CN111611140A - Reporting verification method and device of buried point data, electronic equipment and storage medium - Google Patents

Reporting verification method and device of buried point data, electronic equipment and storage medium Download PDF

Info

Publication number
CN111611140A
CN111611140A CN202010366130.2A CN202010366130A CN111611140A CN 111611140 A CN111611140 A CN 111611140A CN 202010366130 A CN202010366130 A CN 202010366130A CN 111611140 A CN111611140 A CN 111611140A
Authority
CN
China
Prior art keywords
point data
buried point
network environment
server
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010366130.2A
Other languages
Chinese (zh)
Other versions
CN111611140B (en
Inventor
林佳铖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN202010366130.2A priority Critical patent/CN111611140B/en
Publication of CN111611140A publication Critical patent/CN111611140A/en
Application granted granted Critical
Publication of CN111611140B publication Critical patent/CN111611140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3457Performance evaluation by simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Geophysics And Detection Of Objects (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a reporting verification method and device of buried point data, electronic equipment and a storage medium, wherein the method comprises the following steps: when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is the buried point data received by the server after the test equipment reports the first buried point data in real time; forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded; and when fourth buried point data is received, verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data. The method and the device can check the reporting condition of the buried point data in different network environments.

Description

Reporting verification method and device of buried point data, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for reporting verification of buried point data, an electronic device, and a storage medium.
Background
At present, the operation information of a user in the using process is usually obtained by setting a buried point in an Application program (App) or a webpage, so that the user group can be known from the perspective of the user and a product, and the App and a website are improved to be closer to the user. When a user uses a website or an APP to trigger a function corresponding to a buried point, a client reports data related to the buried point to a server so that the server performs data statistics and analysis according to the received buried point data.
However, due to the influence of the network environment or the possible code missing situation of the terminal application software, the server may not receive the buried point data, or receive the buried point data incorrectly. Therefore, the reported buried point data needs to be tested.
Disclosure of Invention
The embodiment of the application provides a reporting verification method and device for buried point data, electronic equipment and a storage medium, which can verify the reported buried point data.
In a first aspect, an embodiment of the present application provides a method for reporting and verifying buried point data, where the method includes: when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is the buried point data received by a server after the test equipment reports the first buried point data in real time; forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded; and when fourth buried point data is received, verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In a second aspect, an embodiment of the present application provides a device for reporting and verifying buried point data, where the device includes: the environment acquisition module is used for acquiring a network environment to be tested when second buried point data is received, wherein the second buried point data is the buried point data received by the server after the test equipment reports the first buried point data in real time; the data forwarding module is configured to forward the second embedded point data to forwarding node equipment corresponding to the network environment, where the forwarding node equipment is configured to return third embedded point data to a server to simulate a process in which test equipment in the network environment reports the embedded point data to the server, and the third embedded point data is the embedded point data received by the forwarding node equipment after the second embedded point data is forwarded; and the data verification module is used for verifying fourth buried point data when the fourth buried point data is received to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory; one or more processors coupled with the memory; one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, and the one or more applications are configured to perform the above-mentioned method for reporting verification of buried point data provided in the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a program code is stored in the computer-readable storage medium, and the program code may be called by a processor to execute the method for reporting and verifying the buried point data provided in the first aspect.
When the server receives the second buried point data, the server obtains the network environment to be tested to forward the second buried point data to forwarding node equipment corresponding to the network environment, wherein the second buried point data is the buried point data actually received by the server after the test equipment reports the first buried point data in real time, the forwarding node equipment is used for returning the third buried point data to the server to simulate the process of reporting the buried point data to the server by the test equipment in the network environment, the third buried point data is the buried point data actually received by the forwarding node equipment after the second buried point data is forwarded, and then when the server receives the fourth buried point data, the fourth buried point data can be verified, so that the reporting verification result of the buried point data in the network environment can be obtained, and the fourth buried point data is the buried point data actually received by the server after the forwarding node equipment returns the third buried point data. Therefore, the reporting verification of the buried point data in the network environment to be tested is realized by forwarding the buried point data to the forwarding node equipment corresponding to the network environment to be tested.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows an application scenario diagram of a reporting verification method for buried point data according to an embodiment of the present application.
Fig. 2 is a flowchart illustrating a method for reporting verification of buried point data according to an embodiment of the present application.
Fig. 3 shows an architecture diagram of a buried point system according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating a reporting verification method for buried point data according to another embodiment of the present application.
Fig. 5 shows a schematic flow chart of step S230 in fig. 4.
Fig. 6 is a schematic overall flow chart of a verification method for reporting buried point data according to an embodiment of the present disclosure.
Fig. 7 is a schematic overall flowchart of another verification method for reporting buried point data according to an embodiment of the present disclosure.
Fig. 8 is a flowchart illustrating a reporting verification method for buried point data according to another embodiment of the present application.
Fig. 9 shows a block diagram of a reporting verification apparatus for buried point data according to an embodiment of the present application.
Fig. 10 shows a block diagram of an electronic device according to an embodiment of the present application.
Fig. 11 illustrates a storage unit for storing or carrying program codes for implementing a method for reporting verification of buried point data according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
With the continuous development of internet technology, various websites and APPs come into operation, and users can realize various functions through the websites or APPs to meet daily life or entertainment requirements. When a user uses a website or an APP interactively, a large amount of behavior data can be generated, and based on the behavior data, the behavior data can be used as a basis for updating iteration of the website or the APP, or a new product can be developed according to the behavior data of the user, so that the requirements of the user can be met.
In some embodiments, user behavior data may be obtained by placing a buried point in the App or web page. And after the server collects, counts and analyzes the user behavior data, the statistical data for reference can be finally formed. However, due to the influence of the network environment or the possible code loss of the terminal application software, the server may not receive the buried point data, or the received buried point data is incorrect, so that the reported buried point data needs to be tested.
Although each internet enterprise basically has a buried point management system supporting real-time testing at present, with the gradual saturation of the home business, many enterprises begin to go out of the sea, and the mainstream buried point management system lacks a method for real-time verification of buried point data in multi-network environments of different countries, different operators and the like. With the gradual increase of importance of each large internet enterprise on data refinement operation, how to verify the accuracy of internet product event reporting is becoming one of the technical points concerned in the industry.
Therefore, the inventor has studied for a long time and proposed a method, an apparatus, an electronic device and a storage medium for verifying the reporting of buried point data in the embodiment of the present application, which can perform automatic verification on the buried point data reported in a multi-network environment, reduce errors and omissions caused by checking only a single network environment, and effectively improve the accuracy of the buried point data of internet products.
The following will be described in detail by way of specific examples.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an application scenario of a method for reporting and verifying buried point data according to an embodiment of the present application, where the application scenario includes a buried point verification system 10 according to an embodiment of the present application. This buried point verification system 10 includes: test equipment 100 and server 200. Wherein, the test device 100 and the server 200 are located in a wireless network or a wired network, and the test device 100 and the server 200 can perform data interaction. In some embodiments, there may be a plurality of test devices 100, the server 200 may be communicatively connected to a plurality of test devices 100, and the plurality of test devices 100 may also be communicatively connected to each other via the internet.
In this embodiment of the application, the testing device 100 may be a mobile phone, a smart phone, a notebook computer, a desktop computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a wearable electronic device, and other user devices capable of running an application program, and a specific type of the testing device may not be limited in this embodiment of the application. The server 200 may be a single server, or a server cluster, or a local server, or a cloud server, and a specific server type may not be limited in this embodiment of the application.
In some embodiments, a client may be installed within the test equipment 100. The client may be a computer Application (APP) installed on the terminal device 100, or may be a Web client, which may refer to an Application developed based on a Web architecture. For example, microblogs, WeChat, various live APP, various browsers, and the like. One or more embedded points are arranged in the client to be tested and are used for analyzing the operation behavior of a user on the client and/or testing the functional effect of the client. When the user uses the client, the embedded point is triggered, and the functional module corresponding to the embedded point is executed, so that the embedded point data can be obtained. The test equipment may send the buried point data to the server 200, and the server 200 may process and analyze the received buried point data.
