Movatterモバイル変換


[0]ホーム

URL:


CN119440741A - Memory overflow event processing method, device, electronic device and storage medium - Google Patents

Memory overflow event processing method, device, electronic device and storage medium
Download PDF

Info

Publication number
CN119440741A
CN119440741ACN202510027816.1ACN202510027816ACN119440741ACN 119440741 ACN119440741 ACN 119440741ACN 202510027816 ACN202510027816 ACN 202510027816ACN 119440741 ACN119440741 ACN 119440741A
Authority
CN
China
Prior art keywords
memory overflow
overflow event
event
memory
container
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202510027816.1A
Other languages
Chinese (zh)
Inventor
余登峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongdian Cloud Computing Technology Co ltd
Original Assignee
Zhongdian Cloud Computing Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongdian Cloud Computing Technology Co ltdfiledCriticalZhongdian Cloud Computing Technology Co ltd
Priority to CN202510027816.1ApriorityCriticalpatent/CN119440741A/en
Publication of CN119440741ApublicationCriticalpatent/CN119440741A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The disclosure relates to a memory overflow event processing method, a memory overflow event processing device, electronic equipment and a storage medium, and relates to the field of memory overflow event processing. The method comprises the steps of capturing a memory overflow event in a kernel mode through a detection function which is mounted in a preset function in advance, responding to the captured memory overflow event, collecting relevant data of the memory overflow event and sending the relevant data to a user mode, carrying out enrichment processing on the relevant data of the memory overflow event in the user mode to obtain a memory overflow event log, and reporting the memory overflow event log. By applying the method and the device, the information of the memory overflow event can be obtained in real time, efficiently and accurately, and delay and missing report are avoided.

Description

Memory overflow event processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for processing a memory overflow event, an electronic device, and a storage medium.
Background
With the continuous development of cloud technology, more and more enterprises migrate business to containerized infrastructure. The cloud native architecture manages the containerized application through a Kubernetes and other container arrangement system, so that the flexibility, expandability and resource utilization efficiency of the system are greatly improved. The development of cloud technology has prompted the widespread use of container technology, making containers the standard for modern business deployment. However, in the cloud primary scene, resource management and performance monitoring become important guarantees for normal operation of the service, especially management of memory resources. In a cloud native environment, allocation and use of memory resources is controlled through cgroup (control groups), cgroup defines resource limitations for each container, including CPU, memory, network, I/O, etc. When the Memory resource used by a certain container exceeds the predetermined Memory resource, the kernel triggers an OOM (Out Memory) event to forcedly kill certain processes consuming the Memory to release the Memory resource. As the volume of container data increases, particularly in a dynamically telescoping cloud environment, the OOM events become more frequent, which poses challenges to the stability of the system and continuity of traffic. The OOM event is particularly common in the cloud primary environment, and because the container is dynamically scheduled on a Kubernetes platform and the like, service pressure fluctuation is large, memory consumption of the container is difficult to predict, occurrence of the OOM event becomes more uncontrollable, and the OOM event can bring problems of service middle section, difficult problem diagnosis, complex service influence and the like. Therefore, in the cloud native environment, real-time monitoring of the OOM event is particularly important.
Disclosure of Invention
The embodiment of the disclosure provides a memory overflow event processing method, a memory overflow event processing device, electronic equipment and a storage medium.
In a first aspect, an embodiment of the present disclosure provides a method for processing a memory overflow event, where in a kernel mode, a memory overflow event is captured in real time through a probe function pre-mounted on a preset function, relevant data of the memory overflow event is collected in response to the captured memory overflow event and sent to a user mode, in the user mode, the relevant data of the memory overflow event is subjected to enrichment processing to obtain a memory overflow event log, and the memory overflow event log is reported.
In a second aspect, an embodiment of the present disclosure provides a memory overflow event processing device, including an event capturing unit configured to capture a memory overflow event in real time by a probe function pre-installed in a preset function in a kernel state, a data collecting unit configured to collect related data of the memory overflow event in response to capturing the memory overflow event and send the related data to a user state, a data enriching unit configured to enrich the related data of the memory overflow event in the user state to obtain a memory overflow event log, and a log reporting unit configured to report the memory overflow event log.
In a third aspect, embodiments of the present disclosure provide an electronic device comprising a memory, a processor, a bus, and a computer program stored on the memory and executable on the processor, the processor implementing the memory overflow event handling method as described in the first aspect when executing the computer program.
In a fourth aspect, embodiments of the present disclosure provide a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a memory overflow event handling method as described in the first aspect.
By applying the technical scheme, the related data of the memory overflow time can be acquired by mounting the detection function on the preset function in the kernel mode, the related data is sent to the user mode, the related data is subjected to enrichment processing in the user mode to obtain the memory overflow event log, and the memory overflow event log is further reported, so that the information of the memory overflow event can be acquired in real time, efficiently and accurately, and delay and omission are avoided.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is an exemplary system architecture diagram to which one embodiment of the memory overflow event processing method of the present disclosure may be applied;
FIG. 2 is a flow chart illustrating an embodiment of a memory overflow event processing method of the present disclosure;
FIG. 3 is a flowchart illustrating another embodiment of a memory overflow event processing method according to the present disclosure;
FIG. 4 is a schematic diagram illustrating an embodiment of a memory overflow event handling apparatus according to the present disclosure;
fig. 5 is a schematic structural view of one embodiment of an electronic device of the present disclosure.
Detailed Description
It should be noted that the following detailed description is exemplary and is intended to provide further explanation of the present disclosure. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs.
It is noted that the terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of exemplary embodiments in accordance with the present disclosure. As used herein, the singular is also intended to include the plural unless the context clearly indicates otherwise, and furthermore, it is to be understood that the terms "comprises" and/or "comprising" when used in this specification are taken to specify the presence of stated features, steps, operations, devices, components, and/or combinations thereof.
Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
In order to make the technical scheme and advantages of the present disclosure more apparent, the present disclosure will be further described in detail below with reference to the accompanying drawings and specific embodiments.
FIG. 1 illustrates an exemplary system architecture 100 to which embodiments of the memory overflow event handling method or memory overflow event handling apparatus of the present disclosure may be applied.
As shown in fig. 1, system architecture 100 may include node 101, network 102, server 103, and database 104. Network 102 is the medium used to provide communication links between nodes 101 and servers 103 and databases 104. Network 102 may include various connection types such as wired, wireless communication links, or fiber optic cables, among others.
The operating system of node 101 may include a user state and a kernel state. The CPU in kernel mode can access any data and peripheral equipment, and can be switched from one program to another program, and the occupation of the CPU can not happen in preemption. The CPU in the user state can only access limited resources, can not directly access hardware devices such as a memory, and can only access the privileged resources by trapping into the kernel through system call. Node 101 may upload a log of node overflow events to database 104 when the node overflow event occurs. The node 101 may be connected to a display device to display information such as a log of the node overflow time.
The node is a working node in the Kubernetes cluster and is responsible for running the containerized application. Each Node has a runtime environment (e.g., docker) and runs multiple Pod. A Node may be a physical machine or a virtual machine. Pod is the smallest schedulable unit in Kubernetes and typically contains one or more containers that share storage, networks, and configurations. The containers in one Pod cooperate to accomplish a certain task and are always scheduled and run together.
Server 103 may obtain a log of node overflow events from database 104, analyze the log, and feed back the analysis to node 101. Node 101 may adjust the configuration information based on the results fed back by server 103.
Database 104 may be various types of databases that may store a log of node overflow events, database 103 may be accessed at a specified time or under specified conditions, and node 101 may also access database 104.
It should be noted that, some steps of the memory overflow event processing method provided in the embodiments of the present disclosure may be performed by the node 101, and another part of steps may be performed by the server 103. Or all steps of the memory overflow event handling method are performed by node 101. Accordingly, a portion of the memory overflow event handling means may be provided in node 101, another portion may be provided in server 103, or all of the memory overflow event handling means may be provided in node 101.
It should be understood that the number of nodes, networks, servers, and databases in fig. 1 are merely illustrative. There may be any number of nodes, networks, servers, and databases as desired for an implementation.
FIG. 2 illustrates a flow 200 of one embodiment of a memory overflow event processing method of the present disclosure. As shown in fig. 2, the memory overflow event processing method of the present embodiment may include the following steps:
In step 201, in the kernel state, the memory overflow event is captured in real time by a probe function pre-installed in a preset function.
In this embodiment, the execution body of the memory overflow event processing method (for example, the node 101 shown in fig. 1) may capture the memory overflow event in real time through a preset function. Specifically, the preset function may be a function for handling a memory overflow event. In some specific practices, the preset function may be a OOM _kill_process function, which is a key function used by the kernel to process the OOM event. The detection function can be mounted on the preset function in advance, and when the OOM event occurs, the detection function can sense, so that the real-time capturing of the OOM event can be realized. Specifically, the probe function may be mounted in the form of a hook function.
Step 202, in response to capturing the memory overflow event, collecting relevant data of the memory overflow event, and sending the relevant data to the user state.
In this embodiment, the relevant data of the OOM event may be collected before or while the preset function processes the OOM event. The related data may include a context of the OOM event, and may further include a thread triggering the OOM event, and information of a process killed by a preset function. After the related data is acquired, the related data can be sent to the user mode through a communication channel between the kernel mode and the user mode.
In some specific practices, the acquisition of relevant data may be accomplished by inserting probes into the oom _kill_process function described above using eBPF. The predecessor of The eBPF, collectively extended Berkeley PACKET FILTER, EBP technology, referred to as BPF (Berkeley PACKET FILTER), or cBPF (classic BPF), was first mentioned in 1992 in STEVEN MCCANNE and Van Jacobson, the BSD PACKET FILTER: A New Architecture for User-LEVEL PACKET Capture. Briefly, eBPF is a very flexible and efficient virtual machine-like component in the Linux kernel that can safely execute bytecodes (bytecode) at many kernel hook points. Many nuclear subsystems have used BPFs, such as common networking, tracking and security. Accordingly, the collected relevant data of the OOM event can be sent to the user mode for processing by using the eBPF perf buffer mechanism. The perfbuffer mechanism is an efficient mechanism for securely and efficiently transferring data collected by eBPF programs to user space. It is based on a performance event (PERF EVENTS) subsystem in the Linux kernel and provides a way for eBPF programs to pass events or other data to processes running in user space.
In step 203, in the user state, enrichment processing is performed on the related data of the memory overflow event, so as to obtain a memory overflow event log.
In the user mode, the enrichment processing can be carried out on the related data of the OOM event to obtain the memory overflow event log. Data enrichment refers to the process of enriching raw data by adding or supplementing additional information. This includes invoking external services to obtain additional information, purging and validating data, format conversion, etc., to improve the integrity and applicability of the data. Specifically, according to the specified fields in the related data, the fields related to the specified fields can be searched, and the related relation between the specified fields and the searched fields is established, so as to obtain the OOM event log.
And step 204, reporting the memory overflow event log.
After the memory overflow event log is obtained, it can be reported to the database. In this way, it can be read for further processing.
According to the memory overflow event processing method provided by the embodiment of the disclosure, the detection function can be mounted on the preset function in the kernel mode to collect the related data of the memory overflow time, the related data is sent to the user mode, the related data is subjected to enrichment processing in the user mode to obtain the memory overflow event log, and the memory overflow event log is further reported, so that the information of the memory overflow event can be obtained in real time, efficiently and accurately, and delay and omission are avoided.
With continued reference to fig. 3, a flow 300 of another embodiment of a memory overflow event processing method according to the present disclosure is shown. As shown in fig. 3, the memory overflow event processing method of the present embodiment may include the following steps:
in step 301, a probe is inserted at a preset function, and a probe function is mounted at the probe.
In this embodiment, probes may be inserted in user mode at each node using eBPF kprobe at kernel function oom _kill_process, which is a process termination event dedicated to handling under-memory. This probe mounting allows the capture of the OOM events occurring in the system in real time.
In step 302, in the kernel state, the memory overflow event is captured in real time by a probe function pre-installed in a preset function.
The OOM event can be perceived in real time through a probe function pre-installed on the kernel function OOM _kill_process.
In step 303, in response to capturing the memory overflow event, relevant data of the memory overflow event is collected and sent to the user state.
After the OOM event is perceived, context information of the OOM event can be obtained, including a PID, NSPID, a process path, a process name, a container identifier of the process, a number of memory pages occupied by the process, a parent process PID, a parent process NSPID, a parent process name, a parent process path, a PID, NSPID, a process path, a process name, a container identifier of the process, a parent process PID, a parent process NSPID, a parent process name, and a parent process path of the process that is performed by the OOM kill. Specifically, the results are shown in Table 1. And sending the acquired information to a user mode through a perf buffer for further processing. The process runs in a kernel mode through eBPF programs, and can achieve real-time OOM event capture with extremely low performance overhead.
Table 1 data relating to the OOM events collected
Step 304, determining a container identifier from the related data in the user mode, determining container metadata corresponding to the container identifier according to the container identifier, and enriching the related data according to the container metadata to obtain a memory overflow event log.
