generate the event traces, a second communication, internal to this computer machine, between on the one hand an internal port of the event trace manager and one or several internal ports of one or more receiving processes storing event traces from the event trace manager, a step of controlling event trace management including: opening at least one port internal control of the event traces manager, a third communication, between on the one hand an event trace management controller located outside the application and outside the event traces manager and on the other hand the or the receiving processes, by one or more messages sent via said internal control port of the event trace manager, this third communication allowing the management controller to Event traces dynamically reconfigure the receiving process (es) without reconfiguring the application and without restarting the application.
Selon des modes de réalisation préférentiels de l’invention, une architecture et des outils sont proposés pour permettre de visualiser et d’interagir avec les « logs » pour des applications distantes, en permettant aussi bien de visualiser en temps réel les « logs », en les filtrant éventuellement, et en changeant leur configuration à la volée, c’est-à-dire sans arrêter ni perturber les applications en cours d’exécution, et ceci pour un nombre éventuellement élevé d’applications.  According to preferred embodiments of the invention, an architecture and tools are proposed to allow visualization and interaction with the "logs" for remote applications, allowing both visualization in real time "logs", filtering them eventually, and changing their configuration on the fly, that is to say without stopping or disrupt running applications, and this for a potentially large number of applications.
Selon des modes de réalisation préférentiels de l’invention, dans un environnement distribué, avec de nombreux programmes ou applications s’exécutant sur plusieurs machines informatique, il va devenir possible pour un utilisateur, de visualiser en temps réel les « logs » d’un programme ou d’une application s’exécutant sur une machine distante en appliquant un filtrage multicritères, et/ou de pouvoir reconfigurer à la volée les « logs » d’une application s’exécutant sur une machine, aussi bien en local qu’en distant, et/ou d’ajouter ou de retirer des sorties de « logs », comme par exemple des fichiers, une console, ou un nouveau port interne, tout en appliquant dynamiquement un filtrage particulier, et/ou ne pas avoir à connaître tous les ports de « log » de toutes les applications sur chacune des machines informatique, locale et/ou distantes, pour pouvoir s’y connecter. According to preferred embodiments of the invention, in a distributed environment, with many programs or applications running on several computer machines, it will become possible for a user to visualize in real time the "logs" of a computer. program or application running on a remote machine by applying multi-criteria filtering, and / or being able to reconfigure on the fly the "logs" of an application running on a machine, both locally and remote, and / or add or remove "log" outputs, such as example of the files, a console, or a new internal port, while dynamically applying a particular filtering, and / or not having to know all the "log" ports of all the applications on each of the computer, local and / or distant, to be able to connect to it.
Suivant des modes de réalisation préférés, l’invention comprend une ou plusieurs des caractéristiques suivantes qui peuvent être utilisées séparément ou en combinaison partielle entre elles ou en combinaison totale entre elles.  According to preferred embodiments, the invention comprises one or more of the following features which may be used separately or in partial combination with each other or in full combination with one another.
De préférence, ledit port interne de contrôle du gestionnaire des traces d’événements, ou au moins l’un desdits ports internes de contrôle du gestionnaire des traces d’événements, est un port interne seulement local de cette machine informatique, inaccessible directement depuis l’extérieur de cette machine informatique, ladite troisième communication restant interne à cette machine informatique.  Preferably, said internal control port of the event trace manager, or at least one of said internal control ports of the event trace manager, is an internal only local port of this computer machine, inaccessible directly from the outside of this computer machine, said third communication remaining internal to this computer machine.
Ainsi, un contrôleur de gestion situé à l’intérieur de la machine informatique peut reconfigurer dynamiquement les processus receveurs sans perturber l’exécution de l’application.  Thus, a management controller located inside the computer machine can dynamically reconfigure the recipient processes without disrupting the execution of the application.
De préférence, ledit port interne de contrôle du gestionnaire des traces d’événements, ou au moins l’un desdits ports internes de contrôle du gestionnaire des traces d’événements, est également ouvert vers l’extérieur de cette machine informatique et permet ladite troisième communication en externe vers un contrôleur de gestion des traces d’événements localisé sur une autre machine informatique distante de cette machine informatique.  Preferably, said internal port of control of the event trace manager, or at least one of said internal control ports of the event trace manager, is also open to the outside of this computer machine and allows said third communicating externally to an event trace management controller located on another remote computer machine of this computer machine.
Ainsi, un contrôleur de gestion situé à l’extérieur de la machine informatique peut reconfigurer dynamiquement les processus receveurs sans perturber l’exécution de l’application.  Thus, a management controller located outside the computer machine can dynamically reconfigure the recipient processes without disrupting the execution of the application.
De préférence, l’étape de contrôle de la gestion des traces d’événements inclut aussi : l’ouverture d’un relais relié au port interne de contrôle du gestionnaire des traces d’événements de ladite application, ou bien relié à chacun des ports internes de contrôle respectivement des gestionnaires des traces d’événements de plusieurs applications s’exécutant sur cette machine informatique, ledit relais étant adapté pour : d’abord envoyer, à un port interne d’un contrôleur de gestion des traces d’événements, le cas échéant via un port interne de contrôle du gestionnaire ou des gestionnaires des traces d’événements également ouvert vers l’extérieur de cette machine informatique, l’identifiant dudit ou les identifiants desdits ports internes de contrôle auxquels il est relié et vers lesquels il peut connecter le port interne de ce contrôleur de gestion des traces d’événements, ensuite connecter au port interne de ce contrôleur de gestion des traces d’événements, ledit ou l’un desdits ports internes de contrôle auxquels il est relié, à la demande de ce contrôleur de gestion des traces d’événements. Preferably, the event trace management control step also includes: opening a relay connected to the internal control port of the event trace manager of said application, or connected to each of the ports internal control respectively event trace handlers of multiple running applications on this computer machine, said relay being adapted to: first send, to an internal port of a management controller event traces, where appropriate via an internal control port of the manager or managers of the traces of events also open to the outside of this computer machine, the identifier of the identifier or identifiers of said internal control ports to which it is connected and to which it can connect the internal port of this event trace management controller, then connect the internal port of this event trace management controller, said or one of said internal control ports to which it is connected, at the request of this event trace management controller.
De préférence, ledit relais est relié à chacun des ports internes de contrôle respectivement des gestionnaires des traces d’événements de plusieurs applications s’exécutant sur cette machine informatique.  Preferably, said relay is connected to each of the internal control ports or event trace handlers of several applications running on this computer machine.
Ainsi, non seulement un contrôleur de gestion peut gérer plusieurs applications en cours d’exécution et reconfigurer dynamiquement leurs processus receveurs sans perturber leurs exécutions, mais aussi ce contrôleur de gestion peut le faire sans connaître la topographie, à l’intérieur de la machine informatique, des différentes applications et de leurs gestionnaires de traces d’événements associés, et avantageusement ce contrôleur de gestion peut faire tout cela depuis l’extérieur de la machine informatique, c’est-à-dire par exemple depuis une machine distante ou déportée par rapport à la machine informatique sur laquelle s’exécutent les applications dont les processus receveurs des gestionnaires de traces d’événements sont à reconfigurer pendant l’exécution de ces mêmes applications.  Thus, not only can a management controller manage multiple running applications and dynamically reconfigure their receiving processes without disrupting their executions, but also this management controller can do so without knowing the topography, inside the computer machine , different applications and their associated event trace managers, and advantageously this management controller can do all this from outside the computer machine, that is to say for example from a remote machine or remote by report to the computer machine on which the applications run whose processes receiving event trace managers are to be reconfigured during the execution of these same applications.
