Log protecting method based on distribution modes

A log and pattern technology, applied in the direction of digital data protection, generation of response errors, error detection of redundant data in calculations, etc., can solve problems such as difficulty in finding log sequences, no backup, no access rights, etc., and achieve log The content is continuous, ensuring continuity, and realizing the effect of authority access control

Active Publication Date: 2014-05-14
SUNINFO INFORMATION TECH
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1. Generally, only one copy is stored, and there is no backup;
[0004] 2. Only for administrator users, other users generally have no access rights;
[0005] 3. Only valid for the current system
For example, if the device name of freebsd changes with the user's hot plugging, the corresponding log of the device name will also change. It will become very difficult to find all the log sequences of the same device.
[0006] 4. For some embedded systems, the log disappears with the restart of the system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log protecting method based on distribution modes

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention will be further described below in conjunction with specific examples.

[0029] see figure 1 , a kind of log protection method based on distribution pattern of the present invention, comprises steps:

[0030] First, set log storage areas and corresponding log storage paths on multiple storage media;

[0031] Next, generate the log content;

[0032] Then, the log processing step is carried out: simplifying and replacing the log content to form a log file;

[0033] Wherein, the simplified processing steps include the steps of: extracting event type information, operation record information and post-operation storage pool status information of log content; outputting to a log storage path and storing.

[0034] The replacement processing step further includes the step of: adding disk information corresponding to the device after each device name in the log content, and the disk information includes serial number information and slot number informati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a log protecting method based on distribution modes. The method includes the steps: setting log storage areas and corresponding log storage paths on a plurality of storage media; generating log contents; log processing. Log processing steps include: simplifying and replacing the log contents to form log files; outputting the log files to the plurality of log storage paths respectively and storing the log files; setting corresponding user rights for the stored log files according to the log storage paths; when a log file in a first log storage path cannot be read, calling a log file in a second log storage path for restoring. The log protecting method based on the distribution modes has the advantages of high safety, accuracy in error positioning, controllability in access right and continuity keeping.

Description

technical field [0001] The invention relates to a log protection method, in particular to a log protection method based on a distribution mode. Background technique [0002] All existing computer operating systems have system and service program logs, which have the following disadvantages: [0003] 1. Generally, only one copy is stored, and there is no backup; [0004] 2. Only for administrator users, other users generally have no access rights; [0005] 3. It is only valid for the current system. That is, the records in the log are generated by the current system, and the log information depends on the current system. Once the internal system changes, the information in the log records also changes accordingly, so the continuity of the log will be impacted. For example, the device name of freebsd changes with the user's hot plugging, and the corresponding log of the device name also changes. It will become very difficult to find all the log sequences of the same device...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/14G06F11/34G06F21/62
Inventor 曾洪宁
Owner SUNINFO INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products