CN111045848B - Log analysis method, terminal device and computer readable storage medium - Google Patents

Log analysis method, terminal device and computer readable storage medium Download PDF

Info

Publication number
CN111045848B
CN111045848B CN201911324199.2A CN201911324199A CN111045848B CN 111045848 B CN111045848 B CN 111045848B CN 201911324199 A CN201911324199 A CN 201911324199A CN 111045848 B CN111045848 B CN 111045848B
Authority
CN
China
Prior art keywords
log
log file
information
target
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911324199.2A
Other languages
Chinese (zh)
Other versions
CN111045848A (en
Inventor
叶勇
吴时道
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Vipshop Information Technology Co ltd
Original Assignee
Guangzhou Vipshop Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Vipshop Information Technology Co ltd filed Critical Guangzhou Vipshop Information Technology Co ltd
Priority to CN201911324199.2A priority Critical patent/CN111045848B/en
Publication of CN111045848A publication Critical patent/CN111045848A/en
Application granted granted Critical
Publication of CN111045848B publication Critical patent/CN111045848B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0775Content or structure details of the error report, e.g. specific table structure, specific error fields
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/079Root cause analysis, i.e. error or fault diagnosis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a log analysis method, terminal equipment and a computer readable storage medium. The log analysis method provided by the invention comprises the following steps: after receiving the query information, acquiring a target log file according to the query information; acquiring an upstream log file and a downstream log file which are associated with the target log file; and searching an abnormal log according to the upstream log file, the target log file and the downstream log file. By acquiring the upstream log file and the downstream log file which are associated with the current log file, the query of the cross-system log file is realized, and the abnormal log is queried according to the index relation among the log files, so that the query accuracy and the query efficiency of the abnormal log are improved.

