Network request log chained tracking method, full-link call monitoring system and medium

A network request and monitoring system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as analysis, benchmark data support, segmented performance, etc., to achieve efficient dumping, performance improvement, and work. The effect of efficiency

Pending Publication Date: 2021-07-02
开鑫科技信息服务(南京)有限公司
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] 1. The traditional log monitoring method has a coarse granularity, and it is impossible to see inside the method, and the cost of fault location is high;
[0010] 2. With the advancement of service transformation, the complexity of interaction between systems has increased exponentially. The traditional monitoring system focuses on a single system rather than the overall situation, and cannot build a monitoring link from the user operation portal to the underlying service. When locating problems, it often It is difficult to trace back to the root application;
[0011] 3. In terms of performance optimization, traditional monitoring methods and means cannot conduct overall and segmented performance analysis of the complete call chain, and cannot provide benchmark data support for system performance optimization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network request log chained tracking method, full-link call monitoring system and medium
  • Network request log chained tracking method, full-link call monitoring system and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0046] A network request log chain tracking method, comprising

[0047] Dot and mark call chain units to form tree nodes;

[0048] Through the data information collected by the call chain unit, the tree nodes of the upper-lower call relationship on the call track of the call chain unit are constructed into a tracking tree;

[0049] When a problem occurs at a certain node in the tracking tree, the information corresponding to the calling chain unit is provided.

[0050] The "dot marking" adopts interceptors or embedding points at the frame level.

[0051] The implantation is done by marking each call inside and outside the application (RPC level, after we use the interceptor based on the AOP mechanism, we don’t even need to change to the existing PRC framework) The current call chain unit.

Embodiment 2

[0053] refer to figure 1 and figure 2 , a full link call monitoring system, including

[0054] The data collection client uses the method described in the first embodiment of the claim to mark the call relationship of the log of the application component, provides the call chain data collection service, and lands the track data to the local file system;

[0055] The data transmission end receives, normalizes, and stores the trajectory data into the database and retrieval server; and

[0056] The display terminal provides call chain retrieval, call chain display and storage service monitoring functions.

[0057] in

[0058] The data collection client (TalosAgent) is based on AOP technology, and the host application only needs simple configuration and annotation to complete the data collection and management work, and the learning cost and implementation cost are extremely low;

[0059] The trajectory data is finally landed to the local file system based on Logback (open sour...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computer software, in particular to a network request log chained tracking method, a full-link call monitoring system and a medium, and the method comprises the following steps: dotting and marking call chain units to form tree nodes; through the data information collected by the call chain units, forming tree nodes of a hierarchical calling relation on a calling track of the call chain unit into a tracking tree; and when a certain node in the tracking tree goes wrong, providing information of the corresponding call chain unit. According to the invention, the performance of data acquisition and dump can be improved, and a dotting mechanism can avoid overlarge workload caused by data acquisition and dotting; meanwhile, data collection is divided into two parts, and when an external system breaks down, the stability of host application cannot be affected; during application, data can be completely and efficiently dumped, and the integrity of the whole function is not affected when a single node breaks down; and furthermore, through a storage service monitoring function, when the data dump end is abnormal, the data dump end can be sensed and processed in time.

Description

technical field [0001] The invention relates to the technical field of computer software, in particular to a network request log chain tracking method, a full link call monitoring system and a medium. Background technique [0002] Along with the needs of business development in various industries, industry technology systems are also evolving towards larger and more complex directions, especially in recent years SOA architecture (Service-Oriented Architecture) is a component model that combines different functions of applications Units (called services) are split and connected through well-defined interfaces and protocols between these services. SOA is a widely used distributed system architecture) and the overall promotion and popularization of microservice architecture. The included applications grow exponentially, while the complexity of the monitoring and maintenance work corresponding to the overall system increases exponentially. [0003] In order to locate applicatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26
CPCH04L41/069H04L43/08
Inventor 柳昆
Owner 开鑫科技信息服务(南京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products