WO2020233077A1 - Procédé, dispositif et appareil de surveillance de service de système et support d'informations - Google Patents

Procédé, dispositif et appareil de surveillance de service de système et support d'informations Download PDF

Info

Publication number
WO2020233077A1
WO2020233077A1 PCT/CN2019/122324 CN2019122324W WO2020233077A1 WO 2020233077 A1 WO2020233077 A1 WO 2020233077A1 CN 2019122324 W CN2019122324 W CN 2019122324W WO 2020233077 A1 WO2020233077 A1 WO 2020233077A1
Authority
WO
WIPO (PCT)
Prior art keywords
system service
monitored
log information
information
service
Prior art date
Application number
PCT/CN2019/122324
Other languages
English (en)
Chinese (zh)
Inventor
韩亚洲
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020233077A1 publication Critical patent/WO2020233077A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Definitions

  • This application relates to the technical field of software monitoring, and in particular to a monitoring method, device, equipment, and storage medium for system services.
  • the monitoring program for network applications when calling system services is usually based on Spring (an open source design-level framework), supplemented by Pinpoint (a java application performance management tool) and Dubbo (an open source distribution) Service framework).
  • this monitoring solution can collect the log information generated by the system service when the network application accesses the corresponding system service, so that R&D personnel can locate the abnormality based on the collected log information when the network application is abnormal. Deal with abnormal problems.
  • the monitoring solution based on the Spring framework cannot display all the log information, which results in the subsequent failure to accurately locate the abnormality, and because the Spring framework is large, it will take up more resources and cause the operation to be not smooth; while the Pinpoint framework is based on bytes
  • the code injection method analyzes the performance of the system, which requires the operator to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the realization; and the Dubbo framework cannot be used directly, so the realization process needs to be carried out on the basis of open source It can be used after modification and customization, so the access cost is relatively high.
  • the main purpose of this application is to provide a monitoring method, device, equipment and storage medium for system services, aiming to solve the problem that the monitoring of system services in the prior art cannot support the storage of all log information, the difficulty of development, and the slow speed of data analysis Technical issues.
  • this application provides a method for monitoring system services.
  • the method includes the following steps:
  • the first system service is the system service to be monitored, responding to the system service access request, collecting log information generated by the first system service during the process in which the first system service is accessed;
  • the log information is analyzed, and the real-time analysis result obtained is stored in the corresponding data management system.
  • this application also proposes a system service monitoring device, which includes:
  • the extraction module is configured to receive a system service access request, and extract the identification number of the accessed first system service from the system service access request;
  • a determining module configured to determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored;
  • the collection module is configured to respond to the system service access request when the first system service serves the system to be monitored, and collect the first system service generation during the process of the first system service being accessed Log information;
  • the analysis module is used to analyze the log information and store the real-time analysis results obtained in the corresponding data management system.
  • this application also proposes a monitoring device for system services, the device including: a memory, a processor, and computer-readable instructions stored on the memory and executable by the processor, wherein When the computer-readable instructions are executed by the processor, the steps of the method for monitoring system services are as described above.
  • this application also proposes a computer-readable storage medium with computer-readable instructions stored on the computer-readable storage medium.
  • the computer-readable instructions are executed by a processor, the implementation is as described above. The steps of the monitoring method of the system service.
  • FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the present application;
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for monitoring system services in this application;
  • step S40 is a schematic diagram of a specific implementation process of step S40 in the first embodiment of the method for monitoring system services of this application;
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services in this application.
  • Figure 5 is a structural block diagram of a first embodiment of a monitoring device for system services in this application.
  • FIG. 1 is a schematic structural diagram of a monitoring device for a system service of a hardware operating environment involved in a solution of an embodiment of the application.
  • the monitoring equipment of the system service may include a processor 1001, such as a central processing unit (Central Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display) and an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a wireless fidelity (WIreless-FIdelity, WI-FI) interface).
  • WIreless-FIdelity WI-FI
  • the memory 1005 may be a high-speed random access memory (Random Access Memory, RAM) memory, can also be a stable non-volatile memory (Non-Volatile Memory, NVM), such as disk storage.
  • RAM Random Access Memory
  • NVM Non-Volatile Memory
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • FIG. 1 does not constitute a limitation on the monitoring equipment of the system service, and may include more or less components than shown in the figure, or a combination of certain components, or a different component arrangement .
  • a memory 1005 as a computer-readable storage medium may include an operating system, a network communication module, a user interface module, and computer-readable instructions.
  • the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with users; the processor 1001 in the monitoring device of the system service of this application
  • the memory 1005 may be set in a monitoring device of a system service.
  • the monitoring device of the system service uses the processor 1001 to call computer-readable instructions stored in the memory 1005 and execute the method for monitoring the system service provided in the embodiment of the present application.
  • FIG. 2 is a schematic flowchart of a first embodiment of a method for monitoring system services of this application.
  • the monitoring method of the system service includes the following steps:
  • Step S10 receiving a system service access request, and extracting the identification number of the accessed first system service from the system service access request.
  • the execution subject of this embodiment is a server on which the computer-readable instructions are deployed.
