CN111966339B - Buried point parameter input method and device, computer equipment and storage medium - Google Patents

Buried point parameter input method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111966339B
CN111966339B CN202010714055.4A CN202010714055A CN111966339B CN 111966339 B CN111966339 B CN 111966339B CN 202010714055 A CN202010714055 A CN 202010714055A CN 111966339 B CN111966339 B CN 111966339B
Authority
CN
China
Prior art keywords
buried point
preset
point
buried
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010714055.4A
Other languages
Chinese (zh)
Other versions
CN111966339A (en
Inventor
杨进波
洪智
李少华
甘湛健
梁旭飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaolian Consumer Finance Co ltd
Original Assignee
Zhaolian Consumer Finance Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhaolian Consumer Finance Co ltd filed Critical Zhaolian Consumer Finance Co ltd
Priority to CN202010714055.4A priority Critical patent/CN111966339B/en
Publication of CN111966339A publication Critical patent/CN111966339A/en
Application granted granted Critical
Publication of CN111966339B publication Critical patent/CN111966339B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/33Intelligent editors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Geophysics And Detection Of Objects (AREA)

Abstract

The application relates to a method, a device, computer equipment and a storage medium for recording buried point parameters, which comprise the steps of obtaining buried point information to be processed; detecting the buried point mark; if the embedded point identification meets the preset condition, storing the embedded point identification into a preset input table according to the type of the embedded point identification; and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table. By detecting the embedded point identification in the embedded point information, the embedded point identification meeting the conditions is stored in a corresponding preset entry table, so that the embedded point identification is stored in time; the embedded point parameters are correspondingly stored in the preset input table in response to the input request of the embedded point parameters, so that the embedded point parameters and the embedded point identification are stored together; the developer only needs to trigger the buried point to finish the storage of the buried point identification, then inputs the buried point parameters corresponding to the input preset input table to finish the input work, and the input efficiency of the buried point parameters is improved.

Description

Buried point parameter input method and device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of data acquisition technologies, and in particular, to a method and apparatus for recording parameters of buried points, a computer device, and a storage medium.
Background
With the high-speed development of the Internet, various application programs, pages and the like are greatly emerging, the data quantity required to be collected is more and more, and the data processing task is heavier and heavier; usually, a developer collects user behavior data in an application program and a page in a buried point mode, and analyzes the reported data at a server side.
Currently, before development work begins, developers need to determine buried point parameters and record the parameters one by one; in the development process, the recorded buried point parameters also need to be modified in time according to the adjustment of codes. Therefore, the existing method for recording the buried point parameters is low in efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a method, an apparatus, a computer device, and a storage medium for recording a buried point parameter, which can improve efficiency of the method for recording a buried point parameter.
A method of entry of buried point parameters, the method comprising:
acquiring buried point information to be processed; the buried point information carries a buried point mark;
Detecting the buried point mark;
if the buried point identification meets the preset condition, storing the buried point identification into a preset input table according to the type of the buried point identification;
and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers into the preset input table.
In one embodiment, the detecting the buried point identifier includes:
analyzing the buried point identification to obtain a character string combination corresponding to the buried point identification;
detecting the character string combination according to a preset legal detection file;
and if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
In one embodiment, the detecting the character string combination according to a preset legal detection file includes:
extracting a preset character string from the preset legal detection file;
matching the character strings in the character string combination with the preset character strings respectively;
and if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection passes.
In one embodiment, the storing the embedded point identifier in a preset entry table according to the type of the embedded point identifier includes:
determining the type of the buried point mark according to the character string combination of the buried point mark;
determining a preset input table corresponding to the type of the buried point identifier;
and storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
In one embodiment, after detecting the character string combination according to a preset legal detection file, the method further includes:
if the character string combination detection fails, confirming that the embedded point identification does not accord with the preset condition;
discarding the buried point mark which does not meet the preset condition.
In one embodiment, before storing the buried point parameter corresponding to the buried point identifier in the preset entry table, the method further includes:
detecting the buried point parameters;
the storing the buried point parameters corresponding to the buried point identification in the preset entry table comprises the following steps:
and if the buried point parameter passes the detection, correspondingly storing the buried point parameter to the preset entry table according to the buried point identifier.
In one embodiment, before acquiring the buried point information to be processed, the method further includes:
receiving behavior data uploaded by a preset buried point;
performing data processing on the behavior data to obtain corresponding behavior log information;
and extracting buried point information from the behavior log information to serve as the buried point information to be processed.
A buried point parameter entry device, the device comprising:
the embedded point information acquisition module is used for acquiring embedded point information to be processed; the buried point information carries a buried point mark;
the buried point identification detection module is used for detecting the buried point identification;
the embedded point identification storage module is used for storing the embedded point identification to a preset input table according to the type of the embedded point identification if the embedded point identification meets preset conditions;
and the buried point parameter storage module is used for responding to an input request of buried point parameters corresponding to buried point identifiers in the preset input table and storing the buried point parameters corresponding to the buried point identifiers into the preset input table.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method described above when the processor executes the computer program.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method described above.
A computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of:
acquiring buried point information to be processed; the buried point information carries a buried point mark;
detecting the buried point mark;
if the buried point identification meets the preset condition, storing the buried point identification into a preset input table according to the type of the buried point identification;
and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers into the preset input table.
A computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of:
acquiring buried point information to be processed; the buried point information carries a buried point mark;
detecting the buried point mark;
if the buried point identification meets the preset condition, storing the buried point identification into a preset input table according to the type of the buried point identification;
And responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers into the preset input table.
The method, the device, the computer equipment and the storage medium for recording the buried point parameters comprise the steps of acquiring buried point information to be processed; the buried point information carries a buried point mark; detecting the buried point mark; if the embedded point identification meets the preset condition, storing the embedded point identification into a preset input table according to the type of the embedded point identification; and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table. By detecting the embedded point identification in the embedded point information, the embedded point identification meeting the conditions is stored in a corresponding preset entry table, so that the embedded point identification is stored in time; the embedded point parameters are correspondingly stored in the preset input table in response to the input request of the embedded point parameters, so that the embedded point parameters and the embedded point identification are stored together, and the complete preset input table is obtained; the developer does not need to input the embedded point parameters in advance, the embedded point identification can be automatically stored only by triggering the embedded point, the embedded point parameters are correspondingly input into a preset input table, the input work can be finished, and the input efficiency of the embedded point parameters is improved.
Drawings
FIG. 1 is an application environment diagram of a method for entering buried point parameters in one embodiment;
FIG. 2 is a flow chart of a method for recording parameters of buried points in an embodiment;
FIG. 3 is a flowchart illustrating a detection step of a buried point identifier in one embodiment;
FIG. 4 is a flowchart illustrating a detection step of a string combination in one embodiment;
FIG. 5 is a flowchart illustrating a step of storing a buried point identifier in a preset entry table in one embodiment;
FIG. 6 is a flowchart illustrating a step of discarding buried point identifiers that do not meet a predetermined condition in one embodiment;
FIG. 7 is a flowchart of a method for acquiring a buried point identifier in one embodiment;
FIG. 8 is a block diagram of a device for entering parameters of buried points in one embodiment;
fig. 9 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The method for recording the embedded point parameters can be applied to an application environment shown in fig. 1. Wherein the terminal 11 communicates with the server 12 via a network. The server 12 acquires buried point information to be processed from the terminal 11; the buried point information carries a buried point mark; the server 12 detects the buried point identification; if the embedded point identification meets the preset condition, the server 12 stores the embedded point identification into a preset entry table according to the type of the embedded point identification; the server 12 responds to the input request of the buried point parameter of the terminal 11 corresponding to the buried point identifier in the preset entry table, and the server 12 stores the buried point parameter corresponding to the buried point identifier in the preset entry table. The terminal 11 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices, and the server 12 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, a method for recording parameters of a buried point is provided, and the method is applied to the server 12 in fig. 1 for illustration, and includes the following steps:
step 21, obtaining buried point information to be processed; the buried point information carries a buried point identifier.
The buried point is a term in the field of user behavior data acquisition, and refers to a related technology for collecting and processing user behavior events and an implementation process thereof, such as the click times of a user on a certain button in a page, the time for watching a certain video, and the like. The embedded point information is information generated when the corresponding embedded point is triggered by the user executing corresponding operation in the page or the program. The embedded point identifier is a parameter capable of uniquely identifying the embedded point, and may be an embedded point code value, that is, a code corresponding to a behavior event, and generally consists of a number, an english character and a symbol.
Specifically, when a buried point of a page or a component preset in the terminal equipment is triggered, integrating information related to the triggering operation to generate buried point information, and sending the buried point information to a server through the terminal. The server acquires the embedded point information from the terminal and reads the embedded point identification carried by the embedded point information.
The method comprises the steps that a preset buried point is triggered through an operation page or a program component, corresponding buried point information is generated and then sent to a server, the server further obtains buried point identification after obtaining the buried point information, the buried point information is identified, a developer does not need to input buried point parameters in advance, the buried point information can be automatically identified by triggering the buried point, the buried point identification is obtained, and the efficiency of inputting the buried point parameters is improved.
Step 22, detecting the buried point identifier.
Specifically, since the embedded point identifier may generally consist of numbers, letters and symbols, and the specific composition mode has a certain rule, the embedded point identifier may be detected to determine whether the embedded point identifier meets a preset setting.
