Log alarm method and device
A technology of an alarm device and a log, applied in the database field, can solve the problem of insufficient real-time performance of database exception handling, and achieve the effect of solving the problem of insufficient real-time performance and improving real-time performance.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0028] see figure 1 , the embodiment of the present application provides an electronic device 10 . The electronic device 10 can be a personal computer (personal computer, PC), a tablet computer, a smart phone, a personal digital assistant (personal digital assistant, PDA), etc., or the electronic device 10 can be a network server, a database server, a cloud server, or a plurality of sub-servers Formed server integration, etc.
[0029] see figure 1 , the electronic device 10 may include: a memory 111 , a communication module 112 , a bus 113 and a processor 114 . Wherein, the processor 114 , the communication module 112 and the memory 111 are connected through a bus 113 . The processor 114 is used to execute executable modules, such as computer programs, stored in the memory 111 . figure 1 The components and structure of the electronic device 10 shown are only exemplary, not limiting, and the electronic device 10 may also have other components and structures as required.
...
no. 2 example
[0035] see figure 2 , a time sequence flow chart of a log alarm method provided in the second embodiment of the present application. The log alarm method includes: step S11, step S12, step S13 and step S14.
[0036] Step S11: Obtain exception logs.
[0037] Step S12: Determine the exception and the severity level of the exception log.
[0038] Step S13: Based on the abnormality type and the abnormality severity level, match the abnormality type and the abnormality severity level with a first preset abnormality type and a preset abnormality alarm level respectively.
[0039] Step S14: According to the matching result, determine the abnormal log alarm information corresponding to the abnormal type.
[0040] The flow of the log alarm method will be described in detail below.
[0041] Step S11: Obtain exception logs.
[0042] The exception log is used to record the abnormal information of the database. The abnormal information of the database includes: the absence of tables ...
no. 3 example
[0078] see image 3 , image 3 A structural block diagram of a log alarm device 20 provided in this embodiment, the log alarm device 20 includes:
[0079] Obtaining module 210, configured to obtain exception logs.
[0080] The log analysis module 220 is configured to determine the abnormal type of the abnormal log, and determine the abnormal severity level of the abnormal log according to the abnormal type.
[0081] The matching module 230 is configured to match the exception type and the exception severity level with the first preset exception type and the second preset exception severity level respectively based on the exception type and the exception severity level.
[0082] The judging module 240 is used to judge whether the abnormal log corresponding to the abnormal type is sent to the target user terminal for the first time in the alarm information sending record; if the judgment result is that the abnormal log corresponding to the abnormal type is in the alarm informa...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



