ELK-based log burying point service analysis alarm system and method

A business analysis and alarm system technology, applied in the field of data processing, can solve problems such as poor scalability of applications

Pending Publication Date: 2020-08-25
重庆富民银行股份有限公司
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention aims to provide a business analysis and alarm system and method based on ELK-based log buried points, which can solve the problem of poor scalability of application programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ELK-based log burying point service analysis alarm system and method
  • ELK-based log burying point service analysis alarm system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] Such as figure 1 As shown, a business analysis and alarm system based on ELK-based log embedding includes a business system for performing business operations and saving business data, and generating original business log information; it also includes a data acquisition module, a preprocessing module, and a processing module , analysis module and output module, where:

[0041] The data collection module is used to collect the original log information of the business system;

[0042] The preprocessing module is used to receive the original log information and serialize the format of the original log information, read the application name, business indicators, application operating environment information, operating server and business occurrence time stamp of the original log information in the business system, and generate standard log information;

[0043] The processing module is used to collect standard log information through Logstash and push it to Elasticsearch,...

Embodiment 2

[0054] Compared with Embodiment 1, the only difference is that the preprocessing module in the business analysis alarm system is also used to determine whether the standard log information is qualified after the original log information is formatted and serialized to generate standard log information; If it is qualified, the standard log information will be output to Logstash for collection; if it is unqualified, the standard log information will be temporarily stored in the database, and the original log information will be extracted again to perform format serialization to determine whether the results of the two format serializations are consistent , if the content is the same, an alarm prompt will be generated; if it is different, the standard log information will be forwarded to Logstash;

[0055] Correspondingly, based on this system, the following steps are specifically included after step S2 in this embodiment: S21, judge whether the standard log information generated a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of data processing, in particular to an ELK-based log burying point service analysis alarm system, which comprises a service system used for executing service operation, storing service data and generating original log information of service; the system further comprises a data collection module, a preprocessing module, a processing module, an analysis module andan output module, and the data collection module is used for collecting original log information of a service system; the preprocessing module is used for receiving the original log information and performing format serialization on the original log information to generate standard log information; the processing module is used for collecting standard log information through Logstash, pushing thestandard log information to Elasticsearch, and aggregating the standard log information through Elasticsearch; the analysis module is used for processing the standard log information on the Elasticsearch according to a pre-configured alarm rule and generating an alarm push; and the output module is used for receiving and displaying the alarm push; by adopting the system, the problem of poor expansibility of the application program can be solved.

Description

technical field [0001] The invention relates to the field of data processing, in particular to an ELK-based log embedding business analysis alarm system and method. Background technique [0002] Business is the key to an enterprise. With the development of society, network technology and information technology are widely used in the operation of modern enterprises; And analysis functions, for example, require users to input certain conditions, query data or generate analysis reports, etc.; and these information often lag behind the reality, and problems cannot be found in time, causing enterprises to miss opportunities and suffer unnecessary losses. Enterprises not only need to view and analyze past data, but also want to know the changes of various data in the current real-time state, and hope to get prompts or receive alarm information at the first time. [0003] In this regard, Chinese Patent Publication No. CN110851321A discloses a service alarm method, device and stora...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F11/32
CPCG06F11/3082G06F11/327
Inventor 袁潇
Owner 重庆富民银行股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products