For example, the buried point identification may be defined in segments according to specifications, and the previous segment is the parent of the next segment, for example:
module ID. page ID. UI component ID [. UI subcomponent ID.. ];
according to the specification, module ID, page ID, component ID and the like of the buried point identification can be respectively obtained, when a certain necessary ID is detected to be missing or illegal characters are contained in the buried point identification, the buried point identification can be considered invalid, the buried point identification does not pass through the detection, and the buried point identification data is discarded or skipped; if the embedded point identification is detected preliminarily, the validity of each segment ID can be detected, for example, whether the code value is invalid data can be judged according to whether the module ID is a pre-registered ID type, and if the module ID is not registered, the embedded point identification data is discarded or skipped. The effective buried point identification is screened out by detecting the buried point identification, the invalid buried point identification is eliminated in advance, the range of buried point parameter recording is reduced, and the efficiency of buried point parameter recording is improved.
And step 23, if the embedded point identification meets the preset condition, storing the embedded point identification into a preset entry table according to the type of the embedded point identification.
The preset condition refers to a detection condition for judging whether the embedded point identifier meets a set specification, for example, judging whether the acquired embedded point information meets a structural composition format of a specification of' module ID. page ID. UI component ID [. UI sub-component ID.. ]; the preset condition may also be a condition for detecting the validity of each component module of the embedded point identifier, for example, a module ID that is valid for the embedded point identifier is registered in advance, and if the module ID in the embedded point identifier is not a valid module ID that is registered in advance, the embedded point identifier may be considered to be not in accordance with the preset condition.
The type of the embedded point identifier may be determined according to a certain composition value, for example, the embedded point identifier may be considered as a type a when the embedded point identifier contains the character "a_1%" and may be considered as a type B when the embedded point identifier contains the character "h_9%".
The type of the buried point mark can also be determined according to the segment length of the buried point mark; for example, in the embedded point identifier "remoModule. TestPage", the symbol' ″ divides the identifier into two sections, and the length of the identifier after the segmentation is 2, which can be considered as a page type; similarly, in the embedded point identifier "remoModule. TestPage. Button", the symbol' ″ divides the identifier into three sections, and if the length after the identifier is segmented is 3, the identifier may be regarded as a component type, and similarly, the embedded point identifier with the length after the segmentation being greater than 2 may be specified as a page type. It should be noted that, the above examples only illustrate the segment lengths, and do not limit the correspondence between the segment lengths and the buried point identification types; in a specific application, the adjustment can be made according to the actual situation.
After determining the type of the buried point identifier, the buried point identifier can be stored into a plurality of preset input tables which are manufactured in advance according to the type of the buried point identifier. For example, a page entry table is preset for the page entry of the embedded point, and a module entry table is preset for the module entry of the embedded point.
The method and the device identify the types of the buried point identifiers in a plurality of modes, and correspondingly store the buried point identifiers according to the types, so that the type distribution of the buried point identifiers is realized, and the efficiency of later-stage buried point parameter input is improved.
And step 24, responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table.
The embedded point parameter may be specific meaning information, comment information, remark information, etc. corresponding to the embedded point identifier. The input request of the embedded point parameters is generated when the corresponding embedded point parameters are input according to the embedded point identifiers in the preset input table, and the embedded point parameters can be stored to the positions corresponding to the embedded point identifiers in the preset input table after the input request of the embedded point parameters passes. For example, the embedded point identifier is "1%123_9 ((a)", the corresponding embedded point parameter may be a communication module-information confirmation page-information confirmation button), and after the input request of the embedded point parameter passes, the embedded point identifier "1%123_9 ((a)", the corresponding meaning of which is the "communication module-information confirmation page-information confirmation button") in the preset entry table is set.
Specifically, after receiving an input request of the embedded point parameters corresponding to the embedded point identifiers in the preset input table, the server verifies the request and detects the embedded point parameters, and after verification and detection pass, the embedded point parameters are stored in the preset input table to complete the input process of the embedded point parameters. According to the method, the embedded point parameters corresponding to the embedded point identifiers are stored in the preset recording table by responding to the input request of the embedded point parameters, so that developers do not need to store the embedded point identifiers and the embedded point parameters in the preset recording table in advance, and the embedded point parameters can be recorded efficiently.
In the method for inputting the buried point parameters, buried point information to be processed is obtained; the buried point information carries a buried point mark; detecting the buried point mark; if the embedded point identification meets the preset condition, storing the embedded point identification into a preset input table according to the type of the embedded point identification; and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table. By detecting the embedded point identification in the embedded point information, the embedded point identification meeting the conditions is stored in a corresponding preset entry table, so that the embedded point identification is stored in time; the embedded point parameters are correspondingly stored in the preset input table in response to the input request of the embedded point parameters, so that the embedded point parameters and the embedded point identification are stored together, and the complete preset input table is obtained; the developer does not need to input the embedded point parameters in advance, the embedded point identification can be automatically stored only by triggering the embedded point, the embedded point parameters are correspondingly input into a preset input table, the input work can be finished, and the input efficiency of the embedded point parameters is improved.
In one embodiment, as shown in fig. 3, the detecting the buried point identifier in step 22 includes:
step 31, analyzing the buried point identification to obtain a character string combination corresponding to the buried point identification;
step 32, detecting the character string combination according to a preset legal detection file;
step 33, if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
Specifically, the embedded point identifier is usually formed by combining a plurality of character strings, and each character string has a certain meaning and a corresponding coding rule, so that the embedded point identifier can be analyzed according to a preset specification to obtain the character string combination corresponding to the embedded point identifier; the preset legal detection file comprises a plurality of standard files which can analyze the buried point identification, and can identify character strings, character string combinations, character string meanings and the like to obtain corresponding detection results.
According to the embodiment, the character string combination obtained after the analysis of the embedded point identification is detected through the preset legal detection file, so that illegal embedded point identification is eliminated, the accuracy of the embedded point parameter input is improved, and the efficiency of the embedded point parameter input is improved.
In one embodiment, as shown in fig. 4, the step 32 detects the character string combination according to a preset legal detection file, including:
step 41, extracting a preset character string from a preset legal detection file;
step 42, matching the character strings in the character string combination with preset character strings respectively;
and 43, if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection is passed.
Specifically, the legal detection file includes a plurality of preset strings in advance, for example, the preset string corresponding to the module 1 is "%001", and if the string related to the module extracted from the string combination is "%0.1", and the string does not have the corresponding preset string in the legal detection file, the string can be determined to have no matching result, and is further identified as not passing the string combination detection.
According to the embodiment, the preset character strings stored in the preset legal detection file are used for respectively matching the character string combinations corresponding to the embedded point identifiers, whether the character string combinations pass through detection is judged according to the matching result, illegal embedded point identifiers are eliminated, accuracy in the process of inputting embedded point parameters is improved, and efficiency in inputting the embedded point parameters is improved.
In one embodiment, as shown in fig. 5, step 23 stores the embedded point identifier in a preset entry table according to the type of the embedded point identifier, including:
step 51, determining the type of the buried point mark according to the character string combination of the buried point mark;
step 52, determining a preset entry table corresponding to the type of the buried point identifier;
and step 53, storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
Specifically, different character strings in the character string combination can mark different types of embedded point marks, and the overall length of the character string combination can also mark the types of the embedded point marks. After determining the type of the buried point identifier, a corresponding preset input table can be determined according to the type, so that classified storage of the buried point identifier is realized.
For example, the type of the embedded point identifier can be determined according to the length of the character string combination, and it is assumed that the character string combination with 20 bits length is the embedded point of the page type and the character string combination with 30 bits length is the embedded point of the component type on the premise that each character string is legal. Therefore, the character string combination with the length of 20 bits is stored in the preset entry table of the page type, and the character string combination with the length of 30 bits is stored in the preset entry table of the component type.
According to the embodiment, the type of the buried point identification is judged through the character string combination, and the buried point identification of different types is stored in the preset input table of different types, so that the classified storage of the buried point identification is realized, and the later buried point parameter input efficiency is improved.
In one embodiment, as shown in fig. 6, the step 32 further includes, after detecting the character string combination according to the preset legal detection file:
step 61, if the character string combination detection fails, confirming that the embedded point identification does not accord with the preset condition;
step 62, discarding the buried point identification which does not meet the preset condition.
Specifically, since the character string combination detection is not passed, the embedded point identification is an invalid embedded point identification, and a discard process is required. Before the discarding process, the buried point mark with discarding can be recorded in the discarding log, so as to avoid data loss. And the buried point identification to be discarded can be stored, a confirmation file is generated and sent to the corresponding terminal for confirmation, and then the discarding operation is executed.
According to the embodiment, the buried point identification which does not meet the preset condition is discarded, so that accumulation of invalid data is avoided, the data storage capacity of the server and the terminal is improved, further processing of the invalid data is avoided, and the later buried point parameter input efficiency is improved.
In one embodiment, before storing the buried point parameters corresponding to the buried point identifiers in the preset entry table, the method further includes: and detecting the buried point parameters.
Specifically, the server may detect the embedded point parameter in advance, and if the embedded point parameter does not meet the preset condition, the server may directly reject the storage request of the embedded point parameter. And under the condition that the preset conditions are not met, early warning information or reminding information can be generated according to the buried point parameters and the detected conditions, and the early warning information or the reminding information is sent to terminal equipment to remind related personnel to change, so that effective input of information is ensured.
According to the embodiment, the buried point parameter is detected, so that the buried point parameter input effectiveness is improved, and the later buried point parameter input accuracy is improved.
In one embodiment, storing the buried point parameters corresponding to the buried point identifier in a preset entry table includes: and if the buried point parameter detection is passed, correspondingly storing the buried point parameter to a preset entry table according to the buried point identification.
Specifically, when the buried point parameter passes the detection, the storage process of the buried point parameter can be normally performed. The embedded point parameters correspond to the embedded point identifiers, so that the embedded point parameters need to be stored in a preset entry table where the embedded point identifiers are located.
According to the embodiment, the detected buried point parameters are stored, so that the effective rate of buried point parameter recording is improved, and the efficiency of buried point parameter recording is improved.
In one embodiment, before acquiring the buried point information to be processed, the method further includes: receiving behavior data uploaded by a preset buried point; performing data processing on the behavior data to obtain corresponding behavior log information; and extracting buried point information from the behavior log information to serve as buried point information to be processed.
Specifically, after the embedded point is triggered, corresponding behavior data is uploaded, and behavior log information related to the behavior can be obtained through processing the behavior data, wherein the log information comprises embedded point information.
Fig. 7 shows a method for obtaining the buried point identifier. In the development stage, a developer triggers an application program through test equipment, corresponding buried points in an H5 page to generate behavior data, the behavior data is reported to a front-end log service gateway, the gateway simply processes the data and prints the data in a log form, a log file can be monitored through a filecoat (a log data collector of a local file) deployed on the front-end log service gateway, and new log added data is pushed to a log stack (a platform for transmitting, processing, managing and searching logs and events); the logstack is mainly used for 1) integrating multiple data sources and unifying data formats in the link because the data sources have other data besides behavior data; 2) The data splitting, the front end reporting behavior data may have a plurality of cases of merging and uploading, and splitting is needed for facilitating processing; 3) And filtering the data, namely filtering partial behavior data which do not meet the requirements, and avoiding invalid data from flowing into a downstream data processing system. The data after the logstack processing is pushed to a module for embedded point information processing through a message middleware kafka (high throughput distributed publish-subscribe message system) for embedded point parameter entry.
In one embodiment, the process of storing the buried point parameter corresponding to the buried point identifier in the preset entry table further includes:
the server detects whether the embedded point parameters exist in a preset input table or not; if the embedded point parameters are detected to exist in the preset input table, the server detects whether the sub-attribute corresponding to the embedded point parameters is complete, for example, whether the page type can detect the missing of the page route, and whether the component type can detect the component type is true; if the deletion is detected, automatic supplementation can be performed or corresponding information can be generated to remind a developer of supplementing.
If the buried point parameter is detected not to exist in the preset input table, judging whether the buried point parameter exists in the omission table or not; the missing table records information which is written in accordance with preset conditions but is not recorded, for example, the embedded point identifier corresponds to a component type, but the embedded point identifier of the page to which the component type belongs does not exist, so that the page can be judged to be a new embedded point identifier, and the embedded point identifier and the corresponding embedded point parameter are supplemented to the missing table.
The buried point identification and buried point parameters in the omission table can be detected as sub-attributes, the sub-attribute missing can be directly supplemented, and the sub-attributes are complete. After the data in the omission table is confirmed by the corresponding developer, the data can be used as a part of a preset input table to be migrated to the preset input table, so that the complete input of the buried point parameters is realized. In addition, if a certain buried point identifier or buried point parameter is recorded before, but is deleted later, the recording process can be performed again when the process is performed again, the recorded information is stored in the omission table, and after confirmation of corresponding developers, the recorded information is recorded in the preset recording table again.
The embodiment realizes that 1) the data which is input into the preset input table cannot be input repeatedly through the steps, and saves data storage resources; 2) The recorded buried point parameters and the attribute associated with the buried point identification can be identified and corrected if the attribute is missing; 3) The data input before can be input again after being deleted, and the developer can confirm the data; 4) If the recorded information is a child node but the corresponding parent node information does not exist, the embedded point identification corresponding to the parent node can be identified as the information to be recorded and stored in the omission table, and the integrity of embedded point parameter recording is ensured to the greatest extent.
It should be understood that, although the steps in the flowcharts of fig. 2-7 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in FIGS. 2-7 may include multiple steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor does the order in which the steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the steps or stages in other steps or other steps.
In one embodiment, as shown in fig. 8, there is provided a buried point parameter recording device, including:
a buried point information acquiring module 81, configured to acquire buried point information to be processed; the buried point information carries a buried point mark;
the buried point identifier detection module 82 is configured to detect a buried point identifier;
the embedded point identification storage module 83 is configured to store the embedded point identification to a preset entry table according to the type of the embedded point identification if the embedded point identification meets a preset condition;
the embedded point parameter storage module 84 is configured to store, in response to an input request of an embedded point parameter corresponding to an embedded point identifier in a preset entry table, the embedded point parameter corresponding to the embedded point identifier to the preset entry table.
In one embodiment, the buried point identifier detection module 82 is further configured to parse the buried point identifier to obtain a character string combination corresponding to the buried point identifier; detecting the character string combination according to a preset legal detection file; if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
In one embodiment, the buried point identifier detection module 82 is further configured to extract a preset character string from a preset legal detection file; respectively matching the character strings in the character string combination with preset character strings; if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection passes.
In one embodiment, the embedded point identifier storage module 83 is further configured to determine a type of the embedded point identifier according to a character string combination of the embedded point identifier; determining a preset input table corresponding to the type of the buried point identifier; and storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
In one embodiment, the embedded point identifier detection module 82 is further configured to confirm that the embedded point identifier does not meet the preset condition if the string combination detection fails; discarding the buried point marks which do not meet the preset conditions.
In one embodiment, the buried point parameter input device further comprises a buried point parameter detection module, which is used for detecting the buried point parameter.
In one embodiment, the embedded point identifier storage module 83 is further configured to store the embedded point parameter to a preset entry table according to the embedded point identifier if the embedded point parameter passes the detection.
In one embodiment, the buried point parameter input device further comprises a buried point information acquisition module, which is used for receiving behavior data uploaded by a preset buried point; performing data processing on the behavior data to obtain corresponding behavior log information; and extracting buried point information from the behavior log information to serve as buried point information to be processed.
For specific limitations of the recording device of the buried point parameters, reference may be made to the above limitation of the recording method of the buried point parameters, which is not described herein. The above-mentioned each module in the logging device of the buried point parameter can be realized completely or partly by software, hardware and the combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 9. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing the entry data of the buried point parameters. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a method of entry of buried point parameters.
It will be appreciated by those skilled in the art that the structure shown in fig. 9 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the computer device to which the present application applies, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of:
acquiring buried point information to be processed; the buried point information carries a buried point mark;
detecting the buried point mark;
if the embedded point identification meets the preset condition, storing the embedded point identification into a preset input table according to the type of the embedded point identification;
and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table.
In one embodiment, the processor when executing the computer program further performs the steps of: analyzing the buried point identification to obtain a character string combination corresponding to the buried point identification; detecting the character string combination according to a preset legal detection file; if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
In one embodiment, the processor when executing the computer program further performs the steps of: extracting a preset character string from a preset legal detection file; respectively matching the character strings in the character string combination with preset character strings; if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection passes.
In one embodiment, the processor when executing the computer program further performs the steps of: determining the type of the buried point mark according to the character string combination of the buried point mark; determining a preset input table corresponding to the type of the buried point identifier; and storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
In one embodiment, the processor when executing the computer program further performs the steps of: if the character string combination detection fails, confirming that the embedded point identification does not accord with the preset condition; discarding the buried point marks which do not meet the preset conditions.
In one embodiment, the processor when executing the computer program further performs the steps of: and detecting the buried point parameters.
In one embodiment, the processor when executing the computer program further performs the steps of: and if the buried point parameter detection is passed, correspondingly storing the buried point parameter to a preset entry table according to the buried point identification.
In one embodiment, the processor when executing the computer program further performs the steps of: receiving behavior data uploaded by a preset buried point; performing data processing on the behavior data to obtain corresponding behavior log information; and extracting buried point information from the behavior log information to serve as buried point information to be processed.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
acquiring buried point information to be processed; the buried point information carries a buried point mark;
detecting the buried point mark;
if the embedded point identification meets the preset condition, storing the embedded point identification into a preset input table according to the type of the embedded point identification;
and responding to an input request of the buried point parameters corresponding to the buried point identifiers in the preset input table, and storing the buried point parameters corresponding to the buried point identifiers in the preset input table.
In one embodiment, the computer program when executed by the processor further performs the steps of: analyzing the buried point identification to obtain a character string combination corresponding to the buried point identification; detecting the character string combination according to a preset legal detection file; if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
In one embodiment, the computer program when executed by the processor further performs the steps of: extracting a preset character string from a preset legal detection file; respectively matching the character strings in the character string combination with preset character strings; if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection passes.
In one embodiment, the computer program when executed by the processor further performs the steps of: determining the type of the buried point mark according to the character string combination of the buried point mark; determining a preset input table corresponding to the type of the buried point identifier; and storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the character string combination detection fails, confirming that the embedded point identification does not accord with the preset condition; discarding the buried point marks which do not meet the preset conditions.
In one embodiment, the computer program when executed by the processor further performs the steps of: and detecting the buried point parameters.
In one embodiment, the computer program when executed by the processor further performs the steps of: and if the buried point parameter detection is passed, correspondingly storing the buried point parameter to a preset entry table according to the buried point identification.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving behavior data uploaded by a preset buried point; performing data processing on the behavior data to obtain corresponding behavior log information; and extracting buried point information from the behavior log information to serve as buried point information to be processed.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, or the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples represent only a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A method for entering buried point parameters, the method comprising:
acquiring buried point information to be processed; the buried point information carries a buried point mark; the embedded point information is generated when the corresponding embedded point is triggered by the corresponding operation executed by the user in the page or the program; the buried point identification is a unique identification parameter of the buried point, and the unique identification parameter is a code value;
Detecting the buried point mark;
if the buried point identification meets the preset condition, storing the buried point identification into a preset input table according to the type of the buried point identification;
responding to an input request of a buried point parameter corresponding to a buried point identifier in the preset input table, and storing the buried point parameter corresponding to the buried point identifier into the preset input table; the buried point parameters comprise specific meaning information, annotation information and remark information corresponding to the buried point identification;
the storing the buried point identifier to a preset entry table according to the type of the buried point identifier includes: storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier;
the storing the buried point parameters corresponding to the buried point identification in the preset entry table comprises the following steps: and correspondingly storing the buried point parameters to the preset entry table according to the buried point identification.
2. The method of claim 1, wherein the detecting the buried point identifier comprises:
analyzing the buried point identification to obtain a character string combination corresponding to the buried point identification;
detecting the character string combination according to a preset legal detection file;
And if the character string combination detection passes, confirming that the embedded point identification meets the preset condition.
3. The method according to claim 2, wherein the detecting the character string combination according to a preset legal detection file includes:
extracting a preset character string from the preset legal detection file;
matching the character strings in the character string combination with the preset character strings respectively;
and if the character strings in the character string combination are successfully matched with the preset character strings respectively, determining that the character string combination detection passes.
4. The method according to claim 2, wherein the storing the embedded point identifier in a preset entry table according to the type of the embedded point identifier further comprises:
determining the type of the buried point mark according to the character string combination of the buried point mark;
determining a preset input table corresponding to the type of the buried point identifier;
and storing the buried point identifier into a preset entry table corresponding to the type of the buried point identifier.
5. The method of claim 2, further comprising, after detecting the combination of strings according to a preset legal detection file:
If the character string combination detection fails, confirming that the embedded point identification does not accord with the preset condition;
discarding the buried point mark which does not meet the preset condition.
6. The method according to any one of claims 1 to 5, further comprising, before storing the buried point parameters corresponding to the buried point identifications in the preset entry table:
detecting the buried point parameters;
the storing the buried point parameters corresponding to the buried point identification in the preset entry table further comprises:
and if the buried point parameter passes the detection, correspondingly storing the buried point parameter to the preset entry table according to the buried point identifier.
7. The method according to any one of claims 1 to 5, further comprising, before acquiring the buried point information to be processed:
receiving behavior data uploaded by a preset buried point;
performing data processing on the behavior data to obtain corresponding behavior log information;
and extracting buried point information from the behavior log information to serve as the buried point information to be processed.
8. A buried point parameter entry device, characterized in that the device comprises:
the embedded point information acquisition module is used for acquiring embedded point information to be processed; the buried point information carries a buried point mark; the embedded point information is generated when the corresponding embedded point is triggered by the corresponding operation executed by the user in the page or the program; the buried point identification is a unique identification parameter of the buried point, and the unique identification parameter is a code value;
The buried point identification detection module is used for detecting the buried point identification;
the embedded point identification storage module is used for storing the embedded point identification to a preset input table according to the type of the embedded point identification if the embedded point identification meets preset conditions;
the embedded point parameter storage module is used for responding to an input request of embedded point parameters corresponding to embedded point identifiers in the preset input table and storing the embedded point parameters corresponding to the embedded point identifiers into the preset input table; the buried point parameters comprise specific meaning information, annotation information and remark information corresponding to the buried point identification;
the buried point identification storage module is further used for storing the buried point identification to a preset input table corresponding to the type of the buried point identification;
the buried point parameter storage module is further configured to store the buried point parameter to the preset entry table according to the buried point identifier.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 7.
CN202010714055.4A 2020-07-23 2020-07-23 Buried point parameter input method and device, computer equipment and storage medium Active CN111966339B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010714055.4A CN111966339B (en) 2020-07-23 2020-07-23 Buried point parameter input method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010714055.4A CN111966339B (en) 2020-07-23 2020-07-23 Buried point parameter input method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111966339A CN111966339A (en) 2020-11-20
CN111966339B true CN111966339B (en) 2024-04-09

Family

ID=73362403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010714055.4A Active CN111966339B (en) 2020-07-23 2020-07-23 Buried point parameter input method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111966339B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112650963A (en) * 2020-12-25 2021-04-13 北京达佳互联信息技术有限公司 Webpage point burying method and device, electronic equipment and computer readable storage medium
CN114398032B (en) * 2021-12-20 2022-08-09 北京时空墨科技有限公司 Program writing method, apparatus and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578340B1 (en) * 2010-09-24 2013-11-05 Ca, Inc. Recording and replaying computer program execution with recorded execution event breakpoints
CN106571949A (en) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 Event tracking point processing method and apparatus
CN107196788A (en) * 2017-05-02 2017-09-22 阿里巴巴集团控股有限公司 A kind of processing method for burying point data, device, server and client
CN109597949A (en) * 2018-10-22 2019-04-09 平安科技(深圳)有限公司 Third party based on data normalization buries point identification generation method and equipment
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
CN110647512A (en) * 2019-09-29 2020-01-03 北京思维造物信息科技股份有限公司 Data storage and analysis method, device, equipment and readable medium
CN110674048A (en) * 2019-09-27 2020-01-10 北京新氧科技有限公司 Buried point test feature acquisition method and related device
JP2020030709A (en) * 2018-08-24 2020-02-27 株式会社リンクアンドモチベーション Information processing device, information processing method, and program
WO2020082558A1 (en) * 2018-10-26 2020-04-30 深圳壹账通智能科技有限公司 Function name-based breakpoint setting method, device, computer apparatus, and storage medium
CN111090433A (en) * 2019-10-23 2020-05-01 贝壳技术有限公司 Data processing method, device and storage medium
CN111435298A (en) * 2019-01-11 2020-07-21 北京京东尚科信息技术有限公司 Point burying method and device, electronic equipment and storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8578340B1 (en) * 2010-09-24 2013-11-05 Ca, Inc. Recording and replaying computer program execution with recorded execution event breakpoints
CN106571949A (en) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 Event tracking point processing method and apparatus
CN107196788A (en) * 2017-05-02 2017-09-22 阿里巴巴集团控股有限公司 A kind of processing method for burying point data, device, server and client
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
JP2020030709A (en) * 2018-08-24 2020-02-27 株式会社リンクアンドモチベーション Information processing device, information processing method, and program
CN109597949A (en) * 2018-10-22 2019-04-09 平安科技(深圳)有限公司 Third party based on data normalization buries point identification generation method and equipment
WO2020082558A1 (en) * 2018-10-26 2020-04-30 深圳壹账通智能科技有限公司 Function name-based breakpoint setting method, device, computer apparatus, and storage medium
CN111435298A (en) * 2019-01-11 2020-07-21 北京京东尚科信息技术有限公司 Point burying method and device, electronic equipment and storage medium
CN110674048A (en) * 2019-09-27 2020-01-10 北京新氧科技有限公司 Buried point test feature acquisition method and related device
CN110647512A (en) * 2019-09-29 2020-01-03 北京思维造物信息科技股份有限公司 Data storage and analysis method, device, equipment and readable medium
CN111090433A (en) * 2019-10-23 2020-05-01 贝壳技术有限公司 Data processing method, device and storage medium

Also Published As

Publication number Publication date
CN111966339A (en) 2020-11-20

Similar Documents

Publication Publication Date Title
CN107729210B (en) Distributed service cluster abnormity diagnosis method and device
CN110569214B (en) Index construction method and device for log file and electronic equipment
CN111866016B (en) Log analysis method and system
US20180357214A1 (en) Log analysis system, log analysis method, and storage medium
CN111078513B (en) Log processing method, device, equipment, storage medium and log alarm system
CN107870849B (en) Processing method and device of test log
CN113254255B (en) Cloud platform log analysis method, system, device and medium
CN111966339B (en) Buried point parameter input method and device, computer equipment and storage medium
CN110389874B (en) Method and device for detecting log file abnormity
CN109710439B (en) Fault processing method and device
CN113688288B (en) Data association analysis method, device, computer equipment and storage medium
CN113448935A (en) Method, electronic device and computer program product for providing log information
CN109582504A (en) A kind of data reconstruction method and device for apple equipment
CN111581057B (en) General log analysis method, terminal device and storage medium
CN112732655B (en) Online analysis method and system for format-free log
CN110515792B (en) Monitoring method and device based on web version task management platform and computer equipment
CN111368128B (en) Target picture identification method, device and computer readable storage medium
CN111767161A (en) Remote calling depth recognition method and device, computer equipment and readable storage medium
WO2019041529A1 (en) Method, electronic apparatus, and computer readable storage medium for identifying company as subject of news report
CN108228417A (en) Car networking log processing method and processing unit
CN113037521B (en) Method for identifying state of communication equipment, communication system and storage medium
CN113792017A (en) Method and system for checking template content imported into excel
CN113055760A (en) Log processing method, device, equipment and storage medium
CN113342861B (en) Data management method and device in service scene
CN111953544B (en) Fault detection method, device, equipment and storage medium of server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Zhaolian Consumer Finance Co.,Ltd.

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: MERCHANTS UNION CONSUMER FINANCE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant