WO2021093364A1 - 一种日志采集方法、装置、系统及计算机可读存储介质 - Google Patents

一种日志采集方法、装置、系统及计算机可读存储介质 Download PDF

Info

Publication number
WO2021093364A1
WO2021093364A1 PCT/CN2020/103702 CN2020103702W WO2021093364A1 WO 2021093364 A1 WO2021093364 A1 WO 2021093364A1 CN 2020103702 W CN2020103702 W CN 2020103702W WO 2021093364 A1 WO2021093364 A1 WO 2021093364A1
Authority
WO
WIPO (PCT)
Prior art keywords
log
collection
log collection
instruction
node
Prior art date
Application number
PCT/CN2020/103702
Other languages
English (en)
French (fr)
Inventor
王军
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Publication of WO2021093364A1 publication Critical patent/WO2021093364A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/544Buffers; Shared memory; Pipes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation

Definitions

  • This application relates to the technical field of information collection, in particular to a log collection method, and also to a log collection device, system, and computer-readable storage medium.
  • the function of the storage system is to process the massive data transmitted between the server and the hard disk with high reliability and high speed requirements.
  • the CPU processes business data, and there is a pcie interface, and the common hard disk is the SAS interface, so the pcie interface is converted to the SAS interface, and the SAS expander is connected to each hard disk; for software applications, it is
  • the chassis management module detects the operating conditions of the equipment in real time, including information such as temperature, voltage, and fans.
  • the chassis management module includes the SES program running on the SAS expander and the EM thread (enclosure management chassis management) in the main program. Among them, SES The program is mainly used to collect log information, and the EM thread is used to receive the log information uploaded by the SES program and display it visually.
  • log information collection failures occur from time to time, such as access conflicts, link abnormalities, communication abnormalities, etc.
  • the amount of data to be managed is large, and the log information collection cannot be guaranteed.
  • Comprehensiveness For example, when a node fails, the log information of the node cannot be collected effectively, which brings greater difficulty to the subsequent function debugging and software and hardware fault location based on the log.
  • the purpose of this application is to provide a log collection method, which effectively improves the comprehensiveness of log information collection and provides reliable guarantee for subsequent log analysis and problem location; another purpose of this application is to provide a log collection device ,
  • the system and the computer-readable storage medium also have the above-mentioned beneficial effects.
  • this application provides a log collection method, and the log collection method includes:
  • the target node is a counter-control node, forward the log collection instruction to the SES program of the counter-control node, so that the SES program performs log collection on the target node according to the log collection instruction to obtain The second log information.
  • the log acquisition instruction includes:
  • the log collection method further includes:
  • the current log collection status includes no collection status, collection in progress status, and collection completion status;
  • the log collection method further includes:
  • the log transmission instruction is sent to the SES program of the opposite control node to obtain the second log information fed back by the SES program, and the first 2.
  • the log information is fed back to the main program.
  • the feeding back the first log information to the main program according to the log transmission instruction includes:
  • the first log information is fed back to the main program.
  • the log collection method further includes:
  • the first log information is fed back to the main program, so that the main program verifies the first log information, and restarts log collection when the verification fails.
  • the log collection method further includes:
  • the first log information is erased according to the transmission completion instruction.
  • this application also provides a log collection device, the log collection device includes:
  • Instruction acquisition module used to acquire log collection instructions
  • a node determining module configured to determine a target node according to the log collection instruction
  • the first collection module is configured to, if the target node is its own node, perform log collection on the target node according to the log collection instruction to obtain first log information;
  • the second collection module is configured to, if the target node is a counter-control node, forward the log collection instruction to the SES program of the counter-control node, so that the SES program can respond to the log collection instruction according to the log collection instruction.
  • the target node performs log collection to obtain second log information.
  • this application also provides a log collection system, which includes:
  • Memory used to store computer programs
  • the processor is used to implement the steps of any one of the above-mentioned log collection methods when the computer program is executed.
  • this application also provides a computer-readable storage medium with a computer program stored on the computer-readable storage medium, and when the computer program is executed by a processor, it implements any of the above log collection methods. step.
  • a log collection method provided by this application includes obtaining a log collection instruction; determining a target node according to the log collection instruction; if the target node is its own node, logging the target node according to the log collection instruction Collect to obtain the first log information; if the target node is a counter-control node, forward the log collection instruction to the SES program of the counter-control node, so that the SES program checks all the information according to the log collection instruction The target node performs log collection to obtain second log information.
  • the log collection method provided by this application realizes the collection of log information in a node by setting dual-control nodes, that is, by means of the interactive channel between the dual-node SES programs, so that the SES program of each node can maintain the current node at the same time.
  • the main program of a node can collect the log information of the node and the control node at the same time.
  • the control node realizes the log collection of the faulty node, which improves the reliability of log information collection, effectively avoids the omission of log information in the chassis, further improves the comprehensiveness of log information collection, and provides follow-up problem location through log analysis The reliability is guaranteed.
  • the log collection system, device, and computer-readable storage medium provided by the present application all have the above-mentioned beneficial effects, and will not be repeated here.
  • Figure 1 is a schematic flow diagram of a log collection method provided by this application.
  • FIG. 2 is a sequence diagram of a main program provided by this application for collecting SES program log information of its own node;
  • FIG. 3 is a sequence diagram of the main program collecting SES program log information of the control node provided by this application;
  • FIG. 4 is a flowchart of a node independently collecting log information of its own provided by this application;
  • Figure 5 is a flow chart of an upper control node collecting log information of a lower control node provided by this application;
  • Fig. 6 is a flow chart of a lower control node collecting log information of an upper control node provided by this application;
  • FIG. 7 is a schematic structural diagram of a log collection device provided by this application.
  • FIG. 8 is a schematic structural diagram of a log collection system provided by this application.
  • the core of this application is to provide a log collection method, which effectively improves the comprehensiveness of log information collection and provides reliable guarantee for subsequent log analysis and problem location; another core of this application is to provide a log collection device ,
  • the system and the computer-readable storage medium also have the above-mentioned beneficial effects.
  • Figure 1 is a schematic flow diagram of a log collection method provided by this application.
  • the log collection method may include:
  • This step aims to achieve the acquisition of log collection instructions, so that subsequent log collection can be performed according to the log collection instructions.
  • the log collection process is partially implemented by the SES program in the chassis management module. This application does not specifically limit the method of obtaining the above log collection instructions.
  • the SES program can automatically detect abnormal information when it is running.
