Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Log call chain generation method and device

A call chain and log technology, which is applied in the computer field, can solve the problems of automatically generating log call chain solutions and no effective centralized management, so as to ensure the safety of use and avoid intrusion

Pending Publication Date: 2021-03-30
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the embodiment of the present invention provides a log call chain generation method and device, which can at least solve the problems in the prior art that there is no effective centralized log management and automatic generation of log call chain solutions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log call chain generation method and device
  • Log call chain generation method and device
  • Log call chain generation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Exemplary embodiments of the present invention are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present invention to facilitate understanding, and they should be regarded as exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.

[0038] For the words involved in the present invention, explain as follows:

[0039] Security log: Every time the machine is turned on and off, the program is run, and the system reports an error, the information will be recorded and saved in the log file.

[0040] Bytecode instrumentation technology: use Javaagent and Javassist to dynamically reconstruct Class bytes and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a log call chain generation method and device, and relates to the technical field of computers. One specific embodiment of the method comprises the steps of generating an identification code according to an identifier of equipment where an application is located and a current timestamp; monitoring the transmission sequence of the identification codes among the application modules; and extracting logs corresponding to the identification codes in each application module, and permuting and combining the extracted logs according to the transmission sequence to obtain a logcall chain. According to the embodiment, the logs in the log servers are automatically extracted by utilizing the identification codes, and the logs are sorted according to the transmission sequence of the identification codes among the application modules, so that automatic generation of the log calling chain is realized, and a basis is provided for log centralized filing and abnormal log positioning.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for generating a log call chain. Background technique [0002] Logs mainly include system logs, application logs, and security logs. System operation and maintenance and developers can use logs to understand server software and hardware information, check errors in the configuration process and the causes of errors, so as to take timely measures to correct errors. [0003] The Internet adopts distributed applications, and the system in the application is split into multiple different application modules. Therefore, a complete operation process (that is, a call chain) will involve calling multiple different application modules, and the logs output by different application modules will be scattered and stored in different log servers. [0004] In the process of realizing the present invention, the inventor finds that there are at least the following problems...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34
CPCG06F11/3476
Inventor 胡锋
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products