De préférence, ledit relais est relié à un nombre moins élevé de ports internes de contrôle des gestionnaires des traces d’événements également ouverts vers l’extérieur de cette machine informatique que de ports internes de contrôle respectivement des gestionnaires des traces d’événements de plusieurs applications s’exécutant sur cette machine informatique, ledit relais étant avantageusement relié à un seul port interne de contrôle des gestionnaires des traces d’événements également ouvert vers l’extérieur de cette machine informatique. Preferably, said relay is connected to a smaller number of internal control ports of the event trace managers also open towards the outside of this computer machine than internal control ports or event trace managers of several applications running on this computer machine, said relay being advantageously connected to a single internal control port of event trace managers also open to the outside of this computer machine.
Ainsi, le contrôleur de gestion peut gérer plusieurs applications en cours d’exécution, sans connaître leur topographie, et éventuellement depuis l’extérieur de la machine informatique sur laquelle ces applications s’exécutent, avec un nombre réduit, voire très réduit, de ports internes de contrôle ouverts.  Thus, the management controller can manage several running applications, without knowing their topography, and possibly from outside the computer machine on which these applications run, with a small or very small number of ports. internal control open.
De préférence, ladite reconfiguration dynamique du ou des processus receveurs sans reconfigurer l’application et sans redémarrer l’application inclut une reconfiguration dynamique de tout ou partie du ou des filtres utilisés au niveau du ou des processus receveurs.  Preferably, said dynamic reconfiguration of the recipient process (es) without reconfiguring the application and without restarting the application includes dynamic reconfiguration of all or part of the filter (s) used at the receiving process (s).
Ainsi, la richesse des possibilités de reconfiguration dynamique est augmentée, et l’efficacité du contrôle de gestion de traces d’événements est améliorée.  Thus, the richness of the dynamic reconfiguration possibilities is increased, and the efficiency of event trace management control is improved.
De préférence, ce ou ces filtres pouvant notamment filtrer sur un ou plusieurs des critères suivants : un critère d’origine de l’événement, un critère de criticité de l’événement, un critère d’émetteur de l’événement. L’émetteur est le nom du programme ou de l’application. L’origine est le nom d’une bibliothèque à l’intérieur du programme ou de l’application qui en contient plusieurs (de telles bibliothèques).  Preferably, this or these filters may in particular filter on one or more of the following criteria: a criterion of origin of the event, a criterion of criticality of the event, a criterion of issuer of the event. The sender is the name of the program or application. The origin is the name of a library within the program or application that contains more than one (such libraries).
Ainsi, la richesse des possibilités de reconfiguration dynamique est augmentée, et l’efficacité du contrôle de gestion de traces d’événements est améliorée.  Thus, the richness of the dynamic reconfiguration possibilities is increased, and the efficiency of event trace management control is improved.
De préférence, ladite reconfiguration dynamique du ou des processus receveurs sans reconfigurer l’application et sans redémarrer l’application inclut l’ajout d’un ou de plusieurs processus receveurs stockant les traces d’événements en provenance du gestionnaire de traces d’événements.  Preferably, said dynamic reconfiguration of the receiving process (es) without reconfiguring the application and without restarting the application includes the addition of one or more recipient processes storing the event traces from the event trace manager.
Ainsi, la richesse des possibilités de reconfiguration dynamique est augmentée, incluant même l’ajout de processus receveur(s), et l’efficacité comme l’étendue du contrôle de gestion de traces d’événements sont améliorées. Thus, the richness of the possibilities of dynamic reconfiguration is increased, even including the addition of the recipient process (s), and the efficiency as the extent of event trace management control are improved.
De préférence, ladite deuxième communication est réalisée sous une forme de publication / abonnement, les traces d’événements étant publiées par le gestionnaire de traces d’événements, les processus receveurs s’abonnant à cette publication pour ne stocker que ce qui les concerne respectivement.  Preferably, said second communication is carried out in a form of publication / subscription, the event traces being published by the event trace manager, the recipient processes subscribing to this publication to store only what concerns them respectively .
Ainsi, la reconfiguration dynamique au niveau des processus receveurs va devenir particulièrement simple, en se réduisant à changer la liste des informations à conserver par chaque processus receveur dans le groupe d’informations complet reçu, ce groupe d’informations complet reçu étant le même pour tous les processus receveurs rattachés à un même gestionnaire de traces d’événements.  Thus, the dynamic reconfiguration at the level of the receiving processes will become particularly simple, by reducing itself to changing the list of information to be retained by each recipient process in the complete information group received, this complete information group received being the same for all the receiving processes attached to the same event trace manager.
De préférence, ladite ouverture du ou des port(s) inteme(s) de contrôle est réalisée par un module spécifique dans une bibliothèque de gestion de traces d’événements dédiée à l’application.  Preferably, said opening of the internal port (s) control (s) is performed by a specific module in an event trace management library dedicated to the application.
Ainsi, le gestionnaire de traces d’événements est particulièrement bien placé pour ouvrir ce port interne de contrôle de gestion, puisque c’est ce même gestionnaire de traces d’événements qui va assurer la communication interne à la machine informatique entre ce port interne de contrôle et les processus receveurs qui lui sont rattachés.  Thus, the event trace manager is particularly well placed to open this internal management control port, since it is this same event trace manager that will ensure internal communication to the computer machine between this internal port of control and the recipient processes attached to it.
De préférence, une trace d’événement comprend un ou plusieurs des éléments suivants : un descriptif de l’événement, un identifiant d’émetteur de l’événement, une condition de survenue de l’événement, un niveau de criticité de l’événement, une datation de l’événement, un contexte de l’événement.  Preferably, an event trace comprises one or more of the following elements: a description of the event, an identifier of the issuer of the event, a condition of occurrence of the event, a level of criticality of the event , a dating of the event, a context of the event.
Ainsi, la trace d’événement étant particulièrement complète, chaque processus receveur peut être configuré pour ne retenir que ce qui lui est utile, et la reconfiguration dynamique lui assure que la période de temps pendant laquelle il pourrait éventuellement être amené à stocker trop informations, ou beaucoup trop d’informations, selon la situation, sera très réduite, et tous cas sera bien plus réduite que le temps d’exécution de l’application, puisque cette reconfiguration étant dynamique, elle ne nécessitera pas d’attendre la fin de l’exécution de l’application concernée, pour être effectuée. Thus, the event trace is particularly complete, each receiving process can be configured to retain only what is useful, and the dynamic reconfiguration ensures that the period of time during which it could possibly be required to store too much information, or too much information, depending on the situation, will be very reduced, and all cases will be much smaller than the execution time of the application, since this reconfiguration is dynamic, it will not require waiting for the end of the execution of the application concerned, to be performed.
De préférence, le gestionnaire de traces d’événements est une bibliothèque de communication, de préférence la bibliothèque ZeroMQ.  Preferably, the event trace manager is a communication library, preferably the ZeroMQ library.
Ainsi, cette bibliothèque de communication est particulièrement bien adaptée à pouvoir être modifiée facilement de manière à ensuite autoriser une reconfiguration dynamique des processus receveurs sans perturber l’exécution de l’application dont elle gère les traces d’événements.  Thus, this communication library is particularly well adapted to be easily modified so as to then allow dynamic reconfiguration of the recipient processes without disrupting the execution of the application for which it manages the event traces.
L’invention concerne aussi un procédé de gestion de pannes informatiques intégrant un procédé de contrôle selon l’invention.  The invention also relates to a computer failure management method incorporating a control method according to the invention.
Ainsi, ce procédé de gestion de pannes informatiques sera plus efficace, puisque le procédé de contrôle de gestion qu’il intègre est lui- même plus efficace.  Thus, this method of managing computer failures will be more efficient, since the management control method that it incorporates is itself more efficient.
D'autres caractéristiques et avantages de l'invention apparaîtront à la lecture de la description qui suit d’un mode de réalisation préféré de l'invention, donnée à titre d'exemple et en référence aux dessins annexés. BREVE DESCRIPTION DES DESSINS  Other features and advantages of the invention will appear on reading the following description of a preferred embodiment of the invention, given by way of example and with reference to the accompanying drawings. BRIEF DESCRIPTION OF THE DRAWINGS
