[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN112527410A - Full link tracking method, device, equipment and storage medium - Google Patents

Full link tracking method, device, equipment and storage medium Download PDF

Info

Publication number
CN112527410A
CN112527410A CN202011498705.2A CN202011498705A CN112527410A CN 112527410 A CN112527410 A CN 112527410A CN 202011498705 A CN202011498705 A CN 202011498705A CN 112527410 A CN112527410 A CN 112527410A
Authority
CN
China
Prior art keywords
service
calling
data
tracking
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011498705.2A
Other languages
Chinese (zh)
Inventor
陈奕文
杨广华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Shenzhen Huantai Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd, Shenzhen Huantai Technology Co Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202011498705.2A priority Critical patent/CN112527410A/en
Publication of CN112527410A publication Critical patent/CN112527410A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Quality & Reliability (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a full link tracking method, a full link tracking device, full link tracking equipment and a full link tracking storage medium, and belongs to the technical field of computers. The method comprises the following steps: intercepting the calling request information and calling response information of each service through the intercepting plug-in corresponding to each service included in the micro-service system; performing data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, wherein the service calling tracking data is used for representing calling conditions among services in the micro service system; and sending the service calling tracking data to a tracking database for storage. The technical scheme provided by the embodiment of the application can avoid intrusion on the service code of the service, and further can avoid influencing the reliability of the service code of the service.

Description

Full link tracking method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a full link tracking method, apparatus, device, and storage medium.
Background
The microservice system is a relatively common software development technology, and can construct an application program into a plurality of services, wherein each service can realize one function, and finally the whole function of the application program can be realized through mutual calling between the services. However, since the microservice system needs to rely on mutual invocation between services, after a failure occurs in one service, the failure is transmitted along the invocation link, and finally an avalanche effect may be generated, which may cause the failure of the whole microservice system. Furthermore, in a microservice system, the call link can be very long, and therefore, after the microservice system fails, it is difficult to locate the specific service that failed. In order to solve the problem, the micro service system introduces a full link tracking technology, and the full link tracking technology can record the calling condition between internal services when the micro service system responds to each user request, so that the specific service with a fault can be conveniently positioned through recording.
In the related art, a full link tracking technology may be implemented by using a bytecode injection method, and specifically, in a process of starting each service in the micro service system, an interceptor in the micro service system may inject a preset interception code into a service code of the service, and the interception code may intercept and record call data of the service and data responding to the call.
However, the bytecode injection mode has serious invasion to the service code of the service, and can have serious influence on the reliability of the service code of the service.
Disclosure of Invention
Based on this, the embodiments of the present application provide a full link tracking method, apparatus, device, and storage medium, which can avoid intrusion on a service code of a service, and then can avoid affecting reliability of the service code.
In a first aspect, a full link tracking method is provided, and the method includes:
intercepting the calling request information and calling response information of each service through the intercepting plug-in corresponding to each service included in the micro-service system; performing data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, wherein the service calling tracking data is used for representing calling conditions among services in the micro service system; and sending the service calling tracking data to a tracking database for storage.
In a second aspect, a full link tracking apparatus is provided, the apparatus comprising:
the interception module is used for intercepting the call request information and the call response information of each service through an interception plug-in each service included in the micro service system;
the extraction module is used for carrying out data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, and the service calling tracking data is used for representing calling conditions among services in the micro service system;
and the sending module is used for sending the service calling tracking data to a tracking database for storage.
In a third aspect, a computer device is provided, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, implements the full link tracking method as described in the first aspect above.
In a fourth aspect, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the full link tracking method as described in the first aspect above.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
intercepting plug-ins respectively corresponding to each service are arranged in the micro-service system in the technical scheme provided by the embodiment of the application, the intercepting plug-ins are used for intercepting the calling request information and the calling response information of each service, the intercepting plug-ins respectively corresponding to each service, the calling request information and the calling response information of each service are intercepted by the intercepting plug-ins respectively corresponding to each service included in the micro-service system, then, the data extraction processing is carried out on each calling request information and each calling response information obtained through the intercepting processing, and the service calling tracking data is sent to a tracking database for storage, thus, the reliability of the service code affecting the service can be avoided.
