WO2020233077A1 - System service monitoring method, device, and apparatus, and storage medium - Google Patents

System service monitoring method, device, and apparatus, and storage medium Download PDF

Info

Publication number
WO2020233077A1
WO2020233077A1 PCT/CN2019/122324 CN2019122324W WO2020233077A1 WO 2020233077 A1 WO2020233077 A1 WO 2020233077A1 CN 2019122324 W CN2019122324 W CN 2019122324W WO 2020233077 A1 WO2020233077 A1 WO 2020233077A1
Authority
WO
WIPO (PCT)
Prior art keywords
system service
monitored
log information
information
service
Prior art date
Application number
PCT/CN2019/122324
Other languages
French (fr)
Chinese (zh)
Inventor
韩亚洲
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020233077A1 publication Critical patent/WO2020233077A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Definitions

  • This application relates to the technical field of software monitoring, and in particular to a monitoring method, device, equipment, and storage medium for system services.
  • the monitoring program for network applications when calling system services is usually based on Spring (an open source design-level framework), supplemented by Pinpoint (a java application performance management tool) and Dubbo (an open source distribution) Service framework).
  • this monitoring solution can collect the log information generated by the system service when the network application accesses the corresponding system service, so that R&D personnel can locate the abnormality based on the collected log information when the network application is abnormal. Deal with abnormal problems.
  • the monitoring solution based on the Spring framework cannot display all the log information, which results in the subsequent failure to accurately locate the abnormality, and because the Spring framework is large, it will take up more resources and cause the operation to be not smooth; while the Pinpoint framework is based on bytes
  • the code injection method analyzes the performance of the system, which requires the operator to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the realization; and the Dubbo framework cannot be used directly, so the realization process needs to be carried out on the basis of open source It can be used after modification and customization, so the access cost is relatively high.
  • the main purpose of this application is to provide a monitoring method, device, equipment and storage medium for system services, aiming to solve the problem that the monitoring of system services in the prior art cannot support the storage of all log information, the difficulty of development, and the slow speed of data analysis Technical issues.
  • this application provides a method for monitoring system services.
  • the method includes the following steps:
  • the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
  • the log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
  • this application also proposes a system service monitoring device, which includes:
  • the extraction module is configured to receive a system service access request, and extract the identification number of the accessed first system service from the system service access request;
  • a determining module configured to determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
  • the collection module is configured to respond to the system service access request when the first system service serves the system to be monitored, and collect the first system service generation during the process of the first system service being accessed Log information;
  • the analysis module is used to analyze the log information and store the real-time analysis results obtained in the corresponding data management system.
  • this application also proposes a monitoring device for system services, the device including: a memory, a processor, and computer-readable instructions stored on the memory and executable by the processor, wherein When the computer-readable instructions are executed by the processor, the steps of the method for monitoring system services are as described above.
  • this application also proposes a computer-readable storage medium with computer-readable instructions stored on the computer-readable storage medium.
  • the computer-readable instructions are executed by a processor, the implementation is as described above. The steps of the monitoring method of the system service.
  • FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the present application;
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for monitoring system services in this application;
  • step S40 is a schematic diagram of a specific implementation process of step S40 in the first embodiment of the method for monitoring system services of this application;
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services in this application.
  • Figure 5 is a structural block diagram of a first embodiment of a monitoring device for system services in this application.
  • FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the application.
  • the monitoring equipment of the system service may include a processor 1001, such as a central processing unit (Central Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a wireless fidelity (WIreless-FIdelity, WI-FI) interface).
  • WIreless-FIdelity WI-FI
  • the memory 1005 may be a high-speed random access memory (Random Access Memory, RAM) memory, can also be a stable non-volatile memory (Non-Volatile Memory, NVM), such as disk storage.
  • RAM Random Access Memory
  • NVM Non-Volatile Memory
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • FIG. 1 does not constitute a limitation on the monitoring equipment of the system service, and may include more or less components than shown in the figure, or a combination of certain components, or a different component arrangement .
  • a memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and computer-readable instructions.
  • the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with users; the processor 1001 in the monitoring device of the system service of this application
  • the memory 1005 may be set in a monitoring device of a system service.
  • the monitoring device of the system service uses the processor 1001 to call computer-readable instructions stored in the memory 1005 and execute the method for monitoring the system service provided in the embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for monitoring system services of this application.
  • the monitoring method of the system service includes the following steps:
  • Step S10 receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request.
  • the execution subject of this embodiment is a server on which the computer-readable instructions are deployed.
  • the server on which the computer-readable instructions are deployed can be a traditional physical server, that is, a server that occupies actual physical space, or a virtual cloud server.
  • the specific selection method is based on the technology in the field. Personnel can set according to their needs, there is no restriction here.
  • the received system service access request can be sent by any communication device, such as smart terminal devices for users, such as mobile phones, tablets, wearable devices, etc., or personal computers, servers and other devices. I will not list them one by one, and there will be no restrictions on this.
  • identification number used to identify the first system service is specifically a unique identification number assigned to the developer when compiling the first system service.
  • the service code, the specific format can be set by those skilled in the art as needed, and there is no limitation here.
  • step S20 in order to ensure the smooth progress of the subsequent step S20 operation, before performing the above step S10, it is necessary to construct the service table of the system to be monitored that needs to be used in step S20.
  • the specific It is based on the Guice framework, not the Spring framework, Pinpoint framework and Dubbo framework.
  • the so-called Guice framework is a code compilation framework with generic and annotation features, small structure and fast. Therefore, the second system service compiled based on the Guice framework not only has a small amount of code, takes up less server resources, and has clear annotation information, which can greatly facilitate the reading of the staff during the monitoring of the entire system service, thereby reducing the follow-up The difficulty of maintenance.
  • the Spring framework due to its own code structure is large, so it will take up more resources, resulting in not smooth running, affecting the monitoring of system services; Pinpoint framework is based on bytecode injection method to analyze system performance, Therefore, in the implementation process, the operator needs to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the implementation; the Dubbo framework cannot be used directly, so it needs to be modified and customized on the basis of open source during the implementation process. It can be used, so the access cost is relatively high.
  • the Guice framework is used instead of the Spring framework, Pinpoint framework, and Dubbo framework, which not only simplifies the process, reduces the compilation difficulty, and more importantly,
  • the usage and working methods of the compiled second system service are completely different from those of the existing system service. It is based on this difference that the monitoring process of the entire system service greatly facilitates the reading of the staff and reduces The difficulty of subsequent maintenance.
  • the second system service that needs to be monitored by the system service needs to include the system service for monitoring the new function.
  • the system architecture of any second system service obtained by compiling is based on the lightweight Guice framework, that is, the log information generated in the process of accessing the second system service is clear and clear Comment information.
  • the second system service meets the business requirements specified by the technical personnel, that is, a specified function or business.
  • step (2) the operation of determining the system service to be monitored according to the business requirements and the attributes of the second system service mentioned in the above step (2) can be roughly as follows:
  • the second system service is marked as a system service to be monitored.
  • the five second system services A, B, C, D, and E are involved.
  • the second system service A, the second system service B, and the second system service The second system service D needs to be monitored during the access process, and the second system service C and the second system service E are not needed, then the determined system services to be monitored are the second system service A, the second system service B, and the second system Service D.
  • the identification number of the second system service A is A100
  • the identification number of the second system service B is B100
  • the identification number of the second system service D is D100
  • the system service to be monitored is being constructed
  • a note document or note table is created, and the identification numbers A100, B100, and D100 are sequentially entered into the created note document or note table to obtain the service table of the system to be monitored.
  • the “first” in the “first system service” mentioned above is only used to distinguish the system service from other system services, and does not limit the system service itself, and the first system The service may be any one of the at least one second system service compiled based on the Guice framework.
  • the "second” in the “second system service” is only used to distinguish the system service from other system services, and does not limit the system service itself, and is based on at least one pre-compiled first system service based on the Guice framework.
  • at least one second system service is the first system service.
  • Step S20 Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored.
  • step S20 a specific implementation manner is given below, which is roughly as follows:
  • the service table of the system to be monitored is traversed, that is, the identification numbers of the service of the system to be monitored are read in order from the service table of the system to be monitored.
  • the identification number is compared with the traversed identification number of the current system service to be monitored.
  • the step is entered S30: If, by comparison, it is determined that the identification number of the first system service does not match the identification number of any of the traversed system services to be monitored, only respond to the system access request, and there is no need to Collecting log information generated by the first system service during the process of accessing the system service.
  • Step S30 if the first system service is the system service to be monitored, respond to the system service access request, and collect log information generated by the first system service during the process in which the first system service is accessed .
  • the log information collected in this embodiment mainly includes traceId, spanId, and annotation.
  • the traceId is used to identify a certain system service.
  • the corresponding specific system access request ID here refers to the identification number that carries the first system service The ID of the system access request.
  • the traceId is used in a remote procedure call (Remote Procedure Call, RPC) interface is generated when the first layer of the network is called, and the traceId is globally unique, and will be continuously passed back with the RPC calls of each layer, so that the first system service is collected by collecting
  • RPC Remote Procedure Call
  • the traceId generated during the access process can connect the path called by a user request in the system in series, so as to know what operations have been performed in this request, and then facilitate the location of subsequent abnormal problems.
  • spanId is used to identify the position of an RPC call in a distributed request.