  • the response to the preset log collection instruction may also be the received log collection instruction issued by the upper layer.
  • the aforementioned acquisition of the log collection instruction may include: receiving the log collection instruction issued by the main program corresponding to the own node.
  • This preferred embodiment provides a more specific way to obtain log collection instructions, that is, the main program of the node to which the current belongs is issued, that is, the main program issues log collection instructions to the SES program of the same node to start the SES program.
  • log collection instructions that is, the main program of the node to which the current belongs is issued
  • the main program issues log collection instructions to the SES program of the same node to start the SES program.
  • follow-up log collection the process of issuing log collection instructions by the main program can be initiated by a technician according to actual needs, or initiated when the main program finds abnormal information during operation, which is also not limited in this application.
  • This step aims to determine the target node, which is the node that needs to collect log information.
  • dual-control nodes can be preset, that is, information can be transmitted between two nodes through a preset transmission channel to ensure that both nodes can achieve opposite ends
  • the log information of the node is collected. Therefore, the target node may be its own node or a counter-control node.
  • This step aims to realize the collection of log information in the own node, that is, the collection of the first log information described above. Specifically, when it is determined that the target node is the own node, the log collection instruction can be directly responded to to collect log information in the own node to obtain the first node information.
  • S104 If the target node is a counter-control node, forward the log collection instruction to the SES program of the counter-control node, so that the SES program performs log collection on the target node according to the log collection instruction to obtain second log information.
  • This step aims to realize the collection of log information of the control node, that is, the collection of the above-mentioned second log information. Specifically, when it is determined that the target node is the opposite control node, the acquired log collection instruction is forwarded to the SES program of the opposite control node to start the SES program of the opposite control node to perform log collection and obtain the second node information. It can be understood that the log collection of the counter-control node mostly occurs when the main program of the counter-control node fails.
  • the log collection method provided by this application realizes the collection of log information in the node by setting dual-control nodes, that is, with the help of the interactive channel between the dual-node SES programs, so that the SES program of each node can maintain the current node and the pair at the same time.
  • the log collection of the end node realizes that the main program of a node can collect the log information of the current node and the control node at the same time.
  • the control node realizes log collection of the faulty node, improves the reliability of log information collection, effectively avoids the omission of log information in the chassis, further improves the comprehensiveness of log information collection, and provides reliability for subsequent problem location through log analysis Sexual protection.
  • the log collection method may further include: acquiring the current log collection status when the status acquisition instruction issued by the main program is received; wherein, the current log collection status includes no collection status, collection status, and collection status. Completion status; upload the current log collection status to the main program.
  • this preferred embodiment aims to realize the collection of the log collection status, that is, the current log collection status, so that the main program can learn the current log collection status in time, and perform subsequent log collection after the log collection is completed. Therefore, the main program can issue a status acquisition instruction to the SES program of this node, so that the SES program uploads the current log collection status to the main program based on the status acquisition instruction.
  • the current log collection status can specifically include no collection status and collection status And the completion status of the collection.
  • the log collection method may further include: receiving a log transmission instruction issued by the main program; wherein the log transmission instruction is issued by the main program after receiving the collection completion status; if the target node is its own node , The first log information is fed back to the main program according to the log transmission instruction; if the target node is the opposite control node, the log transmission instruction is sent to the SES program of the opposite control node to obtain the second log information fed back by the SES program, and The second log information is fed back to the main program.
  • This preferred embodiment aims to realize the feedback of log information, that is, the collected log information is fed back to the main program, so as to realize subsequent log analysis and problem location.
  • the main program receives the collection completion status uploaded by the SES program, it indicates that the log collection is completed.
  • the log transmission instruction can be issued to the SES program to obtain the collected log information.
  • the target node is its own node, it means that the currently collected log information is the log information of its own node, that is, the above-mentioned first log information.
  • the target node is a counter-controller Node
  • the log information currently collected is the log information of the control node, that is, the above-mentioned second log information. Since the second log information is specifically collected by the SES program of the control node, the SES program of this node can The log transmission instruction is forwarded to the SES program of the opposite control node, so as to obtain the second log information fed back by the SES program of the opposite control node, and finally upload it to the main program.
  • the foregoing feedback of the first log information to the main program according to the log transmission instruction may include: parsing the log transmission instruction to determine the data block ID, read length, and offset address; and according to the data block ID, The read length and offset address are read in the preset log partition to obtain the first log information; the first log information is fed back to the main program.
  • log partitions can be set up on each node in advance, and the log information can be stored in the form of data blocks.
  • log information feedback that is, when the SES program receives a log transmission instruction issued by the main program, it can be parsed to obtain the data block ID and data block ID corresponding to the log information that needs to be obtained. Read the length and offset address and other information, and then read the corresponding log information in the preset log partition, and give feedback.
  • this preferred embodiment only takes the log information feedback of its own node as an example for introduction, but this implementation manner is also applicable to the process of feedback of the log information of the control node, which will not be repeated here in this application.
  • the log collection method may further include: feeding back the first log information to the main program, so that the main program verifies the first log information, and restarts log collection when the verification fails.
  • This preferred embodiment aims to implement the verification of log information to ensure the validity of the obtained log information. Specifically, after the main program receives the log information uploaded by the SES program, it can verify it, which can be implemented based on the data block ID in the log transmission command; further, when the verification fails, it can be verified The SES program re-initiates the log transmission command in order to re-read the log information until the verification is passed.
  • this preferred embodiment only takes the log information verification of its own node as an example for introduction, but this implementation manner is also applicable to the verification process of the log information of the control node, and this application will not repeat it here.
  • the log collection method may further include: when the transmission completion instruction is received, erasing the first log information according to the transmission completion instruction.
  • the main program can issue a transmission completion instruction to the SES program, so that the SES program knows that the log information has been uploaded, and the log information erasing operation can be directly executed at this time.
  • the log information erasure process is also applicable to the control node.
  • the internal self-control processing can be carried out. For example, when the temperature of the chassis is detected, the fan speed is automatically adjusted according to the fan speed strategy.
  • the EM thread is a part of the main storage program, and its main tasks are as follows:
  • the SES program runs on a relatively low-end processor, collects the sensor temperature, voltage, fan, and manages VPD of the chassis through multiple i2c, reads and writes the registers of the management chip, and performs state processing after data collection, and then Report to the upper-level program for the final processing strategy.
  • the SES program reads the temperature information and repeatedly confirms whether there is an over-temperature phenomenon, obtains the over-temperature state, and reports it to the main program; the main program confirms whether an alarm or frequency reduction is required according to the severity of the over-temperature. Shutdown operation.
  • the communication between the main program and the SES program complies with the SES protocol communication, and is carried out through the send diagnostic and receive diagnostic methods, and the information is transmitted by sending and receiving each transmitted ses page.
  • the SES protocol has defined many pages, and each page has a specific page code, which is used to transmit various information. Therefore, new data transmission can be added by adding a ses page, that is, a new log transmission page, which is used to realize the transmission of log information between the main program and the SES program. Based on this, the log information acquisition process is implemented as follows:
  • page2 Define a new log element in the existing page2, and issue the log collection command force_trigger in the control command of page2; among them, page2 is divided into two parts: control and status, and status is used by the SES program to report status to the main program Information, control is used by the main program to issue instructions to the SES program.
  • the log collection status can also be defined in the status acquisition instruction of page2 (refer to the following log status feedback process);
  • the main program can send log collection instructions to the SES program of this node. Based on the interactive channel of the dual-control SES program, it can send two instructions to obtain the log information of the node and the log information of the control node.
  • log collection status flags (status acquisition instructions) between the main program and the SES program, and their respective meanings are as follows:
  • the SES program writes the log collection status into the page2 status query instruction, and uploads the log collection status when the main program issues a status acquisition instruction.
  • the main program needs to be notified of the log collection status.
  • the main program queries the log collection status flag. When it is in the "collecting state”, it waits for the log information collection to be completed; when it is in the "collection complete state”, it initiates a log transmission instruction; among them, because the main program is the instruction initiator, SES The program is the command response terminal and the feedback terminal. Therefore, the main program needs to actively query the log collection status and determine whether to initiate a log transmission command based on the status information;
  • the main program first queries the length of the log information, and then sends the log transmission instruction, which includes the log block number ID, read length and offset address; among them, because the log information has a large amount of data, it can be divided into blocks. For transmission, define a number ID for each data block, and specify the read length and the offset address in the log partition;
  • the SES program receives and parses the log transmission instruction, parses the data block ID, read length, and offset address, and reads the log information of the corresponding length at the offset address in the log partition, and then appends the log information at the end of the instruction Log information, made into return data and returned to the main program;
  • the main program receives the log information and verifies it. When the verification is passed, it is written to the file according to the data block number ID to form a log file; when the verification fails, the log transmission instruction corresponding to the data block number ID is re-initiated. Through multiple retransmissions, ensure that complete data can be obtained and improve reliability;
  • the SES program After the SES program receives the transmission completion instruction, it clears the log information of the log partition and detects the operating environment in real time to prepare for the next log collection.
  • Fig. 2 is a sequence diagram of a main program provided by this application for collecting log information of its own node SES program
  • Fig. 3 is a first provided by this application.
  • the log transmission channel can specifically include the log transmission channel between the main program of the node and the SES node and the log transmission channel between the SES program of the dual control node, as shown in Figure 4, Figure 5 and Figure 6, Figure 4
  • This application provides a flow chart for a node to independently collect its own log information.
  • Figure 5 is a flow chart for an upper control node to collect log information from a lower control node provided by this application.
  • the upper control node and the lower control node are the opposite control nodes.
  • the main program issues log control instructions.
  • the upper control node When the upper control node receives and parses the log control instructions to the lower control node, it will actively send the instructions to the lower control node. ; When the lower control node receives and parses the log control instruction for the upper control order, it will actively send the instruction to the upper control node.
  • the log collection method provided by the embodiment of the present application realizes the collection of log information in the node by setting dual-control nodes, that is, by means of the interactive channel between the dual-node SES program, the SES program of each node can be At the same time, the log collection of this node and the opposite node is maintained, so that the main program of a node can collect the log information of this node and the opposite control node at the same time.
  • the log collection of the faulty node can be realized through its corresponding counter-control node, which improves the reliability of log information collection, effectively avoids the omission of log information in the chassis, and further improves the comprehensiveness of log information collection, for subsequent log analysis
  • the problem location provides reliability guarantee.
  • FIG. 7 is a schematic structural diagram of a log collection device provided by this application.
  • the log collection device may include:
  • the instruction acquisition module 10 is used to acquire log collection instructions
  • the node determining module 20 is configured to determine a target node according to the log collection instruction
  • the first collection module 30 is configured to, if the target node is its own node, perform log collection on the target node according to the log collection instruction to obtain first log information;
  • the second collection module 40 is configured to, if the target node is a counter-control node, forward the log collection instruction to the SES program of the counter-control node, so that the SES program can check the log collection instruction according to the log collection instruction.
  • the target node performs log collection to obtain second log information.
  • FIG. 8 is a schematic structural diagram of a log collection system provided by this application.
  • the log collection system may include:
  • Memory 1 used for storing computer programs
  • the processor 2 is used to implement the steps of any one of the aforementioned log collection methods when executing a computer program.
  • the present application also provides a computer-readable storage medium with a computer program stored on the computer-readable storage medium, and the computer program can realize the steps of any one of the above-mentioned log collection methods when the computer program is executed by the processor.
  • the computer-readable storage medium may include: U disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disk or optical disk, etc., which can store program codes Medium.
  • the steps of the method or algorithm described in combination with the embodiments disclosed in this document can be directly implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all areas in the technical field. Any other known storage media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Debugging And Monitoring (AREA)

Abstract

一种日志采集方法、装置、系统及计算机可读存储介质,包括获取日志采集指令;根据所述日志采集指令确定目标节点;若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息;该日志采集方法提高了日志信息采集的全面性,为后续日志分析和问题定位提供了有效保证。

Description

一种日志采集方法、装置、系统及计算机可读存储介质
本申请要求于2019年11月15日提交中国专利局、申请号为201911121566.9、发明名称为“一种日志采集方法、装置、系统及计算机可读存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及信息采集技术领域,特别涉及一种日志采集方法,还涉及一种日志采集装置、系统以及计算机可读存储介质。
背景技术
存储系统的作用在于以高可靠和高速率为要求,对服务器和硬盘之间传输的海量数据进行处理。其中,对于系统接口,CPU处理业务数据,外有pcie接口,硬盘通用的是SAS接口,因而会有pcie接口转换为SAS接口,并由SAS expander对接到每个硬盘;对于软件应用,则是由机箱管理模块实时检测设备的运行情况,包括温度、电压、风扇等信息,该机箱管理模块包括SAS expander上运行的SES程序和主程序中的EM线程(enclosure management机箱管理)两部分,其中,SES程序主要用于实现日志信息采集,EM线程则用于接收SES程序上传的日志信息并进行可视化展示。
然而,随着设备的运行,日志信息采集失败的情况时有发生,如访问冲突、链路异常、通信异常等,加之机箱中节点众多,需要管理的数据量众多,根本无法保证日志信息采集的全面性,例如,当一个节点故障时,该节点的日志信息无法得到有效采集,从而对后续根据日志进行功能调试和软硬件故障定位带来了较大难度。
因此,如何有效提高日志信息采集的全面性,为后续日志分析和问题定位提供保证是本领域技术人员亟待解决的问题。
发明内容
本申请的目的是提供一种日志采集方法,该日志采集方法有效提高了日志信息采集的全面性,为后续日志分析和问题定位提供可靠保证;本申请的另一目的是提供一种日志采集装置、系统以及计算机可读存储介质,也具有上述有益效果。
为解决上述技术问题,本申请提供了一种日志采集方法,所述日志采集方法包括:
获取日志采集指令;
根据所述日志采集指令确定目标节点;
若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;
若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
优选的,所述获取日志采集指令包括:
接收所述自身节点对应的主程序下发的所述日志采集指令。
优选的,所述日志采集方法还包括:
当接收到所述主程序下发的状态获取指令时,获取当前日志采集状态;其中,所述当前日志采集状态包括无采集状态、采集中状态和采集完成状态;
将所述当前日志采集状态上传至所述主程序。
优选的,所述日志采集方法还包括:
接收所述主程序下发的日志传输指令;其中,所述日志传输指令是所述主程序在接收到所述采集完成状态后下发的;
若所述目标节点为所述自身节点,则根据所述日志传输指令将所述第一日志信息反馈至所述主程序;
若所述目标节点为所述对控节点,则将所述日志传输指令发送至所述对控节点的SES程序,以获取所述SES程序反馈的所述第二日志信息,并将所述第二日志信息反馈至所述主程序。
优选的,所述根据所述日志传输指令将所述第一日志信息反馈至所述 主程序,包括:
对所述日志传输指令进行解析,确定数据块ID、读取长度和偏移地址;
根据所述数据块ID、读取长度和偏移地址在预设日志分区中进行日志读取,获得所述第一日志信息;
将所述第一日志信息反馈至所述主程序。
优选的,所述日志采集方法还包括:
将所述第一日志信息反馈至所述主程序,以使所述主程序对所述第一日志信息进行校验,并在校验失败时重新进行日志采集。
优选的,所述日志采集方法还包括:
当接收到传输完成指令时,根据所述传输完成指令将所述第一日志信息擦除。
为解决上述技术问题,本申请还提供了一种日志采集装置,所述日志采集装置包括:
指令获取模块,用于获取日志采集指令;
节点确定模块,用于根据所述日志采集指令确定目标节点;
第一采集模块,用于若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;
第二采集模块,用于若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
为解决上述技术问题,本申请还提供了一种日志采集系统,所述日志采集系统包括:
存储器,用于存储计算机程序;
处理器,用于执行所述计算机程序时实现上述任意一种日志采集方法的步骤。
为解决上述技术问题,本申请还提供了一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现上述任意一种日志采集方法的步骤。
本申请所提供的一种日志采集方法,包括获取日志采集指令;根据所 述日志采集指令确定目标节点;若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
可见,本申请所提供的日志采集方法,通过设定双控节点实现节点中日志信息的采集,即借助于双节点SES程序之间的交互通道,使得每个节点的SES程序可同时保持本节点和对端节点的日志收集,实现一个节点的主程序可同时收集本节点和对控节点的日志信息,由此,当某个节点的主程序发生异常而无法正常工作时,则可通过其对应的对控节点实现该故障节点的日志采集,提高了日志信息的可靠性收集,有效避免了机箱中日志信息的遗漏,进一步提高了日志信息采集的全面性,为后续通过日志分析进行问题定位提供了可靠性保障。
本申请所提供的一种日志采集系统、装置以及计算机可读存储介质,均具有上述有益效果,在此不再赘述。
附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本申请所提供的一种日志采集方法的流程示意图;
图2为本申请所提供的一种主程序采集自身节点SES程序日志信息的时序图;
图3为本申请所提供的一种主程序采集对控节点SES程序日志信息的时序图;
图4为本申请所提供的一种节点独立采集自身日志信息的流程图;
图5为本申请所提供的一种上控节点采集下控节点日志信息的流程图;
图6为本申请所提供的一种下控节点采集上控节点日志信息的流程图;
图7为本申请所提供的一种日志采集装置的结构示意图;
图8为本申请所提供的一种日志采集系统的结构示意图。
具体实施方式
本申请的核心是提供一种日志采集方法,该日志采集方法有效提高了日志信息采集的全面性,为后续日志分析和问题定位提供可靠保证;本申请的另一核心是提供一种日志采集装置、系统以及计算机可读存储介质,也具有上述有益效果。
为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
请参考图1,图1为本申请所提供的一种日志采集方法的流程示意图,该日志采集方法可以包括:
S101:获取日志采集指令;
本步骤旨在实现日志采集指令的获取,以便根据该日志采集指令进行后续日志采集。具体而言,日志采集过程由机箱管理模块中的SES程序部分实现,对于上述日志采集指令的获取方式,本申请不做具体限定,例如,可以是SES程序在运行过程中发现异常信息时,自动响应预设的日志采集指令,也可以是接收的上层下发的日志采集指令。
优选的,上述获取日志采集指令可以包括:接收自身节点对应的主程序下发的日志采集指令。
本优选实施例提供了一种较为具体的日志采集指令的获取方式,即当前所属节点的主程序下发,也就是主程序将日志采集指令下发至同节点的SES程序,以启动SES程序进行后续日志采集。当然,主程序下发日志采集指令的过程,可以是技术人员根据实际需要发起,也可以是主程序在运行过程中发现异常信息时发起,本申请对此同样不做限定。
S102:根据日志采集指令确定目标节点;
本步骤旨在实现目标节点的确定,该目标节点即为需要进行日志信息采集的节点。具体而言,为保证机箱中日志信息采集的全面性,可预先设定双控节点,即两个节点之间可通过预设的传输通道实现信息传输,以保证两个节点均可实现对端节点的日志信息的采集,因此,该目标节点可能为自身节点,也可能为对控节点。
S103:若目标节点为自身节点,则根据日志采集指令对目标节点进行日志采集,获得第一日志信息;
本步骤旨在实现自身节点中日志信息的采集,即上述第一日志信息的采集。具体的,当确定目标节点为自身节点时,可直接响应该日志采集指令,对自身节点中的日志信息进行采集,以获得第一节点信息。
S104:若目标节点为对控节点,则将日志采集指令转发至对控节点的SES程序,以使SES程序根据日志采集指令对目标节点进行日志采集,获得第二日志信息。
本步骤旨在实现对控节点的日志信息的采集,即上述第二日志信息的采集。具体的,当确定目标节点为对控节点时,则将获取到的日志采集指令转发至对控节点的SES程序,以启动对控节点的SES程序进行日志采集,获得第二节点信息。可以理解的是,对对控节点的日志采集多发生于对控节点的主程序发生故障的情况下。
需要说明的是,上述所确定的目标节点的数量并不唯一,亦可以同时实现双节点的日志信息的采集,并不影响本技术方案的实施。
本申请所提供的日志采集方法,通过设定双控节点实现节点中日志信息的采集,即借助于双节点SES程序之间的交互通道,使得每个节点的SES程序可同时保持本节点和对端节点的日志收集,实现一个节点的主程序可同时收集本节点和对控节点的日志信息,由此,当某个节点的主程序发生异常而无法正常工作时,则可通过其对应的对控节点实现该故障节点的日志采集,提高了日志信息的可靠性收集,有效避免了机箱中日志信息的遗漏,进一步提高了日志信息采集的全面性,为后续通过日志分析进行问题定位提供了可靠性保障。
在上述实施例的基础上,
作为一种优选实施例,该日志采集方法还可以包括:当接收到主程序下发的状态获取指令时,获取当前日志采集状态;其中,当前日志采集状态包括无采集状态、采集中状态和采集完成状态;将当前日志采集状态上传至主程序。
具体的,本优选实施例旨在实现日志采集状态的采集,即当前日志采集状态,以便主程序及时获知当前日志采集状态,并在日志采集完成后进行后续日志汇总。因此,主程序可向本节点的SES程序下发状态获取指令,以便SES程序基于该状态获取指令向主程序上传当前日志采集状态,其中,当前日志采集状态具体可包括无采集状态、采集中状态和采集完成状态。
作为一种优选实施例,该日志采集方法还可以包括:接收主程序下发的日志传输指令;其中,日志传输指令是主程序在接收到采集完成状态后下发的;若目标节点为自身节点,则根据日志传输指令将第一日志信息反馈至主程序;若目标节点为对控节点,则将日志传输指令发送至对控节点的SES程序,以获取SES程序反馈的第二日志信息,并将第二日志信息反馈至主程序。
本优选实施例旨在实现日志信息的反馈,即将采集到的日志信息反馈至主程序,以便后续日志分析和问题定位的实现。具体而言,当主程序接收到SES程序上传的采集完成状态后,说明日志采集完毕,此时可向SES程序下发日志传输指令,以获得其采集的日志信息。其中,当目标节点为自身节点时,说明当前采集的日志信息为自身节点的日志信息,即上述第一日志信息,此时将第一日志信息上传至主程序即可;当目标节点为对控节点时,说明当前采集的日志信息为对控节点的日志信息,即上述第二日志信息,由于该第二日志信息具体由对控节点的SES程序采集获得,因此,本节点的SES程序可将日志传输指令转发至对控节点的SES程序,以便获取到对控节点的SES程序反馈的第二日志信息,最后再将其上传至主程序。
作为一种优选实施例,上述根据日志传输指令将第一日志信息反馈至主程序,可以包括:对日志传输指令进行解析,确定数据块ID、读取长度 和偏移地址;根据数据块ID、读取长度和偏移地址在预设日志分区中进行日志读取,获得第一日志信息;将第一日志信息反馈至主程序。
本优选实施例提供了一种较为具体的日志信息的反馈过程,具体而言,由于日志信息的数据量巨大,因此,可在各个节点上预先设立日志分区,并以数据块的形式将日志信息存储至该日志分区,当需要进行日志信息反馈时,即SES程序接收到主程序下发的日志传输指令时,即可对其进行解析,以获得所需获取的日志信息对应的数据块ID、读取长度以及偏移地址等信息,进而在预设日志分区中读取到相应的日志信息,并进行反馈即可。
可以理解的是,本优选实施例仅以自身节点的日志信息反馈为例进行了介绍,但该种实现方式同样适用于对控节点日志信息的反馈过程,本申请在此不再赘述。
作为一种优选实施例,该日志采集方法还可以包括:将第一日志信息反馈至主程序,以使主程序对第一日志信息进行校验,并在校验失败时重新进行日志采集。
本优选实施例旨在实现日志信息的校验,以保证所获取的日志信息的有效性。具体的,主程序在接收到SES程序上传的日志信息后,即可对其进行校验,具体可基于日志传输命令中的数据块ID等信息实现;进一步,当校验失败时,则可向SES程序重新发起日志传输指令,以便重新读取日志信息,直至校验通过。
同样的,本优选实施例仅以自身节点的日志信息校验为例进行了介绍,但该种实现方式同样适用于对控节点日志信息的校验过程,本申请在此不再赘述。
作为一种优选实施例,该日志采集方法还可以包括:当接收到传输完成指令时,根据传输完成指令将第一日志信息擦除。
具体的,由于日志信息的数据量巨大,而日志分区的存储空间有限,因此,对于已经上传至主程序的日志信息,可直接进行擦除,以避免空间占用和资源浪费。具体而言,主程序在获取到日志信息之后,即可向SES程序下发传输完成指令,以便SES程序知晓日志信息已经上传完毕,此时直接执行日志信息擦除操作即可。
类似于上述日志信息的反馈和校验过程,日志信息的擦除过程同样适用于对控节点。
在上述各实施例的基础上,本申请提供了一种更为具体的日志采集方法,其具体实现过程如下:
首先,对机箱管理模块中的SAE程序和EM线程进行介绍:
1、SES程序的主体任务如下:
(1)高频率循环读取设备的外围状态,如风扇、电压、风扇等信息,并做异常判定,当判定出现异常状态时,则将其状态和信息上报给EM线程;
(2)接收并执行EM线程发来的控制指令;
(3)内部可进行自控制处理,如在检测机箱温度高低时,按照风扇转速策略自动调整风扇转速。
2、EM线程属于存储主程序的一部分,其主体任务如下:
(1)当接收到SES程序发来的数据信息时,更新内部数据;
(2)当存在异常状态时,发起用户可直观查看的告警,并通知主系统是否需要针对异常做其他处理,如当某些关键元件温度超高时,是否要进行关机保护;
(3)当主系统需要在程序运行中控制某个硬件时,经过EM线程下发给SES程序,由SES程序进行实际控制,如读写VPD配置信息、点亮某个异常控制灯。
其中,SES程序运行于一个较为中低端的处理器上,通过多路i2c采集机箱的传感器温度、电压、风扇、管理VPD,读写管理芯片的寄存器,并在数据采集后做状态处理,然后上报给上层程序做最终的处理策略。例如,SES程序读取温度信息,并多次确认是否出现了超温现象,得出超温状态,并上报给主程序;主程序根据超温的严重程度,确认是否要做告警或降频或关机操作。
进一步,主程序与SES程序之间的通信遵守SES协议通信,通过send diagnostic和receive diagnostic方式来进行,收发各个传输的ses page来传 递信息。其中,SES协议已经定了很多page,每个page均有特定的page code,用于传递各种信息。因此,可通过新增ses page的方式增加新数据传输,即新增日志传输page,用于实现主程序与SES程序之间的日志信息传输。基于此,日志信息的获取流程实现如下:
一、日志信息收集过程:
1、日记信息收集条件:
(1)当SES程序内部运行时检测到异常,则直接开始采集日志信息;
(2)当主程序检测到异常,主动下发日志采集指令;
(3)当用户主动收集日志时,通过主程序向SES程序下发日志采集指令。
2、定义主程序与SES程序之间传递的日志采集指令:
(1)在已有的page2中定义新的日志元素,在page2的control控制指令里,下发日志采集指令force_trigger;其中,page2分control和status两部分,status用于SES程序向主程序上报状态信息,control用于主程序向SES程序下发指令,同时,也可在page2的status状态获取指令中定义日志采集状态(参照下述日志状态反馈过程);
(2)利用节点之间的交互通道,将日志采集指令发送给对端(对控节点)。
3、主程序可向本节点SES程序发送日志采集指令,在双控SES程序有交互通道的基础上,可发送获取本节点日志信息和对控节点日志信息的两种指令。
4、SES程序,接收日志采集指令后并解析:
(1)当解析到是关于本节点的指令,则发起内部日志收集过程;
(2)当解析到是关于对端节点的指令,则将指令发送给对端,对端接收后发起日志收集过程。
二、日志状态反馈过程:
1、定义主程序与SES程序之间的日志收集状态标志(状态获取指令),分别表征含义如下:
(1)日志无采集状态(表示没有日志采集指令触发,为默认状态);
(2)日志采集中状态(表示日志信息正在SES程序内部收集,持续几秒钟);
(3)日志采集完成状态(表示SES程序内部采集日志信息已完成,并已做好向主程序发送的准备)。
2、SES程序将日志采集状态写入page2状态查询指令中,在主程序下发状态获取指令时,上传日志采集状态。其中,由于日志信息需要先在SES程序内部采集完成才可传递给主程序,因而需要将日志采集状态告知主程序。
三、日志信息传输过程:
1、主程序查询日志采集状态标志,当处于“采集中状态”时,等待日志信息收集完成;当处于“收集完成状态”时,发起日志传输指令;其中,由于主程序为指令发起端,SES程序为指令响应端和反馈端,因此,需要主程序主动查询日志采集状态,并根据状态信息判定是否发起日志传输指令;
2、对于双控节点,先检测对控节点的当前状态,若处于正常状态,则各自发送关于本端的日志传输指令,若处于异常状态,则发送关于对端的日志传输指令,或同时发送关于本端和对端的日志传输接收指令;
3、定义主程序与SES程序之间用于传输日志信息的log page,用于查询日志信息长度和接收日志信息;
4、主程序首先查询日志信息的长度,然后再发送日志传输指令,该指令包括日志块编号ID,读取长度和偏移地址;其中,由于日志信息数据量较大,因此,可进行分块传输,对每个数据块定义编号ID,并说明读取长度和在日志分区的偏移地址;
5、SES程序接收并解析日志传输指令,解析出数据块编号ID、读取长度和偏移地址,并在日志分区中的偏移地址读取到对应长度的日志信息,进而在指令末端追加该日志信息,做成返回数据并返回给主程序;
6、主程序接收日志信息并校验,当校验通过时,按照数据块编号ID依次写入文件,组成日志文件;当校验不通过时,重新发起对应数据块编号ID的日志传输指令,通过多次重传确保可获取到完整数据,提高可靠性;
7、当主程序检测到对端主程序异常时,向本节点的SES程序下发关于对端的日志传输指令;
8、当本节点的SES程序解析到是关于对端的指令时,则将其转发给对端,并且接收对端发来的日志信息,最后反馈给主程序。
四、日志传输结束:
1、主程序接收完毕后,通过page2的控制指令下发传输完成指令;
2、SES程序接收到传输完成指令后,清除日志分区的日志信息,并实时检测运行环境,准备下一次日志采集。
至此,日志信息获取完毕。
进一步,基于上述日志信息的获取流程,结合图2和图3,图2为本申请所提供的一种主程序采集自身节点SES程序的日志信息的时序图,图3为本申请所提供的一种主程序采集对控节点SES程序的日志信息的时序图,由此,可得到具体执行步骤如下:
一、建立交互通道:
1、在page2中定义日志元素;
2、在控制指令中通知SES程序强制收集日志;
3、在状态查询指令中,获取日志采集状态;
4、建立用于日志信息传输的新的日志传输通道。
其中,对于日志传输通道,具体可包括本节点主程序与SES节点之间的日志传输通道和双控节点SES程序之间的日志传输通道,如图4、图5和图6所示,图4为本申请所提供的一种节点独立采集自身日志信息的流程图,图5为本申请所提供的一种上控节点采集下控节点日志信息的流程图,图6为本申请所提供的一种下控节点采集上控节点日志信息的流程图。其中,上控节点和下控节点互为对控节点,主程序下发日志控制指令,当上控节点接收并解析到是对下控节点的日志控制指令,会将指令主动发送给下控节点;当下控节点接收并解析到是对上控接单的日志控制指令,会将指令主动发送给上控节点。
二、主程序主体任务:
1、当检测到异常时,发送日志采集指令;
2、查询日志采集状态;
3、当日志采集完成时,发起日志传输指令;首先,查询日志信息的有效长度,再依次分块下发日志数据块的编号ID和偏移地址,并接收SES程序发来的相应日志信息;
4、当日志信息校验通过后,按照编号ID顺序逐个写入文件,组成完整的日志文件;
5、当日志信息校验不通过时,下发相同的日志传输指令重试,多次下发确保日志信息可被正确读取,以提高可靠性;
6、通过page2的日志元素,下发传输完成指令。
三、SES程序主体任务:
1、在本端发现异常时,启动日志采集流程;
2、当接收到主程序的日志采集指令时,启动日志采集流程;
3、开始内部收集日志信息,并向主程序上报“本节点日志信息采集中状态”;
4、当日志信息内部收集完成时,向主程序上报“本节点日志信息采集完成状态”;
5、接收主程序的日志传输指令,根据指令中的日志块编号ID和偏移地址,读取指定长度的日志信息,并反馈给主程序,直至读取完成;
6、当接收到传输完成指令时,清除日志信息,准备下一次日志采集;
7、当解析到是关于对端的日志采集指令时,则将其发送至对端;
8、接收对端节点的日志采集状态,并上报给主程序;
9、将主程序的读取对端日志块的编号ID、偏移地址和读取长度等均发送至对端,并接收对端反馈的日志信息,最后再上传给主程序;
10、接收到关于对端的传输完成指令,将指令发送给对端,以使对端执行日志信息清除操作。
由此可见,本申请实施例所提供的日志采集方法,通过设定双控节点实现节点中日志信息的采集,即借助于双节点SES程序之间的交互通道,使得每个节点的SES程序可同时保持本节点和对端节点的日志收集,实现一个节点的主程序可同时收集本节点和对控节点的日志信息,由此,当某 个节点的主程序发生异常而无法正常工作时,则可通过其对应的对控节点实现该故障节点的日志采集,提高了日志信息的可靠性收集,有效避免了机箱中日志信息的遗漏,进一步提高了日志信息采集的全面性,为后续通过日志分析进行问题定位提供了可靠性保障。
为解决上述问题,请参考图7,图7为本申请所提供的一种日志采集装置的结构示意图,该日志采集装置可包括:
指令获取模块10,用于获取日志采集指令;
节点确定模块20,用于根据所述日志采集指令确定目标节点;
第一采集模块30,用于若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;
第二采集模块40,用于若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
对于本申请提供的装置的介绍请参照上述方法实施例,本申请在此不做赘述。
为解决上述问题,请参考图8,图8为本申请所提供的一种日志采集系统的结构示意图,该日志采集系统可包括:
存储器1,用于存储计算机程序;
处理器2,用于执行计算机程序时可实现上述任意一种日志采集方法的步骤。
对于本申请提供的系统的介绍请参照上述方法实施例,本申请在此不做赘述。
为解决上述问题,本申请还提供了一种计算机可读存储介质,该计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时可实现上述任意一种日志采集方法的步骤。
该计算机可读存储介质可以包括:U盘、移动硬盘、只读存储器 (Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
对于本申请提供的计算机可读存储介质的介绍请参照上述方法实施例,本申请在此不做赘述。
说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
专业人员还可以进一步意识到,结合本文中所公开的实施例描述的各示例的单元及算法步骤,能够以电子硬件、计算机软件或者二者的结合来实现,为了清楚地说明硬件和软件的可互换性,在上述说明中已经按照功能一般性地描述了各示例的组成及步骤。这些功能究竟以硬件还是软件方式来执行,取决于技术方案的特定应用和设计约束条件。专业技术人员可以对每个特定的应用来使用不同方法来实现所描述的功能,但是这种实现不应认为超出本申请的范围。
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
以上对本申请所提供的日志采集方法、系统、装置以及计算机可读存储介质进行了详细介绍。本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想。应当指出,对于本技术领域的普通技术人员来说,在不脱离本申请原理的前提下,还可以对本申请进行若干改进和修饰,这些改进和修饰也落入本申请权利要求的保护范围要素。

Claims (10)

  1. 一种日志采集方法,其特征在于,包括:
    获取日志采集指令;
    根据所述日志采集指令确定目标节点;
    若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;
    若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
  2. 如权利要求1所述的日志采集方法,其特征在于,所述获取日志采集指令包括:
    接收所述自身节点对应的主程序下发的所述日志采集指令。
  3. 如权利要求2所述的日志采集方法,其特征在于,还包括:
    当接收到所述主程序下发的状态获取指令时,获取当前日志采集状态;其中,所述当前日志采集状态包括无采集状态、采集中状态和采集完成状态;
    将所述当前日志采集状态上传至所述主程序。
  4. 如权利要求3所述的日志采集方法,其特征在于,还包括:
    接收所述主程序下发的日志传输指令;其中,所述日志传输指令是所述主程序在接收到所述采集完成状态后下发的;
    若所述目标节点为所述自身节点,则根据所述日志传输指令将所述第一日志信息反馈至所述主程序;
    若所述目标节点为所述对控节点,则将所述日志传输指令发送至所述对控节点的SES程序,以获取所述SES程序反馈的所述第二日志信息,并将所述第二日志信息反馈至所述主程序。
  5. 如权利要求4所述的日志采集方法,其特征在于,所述根据所述日志传输指令将所述第一日志信息反馈至所述主程序,包括:
    对所述日志传输指令进行解析,确定数据块ID、读取长度和偏移地址;
    根据所述数据块ID、读取长度和偏移地址在预设日志分区中进行日志读取,获得所述第一日志信息;
    将所述第一日志信息反馈至所述主程序。
  6. 如权利要求5所述的日志采集方法,其特征在于,还包括:
    将所述第一日志信息反馈至所述主程序,以使所述主程序对所述第一日志信息进行校验,并在校验失败时重新进行日志采集。
  7. 如权利要求1至6任意一项所述的日志采集方法,其特征在于,还包括:
    当接收到传输完成指令时,根据所述传输完成指令将所述第一日志信息擦除。
  8. 一种日志采集装置,其特征在于,包括:
    指令获取模块,用于获取日志采集指令;
    节点确定模块,用于根据所述日志采集指令确定目标节点;
    第一采集模块,用于若所述目标节点为自身节点,则根据所述日志采集指令对所述目标节点进行日志采集,获得第一日志信息;
    第二采集模块,用于若所述目标节点为对控节点,则将所述日志采集指令转发至所述对控节点的SES程序,以使所述SES程序根据所述日志采集指令对所述目标节点进行日志采集,获得第二日志信息。
  9. 一种日志采集系统,其特征在于,包括:
    存储器,用于存储计算机程序;
    处理器,用于执行所述计算机程序时实现如权利要求1至7任意一项所述的日志采集方法的步骤。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有计算机程序,所述计算机程序被处理器执行时实现如权利要求1至7任意一项所述的日志采集方法的步骤。
PCT/CN2020/103702 2019-11-15 2020-07-23 一种日志采集方法、装置、系统及计算机可读存储介质 WO2021093364A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911121566.9 2019-11-15
CN201911121566.9A CN110995471B (zh) 2019-11-15 2019-11-15 一种日志采集方法、装置、系统及计算机可读存储介质

Publications (1)

Publication Number Publication Date
WO2021093364A1 true WO2021093364A1 (zh) 2021-05-20

Family

ID=70084392

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/103702 WO2021093364A1 (zh) 2019-11-15 2020-07-23 一种日志采集方法、装置、系统及计算机可读存储介质

Country Status (2)

Country Link
CN (1) CN110995471B (zh)
WO (1) WO2021093364A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996335A (zh) * 2022-08-03 2022-09-02 海看网络科技(山东)股份有限公司 一种iptv日志实时聚类分析方法
CN117290190A (zh) * 2023-11-27 2023-12-26 博为科技有限公司 一种串口日志远程采集方法、装置及存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995471B (zh) * 2019-11-15 2021-12-17 苏州浪潮智能科技有限公司 一种日志采集方法、装置、系统及计算机可读存储介质
CN112751876B (zh) * 2020-12-30 2022-11-15 北京天融信网络安全技术有限公司 消息采集系统的控制方法、装置、电子设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117658A1 (en) * 2002-09-27 2004-06-17 Andrea Klaes Security monitoring and intrusion detection system
CN102722461A (zh) * 2012-05-07 2012-10-10 加弘科技咨询(上海)有限公司 存储管理系统的数据通信系统及通信方法
CN105159851A (zh) * 2015-07-02 2015-12-16 浪潮(北京)电子信息产业有限公司 多控存储系统
CN106357426A (zh) * 2016-08-26 2017-01-25 东北大学 一种基于工业云的大规模分布式智能数据采集系统及方法
CN110032516A (zh) * 2019-04-12 2019-07-19 苏州浪潮智能科技有限公司 一种传输程序的调试反馈信息获取方法及相关装置
CN110995471A (zh) * 2019-11-15 2020-04-10 苏州浪潮智能科技有限公司 一种日志采集方法、装置、系统及计算机可读存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6578160B1 (en) * 2000-05-26 2003-06-10 Emc Corp Hopkinton Fault tolerant, low latency system resource with high level logging of system resource transactions and cross-server mirrored high level logging of system resource transactions
CN102185710A (zh) * 2011-04-26 2011-09-14 中兴通讯股份有限公司 一种单板日志的管理方法及日志管理系统
JP5946423B2 (ja) * 2013-04-26 2016-07-06 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation システム・ログの分類方法、プログラム及びシステム
CN107656850A (zh) * 2017-09-28 2018-02-02 郑州云海信息技术有限公司 一种基于ses协议的设备监控方法、装置及介质
CN107967195A (zh) * 2017-12-07 2018-04-27 郑州云海信息技术有限公司 一种基于双控存储的故障修复方法及系统
CN109062757A (zh) * 2018-07-19 2018-12-21 郑州云海信息技术有限公司 一种机箱双管理方法、系统及一种双管理的机箱
CN109726083A (zh) * 2019-01-03 2019-05-07 郑州云海信息技术有限公司 机箱的运行状态管理方法、系统、装置及可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040117658A1 (en) * 2002-09-27 2004-06-17 Andrea Klaes Security monitoring and intrusion detection system
CN102722461A (zh) * 2012-05-07 2012-10-10 加弘科技咨询(上海)有限公司 存储管理系统的数据通信系统及通信方法
CN105159851A (zh) * 2015-07-02 2015-12-16 浪潮(北京)电子信息产业有限公司 多控存储系统
CN106357426A (zh) * 2016-08-26 2017-01-25 东北大学 一种基于工业云的大规模分布式智能数据采集系统及方法
CN110032516A (zh) * 2019-04-12 2019-07-19 苏州浪潮智能科技有限公司 一种传输程序的调试反馈信息获取方法及相关装置
CN110995471A (zh) * 2019-11-15 2020-04-10 苏州浪潮智能科技有限公司 一种日志采集方法、装置、系统及计算机可读存储介质

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114996335A (zh) * 2022-08-03 2022-09-02 海看网络科技(山东)股份有限公司 一种iptv日志实时聚类分析方法
CN114996335B (zh) * 2022-08-03 2022-11-01 海看网络科技(山东)股份有限公司 一种iptv日志实时聚类分析方法
CN117290190A (zh) * 2023-11-27 2023-12-26 博为科技有限公司 一种串口日志远程采集方法、装置及存储介质
CN117290190B (zh) * 2023-11-27 2024-02-13 博为科技有限公司 一种串口日志远程采集方法、装置及存储介质

Also Published As

Publication number Publication date
CN110995471A (zh) 2020-04-10
CN110995471B (zh) 2021-12-17

Similar Documents

Publication Publication Date Title
WO2021093364A1 (zh) 一种日志采集方法、装置、系统及计算机可读存储介质
CN111083225B (zh) 在物联网平台中的数据处理方法、装置及物联网平台
WO2020134634A1 (zh) 程序调试方法、程序调试装置、终端设备及存储介质
US9804832B2 (en) Method, apparatus, and communication device for updating firmware
CN112130881A (zh) 一种固件远程升级方法及装置
CN112684982B (zh) 一种数据迁移方法、系统、设备及计算机可读存储介质
CN111930489B (zh) 一种任务调度方法、装置、设备及存储介质
CN111970166B (zh) 一种测试方法、装置、设备、系统及计算机可读存储介质
CN110502581B (zh) 分布式数据库系统监测方法及装置
CN104298675A (zh) 用于缓存管理的方法和装置
CN103177080B (zh) 文件预读的方法和装置
CN116303034A (zh) 一种片上网络的自动测试系统、方法、设备及介质
CN107451202B (zh) 一种数据访问方法及设备
CN112583743B (zh) 一种分布式文件交换方法及装置
WO2024108940A1 (zh) 一种性能监管方法、装置、系统、设备和介质
CN112947964A (zh) 一种芯片的固件更新方法、装置、设备及存储介质
CN112650674A (zh) 远程获取、调试网页日志的方法、计算机设备及存储介质
CN111949537A (zh) 接口的测试方法、装置、设备和介质
CN115604095A (zh) 网络设备配置方法及系统
CN112328287B (zh) 嵌入式设备系统更新方法、装置、设备及存储介质
CN112615857B (zh) 网络数据处理方法、装置与系统
CN113626139A (zh) 一种高可用的虚拟机存储方法及装置
CN117130639B (zh) 一种bmc集群管理单板mcu固件升级方法及系统
CN111352992B (zh) 数据一致性检测方法、装置及服务器
CN110673710B (zh) 一种服务器机箱复位方法、装置、设备、介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20886901

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20886901

Country of ref document: EP

Kind code of ref document: A1

122 Ep: pct application non-entry in european phase

Ref document number: 20886901

Country of ref document: EP

Kind code of ref document: A1