Drawings
Fig. 1 is a block diagram of a microservice system provided in an embodiment of the present application;
FIG. 2 is a block diagram of another microservice system provided by an embodiment of the present application;
fig. 3 is a flowchart of a full link tracking method according to an embodiment of the present application;
fig. 4 is a flowchart of another full link tracking method provided in an embodiment of the present application;
fig. 5 is a flowchart of another full link tracking method provided in an embodiment of the present application;
FIG. 6 is a block diagram of a full link tracking apparatus according to an embodiment of the present application;
FIG. 7 is a block diagram of another full link tracking device provided by an embodiment of the present application;
fig. 8 is a block diagram of a computer device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Currently, the architecture of the micro service system is becoming more and more common in the field of software development, and software developers can construct an application program into a plurality of services based on the architecture of the micro service system, wherein each service can realize one function, and finally the whole function of the application program can be realized through mutual calling between the services.
For example, referring to fig. 1, for an application program implementing e-commerce promotion activities, a software developer may construct the application program into a preferential calculation service a, an order service B and a user service C based on the architecture of the microservice system, where the order service a is used for implementing a function of creating an order, the preferential calculation service B is used for implementing a function of calculating a size of a preferential, and the user service C is used for implementing a function of querying a historical shopping behavior of a user.
The overall function of the E-commerce promotion activity application program can be realized through the calling among the discount computing service A, the order service B and the user service C, specifically, the order service B can call the discount computing service A to compute the discount size in the order creating process, the discount computing service A can call the user service C to inquire the historical shopping behavior of the user in the discount size computing process, the user service C feeds the inquired historical shopping behavior of the user back to the discount computing service A, the discount computing service A can compute the discount size based on the historical shopping behavior of the user fed back by the user service C and feeds the computed discount size back to the order service B, and the order service B can create the order based on the discount size.
As described above, the micro service system needs to rely on mutual invocation between services, and therefore, after a failure occurs in a certain service, the failure is transmitted along the invocation link, and finally an avalanche effect may be generated, which may cause the failure of the whole micro service system.
For example, in the above example, if the user service C fails, the preferential computing service a cannot implement its function, and then the order service B cannot implement its function, and finally the entire microservice system fails.
Meanwhile, although the micro service system includes only 3 services and the call link between the 3 services is short in the above example, in practical applications, the micro service system may include a large number of services and the call link between the large number of services may be very long, and thus, it is difficult to locate a specific service where a failure occurs after the micro service system fails.
In order to solve the problem, the micro service system introduces a full link tracking technology, and the full link tracking technology can record the calling condition between internal services when the micro service system responds to each user request, so that the specific service with a fault can be conveniently positioned through recording.
In the related art, a full link tracking technology may be implemented by using a bytecode injection method, and specifically, in a process of starting each service in the micro service system, an interceptor in the micro service system may inject a preset interception code into a service code of the service, and the interception code may intercept and record call data of the service and data responding to the call.
However, the way of bytecode injection is very serious for service code intrusion, which may have unpredictable impact on the service code, and thus, the reliability of the service code is seriously affected.
In view of this, an embodiment of the present application provides a full link tracking method, in which a computer device may perform interception processing on call request information and call response information of each service through an interception plug-in corresponding to each service included in a micro service system, and then perform data extraction processing on each call request information and each call response information obtained through the interception processing to obtain service call tracking data, where the service call tracking data is used to characterize a call situation between services in the micro service system, and then send the service call tracking data to a tracking database for storage. Because the interception plug-in and the service are independent, the service code of the service cannot be invaded in the interception process, and the reliability of the service code can be prevented from being influenced.
It should be noted that, in the full-link tracking method provided in the embodiment of the present application, an execution main body may be a full-link tracking device, and the full-link tracking device may be implemented in a software, hardware, or a combination of the software and the hardware to become part or all of a computer device, where a micro service system may be deployed in the computer device, the computer device may be one device or an equipment cluster composed of multiple devices, and the computer device may be a server or the like.