  • the initial value of spanId can be 0.
  • the spanId is 0.1
  • continue to enter When the next layer of RPC calls C, spanId is 0.1.1; and when the RPC at the same layer as B calls E, spanId can be 0.2.
  • the spanId can be used to locate the position of a certain RPC request in the system call and who its upstream and downstream dependencies are.
  • the embedded point data can be data that is of business interest and wants to be uploaded to the backend, such as a user requesting once Identity Information.
  • the traceId and spanId in the above log information are automatically obtained when the system service access request is triggered after the development of the Guice framework.
  • Annotation is to embed the point in the code corresponding to the system service through preview, so that after the system service access request is triggered, in the process of accessing the system service, when the accessed system service executes the code that sets the embedment point, RPC will be called automatically, and the buried point data will be sent to the next link through RPC.
  • the implementation principle of the embedding point is very simple. Specifically, when the user operates the network application or interface initialization, the software development kit of the third-party data analysis service provider (Software Development Kit, SDK), and then call the corresponding data sending interface in the SDK to send data when an event occurs. For example, if we want to count the number of clicks on a certain button in a web application, when the button is clicked, we can click the corresponding button
  • the OnClick function calls the data sending interface provided by the SDK to send data.
  • Step S40 Analyze the log information, and store the obtained real-time analysis result in the corresponding data management system.
  • the data management system can be roughly divided into the following three subsystems: a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem.
  • the step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system can be detailed into two sub-steps shown in FIG. 3, which are specifically as follows:
  • Sub-step S401 using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information.
  • a big data analysis technology and machine learning algorithm can be used to construct an analysis model in advance.
  • the training model is trained until a certain log information is input, and the model information corresponding to the log information and the threshold information position for judging the log information can be obtained.
  • the training of the training model can be completed.
  • the training model at this moment is the analysis model.
  • Sub-step S402 adding the model information to the distributed storage management subsystem, adding the threshold information to the relational database management subsystem, and adding the log information to the distributed file management sub-system system.
  • Mysql database can be selected in practical applications; the above-mentioned distributed storage management subsystem can be selected with high reliability, high performance, column-oriented, and Scalable Hadoop Database (usually referred to as HBase); for the distributed file management subsystem mentioned above, Hadoop Distributed File can be used System (commonly known as HDFS).
  • HBase high reliability, high performance, column-oriented, and Scalable Hadoop Database
  • HDFS Hadoop Distributed File can be used System
  • the real-time analysis results obtained are stored in different data management subsystems, such as storing various models derived from real-time analysis in Hbase, and real-time analysis
  • the obtained control data with a small amount of data such as switches and thresholds are stored in Mysql, and the complete original log information is stored in HDFS, so that the subsequent location of abnormal problems can be quickly searched for different data management subsystems as needed, thereby Speed up processing.
  • the method for monitoring system services constructs a list of system services to be monitored in advance, and adds the system services to be monitored that need to be monitored in the list of system services to be monitored, so that when a system service access request is received, After the identification number of the accessed first system service is extracted from the system service access request, it can be directly determined whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored.
  • the first system service responds only when the first system service is a system service to be monitored, and at the same time, the log information generated by the first system service is collected while the first system service is being accessed.
  • the analysis can be obtained without increasing the development cost and difficulty. All real-time analysis results are stored, thereby realizing the storage of all log information of the first system service, which greatly facilitates the subsequent R&D personnel to locate the abnormal problem of the first system service.
  • the real-time analysis results can also be displayed according to a preset display style for R&D personnel to view, such as graphics in different styles, or Charts of different dimensions are displayed.
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services according to this application.
  • the method for monitoring system services in this embodiment further includes:
  • Sub-step S403 performing a preprocessing operation on the log information according to preset processing rules to obtain log information from which interference information is removed;
  • the log information generated in the process of accessing the first system service often contains some information that is useless for subsequent analysis abnormalities and locating problems. Therefore, in order to ensure the collected log information To be as effective as possible to avoid increasing analysis burden and affecting analysis results, it is necessary to perform a series of preprocessing operations on the collected log information before performing the step of analyzing the log information using big data analysis technology.
  • the log information obtained after the data cleaning operation is performed on the log information according to the processing rule is to remove the interference information. It is the log information that removes duplicate information and corrects the existing errors, so that it can ensure that the analysis results obtained during the subsequent log analysis process are more accurate.
  • the preprocessing operation may also be set to group the log information according to business needs.
  • Sub-step S404 adding the log information for removing interference information to a pre-built distributed publish-subscribe message queue.
  • the above-mentioned distributed publish-subscribe message queue is essentially a commonly-called Kafka message queue.
  • Kafka has the characteristics of persistence, stability, high-pass throughput, support for server and consumer clusters to partition messages, and support for parallel data loading of distributed systems
  • Kafka message queues are selected to cache the log information that removes interference information, which can It is possible to avoid a large amount of log information from accumulating on the log analysis node, thereby preventing thread blocking and ensuring the processing speed of log analysis.
  • Kafka is an open source stream processing platform developed by the Apache Software Foundation, and its use is relatively mature. Those skilled in the art can find relevant documents and implement them by themselves in specific implementations. I will not repeat them here. .
  • the operation performed in the atomic step S401 adaptively becomes the operation of the sub-step S401' in FIG. 4: for the first time, the log information for removing interference information is sequentially read from the distributed publish-subscribe message queue; Then, the big data analysis technology is used to analyze the log information of the interference removal information.
  • the monitoring method of the system service uses the big data analysis technology to analyze the log information by pre-processing the log information according to preset processing rules. Processing operations to obtain log information for removing interference information, and adding the log information for removing interference information to a pre-built distributed publish-and-subscribe message queue for caching, so as to effectively prevent a large amount of log information from being accumulated in log analysis at the same time
  • the node solves the problem of thread blocking, which greatly improves the processing speed.
  • the embodiments of the present application also provide a computer-readable storage medium, and the computer-readable storage medium may be a non-volatile readable storage medium.
  • the computer-readable storage medium of the present application stores computer-readable instructions, and when the computer-readable instructions are executed by a processor, the steps of the method for monitoring system services as described above are realized.
  • FIG. 5 is a structural block diagram of a first embodiment of a monitoring device serviced by the system of this application.
  • the system service monitoring device proposed in the embodiment of the present application includes:
  • the extraction module 5001 is used to receive a system service access request and extract the identification number of the first system service to be accessed from the system service access request; the determination module 5002 is used to determine the identification number and the pre-built system to be monitored based on the identification number
  • the service table determines whether the first system service is the service of the system to be monitored; the collection module 5003 is used to respond to the system service access request when the first system service is the service of the system to be monitored.
  • the log information generated by the first system service is collected during the process when the first system service is accessed; the analysis module 5004 is configured to analyze the log information and store the real-time analysis result obtained in the corresponding data management system.
  • each virtual function module of the monitoring device of the above system service is stored in the memory 1005 of the monitoring device of the system service shown in FIG. 1, and is used to realize all the functions of computer-readable instructions; when each module is executed by the processor 1001, it can be Complete the entire process of monitoring system services.
  • the monitoring device of the system service further includes:
  • the service table construction module of the system to be monitored is used to construct the service table of the system to be monitored;
  • the step of constructing the service table of the system to be monitored includes: compiling at least one second system service based on the Guice framework according to business requirements; determining the service according to the business requirements and the attributes of the second system service Whether the second system service needs to be monitored; if the second system service needs to be monitored, mark the second system service as a system service to be monitored; obtain the identification number of the system service to be monitored, and The identification number of the monitoring system service constructs the service table of the system to be monitored.
  • the operation of determining whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored may be as follows:
  • the identification number matches the traversed identification number of the current system service to be monitored, it is determined that the first system service is the system service to be monitored.
  • the data management system may include a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
  • the analysis module includes:
  • the big data analysis unit is configured to use big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
  • An information adding unit configured to add the model information to the distributed storage management subsystem, add the threshold information to the relational database management subsystem, and add the log information to the distributed file Management subsystem.
  • the monitoring device of the system service further includes:
  • the preprocessing module is configured to perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
  • the step of using big data analysis technology to analyze the log information includes:
  • the big data analysis technology is used to analyze the log information for removing interference information.
  • the monitoring device of the system service further includes:
  • a log information adding module configured to add the log information for removing interference information to a pre-built distributed publish-subscribe message queue
  • the step of using big data analysis technology to analyze the log information for removing interference information includes:
  • the big data analysis technology is used to analyze the log information for removing interference information.
  • the monitoring device of the system service further includes:
  • the display module is used to display the real-time analysis result according to the preset display style.
  • each module in the monitoring device of the above system service corresponds to each step in the embodiment of the monitoring method of the above system service, and the function and realization process are not repeated here.
  • the method of the embodiment can be implemented by means of software plus a necessary general hardware platform, of course, it can also be implemented by hardware, but the former is a better implementation in many cases.
  • the application s The essence of the technical solution or the part that contributes to the existing technology can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium (such as Read Only Memory). Memory, ROM)/RAM, disk, optical
  • the disk includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) execute the method described in each embodiment of the present application.

