Log processing method and device, computer equipment and storage medium

A processing method and log technology, applied in the computer field, can solve problems such as difficulty in configuration file management and maintenance, and achieve the effect of improving flexibility and applicability, and improving rationality and reliability

Pending Publication Date: 2021-02-02
武汉悦学帮网络技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when using the above method to monitor abnormal logs and issue alarms, configuration files need to be added according to the alarm rules of e

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log processing method and device, computer equipment and storage medium
  • Log processing method and device, computer equipment and storage medium
  • Log processing method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0080]In order to facilitate the understanding of this embodiment, an application scenario of a log processing method disclosed in an embodiment of the present disclosure is firstly introduced, for example figure 1 As shown in , it is a schematic diagram of an application scenario of a log processing method provided by an embodiment of the present disclosure. The user logs in to the application server 12 through the application client installed in the terminal device 11, wherein the application client can be a web browser, or an application client installed in a terminal device, such as a mobile phone, a tablet computer, etc., or Web pages or applets embedded in applications, etc. The communication connection between the terminal device 11 and the application server 12 is through a network, and the network may be a local area network, a cellular network, a wide area network, or the like. The terminal device 11 can be a portable device (such as a mobile phone, a tablet, a note...

Embodiment 2

[0084] The log processing method provided by the embodiment of the present disclosure will be described below by taking the execution subject as a computer device as an example.

[0085] like figure 2 As shown, it is a flow chart of a log processing method provided by an embodiment of the present disclosure, which may include the following steps:

[0086] S201: Obtain logs to be processed.

[0087] During specific implementation, when the application generates abnormal pending logs during operation, the local log collector Filebeat collects each abnormal pending log generated by the application and sends it to the Kafka message queue for storage, wherein, The purpose of storing pending logs in the Kafka message queue is to prevent the application from generating too many abnormal pending logs within a certain period of time. Sending them directly to the application server may cause the application server to go down and cause confusion in application functions. Furthermore, ...

Embodiment 3

[0125] like image 3 As shown, it is a flowchart of a specific implementation process of a log processing method provided by an embodiment of the present disclosure, which may include the following steps:

[0126] S301: Obtain an exception log.

[0127] In this step, when the application generates abnormal logs during operation, filebeat collects them and sends them to the Kafka message queue for storage. Further, the application server obtains the abnormal logs stored in the Kafka message queue.

[0128] S302: Parse the exception log, and store the exception log in the ES.

[0129] During specific implementation, the acquired exception log is analyzed to obtain the generation attribute information and exception content of the exception log.

[0130]S303: Determine whether an exception shielding condition can be acquired based on the generation attribute information of the exception log.

[0131] During specific implementation, if the abnormality masking condition can be ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a log processing method and device, computer equipment and a storage medium, and the method comprises the steps of: acquiring a to-be-processed log; based on the generation attribute information of the to-be-processed log, acquiring an alarm condition which is input by a user and is used for alarming an abnormal log; determining first log attribute information, correspondingto the alarm condition, of the to-be-processed log; and when the first log attribute information satisfies the alarm condition, generating alarm information for the to-be-processed log based on the first log attribute information. According to the embodiment of the invention, alarm judgment is performed on the to-be-processed log according to the acquired alarm condition of the to-be-processed log input by the user and the acquired attribute information of the to-be-processed log, so that the alarm condition of the abnormal log can be managed and set by the user, and the configuration flexibility and applicability of the alarm condition are improved, and the reasonability of the alarm result is improved.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular, to a log processing method, device, computer equipment and storage medium. Background technique [0002] There are generally two purposes for recording logs in an application: Troubleshooting (problem tracking) and displaying the running status of the program. A good log recording method can not only accurately locate the problem, but also ensure the simplicity of the recording method. Therefore, the use of the application log alarm platform can quickly help administrators find application running problems and solve them in a timely manner. [0003] The existing application log alarm platform uses filebeat (log data collector) to collect abnormal logs generated during application operation and sends them to ELK (Elasticsearch, Logstash, Kibana, three open source frameworks) for storage, and then uses ElastAlert (alarm Framework) to query the stored exception log rec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/30G06F11/32
CPCG06F11/3065G06F11/327
Inventor 丁志翔付星
Owner 武汉悦学帮网络技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products