Supercharge Your Innovation With Domain-Expert AI Agents!

Log collector configuration method, device and system

A configuration method and collector technology, applied in the Internet field, can solve problems such as server security accidents, achieve the effects of ensuring security, preventing server password leakage, and avoiding direct login to the server

Active Publication Date: 2020-04-07
BEIJING GRIDSUM TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of this application is to provide a log collector configuration method, device and system to solve the problem in related technologies that manual configuration of log collectors by operation and maintenance personnel is prone to server security accidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log collector configuration method, device and system
  • Log collector configuration method, device and system
  • Log collector configuration method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] According to an embodiment of the present application, a method for configuring a log collector is provided.

[0028] figure 1 is a flow chart of a log collector configuration method according to Embodiment 1 of the present application. Such as figure 1 As shown, the method includes the following steps:

[0029] Step S101, selecting a target host, where the target host is a host for which a log collector needs to be configured.

[0030] The above-mentioned target host can be one or more. For example, if there are 100 servers, you need to configure log collectors to select 50 of them.

[0031] Step S102, determine the location of the log file on the target host, and determine the parsing rules for the log file on the target host according to the log type of the target host.

[0032]The above address of the log file on the target host may be input by the user, and the addresses of the log files of different target hosts may be different. For example, the log file ad...

Embodiment 2

[0041] figure 2 It is a flowchart of a log collector configuration method according to Embodiment 2 of the present application. Such as figure 2 As shown, the method includes the following steps:

[0042] Step S201, receiving the configuration request sent by the client, wherein the configuration request carries the information of the target host, the address information of the log file on the target host, and the information of the parsing rules of the log file on the target host, and the target host needs to be configured The host of the log collector.

[0043] Step S202, acquiring a target template corresponding to the configuration request.

[0044] On the server side, through some pre-defined templates, the target template is selected based on the configuration request. It should be noted that different configuration requests will match different templates on the server side.

[0045] Step S203, rendering the target template based on the configuration request to ge...

Embodiment 3

[0053] According to an embodiment of the present invention, there is also provided a system for implementing the log collector configuration method of the first and second embodiments above, such as image 3 As shown, the system includes: a client 301 , a server 302 and a target host 303 .

[0054] Specifically, the client 301 is used to select the target host, determine the address of the log file on the target host, and determine the parsing rules of the log file on the target host according to the log type of the target host, and trigger a configuration request to the server, wherein the target host is The host that needs to configure the log collector, the configuration request carries the information of the target host, the address information of the log file on the target host, and the information of the parsing rules of the log file on the target host;

[0055] The server 302 is configured to receive the configuration request sent by the client, render the target templa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a log collector configuration method, device and system. The method comprises the steps that a target host is selected, and the target host is a host needing to be provided with a log collector; determining the address of the log file on the target host, and determining an analysis rule of the log file on the target host according to the log type of the target host; and triggering a configuration request to a server to enable the server to generate a configuration file based on the configuration request to configure a log collector of the target host, the configurationrequest carrying information of the target host, information of an address where a log file on the target host is located, and information for determining an analysis rule of the log file on the target host. By means of the log collection method and device, the problem that in the prior art, server safety accidents are likely to happen due to the fact that operation and maintenance personnel manually configure log collectors is solved.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular, to a configuration method, device and system of a log collector. Background technique [0002] Log data is an important data resource that exists in any software system, and log data collection is a basic service provided by Platform as a Service. Based on the log data, development and business personnel can monitor the system, audit operations, and analyze log data. The log collector that collects log data is a program running on the client. By modifying the configuration file of the log collector, the log collector can collect different log files and perform different processing. [0003] The policy configuration of the log collector changes with changes in the software system and business. When changing the configuration of the log collector, the usual practice is for the operation and maintenance personnel to manually modify the configuration file of the log col...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/17G06F16/18H04L12/24H04L29/08
CPCH04L41/069H04L67/30Y02D10/00
Inventor 游剑涛
Owner BEIJING GRIDSUM TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More