Detailed Description
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Fig. 1 exemplarily shows an application scenario diagram of an information monitoring method provided in an embodiment of the present application. The information monitoring method provided by the embodiment of the application can monitor various functions of the product by acquiring behavior data generated by each user terminal in the user side. Wherein:
the products referred to in the embodiments of the present application may be applied to include, but are not limited to: browser page, WeChat applet page H5, mobile terminal program APP, personal computer terminal program pcapp. When a user triggers a certain function of a product in the user side, the behavior data of the user can be generated. For example, when a user inputs a website of a login page of a product in a browser, a user side may request interactive data from a link layer and a back-end server to render the login page, and if the user side receives or does not receive data returned by the link layer in a delayed manner, problems such as jamming, white screen, breakdown and the like may occur in a current page, so that the user cannot enter a normal login page, and corresponding behavior data of the user is also abnormal.
Possibly, the embodiment of the application may acquire the behavior data of the user in the following manner: behavior data of a user in an SDK (Software Development Kit) at a web page end can be obtained by intercepting a user request in a manner of adding JavaScript codes in a Header (Header) of a web page. The behavior data of the user in the mobile terminal SDK can be obtained by a mode of intercepting the user request by providing a calling method of a java or c language class library. The behavior data of the user in the personal computer side SDK can be obtained by a mode of intercepting the user request by providing a calling method of a class library of an Objective-C language.
The data types of the behavior data in the web page side SDK may include, but are not limited to: page loading, page exception, resource loading, interface request and service log. The data types of the behavior data in the mobile terminal SDK may include, but are not limited to: network monitoring, static resource loading, performance monitoring, service monitoring and service exception. The data types of behavior data in the personal computer side SDK may include, but are not limited to: starting page loading, finishing page loading, making page loading error, detecting network PING (Packet Internet Groper), detecting network CURL (Customized Uniform Resource Locator), and logging service.
Fig. 2 is a system architecture diagram of an information monitoring method applied to an embodiment of the present application. The information monitoring method provided by the embodiment of the application can be applied to a server. Specifically, the server may be connected to the terminal through a network. The network is used to provide a communication link between the terminal and the server. The network may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. Terminals include, but are not limited to: wearable devices, monitoring devices, handheld devices, personal computers, tablet computers, in-vehicle devices, smart phones, computing devices or other processing devices connected to a wireless modem, and the like. The terminal devices in different networks may be called different names, for example: a monitoring device, a user equipment, an access terminal, a subscriber unit, a subscriber station, a mobile station, a remote terminal, a mobile device, a user terminal, a wireless communication device, a user agent or user equipment, a cellular telephone, a cordless telephone, a Personal Digital Assistant (PDA), a terminal device in a 5th generation mobile network or a future evolution network, etc. The terminal system is an operating system that can run on the terminal, is a program for managing and controlling terminal hardware and terminal applications, and is an indispensable system application of the terminal. The system comprises but is not limited to Android system, IOS system, Windows Phone (WP) system, Ubuntu mobile version operating system and the like.
It should be understood that the number of terminals, networks, and servers in fig. 2 is merely illustrative. There may be any number of terminals, networks and servers, as desired for the reality. For example, the server may be a server cluster composed of a plurality of servers. The user can use the server to interact with the terminal through the network so as to obtain the optimized version and the like.
Next, an application scenario diagram of the information monitoring method described in fig. 1 and a system architecture diagram described in fig. 2 are combined to describe the information monitoring method provided in the embodiment of the present application.
In one embodiment, as shown in fig. 3, a flow diagram of an information monitoring method is provided. As shown in fig. 3, the information monitoring method may include the steps of:
s301, log data of a plurality of users in the user node are obtained.
The user nodes can comprise domestic user nodes and overseas user nodes, wherein the domestic user nodes are used for representing user behavior data of various domestic areas acquired through a domestic server, and the overseas user nodes are used for representing user behavior data of various overseas areas acquired through an overseas server. The log data of the user is used for representing the behavior data obtained through processing.
Since hundreds of millions of data are transmitted back to domestic data centers through transoceanic links every day, if the data are transmitted in full, the problems of large network traffic cost, data loss in the transmission process and the like are faced. In order to solve the problem, the embodiment of the application can be respectively provided with a domestic user node and a overseas user node, wherein the domestic user node is responsible for domestic data collection and storage, and the overseas user node is responsible for overseas data collection and storage.
Possibly, the embodiment of the application can sample the log data of each user in the overseas user nodes based on a hierarchical sampling algorithm to obtain the log data of at least one user in the overseas user nodes. The log data of at least one user is the log data of a part of users in the log data of all users in the overseas user node. In addition, the overseas data center can be further inquired when the detailed log data of the overseas user is needed, so that the efficiency and the cost of the embodiment of the application are greatly optimized.
Possibly, in the embodiment of the application, the first message middleware is used for receiving the behavior data of each user in the domestic user node, and the second message middleware is used for receiving the behavior data of each user in the overseas user node. Further, after the behavior data of each user in the domestic user node and the behavior data of each user in the overseas user node are respectively logically processed, log data of each user in the domestic user node and log data of each user in the overseas user node are obtained. Wherein the logical processing may include any one or more of: field resolution, idempotent verification, user address resolution, user identification mapping and application information association.
The field analysis is used for analyzing the behavior data of the user reported by the user side into a field of the server, the idempotent verification is used for detecting whether the reported behavior data are repeated, and if adjacent data in the behavior data are repeated, filtering processing is needed. The user address resolution is used for determining user address identification according to the behavior data, and the user identification mapping is used for tracking the identification of the user in each level to determine the position of the existing problem of the behavior data of the user. The application information association is used to determine which specific services in the product the user has accessed.
S302, determining log indexes of a plurality of users based on log data of the users and a preset index algorithm.
The preset index algorithm may include any one or more of the following items: an interface request success rate index algorithm, a page performance index algorithm, a region monitoring index algorithm, a ring ratio index algorithm and a same ratio index algorithm.
It can be understood that the interface request success rate indicator algorithm is used to calculate the success rate of the user side requesting the backend interface from the server. The page performance index algorithm is used for quantifying the page performance according to a plurality of data such as page loading time, page stuck time, resource loading, visual stability and the like. The area monitoring index algorithm is used for calculating a certain index corresponding to the behavior data of all the users in each area, for example, the success rate of all the users in the area a accessing the operator network. The ring ratio index algorithm is used for comparing log data generated by triggering a certain function of a product by a user in two continuous statistical periods. The geometric index algorithm is used for comparing log data generated by triggering a certain function of a product by a user in the nth month of the year and the nth month of the last year.
Possibly, according to the embodiment of the application, corresponding log indexes can be generated directly according to log data such as page rendering time, resource loading time and the like. For example, rendering time index 2S for page a, resource loading time 1S for page a.
S303, determining at least one target user and abnormal indexes of the at least one target user which do not meet the index threshold value based on the log indexes of the plurality of users.
The index threshold is used for representing a preset log index in a normal range.
For example, the page performance index 80 generated when the domestic user a opens thepage 1, and the ring ratio index 1.1 when the domestic user a opens the "digital library" to read thebook 1; a page performance index 85 generated when the domestic user B opens thepage 1, and a ring ratio index 0.9 when the domestic user B opens the digital library to read thebook 1; the page performance index 90 of the domestic user C, and the ring ratio index 0.95 when the domestic user C opens the 'digital library' of theproduct 1 to read thebook 1; thepage performance index 70 generated when the overseas user D opens thepage 1, the ring ratio index 1.2 when the overseas user D opens the "digital library" to read thebook 1, the page performance index threshold value is 75-100, and the ring ratio index threshold value when the overseas user D opens the "digital library" to read thebook 1 is 0.8-1.2, it can be determined that the target user that does not satisfy the page performance index threshold value is the overseas user D.
S304, generating early warning information based on the abnormal indexes of at least one target user.
The early warning information is used to represent prompt information for prompting that the log index of the user end is abnormal, for example, in the case that the page performance index of the target user D is abnormal, the generated early warning information may include: the method comprises the following steps of page performance index abnormal time, identification information of a target user D, a region where the target user is located, abnormal page identification information, abnormal field position information, abnormal page correlation information and the like.
In a specific example, the behavior data of a large number of domestic users can be acquired through kafka middleware of a domestic user node arranged in an access layer, and the behavior data of a large number of overseas users can be acquired through kafka middleware arranged in an overseas user node. Further, the logic layer may perform logic processing such as field analysis on the behavior data of the domestic user by using an ETL (Extract-Transform-Load, data warehouse technology) to obtain log data of the domestic user, and perform logic processing such as field analysis after sampling the behavior data of the overseas user to obtain log data of the overseas user. Further, the log processing is performed on the acquired domestic user log data and the extracted overseas user log data to obtain various log indexes (such as a ring ratio index of page loading time). And determining a target user with abnormal log data in domestic users and overseas users according to various log indexes and corresponding preset index thresholds, and generating and displaying corresponding early warning information according to the abnormal indexes of the target user so as to inform technicians to process the abnormal indexes of the target user.
In the embodiment of the application, log data of a plurality of users in the user node can be acquired; determining log indexes of a plurality of users based on log data of the users and a preset index algorithm; determining at least one target user and abnormal indexes of at least one target user which do not meet an index threshold value based on log indexes of a plurality of users; and generating early warning information based on the abnormal indexes of the at least one target user. Therefore, according to the embodiment of the application, the abnormal log indexes and the target users corresponding to the abnormal log indexes can be determined in a mode of directly obtaining the log data of each user at the user node, determining the log indexes according to the log data and further comparing the log indexes with the preset index threshold value, and therefore the early warning information is generated quickly, the problem of real-time monitoring at the user side is solved, and the user experience is effectively improved.
In some embodiments, fig. 4 illustrates a flowchart of an information monitoring method provided in an embodiment of the present application. As shown in fig. 4, the information monitoring method may include at least the following steps:
s401, obtaining static log data and/or dynamic log data of a plurality of users in user nodes.
The log data in the embodiment of the present application may include: static log data and/or dynamic log data. The static log data is used for representing log data generated by resources which need to be stored in advance when a user requests a webpage end or an application program, such as picture resources, Powerpoint resources, text resources and audio resources. The dynamic log data is used to represent log data generated by a user requesting a web page or an Interface in an Application program, such as an API (Application Programming Interface) request.
S402, determining the static indexes and/or the dynamic indexes of the multiple users based on the static log data and/or the dynamic log data of the multiple users and a preset static index algorithm and/or a preset dynamic index algorithm.
The preset static index algorithm may include a page performance index algorithm, and the page performance index may be calculated as: the comprehensive indexes of the picture index, the Powerpoint index, the character index and the vocal index. The dynamic index algorithm may include an interface index algorithm. For example, when theuser 1 requests a plurality of API interfaces in the target page, the feedback time of the data when each API interface is requested may be determined first, and then the interface index of the target page and the average feedback time of the data of the plurality of API interfaces may be further calculated.
S403, determining static abnormal indexes and/or dynamic abnormal indexes of at least one target user and at least one target user which do not meet the static index threshold value and/or the dynamic index threshold value based on the static indexes and/or the dynamic indexes of the plurality of users.
The static index threshold is used for representing a numerical range of a preset static index under a normal condition. The dynamic index threshold is used for representing a numerical range of a preset dynamic index under a normal condition.
For example, the page performance index 80 generated when the domestic user a opens thepage 1, and the interface index generated when the domestic user a clicks thebook 1 in the "digital library" for 2 seconds; page performance index 85 generated when the domestic user B opens thepage 1, and interface index 2.5 seconds generated when the domestic user B clicks thebook 1 in the digital library; the page performance index 90 of the domestic user C and the interface index generated when the domestic user C clicks thebook 1 in the digital library are 5 seconds; thepage performance index 70 generated when the overseas user D opens thepage 1, the interface index generated when the overseas user D clicks thebook 1 in the "digital library" for 7 seconds, the page performance index threshold value is 75-100, and the interface index threshold value of thebook 1 in the "digital library" is 0.1-3 seconds, so that it can be determined that the target user who does not satisfy the page performance index threshold value is the overseas user D, and the target users who do not satisfy the interface index threshold value are the domestic user C and the overseas user D.
S404, generating early warning information based on the static abnormal index and/or the dynamic abnormal index of at least one target user.
The early warning information is used for representing prompt information for prompting the static abnormal index and/or the dynamic abnormal index of the user side.
Continuing with the above example, in the case that the page performance index of the overseas user D is abnormal, the generated early warning information may include: the page performance index abnormal time, the identification information of the overseas user D, the specific position of the overseas user D, the identification information of the abnormal page, the position information of the abnormal field, the correlation information of the abnormal page and the like. Under the condition that the interface indexes of the domestic user C and the overseas user D are abnormal, the generated early warning information can comprise: the abnormal time of the interface index of the domestic user C, the identification information of the domestic user C, the specific position of the domestic user C, the abnormal interface identification corresponding to the domestic user C, the abnormal time of the interface index of the overseas user D, the identification information of the overseas user D, the specific position of the overseas user D and the abnormal interface identification corresponding to the domestic user D.
In some embodiments, the embodiment of the present application may further determine whether a failure service exists in log data of each user based on a preset buried point service and log data of a plurality of users; and determining the user with the failed service as a target user. The service embedding point is from the perspective of the service requirement of the product, for example, the product needs to count exposure and click of a certain page, and the click rate of a recommendation item needed by an algorithm person.
Specifically, the embedded point is an important way for collecting user behavior data, and is mainly used for collecting and recording interaction data between a user operation behavior at a specific position and a server, and the basic principle is to deploy collected SDK codes at terminals such as App/H5/PC. For example, when the user's behavior satisfies a certain condition, such as entering a certain page, clicking a certain button, etc., recording and storage are automatically triggered, and then the data is collected and transmitted to the terminal provider, or the requested data in the process of using the service by the user is collected through the back end.
In some embodiments, at least one piece of key index data of each user can be acquired based on log indexes of a plurality of users and a preset extraction rule; and generating and displaying an index large disk corresponding to at least one plurality of key index data based on at least one key index data of each user.
In some embodiments, the embodiment of the present application may further store log data of each user in the domestic user node in the first storage; and storing the log data of each user in the overseas user node into a second memory.
Referring to fig. 5, in a specific example, after analyzing DNS (Domain Name System) of products in mobile terminals or personal computers of users in domestic user nodes and westernish (overseas) user nodes, corresponding user behavior data is generated in SDK according to user operation behaviors. Further, through a Content Delivery Network (CDN) for video and audio on demand, live streaming media, total-station acceleration and secure acceleration in a link layer, an SLB (Server Load Balancing) for realizing Load Balancing among a plurality of servers, an Nginx for preventing a malicious attack on an intranet Server by an extranet, caching to reduce the pressure of the Server and access security control, and distributing a user request to a plurality of servers, behavior data of a user is respectively input to a Kafka middleware in the access layer and a Kafka middleware in meixi to transmit all behavior data of the user in a web page end and an application program end to a logic layer ETL in real time for field analysis, power equality verification, IP library processing (user address analysis), traceld mapping (user identification mapping), application information association and other logic processing to obtain behavior data of the domestic user and log data of the meixi user, and the log data are respectively stored in a domestic cloud storage Network The memory and the American cloud are stored, and then the log data of partial American users can be extracted to a log storage platform SLS of a domestic server by utilizing a hierarchical sampling algorithm. Furthermore, index extraction, log clustering and geometric comparison processing operations can be performed on a large number of domestic users and partial Meixi users by using Flink flow calculation in a log processing layer to obtain various index data of the users, technicians can observe various index data of each user through a Huatuo console in a display layer, comprehensive index data of all users in a certain area can also be observed through an index large disk, abnormal index data can be early warned through a service monitoring system, and when the system sends out early warning information, technicians can search for the early warning information of a target user in a monitoring terminal to quickly solve the problems existing at a user terminal.
Fig. 6 is a schematic structural diagram of an information monitoring apparatus according to an exemplary embodiment of the present application. The information monitoring apparatus may be disposed in a device such as a server, and execute the information monitoring method according to any of the embodiments described above. As shown in fig. 6, the information monitoring apparatus may include:
an obtaining module 61, configured to obtain log data of multiple users in a user node;
a first determining module 62, configured to determine log indexes of the multiple users based on log data of the multiple users and a preset index algorithm;
a second determining module 63, configured to determine, based on the log indicators of the plurality of users, at least one target user who does not meet an indicator threshold and an anomaly indicator of the at least one target user;
a generating module 64, configured to generate early warning information based on the abnormality indicator of the at least one target user.
