Call chain anomaly detection method, computer equipment and readable storage medium
An anomaly detection and call chain technology, applied in the computer field, can solve the problems of dependency, inability to detect structural anomalies, and inability to support fine-grained root cause location.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0038] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.
[0039] A call chain anomaly detection method of the present application will be described below with reference to the accompanying drawings.
[0040] The input of the call chain anomaly detection problem refers to the call chain data; the output of the call chain anomaly detection problem refers to whether each call chain is abnormal and the specific abnormal part;
[0041] figure 1 Process each call chain in the embodiment of this application into a graph composed of spans, specifically, as figure 1 As shown, each square ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


