Log analysis method and system
An analysis method and analysis system technology, applied in the field of log monitoring, can solve the problems of inability to monitor and block crawler behavior in real time, inability to monitor, and inability to monitor in real time.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] see figure 1 , shows a flow chart of the steps of the log analysis method according to Embodiment 1 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. The following is an exemplary description taking computer equipment as the execution subject, as follows:
[0037] Step S100, acquire at least one log file of the system to be monitored according to a preset collection agent, wherein each log file includes a corresponding operator ID.
[0038] A log is a log file automatically created and maintained by a system or server that contains a listing of the activities it has performed. The logs mainly include system logs, application logs, and security logs. Each log contains relevant descriptions such as time stamp, host name, user, and operation behavior. System operation and maintenance and developers can use the logs to understand server software and hardware information, Check...
Embodiment 2
[0062] see figure 2 , shows a schematic diagram of the program modules of the log analysis system according to Embodiment 2 of the present invention. It can be understood that the flowchart in this method embodiment is not used to limit the sequence of execution steps. In this embodiment, the log analysis system 20 may include or be divided into one or more program modules, one or more program modules are stored in a storage medium and executed by one or more processors to complete The present invention can also realize the above log analysis method. The program module referred to in the embodiment of the present invention refers to a series of computer program instruction segments capable of completing specific functions, which is more suitable than the program itself to describe the execution process of the log analysis system 20 in the storage medium. The following description will specifically introduce the functions of each program module of the present embodiment:
...
Embodiment 3
[0088] refer to image 3 , is a schematic diagram of the hardware architecture of the computer device according to the third embodiment of the present invention. In this embodiment, the computer device 2 is a device that can automatically perform numerical calculation and / or information processing according to pre-set or stored instructions. The computer equipment 2 may be a rack-type server, a blade-type server, a tower-type server or a cabinet-type server (including an independent server, or a server cluster composed of multiple servers) and the like. like image 3 As shown, the computer device 2 at least includes, but is not limited to, a memory 21 , a processor 22 , a network interface 23 , and a log analysis system 20 that can communicate with each other through a system bus. in:
[0089] In this embodiment, the memory 21 includes at least one type of computer-readable storage medium, and the readable storage medium includes a flash memory, a hard disk, a multimedia ca...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com