In the embodiment of the application, log data of a plurality of users in the user node can be acquired; determining log indexes of a plurality of users based on log data of the users and a preset index algorithm; determining at least one target user and abnormal indexes of at least one target user which do not meet an index threshold value based on log indexes of a plurality of users; and generating early warning information based on the abnormal indexes of the at least one target user. Therefore, the method and the device for processing the log data can directly obtain the log data of each user at the user node, determine the log indexes according to the log data, and further determine the abnormal log indexes and the target users corresponding to the abnormal log indexes in a mode of comparing the log indexes with the preset index threshold value, so that the early warning information is generated quickly, the problem of real-time monitoring at the user side is solved, and the user experience is effectively improved.
In some embodiments, the user nodes include domestic user nodes and overseas user nodes;
the obtaining module 61 includes:
the receiving unit is used for receiving the behavior data of each user in the domestic user node by using a first message middleware and receiving the behavior data of each user in the overseas user node by using a second message middleware;
an obtaining unit, configured to obtain log data of each user in the domestic user node and log data of each user in the overseas user node after performing logic processing on behavior data of each user in the domestic user node and behavior data of each user in the overseas user node, respectively;
wherein the logical processing includes any one or more of: field resolution, idempotent verification, user address resolution, user identification mapping and application information association.
In some embodiments, after the obtaining unit, the method further includes:
the sampling unit is used for sampling the log data of each user in the overseas user nodes based on a hierarchical sampling algorithm to obtain the log data of at least one user in the overseas user nodes;
the log data of at least one user is the log data of a part of users in the log data of all users in the overseas user node.
In some embodiments, the log data comprises: static log data and/or dynamic log data;
the obtaining module 61 is specifically configured to: acquiring static log data and/or dynamic log data of a plurality of users in the user node;
the first determining module 62 is specifically configured to: determining static indexes and/or dynamic indexes of the multiple users based on the static log data and/or the dynamic log data of the multiple users and a preset static index algorithm and/or a preset dynamic index algorithm;
the second determining module 63 is specifically configured to: determining at least one target user which does not meet a static index threshold value and/or a dynamic index threshold value and static abnormal indexes and/or dynamic abnormal indexes of the at least one target user based on the static indexes and/or the dynamic indexes of the plurality of users;
the generating module 64 is specifically configured to: and generating early warning information based on the static abnormal index and/or the dynamic abnormal index of the at least one target user.
In some embodiments, before the generating module 64, the method further includes:
a third determining module, configured to determine whether a failure service exists in log data of each user based on a preset buried point service and the log data of the multiple users;
and the fourth determining module is used for determining the user with the failed service as the target user.
In some embodiments, the apparatus further comprises:
a plurality of key index data obtaining modules 61, configured to obtain a plurality of key index data based on the log indexes of the users and a preset extraction rule;
and the display module is used for generating and displaying the index large disks corresponding to the plurality of key index data.
In some embodiments, before the obtaining module 61, the apparatus further includes:
the storage module is used for storing the log data of each user in the domestic user node into a first storage; and storing the log data of each user in the overseas user node into a second memory.
It should be noted that, when the information monitoring apparatus provided in the foregoing embodiment executes the information monitoring method, only the division of the functional modules is illustrated, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the above described functions. In addition, the information monitoring apparatus and the information monitoring method provided by the above embodiments belong to the same concept, and details of implementation processes thereof are referred to as method embodiments, which are not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. As shown in fig. 7, theelectronic device 70 may include: at least oneprocessor 71, at least onenetwork interface 74, auser interface 73, amemory 75, at least onecommunication bus 72.
Wherein acommunication bus 72 is used to enable the connection communication between these components.
Theuser interface 73 may include a Display screen (Display) and a Camera (Camera), and theoptional user interface 73 may also include a standard wired interface and a wireless interface.
Thenetwork interface 74 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Processor 71 may include one or more processing cores, among others. Theprocessor 71 connects various parts throughout theelectronic device 70 using various interfaces and lines to perform various functions of theelectronic device 70 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in thememory 75, and calling data stored in thememory 75. Alternatively, theprocessor 71 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). Theprocessor 71 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may be implemented by a single chip without being integrated into theprocessor 71.
TheMemory 75 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, thememory 75 includes a non-transitory computer-readable medium. Thememory 75 may be used to store instructions, programs, code, sets of codes, or sets of instructions. Thememory 75 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. Thememory 75 may alternatively be at least one memory device located remotely from theprocessor 71. As shown in fig. 7, thememory 75, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an information monitoring application program.
In theelectronic device 70 shown in fig. 7, theuser interface 73 is mainly used as an interface for providing input for a user, and acquiring data input by the user; andprocessor 71 may be configured to invoke the information monitoring application stored inmemory 75 and perform the following operations in particular:
acquiring log data of a plurality of users in user nodes;
determining log indexes of the users based on log data of the users and a preset index algorithm;
determining at least one target user and an abnormal index of the at least one target user which do not meet an index threshold value based on the log indexes of the plurality of users;
and generating early warning information based on the abnormal indexes of the at least one target user.
In some embodiments, the user nodes include domestic user nodes and overseas user nodes;
when executing acquiring log data of a plurality of users in a user node, theprocessor 71 specifically executes:
receiving behavior data of each user in the domestic user node by using a first message middleware, and receiving behavior data of each user in the overseas user node by using a second message middleware;
after the behavior data of each user in the domestic user node and the behavior data of each user in the overseas user node are respectively subjected to logic processing, log data of each user in the domestic user node and log data of each user in the overseas user node are obtained;
wherein the logical processing includes any one or more of: field resolution, idempotent verification, user address resolution, user identification mapping and application information association.
In some embodiments, theprocessor 71 further performs, after obtaining the log data of each user in the domestic user node and the log data of each user in the overseas user node:
sampling the log data of each user in the overseas user nodes based on a hierarchical sampling algorithm to obtain the log data of at least one user in the overseas user nodes;
the log data of at least one user is the log data of a part of users in the log data of all users in the overseas user node.
In some embodiments, the log data comprises: static log data and/or dynamic log data;
when theprocessor 71 executes the acquiring of the log data of the plurality of users in the user node, specifically: acquiring static log data and/or dynamic log data of a plurality of users in the user node;
when theprocessor 71 executes the log data based on the multiple users and the preset index algorithm to determine the log indexes of the multiple users, the following specific steps are executed: determining static indexes and/or dynamic indexes of the multiple users based on the static log data and/or the dynamic log data of the multiple users and a preset static index algorithm and/or a preset dynamic index algorithm;
when theprocessor 71 determines at least one target user not meeting the metric threshold and the abnormal metric of the at least one target user based on the log metrics of the plurality of users, specifically: determining at least one target user which does not meet a static index threshold value and/or a dynamic index threshold value and static abnormal indexes and/or dynamic abnormal indexes of the at least one target user based on the static indexes and/or the dynamic indexes of the plurality of users;
when executing the generation of the warning information based on the abnormal indicator of the at least one target user, theprocessor 71 specifically executes: and generating early warning information based on the static abnormal index and/or the dynamic abnormal index of the at least one target user.
In some embodiments, theprocessor 71 further performs, before performing the generating of the warning information based on the abnormality indicator of the at least one target user:
determining whether a failure service exists in the log data of each user based on a preset buried point service and the log data of the plurality of users;
and determining the user with the failed service as a target user.
In some embodiments, theprocessor 71 further performs:
acquiring a plurality of key index data based on the log indexes of the users and a preset extraction rule;
and generating and displaying the index large disks corresponding to the plurality of key index data.
In some embodiments, theprocessor 71 further performs, before performing the acquiring log data of a plurality of users in the user node:
storing log data of each user in the domestic user node into a first memory; and storing the log data of each user in the overseas user node into a second memory.
Embodiments of the present application also provide a computer-readable storage medium, which stores instructions that, when executed on a computer or a processor, cause the computer or the processor to perform one or more of the steps in the embodiments shown in fig. 3 to 4. The respective constituent modules of the information monitoring apparatus may be stored in the computer-readable storage medium if they are implemented in the form of software functional units and sold or used as independent products.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in or transmitted over a computer-readable storage medium. The computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)), or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., Digital Versatile Disk (DVD)), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. And the aforementioned storage medium includes: various media capable of storing program codes, such as a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, and an optical disk. The technical features in the present examples and embodiments may be arbitrarily combined without conflict.
The above-described embodiments are merely preferred embodiments of the present application, and are not intended to limit the scope of the present application, and various modifications and improvements made to the technical solutions of the present application by those skilled in the art without departing from the design spirit of the present application should fall within the protection scope defined by the claims of the present application.