Description

Log analysis method, terminal device and computer readable storage medium
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a log analysis method, a terminal device, and a computer readable storage medium.
Background
At present, the log analysis system can analyze and count paper records at a domain level, but when the log analysis at a service level is involved, as each system is mutually independent, and for a single micro-service system, the upstream and downstream logs are recorded under the same domain log, and displayed according to a time sequence, when an abnormal trend is analyzed, a large amount of irrelevant redundant log information interferes the upstream and downstream associated abnormal logs, so that the efficiency of the log analysis is low.
Disclosure of Invention
The invention mainly aims to provide a log analysis method, terminal equipment and a computer readable storage medium, which aim to solve the problems that the current systems are mutually independent, and a large amount of irrelevant redundant log information interferes with upstream and downstream associated abnormal logs, so that the efficiency of log analysis is low.
In order to achieve the above object, the present invention provides a log analysis method, which includes the steps of:
After receiving the query information, acquiring a target log file according to the query information;
Acquiring an upstream log file and a downstream log file which are associated with the target log file;
and searching an abnormal log according to the upstream log file, the target log file and the downstream log file.
Optionally, the step of obtaining the upstream log file and the downstream log file associated with the target log file obtaining includes:
Acquiring interface information of the target log file;
And acquiring the upstream log file and the downstream log file which are associated with the target log file according to the interface information.
Optionally, the step of searching the abnormal log according to the upstream log file, the target log file and the downstream log file includes:
Acquiring log information corresponding to the upstream log file, the target log file and the downstream log file, wherein the log information comprises: the method comprises the steps of scene type, error type and corresponding relation between the scene type and the error type;
And acquiring the abnormal log according to the log information.
Optionally, the step of obtaining the exception log according to the log information includes:
Obtaining screening conditions;
And screening the log files in the upstream log file, the target log file and the downstream log file according to the screening conditions and the log information to obtain the abnormal log.
Optionally, the screening condition is obtained according to the query information.
Optionally, the filtering condition includes at least one of a log type and a log generation time.
Optionally, after the step of filtering the log files in the upstream log file, the target log file and the downstream log file according to the filtering condition and the log information to obtain the abnormal log, the log analysis method further includes:
acquiring a scene type corresponding to the abnormal log;
Acquiring scene information of the upstream log file, the target log file and the downstream log file according to the scene type;
and generating an abnormal log analysis report according to the scene information and the abnormal log.
In order to achieve the above object, the present invention also proposes a terminal device including a memory, a processor, and a control program of a log analysis method stored on the memory and executable on the processor, the control program of the log analysis method implementing the steps of the log analysis method as described above when executed by the processor.
To achieve the above object, the present invention also proposes a computer-readable storage medium having stored thereon a control program of a log analysis method, which when executed by a processor, implements the steps of the log analysis method as described above.
After receiving query information, the technical scheme of the invention obtains a target log file according to the query information; acquiring an upstream log file and a downstream log file associated with the target log file acquisition; and searching an abnormal log according to the upstream log file, the target log file and the downstream log file. By acquiring the upstream log file and the downstream log file which are associated with the current log file, the query of the cross-system log file is realized, and the abnormal log is queried according to the index relation among the log files, so that the query accuracy and the query efficiency of the abnormal log are improved.
Drawings
FIG. 1 is a schematic diagram of a terminal structure of a hardware operating environment according to an embodiment of the present invention;
FIG. 2 is a flow chart of a first embodiment of a log analysis method according to the present invention;
FIG. 3 is a flow chart of a second embodiment of the log analysis method of the present invention;
FIG. 4 is a flow chart of a third embodiment of a log analysis method according to the present invention;
FIG. 5 is a flowchart of a log analysis method according to a fourth embodiment of the present invention;
fig. 6 is a flowchart of a fifth embodiment of the log analysis method according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and rear are referred to in the embodiments of the present invention), the directional indications are merely used to explain the relative positional relationship between the components, the movement condition, and the like in a specific posture, and if the specific posture is changed, the directional indications are correspondingly changed.
In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The main solutions of the embodiments of the present invention are: after receiving the query information, acquiring a target log file according to the query information; acquiring an upstream log file and a downstream log file associated with the target log file acquisition; and searching an abnormal log according to the upstream log file, the target log file and the downstream log file.
In the prior art, each system is mutually independent, and a large amount of uncorrelated redundant log information interferes with the upstream and downstream associated abnormal logs, so that the efficiency of log analysis is low.
The invention provides a log analysis method, which is used for acquiring a target log file according to query information after receiving the query information; acquiring an upstream log file and a downstream log file associated with the target log file acquisition; and searching an abnormal log according to the upstream log file, the target log file and the downstream log file. By acquiring the upstream log file and the downstream log file which are associated with the current log file, the query of the cross-system log file is realized, and the abnormal log is queried according to the index relation among the log files, so that the query accuracy and the query efficiency of the abnormal log are improved.
As shown in fig. 1, fig. 1 is a schematic diagram of a terminal structure of a hardware running environment according to an embodiment of the present invention.
The terminal of the embodiment of the invention can be a server or a terminal server with a log management function.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard priority interface, a wireless interface (e.g., wiFi interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (NVM), such as a disk memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
It will be appreciated by those skilled in the art that the terminal structure shown in fig. 1 is not limiting of the terminal and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
As shown in fig. 1, a control program of an operating system, a network communication module, and a log analysis method may be included in a memory 1005 as one type of computer-readable storage medium.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a background server and performing data communication with the background server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be used to call a control program of the log analysis method stored in the memory 1005 and perform the following operations:
After receiving the query information, acquiring a target log file according to the query information;
Acquiring an upstream log file and a downstream log file which are associated with the target log file;
and searching an abnormal log according to the upstream log file, the target log file and the downstream log file.
Further, the processor 1001 may call a control program of the log analysis method stored in the memory 1005, and further perform the following operations:
Acquiring interface information of the target log file;
And acquiring the upstream log file and the downstream log file which are associated with the target log file according to the interface information.
Further, the processor 1001 may call a control program of the log analysis method stored in the memory 1005, and further perform the following operations:
Acquiring log information corresponding to the upstream log file, the target log file and the downstream log file, wherein the log information comprises: the method comprises the steps of scene type, error type and corresponding relation between the scene type and the error type;
And acquiring the abnormal log according to the log information.
Further, the processor 1001 may call a control program of the log analysis method stored in the memory 1005, and further perform the following operations:
Obtaining screening conditions;
And screening the log files in the upstream log file, the target log file and the downstream log file according to the screening conditions and the log information to obtain the abnormal log.
Further, the processor 1001 may call a control program of the log analysis method stored in the memory 1005, and further perform the following operations:
acquiring a scene type corresponding to the abnormal log;
Acquiring scene information of the upstream log file, the target log file and the downstream log file according to the scene type;
and generating an abnormal log analysis report according to the scene information and the abnormal log.
Based on the hardware framework, the embodiment of the log analysis method is provided.
Referring to fig. 2, fig. 2 is a first embodiment of the log analysis method of the present invention, the log analysis method includes the following steps:
step S10, after receiving query information, acquiring a target log file according to the query information;
In this embodiment, the query information is log information corresponding to a scene type and/or an error type set for a log file of a certain target system. The target log file contains all the contents of the query information.
Step S20, an upstream log file and a downstream log file which are associated with the target log file are acquired;
and step S30, searching an abnormal log according to the upstream log file, the target log file and the downstream log file.
In this embodiment, the upstream log file, the downstream log file, and the target log file may belong to different systems, where the upstream log file, the downstream log file, and the target log file may be accessed through an API interface, and log information of the same type is provided between the upstream log file, the downstream log file, and the target log file, and the log information has a corresponding time node. Therefore, the system can find the abnormal log in the upstream log file, the target log file and the downstream log file according to the received query information, and the same query information is not required to be input again for a specific system to obtain the abnormal log file, so that the efficiency of log query is greatly improved.
In the embodiment, the query of the cross-system log file is realized by acquiring the upstream log file and the downstream log file which are associated with the current log file, and the abnormal log is queried according to the index relation among the log files, so that the query accuracy and the query efficiency of the abnormal log are improved.
Referring to fig. 3, fig. 3 is a second embodiment of the log analysis method according to the present invention, based on the first embodiment, step S20 includes:
step S21, obtaining interface information of the target log file;
And step S22, acquiring the upstream log file and the downstream log file associated with the target log file according to the interface information.
In this embodiment, the upstream log file, the downstream log file, and the target log file may be accessed through an API interface, so after the system queries the target log file, the log file associated with the API interface information may be directly called according to the API interface information of the target log file, and according to a call relationship between API interface information, the log file may be an upstream log file of the target log file or a downstream log file of the target log file.
Referring to fig. 4, fig. 4 is a third embodiment of the log analysis method according to the present invention, based on the first or second embodiment, step S30 includes:
Step S31, obtaining log information corresponding to the upstream log file, the target log file and the downstream log file, where the log information includes: the method comprises the steps of scene type, error type and corresponding relation between the scene type and the error type;
and step S32, acquiring the abnormal log according to the log information.
In this embodiment, the user may select a scenario type and/or an error type corresponding to the input log information as query information, and because the log information corresponding to the upstream log file, the target log file, and the downstream log file includes the scenario type, the error type, and a correspondence between the scenario type and the error type, the system may match related log files in the upstream log file, the target log file, and the downstream log file according to the scenario type and/or the error type input by the user as an abnormal log.
Referring to fig. 5, fig. 5 is a fourth embodiment of the log analysis method according to the present invention, based on the third embodiment, step S32 includes:
Step S321, obtaining screening conditions;
And step S322, screening the log files in the upstream log file, the target log file and the downstream log file according to the screening conditions and the log information to obtain the abnormal log.
In this embodiment, the filtering condition is obtained according to the query information, and the filtering condition includes at least one of a log type and a log generation time. In the case where a relevant log file is matched as an abnormal log from among the upstream log file, the target log file and the downstream log file according to the scene type and/or the error type, in order to further narrow down the range of the target abnormal log and lock the target abnormal log, the user may input a filtering condition such as the above-described information of the log type and/or the log generation time, etc. on the basis of this.
Referring to fig. 6, fig. 6 is a fifth embodiment of the log analysis method according to the present invention, based on the fourth embodiment, after step S322, further includes:
Step S323, obtaining a scene type corresponding to the abnormal log;
step S324, obtaining scene information of the upstream log file, the target log file and the downstream log file according to the scene type;
In this embodiment, if the abnormal log is obtained by matching the scene type as the query information, the system directly exports the scene information of the abnormal log in the upstream log file, the target log file and the downstream log file; if the abnormal log is obtained by matching the error type as query information, the system also needs scene information corresponding to the abnormal log in the upstream log file, the target log file and the downstream log file according to the corresponding relation between the scene type and the error type.
And step S325, generating an abnormal log analysis report according to the scene information and the abnormal log.
In this embodiment, the anomaly log analysis report is composed of an anomaly log and a scenario message corresponding to the anomaly log. The system provides more accurate log information for the user by matching the corresponding scene information for each abnormal log.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as described above, comprising instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention and is not intended to limit the scope of the invention, and all equivalent structural changes made by the specification and drawings of the present invention or direct/indirect application in other related technical fields are included in the scope of the present invention.