In this embodiment, the user state may be cached with metadata of the container and metadata of the process. In the Kubernetes environment, pod is the smallest resource management component. Pod metadata ‌ refers to various information related to Pod in the Kubernetes environment, including the name of Pod, IP address, namespace where it is located, the name of the running node, the name of the service account, CPU and memory usage and restrictions of the container, tags and notes of Pod, and so on. The data enrichment may be performed by a container identification (i.e., container_id) in the relevant data while the relevant data of the ook event is received. In some specific practices, the enriched data includes container names, pod names, and namespaces, and the resulting OOM event log is more complete. The enriched OOM event log includes the data as shown in Table 2.
TABLE 2 OOM event Log Entries including data
Fcontainer _name and fp od_ name, fnamespace in table 2 are extended fields.
And step 305, reporting the memory overflow event log.
Step 306, determining potential malicious behaviors according to the memory overflow event log and preset alarm rules, and outputting the potential malicious behaviors to alarm.
In this embodiment, the memory overflow event log may be further analyzed and processed. Specifically, a preset alarm rule can be combined to determine potential malicious behaviors. For example, the preset alert rule triggers an OOM event for a pod under the specified user namespace. User namespaces are a very important resource in kubernetes systems, and their main role is to achieve resource isolation for multiple sets of environments or multi-tenant resource isolation. After the cluster is started, several user namespaces are created by default. If it is analyzed in the memory overflow time log that the pod under the specified user namespace triggered the OOM event, then the behavior is considered to be either a resource abuse, or an attack.
Furthermore, a big data analysis platform, such as a link stream computing engine, can be utilized to analyze, identify pos, containers, processes that frequently trigger the OOM, generate alarms for potential malicious behaviors (such as resource abuse, DDOS attacks, etc.), and notify operation and maintenance personnel through mail, short messages or enterprise communication tools.
Step 307, analyzing the memory overflow event log, determining the container identification with the number of times of occurrence of the memory overflow event exceeding the preset value, and adjusting the configuration information corresponding to the container identification.
In addition, the memory overflow event log can be analyzed to determine the container identification that the number of times of occurrence of the memory overflow event exceeds a preset value. For example, if Pod B under user namespace a has occurred three OOM events within an hour, then the memory resource limitations of Pod B under user namespace a are considered less. At this time, the Kubernetes API may be called to increase the memory resource limit of Pod B under the user namespace a by 1.5 times, or the Kubernetes API may be called to set the Node Affinity (Node Affinity) of Pod B under the user namespace a, and schedule the Node to the Node with rich memory resource.
Step 308, the memory overflow event log is analyzed to determine the memory overflow information of each node and the container, the father-son relationship of the process triggering the memory overflow event and the father-son relationship of the killed process, and the memory overflow information and the father-son relationship are visually displayed.
In addition, the memory overflow event log can be analyzed to determine the memory overflow information of each node and the container, the father-son relationship of the process triggering the memory overflow event and the father-son relationship of the killed process. In particular, it may be determined when and why a memory overflow event occurred for each node or each container. Further, the memory overflow information and the parent-child relationship can be displayed through a visualization tool. Further, when displaying, historical memory overflow information and real-time memory overflow information of each node and container can be displayed.
In some optional implementations of the embodiment, memory overflow information of the single node and the container may be displayed in real time through a dashboard, and a memory overflow event triggering trend of the single node and the container may be determined according to historical memory overflow information in a preset time period. In this way, decisions can be made by the operation and maintenance personnel.
According to the memory overflow event processing method provided by the embodiment of the disclosure, the eBPF kprobe technology is adopted to mount the kernel function OOM _kill_process, so that the method is non-invasive to the service, and the OOM event can be captured in real time with extremely low performance cost. Compared with the traditional monitoring means, the method and the device can acquire the OOM event information in real time, efficiently and accurately, and avoid delay and missing report. In addition, detailed context information of the processes triggering the OOM and the processes being OOM kills can be accurately captured in the kernel state, wherein the detailed context information comprises a process ID, a path, a container ID, a memory used by the processes and the like, and the user state enriches the container and Pod metadata, so that the integrity and the accuracy of OOM event data are ensured. This provides complete underlying data for subsequent analysis and response. By enriching the OOM event log, the events are associated with metadata such as containers, pod, namespaces and the like, so that the tight association of the OOM events with the services in the cloud primary environment is realized. The relevance of the context information enables operation and maintenance personnel to rapidly identify the service and the container of the problem, and improves the problem positioning efficiency. By carrying out automatic resource adjustment or node migration on the service with frequent OOM events, service interruption caused by resource contention is avoided. The automatic response capability obviously reduces manual intervention work of operation and maintenance personnel, and improves the stability and service continuity of the system. The real-time OOM event is analyzed through the big data analysis platform, the abnormal situation can be timely detected and identified by combining with the preset alarm rule, and related personnel are notified through various channels, so that a flexible alarm mechanism is realized, and the operation and maintenance team can respond rapidly. The real-time display and history inquiry of the OOM event are supported, and strong monitoring and analysis capability is provided. The operation and maintenance personnel can view the system state in real time by means of the visual instrument panel, identify the resource hot spot, and can further optimize the resource configuration and strategy by analyzing the historical data.
With further reference to fig. 4, as an implementation of the method shown in the foregoing figures, the present disclosure provides an embodiment of a memory overflow event processing apparatus, where an embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 4, the memory overflow event processing device 400 of the present embodiment includes an event capturing unit 401, a data collecting unit 402, a data enriching unit 403, and a log reporting unit 404.
The event capturing unit 401 is configured to capture, in the kernel state, the memory overflow event in real time through the probe function pre-installed in the preset function.
The data acquisition unit 402 is configured to acquire relevant data of the memory overflow event in response to capturing the memory overflow event, and send the relevant data to the user mode.
The data enrichment unit 403 is configured to enrich the relevant data of the memory overflow event in the user mode, so as to obtain a memory overflow event log.
The log reporting unit 404 is configured to report the memory overflow event log.
In addition, in the technical scheme of the application, the application also provides electronic equipment.
Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
As shown in fig. 5, the electronic device may include a processor 501, a memory 502, a bus 503, and a computer program stored on the memory 502 and executable on the processor 501, wherein the processor 501 and the memory 502 perform communication with each other via the bus 503. The processor 501 performs the steps of implementing the method when executing the computer program, for example, the method includes capturing a memory overflow event in real time through a probe function pre-installed in a preset function in a kernel mode, acquiring related data of the memory overflow event in response to capturing the memory overflow event, and sending the related data to a user mode, enriching the related data of the memory overflow event in the user mode to obtain a memory overflow event log, and reporting the memory overflow event log.
In addition, in an embodiment of the present disclosure, a non-transitory computer readable storage medium is provided, on which a computer program is stored, where the computer program when executed by a processor implements the steps of the method described above, for example, in a kernel mode, capturing a memory overflow event in real time through a probe function pre-installed in a preset function, in response to capturing the memory overflow event, capturing relevant data of the memory overflow event, and sending the relevant data to a user mode, in the user mode, performing enrichment processing on the relevant data of the memory overflow event to obtain a memory overflow event log, and reporting the memory overflow event log.
In summary, in the technical solution of the present disclosure, the detection function may be mounted on the preset function in the kernel mode to collect related data of the memory overflow time, and the related data is sent to the user mode, and enrichment processing is performed on the related data in the user mode to obtain the memory overflow event log, and the memory overflow event log is further reported, so that information of the memory overflow event can be obtained in real time, efficiently and accurately, and delay and omission are avoided.
The foregoing description of the preferred embodiments of the present disclosure is not intended to limit the disclosure, but rather to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present disclosure.