  • the server on which the computer-readable instructions are deployed can be a traditional physical server, that is, a server that occupies actual physical space, or a virtual cloud server.
  • the specific selection method is based on the technology in the field. Personnel can set according to their needs, there is no restriction here.
  • the received system service access request can be sent by any communication device, such as smart terminal devices for users, such as mobile phones, tablets, wearable devices, etc., or personal computers, servers and other devices. I will not list them one by one, and there will be no restrictions on this.
  • identification number used to identify the first system service is specifically a unique identification number assigned to the developer when compiling the first system service.
  • the service code, the specific format can be set by those skilled in the art as needed, and there is no limitation here.
  • step S20 in order to ensure the smooth progress of the subsequent step S20 operation, before performing the above step S10, it is necessary to construct the service table of the system to be monitored that needs to be used in step S20.
  • the specific It is based on the Guice framework, not the Spring framework, Pinpoint framework and Dubbo framework.
  • the so-called Guice framework is a code compilation framework with generic and annotation features, small structure and fast. Therefore, the second system service compiled based on the Guice framework not only has a small amount of code, takes up less server resources, and has clear annotation information, which can greatly facilitate the reading of the staff during the monitoring of the entire system service, thereby reducing the follow-up The difficulty of maintenance.
  • the Spring framework due to its own code structure is large, so it will take up more resources, resulting in not smooth running, affecting the monitoring of system services; Pinpoint framework is based on bytecode injection method to analyze system performance, Therefore, in the implementation process, the operator needs to have high professional knowledge, and the operation is relatively complicated, which is not conducive to the implementation; the Dubbo framework cannot be used directly, so it needs to be modified and customized on the basis of open source during the implementation process. It can be used, so the access cost is relatively high.
  • the Guice framework is used instead of the Spring framework, Pinpoint framework, and Dubbo framework, which not only simplifies the process, reduces the compilation difficulty, and more importantly,
  • the usage and working methods of the compiled second system service are completely different from those of the existing system service. It is based on this difference that the monitoring process of the entire system service greatly facilitates the reading of the staff and reduces The difficulty of subsequent maintenance.
  • the second system service that needs to be monitored by the system service needs to include the system service for monitoring the new function.
  • the system architecture of any second system service obtained by compiling is based on the lightweight Guice framework, that is, the log information generated in the process of accessing the second system service is clear and clear Comment information.
  • the second system service meets the business requirements specified by the technical personnel, that is, a specified function or business.
  • step (2) the operation of determining the system service to be monitored according to the business requirements and the attributes of the second system service mentioned in the above step (2) can be roughly as follows:
  • the second system service is marked as a system service to be monitored.
  • the five second system services A, B, C, D, and E are involved.
  • the second system service A, the second system service B, and the second system service The second system service D needs to be monitored during the access process, and the second system service C and the second system service E are not needed, then the determined system services to be monitored are the second system service A, the second system service B, and the second system Service D.
  • the identification number of the second system service A is A100
  • the identification number of the second system service B is B100
  • the identification number of the second system service D is D100
  • the system service to be monitored is being constructed
  • a note document or note table is created, and the identification numbers A100, B100, and D100 are sequentially entered into the created note document or note table to obtain the service table of the system to be monitored.
  • the “first” in the “first system service” mentioned above is only used to distinguish the system service from other system services, and does not limit the system service itself, and the first system The service may be any one of the at least one second system service compiled based on the Guice framework.
  • the "second” in the “second system service” is only used to distinguish the system service from other system services, and does not limit the system service itself, and is based on at least one pre-compiled first system service based on the Guice framework.
  • at least one second system service is the first system service.
  • Step S20 Determine whether the first system service is a system service to be monitored according to the identification number and a pre-built system service table to be monitored.
  • step S20 a specific implementation manner is given below, which is roughly as follows:
  • the service table of the system to be monitored is traversed, that is, the identification numbers of the service of the system to be monitored are read in order from the service table of the system to be monitored.
  • the identification number is compared with the traversed identification number of the current system service to be monitored.
  • the step is entered S30: If, by comparison, it is determined that the identification number of the first system service does not match the identification number of any of the traversed system services to be monitored, only respond to the system access request, and there is no need to Collecting log information generated by the first system service during the process of accessing the system service.
  • Step S30 if the first system service is the system service to be monitored, respond to the system service access request, and collect log information generated by the first system service during the process in which the first system service is accessed .
  • the log information collected in this embodiment mainly includes traceId, spanId, and annotation.
  • the traceId is used to identify a certain system service.
  • the corresponding specific system access request ID here refers to the identification number that carries the first system service The ID of the system access request.
  • the traceId is used in a remote procedure call (Remote Procedure Call, RPC) interface is generated when the first layer of the network is called, and the traceId is globally unique, and will be continuously passed back with the RPC calls of each layer, so that the first system service is collected by collecting
  • RPC Remote Procedure Call
  • the traceId generated during the access process can connect the path called by a user request in the system in series, so as to know what operations have been performed in this request, and then facilitate the location of subsequent abnormal problems.
  • spanId is used to identify the position of an RPC call in a distributed request.
  • the initial value of spanId can be 0.
  • the spanId is 0.1
  • continue to enter When the next layer of RPC calls C, spanId is 0.1.1; and when the RPC at the same layer as B calls E, spanId can be 0.2.
  • the spanId can be used to locate the position of a certain RPC request in the system call and who its upstream and downstream dependencies are.
  • the embedded point data can be data that is of business interest and wants to be uploaded to the backend, such as a user requesting once Identity Information.
  • the traceId and spanId in the above log information are automatically obtained when the system service access request is triggered after the development of the Guice framework.
  • Annotation is to embed the point in the code corresponding to the system service through preview, so that after the system service access request is triggered, in the process of accessing the system service, when the accessed system service executes the code that sets the embedment point, RPC will be called automatically, and the buried point data will be sent to the next link through RPC.
  • the implementation principle of the embedding point is very simple. Specifically, when the user operates the network application or interface initialization, the software development kit of the third-party data analysis service provider (Software Development Kit, SDK), and then call the corresponding data sending interface in the SDK to send data when an event occurs. For example, if we want to count the number of clicks on a certain button in a web application, when the button is clicked, we can click the corresponding button
  • the OnClick function calls the data sending interface provided by the SDK to send data.
  • Step S40 Analyze the log information, and store the obtained real-time analysis result in the corresponding data management system.
  • the data management system can be roughly divided into the following three subsystems: a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem.
  • the step of analyzing the log information and storing the obtained real-time analysis result in the corresponding data management system can be detailed into two sub-steps shown in FIG. 3, which are specifically as follows:
  • Sub-step S401 using big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information.
  • a big data analysis technology and machine learning algorithm can be used to construct an analysis model in advance.
  • the training model is trained until a certain log information is input, and the model information corresponding to the log information and the threshold information position for judging the log information can be obtained.
  • the training of the training model can be completed.
  • the training model at this moment is the analysis model.
  • Sub-step S402 adding the model information to the distributed storage management subsystem, adding the threshold information to the relational database management subsystem, and adding the log information to the distributed file management sub-system system.
  • Mysql database can be selected in practical applications; the above-mentioned distributed storage management subsystem can be selected with high reliability, high performance, column-oriented, and Scalable Hadoop Database (usually referred to as HBase); for the distributed file management subsystem mentioned above, Hadoop Distributed File can be used System (commonly known as HDFS).
  • HBase high reliability, high performance, column-oriented, and Scalable Hadoop Database
  • HDFS Hadoop Distributed File can be used System
  • the real-time analysis results obtained are stored in different data management subsystems, such as storing various models derived from real-time analysis in Hbase, and real-time analysis
  • the obtained control data with a small amount of data such as switches and thresholds are stored in Mysql, and the complete original log information is stored in HDFS, so that the subsequent location of abnormal problems can be quickly searched for different data management subsystems as needed, thereby Speed up processing.
  • the method for monitoring system services constructs a list of system services to be monitored in advance, and adds the system services to be monitored that need to be monitored in the list of system services to be monitored, so that when a system service access request is received, After the identification number of the accessed first system service is extracted from the system service access request, it can be directly determined whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored.
  • the first system service responds only when the first system service is a system service to be monitored, and at the same time, the log information generated by the first system service is collected while the first system service is being accessed.
  • the analysis can be obtained without increasing the development cost and difficulty. All real-time analysis results are stored, thereby realizing the storage of all log information of the first system service, which greatly facilitates the subsequent R&D personnel to locate the abnormal problem of the first system service.
  • the real-time analysis results can also be displayed according to a preset display style for R&D personnel to view, such as graphics in different styles, or Charts of different dimensions are displayed.
  • FIG. 4 is a schematic flowchart of a second embodiment of a method for monitoring system services according to this application.
  • the method for monitoring system services in this embodiment further includes:
  • Sub-step S403 performing a preprocessing operation on the log information according to preset processing rules to obtain log information from which interference information is removed;
  • the log information generated in the process of accessing the first system service often contains some information that is useless for subsequent analysis abnormalities and locating problems. Therefore, in order to ensure the collected log information To be as effective as possible to avoid increasing analysis burden and affecting analysis results, it is necessary to perform a series of preprocessing operations on the collected log information before performing the step of analyzing the log information using big data analysis technology.
  • the log information obtained after the data cleaning operation is performed on the log information according to the processing rule is to remove the interference information. It is the log information that removes duplicate information and corrects the existing errors, so that it can ensure that the analysis results obtained during the subsequent log analysis process are more accurate.
  • the preprocessing operation may also be set to group the log information according to business needs.
  • Sub-step S404 adding the log information for removing interference information to a pre-built distributed publish-subscribe message queue.
  • the above-mentioned distributed publish-subscribe message queue is essentially a commonly-called Kafka message queue.
  • Kafka has the characteristics of persistence, stability, high-pass throughput, support for server and consumer clusters to partition messages, and support for parallel data loading of distributed systems
  • Kafka message queues are selected to cache the log information that removes interference information, which can It is possible to avoid a large amount of log information from accumulating on the log analysis node, thereby preventing thread blocking and ensuring the processing speed of log analysis.
  • Kafka is an open source stream processing platform developed by the Apache Software Foundation, and its use is relatively mature. Those skilled in the art can find relevant documents and implement them by themselves in specific implementations. I will not repeat them here. .
  • the operation performed in the atomic step S401 adaptively becomes the operation of the sub-step S401' in FIG. 4: for the first time, the log information for removing interference information is sequentially read from the distributed publish-subscribe message queue; Then, the big data analysis technology is used to analyze the log information of the interference removal information.
  • the monitoring method of the system service uses the big data analysis technology to analyze the log information by pre-processing the log information according to preset processing rules. Processing operations to obtain log information for removing interference information, and adding the log information for removing interference information to a pre-built distributed publish-and-subscribe message queue for caching, so as to effectively prevent a large amount of log information from being accumulated in log analysis at the same time
  • the node solves the problem of thread blocking, which greatly improves the processing speed.
  • the embodiments of the present application also provide a computer-readable storage medium, and the computer-readable storage medium may be a non-volatile readable storage medium.
  • the computer-readable storage medium of the present application stores computer-readable instructions, and when the computer-readable instructions are executed by a processor, the steps of the method for monitoring system services as described above are realized.
  • FIG. 5 is a structural block diagram of a first embodiment of a monitoring device serviced by the system of this application.
  • the system service monitoring device proposed in the embodiment of the present application includes:
  • the extraction module 5001 is used to receive a system service access request and extract the identification number of the first system service to be accessed from the system service access request; the determination module 5002 is used to determine the identification number and the pre-built system to be monitored based on the identification number
  • the service table determines whether the first system service is the service of the system to be monitored; the collection module 5003 is used to respond to the system service access request when the first system service is the service of the system to be monitored.
  • the log information generated by the first system service is collected during the process when the first system service is accessed; the analysis module 5004 is configured to analyze the log information and store the real-time analysis result obtained in the corresponding data management system.
  • each virtual function module of the monitoring device of the above system service is stored in the memory 1005 of the monitoring device of the system service shown in FIG. 1, and is used to realize all the functions of computer-readable instructions; when each module is executed by the processor 1001, it can be Complete the entire process of monitoring system services.
  • the monitoring device of the system service further includes:
  • the service table construction module of the system to be monitored is used to construct the service table of the system to be monitored;
  • the step of constructing the service table of the system to be monitored includes: compiling at least one second system service based on the Guice framework according to business requirements; determining the service according to the business requirements and the attributes of the second system service Whether the second system service needs to be monitored; if the second system service needs to be monitored, mark the second system service as a system service to be monitored; obtain the identification number of the system service to be monitored, and The identification number of the monitoring system service constructs the service table of the system to be monitored.
  • the operation of determining whether the first system service is the system service to be monitored based on the identification number and the pre-built system service table to be monitored may be as follows:
  • the identification number matches the traversed identification number of the current system service to be monitored, it is determined that the first system service is the system service to be monitored.
  • the data management system may include a relational database management subsystem, a distributed storage management subsystem, and a distributed file management subsystem;
  • the analysis module includes:
  • the big data analysis unit is configured to use big data analysis technology to analyze the log information to obtain model information corresponding to the log information and threshold information for judging the log information;
  • An information adding unit configured to add the model information to the distributed storage management subsystem, add the threshold information to the relational database management subsystem, and add the log information to the distributed file Management subsystem.
  • the monitoring device of the system service further includes:
  • the preprocessing module is configured to perform preprocessing operations on the log information according to preset processing rules to obtain log information that removes interference information;
  • the step of using big data analysis technology to analyze the log information includes:
  • the big data analysis technology is used to analyze the log information for removing interference information.
  • the monitoring device of the system service further includes:
  • a log information adding module configured to add the log information for removing interference information to a pre-built distributed publish-subscribe message queue
  • the step of using big data analysis technology to analyze the log information for removing interference information includes:
  • the big data analysis technology is used to analyze the log information for removing interference information.
  • the monitoring device of the system service further includes:
  • the display module is used to display the real-time analysis result according to the preset display style.
  • each module in the monitoring device of the above system service corresponds to each step in the embodiment of the monitoring method of the above system service, and the function and realization process are not repeated here.
  • the method of the embodiment can be implemented by means of software plus a necessary general hardware platform, of course, it can also be implemented by hardware, but the former is a better implementation in many cases.
  • the application s The essence of the technical solution or the part that contributes to the existing technology can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium (such as Read Only Memory). Memory, ROM)/RAM, disk, optical
  • the disk includes several instructions to make a terminal device (which can be a mobile phone, a computer, a server, or a network device, etc.) execute the method described in each embodiment of the present application.

Abstract

L'invention concerne un procédé, un dispositif et un appareil de surveillance de service de système, ainsi qu'un support d'informations. Le procédé consiste : à recevoir une demande d'accès à un service de système et à extraire, de la demande d'accès à un service de système, un numéro d'identification d'un premier service de système qui est accessible (S10) ; à déterminer si le premier service de système est, ou non, un service de système à surveiller en fonction du numéro d'identification et d'une table préétablie de services de système à surveiller (S20) ; si tel est le cas, en réponse à la demande d'accès à un service de système, à collecter des informations de journal générées par le premier service de système lorsque le premier service de système est accessible (S30) ; et à analyser les informations de journal et à stocker un résultat d'analyse en temps réel acquis dans un système de gestion de données correspondant (S40). Le procédé résout les problèmes techniques selon lesquels une surveillance de service de système ne peut pas prendre en charge le stockage complet d'informations de journal, la difficulté de développement est élevée, et la vitesse d'analyse de données est lente.
PCT/CN2019/122324 2019-05-21 2019-12-02 Procédé, dispositif et appareil de surveillance de service de système et support d'informations WO2020233077A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910428277.7A CN110297738A (zh) 2019-05-21 2019-05-21 系统服务的监控方法、装置、设备及存储介质
CN201910428277.7 2019-05-21

Publications (1)

Publication Number Publication Date
WO2020233077A1 true WO2020233077A1 (fr) 2020-11-26

Family

ID=68027122

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122324 WO2020233077A1 (fr) 2019-05-21 2019-12-02 Procédé, dispositif et appareil de surveillance de service de système et support d'informations

Country Status (2)

Country Link
CN (1) CN110297738A (fr)
WO (1) WO2020233077A1 (fr)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540906A (zh) * 2020-12-24 2021-03-23 北京志翔能源技术有限公司 基于探针的业务与数据关系智能解析方法及系统
CN112948378A (zh) * 2021-02-04 2021-06-11 上海中通吉网络技术有限公司 基于HBase的数据处理方法、装置和设备
CN113157523A (zh) * 2021-04-21 2021-07-23 平安付科技服务有限公司 服务监控方法、装置、计算机设备及存储介质
CN113485891A (zh) * 2021-06-30 2021-10-08 中国民航信息网络股份有限公司 业务日志监控方法、装置、存储介质及电子设备
CN113806127A (zh) * 2021-09-12 2021-12-17 济南浪潮数据技术有限公司 一种服务器日志收集方法、设备及可读存储介质
CN114328083A (zh) * 2021-11-30 2022-04-12 苏州浪潮智能科技有限公司 一种wdt监控方法、装置及介质
CN114760312A (zh) * 2022-04-27 2022-07-15 泽拓科技(深圳)有限责任公司 分布式任务协调方法、装置、设备和介质
CN114760221A (zh) * 2022-03-31 2022-07-15 深信服科技股份有限公司 一种业务监控方法、系统和存储介质
CN114900444A (zh) * 2022-04-25 2022-08-12 北京奇艺世纪科技有限公司 数据监控方法、装置、电子设备及存储介质
CN115277133A (zh) * 2022-07-13 2022-11-01 国家电网有限公司信息通信分公司 设备管理方法及装置
CN115426281A (zh) * 2022-07-22 2022-12-02 中银金融科技有限公司 应用状态监控方法、装置、电子设备和存储介质
CN115473833A (zh) * 2022-09-14 2022-12-13 康键信息技术(深圳)有限公司 一种客户端性能监控方法、装置、系统和可读存储介质
CN115934480A (zh) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 一种任务监控方法、系统、装置及计算机可读存储介质
CN116980474A (zh) * 2023-07-31 2023-10-31 深圳市亲邻科技有限公司 一种数据推送系统的日志数据订阅管理方法
CN117591381A (zh) * 2024-01-18 2024-02-23 南京研利科技有限公司 数据上报方法及装置
CN112540906B (zh) * 2020-12-24 2024-04-26 北京志翔信息技术有限公司 基于探针的业务与数据关系智能解析方法及系统