Claims (3)

1. A log analysis method, characterized in that the log analysis method comprises the steps of:
After receiving query information, acquiring a target log file according to the query information, wherein the query information is the log information corresponding to a scene type and/or an error type set for the log file of a target system, and the target log file contains all contents in the query information;
Acquiring interface information of the target log file;
calling the log files associated with the API interface information according to the API interface information of the target log files to serve as upstream log files and downstream log files, wherein the upstream log files, the downstream log files and the target log files belong to different systems, the upstream log files, the downstream log files and the target log files are mutually accessed through the API interface, and the upstream log files, the downstream log files and the target log files have the same type of log information;
Acquiring log information corresponding to the upstream log file, the target log file and the downstream log file, wherein the log information comprises: the method comprises the steps of scene type, error type and corresponding relation between the scene type and the error type;
Obtaining screening conditions;
Screening the log files in the upstream log file, the target log file and the downstream log file according to the screening conditions and the log information to obtain abnormal logs, wherein the screening conditions are obtained according to the query information, and the screening conditions comprise at least one of log types and log generation time;
acquiring a scene type corresponding to the abnormal log;
If the abnormal log is obtained by matching scene types as query information, directly exporting scene information of the abnormal log in the upstream log file, the target log file and the downstream log file; if the abnormal log is obtained by matching the error type as query information, corresponding scene information is derived from the abnormal log in the upstream log file, the target log file and the downstream log file according to the corresponding relation between the scene type and the error type;
generating an abnormal log analysis report according to the scene information and the abnormal log, wherein the abnormal log analysis report consists of the abnormal log and the scene information corresponding to the abnormal log.
2. A terminal device comprising a memory, a processor and a control program of a log analysis method stored on the memory and executable on the processor, the control program of the log analysis method implementing the steps of the log analysis method as claimed in claim 1 when executed by the processor.
3. A computer-readable storage medium, wherein a control program of a log analysis method is stored on the computer-readable storage medium, which when executed by a processor, implements the steps of the log analysis method according to claim 1.
CN201911324199.2A 2019-12-19 2019-12-19 Log analysis method, terminal device and computer readable storage medium Active CN111045848B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911324199.2A CN111045848B (en) 2019-12-19 2019-12-19 Log analysis method, terminal device and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911324199.2A CN111045848B (en) 2019-12-19 2019-12-19 Log analysis method, terminal device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111045848A CN111045848A (en) 2020-04-21
CN111045848B true CN111045848B (en) 2024-04-19

Family

ID=70237353

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911324199.2A Active CN111045848B (en) 2019-12-19 2019-12-19 Log analysis method, terminal device and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111045848B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111813743A (en) * 2020-06-30 2020-10-23 中国工商银行股份有限公司 Method and device for generating batch file relation chains
CN112783743B (en) * 2021-01-26 2023-04-28 深圳融安网络科技有限公司 Log generation method, terminal equipment and storage medium
CN114168275B (en) * 2021-10-28 2022-10-18 厦门国际银行股份有限公司 Task scheduling method, system, terminal device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824837A (en) * 2015-01-06 2016-08-03 ***通信集团广东有限公司 Log treatment method and device
WO2017124704A1 (en) * 2016-01-18 2017-07-27 中兴通讯股份有限公司 Method and apparatus for displaying log content
CN107465549A (en) * 2017-08-18 2017-12-12 北京奇艺世纪科技有限公司 A kind of distributed message processing method and system
CN108234245A (en) * 2018-01-09 2018-06-29 上海帝联网络科技有限公司 The screening technique of log content and daily record data, device, system, readable medium
CN109388628A (en) * 2018-08-28 2019-02-26 平安科技(深圳)有限公司 System log querying method, device, computer equipment and storage medium
CN109558315A (en) * 2018-11-14 2019-04-02 泰康保险集团股份有限公司 The determination method, device and equipment of test scope
CN110069464A (en) * 2019-03-16 2019-07-30 平安普惠企业管理有限公司 Log analysis processing method, device, equipment and readable storage medium storing program for executing
CN110519465A (en) * 2019-07-22 2019-11-29 平安科技(深圳)有限公司 Telephony platform log inquiring method, terminal device, storage medium and device