Referring to fig. 2, a microservice system W deployed in a computer device in the embodiment of the present application may include a plurality of services F (only 3 services F are exemplarily shown in fig. 2) and a plurality of interception plug-ins L (only 3 interception plug-ins L are exemplarily shown in fig. 2) in one-to-one correspondence with the plurality of services F.
The code in the interception plug-in L is independent of the business code in the service F, and the interception plug-in L is used for intercepting the call data of the corresponding service F and the data responding to the call.
Referring to fig. 3, a flowchart of a full link tracking method provided by an embodiment of the present application is shown, where the full link tracking method can be applied to the computer device described above. As shown in fig. 1, the full link tracing method may include the steps of:
step 301, the computer device intercepts the call request information and the call response information of each service through the interception plug-in corresponding to each service included in the micro service system.
As described above, the services in the microservice system can be mutually called, wherein the calling request information is used for requesting to call the service, and the calling response information is used for responding to the calling request information. In this embodiment of the present application, the call request information may be implemented based on an RPC call protocol or an HTTP call protocol, which is not specifically limited in this embodiment of the present application.
In the embodiment of the application, the micro service system includes an interception plug-in corresponding to each service, where the interception plug-in may monitor a call interface of the corresponding service, may monitor call request information and call response information of the corresponding service by monitoring the call interface, and intercept the monitored call request information and call response information.
It should be noted that the interception processing in the embodiment of the present application refers to processing of collecting call request information and call response information.
Step 302, the computer device performs data extraction processing on each piece of call request information and each piece of call response information obtained through the interception processing to obtain service call tracking data.
In the embodiment of the application, after the computer device obtains the call request information and the call response information through interception processing, the computer device may extract preset fields in the call request information and the call response information, so as to obtain the service call tracking data.
The service call tracing data is used to characterize the call situation between services in the microservice system, for example, the service call tracing data may be used to characterize the response duration of the service, whether the service is abnormal, the location where the service is specifically deployed, the identity of the user, and the like.
Step 303, the computer device sends the service invocation tracking data to the tracking database for storage.
After obtaining the service call trace data, the computer device may report the service call trace data to kafka, and then kafka may transmit the service call trace data to the flink cluster, so that the flink cluster consumes the service call trace data, and then the flink cluster may transmit the service call trace data to the trace database for storage.
In an optional embodiment of the present application, the tracking database may provide a query interface, and a user may query the service invocation tracking data stored in the tracking database based on the query interface, so as to locate a service in the micro service system that has a fault based on a query result.
The full link tracking method provided by this embodiment intercepts call request information and call response information of each service through an interception plug-in corresponding to each service included in a micro service system, and then extracts data from each call request information and each call response information obtained through the interception processing to obtain service call tracking data, where the service call tracking data is used to characterize the call situation between services in the micro service system, and then sends the service call tracking data to a tracking database for storage. The service code of the service cannot be invaded in the intercepting process, so that the reliability of the service code which is influenced can be avoided.
In alternative embodiments of the present application, the computer device sending the service invocation trace data to the trace database for storage may include the following three exemplary scenarios.
In the first case: and the computer equipment sends all the service calling tracking data extracted from each calling request message and each calling response message to a tracking database for storage.
In an embodiment of the application, the computer device may send all extracted service invocation trace data to the trace database. Therefore, the trace data of the service invocation can be ensured to be omitted, any fault of the micro-service system can be positioned in a mode of inquiring the trace database, and the risk that the fault cannot be positioned in the mode of inquiring the trace database due to the omission of the trace data of the service invocation is avoided.
In practical application, if the tracking data cannot be called for fault location based on the reported service, developers need to spend a lot of time and energy to find possible fault services from massive running logs, and therefore, the risk of improving labor cost and lowering fault location efficiency is brought when the fault cannot be located by querying the tracking database.
In the second case: referring to fig. 4, the second case includes the following steps:
step 401, the computer device filters error data according to a preset filtering strategy in the service call tracking data extracted from each call request information and each call response information.
In practical application, the data volume of the service invocation tracking data may be very large, and if all the service invocation tracking data are sent to the tracking database without discrimination, although the risk that a fault cannot be located by querying the tracking database is avoided, the storage pressure of the tracking database is increased.
In order to relieve the storage pressure of the trace database, the computer device may filter error data from the extracted service invocation trace data according to a preset filtering strategy, wherein the error data is service invocation trace data representing errors of services in the micro service system.
Services in the micro-service system are in a fault-free state most of the time, and service call trace data acquired in the fault-free state does not contribute to fault location of the micro-service system or contributes to fault location of the micro-service system less, so that the part of service call trace data is useless, and if the part of service call trace data is also stored in a trace database, meaningless storage pressure is brought to the trace database.
To avoid this, in an alternative embodiment of the present application, the computer device may filter the extracted service invocation trace data for error data according to a preset filtering policy, in other words, the computer device may filter useless data in the service invocation trace data in step 401.
In alternative embodiments of the present application, the screening strategy may include the following two:
first, a policy to filter out data that includes error codes.
As described above, in practical applications, a certain service may feed back call response information to a service called for the certain service based on the call request information, and if the certain service fails, the certain service cannot correctly respond to the call request information, and in this case, the call response information often includes an error code. It can be seen that data including an error code is often generated after a service failure occurs, and therefore, in the embodiment of the present application, it is necessary to screen out the data including the error code as error data.
And secondly, screening out data in a target format, wherein the data in the target format is generated by the interception plug-in under the condition that the called service does not respond to the call within the preset time length.
In an optional embodiment of the present application, after intercepting the call request information by the interception plug-in, the computer device may detect whether call response information fed back in response to the call request information is intercepted by the plug-in within a preset time period. If the call response information fed back by responding to the call request information is not intercepted by the plug-in within the preset time length, the called service is not responded after time out, in this case, the called service is likely to have a fault, and at this time, the computer equipment can generate abnormal call response information by intercepting the plug-in, wherein the abnormal call response information comprises data in a target format.
As can be seen from the above description, in the embodiment of the present application, the data in the target format may reflect that the service timeout has not responded, and therefore, in the embodiment of the present application, it is necessary to filter out the data in the target format as error data.
Step 402, the computer device sends the screened error data to a tracking database for storage.
The technical process of sending the error data to the tracking database by the computer device is the same as the technical process in step 303, and the embodiment of the present application is not described herein again.
In the third case: referring to fig. 5, the third case includes the following steps:
step 501, the computer device performs sampling processing on the service invocation tracking data extracted from each invocation request message and each invocation response message to obtain candidate service invocation tracking data.
In consideration of the fact that in practical application, even if the service call trace data is screened, the data amount of the data needing to be stored in the trace database is still huge, in order to further reduce the storage pressure of the trace database, the computer equipment can also perform sampling processing on the service call trace data, and after the sampling processing, the computer equipment can perform screening processing on the service call trace data, so that the storage pressure of the trace database can be further reduced.
The sampling processing refers to a technical process of selecting a part of data from a service invocation trace database, where in an optional embodiment of the present application, the computer device may randomly sample the service invocation trace data, or may sample the service invocation trace data according to a certain sampling rule, which is not specifically limited in this embodiment of the present application.
Step 502, the computer device filters error data from the candidate service invocation tracking data according to a preset filtering strategy.
The technical process of the computer device for screening the error data from the candidate service invocation tracking data is the same as the technical process in step 401, and the embodiment of the present application is not described herein again.
Step 503, the computer device sends the screened error data to the tracking database for storage.
The technical process of sending the error data to the tracking database by the computer device is the same as the technical process in step 303, and the embodiment of the present application is not described herein again.