Abstract

A system service monitoring method, device, and apparatus, and a storage medium. The method comprises: receiving a system service access request, and extracting from the system service access request an identification number of a first system service being accessed (S10); determining whether or not the first system service is a system service to be monitored according to the identification number and a pre-established table of system services to be monitored (S20); if so, in response to the system service access request, collecting log information generated by the first system service when the first system service is being accessed (S30); and analyzing the log information, and storing an acquired real-time analysis result in a corresponding data management system (S40). The method resolves the technical issues in which system service monitoring cannot support the full storage of log information, development difficulty is high, and data analysis speed is slow.

Description

系统服务的监控方法、装置、设备及存储介质 Monitoring method, device, equipment and storage medium of system service To
本申请要求于2019年5月21日提交中国专利局、申请号为201910428277.7、发明名称为“系统服务的监控方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed with the Chinese Patent Office on May 21, 2019, the application number is 201910428277.7, and the invention title is "system service monitoring method, device, equipment and storage medium", the entire content of which is by reference Incorporated in this application.
技术领域Technical field
本申请涉及软件监控技术领域,尤其涉及一种系统服务的监控方法、装置、设备及存储介质。This application relates to the technical field of software monitoring, and in particular to a monitoring method, device, equipment, and storage medium for system services.
背景技术Background technique
随着移动互联网技术的飞速发展,适用于智能终端设备的网络应用程序越来越多。并且,为了使这些网络应用程序能够更好的为用户提供服务,在推出网络应用程序的同时,会推出监控网络应用程序的监控方案。目前,对网络应用程序调用系统服务时进行的监控方案,通常是基于Spring(一个开放源代码的设计层面框架),并辅以Pinpoint(一款java的应用性能管理工具)和Dubbo(一个开源分布式服务框架)的方式实现的。With the rapid development of mobile Internet technology, there are more and more network applications suitable for smart terminal devices. In addition, in order to enable these network applications to provide better services to users, when the network application is launched, a monitoring program to monitor the network application will be launched. At present, the monitoring program for network applications when calling system services is usually based on Spring (an open source design-level framework), supplemented by Pinpoint (a java application performance management tool) and Dubbo (an open source distribution) Service framework).
虽然,这种监控方案可以在网络应用程序访问对应的系统服务时,收集到系统服务生成的日志信息,使得研发人员能够在网络应用程序发生异常时,根据收集到的日志信息定位异常,从而对异常问题进行处理。但是,基于Spring框架的监控方案无法显示全部的日志信息,进而导致后续无法准确定位异常,并且由于Spring框架较大,会占用较多的资源,导致运行不够流畅;而Pinpoint框架则是基于字节码注入方式对系统性能进行分析的,因而需要操作人员具备较高的专业知识,操作相对复杂,不利于实现;而Dubbo框架由于其无法直接使用,因而在实现过程中需要在开源的基础上进行改动、定制后才可以使用,因而接入成本相对较高。Although, this monitoring solution can collect the log information generated by the system service when the network application accesses the corresponding system service, so that R&D personnel can locate the abnormality based on the collected log information when the network application is abnormal. Deal with abnormal problems. However, the monitoring solution based on the Spring framework cannot display all the log information, which results in the subsequent failure to accurately locate the abnormality, and because the Spring framework is large, it will take up more resources and cause the operation to be not smooth; while the Pinpoint framework is based on bytes The code injection method analyzes the performance of the system, which requires the operator to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the realization; and the Dubbo framework cannot be used directly, so the realization process needs to be carried out on the basis of open source It can be used after modification and customization, so the access cost is relatively high.
所以,亟需提供一种解决上述技术问题的系统服务的监控方法。Therefore, there is an urgent need to provide a monitoring method for system services that solves the above technical problems.
发明内容Summary of the invention
本申请的主要目的在于提供一种系统服务的监控方法、装置、设备及存储介质,旨在解决现有技术中对系统服务的监控无法支持全部日志信息存储,以及开发难度大,数据分析速度慢的技术问题。The main purpose of this application is to provide a monitoring method, device, equipment and storage medium for system services, aiming to solve the problem that the monitoring of system services in the prior art cannot support the storage of all log information, the difficulty of development, and the slow speed of data analysis Technical issues.
为实现上述目的,本申请提供了一种系统服务的监控方法,所述方法包括以下步骤:In order to achieve the above objective, this application provides a method for monitoring system services. The method includes the following steps:
接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;Receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request;
根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
若所述第一系统服务为所述待监控系统服务,则响应所述系统服务访问请求,在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;If the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
此外,为实现上述目的,本申请还提出一种系统服务的监控装置,所述装置包括:In addition, in order to achieve the above objective, this application also proposes a system service monitoring device, which includes:
提取模块,用于接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;The extraction module is configured to receive a system service access request, and extract the identification number of the accessed first system service from the system service access request;
确定模块,用于根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;A determining module, configured to determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
采集模块,用于在所述第一系统服务为所述待监控系统服务时,响应所述系统服务访问请求,并在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;The collection module is configured to respond to the system service access request when the first system service serves the system to be monitored, and collect the first system service generation during the process of the first system service being accessed Log information;
分析模块,用于对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The analysis module is used to analyze the log information and store the real-time analysis results obtained in the corresponding data management system.
此外,为实现上述目的,本申请还提出一种系统服务的监控设备,所述设备包括:存储器、处理器及存储在所述存储器上并可被所述处理器执行的计算机可读指令,其中所述计算机可读指令被所述处理器执行时,如上文所述的系统服务的监控方法的步骤。In addition, in order to achieve the above objective, this application also proposes a monitoring device for system services, the device including: a memory, a processor, and computer-readable instructions stored on the memory and executable by the processor, wherein When the computer-readable instructions are executed by the processor, the steps of the method for monitoring system services are as described above.
此外,为实现上述目的,本申请还提出一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机可读指令,其中所述计算机可读指令被处理器执行时,实现如上文所述的系统服务的监控方法的步骤。In addition, in order to achieve the above-mentioned object, this application also proposes a computer-readable storage medium with computer-readable instructions stored on the computer-readable storage medium. When the computer-readable instructions are executed by a processor, the implementation is as described above. The steps of the monitoring method of the system service.
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其他特征和优点将从说明书、附图以及权利要求书变得明显。The details of one or more embodiments of the application are set forth in the following drawings and description. Other features and advantages of this application will become apparent from the description, drawings and claims.
附图说明Description of the drawings
图1是本申请实施例方案涉及的硬件运行环境的系统服务的监控设备的结构示意图;FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the present application;
图2为本申请系统服务的监控方法第一实施例的流程示意图;2 is a schematic flowchart of a first embodiment of a method for monitoring system services in this application;
图3为本申请系统服务的监控方法第一实施例中步骤S40的具体实现流程示意图;3 is a schematic diagram of a specific implementation process of step S40 in the first embodiment of the method for monitoring system services of this application;
图4为本申请系统服务的监控方法第二实施例的流程示意图;FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services in this application;
图5为本申请系统服务的监控装置第一实施例的结构框图。Figure 5 is a structural block diagram of a first embodiment of a monitoring device for system services in this application.
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The realization, functional characteristics, and advantages of the purpose of this application will be further described in conjunction with the embodiments and with reference to the accompanying drawings.
具体实施方式Detailed ways
应当理解,此处所描述的具体实施例仅用以解释本申请,并不用于限定本申请。It should be understood that the specific embodiments described herein are only used to explain the application, and not used to limit the application.
参照图1,图1为本申请实施例方案涉及的硬件运行环境的系统服务的监控设备结构示意图。Referring to FIG. 1, FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the application.
如图1所示,该系统服务的监控设备可以包括:处理器1001,例如中央处理器(Central Processing Unit,CPU),通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如无线保真(WIreless-FIdelity,WI-FI)接口)。存储器1005可以是高速的随机存取存储器(Random Access Memory,RAM)存储器,也可以是稳定的非易失性存储器(Non-Volatile Memory,NVM),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。As shown in Figure 1, the monitoring equipment of the system service may include a processor 1001, such as a central processing unit (Central Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005. Among them, the communication bus 1002 is used to implement connection and communication between these components. The user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface. The network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a wireless fidelity (WIreless-FIdelity, WI-FI) interface). The memory 1005 may be a high-speed random access memory (Random Access Memory, RAM) memory, can also be a stable non-volatile memory (Non-Volatile Memory, NVM), such as disk storage. Optionally, the memory 1005 may also be a storage device independent of the foregoing processor 1001.
本领域技术人员可以理解,图1中示出的结构并不构成对系统服务的监控设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。Those skilled in the art can understand that the structure shown in FIG. 1 does not constitute a limitation on the monitoring equipment of the system service, and may include more or less components than shown in the figure, or a combination of certain components, or a different component arrangement .
如图1所示,作为一种计算机可读存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及计算机可读指令。As shown in FIG. 1, a memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and computer-readable instructions.
在图1所示的系统服务的监控设备中,网络接口1004主要用于与网络服务器进行数据通信;用户接口1003主要用于与用户进行数据交互;本申请系统服务的监控设备中的处理器1001、存储器1005可以设置在系统服务的监控设备中,所述系统服务的监控设备通过处理器1001调用存储器1005中存储的计算机可读指令,并执行本申请实施例提供的系统服务的监控方法。In the monitoring device of the system service shown in FIG. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with users; the processor 1001 in the monitoring device of the system service of this application The memory 1005 may be set in a monitoring device of a system service. The monitoring device of the system service uses the processor 1001 to call computer-readable instructions stored in the memory 1005 and execute the method for monitoring the system service provided in the embodiment of the present application.
本申请实施例提供了一种系统服务的监控方法,参照图2,图2为本申请一种系统服务的监控方法第一实施例的流程示意图。An embodiment of the present application provides a method for monitoring system services. Referring to FIG. 2, FIG. 2 is a schematic flowchart of a first embodiment of a method for monitoring system services of this application.
本实施例中,所述系统服务的监控方法包括以下步骤:In this embodiment, the monitoring method of the system service includes the following steps:
步骤S10,接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号。Step S10, receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request.
具体的说,本实施例的执行主体为部署有所述计算机可读指令的服务器。Specifically, the execution subject of this embodiment is a server on which the computer-readable instructions are deployed.
应当理解的是,在实际应用中,部署所述计算机可读指令的服务器可以是传统的物理服务器,即占用实际物理空间的服务器,也可以是虚拟云服务器,具体的选取方式,本领域的技术人员可以根据需要进行设置,此处不做限制。It should be understood that in practical applications, the server on which the computer-readable instructions are deployed can be a traditional physical server, that is, a server that occupies actual physical space, or a virtual cloud server. The specific selection method is based on the technology in the field. Personnel can set according to their needs, there is no restriction here.
相应地,接收到的系统服务访问请求,可以是任意通讯设备发送的,比如供用户使用的智能终端设备,如手机、平板电脑、可穿戴设备等,也可以是个人计算机,服务器等设备,此处不再一一列举,对此也不做限制。Correspondingly, the received system service access request can be sent by any communication device, such as smart terminal devices for users, such as mobile phones, tablets, wearable devices, etc., or personal computers, servers and other devices. I will not list them one by one, and there will be no restrictions on this.
此外,应当理解的是,上述所说的用于标识所述第一系统服务的标识号,具体为研发人员在编译所述第一系统服务时,为其分配的一个用于标识其唯一性的服务编码,具体的格式可以由本领域的技术人员根据需要进行设置,此处不做限制。 In addition, it should be understood that the above-mentioned identification number used to identify the first system service is specifically a unique identification number assigned to the developer when compiling the first system service. The service code, the specific format can be set by those skilled in the art as needed, and there is no limitation here. To