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10521279B2 (en) * 2017-06-01 2019-12-31 Vmware, Inc. System and method for dynamic log level control
US20190108112A1 (en) * 2017-10-05 2019-04-11 Hcl Technologies Limited System and method for generating a log analysis report from a set of data sources

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105824837A (en) * 2015-01-06 2016-08-03 ***通信集团广东有限公司 Log treatment method and device
WO2017124704A1 (en) * 2016-01-18 2017-07-27 中兴通讯股份有限公司 Method and apparatus for displaying log content
CN107465549A (en) * 2017-08-18 2017-12-12 北京奇艺世纪科技有限公司 A kind of distributed message processing method and system
CN108234245A (en) * 2018-01-09 2018-06-29 上海帝联网络科技有限公司 The screening technique of log content and daily record data, device, system, readable medium
CN109388628A (en) * 2018-08-28 2019-02-26 平安科技(深圳)有限公司 System log querying method, device, computer equipment and storage medium
CN109558315A (en) * 2018-11-14 2019-04-02 泰康保险集团股份有限公司 The determination method, device and equipment of test scope
CN110069464A (en) * 2019-03-16 2019-07-30 平安普惠企业管理有限公司 Log analysis processing method, device, equipment and readable storage medium storing program for executing
CN110519465A (en) * 2019-07-22 2019-11-29 平安科技(深圳)有限公司 Telephony platform log inquiring method, terminal device, storage medium and device

Also Published As

Publication number Publication date
CN111045848A (en) 2020-04-21

Similar Documents

Publication Publication Date Title
CN111045848B (en) Log analysis method, terminal device and computer readable storage medium
CN112910945B (en) Request link tracking method and service request processing method
CN109543891B (en) Method and apparatus for establishing capacity prediction model, and computer-readable storage medium
CN112783720B (en) Topology structure diagram generation method, device, computer equipment and display system
CN111026775A (en) Method and device for determining correlation index, server and storage medium
CN111083219A (en) Request processing method, device, equipment and computer readable storage medium
CN108667660B (en) Method and device for route management and service routing and routing system
CN111047434B (en) Operation record generation method and device, computer equipment and storage medium
US10346281B2 (en) Obtaining and analyzing a reduced metric data set
CN112214465A (en) Log storage system and method
CN109802842B (en) Application topology generation method and related equipment
CN112579603A (en) CDC-based data model dynamic information perception monitoring method and device
CN109714201A (en) Network System Reliability appraisal procedure, device, computer equipment and storage medium
CN107332681B (en) Fault dimension analysis method and network equipment
CN111078562B (en) Interface test method, terminal device and computer readable storage medium
CN106790380A (en) Data reporting method and device
CN113810234A (en) Micro-service link topology processing method and device and readable storage medium
CN111008143B (en) Coverage rate scheduling test method, terminal equipment and computer readable storage medium
CN113220522A (en) Automatic positioning method and device for service abnormity
CN109040089B (en) Network policy auditing method, equipment and computer readable storage medium
CN110933070A (en) User identification method, system, equipment and computer readable storage medium
CN115269050A (en) Multi-map calling method and device, storage medium and computer equipment
CN111078571B (en) Test method for analog response, terminal equipment and computer readable storage medium
CN112231011A (en) Method and device for adjusting flow chart based on activiti, electronic equipment and storage medium
CN104346228A (en) Application program sharing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant