Unlock instant, AI-driven research and patent intelligence for your innovation.

Log alarm method and device

A technology of an alarm device and a log, applied in the database field, can solve the problem of insufficient real-time performance of database exception handling, and achieve the effect of solving the problem of insufficient real-time performance and improving real-time performance.

Pending Publication Date: 2019-05-10
GUIYANG LONGMASTER INFORMATION & TECHNOLOGY CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of this application is to provide a log alarm method and a log alarm device, so as to effectively improve the technical defect that the real-time performance of the above-mentioned abnormal processing of the database is not high enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log alarm method and device
  • Log alarm method and device
  • Log alarm method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0028] see figure 1 , the embodiment of the present application provides an electronic device 10 . The electronic device 10 can be a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA), etc., or the electronic device 10 can be a network server, a database server, a cloud server, or a plurality of sub-servers Formed server integration, etc.

[0029] see figure 1 , the electronic device 10 may include: a memory 111 , a communication module 112 , a bus 113 and a processor 114 . Wherein, the processor 114 , the communication module 112 and the memory 111 are connected through a bus 113 . The processor 114 is used to execute executable modules, such as computer programs, stored in the memory 111 . figure 1 The components and structure of the electronic device 10 shown are only exemplary, not limiting, and the electronic device 10 may also have other components and structures as required.

...

no. 2 example

[0035] see figure 2 , a time sequence flow chart of a log alarm method provided in the second embodiment of the present application. The log alarm method includes: step S11, step S12, step S13 and step S14.

[0036] Step S11: Obtain exception logs.

[0037] Step S12: Determine the exception and the severity level of the exception log.

[0038] Step S13: Based on the abnormality type and the abnormality severity level, match the abnormality type and the abnormality severity level with a first preset abnormality type and a preset abnormality alarm level respectively.

[0039] Step S14: According to the matching result, determine the abnormal log alarm information corresponding to the abnormal type.

[0040] The flow of the log alarm method will be described in detail below.

[0041] Step S11: Obtain exception logs.

[0042] The exception log is used to record the abnormal information of the database. The abnormal information of the database includes: the absence of tables ...

no. 3 example

[0078] see image 3 , image 3 A structural block diagram of a log alarm device 20 provided in this embodiment, the log alarm device 20 includes:

[0079] Obtaining module 210, configured to obtain exception logs.

[0080] The log analysis module 220 is configured to determine the abnormal type of the abnormal log, and determine the abnormal severity level of the abnormal log according to the abnormal type.

[0081] The matching module 230 is configured to match the exception type and the exception severity level with the first preset exception type and the second preset exception severity level respectively based on the exception type and the exception severity level.

[0082] The judging module 240 is used to judge whether the abnormal log corresponding to the abnormal type is sent to the target user terminal for the first time in the alarm information sending record; if the judgment result is that the abnormal log corresponding to the abnormal type is in the alarm informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a log alarm method and device, and relates to the technical field of databases. The method comprises the steps of obtaining an abnormal log; determining an exception type and an exception severity level of the exception log; Based on the exception type and the exception severity level, respectively matching the exception type and the exception severity level with a first preset exception type and a preset exception alarm level; and according to the matching result, determining abnormal log alarm information corresponding to the abnormal type. And determining that the abnormal type and the abnormal severity level corresponding to the abnormal content are respectively matched with the first preset abnormal type and the preset abnormal alarm level based on the abnormal log content, so that the instantaneity of processing the abnormal log can be effectively improved.

Description

technical field [0001] The present application relates to the technical field of databases, in particular, to a log alarm method and device. Background technique [0002] At present, the independent voice platform distributed across the country, when there are database exceptions such as server exceptions, lack of tables, or insufficient storage space, the relevant maintenance personnel cannot be informed of the abnormal situation in the fastest time and deal with it in a timely manner, resulting in system usage problems. adverse consequences such as interruptions, user complaints, data loss, or business volume decline. When catching database exceptions, due to too many distribution points, maintenance personnel need to spend a lot of time looking for the specific area where the exception log is sent in many distribution points, and spend time finding the relevant maintenance personnel responsible for handling this type of abnormal problem , so because exception logs are of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F11/32
Inventor 贺改梅牛杰柏竞男付清文
Owner GUIYANG LONGMASTER INFORMATION & TECHNOLOGY CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More