此外,值得一提的是,在实际应用中,为了保证后续步骤S20的操作能够顺利进行,在执行上述步骤S10之前,需要先构建步骤S20中需要用到的待监控系统服务表。In addition, it is worth mentioning that in practical applications, in order to ensure the smooth progress of the subsequent step S20 operation, before performing the above step S10, it is necessary to construct the service table of the system to be monitored that needs to be used in step S20.
具体的说,在本实施例中,为了尽可能的降低对部署所述计算机可读指令的服务器的系统资源的占用,同时提升数据的传输速度,在构建所述待监控系统服务表时,具体是基于Guice框架实现的,而并非基于Spring框架、Pinpoint框架和Dubbo框架。Specifically, in this embodiment, in order to reduce as much as possible the occupation of system resources of the server on which the computer-readable instructions are deployed, and at the same time increase the data transmission speed, when constructing the service table of the system to be monitored, the specific It is based on the Guice framework, not the Spring framework, Pinpoint framework and Dubbo framework.
所谓Guice框架,是一款具有泛型与注释特性,并且结构小且快的代码编译框架。因此,基于Guice框架编译出的第二系统服务不仅代码量小,占用服务器资源少,并且具有清楚明了的注释信息,因而在整个系统服务的监控过程中可以大大方便工作人员的阅读,从而降低后续维护的困难度。The so-called Guice framework is a code compilation framework with generic and annotation features, small structure and fast. Therefore, the second system service compiled based on the Guice framework not only has a small amount of code, takes up less server resources, and has clear annotation information, which can greatly facilitate the reading of the staff during the monitoring of the entire system service, thereby reducing the follow-up The difficulty of maintenance.
而Spring框架由于其自身代码结构较大,因此会占用较多的资源,从而导致运行不够流畅,影响对系统服务的监控;Pinpoint框架则是由于其基于字节码注入方式对系统性能进行分析,因而在实现过程中需要操作人员具备较高的专业知识,操作相对复杂,故不利于实现;Dubbo框架则由于其无法直接使用,因而在实现过程中需要在开源的基础上进行改动、定制后才可以使用,因而接入成本相对较高。The Spring framework due to its own code structure is large, so it will take up more resources, resulting in not smooth running, affecting the monitoring of system services; Pinpoint framework is based on bytecode injection method to analyze system performance, Therefore, in the implementation process, the operator needs to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the implementation; the Dubbo framework cannot be used directly, so it needs to be modified and customized on the basis of open source during the implementation process. It can be used, so the access cost is relatively high.
通过上述描述不难发现,本实施例中在编译第二系统服务时,通过采用Guice框架,而并非基于Spring框架、Pinpoint框架和Dubbo框架,不仅简化了过程,降低了编译难度,更重要的是编译出的第二系统服务与现有的系统服务的使用方式,工作方式是完全不相同的,并且正是基于这一不同,使得整个系统服务的监控过程大大方便了工作人员的阅读,降低了后续维护的困难度。From the above description, it is not difficult to find that when compiling the second system service in this embodiment, the Guice framework is used instead of the Spring framework, Pinpoint framework, and Dubbo framework, which not only simplifies the process, reduces the compilation difficulty, and more importantly, The usage and working methods of the compiled second system service are completely different from those of the existing system service. It is based on this difference that the monitoring process of the entire system service greatly facilitates the reading of the staff and reduces The difficulty of subsequent maintenance.
为了便于理解,以下针对基于Guice框架,构建所述待监控系统服务表的操作进行说明,具体实现步骤大致如下:For ease of understanding, the following describes the operation of constructing the service table of the system to be monitored based on the Guice framework. The specific implementation steps are roughly as follows:
(1)根据业务需求,基于Guice框架编译至少一个第二系统服务。(1) According to business needs, compile at least one second system service based on the Guice framework.
应当理解的是,此处所说的业务需要,在实际应用中具体是由负责系统服务监控工作的技术人员,根据待监控的网络应用程序预先确定的。It should be understood that the business needs mentioned here are specifically determined in advance by the technical personnel responsible for system service monitoring in actual applications according to the network application to be monitored.
比如,在某一网络应用程序推出一个新的功能时,为了统计用户的使用情况,可以预先规定后续需要进行系统服务监控的第二系统服务需要包括监控该新功能的系统服务。For example, when a certain network application launches a new function, in order to count the user's usage, it may be specified in advance that the second system service that needs to be monitored by the system service needs to include the system service for monitoring the new function.
也就是说,上述步骤(1)中,编译获得的任一第二系统服务,其系统架构是轻量级的Guice框架的,即该第二系统服务被访问过程中生成的日志信息具有清楚明了的注释信息。That is to say, in the above step (1), the system architecture of any second system service obtained by compiling is based on the lightweight Guice framework, that is, the log information generated in the process of accessing the second system service is clear and clear Comment information.
同时,该第二系统服务又是符合技术人员规定的业务需求的,即指定的某一功能或业务。At the same time, the second system service meets the business requirements specified by the technical personnel, that is, a specified function or business.
(2)根据所述业务需求和所述第二系统服务的属性,确定待监控系统服务。(2) Determine the system service to be monitored according to the business requirements and the attributes of the second system service.
具体的说,上述步骤(2)中所说的根据所述业务需求和所述第二系统服务的属性,确定待监控系统服务的操作,大致可以如下所述:Specifically, the operation of determining the system service to be monitored according to the business requirements and the attributes of the second system service mentioned in the above step (2) can be roughly as follows:
首先,根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控。First, according to the business requirements and the attributes of the second system service, it is determined whether the second system service needs to be monitored.
应当理解的是,由于某一网络应用程序在发布版本时,其支持的功能众多,也就是说编译出的第二系统服务可以有多个,比如一个功能对应一个第二系统服务。但是,在实际应用中,并非每一个功能都需要监控,因此编译的第二系统服务中并非全部都需要进行监控,此时就需要根据技术人员给出的业务需求和所述第二系统服务的属性来判断编译获得的第一系统服务,哪些是需要进行监控的。It should be understood that, since a certain network application program supports a large number of functions when it is released, that is to say, there may be multiple second system services compiled, for example, one function corresponds to one second system service. However, in actual applications, not every function needs to be monitored. Therefore, not all of the compiled second system services need to be monitored. At this time, it needs to be based on the business requirements given by the technicians and the second system services. Attributes to determine the first system services obtained by compiling, which ones need to be monitored.
相应地,若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务。Correspondingly, if the second system service needs to be monitored, the second system service is marked as a system service to be monitored.
为了便于理解,以下结合实例进行说明:In order to facilitate understanding, the following description is combined with examples:
比如说,某一网络应用程序在使用过程中,涉及到A,B,C,D,E这5个第二系统服务,根据业务需求规定,第二系统服务A、第二系统服务B和第二系统服务D在访问过程中需要进行监控,第二系统服务C和第二系统服务E不需要,则确定的待监控系统服务便是第二系统服务A、第二系统服务B和第二系统服务D。For example, during the use of a certain network application, the five second system services A, B, C, D, and E are involved. According to business requirements, the second system service A, the second system service B, and the second system service The second system service D needs to be monitored during the access process, and the second system service C and the second system service E are not needed, then the determined system services to be monitored are the second system service A, the second system service B, and the second system Service D.
(3)获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。(3) Obtain the identification number of the system service to be monitored, and construct the service table of the system to be monitored according to the identification number of the system service to be monitored.
仍以上述案例进行说明,比如第二系统服务A的标识号为A100、第二系统服务B的标识号为B100、第二系统服务D的标识号为D100,则在构建所述待监控系统服务表时,具体可以是创建一个记事文档或者记事表格,依次将标识号A100、B100和D100录入创建的记事文档或者记事表格,便可以得到所述待监控系统服务表。Still taking the above case to explain, for example, the identification number of the second system service A is A100, the identification number of the second system service B is B100, and the identification number of the second system service D is D100, then the system service to be monitored is being constructed When making a list, specifically, a note document or note table is created, and the identification numbers A100, B100, and D100 are sequentially entered into the created note document or note table to obtain the service table of the system to be monitored.
应当理解的是,以上给出的仅为一种具体的实现方式,对本申请的技术方案并不构成任何限定,在实际应用中,本领域的技术人员可以根据需要进行设置,此处不做限制。It should be understood that the above is only a specific implementation manner, and does not constitute any limitation to the technical solution of the present application. In actual applications, those skilled in the art can make settings as needed, and there is no limitation here. .
此外,在本实施例中,上述所说的“第一系统服务”中的“第一”仅仅是用于区别该系统服务与其他系统服务,并不对系统服务本身造成限定,且该第一系统服务可以为基于Guice框架编译的至少一个第二系统服务中的任意一个系统服务。In addition, in this embodiment, the “first” in the “first system service” mentioned above is only used to distinguish the system service from other system services, and does not limit the system service itself, and the first system The service may be any one of the at least one second system service compiled based on the Guice framework.
相应地,所述“第二系统服务”中的“第二”,也仅仅是用于区别该系统服务与其他系统服务,并不对系统服务本身造成限定,且基于Guice框架预先编译的至少一个第二系统服务中,至少有一个第二系统服务为所述第一系统服务。Correspondingly, the "second" in the "second system service" is only used to distinguish the system service from other system services, and does not limit the system service itself, and is based on at least one pre-compiled first system service based on the Guice framework. Among the two system services, at least one second system service is the first system service.
步骤S20,根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务。Step S20: Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored.
具体的说,为了便于理解步骤S20中执行的操作,以下给出一种具体的实现方式,大致如下:Specifically, in order to facilitate the understanding of the operations performed in step S20, a specific implementation manner is given below, which is roughly as follows:
首先,对所述待监控系统服务表进行遍历,即按序从所述待监控系统服务表中读取记录的待监控系统服务的标识号。First, the service table of the system to be monitored is traversed, that is, the identification numbers of the service of the system to be monitored are read in order from the service table of the system to be monitored.
然后,将所述标识号与遍历到的当前待监控系统服务的标识号进行对比。Then, the identification number is compared with the traversed identification number of the current system service to be monitored.
具体的说,若通过对比,确定所述第一系统服务的标识号与遍历到的当前待监控系统服务的标识号匹配,则确定所述第一系统服务为所述待监控系统服务,进入步骤S30;若通过对比,确定所述第一系统服务的标识号与遍历到的任一所述待监控系统服务的标识号均不匹配,则仅响应所述系统访问请求,无需在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息。Specifically, if it is determined by comparison that the identification number of the first system service matches the identification number of the traversed current system service to be monitored, it is determined that the first system service is the system service to be monitored, and the step is entered S30: If, by comparison, it is determined that the identification number of the first system service does not match the identification number of any of the traversed system services to be monitored, only respond to the system access request, and there is no need to Collecting log information generated by the first system service during the process of accessing the system service.
应当理解的是,以上给出的仅为一种具体的实现方式,对本申请的技术方案并不构成任何限定,在实际应用中,本领域的技术人员可以根据需要进行设置,此处不做限制。It should be understood that the above is only a specific implementation manner, and does not constitute any limitation to the technical solution of the present application. In actual applications, those skilled in the art can make settings as needed, and there is no limitation here. .
步骤S30,若所述第一系统服务为所述待监控系统服务,则响应所述系统服务访问请求,在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息。Step S30, if the first system service is the system service to be monitored, respond to the system service access request, and collect log information generated by the first system service during the process in which the first system service is accessed .
具体的说,本实施例中采集到的日志信息,主要包括traceId、spanId、annotation。Specifically, the log information collected in this embodiment mainly includes traceId, spanId, and annotation.
需要说明的是,所述traceId,是用于标识某一系统服务,在某一次被访问时,对应的具体的系统访问请求ID,这里指的便是携带有所述第一系统服务的标识号的系统访问请求的ID。It should be noted that the traceId is used to identify a certain system service. When a certain system service is accessed, the corresponding specific system access request ID, here refers to the identification number that carries the first system service The ID of the system access request.
为了便于理解,以下对所述traceId进行简要说明。To facilitate understanding, the traceId is briefly described below.
具体的说,所述traceId是在用户触发的系统访问请求进入系统后,在远程过程调用(Remote Procedure Call,RPC)接口调用网络的第一层时生成的,且所述traceId具有全局唯一性,并且随着每一层的RPC调用,会不断往后传递,这样通过采集所述第一系统服务被访问过程中生成的traceId,就可以把一次用户请求在系统中调用的路径串联起来,从而掌握本次请求都执行了哪些操作,进而方便后续异常问题的定位。Specifically, the traceId is used in a remote procedure call (Remote Procedure Call, RPC) interface is generated when the first layer of the network is called, and the traceId is globally unique, and will be continuously passed back with the RPC calls of each layer, so that the first system service is collected by collecting The traceId generated during the access process can connect the path called by a user request in the system in series, so as to know what operations have been performed in this request, and then facilitate the location of subsequent abnormal problems.