Claims (10)

Translated fromChinese
1.一种内存溢出事件处理方法,所述方法包括:1. A method for handling a memory overflow event, the method comprising:在内核态中,通过预先挂载在预设函数的探测函数实时捕获内存溢出事件;In kernel state, memory overflow events are captured in real time through the detection function pre-mounted in the preset function;响应于捕获到内存溢出事件,采集所述内存溢出事件的相关数据,并将所述相关数据发送至用户态;In response to capturing a memory overflow event, collecting data related to the memory overflow event, and sending the data related to the user state;在用户态中,对所述内存溢出事件的相关数据进行富化处理,得到内存溢出事件日志;In the user state, enriching the relevant data of the memory overflow event to obtain a memory overflow event log;上报所述内存溢出事件日志。Report the memory overflow event log.2.根据权利要求1所述的方法,其中,所述方法还包括:2. The method according to claim 1, wherein the method further comprises:在所述预设函数处插入探针,在所述探针处挂载所述探测函数。A probe is inserted at the preset function, and the detection function is mounted at the probe.3.根据权利要求1所述的方法,其中,所述对所述内存溢出事件的相关数据进行富化处理,包括:3. The method according to claim 1, wherein the enrichment of the data related to the memory overflow event comprises:从所述相关数据中确定出容器标识;determining a container identification from the associated data;根据所述容器标识,确定出所述容器标识对应的容器元数据;Determining, according to the container identifier, container metadata corresponding to the container identifier;根据所述容器元数据,对所述相关数据进行富化处理。The relevant data is enriched according to the container metadata.4.根据权利要求1所述的方法,其中,所述方法还包括:4. The method according to claim 1, wherein the method further comprises:根据所述内存溢出事件日志以及预设告警规则,确定潜在恶意行为;Determine potential malicious behavior based on the memory overflow event log and preset alarm rules;输出所述潜在恶意行为以进行告警。The potential malicious behavior is output for warning.5.根据权利要求1所述的方法,其中,所述方法还包括:5. The method according to claim 1, wherein the method further comprises:对所述内存溢出事件日志进行分析,确定出发生内存溢出事件次数超过预设数值的容器标识;Analyze the memory overflow event log to determine the container identifiers for which the number of memory overflow events that occurred exceeds a preset value;对所述容器标识对应的配置信息进行调整。The configuration information corresponding to the container identifier is adjusted.6.根据权利要求1所述的方法,其中,所述方法还包括:6. The method according to claim 1, wherein the method further comprises:对所述内存溢出事件日志进行分析,确定每个节点和容器的内存溢出信息、触发内存溢出事件的进程的父子关系、被杀死的进程的父子关系;Analyze the memory overflow event log to determine the memory overflow information of each node and container, the parent-child relationship of the process that triggered the memory overflow event, and the parent-child relationship of the killed process;可视化展示所述内存溢出信息、所述父子关系。The memory overflow information and the parent-child relationship are displayed visually.7.根据权利要求6所述的方法,其中,所述可视化展示所述内存溢出信息、所述父子关系,包括:7. The method according to claim 6, wherein the visual display of the memory overflow information and the parent-child relationship comprises:通过仪表盘实时展示单个节点和容器的内存溢出信息;The dashboard displays the memory overflow information of a single node and container in real time.根据预设时间段内的历史内存溢出信息,确定单个节点和容器的内存溢出事件触发趋势。Based on the historical memory overflow information within a preset time period, the memory overflow event triggering trend of a single node and container is determined.8.一种内存溢出事件处理装置,所述装置包括:8. A memory overflow event processing device, the device comprising:事件捕获单元,被配置成在内核态中,通过预先挂载在预设函数的探测函数实时捕获内存溢出事件;The event capture unit is configured to capture the memory overflow event in real time in the kernel state through a detection function pre-mounted in a preset function;数据采集单元,被配置成响应于捕获到内存溢出事件,采集所述内存溢出事件的相关数据,并将所述相关数据发送至用户态;A data collection unit, configured to collect relevant data of the memory overflow event in response to capturing the memory overflow event, and send the relevant data to the user state;数据富化单元,被配置成在用户态中,对所述内存溢出事件的相关数据进行富化处理,得到内存溢出事件日志;A data enrichment unit is configured to perform enrichment processing on the relevant data of the memory overflow event in a user state to obtain a memory overflow event log;日志上报单元,被配置成上报所述内存溢出事件日志。The log reporting unit is configured to report the memory overflow event log.9.一种电子设备,包括存储器、处理器、总线及存储在存储器上并可在处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时实现如权利要求1至7任一项所述的内存溢出事件处理方法。9. An electronic device, comprising a memory, a processor, a bus, and a computer program stored in the memory and executable on the processor, wherein the processor implements the memory overflow event processing method as described in any one of claims 1 to 7 when executing the computer program.10.一种非暂态计算机可读存储介质,其上存储有计算机程序,其特征在于,该计算机程序被处理器执行时实现如权利要求1至7任一项所述的内存溢出事件处理方法。10. A non-transitory computer-readable storage medium having a computer program stored thereon, wherein when the computer program is executed by a processor, the memory overflow event processing method according to any one of claims 1 to 7 is implemented.
CN202510027816.1A2025-01-082025-01-08 Memory overflow event processing method, device, electronic device and storage mediumPendingCN119440741A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202510027816.1ACN119440741A (en)2025-01-082025-01-08 Memory overflow event processing method, device, electronic device and storage medium

