Operating method of log system

An operation method and log technology, applied in the computer field, can solve problems such as no hook, uncontrollable, and inconvenient troubleshooting, and achieve the effects of saving resources, increasing controllability, and reducing call overhead

Inactive Publication Date: 2010-08-11
天柏宽带网络技术(北京)有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] ACE's Logging Facility provides a macro interface. Although it supports process scope and thread scope, it does not directly provide the printing interface of instantiated classes, but uses macros instead. Although it is simple and efficient, it is not flexible enough to use and cannot be used for process-level logs. , that is, the finest range granularity is the thread level; although log4cplus is object-oriented, the control of log size, cycle, and number is realized by passive objects, which is not efficient enough, and the size control and cycle control cannot be concurrent, which is not flexible enough
[0005] For the 8-level syslog log of the Linux / Unix series, it does not have the characteristics of one-to-one correspondence, which is not convenient for troubleshooting; the configuration of different logs cannot be shared between processes; the log system cannot be configured and made effective when the process is running; It cannot exist as a network log server but can only exist as a network log client; it does not have the ability to connect different business processes; because it is a third-party open source log system, it is uncontrollable and not conducive to maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operating method of log system
  • Operating method of log system
  • Operating method of log system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0040] This log system is developed with C++, using the OOD design method, the interface is small and complete, the encapsulation is good, the members are as private as possible, and it has certain fault tolerance and intelligence. Easy to develop and easy to maintain. The log function borrows from the mainstream log system, and on this basis, it is simplified (removing the callback function, lexical analysis, and layout), and at the same time, it adds functions that it does not have (periodic backup, backup when the log file is switched, log when the system starts Backup; the log file generation cycle is more detailed, divided into years, months, weeks, days, hours, and minutes; the log level is more detailed, subdivided from the common 5-level log to 8-level log, and is compatible with syslog; obj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation method for a log system, which comprises the steps of: inspecting the configuration of the log system and initializing network; judging whether syslog warning is sent or not; if so, connecting the syslog warning to a remote server; if not, judging whether archive and backup are necessary or not; if so, mounting archive and backup of handle and starting queue processing thread; if not, obtaining the serial number of log files; judging whether log file backup is necessary or not; if so, joining the backup information in a queue; if not, drawing back log monitoring thread, starting the thread of an acceptor of a transmission control protocol / datagram protocol and saving the physical address and a data member of an object in a shared memory. By adopting the technical proposal of the invention, the monitoring is convenient, faults are timely discovered, calling method is convenient and flexible, and the method of the invention is easy to use and beneficial to maintenance and has complete and practical functions.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to an operation method of a log system. Background technique [0002] In the field of computer software, the log system has been paid more and more attention by people. A powerful log can help to troubleshoot and observe the operation of the system. The two important functions of the log are: auditing and monitoring. The log file can record various events that occur in the system every day in detail, and the user can check the cause of the error through the log file. [0003] Now, there are many open source log systems such as: log4cplus, ACE's Logging Facility, etc., which have the characteristics of thread safety, flexibility, hierarchical display, etc., and can face the whole life cycle of program debugging, operation, testing, and maintenance, and can choose to output information to Screens, files, system logs (such as syslog under Linux), and even remote servers. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24H04L29/08H04L12/26
Inventor 纳君辛宇何易王仁强张剑寅
Owner 天柏宽带网络技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products