La figure 1 représente schématiquement un premier exemple de système informatique permettant la mise en œuvre locale du procédé de contrôle de gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique selon un mode de réalisation de l’invention. FIG. 1 schematically represents a first example of a computer system enabling the implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention. .
La figure 2 représente schématiquement un deuxième exemple de système informatique permettant la mise en œuvre distante du procédé de contrôle de gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique selon un mode de réalisation de l’invention. La figure 3 représente schématiquement un troisième exemple de système informatique permettant la mise en œuvre distante du procédé de contrôle de gestion des traces d’événements dans l’exécution de plusieurs applications informatiques sur une machine informatique selon un mode de réalisation de l’invention. FIG. 2 diagrammatically represents a second example of a computer system allowing the remote implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention . FIG. 3 diagrammatically represents a third example of a computer system allowing the remote implementation of the event trace management control method in the execution of several computer applications on a computer machine according to one embodiment of the invention.
DESCRIPTION DETAILLEE DE L’INVENTION DETAILED DESCRIPTION OF THE INVENTION
La figure 1 représente schématiquement un premier exemple de système informatique permettant la mise en œuvre locale du procédé de contrôle de gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique selon un mode de réalisation de l’invention. FIG. 1 schematically represents a first example of a computer system enabling the implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention. .
Sur une machine locale 1, une application 2 est exécutée. A cette application 2 est associée un gestionnaire 3 de traces d’événements appelé « BXI log » (pour « Bull eXscale Interconnect » en langue anglaise). Ce gestionnaire 3 ouvre un premier processus receveur 4 de traces d’événements qui est par exemple un fichier de stockage des traces d’événements générées par le gestionnaire 3.  On a local machine 1, an application 2 is executed. To this application 2 is associated an event trace manager 3 called "BXI log" (for "Bull eXscale Interconnect" in English). This manager 3 opens a first event trace receiver process 4 which is for example a file for storing event traces generated by the manager 3.
Conformément à un mode de réalisation de l’invention, le gestionnaire According to one embodiment of the invention, the manager
3 ouvre un port interne de contrôle 6 du gestionnaire 3 de traces d’événements. Le gestionnaire 3 est structuré pour permettre une communication entre d’une part ce port interne de contrôle 6 et d’autre part le premier processus receveur 4, cette communication d’une part entraînant une reconfiguration dynamique du premier processus receveur 4 et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement de l’application 2 qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1. 3 opens an internal control port 6 of the event trace manager 3. The manager 3 is structured to allow communication between, on the one hand, this internal control port 6 and, on the other hand, the first recipient process 4, this communication on the one hand causing a dynamic reconfiguration of the first recipient process 4 and on the other hand can be done without stopping or disrupting the progress of the application 2 which can continue to run without difficulty on the computer machine 1.
Conformément à ce mode de réalisation de l’invention, le gestionnaire 3 est également structuré pour permettre une communication entre d’une part ce port interne de contrôle 6 et d’autre part lui-même de manière à créer un deuxième processus receveur 5, cette communication d’une part entraînant la création du deuxième processus receveur 5 avec la configuration souhaitée et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement de l’application 2 qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1. De la même manière que pour le premier processus receveur 4, le deuxième processus receveur 5 peut être ensuite également reconfiguré dynamiquement sans perturbation ni arrêt de l’application 2 continuant à s’exécuter sur la machine informatique 1, toujours par une communication via le port interne de contrôle 6. According to this embodiment of the invention, the manager 3 is also structured to allow communication between on the one hand this internal control port 6 and on the other hand itself so as to create a second recipient process 5, this communication on the one hand causing the creation of the second recipient process 5 with the desired configuration and on the other hand can be performed without stopping or disrupting the progress of the application 2 which can continue to s' to execute without difficulty on the computer machine 1. In the same way as for the first receiving process 4, the second receiving process 5 can then also be dynamically reconfigured without disturbing or stopping the application 2 continuing to run on the computer machine 1, always by communication via the internal control port 6.
La reconfiguration dynamique est effectuée par une communication de reconfiguration via le port interne de contrôle 6 et elle est effectuée par un contrôleur 7 de gestion de traces d’événements, localisé sur la machine informatique 1 pour la figure 1. L’information de reconfiguration des processus receveurs circule donc d’abord du contrôleur 7 de gestion vers le port interne de contrôle 6, puis du port interne de contrôle 6 vers le gestionnaire 3, puis du gestionnaire 3 vers le premier processus receveur 4 et/ou vers le deuxième processus receveur 5, lequel processus receveur, 4 et/ou 5, se reconfigure conformément à cette information de reconfiguration des processus receveurs laquelle comporte par exemple une demande de création du deuxième processus receveur 5 ou une demande de modification des critères de filtrage au niveau du processus receveur 4 et/ou 5.  The dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 6 and is performed by an event trace management controller 7, located on the computer machine 1 for FIG. 1. The reconfiguration information of the recipient process therefore flows first from the management controller 7 to the internal control port 6, then from the internal control port 6 to the manager 3, then from the manager 3 to the first recipient process 4 and / or to the second recipient process 5, which recipient process, 4 and / or 5, is reconfigured according to this reconfiguration information recipient process which includes for example a request for creation of the second recipient process 5 or a request to change the filtering criteria at the receiving process 4 and / or 5.
La machine informatique 1 est une machine informatique physique qui peut héberger une ou plusieurs machines informatiques virtuelles différentes et/ou un ou plusieurs containers différents et/ou une ou plusieurs machines virtuelles différentes hébergeant chacune un ou plusieurs containers différents.  The computer machine 1 is a physical computer machine that can host one or more different virtual computer machines and / or one or more different containers and / or one or more different virtual machines each hosting one or more different containers.
L’utilisateur utilise un contrôleur de gestion 7 sur la machine informatique 1 locale. L’application 2 utilise un gestionnaire 3 de traces d’événements qui peut être par exemple une bibliothèque « BXI Log ». Le gestionnaire 3 de traces d’événements comprend un module dédié de gestion distante (« remote handler » en langue anglaise) avec lequel va pouvoir dialoguer le contrôleur de gestion 7. Par défaut, ou par configuration de l’utilisateur, les « logs » ou traces d’événements sont envoyés dans un fichier 4, et un port interne de contrôle 6 est ouvert en local seulement. Ainsi, sur cette machine informatique 1 peut être exécuté localement un programme de contrôle de gestion lancé sur un contrôleur de gestion 7 (« monitor » sur la figure 1) qui va se connecter au port interne de contrôle 6 de l’application 2. The user uses a management controller 7 on the local computer machine 1. The application 2 uses an event trace manager 3 which can be for example a "BXI Log" library. The event trace manager 3 includes a dedicated remote management module ("remote handler" in English) with which will 7. By default, or by configuration of the user, the "logs" or event traces are sent to a file 4, and an internal control port 6 is opened locally only. Thus, on this computer machine 1 can be executed locally a management control program launched on a management controller 7 ("monitor" in Figure 1) which will connect to the internal control port 6 of the application 2.
L’utilisateur va alors pouvoir, consulter en direct les « logs » de l’application 2 en appliquant les filtres qui l’intéressent, et ceci de manière dynamique, par conséquent sans à avoir à redémarrer ni l’application 2 ni le programme de contrôle de gestion du contrôleur de gestion 7, et/ou changer le niveau de « logs » et le filtrage de ce qui est écrit dans le fichier 4, et/ou créer une nouvelle sortie vers un deuxième fichier 5 avec par exemple un filtrage spécifique différent de celui utilisé pour la sortie vers le premier fichier 4.  The user will then be able to consult live "logs" of the application 2 by applying the filters that interest him, and this in a dynamic manner, therefore without having to restart either the application 2 or the program of management control of the management controller 7, and / or change the level of "logs" and the filtering of what is written in the file 4, and / or create a new output to a second file 5 with for example a specific filtering different from the one used for the output to the first file 4.