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110297738A (zh) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 系统服务的监控方法、装置、设备及存储介质
CN110990213B (zh) * 2019-10-22 2024-01-23 北京国电通网络技术有限公司 一种集群环境用户日志实时监控方法及装置
CN111209165B (zh) * 2020-01-05 2021-03-16 光大兴陇信托有限责任公司 一种基于通道的两级监控处理方法
CN111464390B (zh) * 2020-03-31 2022-06-10 中国建设银行股份有限公司 网络应用系统监控预警方法及系统
CN113111261A (zh) * 2021-04-20 2021-07-13 树根互联股份有限公司 一种云平台的数据处理方法、云平台及全景分析系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075555A1 (en) * 2011-08-02 2014-03-13 Apoorva Technologies, LTD System and method for protecting computer systems from malware attacks
CN105207806A (zh) * 2015-08-20 2015-12-30 百度在线网络技术(北京)有限公司 分布式服务的监控方法及装置
CN108512689A (zh) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 微服务业务监控方法及服务器
CN109284267A (zh) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 基于异常监控的日志管理方法及终端设备
CN110297738A (zh) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 系统服务的监控方法、装置、设备及存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014020612A1 (fr) * 2012-07-31 2014-02-06 Hewlett-Packard Development Company, L.P. Suivi pour des services gérés
CN103973749A (zh) * 2013-02-05 2014-08-06 腾讯科技(深圳)有限公司 基于云服务器的网站处理方法及云服务器
CN104915599A (zh) * 2015-05-30 2015-09-16 广东欧珀移动通信有限公司 一种应用程序监控方法及终端
CN105898554A (zh) * 2015-12-18 2016-08-24 乐视云计算有限公司 实时转码的监控方法和实时转码系统
CN108268485B (zh) * 2016-12-30 2021-04-30 亿阳安全技术有限公司 一种日志实时分析方法及系统

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140075555A1 (en) * 2011-08-02 2014-03-13 Apoorva Technologies, LTD System and method for protecting computer systems from malware attacks
CN105207806A (zh) * 2015-08-20 2015-12-30 百度在线网络技术(北京)有限公司 分布式服务的监控方法及装置
CN108512689A (zh) * 2017-12-15 2018-09-07 中国平安财产保险股份有限公司 微服务业务监控方法及服务器
CN109284267A (zh) * 2018-09-26 2019-01-29 深圳壹账通智能科技有限公司 基于异常监控的日志管理方法及终端设备
CN110297738A (zh) * 2019-05-21 2019-10-01 深圳壹账通智能科技有限公司 系统服务的监控方法、装置、设备及存储介质

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540906A (zh) * 2020-12-24 2021-03-23 北京志翔能源技术有限公司 基于探针的业务与数据关系智能解析方法及系统
CN112540906B (zh) * 2020-12-24 2024-04-26 北京志翔信息技术有限公司 基于探针的业务与数据关系智能解析方法及系统
CN112948378A (zh) * 2021-02-04 2021-06-11 上海中通吉网络技术有限公司 基于HBase的数据处理方法、装置和设备
CN113157523A (zh) * 2021-04-21 2021-07-23 平安付科技服务有限公司 服务监控方法、装置、计算机设备及存储介质
CN113485891A (zh) * 2021-06-30 2021-10-08 中国民航信息网络股份有限公司 业务日志监控方法、装置、存储介质及电子设备
CN113806127A (zh) * 2021-09-12 2021-12-17 济南浪潮数据技术有限公司 一种服务器日志收集方法、设备及可读存储介质
CN113806127B (zh) * 2021-09-12 2024-02-13 济南浪潮数据技术有限公司 一种服务器日志收集方法、设备及可读存储介质
CN114328083B (zh) * 2021-11-30 2023-11-14 苏州浪潮智能科技有限公司 一种wdt监控方法、装置及介质
CN114328083A (zh) * 2021-11-30 2022-04-12 苏州浪潮智能科技有限公司 一种wdt监控方法、装置及介质
CN114760221B (zh) * 2022-03-31 2024-02-23 深信服科技股份有限公司 一种业务监控方法、系统和存储介质
CN114760221A (zh) * 2022-03-31 2022-07-15 深信服科技股份有限公司 一种业务监控方法、系统和存储介质
CN114900444A (zh) * 2022-04-25 2022-08-12 北京奇艺世纪科技有限公司 数据监控方法、装置、电子设备及存储介质
CN114760312A (zh) * 2022-04-27 2022-07-15 泽拓科技(深圳)有限责任公司 分布式任务协调方法、装置、设备和介质
CN115277133A (zh) * 2022-07-13 2022-11-01 国家电网有限公司信息通信分公司 设备管理方法及装置
CN115277133B (zh) * 2022-07-13 2024-03-15 国家电网有限公司信息通信分公司 设备管理方法及装置
CN115426281A (zh) * 2022-07-22 2022-12-02 中银金融科技有限公司 应用状态监控方法、装置、电子设备和存储介质
CN115473833A (zh) * 2022-09-14 2022-12-13 康键信息技术(深圳)有限公司 一种客户端性能监控方法、装置、系统和可读存储介质
CN115934480B (zh) * 2023-03-15 2023-06-16 浪潮电子信息产业股份有限公司 一种任务监控方法、系统、装置及计算机可读存储介质
CN115934480A (zh) * 2023-03-15 2023-04-07 浪潮电子信息产业股份有限公司 一种任务监控方法、系统、装置及计算机可读存储介质
CN116980474A (zh) * 2023-07-31 2023-10-31 深圳市亲邻科技有限公司 一种数据推送系统的日志数据订阅管理方法
CN116980474B (zh) * 2023-07-31 2024-04-02 深圳市亲邻科技有限公司 一种数据推送系统的日志数据订阅管理方法
CN117591381A (zh) * 2024-01-18 2024-02-23 南京研利科技有限公司 数据上报方法及装置
CN117591381B (zh) * 2024-01-18 2024-04-09 南京研利科技有限公司 数据上报方法及装置

Also Published As

Publication number Publication date
CN110297738A (zh) 2019-10-01

Similar Documents

Publication Publication Date Title
WO2020233077A1 (fr) Procédé, dispositif et appareil de surveillance de service de système et support d'informations
WO2020015067A1 (fr) Procédé d'acquisition de données, dispositif, équipement et support de stockage
WO2020253034A1 (fr) Procédé, appareil et dispositif de test de point enfoui client, et support d'enregistrement
WO2020253135A1 (fr) Procédé et dispositif d'analyse automatique, équipement utilisateur et support de stockage
WO2020215681A1 (fr) Procédé et appareil de génération d'informations d'indication, terminal et support de stockage
WO2020015064A1 (fr) Procédé de traitement de défaillance de système, appareil, dispositif et support d'informations
WO2020147396A1 (fr) Procédé permettant de configurer de manière dynamique un nom de domaine de service, dispositif, appareil, et support de stockage
WO2013081282A1 (fr) Système et procédé de recommandation d'application au moyen d'un mot clé
WO2020186773A1 (fr) Procédé, dispositif et appareil de surveillance de demandes d'appel, et support d'informations
WO2020253112A1 (fr) Procédé d'acquisition de stratégie de test, dispositif, terminal et support de stockage lisible
WO2015178600A1 (fr) Appareil et procédé de reconnaissance vocale utilisant des informations de dispositif
WO2020147385A1 (fr) Procédé et appareil d'entrée de données, terminal et support d'informations lisible par ordinateur
WO2020119115A1 (fr) Procédé, dispositif, appareil de vérification de données, et support de stockage
WO2020147264A1 (fr) Procédé, appareil et dispositif de surveillance de données de journal multisystème, support d'informations lisible
WO2020087981A1 (fr) Procédé et appareil de génération de modèle d'audit de contrôle de risque, dispositif, et support de stockage lisible
WO2020073494A1 (fr) Procédé de détection de porte arrière de page web, dispositif, support d'informations et appareil
WO2020119369A1 (fr) Procédé, appareil et dispositif de positionnement de défaut de fonctionnement et de maintenance informatique intelligent, et support de stockage lisible
WO2020233057A1 (fr) Procédé, appareil et dispositif d'empaquetage de fichiers, et support d'informations
WO2018120681A1 (fr) Procédé, dispositif et système de synchronisation de données, serveur de traitement de données et support de stockage
WO2021072881A1 (fr) Procédé, appareil et dispositif de traitement de demande fondée sur un stockage d'objet, et support de stockage
WO2020253125A1 (fr) Procédé, appareil et dispositif de gestion de journal et support d'informations
WO2020233073A1 (fr) Procédé, dispositif et appareil de traitement de test d'environnement de chaîne de blocs, et support de stockage
WO2020253116A1 (fr) Procédé d'exécution de données par lots, dispositif, support d'enregistrement et hôte membre en groupe
WO2020233060A1 (fr) Procédé et appareil de notification d'événement, serveur de notification d'événement et support de stockage
WO2021012481A1 (fr) Procédé et appareil de surveillance de performances de système, dispositif et support d'informations

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929944

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 04/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19929944

Country of ref document: EP

Kind code of ref document: A1