此外,上述所说的spanId,是用于标识一次RPC调用在分布式请求中的位置。In addition, the spanId mentioned above is used to identify the position of an RPC call in a distributed request.
举例来说,当用户的系统访问请求进入系统后,处在RPC调用网络的第一层A时,spanId的初始值可以是0,当进入下一层RPC调用B时,spanId是0.1,继续进入下一层RPC调用C时,spanId是0.1.1;而与B处在同一层的RPC调用E时,spanId可以是0.2。这样,通过spanId就可以定位某一次RPC请求在系统调用中所处的位置,以及它的上下游依赖分别是谁。For example, when the user's system access request enters the system and is in the first layer A of the RPC calling network, the initial value of spanId can be 0. When entering the next layer of RPC calling B, the spanId is 0.1, continue to enter When the next layer of RPC calls C, spanId is 0.1.1; and when the RPC at the same layer as B calls E, spanId can be 0.2. In this way, the spanId can be used to locate the position of a certain RPC request in the system call and who its upstream and downstream dependencies are.
此外,上述所说的annotation,是指研发人员在系统服务对应的代码中自定义的埋点数据,该埋点数据可以是业务感兴趣的,想要上传到后端的数据,比如一次请求的用户身份信息。In addition, the above-mentioned annotation refers to the embedded point data customized by the R&D personnel in the code corresponding to the system service. The embedded point data can be data that is of business interest and wants to be uploaded to the backend, such as a user requesting once Identity Information.
通过上述描述不难发现,在实际应用中,根据采集到的traceId可以实现串联某一次请求在系统中经过的所有路径的信息,根据spanId可以实现区分系统不同服务之间调用的先后关系,根据annotation可以根据业务需要,获取任何数据。Through the above description, it is not difficult to find that in practical applications, according to the collected traceId, it is possible to concatenate the information of all the paths that a request traverses in the system. According to the spanId, it is possible to distinguish the sequence of calls between different services of the system, according to the annotation Any data can be obtained according to business needs.
关于上述日志信息中的traceId和spanId是采用Guice框架开发后,在触发系统服务访问请求时,自动获取的。The traceId and spanId in the above log information are automatically obtained when the system service access request is triggered after the development of the Guice framework.
而annotation,则是通过预习在系统服务对应的代码中进行埋点,从而在触发系统服务访问请求后,在访问系统服务的过程中,当被访问的系统服务执行到设置埋点的代码后,便会自动调用RPC,通过RPC将得到的埋点数据传送至下一环节。Annotation is to embed the point in the code corresponding to the system service through preview, so that after the system service access request is triggered, in the process of accessing the system service, when the accessed system service executes the code that sets the embedment point, RPC will be called automatically, and the buried point data will be sent to the next link through RPC.
关于埋点的实现原理很简单,具体是在用户操作的网络应用程序或者界面初始化的时候,初始化第三方数据分析服务商的软件开发工具包(Software Development Kit,SDK),然后在某个事件发生时就调用SDK里面相应的数据发送接口发送数据。例如,我们想统计网络应用程序里面某个按钮的点击次数,则在该按钮被点击时,可以在这个按钮对应的 OnClick 函数里面调用SDK提供的数据发送接口来发送数据。The implementation principle of the embedding point is very simple. Specifically, when the user operates the network application or interface initialization, the software development kit of the third-party data analysis service provider (Software Development Kit, SDK), and then call the corresponding data sending interface in the SDK to send data when an event occurs. For example, if we want to count the number of clicks on a certain button in a web application, when the button is clicked, we can click the corresponding button The OnClick function calls the data sending interface provided by the SDK to send data.
应当理解的是,以上仅为举例说明,对本申请的技术方案并不构成任何限定,在实际应用中,本领域的技术人员可以根据需要进行设置,此处不做限制。It should be understood that the above is only an example for illustration, and does not constitute any limitation to the technical solution of the present application. In practical applications, those skilled in the art can make settings as needed, and there is no limitation here.
步骤S40,对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。Step S40: Analyze the log information, and store the obtained real-time analysis result in the corresponding data management system.
具体的说,在对所述日志信息进行分析时,可以得到多种类型的分析结果,为了方便后续查询,用于存储分析结果的数据管理系统也会有所不同。Specifically, when analyzing the log information, multiple types of analysis results can be obtained. In order to facilitate subsequent queries, the data management system used to store the analysis results will also be different.
在本实施例中,数据管理系统大致可以划分为如下三个子系统:关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统。In this embodiment, the data management system can be roughly divided into the following three subsystems: a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem.
相应地,所述对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统的步骤具体可以细化为图3所示的两个子步骤,具体如下所示:Correspondingly, the step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system can be detailed into two sub-steps shown in FIG. 3, which are specifically as follows:
子步骤S401,采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息。Sub-step S401, using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information.
具体的说,在实际应用中,为了方便对所述日志信息的分析,可以利用大数据分析技术和机器学习算法,预先构建一个分析模型。Specifically, in actual applications, in order to facilitate the analysis of the log information, a big data analysis technology and machine learning algorithm can be used to construct an analysis model in advance.
相应地,在对所述日志信息分析的时候,直接将所述日志信息输入到所述分析模型,便可以快速、准确的输出所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息。Correspondingly, when analyzing the log information, directly inputting the log information to the analysis model can quickly and accurately output the model information corresponding to the log information and use it to perform analysis on the log information. Judgment threshold information.
关于所述分析模型的构建,具体可以是:Regarding the construction of the analysis model, it may specifically be:
首先,根据各大数据平台存储的训练数据,构建一个训练模型。First, build a training model based on the training data stored in each big data platform.
然后,基于选取的机器学习算法,对所述训练模型进行训练,直到输入某一日志信息,可得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息位置,便可以完成对所述训练模型的训练。Then, based on the selected machine learning algorithm, the training model is trained until a certain log information is input, and the model information corresponding to the log information and the threshold information position for judging the log information can be obtained. The training of the training model can be completed.
相应地,此刻的训练模型便是所述分析模型。Correspondingly, the training model at this moment is the analysis model.
子步骤S402,将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。Sub-step S402, adding the model information to the distributed storage management subsystem, adding the threshold information to the relational database management subsystem, and adding the log information to the distributed file management sub-system system.
具体的说,关于上述所说的关系型数据库管理子系统,在实际应用中可以选用Mysql数据库;上述所说的分布式存储管理子系统,可以选用具有高可靠性、高性能、面向列、可伸缩的Hadoop Database(通常所说的HBase);上述所说的分布式文件管理子系统,可以选用Hadoop Distributed File System(通常所说的HDFS)。Specifically, regarding the above-mentioned relational database management subsystem, Mysql database can be selected in practical applications; the above-mentioned distributed storage management subsystem can be selected with high reliability, high performance, column-oriented, and Scalable Hadoop Database (usually referred to as HBase); for the distributed file management subsystem mentioned above, Hadoop Distributed File can be used System (commonly known as HDFS).
通过上述描述不难发现,在对日志信息进行分析处理之后,通过将得到的实时分析结果存储到不同的数据管理子系统,如将实时分析得出的各种模型存储到Hbase中,将实时分析得到的开关、阈值等数据量较小的控制数据存储到Mysql中,将完整的原始日志信息存储到HDFS中,使得后续对异常问题的定位,能够根据需要快速查找不同的数据管理子系统,从而加快处理速度。From the above description, it is not difficult to find that after the log information is analyzed and processed, the real-time analysis results obtained are stored in different data management subsystems, such as storing various models derived from real-time analysis in Hbase, and real-time analysis The obtained control data with a small amount of data such as switches and thresholds are stored in Mysql, and the complete original log information is stored in HDFS, so that the subsequent location of abnormal problems can be quickly searched for different data management subsystems as needed, thereby Speed up processing.
应当理解的是,以上仅为举例说明,对本申请的技术方案并不构成任何限定,在实际应用中,本领域的技术人员可以根据需要进行设置,此处不做限制。It should be understood that the above is only an example for illustration, and does not constitute any limitation to the technical solution of the present application. In practical applications, those skilled in the art can make settings as needed, and there is no limitation here.
本实施例中提供的系统服务的监控方法,通过预先构建待监控系统服务表,在待监控系统服务表中预先添加需要进行监控的待监控系统服务,从而在接收到系统服务访问请求,并从系统服务访问请求中提取出被访问的第一系统服务的标识号后,便可以直接根据标识号和预先构建的待监控系统服务表确定所述第一系统服务是否为待监控系统服务,在确定所述第一系统服务为待监控系统服务时,才做出响应,同时在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息。通过这种方式,实现了仅对需要监控的第一系统服务进行监控,从而保证了采集到的日志信息仅为需要监控的第一系统服务的日志信息,大大减少了后续需要进行分析的日志信息的数量,使得后续分析能够更加有针对性,且快速。The method for monitoring system services provided in this embodiment constructs a list of system services to be monitored in advance, and adds the system services to be monitored that need to be monitored in the list of system services to be monitored, so that when a system service access request is received, After the identification number of the accessed first system service is extracted from the system service access request, it can be directly determined whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored. The first system service responds only when the first system service is a system service to be monitored, and at the same time, the log information generated by the first system service is collected while the first system service is being accessed. In this way, it is realized that only the first system service that needs to be monitored is monitored, thereby ensuring that the collected log information is only the log information of the first system service that needs to be monitored, greatly reducing the log information that needs to be analyzed later The quantity makes subsequent analysis more targeted and fast.
此外,由于采集到的日志信息仅为需要进行监控的第一系统服务的日志信息,因而在日志信息的数量可控的前提下,在不增加开发成本的和难度的情况下,可以将分析获得的所有实时分析结果进行存储,从而实现了对第一系统服务的全部日志信息的存储,大大方便了后续研发人员对第一系统服务异常问题的定位。In addition, because the collected log information is only the log information of the first system service that needs to be monitored, under the premise that the amount of log information is controllable, the analysis can be obtained without increasing the development cost and difficulty. All real-time analysis results are stored, thereby realizing the storage of all log information of the first system service, which greatly facilitates the subsequent R&D personnel to locate the abnormal problem of the first system service.
进一步地,为了能够更加直观的监控系统服务,在实际应用中,还可以根据预设的展示风格,将所述实时分析结果进行展示,以供研发人员查看,比如以不同风格的图形,或者以不同维度的图表来进行展示。Further, in order to be able to monitor system services more intuitively, in practical applications, the real-time analysis results can also be displayed according to a preset display style for R&D personnel to view, such as graphics in different styles, or Charts of different dimensions are displayed.
参考图4,图4为本申请一种系统服务的监控方法第二实施例的流程示意图。Referring to FIG. 4, FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services according to this application.
基于上述第一实施例,本实施例系统服务的监控方法在所述子步骤S402之前,还包括:Based on the above-mentioned first embodiment, before the sub-step S402, the method for monitoring system services in this embodiment further includes:
子步骤S403,根据预设的处理规则,对所述日志信息进行预处理操作,得到去除干扰信息的日志信息;Sub-step S403, performing a preprocessing operation on the log information according to preset processing rules to obtain log information from which interference information is removed;
具体的说,在实际应用中,所述第一系统服务被访问的过程中生成的所述日志信息中往往会存在一些对后续分析异常,定位问题无用的信息,因而为了保证采集到的日志信息尽可能的有效,避免增加分析负担,影响分析结果,需要在执行采用大数据分析技术,对所述日志信息进行分析的步骤之前,先对采集到的所述日志信息进行一系列预处理操作。Specifically, in actual applications, the log information generated in the process of accessing the first system service often contains some information that is useless for subsequent analysis abnormalities and locating problems. Therefore, in order to ensure the collected log information To be as effective as possible to avoid increasing analysis burden and affecting analysis results, it is necessary to perform a series of preprocessing operations on the collected log information before performing the step of analyzing the log information using big data analysis technology.
比如说,在预设的处理规则为对所述日志信息中的数据进行数据清洗操作,则根据所述处理规则,对所述日志信息进行数据清洗操作之后,得到的去除干扰信息的日志信息便是去除了重复信息、纠正存在的错误的日志信息,这样就可以保证后续日志分析过程中,得到的分析结果更加准确。For example, if the preset processing rule is to perform a data cleaning operation on the data in the log information, the log information obtained after the data cleaning operation is performed on the log information according to the processing rule is to remove the interference information. It is the log information that removes duplicate information and corrects the existing errors, so that it can ensure that the analysis results obtained during the subsequent log analysis process are more accurate.
进一步地,在实际应用中,所述预处理操作还可以根据业务需要设置为对所述日志信息进行分组处理。Further, in practical applications, the preprocessing operation may also be set to group the log information according to business needs.