In some examples, the server 200 may be a currently existing server supporting the receipt of the buried point data and the real-time/offline calculation service, which may store the received buried point data and may also check and calculate the accuracy and integrity of the buried point data in real time. In some embodiments, after the verification result of the buried point data is calculated, the result may be returned to the buried point configuration background of the tester.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating a reporting verification method for buried point data according to an embodiment of the present application, and the method is applicable to the server. In a specific embodiment, the reporting verification method for buried point data can also be applied to the reporting verification apparatus 600 for buried point data shown in fig. 9 and the electronic device 800 shown in fig. 10. The flow shown in fig. 2 will be described in detail below. The reporting verification method of the buried point data can comprise the following steps:
step S110: and when second buried point data is received, acquiring the network environment to be tested, wherein the second buried point data is the buried point data received by the server after the test equipment reports the first buried point data in real time.
In the embodiment of the application, when the buried point set in the test equipment is triggered, the test equipment can report the correspondingly generated first buried point data to the server in real time. The first buried point data is used for representing complete buried point data actually generated by the test equipment, and may be one piece of data or multiple pieces of data.
The embedded point is a common data acquisition method, and captures, processes and transmits specific user behaviors or events. The method mainly monitors events in the running process of the software application, and judges and captures the events when the events needing attention occur. The method for embedding the points can be code embedding, the code embedding refers to embedding some codes in a webpage or APP and other clients installed on the test equipment, when a user triggers a corresponding behavior, the client acquires the embedded data through the codes, and meanwhile, the acquired embedded data can be reported to the server. The embedded point code can be generated correspondingly according to actual test requirements.
As a mode, a tester may pre-input event information into a background configured at a buried point, where the event information may include an event interaction diagram (i.e., an interface diagram when interaction is triggered in a client), reported field information, and a definition of an event. And then the buried point configuration background can generate a corresponding event test page according to the input event information, wherein the event test page can contain information such as buried point values and buried point codes. The event may be a click event, a page event, or the like, where the click event may refer to a click behavior of a user in an application to be tested in the test device, such as clicking a tab tag, clicking a button, or the like, the page event may refer to a page browsed by the user, such as a home page, a detail page, or the like, and a specific event type is not limited at this time. The buried point value may be related information for uniquely identifying the test event, may be uniquely identified by one identification field, or may be uniquely identified by a plurality of identification fields.
Of course, the specific embedding method is not limited herein, and other embedding methods may be used, such as visual embedding, non-embedding, and the like.
Illustratively, after a tester configures relevant information of a buried point event in a buried point configuration background in advance and generates a corresponding buried point code, a client developer can implant the buried point code in a client to be tested according to a service specification to generate a test client and provide the generated test client to the tester. After the tester opens the test client installed on the test device, the tester can perform a service operation on the service data on the page of the test client, and the page is provided with an operation carrier (which may be a button or other Action, such as a control, for sending the data operation) for the user to perform the service operation. According to the embedded point code, the operation carrier provided with the embedded point can be determined, the business operation performed by the user through the operation carrier can be monitored, and the monitoring of the change of the business data and the information (such as an operator and operation time) of the business operation through the embedded point code is realized.
It can be understood that, due to the network environment influence or the occurrence of a problem in the setting of the buried point code, there may be an error or a loss in the buried point data reported by the test device, or a situation in which the test device cannot report the buried point data, and therefore, the server actually receives the buried point data which may not be complete, that is, may not be consistent with the first buried point data. In the embodiment of the application, the data of the buried point received by the server after the test equipment reports the data of the first buried point in real time can be used as the data of the second buried point. When reporting verification of the buried point data is needed, the server can perform reporting verification of the buried point data according to the second buried point data.
Specifically, when the server receives the second buried point data, the server may obtain the network environment to be tested, so as to perform reporting verification of the buried point data for the network environment to be tested. In some embodiments, the network environment to be tested may be configured in advance by the tester at the site-burying configuration background, so that the server may obtain the network environment to be tested configured by the tester when receiving the second site data. The network environment to be tested may include a geographical environment to be tested, and a specific geographical size is not limited herein, and may be, for example, each country, each province, each city, each county, each district, and the like. It may also include the network operator to be tested, e.g. mobile, universal, telecommunications, etc. The specific network environment type is not limited here, and can be set reasonably according to the test requirements.
In some embodiments, after receiving the buried point data reported by the test device in real time, the server may also store the received second buried point data in the database to be subjected to data verification or data analysis subsequently.
Step S120: and forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded.
In this embodiment, the server may forward the received second buried point data to the forwarding node device corresponding to the network environment according to the obtained network environment to be tested, so that the forwarding node device may simulate a process in which the testing device in the network environment to be tested reports the buried point data to the server. Therefore, a plurality of buried point management systems do not need to be arranged under the multi-network environment of different countries and operators, and the testing equipment does not need to be really under the network environment to be tested, but the local buried point management system and the local testing equipment can be directly utilized to realize the real-time verification of the reporting condition of the buried point data under different network environments.
Similarly, due to the network environment influence, the second buried point data forwarded by the server may be lost, or the server may not be able to forward the second buried point data, so that the forwarding node device may not receive the complete second buried point data in practice, that is, may not be consistent with the second buried point data. In this embodiment, the buried point data actually received by the forwarding node device may be used as the third buried point data. When the node device that needs to forward reports the buried point data, the received third buried point data may be reported to the server.
In some embodiments, the forwarding node device may be a forwarding proxy server, i.e. a server provided with a forwarding proxy service. The tester can correspondingly deploy the forwarding proxy servers under the network environment needing to be verified, so that each forwarding proxy server can simulate the buried point report of the test equipment under the network environment where the forwarding proxy server is located. As one way, the forwarding proxy service may be implemented by renting one server, such as by the ariloc and amazon, or the forwarding proxy service may be implemented by using an existing server, so as to reduce the deployment cost, such as by using cloud servers provided by cloud service vendors that have deployed servers in multiple national regions. Of course, the specific type of forwarding node device is not limited herein, and it only needs to be in the network environment to be tested and it can receive the embedded data and send the embedded data to the server.
For example, taking the network environment to be tested including a regional environment as an example, in some application scenarios, an application developed by a developer in the country may be provided for users in other countries. When a buried point reporting test is performed, if it is required to determine whether buried point data can be normally reported in other country regions, if a user equipment is found in each country and is triggered to use a test client application to perform the buried point test in a local network environment, the cost is high and the implementation is not easy. Therefore, in the embodiment of the application, the test equipment under different network environments can be simulated to report the buried point data to the server by deploying the server with the forwarding agent service in the country and region needing to be tested.
As a way, before formally performing the site-burying reporting test, the tester can pre-record the region of the country to be tested. Therefore, when receiving the buried point data reported by the local test equipment, the server can distribute the buried point data to the servers (namely forwarding proxy servers) of the test national regions, the servers of the test national regions can simulate real user equipment, and report (return) the buried point data to the servers, so that the data reporting of foreign environments can be simulated at home, namely, the test equipment triggers the reporting flow of the buried point data when simulating that test personnel exist in other national regions. The method and the device realize that even if the local embedded point system is managed, the test equipment under different network environments can be verified in real time, and whether the reported embedded point data is accurate and complete or not.
Step S130: and when fourth buried point data is received, verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In this embodiment, when receiving the third buried point data, the forwarding node device may report (return) the third buried point data to the server, so that the server may receive the buried point data reported by the forwarding node device. Similarly, due to the network environment, the data received by the server may not be the complete third buried point data, i.e. may not be consistent with the third buried point data. Therefore, in this embodiment of the present application, after the forwarding node device reports the third embedded point data to the server, the embedded point data actually received by the server may be used as the fourth embedded point data. When the server receives the fourth buried point data, the server can verify the received fourth buried point data to obtain a reported verification result of the buried point data in the network environment to be tested.