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202510027816.1ACN119440741A (en)2025-01-082025-01-08 Memory overflow event processing method, device, electronic device and storage medium

Publications (1)

Publication NumberPublication Date
CN119440741Atrue CN119440741A (en)2025-02-14

Family

ID=94513552

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202510027816.1APendingCN119440741A (en)2025-01-082025-01-08 Memory overflow event processing method, device, electronic device and storage medium

Country Status (1)

CountryLink
CN (1)CN119440741A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140289564A1 (en)*2012-06-292014-09-25Vmware, Inc.System and method for injecting faults into code for testing thereof
US20170329655A1 (en)*2016-05-132017-11-16Beijing Baidu Netcom Science And Technology Co., Ltd.Method and apparatus of unloading out of memory processing flow to user space
CN114546668A (en)*2022-04-272022-05-27恒生电子股份有限公司Log collection method and device, electronic equipment and computer readable storage medium
CN118132379A (en)*2024-03-082024-06-04北京博睿宏远数据科技股份有限公司 A memory overflow event monitoring method, device, equipment and medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20140289564A1 (en)*2012-06-292014-09-25Vmware, Inc.System and method for injecting faults into code for testing thereof
US20170329655A1 (en)*2016-05-132017-11-16Beijing Baidu Netcom Science And Technology Co., Ltd.Method and apparatus of unloading out of memory processing flow to user space
CN114546668A (en)*2022-04-272022-05-27恒生电子股份有限公司Log collection method and device, electronic equipment and computer readable storage medium
CN118132379A (en)*2024-03-082024-06-04北京博睿宏远数据科技股份有限公司 A memory overflow event monitoring method, device, equipment and medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
LINUX: ""掌握Linux内存故障追踪:技术指南"", pages 2, Retrieved from the Internet <URL:https://zhuanlan.zhihu.com/p/686611322>*
ONCE-DAY: ""Linux之ebpf(1)基础使用"", pages 1 - 11, Retrieved from the Internet <URL:https://blog.csdn.net/Once_day/article/details/138094172>*
小亿: ""flink内存溢出节点挂掉怎么解决"", pages 1, Retrieved from the Internet <URL:https://www.yisu.com/ask/6340819.html>*
胖当当技术: ""生产问题(一)K8S内存溢出"", pages 1 - 3, Retrieved from the Internet <URL:https://blog.csdn.net/m0_69270256/article/details/124140603>*
隔壁超市薯片半价: ""node内存溢出解决方法"", pages 1, Retrieved from the Internet <URL:https://blog.51cto.com/u_16236325/10837397>*

Similar Documents

PublicationPublication DateTitle
AU2023201395B2 (en)Data stream processing language for analyzing instrumented software
CN106487596B (en)Distributed service tracking implementation method
CN106941493B (en)Network security situation perception result output method and device
CN113420032B (en) A log classification storage method and device
US20110067036A1 (en)Method for Determining Relationship Data Associated with Application Programs
CN112350854B (en)Flow fault positioning method, device, equipment and storage medium
CN112351024B (en)Public network communication safety monitoring system and method
WO2016089747A1 (en)Security information and event management
US10915510B2 (en)Method and apparatus of collecting and reporting database application incompatibilities
CN112307046A (en)Data acquisition method and device, computer readable storage medium and electronic equipment
US9645877B2 (en)Monitoring apparatus, monitoring method, and recording medium
CN111970151A (en)Flow fault positioning method and system for virtual and container network
CN113014555B (en)Method and device for determining attack event, electronic equipment and storage medium
US11556120B2 (en)Systems and methods for monitoring performance of a building management system via log streams
CN119440741A (en) Memory overflow event processing method, device, electronic device and storage medium
CN117806910A (en)Multi-class equipment log data acquisition and analysis method and system
CN111177281A (en) An access control method, device, device and storage medium
CN114756469B (en)Data relationship analysis method and device and electronic equipment
CN111368039B (en)Data management system
CN113778709A (en)Interface calling method, device, server and storage medium
CN113791957B (en)Log processing method, system and medium
CN112989324B (en)Data interaction method, device, electronic equipment and storage medium
CN110874303A (en)Data acquisition method, device and equipment
CN114238008A (en)Data acquisition method, device and system, electronic equipment and storage medium
CN117336215A (en)Network data auditing method and device, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination

[8]ページ先頭

©2009-2025 Movatter.jp