A distributed system data collection method and data signature generation method
A distributed system and data collection technology, applied in the transmission system, digital transmission system, digital data protection, etc., can solve the problems of information collection that cannot be distributed, and the overall bandwidth, performance, and data loss of the distributed system. Achieve the effect of maximum preservation of the log system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
specific Embodiment 1
[0049] A distributed system data collection method, the specific method is:
[0050] After the application system is started, a separate data acquisition module thread is initialized to be responsible for the data output of the application system; each time the application system calls the data acquisition interface, it calls a write thread and immediately returns the write request; the write thread calls the operating system The file read and write interface, write the data to the configured local disk directory;
[0051] Every certain set time through the file operation interface, query all the files under the configured destination disk directory. If the content in the file is updated, it will be split into two or more parts according to the configuration according to the flow control logic. Each Some call the encryption function separately, encrypt the data and report it;
[0052] The flow control logic is: according to the maximum transmission unit (MTU) configured by th...
specific Embodiment 2
[0071] On the basis of the specific embodiment 1, the method further includes: initializing a single thread of the data collection module through a singleton mode, which can avoid resource overhead caused by concurrency, and at the same time avoid data conflicts that may be caused by concurrency.
specific Embodiment 3
[0073] On the basis of the specific embodiment 1 or 2, said encrypting the data and then reporting is to send the data to the central data bus through the TCP network communication protocol after encrypting the data.
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More