应当理解的是,以上仅为举例说明,对本申请的技术方案并不构成任何限定,在具体应用中,本领域的技术人员可以根据需要进行设置,本申请对此不做限制。It should be understood that the above are only examples and do not constitute any limitation to the technical solution of the present application. In specific applications, those skilled in the art can make settings as needed, and the present application does not limit this.
子步骤S404,将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列。Sub-step S404, adding the log information for removing interference information to a pre-built distributed publish-subscribe message queue.
具体的说,在本实施例中,上述所说的分布式发布订阅消息队列实质是通常所说的Kafka消息队列。Specifically, in this embodiment, the above-mentioned distributed publish-subscribe message queue is essentially a commonly-called Kafka message queue.
由于Kafka具有持久化、稳定性、高通吐量、支持服务器和消费集群来分区消息以及支持分布式系统并行数据加载的特性,因此选用Kafka消息队列来缓存所述去除干扰信息的日志信息,可以尽可能的避免大量日志信息堆积到日志分析节点,从而可以防止线程阻塞,保证了日志分析的处理速度。Because Kafka has the characteristics of persistence, stability, high-pass throughput, support for server and consumer clusters to partition messages, and support for parallel data loading of distributed systems, Kafka message queues are selected to cache the log information that removes interference information, which can It is possible to avoid a large amount of log information from accumulating on the log analysis node, thereby preventing thread blocking and ensuring the processing speed of log analysis.
此外,由Kafka是Apache软件基金会开发的一个开源流处理平台,关于它的使用方式已经较为成熟,本领域的技术人员在具体实现中,可以通过查找相关文档,自行实现,此处不再赘述。In addition, Kafka is an open source stream processing platform developed by the Apache Software Foundation, and its use is relatively mature. Those skilled in the art can find relevant documents and implement them by themselves in specific implementations. I will not repeat them here. .
相应地,原子步骤S401中所执行的操作,适应性的变为图4中子步骤S401'的操作:首次,从所述分布式发布订阅消息队列依次读取所述去除干扰信息的日志信息;然后,采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。Correspondingly, the operation performed in the atomic step S401 adaptively becomes the operation of the sub-step S401' in FIG. 4: for the first time, the log information for removing interference information is sequentially read from the distributed publish-subscribe message queue; Then, the big data analysis technology is used to analyze the log information of the interference removal information.
应当理解的是,以上给出的仅为一种具体的实现方式,对本申请的技术方案并不构成任何限定,在具体应用中,本领域的技术人员可以根据需要进行设置,比如在日志信息可控,数量较小,分析处理速度较快的情况下,在对采集到的日志信息进行预处理操作之后,可以不讲去除干扰信息的日志信息添加到Kafka消息队列,而是直接传输至分析节点进行日志分析。It should be understood that the above is only a specific implementation manner, and does not constitute any limitation to the technical solution of the present application. In specific applications, those skilled in the art can make settings as required, for example, in the log information In the case of small quantity and fast analysis and processing speed, after preprocessing the collected log information, the log information that removes interference information can be added to the Kafka message queue, but directly transmitted to the analysis node Perform log analysis.
通过上述描述不难发现,本实施例中提供的系统服务的监控方法,在采用大数据分析技术,对所述日志信息进行分析之前,通过根据预设的处理规则,对所述日志信息进行预处理操作,以获得去除干扰信息的日志信息,并将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列进行缓存,从而可以有效的避免大量日志信息同时堆积到日志分析的节点,解决了线程阻塞的问题,进而大大提升了处理速度。From the above description, it is not difficult to find that the monitoring method of the system service provided in this embodiment uses the big data analysis technology to analyze the log information by pre-processing the log information according to preset processing rules. Processing operations to obtain log information for removing interference information, and adding the log information for removing interference information to a pre-built distributed publish-and-subscribe message queue for caching, so as to effectively prevent a large amount of log information from being accumulated in log analysis at the same time The node solves the problem of thread blocking, which greatly improves the processing speed.
此外,本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质可以为非易失性可读存储介质。In addition, the embodiments of the present application also provide a computer-readable storage medium, and the computer-readable storage medium may be a non-volatile readable storage medium.
本申请计算机可读存储介质上存储有计算机可读指令,其中所述计算机可读指令被处理器执行时,实现如上述的系统服务的监控方法的步骤。The computer-readable storage medium of the present application stores computer-readable instructions, and when the computer-readable instructions are executed by a processor, the steps of the method for monitoring system services as described above are realized.
其中,该计算机可读指令被执行时所实现的方法可参照本申请系统服务的监控方法的各个实施例,此处不再赘述。For the method implemented when the computer-readable instruction is executed, reference may be made to the various embodiments of the monitoring method of the system service of this application, which will not be repeated here.
参照图5,图5为本申请系统服务的监控装置第一实施例的结构框图。Referring to Fig. 5, Fig. 5 is a structural block diagram of a first embodiment of a monitoring device serviced by the system of this application.
如图5所示,本申请实施例提出的系统服务的监控装置包括:As shown in Figure 5, the system service monitoring device proposed in the embodiment of the present application includes:
提取模块5001,用于接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;确定模块5002,用于根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;采集模块5003,用于在所述第一系统服务为所述待监控系统服务时,响应所述系统服务访问请求,并在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;分析模块5004,用于对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The extraction module 5001 is used to receive a system service access request and extract the identification number of the first system service to be accessed from the system service access request; the determination module 5002 is used to determine the identification number and the pre-built system to be monitored based on the identification number The service table determines whether the first system service is the service of the system to be monitored; the collection module 5003 is used to respond to the system service access request when the first system service is the service of the system to be monitored. The log information generated by the first system service is collected during the process when the first system service is accessed; the analysis module 5004 is configured to analyze the log information and store the real-time analysis result obtained in the corresponding data management system.
其中,上述系统服务的监控装置的各虚拟功能模块存储于图1所示系统服务的监控设备的存储器1005中,用于实现计算机可读指令的所有功能;各模块被处理器1001执行时,可完成系统服务的监控的全流程的功能。Among them, each virtual function module of the monitoring device of the above system service is stored in the memory 1005 of the monitoring device of the system service shown in FIG. 1, and is used to realize all the functions of computer-readable instructions; when each module is executed by the processor 1001, it can be Complete the entire process of monitoring system services.
进一步地,所述系统服务的监控装置还包括:Further, the monitoring device of the system service further includes:
待监控系统服务表构建模块,用于构建所述待监控系统服务表;The service table construction module of the system to be monitored is used to construct the service table of the system to be monitored;
其中,所述构建所述待监控系统服务表的步骤,包括:根据业务需求,基于Guice框架编译至少一个第二系统服务;根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控;若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务;获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。Wherein, the step of constructing the service table of the system to be monitored includes: compiling at least one second system service based on the Guice framework according to business requirements; determining the service according to the business requirements and the attributes of the second system service Whether the second system service needs to be monitored; if the second system service needs to be monitored, mark the second system service as a system service to be monitored; obtain the identification number of the system service to be monitored, and The identification number of the monitoring system service constructs the service table of the system to be monitored.
进一步地,在实际应用中,所述根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务的操作,可以如下所述:Further, in practical applications, the operation of determining whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored may be as follows:
对所述待监控系统服务表进行遍历,将所述标识号与遍历到的当前待监控系统服务的标识号进行对比;Traverse the service table of the system to be monitored, and compare the identification number with the traversed identification number of the service of the system to be monitored;
若所述标识号与遍历到的当前待监控系统服务的标识号匹配,则确定所述第一系统服务为所述待监控系统服务。If the identification number matches the traversed identification number of the current system service to be monitored, it is determined that the first system service is the system service to be monitored.
进一步地,在实际应用中,所述数据管理系统可以包括关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统;Further, in practical applications, the data management system may include a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
相应地,所述分析模块包括:Correspondingly, the analysis module includes:
大数据分析单元,用于采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息;The big data analysis unit is configured to use big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
信息添加单元,用于将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。An information adding unit, configured to add the model information to the distributed storage management subsystem, add the threshold information to the relational database management subsystem, and add the log information to the distributed file Management subsystem.
进一步地,所述系统服务的监控装置还包括:Further, the monitoring device of the system service further includes:
预处理模块,用于根据预设的处理规则,对所述日志信息进行预处理操作,得到去除干扰信息的日志信息;The preprocessing module is configured to perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information includes:
采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
进一步地,所述系统服务的监控装置还包括:Further, the monitoring device of the system service further includes:
日志信息添加模块,用于将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列;A log information adding module, configured to add the log information for removing interference information to a pre-built distributed publish-subscribe message queue;
相应地,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤,包括:Correspondingly, the step of using big data analysis technology to analyze the log information for removing interference information includes:
从所述分布式发布订阅消息队列依次读取所述去除干扰信息的日志信息;Sequentially reading the log information for removing interference information from the distributed publish-subscribe message queue;
采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
进一步地,所述系统服务的监控装置还包括:Further, the monitoring device of the system service further includes:
展示模块,用于根据预设的展示风格,将所述实时分析结果进行展示。The display module is used to display the real-time analysis result according to the preset display style.
其中,上述系统服务的监控装置中各个模块的功能实现与上述系统服务的监控方法实施例中各步骤相对应,其功能和实现过程在此处不再一一赘述。Among them, the function realization of each module in the monitoring device of the above system service corresponds to each step in the embodiment of the monitoring method of the above system service, and the function and realization process are not repeated here.
此外,需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。In addition, it should be noted that in this article, the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, article or system including a series of elements not only includes those Elements, but also include other elements that are not explicitly listed, or elements inherent to this process, method, article, or system. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, article or system that includes the element.
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the foregoing embodiments of the present application are only for description, and do not represent the advantages and disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述 实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通 过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的 技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体 现出来,该计算机软件产品存储在一个存储介质(如只读存储器(Read Only Memory,ROM)/RAM、磁碟、光 盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand the above The method of the embodiment can be implemented by means of software plus a necessary general hardware platform, of course, it can also be implemented by hardware, but the former is a better implementation in many cases. Based on this understanding, the application’s The essence of the technical solution or the part that contributes to the existing technology can be embodied in the form of a software product. The computer software product is stored in a storage medium (such as Read Only Memory). Memory, ROM)/RAM, disk, optical The disk) includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) execute the method described in each embodiment of the present application.
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。The above are only preferred embodiments of this application, and do not limit the scope of this application. Any equivalent structure or equivalent process transformation made using the content of the description and drawings of this application, or directly or indirectly used in other related technical fields , The same reason is included in the scope of patent protection of this application.

