Distributed system call chain and log fusion anomaly detection method

A distributed system and anomaly detection technology, applied in character and pattern recognition, response error generation, instruments, etc., can solve the problems of poor log anomaly detection technology and difficulty in distributed system anomaly detection, etc., and achieve good generalization capabilities, improved anomaly detection accuracy, and increased speed and scope

Pending Publication Date: 2022-04-08
FUDAN UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is cross-process interaction in distributed systems, which makes traditional log anomaly detection techniques ineffective
The emergence of distributed tracing enables operation and maintenance and developers to observe the cross-process interaction mode of distributed systems, but distributed tracing systems focus on the interaction between processes, and it is difficult to effectively combine logs and distributed tracing to make distributed systems Anomaly detection encounters great difficulties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed system call chain and log fusion anomaly detection method
  • Distributed system call chain and log fusion anomaly detection method
  • Distributed system call chain and log fusion anomaly detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Using SkyWalking collection as the application performance monitoring platform and PyTorch as the distributed system of the deep learning framework, the distributed system call chain and log fusion anomaly detection method based on the graph neural network of the present invention are further introduced.

[0047] For anomaly detection model training, the specific process is as follows:

[0048] (1) Collect call chain and log data. Configure the SkyWalking agent for each program in the distributed system, set the call chain and log collection rules. The call chain and log data generated by the normal operation of the system are collected and stored in ElasticSearch as training data.

[0049] (2) Construct the data set of call chain event relationship graph. Process the collected training data in the order of steps (1) to (4), construct a corresponding call chain event relationship graph for each call chain, and use all the processed data as a graph data set for the dee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of software engineering and cloud computing, and particularly relates to a distributed system call chain and log fusion anomaly detection method. The method comprises the following steps: constructing a call chain event relation graph according to a call chain and log data on the basis of the call chain and log data during operation of a distributed system, and learning a call chain event relation graph mode during normal operation of the system by utilizing a graph neural network and a single-classification deep learning method; detecting a newly generated call chain event relation graph in real time during online use, and identifying a call chain generating an abnormal behavior; the method specifically comprises the steps of log event analysis, call chain event analysis, event vectorization, call chain event relation graph construction, graph neural network model training and online anomaly detection. According to the invention, operation and maintenance personnel and developers can be helped to quickly discover system exceptions, corresponding alarm information is generated, the speed of fault positioning and online problem solving is accelerated, and the labor cost is reduced.

Description

technical field [0001] The invention belongs to the technical field of software engineering and cloud computing, and in particular relates to a distributed system call chain and a log anomaly detection method. Background technique [0002] The distributed system decomposes the application program into multiple independent modules, each module has its own process and operating environment, and the processes communicate through the network. The microservice architecture developed from distributed systems has become an important part of cloud native technology. Microservices are based on fine-grained functional division and distributed operating environment, enabling applications to be independently developed, independently deployed, and flexibly scaled. Most enterprises have Implement applications using a distributed or microservices architecture. [0003] Anomaly detection is an important part of system runtime monitoring. Fast and accurate anomaly detection and discovery ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/07G06K9/62
Inventor 彭鑫张晨曦
Owner FUDAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products