Referring to fig. 6, a block diagram of a full link tracking apparatus 600 provided by an embodiment of the present application is shown, where the full link tracking apparatus 600 may be configured in the computer device described above. As shown in fig. 6, the full link tracking apparatus 600 may include: an interception module 601, an extraction module 602, and a sending module 603.
The intercepting module 601 is configured to intercept, through an intercepting plugin corresponding to each service included in the micro service system, call request information and call response information of each service.
The extracting module 602 is configured to perform data extraction processing on each piece of call request information and each piece of call response information obtained through the interception processing to obtain service call tracking data, where the service call tracking data is used to characterize a call situation between services in the micro service system.
The sending module 603 is configured to send the service invocation trace data to the trace database for storage.
In an optional embodiment of the present application, the sending module 603 is specifically configured to: and all the service calling tracking data extracted from each calling request message and each calling response message are sent to the tracking database for storage.
In an optional embodiment of the present application, the sending module 603 includes a first filtering sub-module and a first sending sub-module;
the first screening submodule is configured to screen error data according to a preset screening policy from the service invocation trace data extracted from each piece of invocation request information and each piece of invocation response information, where the error data is service invocation trace data representing that a service in the micro service system has an error.
The first sending submodule is used for sending the screened error data to the tracking database for storage.
In an optional embodiment of the present application, the sending module 603 includes a sampling sub-module, a second filtering sub-module, and a second sending sub-module.
The sampling submodule is used for sampling the service calling tracking data extracted from each piece of calling request information and each piece of calling response information to obtain candidate service calling tracking data.
The second screening submodule is used for screening error data from the candidate service calling tracking data according to a preset screening strategy, wherein the error data is service calling tracking data representing that the service in the micro service system has errors.
And the second sending submodule is used for sending the screened error data to the tracking database for storage.
In an optional embodiment of the present application, the screening policy is a policy to screen out data including error codes.
In an optional embodiment of the present application, the screening policy is a policy for screening out data in a target format, where the data in the target format is data generated by the interception plug-in when the called service does not respond to the call within a preset time length.
Referring to fig. 7, the present embodiment provides another full-link tracking apparatus 700, where the full-link tracking apparatus 700 includes, in addition to the various modules included in the full-link tracking apparatus 600, optionally, the full-link tracking apparatus 700 further includes a detection module 604 and a generation module 605.
The detecting module 604 is configured to detect whether call response information fed back in response to the call request information is intercepted by the plug-in within the preset time duration after the call request information is intercepted by the intercepting plug-in.
The generating module 605 is configured to generate, by the intercepting plug-in, an abnormal call response message when the call response message fed back in response to the call request message is not intercepted by the plug-in within the preset duration, where the abnormal call response message includes the data in the target format.
The full link tracking device provided by the embodiment of the application can realize the method embodiment, the realization principle and the technical effect are similar, and the detailed description is omitted.
For specific limitations of the full link tracking apparatus, reference may be made to the above limitations of the full link tracking method, which are not described herein again. The various modules in the full link tracking apparatus described above may be implemented in whole or in part by software, hardware, and combinations thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
Fig. 8 is a schematic diagram of an internal structure of a computer device in one embodiment, and the computer device may be a server. As shown in fig. 8, the computer apparatus includes a processor and a memory connected by a system bus. Wherein, the processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment. The memory may include a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The computer program can be executed by a processor for implementing a full link tracking method provided by the above embodiments. The internal memory provides a cached execution environment for the operating system and computer programs in the non-volatile storage medium.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment of the present application, there is provided a computer device, which may be a service, the computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor implementing the following steps when executing the computer program:
intercepting the calling request information and calling response information of each service through the intercepting plug-in corresponding to each service included in the micro-service system; performing data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, wherein the service calling tracking data is used for representing calling conditions among services in the micro service system; and sending the service calling tracking data to a tracking database for storage.
In one embodiment of the application, the processor when executing the computer program further performs the steps of: and all the service calling tracking data extracted from each calling request message and each calling response message are sent to the tracking database for storage.