Claims (20)

  1. 一种系统服务的监控方法,其中,所述方法包括以下步骤: A method for monitoring system services, wherein the method includes the following steps:
    接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;Receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request;
    根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
    若所述第一系统服务为所述待监控系统服务,则响应所述系统服务访问请求,在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;If the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
    对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
  2. 如权利要求1所述的方法,其中,所述接收系统服务访问请求的步骤之前,所述方法还包括以下步骤:The method according to claim 1, wherein before the step of receiving a system service access request, the method further comprises the following steps:
    构建所述待监控系统服务表;Construct the service table of the system to be monitored;
    其中,所述构建所述待监控系统服务表的步骤,包括:Wherein, the step of constructing the service table of the system to be monitored includes:
    根据业务需求,基于Guice框架编译至少一个第二系统服务;Compile at least one second system service based on the Guice framework according to business requirements;
    根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控;Determine whether the second system service needs to be monitored according to the business requirements and the attributes of the second system service;
    若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务;If the second system service needs to be monitored, mark the second system service as a system service to be monitored;
    获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。The identification number of the system service to be monitored is acquired, and the system service table to be monitored is constructed according to the identification number of the system service to be monitored.
  3. 如权利要求2所述的方法,其中,所述根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务的步骤,包括:3. The method according to claim 2, wherein the step of determining whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored comprises:
    对所述待监控系统服务表进行遍历,将所述标识号与遍历到的当前待监控系统服务的标识号进行对比;Traverse the service table of the system to be monitored, and compare the identification number with the traversed identification number of the service of the system to be monitored;
    若所述标识号与遍历到的当前待监控系统服务的标识号匹配,则确定所述第一系统服务为所述待监控系统服务。If the identification number matches the traversed identification number of the current system service to be monitored, it is determined that the first system service is the system service to be monitored.
  4. 如权利要求1所述的方法,其中,所述数据管理系统包括关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统;3. The method of claim 1, wherein the data management system comprises a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
    所述对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统的步骤,包括:The step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system includes:
    采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息;Using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
    将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。The model information is added to the distributed storage management subsystem, the threshold information is added to the relational database management subsystem, and the log information is added to the distributed file management subsystem.
  5. 如权利要求4所述的方法,其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤之前,所述方法还包括以下步骤:The method according to claim 4, wherein, before the step of analyzing the log information by using big data analysis technology, the method further comprises the following steps:
    根据预设的处理规则,对所述日志信息进行预处理操作,得到去除干扰信息的日志信息;Perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
    其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information includes:
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  6. 如权利要求5所述的方法,其中,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤之前,所述方法还包括:The method according to claim 5, wherein, before the step of analyzing the log information from the interference information removal by using big data analysis technology, the method further comprises:
    将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列;Adding the log information for removing interference information to a pre-built distributed publish-subscribe message queue;
    其中,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information for removing interference information includes:
    从所述分布式发布订阅消息队列依次读取所述去除干扰信息的日志信息;Sequentially reading the log information for removing interference information from the distributed publish-subscribe message queue;
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  7. 如权利要求1至3任一项所述的方法,其中,所述对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统的步骤之后,所述方法还包括以下步骤:The method according to any one of claims 1 to 3, wherein after the step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system, the method further comprises the following steps :
    根据预设的展示风格,将所述实时分析结果进行展示。According to the preset display style, the real-time analysis result is displayed.
  8. 一种系统服务的监控装置,其中,所述装置包括:A monitoring device for system services, wherein the device includes:
    提取模块,用于接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;The extraction module is configured to receive a system service access request, and extract the identification number of the accessed first system service from the system service access request;
    确定模块,用于根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;A determining module, configured to determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
    采集模块,用于在所述第一系统服务为所述待监控系统服务时,响应所述系统服务访问请求,并在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;The collection module is configured to respond to the system service access request when the first system service serves the system to be monitored, and collect the first system service generation during the process of the first system service being accessed Log information;
    分析模块,用于对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The analysis module is used to analyze the log information and store the real-time analysis results obtained in the corresponding data management system.
  9. 如权利要求8所述的系统服务的监控装置,其中,所述系统服务的监控装置还包括:8. The monitoring device for system services according to claim 8, wherein the monitoring device for system services further comprises:
    待监控系统服务表构建模块,用于构建所述待监控系统服务表;The service table construction module of the system to be monitored is used to construct the service table of the system to be monitored;
    其中,所述构建所述待监控系统服务表的步骤,包括:Wherein, the step of constructing the service table of the system to be monitored includes:
    根据业务需求,基于Guice框架编译至少一个第二系统服务;Compile at least one second system service based on the Guice framework according to business requirements;
    根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控;Determine whether the second system service needs to be monitored according to the business requirements and the attributes of the second system service;
    若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务;If the second system service needs to be monitored, mark the second system service as a system service to be monitored;
    获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。The identification number of the system service to be monitored is acquired, and the system service table to be monitored is constructed according to the identification number of the system service to be monitored.
  10. 如权利要求8所述的系统服务的监控装置,其中,所述数据管理系统包括关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统;所述分析模块包括:8. The monitoring device for system services according to claim 8, wherein the data management system includes a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem; the analysis module includes:
    大数据分析单元,用于采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息;The big data analysis unit is configured to use big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
    信息添加单元,用于将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。An information adding unit, configured to add the model information to the distributed storage management subsystem, add the threshold information to the relational database management subsystem, and add the log information to the distributed file Management subsystem.
  11. 如权利要求10所述的系统服务的监控装置,其中,所述系统服务的监控装置还包括:10. The monitoring device for system services according to claim 10, wherein the monitoring device for system services further comprises:
    预处理模块,用于根据预设的处理规则,对所述日志信息进行预处理操作,得到去除干扰信息的日志信息;The preprocessing module is configured to perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
    其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information includes:
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  12. 如权利要求11所述的系统服务的监控装置,其中,所述系统服务的监控装置还包括:The monitoring device for system services according to claim 11, wherein the monitoring device for system services further comprises:
    日志信息添加模块,用于将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列;A log information adding module, configured to add the log information for removing interference information to a pre-built distributed publish-subscribe message queue;
    其中,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information for removing interference information includes:
    从所述分布式发布订阅消息队列依次读取所述去除干扰信息的日志信息;Sequentially reading the log information for removing interference information from the distributed publish-subscribe message queue;
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  13. 一种系统服务的监控设备,其中,所述设备包括:存储器、处理器及存储在所述存储器上并可被所述处理器执行的计算机可读指令,其中所述计算机可读指令被所述处理器执行时,实现如下步骤:A monitoring device for system services, wherein the device includes: a memory, a processor, and computer-readable instructions stored on the memory and executable by the processor, wherein the computer-readable instructions are When the processor executes, the following steps are implemented:
    接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;Receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request;
    根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
    若所述第一系统服务为所述待监控系统服务,则响应所述系统服务访问请求,在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;If the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
    对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
  14. 如权利要求13所述的系统服务的监控设备,其中,所述接收系统服务访问请求的步骤之前,所述方法还包括以下步骤:The monitoring device for system services according to claim 13, wherein, before the step of receiving the system service access request, the method further comprises the following steps:
    构建所述待监控系统服务表;Construct the service table of the system to be monitored;
    其中,所述构建所述待监控系统服务表的步骤,包括:Wherein, the step of constructing the service table of the system to be monitored includes:
    根据业务需求,基于Guice框架编译至少一个第二系统服务;Compile at least one second system service based on the Guice framework according to business requirements;
    根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控;Determine whether the second system service needs to be monitored according to the business requirements and the attributes of the second system service;
    若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务;If the second system service needs to be monitored, mark the second system service as a system service to be monitored;
    获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。The identification number of the system service to be monitored is acquired, and the system service table to be monitored is constructed according to the identification number of the system service to be monitored.
  15. 如权利要求13所述的系统服务的监控设备,其中,所述数据管理系统包括关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统;The monitoring device for system services according to claim 13, wherein the data management system includes a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
    所述对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统的步骤,包括:The step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system includes:
    采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息;Using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
    将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。The model information is added to the distributed storage management subsystem, the threshold information is added to the relational database management subsystem, and the log information is added to the distributed file management subsystem.
  16. 如权利要求15所述的系统服务的监控设备,其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤之前,所述方法还包括以下步骤:The monitoring device for system services according to claim 15, wherein, before the step of analyzing the log information by using big data analysis technology, the method further comprises the following steps:
    根据预设的处理规则,对所述日志信息进行预处理操作,得到去除干扰信息的日志信息;Perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
    其中,所述采用大数据分析技术,对所述日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information includes:
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  17. 如权利要求16所述的系统服务的监控设备,其中,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤之前,所述方法还包括:The monitoring device for system services according to claim 16, wherein, before the step of analyzing the log information of the interference removal information by using big data analysis technology, the method further comprises:
    将所述去除干扰信息的日志信息添加到预先构建的分布式发布订阅消息队列;Adding the log information for removing interference information to a pre-built distributed publish-subscribe message queue;
    其中,所述采用大数据分析技术,对所述去除干扰信息的日志信息进行分析的步骤,包括:Wherein, the step of using big data analysis technology to analyze the log information for removing interference information includes:
    从所述分布式发布订阅消息队列依次读取所述去除干扰信息的日志信息;Sequentially reading the log information for removing interference information from the distributed publish-subscribe message queue;
    采用大数据分析技术,对所述去除干扰信息的日志信息进行分析。The big data analysis technology is used to analyze the log information for removing interference information.
  18. 一种计算机可读存储介质,其中,所述计算机可读存储介质上存储有计算机可读指令,其中所述计算机可读指令被处理器执行时,实现如下步骤:A computer-readable storage medium, wherein computer-readable instructions are stored on the computer-readable storage medium, and when the computer-readable instructions are executed by a processor, the following steps are implemented:
    接收系统服务访问请求,从所述系统服务访问请求中提取被访问的第一系统服务的标识号;Receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request;
    根据所述标识号和预先构建的待监控系统服务表,确定所述第一系统服务是否为待监控系统服务;Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
    若所述第一系统服务为所述待监控系统服务,则响应所述系统服务访问请求,在所述第一系统服务被访问的过程中采集所述第一系统服务生成的日志信息;If the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
    对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统。The log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
  19. 如权利要求18所述的计算机可读存储介质,其中,所述接收系统服务访问请求的步骤之前,所述方法还包括以下步骤:18. The computer-readable storage medium of claim 18, wherein, before the step of receiving a system service access request, the method further comprises the following steps:
    构建所述待监控系统服务表;Construct the service table of the system to be monitored;
    其中,所述构建所述待监控系统服务表的步骤,包括:Wherein, the step of constructing the service table of the system to be monitored includes:
    根据业务需求,基于Guice框架编译至少一个第二系统服务;Compile at least one second system service based on the Guice framework according to business requirements;
    根据所述业务需求和所述第二系统服务的属性,确定所述第二系统服务是否需要进行监控;Determine whether the second system service needs to be monitored according to the business requirements and the attributes of the second system service;
    若所述第二系统服务需要进行监控,则将所述第二系统服务标记为待监控系统服务;If the second system service needs to be monitored, mark the second system service as a system service to be monitored;
    获取所述待监控系统服务的标识号,根据所述待监控系统服务的标识号构建所述待监控系统服务表。The identification number of the system service to be monitored is acquired, and the system service table to be monitored is constructed according to the identification number of the system service to be monitored.
  20. 如权利要求18所述的计算机可读存储介质,其中,所述数据管理系统包括关系型数据库管理子系统、分布式存储管理子系统和分布式文件管理子系统;18. The computer-readable storage medium of claim 18, wherein the data management system includes a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
    所述对所述日志信息进行分析,将得到的实时分析结果存储到对应的数据管理系统的步骤,包括:The step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system includes:
    采用大数据分析技术,对所述日志信息进行分析,得到所述日志信息对应的模型信息和用于对所述日志信息进行判断的阈值信息;Using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
    将所述模型信息添加到所述分布式存储管理子系统,将所述阈值信息添加到所述关系型数据库管理子系统,将所述日志信息添加到所述分布式文件管理子系统。 The model information is added to the distributed storage management subsystem, the threshold information is added to the relational database management subsystem, and the log information is added to the distributed file management subsystem. To
PCT/CN2019/122324 2019-05-21 2019-12-02 System service monitoring method, device, and apparatus, and storage medium WO2020233077A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910428277.7A CN110297738A (en) 2019-05-21 2019-05-21 Monitoring method, device, equipment and the storage medium of system service
CN201910428277.7 2019-05-21