La figure 2 représente schématiquement un deuxième exemple de système informatique permettant la mise en œuvre distante du procédé de contrôle de gestion des traces d’événements dans l’exécution d’une application informatique sur une machine informatique selon un mode de réalisation de l’invention.  FIG. 2 diagrammatically represents a second example of a computer system allowing the remote implementation of the event trace management control method in the execution of a computer application on a computer machine according to one embodiment of the invention .
Tout ce qui concerne la figure 1, mais qui n’est pas répété au niveau de la figure 2, tout en restant compatible avec la figure 2, reste valable, notamment comme la machine informatique 1 physique qui peut comprendre plusieurs machines virtuelles et/ou plusieurs containers et comme la création dynamique et/ou la reconfiguration dynamique d’un nouveau processus receveur 5.  All that concerns FIG. 1, but which is not repeated in FIG. 2, while remaining compatible with FIG. 2, remains valid, notably like the physical computer machine 1 which may comprise several virtual machines and / or several containers and as dynamic creation and / or dynamic reconfiguration of a new recipient process 5.
Sur une machine distante 1, une application 2 est exécutée. A cette application 2 est associé un gestionnaire 3 de traces d’événements. Ce gestionnaire 3 ouvre un premier processus receveur 4 de traces d’événements qui est par exemple un fichier de stockage des traces d’événements générées par le gestionnaire 3. Conformément à un autre mode de réalisation de l’invention, le gestionnaire 3 ouvre d’abord le même port interne de contrôle 6 du gestionnaire 3 de traces d’événements qu’au niveau de la figure 1. On a remote machine 1, an application 2 is executed. In this application 2 is associated a manager 3 of event traces. This manager 3 opens a first event trace receiver process 4 which is for example a file for storing event traces generated by the manager 3. According to another embodiment of the invention, the manager 3 first opens the same internal control port 6 of the event trace manager 3 as in FIG.
Le gestionnaire 3 ouvre également un port interne de contrôle 8 du gestionnaire 3 de traces d’événements. Ce port interne de contrôle 8 est également ouvert vers l’extérieur de la machine informatique 1. Le gestionnaire 3 est structuré pour permettre une communication entre d’une part ce port interne de contrôle 8 et d’autre part le premier processus receveur 4, cette communication d’une part entraînant une reconfiguration dynamique du premier processus receveur 4 et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement de l’application 2 qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1.  The manager 3 also opens an internal control port 8 of the event trace manager 3. This internal control port 8 is also open to the outside of the computer machine 1. The manager 3 is structured to allow communication between, on the one hand, this internal control port 8 and, on the other hand, the first recipient process 4, this communication on the one hand causing a dynamic reconfiguration of the first receiving process 4 and secondly can be performed without stopping or disrupting the progress of the application 2 which can continue to run without difficulty on the computer machine 1.
Conformément à cet autre mode de réalisation de l’invention, le gestionnaire 3 est également structuré pour permettre une communication entre d’une part ce port interne de contrôle 8 et d’autre part lui-même de manière à créer un deuxième processus receveur non représenté sur la figure 2 pour des raisons de simplicité, cette communication d’une part entraînant la création du deuxième processus receveur avec la configuration souhaitée et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement de l’application 2 qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1. De la même manière que pour le premier processus receveur 4, le deuxième processus receveur peut être ensuite également reconfiguré dynamiquement sans perturbation ni arrêt de l’application 2 continuant à s’exécuter sur la machine informatique 1, par une communication via le port interne de contrôle 8 ouvert vers l’extérieur.  According to this other embodiment of the invention, the manager 3 is also structured to allow communication between on the one hand this internal control port 8 and on the other hand itself so as to create a second non-receiving process. shown in Figure 2 for simplicity, this communication on the one hand causing the creation of the second receiving process with the desired configuration and on the other hand can be performed without stopping or disrupt the course of the application 2 which can continue to run without difficulty on the computer machine 1. In the same way as for the first receiving process 4, the second receiving process can then also be dynamically reconfigured without disruption or stopping the application 2 continuing to run on the computer machine 1, by communication via the internal control port 8 open to the outside.
La reconfiguration dynamique est effectuée par une communication de reconfiguration via le port interne de contrôle 8 ouvert vers l’extérieur et elle est effectuée par un contrôleur 7 de gestion de traces d’événements, localisé sur une autre machine informatique 9 locale, les machines informatiques 1 et 9 étant distantes l’une par rapport à l’autre, c’est-à-dire situées à des endroits physiques différents et éloignés l’un de l’autre, par exemple des salles différentes, ou des immeubles différents, ou même des villes différentes, l’une des machines informatiques 9 et 1 étant appelée la machine locale, sur laquelle est effectuée le contrôle de gestion, et l’autre la machine distante, sur laquelle sont exécutées les applications. L’information de reconfiguration des processus receveurs circule donc d’abord du contrôleur 7 de gestion vers le port interne de contrôle 8 ouvert vers l’extérieur, puis du port interne de contrôle 8 ouvert vers l’extérieur vers le gestionnaire 3, puis du gestionnaire 3 vers le premier processus receveur 4 et/ou vers un deuxième processus receveur non représenté, lequel processus receveur 4 par exemple, se reconfigure conformément à cette information de reconfiguration des processus receveurs laquelle comporte par exemple une demande de modification des critères de filtrage au niveau du processus receveur 4. The dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 8 open to the outside and is performed by an event trace management controller 7, located on another local computer machine 9, the computer machines 1 and 9 being spaced apart from one another, that is to say located at different physical locations and distant from each other, by example of different rooms, or different buildings, or even different cities, one of the computer machines 9 and 1 being called the local machine, on which is performed the management control, and the other the remote machine, on which are running the applications. The reconfiguration information of the recipient processes therefore flows first from the management controller 7 to the internal control port 8 open to the outside, then from the internal control port 8 open outwards to the manager 3, then from the manager 3 to the first recipient process 4 and / or to a second unrepresented recipient process, which recipient process 4, for example, is reconfigured in accordance with this reconfiguration information of the recipient processes which comprises for example a request for modification of the filter criteria at level of the recipient process 4.
L’utilisateur utilise un contrôleur de gestion 7 sur la machine informatique 1 locale, ce qui représente l’utilisation de la fonctionnalité de contrôle de gestion à distance de la machine informatique distante 9 sur laquelle s’exécute l’application 2 en utilisant un gestionnaire 3 de traces d’événements (par exemple une bibliothèque « BXI Log »), avec comme pour la figure 1 une sortie vers un fichier local 4 et vers un port interne de contrôle 6 purement local. Le gestionnaire 3 de traces d’événements comprend un module dédié de gestion distante (« remote handler » en langue anglaise) avec lequel va pouvoir dialoguer le contrôleur de gestion 7. Un port interne de contrôle 8 ouvert vers l’extérieur a également été configuré, permettant ainsi l’accès au contrôleur de gestion 7 s’exécutant sur une machine informatique 9 locale distante de la machine informatique 1 distante, afin de permettre à l’utilisateur de pouvoir se connecter et effectuer les mêmes opérations que s’il se connectait sur le port interne de contrôle 6 purement local, comme au niveau de la figure 1, opérations qu’il pourrait éventuellement toujours faire à partir d’un autre contrôleur de gestion localisé sur la machine informatique 1 si cet utilisateur se trouvait au niveau de cette machine informatique 1. La figure 3 représente schématiquement un troisième exemple de système informatique permettant la mise en œuvre distante du procédé de contrôle de gestion des traces d’événements dans l’exécution de plusieurs applications informatiques sur une machine informatique selon un mode de réalisation de l’invention. The user uses a management controller 7 on the local computer machine 1, which represents the use of the remote management control functionality of the remote computer machine 9 on which the application 2 executes using a manager 3 traces of events (for example a library "BXI Log"), with as for Figure 1 an output to a local file 4 and a purely local control port 6 local. The event trace manager 3 comprises a dedicated remote management module ("remote handler" in English) with which the management controller 7 can interact. An internal control port 8 open to the outside has also been configured. , thus allowing access to the management controller 7 running on a local computer machine 9 remote from the remote computer machine 1, to allow the user to be able to connect and perform the same operations as if he was connecting on the purely local internal control port 6, as in FIG. 1, operations that it could possibly always do from another management controller located on the computer machine 1 if this user was at the level of this computer machine 1. FIG. 3 diagrammatically represents a third example of a computer system allowing the remote implementation of the event trace management control method in the execution of several computer applications on a computer machine according to one embodiment of the invention.
Tout ce qui concerne la figure 1, mais qui n’est pas répété au niveau de la figure 3, tout en restant compatible avec la figure 3, reste valable, notamment comme la machine informatique 1 physique qui peut comprendre plusieurs machines virtuelles et/ou plusieurs containers et comme la création dynamique et/ou la reconfiguration dynamique d’un nouveau processus receveur 5.  All that concerns FIG. 1, but which is not repeated at the level of FIG. 3, while remaining compatible with FIG. 3, remains valid, notably like the physical computer machine 1 which may comprise several virtual machines and / or several containers and as dynamic creation and / or dynamic reconfiguration of a new recipient process 5.
Sur une machine distante 1, plusieurs applications 2, 12, 22 et 32, sont exécutées. A ces applications 2, 12, 22 et 32 sont respectivement associés des gestionnaires 3, 13, 23 et 33, de traces d’événements. Ces gestionnaires 3, 13, 23 et 33, ouvrent respectivement des premiers processus receveurs 4, On a remote machine 1, several applications 2, 12, 22 and 32 are executed. To these applications 2, 12, 22 and 32 are respectively associated managers 3, 13, 23 and 33, traces of events. These managers 3, 13, 23 and 33 respectively open first recipient processes 4,
14, 24 et 34, de traces d’événements qui sont par exemple des fichiers de stockage des traces d’événements générées par les gestionnaires 3, 13, 23 et 33. 14, 24 and 34, traces of events which are for example files for storing event traces generated by the managers 3, 13, 23 and 33.
Conformément à encore un autre mode de réalisation de l’invention, les gestionnaires 3, 13, 23 et 33, ouvrent d’abord des ports internes de contrôle 6, 16, 26 et 36, des gestionnaires 3, 13, 23 et 33, de traces d’événements, similaires au port interne 6 de la figure 1 et à celui de la figure 2.  According to yet another embodiment of the invention, the managers 3, 13, 23 and 33 first open internal control ports 6, 16, 26 and 36, managers 3, 13, 23 and 33, traces of events, similar to the internal port 6 of Figure 1 and that of Figure 2.
Les gestionnaires 3, 13, 23 et 33, sont tous rattachés à un relais 10 lequel ouvre un port interne de contrôle 8 ouvert vers l’extérieur similaire à celui de la figure 2. Les communications peuvent être transmises bi- directionnellement entre ce relais 10 et le port interne de contrôle 8 ouvert vers l’extérieur. Ce port interne de contrôle 8 est ouvert vers l’extérieur de la machine informatique 1. Les gestionnaires 3, 13, 23 et 33, sont structurés pour permettre une communication entre d’une part le relais 10 et d’autre part l’un des premiers processus receveurs 4, 14, 24 et 34, cette communication d’une part entraînant une reconfiguration dynamique du premier processus receveur concerné 4, 14, 24 ou 34, et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement de l’application correspondante, 2 12, 22 ou 32, qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1. The handlers 3, 13, 23 and 33 are all attached to a relay 10 which opens an internal control port 8 open to the outside similar to that of Figure 2. The communications can be transmitted bi-directionally between this relay 10 and the internal control port 8 open to the outside. This internal control port 8 is open to the outside of the computer machine 1. The managers 3, 13, 23 and 33 are structured to allow communication between the relay 10 on the one hand and the one on the other hand of the first recipient processes 4, 14, 24 and 34, this communication on the one hand causing a dynamic reconfiguration of the first receiving process concerned 4, 14, 24 or 34, and on the other hand can be performed without stopping or disrupting the progress of the corresponding application, 2 12, 22 or 32, who can continue to run without difficulty on the computer machine 1.
Conformément à cet encore autre mode de réalisation de l’invention, les gestionnaires 3, 13, 23 et 33, sont également structurés pour permettre une communication entre d’une part ce relais 10 et d’autre part respectivement eux-mêmes de manière à créer un deuxième processus receveur non représenté sur la figure 2 pour des raisons de simplicité, cette communication d’une part entraînant la création du deuxième processus receveur avec la configuration souhaitée et d’autre part pouvant s’effectuer sans arrêter ni perturber le déroulement respectif de l’application 2, 12, 22 ou 32, qui peut continuer à s’exécuter sans difficulté sur la machine informatique 1. De la même manière que pour le premier processus receveur 4, 14, 24 ou 34, le deuxième processus receveur peut être ensuite également reconfiguré dynamiquement sans perturbation ni arrêt de l’application 2, 12, 22 ou 32, continuant à s’exécuter sur la machine informatique 1, toujours par une communication via d’abord le port interne de contrôle 8, puis via le relais 10, à partir du contrôleur de gestion 7 localisé sur la machine informatique 9.  According to this still further embodiment of the invention, the handlers 3, 13, 23 and 33 are also structured to allow communication between on the one hand this relay 10 and on the other hand respectively themselves so as to create a second recipient process not shown in Figure 2 for reasons of simplicity, this communication on the one hand causing the creation of the second receiving process with the desired configuration and on the other hand can be done without stopping or disrupt the respective course of the application 2, 12, 22 or 32, which can continue to run without difficulty on the computer machine 1. In the same way as for the first receiving process 4, 14, 24 or 34, the second receiving process can then also be reconfigured dynamically without disruption or shutdown of the application 2, 12, 22 or 32, continuing to run on the computer machine 1, always p ar communication via first the internal control port 8, then via the relay 10, from the management controller 7 located on the computer machine 9.
La reconfiguration dynamique est effectuée par une communication de reconfiguration via le port interne de contrôle 8 ouvert vers l’extérieur et elle est effectuée par un contrôleur 7 de gestion de traces d’événements, localisé sur une autre machine informatique 9 locale, les machines informatiques 1 et 9 étant distantes l’une par rapport à l’autre, c’est-à-dire situées à des endroits physiques différents et éloignés l’un de l’autre, l’une des machines informatiques 9 et 1 étant appelée la machine locale et l’autre la machine distante. L’information de reconfiguration des processus receveurs circule donc d’abord du contrôleur 7 de gestion vers le port interne de contrôle 8 ouvert vers l’extérieur, puis du port interne de contrôle 8 ouvert vers l’extérieur vers le relais 10, enfin du relais 10 vers le gestionnaire concerné 3, 13, 23 ou 33, puis du gestionnaire concerné 3, 13, 23 ou 33, vers le premier processus receveur concerné 4, 14, 24 ou 34, et/ou vers un deuxième processus receveur non représenté concerné, lequel processus receveur 4, 14, 24 ou 34 par exemple, se reconfigure conformément à cette information de reconfiguration des processus receveurs laquelle comporte par exemple une demande de modification des critères de filtrage au niveau du processus receveur 4, 14, 24 ou 34. The dynamic reconfiguration is performed by a reconfiguration communication via the internal control port 8 open to the outside and is performed by an event trace management controller 7, located on another local computer machine 9, the computer machines 1 and 9 are spaced relative to each other, that is to say, located at different physical locations and distant from each other, one of the computer machines 9 and 1 being called the local machine and the other the remote machine. The reconfiguration information of the recipient processes therefore flows first from the management controller 7 to the internal control port 8 open to the outside and then from the internal control port 8 outward towards the relay 10, finally from the relay 10 to the manager concerned 3, 13, 23 or 33, then from the manager concerned 3, 13, 23 or 33, to the first recipient process concerned 4, 14, 24 or 34, and / or to a second non-represented recipient process concerned, which receiving process 4, 14, 24 or 34 for example, is reconfigured in accordance with this reconfiguration information of the recipient processes which comprises for example a request for modification of the criteria of filtering at the recipient process 4, 14, 24 or 34.
L’utilisation du relais 10 sur la machine informatique 1 distante permet à l’utilisateur, via l’utilisation d’un port interne de contrôle 8 ouvert l’extérieur de la machine informatique 1 distante, d’exposer les ports internes de contrôle, 6, 16, 26 et 36, locaux des applications 2, 12, 22 et 32, s’exécutant sur la machine informatique 1 distante. Le relais 10 se connecte à tous les ports internes de contrôle 6, 16, 26 et 36, locaux des applications 2, 12, 22 et 32, s’exécutant sur la même machine informatique 1 distante que ce relais 10. Le gestionnaire 3 de traces d’événements comprend un module dédié de gestion distante (« remote handler » en langue anglaise) avec lequel va pouvoir dialoguer le contrôleur de gestion 7. Ainsi, le contrôleur de gestion 7 s’exécutant sur la machine informatique 9 locale peut, en se connectant sur un seul port interne de contrôle 8 ouvert vers l’extérieur et distant, accéder aux « logs », c’est-à-dire aux traces d’événements, de toutes les applications distantes 2, 12, 22 et 32, en cours d’exécution sur la machine informatique 1 distante, de manière similaire au fonctionnement de la figure 2, mais cette fois-ci pour plusieurs applications 2, 12, 22 et 32, à la fois.  The use of the relay 10 on the remote computer machine 1 allows the user, through the use of an internal control port 8 open outside the remote computer machine 1, to expose the internal control ports, 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the computer machine 1 remote. Relay 10 connects to all internal control ports 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the same computer machine 1 distant than this relay 10. The manager 3 of event traces includes a dedicated remote management module ("remote handler" in English) with which the management controller 7. can interact. Thus, the management controller 7 executing on the local computer machine 9 can, in connecting to a single external control port 8 open to the outside and remote, access the "logs", that is to say the event traces, all remote applications 2, 12, 22 and 32, running on the remote computer machine 1, similarly to the operation of Figure 2, but this time for several applications 2, 12, 22 and 32 at a time.
Cette implémentation de ce couple constitué par le relais 10 d’une part et par le port interne de contrôle 8 ouvert vers l’extérieur d’autre part, permet au contrôleur de gestion 7 et à l’utilisateur qui le commande, de pouvoir, économiser des ressources comme les ports internes de contrôle, qu’ils soient locaux ou ouverts vers l’extérieur, allant jusqu’à permettre d’utiliser un seul port interne de contrôle 8 ouvert vers l’extérieur au lieu de quatre d’entre eux respectivement dédiés à chacune des applications 2, 12, 22 et 32, qui s’exécutent sur la machine informatique 1 distante, et/ou de pouvoir accéder aux « logs » d’une application 2, 12, 22 ou 32, distante, même si celle-ci n’a pas été configurée pour cela au démarrage, à cause par exemple soit d’un oubli de l’utilisateur soit d’un changement de besoin en cours d’exécution de cette application. This implementation of this pair consisting of the relay 10 on the one hand and the internal control port 8 open on the other hand, allows the management controller 7 and the user who controls it to be able to save resources such as internal control ports, whether local or open to the outside, up to allowing the use of a single internal control port 8 open to the outside instead of four of them respectively dedicated to each of the applications 2, 12, 22 and 32, which run on the remote computer machine 1, and / or to be able to access the "logs" of an application 2, 12, 22 or 32, remote, even if it was not configured for this at startup, because for example because of a forgetfulness of the user or a change of need running this application.
Par ailleurs, le relais 10 et sa mise en œuvre peuvent également être implantés dans le cas de plusieurs applications 2 ne s’exécutant pas ou ne tournant pas toutes sur la même machine informatique 1, requérant dans ce cas un relais 10 par même groupe d’applications 2 s’exécutant sur une même machine informatique 1.  Moreover, the relay 10 and its implementation can also be implemented in the case of several applications 2 not executing or not all running on the same computer machine 1, requiring in this case a relay 10 by the same group. applications 2 running on the same computer machine 1.
De plus, le relais 10 peut également être mis en œuvre sur une machine informatique 1, même dans le cas de la figure 1, où le contrôleur 7 de gestion est localisé lui aussi sur la même machine informatique 1.  In addition, the relay 10 can also be implemented on a computer machine 1, even in the case of Figure 1, where the management controller 7 is also located on the same computer machine 1.
En considérant l’ensemble des figures 1, 2 et 3, il peut être constaté que la fonctionnalité proposée par ces modes de réalisation de l’invention utilisent la mise en place d’un module dédié dans le gestionnaire de traces d’événements, 3, 13, 23 ou 33, c’est-à-dire par exemple un module dédié de gestion distante dans la bibliothèque « BXI Log ». Ce module dédié est activé par défaut lors de l’exécution d’une application 2, 12, 22 ou 32, et avec sa configuration par défaut, ouvre un port interne de contrôle 6, 16, 26 et/ou 36, local et/ou 8 ouvert vers l’extérieur.  Considering all of Figures 1, 2 and 3, it can be seen that the functionality proposed by these embodiments of the invention use the establishment of a dedicated module in the event trace manager, 3 , 13, 23 or 33, that is to say for example a remote management dedicated module in the library "BXI Log". This dedicated module is activated by default when running an application 2, 12, 22 or 32, and with its default configuration, opens an internal control port 6, 16, 26 and / or 36, local and / or 8 open to the outside.
Il reste possible de changer ce comportement par défaut, par simple changement de configuration avant le lancement de l’application ou bien via une connexion sur le gestionnaire 3, 13, 23 ou 33, de traces d’événements de cette application 2, 12, 22 ou 32, par le contrôleur de gestion 7.  It remains possible to change this default behavior, by simply changing configuration before launching the application or via a connection on the manager 3, 13, 23 or 33, event traces of this application 2, 12, 22 or 32, by the controller 7.
Il est également possible, par configuration préalable, de demander à ce que seul un port interne de contrôle 6, 16, 26 ou 36, local ou seul un port interne de contrôle 8 ouvert vers l’extérieur de la machine informatique sur laquelle s’exécute l’application 2, 12, 22 ou 32, permettant alors d’exécuter un client, un programme de contrôle de gestion sur le contrôleur de gestion 7, sur une autre machine informatique 9 distante de la machine informatique 1 sur laquelle s’exécute l’application 2, 12, 22 ou 32. It is also possible, by prior configuration, to request that only an internal control port 6, 16, 26 or 36, local or only an internal control port 8 open to the outside of the computer machine on which s' executes the application 2, 12, 22 or 32, then allowing to execute a client, a management control program on the management controller 7, on another computer machine 9 remote from the computer machine 1 on which the application 2, 12, 22 or 32 executes.
Un service de relais 10 peut aussi être déployé sur la machine informatique 1 afin de permettre la connexion aux ports internes de contrôle 6, 16, 26 et/ou 36, locaux depuis une autre machine informatique 9 distante de la machine informatique 1. C’est pour cette raison que par défaut est ouvert un port interne de contrôle 6 local, ainsi il suffit de démarrer un service de relais 10 pour pouvoir y accéder sans à avoir besoin de reconfigurer et redémarrer l’application 2, 12, 22 ou 32, à laquelle il est souhaité de se connecter. Ce service de relais 10 se connecte à tous les ports internes de contrôle 6, 16, 26 et 36, locaux des applications 2, 12, 22 et 32, en cours d’exécution sur la machine informatique 1, et ouvre un port interne de contrôle 8 ouvert vers l’extérieur de cette machine informatique 1, permettant au contrôleur de gestion 7 de s’y connecter et ainsi d’accéder à n’importe quel port interne de contrôle 6, 16, 26 ou 36, de n’importe quelle application 2, 12, 22 ou 32, en cours d’exécution sur la machine informatique 1.  A relay service 10 may also be deployed on the computer machine 1 to allow connection to the internal control ports 6, 16, 26 and / or 36, local from another computer machine 9 remote from the computer machine 1. C ' is for this reason that by default is open a local internal control port 6, so just start a relay service 10 to be able to access it without having to reconfigure and restart the application 2, 12, 22 or 32, to which it is desired to connect. This relay service 10 connects to all internal control ports 6, 16, 26 and 36, local applications 2, 12, 22 and 32, running on the computer machine 1, and opens an internal port of control 8 open to the outside of this computer machine 1, allowing the management controller 7 to connect to it and thus access any internal control port 6, 16, 26 or 36, from any which application 2, 12, 22 or 32, running on the computer machine 1.
Une fois connecté au port interne de contrôle choisi, 6, 16, 26 ou 36, soit directement soit en passant par un relais 10, un utilisateur peut agir sur la configuration des « logs » de l’application correspondante 2, 12, 22 ou 32. L’utilisateur peut alors observer en temps réel les « logs » de l’application choisie, en appliquant en direct des configurations de filtres, comme par exemple le niveau des logs, les sous-parties de logs, ou autres, et/ou changer la configuration des autres sorties ou processus receveurs, tels que l’écriture dans un ou plusieurs fichiers, l’écriture vers un démon « syslog », vers une console, par exemple en changeant le niveau des « logs », et/ou ajouter et/ou supprimer des sorties à la volée, comme par exemple des fichiers, une sortie vers un démon « syslog ».  Once connected to the internal control port chosen, 6, 16, 26 or 36, either directly or via a relay 10, a user can act on the configuration of the "logs" of the corresponding application 2, 12, 22 or 32. The user can then observe in real time the "logs" of the chosen application, applying live filter configurations, such as the level of the logs, the sub-parts of logs, or others, and / or or change the configuration of the other receptive outputs or processes, such as writing to one or more files, writing to a "syslog" daemon, to a console, for example by changing the level of the "logs", and / or add and / or delete outputs on the fly, such as files, output to a "syslog" daemon.
Bien entendu, la présente invention n'est pas limitée aux exemples et au mode de réalisation décrits et représentés, mais elle est susceptible de nombreuses variantes accessibles à l'homme de l'art.  Of course, the present invention is not limited to the examples and to the embodiment described and shown, but it is capable of numerous variants accessible to those skilled in the art.

Claims

REVENDICATIONS
1. Procédé de contrôle de la gestion des traces d’événements dans l’exécution d’une application informatique (2) sur une machine informatique (1), comprenant : A method of controlling event trace management in the execution of a computer application (2) on a computer machine (1), comprising:
une étape de gestion des traces d’événements incluant :  an event trace management step including:
o une première communication, interne à cette machine informatique (1), entre d’une part l’application (2) et d’autre part son gestionnaire (3) de traces d’événements, de manière à générer les traces d’événements,  o a first communication, internal to this computer machine (1), between on the one hand the application (2) and on the other hand its manager (3) of event traces, so as to generate the traces of events ,
o une deuxième communication, interne à cette machine informatique (1), entre d’une part un port interne du gestionnaire (3) de traces d’événements et un ou plusieurs ports internes d’un ou de plusieurs processus receveurs (4, 5) stockant les traces d’événements en provenance du gestionnaire (3) de traces d’événements, une étape de contrôle de la gestion des traces d’événements incluant :  a second communication, internal to this computer machine (1), between on the one hand an internal port of the event trace manager (3) and one or more internal ports of one or more recipient processes (4, 5); ) storing the event traces from the event trace handler (3), a control step of event trace management including:
o l’ouverture d’au moins un port interne de contrôle (6, 8) du gestionnaire (3) des traces d’événements, o une troisième communication, entre d’une part un contrôleur de gestion (7) des traces d’événements localisé hors de l’application (2) et hors du gestionnaire (3) des traces d’événements et d’autre part le ou les processus receveurs (4, 5), par un ou plusieurs messages envoyés via ledit port interne de contrôle (6, 8) du gestionnaire (3) des traces d’événements, cette troisième communication permettant au contrôleur de gestion (7) des traces d’événements de reconfigurer dynamiquement le ou les processus receveurs (4, 5) sans reconfigurer l’application (2) et sans redémarrer l’application (2). o opening at least one internal control port (6, 8) of the event trace manager (3), o a third communication, between on the one hand a management controller (7) of the traces of events events located outside the application (2) and outside the manager (3) of the event traces and on the other hand the recipient process or processes (4, 5), by one or more messages sent via said internal control port (6, 8) of the event trace manager (3), this third communication allowing the management controller (7) event traces to dynamically reconfigure the recipient process or processes (4, 5) without reconfiguring the application (2) and without restarting the application (2).
2. Procédé de contrôle selon la revendication 1, caractérisé en ce que ledit port interne de contrôle (6, 8) du gestionnaire (3) des traces d’événements, ou au moins l’un desdits ports internes de contrôle (6, 8) du gestionnaire des traces d’événements, est un port interne seulement local (6) de cette machine informatique (1), inaccessible directement depuis l’extérieur de cette machine informatique (1), ladite troisième communication restant interne à cette machine informatique (1). 2. Control method according to claim 1, characterized in that said internal control port (6, 8) of the event trace manager (3), or at least one of said internal control ports (6, 8). ) of the event trace manager, is an internal only local port (6) of this computer machine (1), inaccessible directly from outside this computer machine (1), said third communication remaining internal to this computer machine ( 1).
3. Procédé de contrôle selon la revendication 1 ou 2, caractérisé en ce que ledit port interne de contrôle (6, 8) du gestionnaire (3) des traces d’événements, ou au moins l’un desdits ports internes de contrôle (6, 8) du gestionnaire (3) des traces d’événements, est également ouvert (8) vers l’extérieur de cette machine informatique (1) et permet ladite troisième communication en externe vers un contrôleur de gestion (7) des traces d’événements localisé sur une autre machine informatique (9) distante de cette machine informatique (1). 3. Control method according to claim 1 or 2, characterized in that said internal control port (6, 8) of the event trace manager (3), or at least one of said internal control ports (6). 8) of the event trace handler (3) is also open (8) to the outside of this computer machine (1) and allows said third communication externally to a management controller (7) for traces of events. events located on another computer machine (9) remote from this computer machine (1).
4. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que : 4. Control method according to any one of the preceding claims, characterized in that:
l’étape de contrôle de la gestion des traces d’événements inclut aussi :  the step of controlling the event trace management also includes:
o l’ouverture d’un relais (10) relié au port interne de contrôle (6) du gestionnaire (3) des traces d’événements de ladite application (2), ou bien relié à chacun des ports internes de contrôle (6, 16, 26, 36) respectivement des gestionnaires (3, 13, 23, 33) des traces d’événements de plusieurs applications (2, 12, 22, 32) s’exécutant sur cette machine informatique (1),  o the opening of a relay (10) connected to the internal control port (6) of the event trace manager (3) of said application (2), or connected to each of the internal control ports (6, 16, 26, 36) respectively of the event traces of several applications (2, 12, 22, 32) executing on this computer machine (1),
o ledit relais (10) étant adapté pour : d’abord envoyer, à un port interne d’un contrôleur de gestion (7) des traces d’événements, le cas échéant via un port interne de contrôle (8) du gestionnaire (3) ou des gestionnaires (3, 13, 23, 33) des traces d’événements également ouvert vers l’extérieur de cette machine informatique (1), l’identifiant dudit port interne de contrôle (6) ou les identifiants desdits ports internes de contrôle (6, 16, 26, 36) au(x)quel(s) il est relié et vers le(s)quel(s) il peut connecter le port interne de ce contrôleur de gestionsaid relay (10) being adapted to: first send, to an internal port of a management controller (7), event traces, where appropriate via an internal control port (8) of the manager (3) or managers (3, 13, 23, 33) traces of events also open to the outside of this computer machine (1), the identifier of said internal control port (6) or the identifiers of said internal control ports (6, 16, 26, 36 ) to which it is connected and to which it can connect the internal port of this management controller
(7) des traces d’événements,(7) traces of events,
ensuite connecter au port interne de ce contrôleur de gestion (7) des traces d’événements, ledit (6) ou l’un desdits ports internes de contrôle (6, 16, 26, 36) auxquels il est relié, à la demande de ce contrôleur de gestion (7) des traces d’événements. then connect to the internal port of this management controller (7) event traces, said (6) or one of said internal control ports (6, 16, 26, 36) to which it is connected, on demand from this management controller (7) event traces.
5. Procédé de contrôle selon la revendication 4, caractérisé en ce que ledit relais (10) est relié à chacun des ports internes de contrôle (6, 16, 26, 36) respectivement des gestionnaires (3, 13, 23, 33) des traces d’événements de plusieurs applications (2, 12, 22, 32) s’exécutant sur cette machine informatique (1). 5. Control method according to claim 4, characterized in that said relay (10) is connected to each of the internal control ports (6, 16, 26, 36) respectively managers (3, 13, 23, 33) of the event traces of several applications (2, 12, 22, 32) running on this computer machine (1).
6. Procédé de contrôle selon la revendication 5, caractérisé en ce que ledit relais (10) est relié à un nombre moins élevé de ports internes de contrôle (8) des gestionnaires (3, 13, 23, 33) des traces d’événements également ouverts vers l’extérieur de cette machine informatique (1) que de ports internes de contrôle (6, 16, 26, 36) respectivement des gestionnaires (3, 13, 23, 33) des traces d’événements de plusieurs applications (2, 12, 22, 32) s’exécutant sur cette machine informatique6. Control method according to claim 5, characterized in that said relay (10) is connected to a smaller number of internal control ports (8) of the managers (3, 13, 23, 33) of the event traces. also open to the outside of this computer machine (1) than internal control ports (6, 16, 26, 36) respectively managers (3, 13, 23, 33) of the event traces of several applications (2). , 12, 22, 32) running on this computer machine
(1), ledit relais (10) étant avantageusement relié à un seul port interne de contrôle (8) des gestionnaires (3, 13, 23, 33) des traces d’événements également ouvert vers l’extérieur de cette machine informatique (1). (1), said relay (10) being advantageously connected to a single internal port of control (8) of the event traces (3, 13, 23, 33) also open towards the outside of this computer machine (1).
7. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que ladite reconfiguration dynamique du ou des processus receveurs (4, 5) sans reconfigurer l’application et sans redémarrer l’application inclut une reconfiguration dynamique de tout ou partie du ou des filtres utilisés au niveau du ou des processus receveurs (4, 5). 7. Control method according to any one of the preceding claims, characterized in that said dynamic reconfiguration of the recipient process or processes (4, 5) without reconfiguring the application and without restarting the application includes a dynamic reconfiguration of all or part the filter (s) used at the recipient process (s) (4, 5).
8. Procédé de contrôle selon la revendication 7, caractérisé en ce que : 8. Control method according to claim 7, characterized in that:
ce ou ces filtres pouvant notamment filtrer sur un ou plusieurs des critères suivants :  this or these filters can in particular filter on one or more of the following criteria:
o un critère d’origine de l’événement,  o a criterion of origin of the event,
o un critère de criticité de l’événement,  o a criterion of criticality of the event,
o un critère d’émetteur de l’événement.  o a criterion of emitter of the event.
9. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que ladite reconfiguration dynamique du ou des processus receveurs (4, 5) sans reconfigurer l’application (2) et sans redémarrer l’application (2) inclut l’ajout d’un ou de plusieurs processus receveurs (5) stockant les traces d’événements en provenance du gestionnaire (3) de traces d’événements. 9. Control method according to any one of the preceding claims, characterized in that said dynamic reconfiguration of the receiving process or processes (4, 5) without reconfiguring the application (2) and without restarting the application (2) includes adding one or more receiver processes (5) storing the event traces from the event trace manager (3).
10. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que ladite deuxième communication est réalisée sous une forme de publication / abonnement, les traces d’événements étant publiées par le gestionnaire (3) de traces d’événements, les processus receveurs (4, 5) s’abonnant à cette publication pour ne stocker que ce qui les concerne respectivement. 10. Control method according to any one of the preceding claims, characterized in that said second communication is performed in a form of publication / subscription, the event traces being published by the manager (3) of event traces, recipient processes (4, 5) subscribing to this publication to store only what concerns them respectively.
11. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que ladite ouverture du ou des port(s) interne(s) de contrôle (6, 8) est réalisée par un module spécifique dans une bibliothèque de gestion de traces d’événements dédiée à l’application (2). 11. Control method according to any one of the preceding claims, characterized in that said opening of the internal port (s) control (s) (6, 8) is performed by a specific module in a management library. event traces dedicated to the application (2).
12. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que : 12. Control method according to any one of the preceding claims, characterized in that:
une trace d’événement comprend un ou plusieurs des éléments suivants :  an event trace includes one or more of the following:
o un descriptif de l’événement,  o a description of the event,
o un identifiant d’émetteur de l’événement,  o an issuer identifier of the event,
o une condition de survenue de l’événement,  o a condition of occurrence of the event,
o un niveau de criticité de l’événement,  o a criticality level of the event,
o une datation de l’événement,  o a dating of the event,
o un contexte de l’événement.  o a context of the event.
13. Procédé de contrôle selon l’une quelconque des revendications précédentes, caractérisé en ce que le gestionnaire (3) de traces d’événements est une bibliothèque de communication, de préférence la bibliothèque ZeroMQ. 13. Control method according to any one of the preceding claims, characterized in that the event trace manager (3) is a communication library, preferably the ZeroMQ library.
14. Procédé de gestion de pannes informatiques intégrant un procédé de contrôle selon l’une quelconque des revendications précédentes. 14. A method of managing computer failures incorporating a control method according to any one of the preceding claims.
PCT/FR2018/053446 2017-12-27 2018-12-20 Method for controlling the management of event traces in the execution of a computer application on a computing machine WO2019129957A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
FR1763238A FR3075999B1 (en) 2017-12-27 2017-12-27 PROCESS FOR CONTROL OF THE MANAGEMENT OF TRACKS OF EVENTS IN THE EXECUTION OF A COMPUTER APPLICATION ON A COMPUTER MACHINE
FR1763238 2017-12-27

Publications (1)

Publication Number Publication Date
WO2019129957A1 true WO2019129957A1 (en) 2019-07-04

Family

ID=62067637

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/FR2018/053446 WO2019129957A1 (en) 2017-12-27 2018-12-20 Method for controlling the management of event traces in the execution of a computer application on a computing machine

Country Status (2)

Country Link
FR (1) FR3075999B1 (en)
WO (1) WO2019129957A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117493127B (en) * 2023-12-29 2024-04-05 太平金融科技服务(上海)有限公司 Application program detection method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5857190A (en) * 1996-06-27 1999-01-05 Microsoft Corporation Event logging system and method for logging events in a network system
US20050010929A1 (en) * 2003-06-20 2005-01-13 Gongqian Wang System and method for electronic event logging
US20110246826A1 (en) * 2010-03-31 2011-10-06 Cloudera, Inc. Collecting and aggregating log data with fault tolerance
WO2016038272A1 (en) 2014-09-10 2016-03-17 Bull Sas High-performance mechanism for generating logging information in respect of a computer process

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5857190A (en) * 1996-06-27 1999-01-05 Microsoft Corporation Event logging system and method for logging events in a network system
US20050010929A1 (en) * 2003-06-20 2005-01-13 Gongqian Wang System and method for electronic event logging
US20110246826A1 (en) * 2010-03-31 2011-10-06 Cloudera, Inc. Collecting and aggregating log data with fault tolerance
WO2016038272A1 (en) 2014-09-10 2016-03-17 Bull Sas High-performance mechanism for generating logging information in respect of a computer process

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
JAN CHRIN ET AL: "Accelerator Modelling and Message Logging with ZeroMQ", PROCEEDINGS OF ICALEPCS 2015, MELBOURNE, AUSTRALIA, 1 January 2015 (2015-01-01), pages 610 - 614, XP055501788, ISBN: 978-3-95450-148-9, DOI: 10.18429/JACoW-ICALEPCS2015-WEB3O04 *

Also Published As

Publication number Publication date
FR3075999A1 (en) 2019-06-28
FR3075999B1 (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CN105765526B (en) It is guided by network from remote disk mirror image
EP0572307B1 (en) Replicated object software system using a dynamic message service, especially for a control arrangement with a redundant architecture
US20100057865A1 (en) Transferable Debug Session in a Team Environment
US20090063225A1 (en) Tool for automated transformation of a business process definition into a web application package
EP2791798B1 (en) Software bus
EP2168358B1 (en) Methods and devices for diagnostic data communication in a real-time communication network
EP2466471A1 (en) Hardware security module and method for debugging such a module
US20140181940A1 (en) File management method and system and storage mediums
EP3555745B1 (en) Device for loading data into computer processing units from a data source
US20130332624A1 (en) Dynamic redirection of network traffic within a system under test
FR3006527A1 (en) MIGRATION OF APPLICATION COMPONENTS
EP1684177A1 (en) Method and system for managing in a JMX environment with a management application and software systems to be managed
CN107181626B (en) Method and system for monitoring network bandwidth of distributed storage cluster system
US10547590B1 (en) Network processing using asynchronous functions
EP1289226B1 (en) Automation equipment connected to a tcp/ip network
WO2019129957A1 (en) Method for controlling the management of event traces in the execution of a computer application on a computing machine
CN113434155A (en) Automatic deployment system in mixed cloud mode
FR2994782A1 (en) METHOD AND SYSTEM FOR EXECUTING DATA LOADING PROTOCOLS
CN109656679A (en) A kind of the storage access method and device of virtual machine
EP2176759A2 (en) Method for measuring the performance of a target server housing a dynamic tracking tool
FR3006528A1 (en) SYSTEM AND METHOD FOR COMMUNICATION SUPERVISION BETWEEN APPLICATION COMPONENTS
CN113094150A (en) Method and equipment for dynamically generating Spark port access in Jupyter container
FR2944617A1 (en) METHOD FOR LOADING A DATABASE ABOVE AN AIRCRAFT
EP3144812A1 (en) Client/server architecture for the administration of a supercomputer
FR2802663A1 (en) Method for correlating alarms in an ISO norm hierarchical administration system, which reduces to a minimum the modifications to be made at each hierarchical administration level

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18842536

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18842536

Country of ref document: EP

Kind code of ref document: A1