On some version of Asterisk, there are conditions when an unanswered call would exit the queue without leaving a trace of its exiting in the queue_log, therefore generating incomplete call processing events that lead reporting software like QueueMetrics to produduce inaccurate results.
You will notice this if you encounter pieces of the queue_log that look like the following example:
1167421685|1169421668.34679|qname|NONE|ENTERQUEUE||5555551234
1167099900|1169099887.31480|qname|NONE|ENTERQUEUE||5555551234
1168222540|1168222529.5949|qname|NONE|ENTERQUEUE||5555551234
Here you can see that the caller-id 5555551234 entered the queue three times in a row but its exiting statuses were never recorded.
To solve this problem, it is important to know why the queue was exited without response, and this can be obtained with a sample piece of the dialplan like the following:
exten=>s,1,queue(myqueue)
exten=>s,2,System(echo"${EPOCH}|${UNIQUEID}|myqueue|NONE|EXITCODE|${QUEUESTATUS}">>/var/log/asterisk/queue_log)
exten=>h,1,System(echo"${EPOCH}|${UNIQUEID}|myqueue|NONE|EXITHANGUP|${QUEUESTATUS}">>/var/log/asterisk/queue_log)
You should leave this code running for a while and then review the queue_log manually for traces of ENTERQUEUEs followed only by EXITCODE and EXITHANGUP records. They will be followed by the condition causing the problem, like TIMEOUT, FULL, JOINEMPTY, LEAVEEMPTY, JOINUNAVAIL, or LEAVEUNAVAIL.
After you have this information, you can know how to modify the dialplan to record a fake queue end entry, therefore producing a valid queue_log file.
Note: version 1.4 of Asterisk should finally be unaffected by this problem.
分享到:
相关推荐
### Secret Knock Detecting Door Lock – Grathio Labs #### 一、项目背景与意义 “Secret Knock Detecting Door Lock”(秘密敲击检测门锁)是Grathio Labs推出的一款创新性的安全解决方案。该项目旨在通过识别...
CornerNet是一种创新的目标检测算法,由Huang等人在2018年的论文《CornerNet: Detecting Objects as Paired Keypoints》中提出。该算法引入了一种全新的视角来处理物体检测问题,它将每个物体视为一对关键点,即左上...
“Detecting and Classifying Low Probability of Intercept Radar”这一标题明确指出本书的主要研究方向:如何检测和分类低截获概率(Low Probability of Intercept, LPI)雷达。LPI雷达是一种设计用于降低被敌方...
detecting_ip
Given very few images containing a common object of interest under severe variations in appearance, we detect the common object and provide a compact visual representation of that object, depicted by ...
CornerNet Detecting Objects as Paired Keypoints CornerNet作为配对关键点检测对象 提出了CornerNet,一个新的对象检测方法在检测物体的包围盒作为一对特征点,左上角和右下角,使用一个单一的卷积神经网络,通过...
The book Detecting Regime Change in Computational Finance is the first book of its kind to build on the framework of Directional Change. The concept of Directional Change is a new field of research ...
僵尸网络,也称为Botnet,是互联网安全领域的一大威胁,由大量被恶意软件感染的设备组成,这些设备在黑客的远程控制下进行恶意活动。这些受控设备,或称为“肉鸡”,可能位于家庭、学校、企业甚至政府机构中,它们在...
本文档的标题及描述均为“Detecting chaos in pseudoperiodic time series without embedding.pdf”,简而言之,该研究关注的是如何在不进行相空间重构的情况下检测伪周期时间序列中的混沌现象。伪周期时间序列是指...
人脸疲劳检测源码
"Detecting Pedestrians Using Patterns of Motion and Appearance"这篇论文提出了一种行人检测系统,该系统将图像的强度信息与运动信息相结合,采用AdaBoost算法训练检测器,能够同时利用运动和外观信息来检测行走...
标题“通过识别重采样痕迹揭露数字伪造品”("Exposing Digital Forgeries by Detecting Traces of Re-sampling")直接点明了本文献的主题——利用重采样过程留下的统计特征来鉴定数字图像是否被篡改或伪造。...
本代码是由Loy G, Zelinsky A. 2003年发表在pami上面的方法... Fast radial symmetry for detecting points of interest[J]. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 2003, 25(8): 959-973.
"Detecting Hidden Messages Using Higher-Order Statistical Models," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 26, no. 7, pp. 893-902, July 2004. - [7] H. Farid. "A ...
机载干扰检测Detecting Jamming and Interference
要理解视觉世界,机器不仅必须识别单个目标,还必须识别它们是如何交互的。本文提出了一种新的模型,挑战日常照片中检测⟨人类、动词、目标⟩三元组的任务。
为了解决这一问题,《TextSnake - A Flexible Representation for Detecting Text of Arbitrary Shapes》一文提出了一种更加灵活的表示法——TextSnake,用于有效表示水平、定向乃至弯曲形式的文本实例。通过将每个...