Publications (1)

Publication Number Publication Date
WO2020233077A1 true WO2020233077A1 (en) 2020-11-26

Family

ID=68027122

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122324 WO2020233077A1 (en) 2019-05-21 2019-12-02 System service monitoring method, device, and apparatus, and storage medium

Country Status (2)

Country Link
CN (1) CN110297738A (en)
WO (1) WO2020233077A1 (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540906A (en) * 2020-12-24 2021-03-23 北京志翔能源技术有限公司 Probe-based intelligent analysis method and system for business and data relationship
CN112948378A (en) * 2021-02-04 2021-06-11 上海中通吉网络技术有限公司 Data processing method, device and equipment based on HBase
CN113157523A (en) * 2021-04-21 2021-07-23 平安付科技服务有限公司 Service monitoring method and device, computer equipment and storage medium
CN113485891A (en) * 2021-06-30 2021-10-08 中国民航信息网络股份有限公司 Service log monitoring method and device, storage medium and electronic equipment
CN113806127A (en) * 2021-09-12 2021-12-17 济南浪潮数据技术有限公司 Server log collection method and device and readable storage medium
CN114328083A (en) * 2021-11-30 2022-04-12 苏州浪潮智能科技有限公司 WDT monitoring method, device and medium
CN114760312A (en) * 2022-04-27 2022-07-15 泽拓科技(深圳)有限责任公司 Distributed task coordination method, device, equipment and medium
CN114760221A (en) * 2022-03-31 2022-07-15 深信服科技股份有限公司 Service monitoring method, system and storage medium
CN114900444A (en) * 2022-04-25 2022-08-12 北京奇艺世纪科技有限公司 Data monitoring method and device, electronic equipment and storage medium
CN115277133A (en) * 2022-07-13 2022-11-01 国家电网有限公司信息通信分公司 Equipment management method and device
CN115473833A (en) * 2022-09-14 2022-12-13 康键信息技术(深圳)有限公司 Client performance monitoring method, device and system and readable storage medium
CN115934480A (en) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 Task monitoring method, system and device and computer readable storage medium
CN116980474A (en) * 2023-07-31 2023-10-31 深圳市亲邻科技有限公司 Log data subscription management method of data pushing system
CN117591381A (en) * 2024-01-18 2024-02-23 南京研利科技有限公司 Data reporting method and device

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110297738A (en) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 Monitoring method, device, equipment and the storage medium of system service
CN110990213B (en) * 2019-10-22 2024-01-23 北京国电通网络技术有限公司 Method and device for monitoring user logs of cluster environment in real time
CN111209165B (en) * 2020-01-05 2021-03-16 光大兴陇信托有限责任公司 Two-stage monitoring processing method based on channel
CN111464390B (en) * 2020-03-31 2022-06-10 中国建设银行股份有限公司 Network application system monitoring and early warning method and system
CN113111261A (en) * 2021-04-20 2021-07-13 树根互联股份有限公司 Data processing method of cloud platform, cloud platform and panoramic analysis system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075555A1 (en) * 2011-08-02 2014-03-13 Apoorva Technologies, LTD System and method for protecting computer systems from malware attacks
CN105207806A (en) * 2015-08-20 2015-12-30 百度在线网络技术(北京)有限公司 Monitoring method and apparatus of distributed service
CN108512689A (en) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 Micro services business monitoring method and server
CN109284267A (en) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 Blog management method and terminal device based on abnormal monitoring
CN110297738A (en) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 Monitoring method, device, equipment and the storage medium of system service

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2880528A4 (en) * 2012-07-31 2016-04-06 Hewlett Packard Development Co Monitoring for managed services
CN103973749A (en) * 2013-02-05 2014-08-06 腾讯科技(深圳)有限公司 Cloud server and website processing method based on same
CN104915599A (en) * 2015-05-30 2015-09-16 广东欧珀移动通信有限公司 Application program monitoring method and terminal
CN105898554A (en) * 2015-12-18 2016-08-24 乐视云计算有限公司 Real-time transcoding monitoring method and real-time transcoding system
CN108268485B (en) * 2016-12-30 2021-04-30 亿阳安全技术有限公司 Log real-time analysis method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075555A1 (en) * 2011-08-02 2014-03-13 Apoorva Technologies, LTD System and method for protecting computer systems from malware attacks
CN105207806A (en) * 2015-08-20 2015-12-30 百度在线网络技术(北京)有限公司 Monitoring method and apparatus of distributed service
CN108512689A (en) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 Micro services business monitoring method and server
CN109284267A (en) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 Blog management method and terminal device based on abnormal monitoring
CN110297738A (en) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 Monitoring method, device, equipment and the storage medium of system service

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540906A (en) * 2020-12-24 2021-03-23 北京志翔能源技术有限公司 Probe-based intelligent analysis method and system for business and data relationship
CN112948378A (en) * 2021-02-04 2021-06-11 上海中通吉网络技术有限公司 Data processing method, device and equipment based on HBase
CN113157523A (en) * 2021-04-21 2021-07-23 平安付科技服务有限公司 Service monitoring method and device, computer equipment and storage medium
CN113485891A (en) * 2021-06-30 2021-10-08 中国民航信息网络股份有限公司 Service log monitoring method and device, storage medium and electronic equipment
CN113806127B (en) * 2021-09-12 2024-02-13 济南浪潮数据技术有限公司 Server log collection method, device and readable storage medium
CN113806127A (en) * 2021-09-12 2021-12-17 济南浪潮数据技术有限公司 Server log collection method and device and readable storage medium
CN114328083A (en) * 2021-11-30 2022-04-12 苏州浪潮智能科技有限公司 WDT monitoring method, device and medium
CN114328083B (en) * 2021-11-30 2023-11-14 苏州浪潮智能科技有限公司 WDT monitoring method, device and medium
CN114760221A (en) * 2022-03-31 2022-07-15 深信服科技股份有限公司 Service monitoring method, system and storage medium
CN114760221B (en) * 2022-03-31 2024-02-23 深信服科技股份有限公司 Service monitoring method, system and storage medium
CN114900444A (en) * 2022-04-25 2022-08-12 北京奇艺世纪科技有限公司 Data monitoring method and device, electronic equipment and storage medium
CN114760312A (en) * 2022-04-27 2022-07-15 泽拓科技(深圳)有限责任公司 Distributed task coordination method, device, equipment and medium
CN115277133A (en) * 2022-07-13 2022-11-01 国家电网有限公司信息通信分公司 Equipment management method and device
CN115277133B (en) * 2022-07-13 2024-03-15 国家电网有限公司信息通信分公司 Equipment management method and device
CN115473833A (en) * 2022-09-14 2022-12-13 康键信息技术(深圳)有限公司 Client performance monitoring method, device and system and readable storage medium
CN115934480B (en) * 2023-03-15 2023-06-16 浪潮电子信息产业股份有限公司 Task monitoring method, system, device and computer readable storage medium
CN115934480A (en) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 Task monitoring method, system and device and computer readable storage medium
CN116980474A (en) * 2023-07-31 2023-10-31 深圳市亲邻科技有限公司 Log data subscription management method of data pushing system
CN116980474B (en) * 2023-07-31 2024-04-02 深圳市亲邻科技有限公司 Log data subscription management method of data pushing system
CN117591381A (en) * 2024-01-18 2024-02-23 南京研利科技有限公司 Data reporting method and device
CN117591381B (en) * 2024-01-18 2024-04-09 南京研利科技有限公司 Data reporting method and device

Also Published As

Publication number Publication date
CN110297738A (en) 2019-10-01

Similar Documents

Publication Publication Date Title
WO2020233077A1 (en) System service monitoring method, device, and apparatus, and storage medium
WO2020015067A1 (en) Data acquisition method, device, equipment and storage medium
WO2020253034A1 (en) Client buried point test method, apparatus and device, and storage medium
WO2020253135A1 (en) Automated analysis method and device, user equipment, and storage medium
WO2020215681A1 (en) Indication information generation method and apparatus, terminal, and storage medium
WO2020015064A1 (en) System fault processing method, apparatus, device and storage medium
WO2020147396A1 (en) Method for dynamically configuring service domain name, device, apparatus, and storage medium
WO2013081282A1 (en) System and method for recommending application by using keyword
WO2020186773A1 (en) Call request monitoring method, device, apparatus, and storage medium
WO2015178600A1 (en) Speech recognition method and apparatus using device information
WO2020119115A1 (en) Data verification method, device, apparatus, and storage medium
WO2020253112A1 (en) Test strategy acquisition method, device, terminal, and readable storage medium
WO2020147385A1 (en) Data entry method and apparatus, terminal and computer-readable storage medium
WO2020087981A1 (en) Method and apparatus for generating risk control audit model, device and readable storage medium
WO2014003505A1 (en) System and method for configuring device sociality
WO2020077832A1 (en) Cloud desktop access method, apparatus and device, and storage medium
WO2020073494A1 (en) Webpage backdoor detecting method, device, storage medium and apparatus
WO2020119369A1 (en) Intelligent it operation and maintenance fault positioning method, apparatus and device, and readable storage medium
WO2020233057A1 (en) File packaging method, apparatus and device, and storage medium
WO2021072881A1 (en) Object storage-based request processing method, apparatus and device, and storage medium
WO2020253125A1 (en) Log management method, apparatus, and device, and storage medium
WO2020233073A1 (en) Blockchain environment test method, device and apparatus, and storage medium
WO2020233060A1 (en) Event notification method and apparatus, event notification server, and storage medium
WO2021012481A1 (en) System performance monitoring method and apparatus, device, and storage medium
WO2014029111A1 (en) Processing system and method for user behaviour

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929944

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 04/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19929944

Country of ref document: EP

Kind code of ref document: A1