Unlock instant, AI-driven research and patent intelligence for your innovation.

Log classified storage method and device

A log and type technology, applied in the information field, can solve the problems of increasing log storage and warehousing time, increasing gatekeeper business throughput, etc., to improve readability and operability, fast processing speed, The effect of improving efficiency

Pending Publication Date: 2021-09-21
BEIJING QIANXIN TECH +1
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the business throughput of the network gateway is increasing day by day, and the volume of various business and system logs has also doubled, and it takes more and more time to store a large number of logs.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Log classified storage method and device
  • Log classified storage method and device
  • Log classified storage method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0070] image 3 A flowchart of a method for processing logs by a business log processing program according to Embodiment 1 of the present application is schematically shown.

[0071] Such as image 3 As shown, the method for processing business logs by the business log processing program in Embodiment 1 of the present application may include the following steps:

[0072] Step S301: For the logs of the business type, use the regular matching technology to filter out the logs with the correct format, and then insert the filtered logs into the ring buffer queue.

[0073] Specifically, the business log processing program mainly processes system logs, management logs, business logs, and tracking logs; Incorrectly wait for the log, and truncate the super long log content to facilitate storage. Well-formed logs are inserted into a pre-built ring buffer queue; when the ring buffer queue is full, subsequent logs are discarded.

[0074] Preferably, in this step, a log data block of ...

Embodiment 2

[0096] Embodiment 2 of the present application describes a scheme for processing alarm logs by an alarm log processing program.

[0097] Generally, alarm logs are divided into eight subtypes: virus alarms, attack alarms, hardware exceptions, system exceptions, resource exceptions, configuration changes, log alarms, and policy alarms. Each sub-type alarm log is individually identified by the type (type) flag, and the status change of the alarm log is identified by the status (state) flag, such as the resource exception type alarm log, taking the cpu alarm log as an example, The status flag is high (high) / mid (mid) / low (low); another example is the system abnormal alarm log, taking the network card alarm log as an example, the status flag is fault (fault) / recovery (recover).

[0098] Figure 5 A flowchart of a method for processing logs by an alarm log processing program according to Embodiment 2 of the present application is schematically shown.

[0099] Such as Figure 5 As...

Embodiment 3

[0125] Image 6 A flowchart of a method for processing logs by a kernel log processing program according to Embodiment 2 of the present application is schematically shown.

[0126] The processing method of the kernel log is similar to that of the alarm log, such as Image 6 As shown, the method for processing kernel logs by the kernel log processing program in Embodiment 3 of the present application may include the following steps:

[0127] Step S601: For the logs of the kernel type, use the regular matching technology to filter out the logs with the correct format.

[0128] In this step, the kernel log processing program uses the regular matching technology to filter out the logs with the correct format for the logs of the kernel type, and the method of filtering out the dirty logs can be the same as the above image 3 The method for filtering logs in step S301 is the same, and will not be repeated here.

[0129] Further, for the filtered kernel logs with the correct forma...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a log classified storage method and device. The method comprises the steps: classifying collected logs according to key fields in the logs; and respectively sending the classified logs of different types to corresponding log processing programs for parallel processing, and storing the processed logs into a database. In the technical scheme provided by the invention, different types of logs are respectively sent to the corresponding log processing programs for parallel processing, so that the efficiency of storing the logs into the database can be improved; in addition, different types of logs are stored respectively, and the readability and operability of the whole log system can be improved.

Description

technical field [0001] The present application relates to the field of information technology, and in particular to a log classification storage method and device, computer equipment, and a computer-readable storage medium. Background technique [0002] At present, the business of data synchronization through the security isolation gatekeeper is developing in a diversified form, and the demand for data exchange is increasing day by day, such as video data exchange, WEB service data exchange, etc., which are typically characterized by a large amount of data exchange and require timely and efficient. How to verify the integrity of data transmitted through the gatekeeper, it is particularly important to build a complete log audit system, not only to ensure that business-related log information is retained in the system, but also to meet the needs of efficient and real-time recording. [0003] However, the business throughput of the gatekeeper is increasing day by day, and the v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/22G06F16/242G06F16/28G06F16/18
CPCG06F16/2282G06F16/2433G06F16/285G06F16/1815
Inventor 苏里王勇刘锦锋
Owner BEIJING QIANXIN TECH