In some embodiments, the verification of the fourth buried point data may be performed to verify the accuracy of the buried point data, so as to determine whether an event triggered on the test client interface by a tester is consistent with the reported buried point data, and whether a false alarm exists. In other embodiments, the fourth buried point data may be verified, or the reporting delay of the buried point data may be verified, so as to determine the delay condition of reporting the buried point data in different network environments. The specific verification type is not limited herein, and the verification is performed according to the test requirement. For example, the loss of the fourth buried point data may be verified.
In some embodiments, the execution subject server of the present application may be specifically subdivided into sub-servers with different functions. As one mode, the method can be divided into a distribution server and a receiving and computing server, where the distribution server (a server with a distribution service) can be used to distribute the buried point data reported by the test equipment to the forwarding proxy server corresponding to each network environment according to the pre-recorded information of the network environment to be tested. As an implementation manner, the test device may report the reported first buried point data to the distribution server, and the distribution server obtains the network environment to be tested, and distributes the actually received second buried point data to the forwarding proxy server corresponding to the network environment to be tested.
In some embodiments, when the application scenario is a client test executed by a tester (for example, a test stage before gray release), the tester may click the interactive content corresponding to the test event on an interface of the test client, and then the test client reports the triggered buried point data to the distribution server. When the application scene is a gray level release stage, namely a client test executed by an online real user, at this time, the user equipment has installed a client implanted with a buried point code, the user can click interactive contents corresponding to a buried point event on an interface of the client, and then the client reports triggered buried point data to a distribution server.
The receiving and computing server (server with receiving and computing service) can be used for receiving the buried point data returned by each forwarding proxy server, can check and compute the accuracy and integrity of the buried point data in real time, can also return the reported verification result to the buried point configuration background, and stores the reported buried point test/verification data. As a way, if there is a server for receiving the data of the embedded point and performing real-time/offline calculation service, the existing receiving and calculating server can be directly used, so as to ensure the consistency between the test data and the data of the on-line real user equipment. In some embodiments, the receiving and computing server may also be subdivided into a receiving server and a computing server, and after receiving the buried point data returned by the forwarding proxy server, the receiving server may push the buried point data to the computing server in real time, and the computing server verifies the buried point data.
Referring to fig. 3, fig. 3 is a schematic diagram illustrating an architecture of a buried point system. The embedded point system 11 includes a testing client 101, a receiving and computing server 201, a distribution server 202, an embedded point configuration background 200, and one or more forwarding proxy servers (1, 2, 3 … …). The test client 101 is installed in the test equipment, and can be used by a tester to trigger a buried point. And the receiving and calculating server is used for storing the reported buried point data in a database.
In some embodiments, the number of the network environments to be tested can be multiple, and the server can verify the data report of the buried points of the multiple network environments to be tested by the verification method, so that errors and omissions caused by only single network environment verification are reduced, and the accuracy and the integrity of the data of the buried points of the internet products are effectively improved.
In the verification method for reporting buried point data provided in the embodiment of the present application, when a server receives second buried point data, the server obtains a network environment to be tested to forward the second buried point data to forwarding node equipment corresponding to the network environment, where the second buried point data is the buried point data actually received by the server after a test equipment reports the first buried point data in real time, the forwarding node equipment is configured to return third buried point data to the server to simulate a process of reporting the buried point data to the server by the test equipment in the network environment, and the third buried point data is the buried point data actually received by the forwarding node equipment after the second buried point data is forwarded, and then when the server receives the fourth buried point data, the server can verify the fourth buried point data, so as to obtain a verification result of reporting the buried point data in the network environment, and the fourth buried point data is the buried point data actually received by the server after the forwarding node equipment returns the third buried point data. Therefore, the real-time verification of the data report of the buried point under the network environment to be detected is realized by forwarding the buried point data to the forwarding node equipment corresponding to the network environment to be detected. When the reporting condition of the buried point data in the target network environment needs to be tested, the buried point data reported by the test equipment in the current network environment can be forwarded to the forwarding node equipment corresponding to the target network environment, so that the forwarding node equipment can simulate the reporting process of the buried point data in the target network environment, the test equipment does not need to be really in the target network environment, and therefore, the local buried point system management can be realized immediately, and the test equipment in different network environments can also be verified in real time.
Referring to fig. 4, fig. 4 is a schematic flow chart illustrating a method for verifying reporting of buried point data according to another embodiment of the present application, where the method is applicable to the server, and the method for verifying reporting of buried point data includes:
step S210: and when second buried point data is received, acquiring the network environment to be tested, wherein the second buried point data is the buried point data received by the server after the test equipment reports the first buried point data in real time.
In some embodiments, before performing the embedded point reporting verification, the test device needs to connect to the server, so that the server can receive the embedded point data reported by the test device. Therefore, before step S210, the method for reporting and verifying the buried point data may further include: detecting whether the test equipment is successfully connected with the server; and when the test equipment is successfully connected with the server, waiting for receiving the first buried point data reported by the test equipment.
As an embodiment, the test equipment can be connected with the server in a code scanning mode. As a mode, after a tester selects an event to be tested on a management interface of a buried point configuration background, the background enters an event testing page, after the tester selects a network environment such as a country, an operator and the like to be tested, the buried point configuration background can generate a two-dimensional code, and after the tester scans the two-dimensional code by using a testing client on testing equipment, the testing client can establish connection with a server by requesting a network address (e.g., a Uniform Resource Locator address) included in the two-dimensional code. After the connection is successfully established, the testing client can upload the data of the buried point to the server. Meanwhile, the event test page enters a test state.
In some embodiments, when the test device successfully connects to the server, the server may return a connection result to the test device to indicate that the connection was successful. At this time, the server may be in a wait-to-receive state to wait for receiving the first buried point data reported by the test device.
In some embodiments, since it may happen that verification is confused when multiple buried point events are tested on the same event test page, it may be that one buried point event corresponds to one event test page. If a plurality of buried point events need to be tested simultaneously, each buried point event can be tested by a plurality of test devices respectively. As a mode, each piece of reported buried point data may include a client identifier (device ID) of the test device, so that the server may classify the obtained buried point data of the plurality of test devices according to the client identifier, so as to accurately verify a buried point event tested by each test device. In some embodiments, each piece of reported buried point data may also include a unique identifier (report ID), a network configuration, an event ID, and so on, so that the reporting conditions of different events and different networks may be analyzed later. As one approach, the unique identification may be generated by using the MD5(message-digest algorithm 5) or base64 (binary data is represented based on 64 printable characters) processed device ID + client unix timestamp.
Step S220: and forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded.
In some embodiments, when there are a plurality of network environments to be detected, the server may also distribute the received second buried point data to a plurality of forwarding node devices corresponding to the plurality of network environments. After the second buried point data is successfully forwarded, each forwarding node device can return the actually received third buried point data to the server so as to simulate the process of reporting the buried point data to the server by the test device in each network environment.
In some embodiments, if only the reporting condition of the buried point data in the local network environment is tested, the data may be forwarded to the forwarding node device differently. Therefore, before the second buried point data is forwarded to the forwarding node device corresponding to the network environment, it may be determined whether the network environment to be tested is consistent with the network environment where the testing device is currently located. When the network environment to be tested is not consistent with the network environment where the testing device is currently located, step S220 may be performed.
It can be understood that, when the network environment to be tested is not consistent with the current network environment of the testing device, it may be considered that the reporting condition in the non-local network environment needs to be tested currently, so that the buried point data may be distributed to the forwarding node device corresponding to the network environment to be tested, so as to implement the buried point reporting verification in the non-local network environment. When the network environment to be tested is consistent with the current network environment of the testing device, the reporting condition under the local network environment which needs to be tested currently can be considered, and the reporting condition can be not forwarded to the forwarding node device.
In some embodiments, when the network environment to be tested is consistent with the network environment where the test equipment is currently located, the second buried point data can be directly verified, and a reported verification result of the buried point data in the current network environment is obtained.
In some embodiments, when there are multiple network environments to be tested and the network environment includes the network environment in which the test device is currently located, the second embedded point data may be only forwarded to the forwarding node device corresponding to the non-local network environment, and after the forwarding node device returns the embedded point data, the server may perform reporting verification of different network environments according to the received fourth embedded point data and the second embedded point data that is not forwarded. And verifying the fourth buried point data to obtain the buried point reporting condition of the non-local network environment, and verifying the second buried point data to obtain the buried point reporting condition of the local network environment.
Step S230: and when fourth buried point data is received, verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In some embodiments, the verification of the fourth buried point data may be an accuracy verification of the buried point data. Specifically, referring to fig. 5, step S230 may include:
step S231: and comparing the fourth buried point data with standard buried point data.
Step S232: and determining the correctness result of the buried point data reported under the network environment according to the comparison result.
In some embodiments, the standard buried point data may be buried point values generated in the background of the buried point configuration, among others. Since the buried point data reported by the test equipment may include a reported buried point value for uniquely identifying the trigger event, the reported buried point value in the fourth buried point data may be compared with the buried point value in the standard buried point data to determine whether the reported buried point data is correct. If the comparison is inconsistent, the reported buried point data is not accurate, the buried point code can be considered to have a problem, the corresponding buried point code on the test client can be checked subsequently, and the buried point verification can be performed again after the check is successful. If the comparison is consistent, the reported buried point data is accurate, the buried point code can be considered to have no problem, and the test client can be subsequently subjected to online formal release.
For example, when a tester inputs the event information of the button a and the event information of the button B of the test client into the buried point background, the buried point background generates two buried point codes, wherein one field value (buried point value) distinguishes whether the button a or the button B is at the bottom. When a tester clicks the button A or the button B in the application of the test client, the test client reports a piece of buried point data to the server, and the buried point value in the reported buried point data can represent whether the user point is the button A or the button B. The server compares whether the buried point value in the reported buried point data is consistent with the buried point value in the buried point code generated by the buried point background, and if the user points the button A and the reported button B, the problem of the buried point is indicated.
In some embodiments, when the buried point data is forwarded to a plurality of forwarding node devices corresponding to a plurality of network environments, each forwarding node device returns the received buried point data to the server, so that the server can receive fourth buried point data corresponding to each forwarding node device. The server can respectively compare the fourth buried point data corresponding to each forwarding node device in the multiple forwarding node devices with the standard buried point data, and determine the reported verification result of the buried point data in the network environment corresponding to each forwarding node device according to the comparison result corresponding to each forwarding node device.
In some embodiments, the server may verify the fourth buried point data every specified duration for a preset duration. The specified time duration may be a refresh time duration of the verification result of the buried point data, for example, 30 seconds, that is, the received buried point data is verified every 30 seconds, so that the verification result is refreshed every 30 seconds. The preset time length may be the longest time length for reporting verification by the buried point, that is, the server may finish verification of the buried point data beyond the preset time length. For example, the fourth buried point data reported within 10 minutes is analyzed and verified, and the server can receive verification after 10 minutes. The specified duration can be less than the preset duration, so that the verification result of the buried point data is continuously refreshed within the preset duration. As in the example above, the verification results are refreshed every 30 seconds for 10 minutes.
It should be noted that specific values of the specified duration and the preset duration are not limited herein, and may be configured reasonably according to the test requirement. For example, a tester can configure the specified duration and the preset duration in the buried point configuration background, if the specified duration is configured to 30 seconds and the preset duration is configured to 10 minutes, when the event test page is in the test state, the buried point configuration background can automatically request the server to perform buried point data verification every 30 seconds, analyze the reported data within 10 minutes, and compare whether the reported buried point value is consistent with the buried point value generated by the background.
In some embodiments, if the event test page of the embedded point configuration background is not closed and is always in the test state, the test state can be automatically exited after a preset time length. As one way, the buried point configuration background may automatically pop up an interface after a preset time to prompt the end of verification. If the event needs to be verified again, the event needing to be tested needs to be reselected, the event enters an event testing page, the network environment for testing needs to be reselected, and the like.
In some embodiments, when the reported verification result of the buried point data in the network environment is obtained, the server may send the reported verification result to the client, so that the client displays a preset interface according to the reported verification result. The client may be a client corresponding to the buried point configuration background, and the preset interface may be an interface for prompting the end of the comparison or an interface for prompting the success of the comparison.
As a mode, when the verification result on duty shows that the reported buried point data is correct, the buried point configuration background can display a corresponding event interaction interface. The event interactive interface is a client interactive interface schematic diagram which is recorded in advance and matched with the testing time, and a tester can compare the displayed event interactive interface with an interactive interface which is actually operated on the testing client to further determine whether the triggered event is correct. In some embodiments, the site configuration background may also display network environment information, so that a tester can know site reporting conditions in each network environment.
For example, if the pre-entered event interaction interface is a mobile phone login interface, and a tested embedded point event, such as a "mobile phone number one-key login" button, can be marked in the mobile phone login interface (for example, the button is framed by a frame with a striking color), a tester can configure the pre-entered mobile phone login interface popped up in the background through the embedded point, and determine whether an event actually clicked on the mobile phone login interface of the test client is the "mobile phone number one-key login" button. If yes, the buried point is correct. In addition, the embedded point configuration background may also pop up a data list of embedded points that is successfully verified, where the list includes network environment information such as country, region, and operator, and also includes other information such as receiving time and ID of the testing device, which is not limited herein.
Step S240: and when the fourth buried point data is not received, detecting whether the network state of the forwarding node equipment is normal.
In some embodiments, when the server does not receive the buried point data returned by the forwarding node device, it may be considered that there is a failure in the connection with the forwarding node device, and the server may determine whether the connection between the server and the forwarding node device is normal by detecting the network state of the forwarding node device. The network status of the forwarding node device may be detected in various manners, for example, the network connection between the server and the forwarding node device may be tested by using a PING (Packet Internet Groper) forwarding node device, which is not limited in this time.
Step S250: and when the network state of the forwarding node equipment is abnormal, forwarding the second embedded data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment and reporting the embedded data to the server.
In some embodiments, when the network state of the forwarding node device is detected to be abnormal, the embedded point verification may be performed again through the backup node device corresponding to the forwarding node device. Specifically, the server may forward the second embedded data to a backup node device corresponding to the forwarding node device, where the backup node device is configured to simulate a test device in a network environment to be tested instead of the forwarding node device, and report the embedded data to the server.
In some embodiments, a tester may deploy a plurality of forwarding node devices in some network environments, so that when a network of one forwarding node device is abnormal, subsequent embedded point verification can be performed through another forwarding node device, and uninterrupted verification process is ensured. In some embodiments, there may be some network environments where only one forwarding node device may be deployed, or when the result of the embedded point verification of the network environment is not important, the server may end the embedded point verification, or wait for a period of time before performing the embedded point verification again.
In some embodiments, when there are multiple to-be-detected network environments, if there is buried point data with a consistent comparison in the fourth buried point data received by the server, the server may return the buried point data with a consistent comparison to the buried point configuration background, and the buried point configuration background may display relevant information of the buried point data. If the server only verifies the data of the buried point in part of the network environments, and the server may not receive the data of the buried point in other network environments due to various reasons, the verification result returned to the buried point management background only has the data of the part of the network environments. The tester can also determine whether to recheck the lacking network environment according to the verification result of the lacking network environment. When the tester determines to re-check, it may first check whether it is a network problem with the forwarding node device. And when the network abnormality of the forwarding node equipment is detected, switching the backup node equipment to perform re-verification.