In one embodiment of the application, the processor when executing the computer program further performs the steps of: screening error data in the service calling tracking data extracted from each calling request message and each calling response message according to a preset screening strategy, wherein the error data is the service calling tracking data representing the service in the micro service system with errors; and sending the screened error data to the tracking database for storage.
In one embodiment of the application, the processor when executing the computer program further performs the steps of: sampling the service calling tracking data extracted from each calling request message and each calling response message to obtain candidate service calling tracking data; screening error data from the candidate service calling tracking data according to a preset screening strategy, wherein the error data is service calling tracking data representing errors of the service in the micro service system; and sending the screened error data to the tracking database for storage.
In one embodiment of the present application, the screening policy is a policy to screen out data including error codes.
In an embodiment of the present application, the screening policy is a policy for screening out data in a target format, where the data in the target format is data generated by the interception plug-in when the called service does not respond to the call within a preset time length.
In one embodiment of the application, the processor when executing the computer program further performs the steps of: after the calling request information is intercepted by the intercepting plug-in, detecting whether calling response information fed back by responding to the calling request information is intercepted by the plug-in within the preset time length; if the calling response information fed back by responding to the calling request information is not intercepted by the plug-in within the preset duration, generating abnormal calling response information by the intercepting plug-in, wherein the abnormal calling response information comprises the data in the target format.
The implementation principle and technical effect of the computer device provided by the embodiment of the present application are similar to those of the method embodiment described above, and are not described herein again.
In an embodiment of the application, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, carries out the steps of:
intercepting the calling request information and calling response information of each service through the intercepting plug-in corresponding to each service included in the micro-service system; performing data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, wherein the service calling tracking data is used for representing calling conditions among services in the micro service system; and sending the service calling tracking data to a tracking database for storage.
In one embodiment of the application, the computer program when executed by the processor further performs the steps of: and all the service calling tracking data extracted from each calling request message and each calling response message are sent to the tracking database for storage.
In one embodiment of the application, the computer program when executed by the processor further performs the steps of: screening error data in the service calling tracking data extracted from each calling request message and each calling response message according to a preset screening strategy, wherein the error data is the service calling tracking data representing the service in the micro service system with errors; and sending the screened error data to the tracking database for storage.
In one embodiment of the application, the computer program when executed by the processor further performs the steps of: sampling the service calling tracking data extracted from each calling request message and each calling response message to obtain candidate service calling tracking data; screening error data from the candidate service calling tracking data according to a preset screening strategy, wherein the error data is service calling tracking data representing errors of the service in the micro service system; and sending the screened error data to the tracking database for storage.
In one embodiment of the present application, the screening policy is a policy to screen out data including error codes.
In an embodiment of the present application, the screening policy is a policy for screening out data in a target format, where the data in the target format is data generated by the interception plug-in when the called service does not respond to the call within a preset time length.
In one embodiment of the application, the computer program when executed by the processor further performs the steps of: after the calling request information is intercepted by the intercepting plug-in, detecting whether calling response information fed back by responding to the calling request information is intercepted by the plug-in within the preset time length; if the calling response information fed back by responding to the calling request information is not intercepted by the plug-in within the preset duration, generating abnormal calling response information by the intercepting plug-in, wherein the abnormal calling response information comprises the data in the target format.
The implementation principle and technical effect of the computer-readable storage medium provided by this embodiment are similar to those of the above-described method embodiment, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in M forms, such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (SyMchliMk) DRAM (SLDRAM), RaMbus (RaMbus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the claims. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for full link tracking, the method comprising:
intercepting the calling request information and calling response information of each service through an intercepting plug-in corresponding to each service included in the micro-service system;
performing data extraction processing on each piece of calling request information and each piece of calling response information obtained through interception processing to obtain service calling tracking data, wherein the service calling tracking data is used for representing calling conditions among services in the micro service system;
and sending the service calling tracking data to a tracking database for storage.
2. The method of claim 1, wherein sending the service invocation trace data to a trace database for storage comprises:
and sending all the service calling tracking data extracted from each calling request message and each calling response message to the tracking database for storage.
3. The method of claim 1, wherein sending the service invocation trace data to a trace database for storage comprises:
screening error data in the service calling tracking data extracted from each calling request message and each calling response message according to a preset screening strategy, wherein the error data is the service calling tracking data representing the service in the micro-service system with errors;
and sending the screened error data to the tracking database for storage.
4. The method of claim 1, wherein sending the service invocation trace data to a trace database for storage comprises:
sampling the service calling tracking data extracted from each calling request message and each calling response message to obtain candidate service calling tracking data;
screening error data from the candidate service calling tracking data according to a preset screening strategy, wherein the error data is service calling tracking data representing errors of the service in the micro-service system;
and sending the screened error data to the tracking database for storage.
5. The method according to claim 3 or 4, wherein the screening policy is a policy to screen out data including error codes.
6. The method according to claim 3 or 4, wherein the screening policy is a policy for screening out data in a target format, and the data in the target format is data generated by the interception plug-in when the called service does not respond to the call within a preset time period.
7. The method of claim 6, further comprising:
after the calling request information is intercepted by the intercepting plug-in, detecting whether calling response information fed back by responding to the calling request information is intercepted by the plug-in within the preset duration;
if the calling response information fed back by responding to the calling request information is not intercepted by the plug-in within the preset duration, generating abnormal calling response information by the intercepting plug-in, wherein the abnormal calling response information comprises the data in the target format.
8. An apparatus for full link tracking, the apparatus comprising:
the interception module is used for intercepting the call request information and the call response information of each service through an interception plug-in each service included in the micro service system;
the extraction module is used for carrying out data extraction processing on each calling request information and each calling response information obtained through interception processing to obtain service calling tracking data, and the service calling tracking data is used for representing calling conditions among services in the micro service system;
and the sending module is used for sending the service calling tracking data to a tracking database for storage.
9. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, implements a full link tracking method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the full link tracking method according to any one of claims 1 to 7.
CN202011498705.2A 2020-12-17 2020-12-17 Full link tracking method, device, equipment and storage medium Pending CN112527410A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011498705.2A CN112527410A (en) 2020-12-17 2020-12-17 Full link tracking method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011498705.2A CN112527410A (en) 2020-12-17 2020-12-17 Full link tracking method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112527410A true CN112527410A (en) 2021-03-19

Family

ID=75001220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011498705.2A Pending CN112527410A (en) 2020-12-17 2020-12-17 Full link tracking method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112527410A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268363A (en) * 2021-06-16 2021-08-17 中移(杭州)信息技术有限公司 Call tracking method, device, server and storage medium based on global capability
CN114389970A (en) * 2021-12-03 2022-04-22 浙江时空道宇科技有限公司 Link monitoring method and device
CN114422386A (en) * 2022-01-20 2022-04-29 南方电网数字电网研究院有限公司 Monitoring method and device for micro-service gateway
CN115174542A (en) * 2022-07-01 2022-10-11 中国邮政储蓄银行股份有限公司 Full-link acquisition method, acquisition device and acquisition system of business system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204947A1 (en) * 2008-02-12 2009-08-13 International Business Machines Corporation Method and system for correlating trace data
CN106354876A (en) * 2016-09-22 2017-01-25 珠海格力电器股份有限公司 Data processing system and method
CN109922123A (en) * 2018-12-27 2019-06-21 北京奥鹏远程教育中心有限公司 The methods of exhibiting of call relation and displaying device between server
CN110806931A (en) * 2019-10-31 2020-02-18 上海依图网络科技有限公司 Method and device for realizing call link tracking of distributed service and electronic equipment
CN111258901A (en) * 2020-01-17 2020-06-09 北京科技大学 Fault positioning method and system for micro-service combination program
CN111614483A (en) * 2020-04-08 2020-09-01 拉扎斯网络科技(上海)有限公司 Link monitoring method and device, storage medium and computer equipment
CN112035317A (en) * 2020-08-28 2020-12-04 北京浪潮数据技术有限公司 Micro-service link monitoring method, device, equipment and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090204947A1 (en) * 2008-02-12 2009-08-13 International Business Machines Corporation Method and system for correlating trace data
CN106354876A (en) * 2016-09-22 2017-01-25 珠海格力电器股份有限公司 Data processing system and method
CN109922123A (en) * 2018-12-27 2019-06-21 北京奥鹏远程教育中心有限公司 The methods of exhibiting of call relation and displaying device between server
CN110806931A (en) * 2019-10-31 2020-02-18 上海依图网络科技有限公司 Method and device for realizing call link tracking of distributed service and electronic equipment
CN111258901A (en) * 2020-01-17 2020-06-09 北京科技大学 Fault positioning method and system for micro-service combination program
CN111614483A (en) * 2020-04-08 2020-09-01 拉扎斯网络科技(上海)有限公司 Link monitoring method and device, storage medium and computer equipment
CN112035317A (en) * 2020-08-28 2020-12-04 北京浪潮数据技术有限公司 Micro-service link monitoring method, device, equipment and medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268363A (en) * 2021-06-16 2021-08-17 中移(杭州)信息技术有限公司 Call tracking method, device, server and storage medium based on global capability
CN113268363B (en) * 2021-06-16 2024-04-09 中移(杭州)信息技术有限公司 Global capability-based call tracking method, device, server and storage medium
CN114389970A (en) * 2021-12-03 2022-04-22 浙江时空道宇科技有限公司 Link monitoring method and device
CN114422386A (en) * 2022-01-20 2022-04-29 南方电网数字电网研究院有限公司 Monitoring method and device for micro-service gateway
CN114422386B (en) * 2022-01-20 2023-08-11 南方电网数字电网研究院有限公司 Monitoring method and device for micro-service gateway
CN115174542A (en) * 2022-07-01 2022-10-11 中国邮政储蓄银行股份有限公司 Full-link acquisition method, acquisition device and acquisition system of business system
CN115174542B (en) * 2022-07-01 2024-06-04 中国邮政储蓄银行股份有限公司 Full-link acquisition method, acquisition device and acquisition system of service system

Similar Documents

Publication Publication Date Title
CN112527410A (en) Full link tracking method, device, equipment and storage medium
CN112910945B (en) Request link tracking method and service request processing method
CN110290212B (en) Service call recording method, device, computer equipment and storage medium
CN111752799B (en) Service link tracking method, device, equipment and storage medium
CN110995468B (en) System fault processing method, device, equipment and storage medium of system to be analyzed
CN109446068B (en) Interface test method, device, computer equipment and storage medium
CN108304704B (en) Authority control method and device, computer equipment and storage medium
CN110113224B (en) Capacity monitoring method and device, computer equipment and storage medium
CN111475376B (en) Method, apparatus, computer device and storage medium for processing test data
CN111176941B (en) Data processing method, device and storage medium
CN110602169B (en) Service calling method and device, computer equipment and storage medium
CN104392177A (en) Android platform based virus forensics system and method
CN110149421B (en) Method, system and device for monitoring abnormity of domain name system and computer equipment
CN110048907B (en) Global flow control method and device in cluster environment
CN112100537A (en) Data acquisition method and application server based on local cache and distributed cache
CN107315952A (en) Method and apparatus for determining application program suspicious actions
CN117573418A (en) Processing method, system, medium and equipment for video memory access exception
CN111224939B (en) Task request intercepting method and device, computer equipment and storage medium
CN114598622A (en) Data monitoring method and device, storage medium and computer equipment
CN114039760B (en) Security testing method and device, computer equipment and storage medium
CN108920355B (en) Dotting event information acquisition method and device, computer equipment and storage medium
CN115842716B (en) Method, device, equipment and storage medium for determining fault server
CN114189515B (en) SGX-based server cluster log acquisition method and device
CN110704218B (en) Data processing method, data processing device, computer equipment and storage medium
Alekseev et al. The BigPanDA self-monitoring alarm system for ATLAS

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination