Log classified storage method and device
A log and type technology, applied in the information field, can solve the problems of increasing log storage and warehousing time, increasing gatekeeper business throughput, etc., to improve readability and operability, fast processing speed, The effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0070] image 3 A flowchart of a method for processing logs by a business log processing program according to Embodiment 1 of the present application is schematically shown.
[0071] Such as image 3 As shown, the method for processing business logs by the business log processing program in Embodiment 1 of the present application may include the following steps:
[0072] Step S301: For the logs of the business type, use the regular matching technology to filter out the logs with the correct format, and then insert the filtered logs into the ring buffer queue.
[0073] Specifically, the business log processing program mainly processes system logs, management logs, business logs, and tracking logs; Incorrectly wait for the log, and truncate the super long log content to facilitate storage. Well-formed logs are inserted into a pre-built ring buffer queue; when the ring buffer queue is full, subsequent logs are discarded.
[0074] Preferably, in this step, a log data block of ...
Embodiment 2
[0096] Embodiment 2 of the present application describes a scheme for processing alarm logs by an alarm log processing program.
[0097] Generally, alarm logs are divided into eight subtypes: virus alarms, attack alarms, hardware exceptions, system exceptions, resource exceptions, configuration changes, log alarms, and policy alarms. Each sub-type alarm log is individually identified by the type (type) flag, and the status change of the alarm log is identified by the status (state) flag, such as the resource exception type alarm log, taking the cpu alarm log as an example, The status flag is high (high) / mid (mid) / low (low); another example is the system abnormal alarm log, taking the network card alarm log as an example, the status flag is fault (fault) / recovery (recover).
[0098] Figure 5 A flowchart of a method for processing logs by an alarm log processing program according to Embodiment 2 of the present application is schematically shown.
[0099] Such as Figure 5 As...
Embodiment 3
[0125] Image 6 A flowchart of a method for processing logs by a kernel log processing program according to Embodiment 2 of the present application is schematically shown.
[0126] The processing method of the kernel log is similar to that of the alarm log, such as Image 6 As shown, the method for processing kernel logs by the kernel log processing program in Embodiment 3 of the present application may include the following steps:
[0127] Step S601: For the logs of the kernel type, use the regular matching technology to filter out the logs with the correct format.
[0128] In this step, the kernel log processing program uses the regular matching technology to filter out the logs with the correct format for the logs of the kernel type, and the method of filtering out the dirty logs can be the same as the above image 3 The method for filtering logs in step S301 is the same, and will not be repeated here.
[0129] Further, for the filtered kernel logs with the correct forma...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