In a specific embodiment, please refer to fig. 6, where fig. 6 shows an overall flow diagram of reporting verification of buried point data. Specifically, after the tester inputs event information into the buried point configuration background, the buried point configuration background can generate a corresponding event ID and a buried point code according to the input information. The embedded point code may then be implanted in the test client and provided to the tester for use. A tester can select an event to be tested in a buried point configuration background, select a network environment to be tested, and then correspondingly generate a two-dimensional code in the buried point configuration background. After the two-dimensional code is scanned by the test client, a tester can judge whether the embedded point configuration background carries out verification state, and when the code scanning succeeds in accessing the server, the verification state can be considered. When the code scanning is not successfully accessed to the server, whether the network connection between the test client and the server is normal or not can be checked, if the network connection is normal, the embedded point configuration is possible to be wrong, and the embedded point code of the test client can be checked. And then regenerating the two-dimensional code, scanning the code and accessing the code to the server until the embedded background enters a verification state.
In some embodiments, the buried point configuration background may determine whether to pop up a pre-recorded event interaction graph and reported buried point data content within a set time (the preset duration), if the pre-recorded event interaction graph and the reported buried point data content pop up, it indicates that the reporting of the buried point data is accurate, and if the pre-recorded event interaction graph and the reported buried point data content do not pop up, it indicates that the buried point configuration may be in error, and may check the buried point code of the test client, and then perform checking again.
Furthermore, when a plurality of network environments to be tested exist, a tester can determine whether the data of the buried points in all the network environments meet a set value according to the data information of the buried points displayed by the buried point configuration background. The number of the network environments to be tested and the number of the network environments which actually receive the verification result are judged to be consistent, and if the number of the network environments to be tested and the number of the network environments which actually receive the verification result are inconsistent, the problem of the buried point reporting of part of the network environments can be shown. The tester can determine whether to recheck the lacking network environment according to the verification result of the lacking network environment. When the tester determines to re-check, it may first check whether it is a network problem with the forwarding node device. And when the network abnormality of the forwarding node equipment is detected, switching the backup node equipment to perform re-verification.
In the verification method for reporting buried point data provided in the embodiment of the present application, when a server receives second buried point data, the server obtains a network environment to be tested to forward the second buried point data to forwarding node equipment corresponding to the network environment, where the second buried point data is the buried point data actually received by the server after a test equipment reports the first buried point data in real time, the forwarding node equipment is configured to return third buried point data to the server to simulate a process of reporting the buried point data to the server by the test equipment in the network environment, and the third buried point data is the buried point data actually received by the forwarding node equipment after the second buried point data is forwarded, and then when the server receives the fourth buried point data, the server can verify the fourth buried point data, so as to obtain a verification result of reporting the buried point data in the network environment, and the fourth buried point data is the buried point data actually received by the server after the forwarding node equipment returns the third buried point data. And when the fourth buried point data is not received, detecting whether the network state of the forwarding node equipment is normal, and when the network state of the forwarding node equipment is abnormal, forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for simulating test equipment in a network environment instead of the forwarding node equipment and reporting the buried point data to a server. Therefore, the embedded point data is forwarded to the forwarding node equipment corresponding to the network environment to be tested, and when the network of the forwarding node equipment is abnormal, the embedded point data can be forwarded to the backup node equipment corresponding to the forwarding node equipment, so that real-time verification of the reporting of the embedded point data in the network environment to be tested is realized. Therefore, the system management of the local embedded point can be realized, and the test equipment under different network environments can be verified in real time.
In some embodiments, the on-line real user may also perform the testing verification of the buried point data. Specifically, the embedded point data reported by the real users on the line is extracted and forwarded to the forwarding node equipment corresponding to the network environment to be tested, and then the embedded point data is returned by the forwarding node equipment, so that the server can verify the correctness of the embedded point data reported by the real users on the line and can also verify the loss rate reported by the embedded point data.
In some embodiments, the loss rate of the buried point data may be verified in a double reporting manner. Specifically, after the test equipment reports the buried point data in real time, the test equipment reports the buried point data in a delayed manner once, so that the server can determine the reporting loss condition of the buried point data according to the buried point data reported in real time and in a delayed manner by the same test equipment or the same batch of test equipment, the integrity of the buried point data of the internet product can be effectively improved, and the accuracy of subsequent user behavior analysis is ensured.
The procedure for dual reporting verification is exemplarily described as follows:
and (3) reporting in real time: and if the date of the day is t, reporting all behaviors triggered by the user in real time according to normal logic, and storing the behaviors in full.
And (3) delayed reporting: after the client application is started for the first time every day, all buried point data generated in the previous day are packed, compressed and reported according to the timestamp of the user trigger behavior, and are stored in full. That is, the t +1 day reports the total data of the buried point of the t day.
And then the server automatically matches and verifies all the delay data received in the previous day with the corresponding real-time data every day. Comparing and checking the buried point data reported in a delayed manner at the time of the day t +1 with the buried point data reported in real time at the time of the day t +2, and counting the difference between the data and the buried point data to obtain the data loss condition.
As a mode, the server may store the reported embedded point data in a file of day, and store the data file reported in real time and the data file reported in delayed time separately. When the test client-side reports the buried point data of t days in a delayed manner in t +1 days, the total number of the data pieces reported in a delayed manner can be counted independently. The server can acquire all the buried point detail data reported in a delayed manner in the t +1 day in the t +2 day and can store the buried point detail data into the database, then the server can count the number of data of each test client according to the actually acquired buried point detail data reported in a delayed manner in the t +1 day, and then the test client with the number counting value equal to the total number of data reported by the test client is used as a subsequent verification object. Then, the server can take out all the embedded point detail data with the ID of the verification object device from the real-time reporting data (marked as a1) of the day t and the delayed reporting data (marked as a2) of the day t + 1. As a mode, the server may count the ratio of the total number of data pieces of a1 and a2, and the ratio of the number of data pieces of a1 and a2 in judgment dimensions such as different network configurations and event IDs, respectively, to obtain the loss rate of each event in different network environments, and the statistical result may be displayed in a background configured at a buried point.
That is, the test apparatus was: reporting data in real time; the test device was then tested on day t + 1: reporting all detail data of t days in a delayed manner once again, and reporting the total number of the data; server at day t + 2: firstly, judging whether the number of the detailed data of t day actually received by the server for the delayed report of t +1 day is consistent with the total number reported by t +1 day, and if not, indicating that the delayed report has data loss; if the two reports are consistent, comparing the number of the detail reported t day in the delayed time of t +1 day with the number of the detail reported t day in real time, and obtaining the loss rate reported in real time.
In some embodiments, in a test stage before a grayscale stage, the accuracy of the buried point data reporting is verified by using the buried point data verification method in the multi-network environment of the present application, and after the test stage, the grayscale stage may be performed, and the integrity (i.e., loss) of the buried point data reporting is verified by using the above-mentioned dual-reporting verification method. The gray-scale stage may refer to that before the new function of the product is released to the outside, the gray-scale release may be performed in a small range, that is, a part of the new function of the product that the user starts to use is extracted. The extracted part of the user equipment is the user equipment corresponding to the formal client with the gray scale.
In some practical application scenarios, before performing the data verification of the buried point, the relevant personnel may perform early deployment, which may include: the system comprises a buried point configuration background (buried point background), a test client, a formal client, a distribution server, a forwarding proxy server and a receiving and computing server. Wherein:
buried point configuration background (buried point background): the contents such as event ID, embedded point code, two-dimensional code and the like can be automatically generated according to the input information; the event needing to trigger the verification is selected by a tester, and after the verification of the client is completed, the buried point data and the statistical result reported by the client can be displayed. If the existing embedded point management background is available, the embedded point management background can be used as a component of the existing background to supplement missing functions based on the existing background. In some embodiments, the tester may enter a threshold in advance (e.g., 95% to verify the reasonableness of the data of the buried points), and if the ratio of the data of the buried points is lower than the threshold, the statistical result may be set to different colors to remind the relevant people to pay attention. For example, when performing embedded point verification of an application login event, if the ratio of the total number of devices receiving the embedded point data to the total number of test devices (i.e., login rate) is too low, it means that there are too few login users, which is problematic and needs attention.
Testing the client: the user device that needs the test/verification application has been installed. The embedded point codes are embedded into the application programs, and the embedded point data are reported to the distribution server after the two-dimensional codes are scanned and embedded point interaction is triggered.
And (3) formal client side: and after the user triggers the embedded point interaction, the embedded point data is sent to the receiving server through the current network of the user. Whether the delayed report is needed can be judged by a mode of sending the notice by the receiving server.
A distribution server: and distributing the received client embedded data to each network forwarding proxy server according to the pre-recorded information. Or sending the notice of whether to open the delayed report to the formal client.
The forwarding proxy server: and deploying a server in a region needing verification, and simulating a client under different network environments to send the buried point data to a receiving server. The cloud server provided by a cloud service manufacturer can be used, and the deployment cost is reduced.
Receiving and computing a server: and receiving the data of the buried point returned by each forwarding proxy server, checking and calculating the accuracy and the integrity of the data of the buried point in real time, returning the result to a buried point configuration background, and storing the reported data of the buried point test/check. If the existing buried data receiving and real-time/off-line computing server exists, the existing receiving and computing server can be directly used to ensure the consistency of the test data and the on-line data.
In a specific embodiment, please refer to fig. 7, and fig. 7 is a schematic diagram illustrating an overall process of reporting verification of another buried point data according to an embodiment of the present application. After the tester inputs the event information into the buried point configuration background, the buried point configuration background can generate a corresponding event ID and a buried point code according to the input information. The buried point code can then be embedded in the client version and provided for use by real users online. A tester can configure a background at a buried point to select an event to be tested, and select a time range and a client version to be tested. At this time, after receiving a preset instruction (delayed report notification) issued by the server, the test device may trigger the dual report verification. Real-time reporting of T days, delayed reporting of T +1 days, calculation and comparison of T +2 days, and configuration of a background display result for a buried point. When the display result does not accord with the set value, the codes of the client side can be detected, and the embedded point test is restarted. When the display result meets the set value, the verification can be finished.
In another specific embodiment, please refer to fig. 8, and fig. 8 is a schematic diagram illustrating an overall process of reporting verification of buried point data according to another embodiment of the present application. Before the dual reporting embedded point test, the embedded point can be manually triggered by a tester to perform single-point multi-network environment test on the test version of the client. Specifically, a client developer can implant the buried point code in the version of the test client according to the business specification. Then, a tester selects an event to be tested in a buried point configuration background, and after selecting a network environment of a country, an operator and the like to be tested, the buried point configuration background generates a two-dimensional code. And (4) scanning the two-dimensional code by a tester at the client side implanted with the embedded point code, and automatically accessing the reported embedded point data stream to the server by the client side. When the server is not successfully accessed, the embedded point code of the testing client version and the network state can be checked to determine whether the network state is normal. And then scanning the code again to access the server. When the testing personnel passes the test of the test version of the client, the test version of the client can be subjected to gray release, and at the moment, the real users on the line of the extractable part can be subjected to double reporting verification.
Referring to fig. 9, fig. 9 is a block diagram illustrating a structure of an apparatus 600 for verifying reporting of buried point data according to an embodiment of the present application, where the apparatus 600 is applied to a server. The reporting verification apparatus 600 for buried point data may include: an environment acquisition module 610, a data forwarding module 620, and a data verification module 630. The environment obtaining module 610 is configured to obtain a network environment to be tested when second buried point data is received, where the second buried point data is the buried point data received by the server after the test device reports the first buried point data in real time; the data forwarding module 620 is configured to forward the second embedded point data to forwarding node equipment corresponding to the network environment, where the forwarding node equipment is configured to return third embedded point data to a server to simulate a process in which test equipment in the network environment reports the embedded point data to the server, where the third embedded point data is the embedded point data received by the forwarding node equipment after the second embedded point data is forwarded; the data verification module 630 is configured to, when fourth buried point data is received, verify the fourth buried point data to obtain a verification result reported by the buried point data in the network environment, where the fourth buried point data is the buried point data received by the server after the forwarding node device returns the third buried point data.
In some embodiments, the reporting verification apparatus 600 may further include: the device comprises a network detection module and a backup forwarding module. The network detection module is used for detecting whether the network state of the forwarding node equipment is normal or not when the fourth buried point data is not received; and the backup forwarding module is used for forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment when the network state of the forwarding node equipment is abnormal, and the backup node equipment is used for simulating test equipment in the network environment instead of the forwarding node equipment and reporting the buried point data to the server.
In some embodiments, the data verification module 630 may be specifically configured to: comparing the fourth buried point data with standard buried point data; and determining the correctness result of the buried point data reported under the network environment according to the comparison result.
In some embodiments, the data verification module 630 may be further specifically configured to: and verifying the fourth buried point data with preset time length every specified time length, wherein the specified time length is less than the preset time length.
In some embodiments, the network environment is multiple, and the data forwarding module 620 may be specifically configured to: and distributing the second buried point data to a plurality of forwarding node devices corresponding to the plurality of network environments. In this embodiment, the data verification module 630 may be further specifically configured to: comparing the fourth buried point data corresponding to each forwarding node device in the plurality of forwarding node devices with standard buried point data respectively; and determining a reporting verification result of the buried point data under the network environment corresponding to each forwarding node device according to the comparison result corresponding to each forwarding node device.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: the device comprises a connection detection module and a data waiting module. The connection detection module is used for detecting whether the test equipment is successfully connected with the server; and the data waiting module is used for waiting for receiving the first buried point data reported by the test equipment when the test equipment is successfully connected with the server.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: the device comprises a network judgment module and a first execution module. The network judgment module is used for judging whether the network environment to be tested is consistent with the current network environment of the test equipment; the first execution module is used for executing the step of forwarding the second buried point data to the forwarding node device corresponding to the network environment when the network environment to be tested is inconsistent with the network environment where the testing device is currently located.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: and the second execution module is used for executing the step of forwarding the second buried point data to the forwarding node equipment corresponding to the network environment when the network environment to be tested is inconsistent with the network environment where the testing equipment is currently located.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: and the result sending module is used for sending the reported verification result to a client, and the client is used for displaying a preset interface according to the reported verification result.
The device for verifying reporting of buried point data provided in the embodiment of the present application is used to implement the method for verifying reporting of buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling or direct coupling or communication connection between the modules shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be in an electrical, mechanical or other form.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 10, fig. 10 is a block diagram illustrating a structure of an electronic device according to an embodiment of the present disclosure. The electronic device 800 may be the server described above. The electronic device 800 in the present application may include one or more of the following components: a processor 810, a memory 820, and one or more applications, wherein the one or more applications may be stored in the memory 820 and configured to be executed by the one or more processors 810, the one or more applications configured to perform the methods described in the above method embodiments applied to a server, and also configured to perform the methods described in the above method embodiments applied to a test device.
Processor 810 may include one or more processing cores. The processor 810 interfaces with various interfaces and circuitry throughout the electronic device 800 to perform various functions and process data of the electronic device 800 by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 820 and invoking data stored in the memory 820. Alternatively, the processor 810 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 810 may integrate one or a combination of a Central Processing Unit (CPU), a Graphic Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 810, but may be implemented by a communication chip.
The Memory 820 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 820 may be used to store instructions, programs, code sets, or instruction sets. The memory 820 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The stored data area may also store data created during use by the electronic device 800, and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 10 is merely a block diagram of some of the structures associated with the present solution and does not constitute a limitation on the electronic devices to which the present solution applies, and that a particular electronic device may include more or less components than those shown, or combine certain components, or have a different arrangement of components.
In summary, the electronic device provided in the embodiment of the present application is used to implement the method for reporting and verifying the corresponding buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Referring to fig. 11, a block diagram of a computer-readable storage medium according to an embodiment of the present disclosure is shown. The computer-readable storage medium 900 stores program codes, which can be called by a processor to execute the methods described in the above embodiments of the method applied to the client, and can also be called by a processor to execute the methods described in the above embodiments of the method applied to the server.
The computer-readable storage medium 900 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 900 includes a non-transitory computer-readable storage medium. The computer readable storage medium 900 has storage space for program code 910 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 910 may be compressed, for example, in a suitable form.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (12)

1. A reporting verification method of buried point data is characterized by comprising the following steps:
when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is the buried point data received by a server after the test equipment reports the first buried point data in real time;
forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded;
and when fourth buried point data is received, verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
2. The method of claim 1, further comprising:
when the fourth buried point data is not received, detecting whether the network state of the forwarding node equipment is normal or not;
and when the network state of the forwarding node equipment is abnormal, forwarding the second embedded data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment and reporting the embedded data to the server.
3. The method of claim 1, wherein the verifying the fourth buried point data to obtain the reported verification result of the buried point data in the network environment comprises:
comparing the fourth buried point data with standard buried point data;
and determining the correctness result of the buried point data reported under the network environment according to the comparison result.
4. The method of claim 1, wherein the validating the fourth buried point data comprises:
and verifying the fourth buried point data with preset time length every specified time length, wherein the specified time length is less than the preset time length.
5. The method of claim 1, wherein the network environment is plural, and wherein forwarding the second buried point data to a forwarding node device corresponding to the network environment comprises:
distributing the second buried point data to a plurality of forwarding node devices corresponding to the plurality of network environments;
the verifying the fourth buried point data to obtain a reported verification result of the buried point data in the network environment includes:
comparing the fourth buried point data corresponding to each forwarding node device in the plurality of forwarding node devices with standard buried point data respectively;
and determining a reporting verification result of the buried point data under the network environment corresponding to each forwarding node device according to the comparison result corresponding to each forwarding node device.
6. The method of claim 1, wherein prior to said obtaining the network environment to be tested when the second buried point data is received, the method further comprises:
detecting whether the test equipment is successfully connected with the server;
and when the test equipment is successfully connected with the server, waiting for receiving the first buried point data reported by the test equipment.
7. The method of any of claims 1-6, wherein prior to said forwarding said second buried point data to a forwarding node device corresponding to said network environment, said method further comprises:
judging whether the network environment to be tested is consistent with the current network environment of the testing equipment;
and when the network environment to be tested is not consistent with the current network environment of the testing equipment, executing the step of forwarding the second buried point data to forwarding node equipment corresponding to the network environment.
8. The method of claim 6, wherein after the determining whether the network environment to be tested is consistent with the network environment in which the testing device is currently located, the method further comprises:
and when the network environment to be tested is consistent with the current network environment of the test equipment, directly verifying the second buried point data to obtain a reported verification result of the buried point data in the network environment.
9. The method according to any one of claims 1-6, wherein after obtaining the reported validation result of the buried point data in the network environment, the method further comprises:
and sending the reported verification result to a client, wherein the client is used for displaying a preset interface according to the reported verification result.
10. A device for reporting and verifying buried point data is characterized by comprising:
the environment acquisition module is used for acquiring a network environment to be tested when second buried point data is received, wherein the second buried point data is the buried point data received by the server after the test equipment reports the first buried point data in real time;
the data forwarding module is configured to forward the second embedded point data to forwarding node equipment corresponding to the network environment, where the forwarding node equipment is configured to return third embedded point data to a server to simulate a process in which test equipment in the network environment reports the embedded point data to the server, and the third embedded point data is the embedded point data received by the forwarding node equipment after the second embedded point data is forwarded;
and the data verification module is used for verifying fourth buried point data when the fourth buried point data is received to obtain a reported verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
11. A server, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to perform the method of any of claims 1-9.
12. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 9.
CN202010366130.2A 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium Active CN111611140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010366130.2A CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010366130.2A CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111611140A true CN111611140A (en) 2020-09-01
CN111611140B CN111611140B (en) 2023-05-16

Family

ID=72205488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010366130.2A Active CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111611140B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328504A (en) * 2020-12-03 2021-02-05 广州品唯软件有限公司 Buried point data inspection method, buried point data inspection device, buried point data inspection system, computer equipment and storage medium
CN112650659A (en) * 2020-12-22 2021-04-13 平安普惠企业管理有限公司 Buried point setting method and device, computer equipment and storage medium
CN113300912A (en) * 2021-05-21 2021-08-24 湖南快乐阳光互动娱乐传媒有限公司 Equipment testing method and device and electronic equipment
CN113642047A (en) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 Buried point data verification method and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005793A1 (en) * 2006-06-30 2008-01-03 Tealeaf Technology, Inc. Method and apparatus for monitoring and synchronizing user interface events with network data
CN103297450A (en) * 2012-02-23 2013-09-11 百度在线网络技术(北京)有限公司 Distributed cluster simulation system, method and device
CN104092579A (en) * 2014-02-12 2014-10-08 腾讯科技(深圳)有限公司 Simulating method and device for network types
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN109582550A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of method, apparatus and server obtaining full dose business scenario failure collection
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080005793A1 (en) * 2006-06-30 2008-01-03 Tealeaf Technology, Inc. Method and apparatus for monitoring and synchronizing user interface events with network data
CN103297450A (en) * 2012-02-23 2013-09-11 百度在线网络技术(北京)有限公司 Distributed cluster simulation system, method and device
CN104092579A (en) * 2014-02-12 2014-10-08 腾讯科技(深圳)有限公司 Simulating method and device for network types
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN109582550A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of method, apparatus and server obtaining full dose business scenario failure collection
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
向琦: "基于插桩技术的漏洞自动化验证研究与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112328504A (en) * 2020-12-03 2021-02-05 广州品唯软件有限公司 Buried point data inspection method, buried point data inspection device, buried point data inspection system, computer equipment and storage medium
CN112650659A (en) * 2020-12-22 2021-04-13 平安普惠企业管理有限公司 Buried point setting method and device, computer equipment and storage medium
CN113300912A (en) * 2021-05-21 2021-08-24 湖南快乐阳光互动娱乐传媒有限公司 Equipment testing method and device and electronic equipment
CN113300912B (en) * 2021-05-21 2022-07-26 湖南快乐阳光互动娱乐传媒有限公司 Equipment testing method and device and electronic equipment
CN113642047A (en) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 Buried point data verification method and system

Also Published As

Publication number Publication date
CN111611140B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN111611140B (en) Report verification method and device for buried point data, electronic equipment and storage medium
US20200250024A1 (en) High-volume distributed script error handling
CN107040816B (en) Client application operation abnormity analysis method and device
US10909028B1 (en) Multi-version regression tester for source code
US8914504B2 (en) End user performance monitoring for mobile applications
CN108696399B (en) Business service test method and device
CN108134708B (en) Method and device for monitoring third-party interface
CN109831357B (en) Service verification method, device, storage medium and server
CN110569159A (en) Baffle generation method, device, equipment and computer storage medium
US20090282447A1 (en) Distributed diagnostics for internet video link
US11151025B1 (en) Generating software test plans based at least in part on monitored traffic of a production application
CN113315828B (en) Traffic recording method and device, traffic recording equipment and storage medium
CN107168844B (en) Performance monitoring method and device
CN109995614B (en) Alpha testing method and device
CN114301673A (en) Vulnerability detection method and device, electronic equipment and storage medium
CN113778879B (en) Interface fuzzy test method and device
CN112367345A (en) Data processing method, server device and computer readable storage medium
CN108200132A (en) Resource acquiring method, device, equipment and computer readable storage medium
US20080072321A1 (en) System and method for automating network intrusion training
CN109274533B (en) Web service fault positioning device and method based on rule engine
CN111611141A (en) Reporting verification method and device of buried point data, electronic equipment and storage medium
CN108390770B (en) Information generation method and device and server
CN111176965B (en) Recommendation system pre-release test method and device and electronic equipment
CN113836013A (en) Embedded point testing method and device, computer equipment and computer readable storage medium
CN112835780A (en) Service detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200901

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000031

Denomination of invention: Report verification method, device, electronic equipment and storage medium of buried point data

License type: Common License

Record date: 20210125

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant