CN106294559B - A kind of application traffic analysis method and device - Google Patents

A kind of application traffic analysis method and device Download PDF

Info

Publication number
CN106294559B
CN106294559B CN201610597004.1A CN201610597004A CN106294559B CN 106294559 B CN106294559 B CN 106294559B CN 201610597004 A CN201610597004 A CN 201610597004A CN 106294559 B CN106294559 B CN 106294559B
Authority
CN
China
Prior art keywords
log
funnel
application
analyzed
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610597004.1A
Other languages
Chinese (zh)
Other versions
CN106294559A (en
Inventor
杨其成
夏颖瑛
白浚楼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201610597004.1A priority Critical patent/CN106294559B/en
Publication of CN106294559A publication Critical patent/CN106294559A/en
Application granted granted Critical
Publication of CN106294559B publication Critical patent/CN106294559B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Abstract

This application provides a kind of application traffic analysis methods, belong to field of computer technology.The access log that the application passes through acquisition application to be analyzed;Funnel configuration file based on the preset application matches every access log, is determined for compliance with the log index table of the access log of the funnel configuration file;The path list obtained after being decomposed based on access path to be analyzed matches the actual access path determined according to the log index table;The flow analysis index of the application to be analyzed is calculated according to matching result, it solves to excavate to calculate based on frequent path in the prior art and shows rate or clicking rate, the problem of macroscopic analysis can not being carried out to the same type page or module, by to the identical analysis object identity of same type page setup, polymerization analysis can be carried out to the data of the same type page, obtain macroscopic analysis result.

Description

A kind of application traffic analysis method and device
Technical field
This application involves field of computer technology, more particularly to a kind of application traffic analysis method and device.
Background technique
In the prior art, for application, user experience is further promoted, needs to analyze the flow of application, Such as the conversion ratio of application, clicking rate are analyzed.In the stream of analysis application (such as: web application, application program for mobile terminal) When amount, it usually needs the behavior of each module or the page to application counts.Behavior for module or the page specifically includes that Show, click.In order to analyze user to application product using preference, the using effect for analyzing application product etc., the prior art In, generally use the module and the method got ready of the page for application, analysis module or the page show rate or clicking rate.It is uniting When meter shows rate and clicking rate, common method is that frequent path excavates, and is started with from the path that user accesses, for the core of access Heart road diameter is calculated and is optimized.
The method of analysis application traffic in the prior art at least has the following deficiencies: to be excavated based on calculating frequent path, Suitable for analyzing the conversion ratio of adjacent page, Result is partial to detailed user path, can not rapid pin to the same type page Or the macroscopic analysis that module merges.
Summary of the invention
Technical problems to be solved in this application are: providing a kind of application traffic analysis method, solve base in the prior art The problem of excavating to calculate in frequent path and show rate or clicking rate, macroscopic analysis can not being carried out to the same type page or module.
To solve the above-mentioned problems, the embodiment of the present application provides a kind of application traffic analysis method, comprising:
Obtain the access log of application to be analyzed;
Funnel configuration file based on the preset application to be analyzed matches every access log, is determined for compliance with institute State the log index table of the access log of funnel configuration file;
The path list obtained after being decomposed based on access path to be analyzed, to the reality determined according to the log index table Border access path is matched;
The flow analysis index of the application to be analyzed is calculated according to matching result;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed Analyze object analysis object identity having the same.
Correspondingly, the embodiment of the present application also provides a kind of application traffic analysis devices, comprising:
Access log obtains module, for obtaining the access log of application to be analyzed;
Log index table determining module, for described in the funnel configuration file matching based on the preset application to be analyzed Access log obtains every access log that module obtains, and is determined for compliance with the day of the access log of the funnel configuration file Will concordance list;
Route matching module, the path list for being obtained after being decomposed based on access path to be analyzed, to according to The actual access path that log index table determines is matched;
Flow analysis module, for calculating the stream of the application to be analyzed according to the matching result of the route matching module Measure analysis indexes;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed Analyze page analysis object identity having the same.
Application traffic analysis method disclosed in the present application, by the access log for obtaining application to be analyzed;Based on preset The funnel configuration file of the application matches every access log, is determined for compliance with the access log of the funnel configuration file Log index table;The path list obtained after being decomposed based on access path to be analyzed, to true according to the log index table Fixed actual access path is matched;The flow analysis index of the application to be analyzed is calculated according to matching result;Wherein, institute State the analysis object identity that access log includes the application to be analyzed of access;The funnel configuration file includes pre-generated Based on analysis object identity carry out log matches formula;The analysis object of same type has identical in the application to be analyzed Analysis object identity, solve in the prior art based on frequent path excavate calculate show rate or clicking rate, can not be to similar The problem of type page or module carry out macroscopic analysis.The application is by being arranged identical analysis object to the same type page or module Mark can carry out polymerization analysis to the data of the same type page or module, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed or module, spirit The flow indicator that configuration pathdepth to be analyzed, the flexible configuration of living are applied, practicability are stronger.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be in embodiment or description of the prior art Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the application Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these Figure obtains other attached drawings.
Fig. 1 is the application traffic analysis method flow diagram of the embodiment of the present application one;
Fig. 2 is the application traffic analysis method flow diagram of the embodiment of the present application two;
Fig. 3 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application three;
Fig. 4 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application four.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall in the protection scope of this application.
Funnel model full name of marketing is " search marketing effectiveness converts funnel ", and five layers of funnel have corresponded to enterprise search marketing Links, reflect from showing, clicking, accessing, seeking advice from, until generating customer quantity and loss in order process.From The maximum amount of showing arrive the smallest order volume, this procedural representation reduced from level to level constantly have client because a variety of causes from It opens, loses interest or abandon to buy to enterprise.Thought of the application based on marketing funnel model, goes out from the actual demand of application Hair, defines the flow funnel of application, and the customer flow of reflection each page of application or each module further analyzes the flow of application. Apply described in the embodiment of the present application includes: web application, mobile terminal application and the application of the end PC etc., and the module of application.
Embodiment one
A kind of application traffic analysis method disclosed in the present application, as shown in Figure 1, this method comprises: step 100 is to step 130。
Step 100, the access log of application to be analyzed is obtained.
The daily record data of application stores in distributed file system, and log system can collect the daily record data of application, institute Stating daily record data includes the log that all users access the application.It is generally included in daily record data: user identifier (id), using mark Know, analyze analysis object upstream-downstream relationship (the i.e. page or module of object identity, the time of access analysis object and access Jump relationship) etc..Then, log system extracts from the daily record data of application to be analyzed according to preset rules and belongs to certain The daily record data of the session each time of a user generates the relevant access log of a session.Wherein, the primary meeting of some user The access log of words includes: user identifier, application identities, session identification, session step.Wherein, session step is for indicating one The sequence of the access log of secondary session.The preset rules can be with are as follows: analyzes upstream-downstream relationship, the access time interval of object Deng.Wherein, the access log includes the analysis object identity of the application to be analyzed of access.
When it is implemented, analysis object can be the module on the page or the page.
Step 110, the funnel configuration file based on the preset application to be analyzed matches every access log, really Surely meet the log index table of the access log of the funnel configuration file.
When it is implemented, configuring to be analyzed answer by graphic user interface first before carrying out application traffic analysis Funnel configuration file.The funnel configuration file includes pre-generated based on analysis object (such as page) progress log The formula matched.The funnel configuration file further includes according to preset log according to the parameters based on analysis object configuration The corresponding relationship of matching condition, each field of the parameters of configuration and preset access log and parameters generates For carrying out the formula of log matches.
Then, the funnel configuration file based on the preset application to be analyzed, to every access log of acquisition It is matched, is determined for compliance with the access log of funnel configuration file, and extract the relevant information and funnel configuration text of access log Part relevant parameter information generates log index table.For example, extracting log sessions mark, log mark, session step, and related Parameter log mark, log sessions mark, session step and funnel description, the description life of funnel level of funnel configuration file At log index table.
Step 120, the path list obtained after being decomposed based on access path to be analyzed, to according to the log index table Determining actual access path is matched.
When product personnel or maintenance personnel need to analyze some access path or conversion ratio, the clicking rate of the page etc. of application When index, the access path of analysis object to be analyzed can be inputted.
When it is implemented, decomposing first to access path to be analyzed, multiple paths are obtained, form path list. Then, the log index table according to obtained in previous step is to the access log indexed in the log index table according to access Step sequencing is arranged, and the access log after arrangement represents the actual access road that user accesses the analysis object of application Diameter.When it is implemented, access analysis object queue can be generated according to the access log after arrangement, with the corresponding leakage of analysis object The funnel hierarchical identification being arranged in bucket configuration file further identifies the analysis object queue of generation, so that it may obtain actual access Path.Finally, each path in obtained actual access path and path list is matched.
Step 130, the flow analysis index of the application to be analyzed is calculated according to matching result.
After each path in obtained actual access path and path list is matched, successful match is determined The number of path (path for including in actual access path) and successful match (includes path i.e. in actual access path Number) etc..Then, the data obtained according to matching, calculate preset flow analysis index, such as page conversion ratio, clicking rate Deng.
Application traffic analysis method disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on The funnel configuration file of the preset application to be analyzed matches every access log, is determined for compliance with the funnel configuration text The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed Object analysis object identity having the same solves and shows rate or click based on frequent path excavation calculating in the prior art Rate, the problem of macroscopic analysis can not being carried out to the same type page or module.By being arranged identical point to similar type analysis object Object identity is analysed, polymerization analysis can be carried out to the data of similar type analysis object, obtain macroscopic analysis result.
Meanwhile the application is by configuration file, can according to business demand flexible configuration analysis object to be analyzed, flexibly The flow indicator of pathdepth to be analyzed, flexible configuration application is configured, practicability is stronger.
Embodiment two
A kind of application traffic analysis method disclosed in the present application, as shown in Fig. 2, this method comprises: step 200 is to step 270。
Step 200, the funnel configuration file of the application to be analyzed is obtained.
When it is implemented, the funnel that maintenance personnel or business personnel are applied by the configuration of preset graphic user interface is matched Set file.Funnel refers to that using in the process, user's Conversion Model between different step is answered for analyzing user's access The efficiency of depth and each step, this programme are readily applicable to the active pointer pair of a certain module, some specific location The efficiency of specific objective.The funnel configuration file for obtaining the application to be analyzed includes: to obtain to configure by graphic user interface Application to be analyzed funnel description, the description of funnel level, wherein funnel level description includes at least: funnel level mark Know, the analysis object identity and matching condition of the application to be analyzed that each level includes;According to the analysis object identity and The mapping relations of matching condition, preset analysis object identity and each field of access log, generate level defined formula;It will be described Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration file of the application to be analyzed.
The configuration file of the funnel of the application is configured by preset human-computer interaction interface, comprising: funnel description, level Description, level defined formula.Wherein, funnel description is for defining evaluation index;Level describes the number of levels for defining funnel The analysis object information that amount, hierarchical identification, level path and each level include;The analysis object information includes analysis pair It can also include the additional conditions of analysis object as mark.Level defined formula is believed according to the analysis object of each level of configuration Breath generates, and it can also include additional conditions that the analysis object, which includes at least analysis object identity,.The additional conditions are according to tool Body evaluation index determines.
The page, the module that object can be application are analyzed, in order to make it easy to understand, the present embodiment is answered to analyze object as one With the specific implementation process for illustrating application traffic analysis method for the page of program.It is to configure three layers of funnel below Example, illustrates the generating process of the configuration file of funnel.
Firstly, defining the funnel description of funnel, the evaluation index such as funnel for calculating includes conversion ratio.
Then, the level description of funnel is defined.Level description includes: level quantity, hierarchical identification, level path, And the page info that each level includes.Three layers are set by funnel in the present embodiment, the mark of each level is respectively as follows: first layer For " homepage ", the second layer is " intention page ", and third layer is " order ".The level path of funnel is " homepage-intention page-order ".
Level based on aforementioned definitions defines the page info that each level of funnel includes.The head of commonly used program application Page only one, for open application program after first page.User can be entered by the module in application program homepage To multiple next stage pages, eventually enters into target pages or enter object module.In application program use process, it is also possible to go out After current family enters the next stage page by the module in application program homepage, back to homepage or the feelings of application program are exited Condition.For the access track to the page to be analyzed in application program of identity user, being analysed to page configuration is each layer of funnel The page of grade, convenient for being analyzed by funnel.Therefore, the page (i.e. " homepage ") that first layer includes can be set to answer to open With first page after program;It is analysis indexes concern from " homepage " that the page (i.e. " intention page ") that the second layer includes, which is arranged, The page of entrance;It is target pages that the page (i.e. " order ") that third layer includes, which is arranged,.When it is implemented, funnel can also be arranged The attachment condition of each layer page, such as the additional conditions of setting " homepage ", such as 1.1 versions, for the application to indicated release Program carries out analysis indexes calculating.
When it is implemented, each page can be identified using Page Name pagename.Adopted when configuration file configuration Page iden-tity is consistent with the unique identification of each page of the application program in journal file.
When application is web application, such as Website page, if analysis object is Website page, analyzing object identity is The URL (uniform resource locator) of webpage;If reference is application program for mobile terminal, if analysis object module, object It is identified as the unique identification of module.
Finally, generating funnel configuration file according to funnel description and level description.
When it is implemented, the backstage of graphic user interface pre-establishes each of each configuration item and application program running log The corresponding relationship of field and matching operation rule, when the configuration for completing funnel parameters by the graphic user interface Later, the backstage of graphic user interface is according to the funnel description and level description life configured by the graphic user interface At the configuration file of funnel.Specifically: by the parameters of the funnel configured according to graphic user interface, it is mapped to the word of log Section forms the judgment formula for being directed to log, such as version number is mapped to app_version field, forms such as " app_ Formula as version.equals (' 1.1 ') ".The structure of funnel configuration file are as follows: funnel description, level description, level Defined formula, wherein level defined formula is generated according to the page info in the description of the level of configuration.When it is implemented, level Defined formula can be generated only according to the analysis object identity (such as page iden-tity) in the page info in the description of the level of configuration, Can also according in page info analysis object identity and additional conditions generate.Then, funnel configuration file is written and is distributed Formula file system HDFS.
Step 210, the access log of application to be analyzed is obtained.
Obtain the specific embodiment of the access log of application to be analyzed referring to the corresponding steps of embodiment one, herein no longer It repeats.
In the funnel configuration file for presetting application to be analyzed and after getting the access log of application to be analyzed, it is based on The funnel configuration file of the preset application matches every access log, is determined for compliance with the visit of the funnel configuration file Ask the log index table of log, comprising: the level in the funnel configuration file based on the preset application to be analyzed defines public Formula matches every access log, is determined for compliance with the access log of the funnel configuration file;According to the access of successful match Log mark, log sessions mark, session step and funnel description, the description of funnel level of log generate log index Table.
Step 220, the level defined formula matching in the funnel configuration file based on the preset application to be analyzed is every Access log described in item is determined for compliance with the access log of the funnel configuration file.
When it is implemented, configuring to be analyzed answer by graphic user interface first before carrying out application traffic analysis Funnel configuration file.The funnel configuration file includes the pre-generated formula that log matches are carried out based on the page.Institute Funnel configuration file is stated according to the parameters based on page configuration, further includes according to preset log matches condition, configuration What the corresponding relationship of each field and parameters of parameters and preset access log generated is used to carry out log The formula matched.
Then, the funnel configuration file based on the preset application, every access log progress to acquisition Match, is determined for compliance with the access log of funnel configuration file.When it is implemented, can be to access log described in every, in conjunction with default The application funnel configuration file in level defined formula, using JexlContext comparator go matching access log, Obtain the journal file for meeting level defined formula in funnel configuration file.
Step 230, according to the log mark of the access log of successful match, log sessions mark, session step and described Funnel description, the description of funnel level generate log index table.
For the access log of successful match, the relevant information and funnel configuration file relevant parameter letter of access log are extracted Breath generates log index table.For example, extracting log sessions mark, log mark, session step and associated funnel configuration file Parameter log mark, log sessions mark, session step and the funnel description, funnel level description generate log index Table.The format of each index can be in log index table are as follows: log id, funnel description, and the description of funnel level, log sessions id, Session step, User ID.Wherein, log id is for identifying a unique log;Step is described for matching access road to be analyzed Diameter;Log ID and User ID are used to calculate the index of conversion ratio.When it is implemented, can be increased according to the difference of flow analysis index Add deduct the list item of few log index table.
Step 240, access path to be analyzed is decomposed, obtains path list to be matched.
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
When product personnel or maintenance personnel need to analyze some access path or conversion ratio, the clicking rate of the page etc. of application When index, access path to be analyzed can be inputted.When it is implemented, decomposed to access path to be analyzed, obtain to It include: using the division mode based on prefix with path list, the access path being analysed to resolves into multiple subpath compositions Path list.Successively intercept preceding 1 to the N (path node of the N equal to the access path to be analyzed in the path to be visited Number) a path node, form N number of new path, N number of new path forms path list to be matched.With to be analyzed Access path be " A-B-C " for, intercept respectively: A, A-B, A-B-C obtain 3 new paths, and by A, A-B, A-B-C group At path list to be matched.
Later, the path list obtained after being decomposed based on access path to be analyzed, to true according to the log index table Fixed actual access path is matched, comprising: is carried out according to the vertical sequence of session step to the log index table Sequence;By in the log index table after sequence every index funnel hierarchical identification composition actual access path, with based on to All paths in path list that the access path of analysis obtains after decomposing are matched respectively;Wherein, described to be analyzed Access path is made of at least one funnel hierarchical identification.
Step 250, the log index table is ranked up according to session step vertical sequence.
The log is indexed according to the session step vertical sequence of the access log indexed in log index table Table is ranked up.
Step 260, by the actual access road of the funnel hierarchical identification composition of every index in the log index table after sequence Diameter is matched respectively with based on all paths in the path list obtained after access path decomposition to be analyzed.
The sequence of the access log of log index table index after sequence represents the reality that user accesses the page of application Access path.When it is implemented, access analysis object queue can be generated according to the access log for indexing table index after sequence (such as: page queue), it is further with the funnel hierarchical identification being arranged in the corresponding funnel configuration file of analysis object (such as: the page) Indicate the page queue generated, so that it may obtain actual access path.Finally, by obtained actual access path and path list In each path matched.For example, the funnel in the access log of first table item index of log index table after sequence Funnel hierarchical identification is A in level description, the funnel in the access log of second table item index of log index table after sequence Funnel hierarchical identification is B in level description, then available actual access path is A-B.
Then, obtained actual access path is matched respectively with all paths in obtained path list.With For the result that abovementioned steps obtain, all path A, A-B, A-B-C in actual access path A-B and path list are distinguished It is matched.
Step 270, the flow analysis index of the application to be analyzed is calculated according to matching result.
After each path in obtained actual access path and path list is matched, successful match is determined The number of path (path for including in actual access path) and successful match (includes path i.e. in actual access path Number) etc..Then, the data obtained according to matching, calculate preset flow analysis index, such as page conversion ratio, clicking rate Deng.The example of abovementioned steps is connected, the path of successful match includes: A, A-B, each successful match 1 time in this step.Then, root The flow analysis index of the application to be analyzed is calculated according to matching result.
The step of flow analysis index that the application to be analyzed is calculated according to matching result, comprising: according to matching The corresponding analysis object identity of node in path and/or each path in successful path list calculates the flow point of application Analyse index.The flow analysis index of application can be with are as follows: conversion ratio, clicking rate.
Flow analysis index is main are as follows: the Pv of each step, UV, session number etc..Pv is the number accessed, can be passed through Statistical log ID is calculated, and UV is calculated by counting user ID, and session number is calculated by counting session id, generally By the comparison of the UV between different step, conversion ratio of the user in funnel is calculated, which can be used to measure use The efficiency of the depth at family or some module;Two tested simultaneously by the conversion ratio variation or AB that monitor the same funnel Conversion ratio between a funnel compares, the optimization of Lai Jinhang business.
Previous example is connected, is 2 according to the Pv of the step corresponding with path node A of the available application of matching result.
In order to make it easy to understand, the present embodiment carries out the flow analysis method of application by taking the session of a user as an example Explanation.When it is implemented, of abovementioned steps is carried out to the access log of each session of all users using same method After matching, the matching result of each session of each user is integrated, so that it may the various flow analysis indexs being applied.
Application traffic analysis method disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on The funnel configuration file of the preset application to be allocated matches every access log, is determined for compliance with the funnel configuration text The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed Object analysis object identity having the same solves and shows rate or click based on frequent path excavation calculating in the prior art Rate, the problem of macroscopic analysis can not being carried out to the same type page or module.By to similar type analysis object (such as page, module) Identical analysis object identity is set, polymerization analysis can be carried out to the data of same type, obtain macroscopic analysis result.
Meanwhile the application is by configuration file, can according to business demand flexible configuration analysis object to be analyzed (such as: The page), flexible configuration pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
Embodiment three
Correspondingly, a kind of application traffic analysis device disclosed in the present application, as shown in figure 3, described device includes:
Access log obtains module 300, for obtaining the access log of application to be analyzed;
Log index table determining module 310, for the funnel configuration file matching based on the preset application to be analyzed The access log obtains every access log that module 300 obtains, and is determined for compliance with the access of the funnel configuration file The log index table of log;
Route matching module 320, the path list for being obtained after being decomposed based on access path to be analyzed, to according to institute The actual access path that log index table determines is stated to be matched;
Flow analysis module 330, for calculating described to be analyzed answer according to the matching result of the route matching module 320 Flow analysis index;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed Analyze object analysis object identity having the same.
Application traffic analysis device disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on The funnel configuration file of the preset application to be analyzed matches every access log, is determined for compliance with the funnel configuration text The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file Including the pre-generated formula for carrying out log matches based on analysis object identity;The page of same type in the application to be analyzed Analysis object identity having the same solves and shows rate or clicking rate, nothing based on frequent path excavation calculating in the prior art The problem of method carries out macroscopic analysis to the same type page or module.It is identical by the way that similar type analysis object (such as: the page) is arranged Analysis object identity, can to the data of similar type analysis object carry out polymerization analysis, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed, flexible configuration Pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
Example IV
Based on embodiment three, a kind of application traffic analysis device disclosed in another embodiment of the application, as shown in figure 4, institute State device further include:
Funnel configuration file generation module 340, for obtaining the leakage of the application to be analyzed configured by graphic user interface Bucket description, the description of funnel level, wherein the funnel level description includes at least: the institute that funnel hierarchical identification, each level include State the analysis object identity and matching condition of application to be analyzed;According to the analysis object identity and matching condition, preset point The mapping relations of object identity and each field of access log are analysed, level defined formula is generated;By funnel description, funnel level Description and level defined formula are integrated into the funnel configuration file of the application to be analyzed.
Optionally, the log index table determining module 310 further comprises:
Log matches unit 3101, it is fixed for the level in the funnel configuration file based on the preset application to be analyzed Adopted formula matches every access log, is determined for compliance with the access log of the funnel configuration file;
Log index table generation unit 3102, for log mark, the log sessions according to the access log of successful match Mark, session step and funnel description, the description of funnel level generate log index table.
Optionally, the route matching module 320 includes:
Sequencing unit 3201, for being ranked up according to the vertical sequence of session step to the log index table;
Route matching unit 3202, for index every in the log index table after the sequencing unit 3201 sequence The actual access path of funnel hierarchical identification composition, with decomposed based on access path to be analyzed after in obtained path list All paths are matched respectively;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
The flow analysis module 330 is specifically used for: according to path in the path list of successful match and/or each described The corresponding analysis object identity of the node in path calculates the flow analysis index of application.
Optionally, the application traffic analysis device further include:
Path list generation module 350 to be analyzed, for using the division mode based on prefix, the access road being analysed to Diameter resolves into the path list of multiple subpath compositions.
Application traffic analysis device disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on The funnel configuration file of the preset application matches every access log, is determined for compliance with the visit of the funnel configuration file Ask the log index table of log;The path list obtained after being decomposed based on access path to be analyzed, to according to the log rope Draw the actual access path that table determines to be matched;The flow analysis index of the application to be analyzed is calculated according to matching result; Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file includes The pre-generated formula that log matches are carried out based on analysis object identity;The page of same type has in the application to be analyzed Identical analysis object identity solves and shows rate or clicking rate based on frequent path excavation calculating in the prior art, can not be right The problem of same type page or module carry out macroscopic analysis.By the way that identical analysis object mark is arranged to similar type analysis object Know, polymerization analysis can be carried out to the data of similar type analysis object, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed, flexible configuration Pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.For Installation practice For, since it is basically similar to the method embodiment, so being described relatively simple, referring to the portion of embodiment of the method in place of correlation It defends oneself bright.
A kind of application traffic analysis method, apparatus provided by the present application is described in detail above, it is used herein The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand The present processes and its core concept;At the same time, for those skilled in the art is having according to the thought of the application There will be changes in body embodiment and application range, in conclusion the content of the present specification should not be construed as to the application Limitation.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware realization.Based on such reason Solution, substantially the part that contributes to existing technology can embody above-mentioned technical proposal in the form of software products in other words Come, which may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively Method described in certain parts of a embodiment or embodiment.

Claims (12)

1. a kind of application traffic analysis method characterized by comprising
Obtain the access log of application to be analyzed;
Funnel configuration file based on the preset application to be analyzed matches every access log, is determined for compliance with the leakage The log index table of the access log of bucket configuration file;
The path list obtained after being decomposed based on access path to be analyzed, the practical visit to being determined according to the log index table Diameter of asking the way is matched;
The flow analysis index of the application to be analyzed is calculated according to matching result;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed Object analysis object identity having the same.
2. the method as described in claim 1, which is characterized in that the stream for calculating the application to be analyzed according to matching result The step of measuring analysis indexes, comprising:
It is calculated according to the corresponding analysis object identity of the node in path and/or each path in the path list of successful match The flow analysis index of application.
3. the method as described in claim 1, which is characterized in that the step of the access log for obtaining application to be analyzed it Before, further includes:
Obtain the funnel description of the application to be analyzed configured by graphic user interface, funnel level describes, wherein the funnel Level description includes at least: the analysis object identity for the application to be analyzed that funnel hierarchical identification, each level include and matching Condition;
It is closed according to the mapping of the analysis object identity and matching condition, preset analysis object identity and each field of access log System generates level defined formula;
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration text of the application to be analyzed Part;
Wherein, the funnel description is for defining evaluation index.
4. method as claimed in claim 3, which is characterized in that the funnel configuration based on the preset application to be analyzed File matches every access log, is determined for compliance with the step of the log index table of the access log of the funnel configuration file Suddenly, comprising:
Level defined formula in funnel configuration file based on the preset application to be analyzed matches every access day Will is determined for compliance with the access log of the funnel configuration file;
According to the log mark of the access log of successful match, log sessions mark, session step and funnel description, funnel Level description generates log index table.
5. method as claimed in claim 4, which is characterized in that the path column obtained after being decomposed based on access path to be analyzed Table, the step of matching to the actual access path determined according to the log index table, comprising:
The log index table is ranked up according to session step vertical sequence;
By in the log index table after sequence every index funnel hierarchical identification composition actual access path, with based on to point All paths in path list that the access path of analysis obtains after decomposing are matched respectively;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
6. the method as described in claim 1, which is characterized in that the path column obtained after being decomposed based on access path to be analyzed Table, before the step of being matched according to the determining actual access path of the log index table, further includes:
Using the division mode based on prefix, the access path being analysed to resolves into the path list of multiple subpath compositions.
7. a kind of application traffic analysis device characterized by comprising
Access log obtains module, for obtaining the access log of application to be analyzed;
Log index table determining module matches the access for the funnel configuration file based on the preset application to be analyzed Every access log that log acquisition module obtains, is determined for compliance with the log rope of the access log of the funnel configuration file Draw table;
Route matching module, the path list for being obtained after being decomposed based on access path to be analyzed, to according to the log The actual access path that concordance list determines is matched;
Flow analysis module, for calculating the flow point of the application to be analyzed according to the matching result of the route matching module Analyse index;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed Object analysis object identity having the same.
8. device as claimed in claim 7, which is characterized in that the flow analysis module is specifically used for: according to successful match Path list in path and/or each path node it is corresponding analysis object identity calculate application flow analysis refer to Mark.
9. device as claimed in claim 7, which is characterized in that further include: funnel configuration file generation module is used for:
Obtain the funnel description of the application to be analyzed configured by graphic user interface, funnel level describes, wherein the funnel Level description includes at least: the analysis object identity for the application to be analyzed that funnel hierarchical identification, each level include and matching Condition;
It is closed according to the mapping of the analysis object identity and matching condition, preset analysis object identity and each field of access log System generates level defined formula;
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration text of the application to be analyzed Part;
Wherein, the funnel description is for defining evaluation index.
10. device as claimed in claim 9, which is characterized in that the log index table determining module further comprises:
Log matches unit, for the level defined formula in the funnel configuration file based on the preset application to be analyzed With access log described in every, it is determined for compliance with the access log of the funnel configuration file;
Log index table generation unit, for log mark, the log sessions mark, session according to the access log of successful match Step and funnel description, the description of funnel level generate log index table.
11. device as claimed in claim 10, which is characterized in that the route matching module includes:
Sequencing unit, for being ranked up according to the vertical sequence of session step to the log index table;
Route matching unit, the funnel hierarchical identification for every index in the log index table after the sequencing unit sorts The actual access path of composition is distinguished with based on all paths in the path list obtained after access path decomposition to be analyzed It is matched;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
12. device as claimed in claim 7, which is characterized in that further include:
Path list generation module to be analyzed, for using the division mode based on prefix, the access path being analysed to is decomposed The path list formed at multiple subpaths.
CN201610597004.1A 2016-07-26 2016-07-26 A kind of application traffic analysis method and device Active CN106294559B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610597004.1A CN106294559B (en) 2016-07-26 2016-07-26 A kind of application traffic analysis method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610597004.1A CN106294559B (en) 2016-07-26 2016-07-26 A kind of application traffic analysis method and device

Publications (2)

Publication Number Publication Date
CN106294559A CN106294559A (en) 2017-01-04
CN106294559B true CN106294559B (en) 2019-09-17

Family

ID=57652664

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610597004.1A Active CN106294559B (en) 2016-07-26 2016-07-26 A kind of application traffic analysis method and device

Country Status (1)

Country Link
CN (1) CN106294559B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145230A (en) * 2017-06-15 2019-01-04 百度在线网络技术(北京)有限公司 Information output method and device
CN107563621A (en) * 2017-08-22 2018-01-09 北京金堤科技有限公司 A kind of website user's wastage analysis method and device
CN107580215A (en) * 2017-09-25 2018-01-12 深圳市九洲电器有限公司 Set top box component quality feedback method and system
CN110019072B (en) * 2017-11-21 2021-05-25 北京京东尚科信息技术有限公司 AB experiment method and system based on real-time data
CN107943679B (en) * 2017-11-24 2021-02-26 阿里巴巴(中国)有限公司 Path funnel generation method and device and server
CN110119337B (en) * 2019-04-16 2023-03-10 深圳市轱辘车联数据技术有限公司 Data analysis method and device and server
CN110278150B (en) * 2019-06-02 2020-05-19 北京航空航天大学 Inter-domain aggregation path analysis method based on edge node request information characteristics
CN112148957A (en) * 2019-06-26 2020-12-29 北京百度网讯科技有限公司 Webpage access data analysis method, device and equipment and readable storage medium
CN110941608B (en) * 2019-09-29 2023-01-20 北京思维造物信息科技股份有限公司 Method, device and equipment for generating buried point analysis and funnel analysis report
CN110675194A (en) * 2019-09-29 2020-01-10 北京思维造物信息科技股份有限公司 Funnel analysis method, device, equipment and readable medium
CN111523921B (en) * 2019-12-31 2023-10-20 支付宝实验室(新加坡)有限公司 Funnel analysis method, analysis device, electronic device, and readable storage medium
CN112612987A (en) * 2020-12-25 2021-04-06 广州凡科互联网科技股份有限公司 Method for calculating upstream and downstream flow of page access
CN113176980B (en) * 2021-05-25 2023-09-12 医声医事(北京)科技有限公司 Dynamic construction method and system of flow hopper
CN113486241A (en) * 2021-07-08 2021-10-08 中国建设银行股份有限公司 Service preference analysis method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544298A (en) * 2013-10-30 2014-01-29 曙光信息产业(北京)有限公司 Log analysis method and analysis device for component
CN105357054A (en) * 2015-11-26 2016-02-24 上海晶赞科技发展有限公司 Website traffic analysis method and apparatus, and electronic equipment
CN105550250A (en) * 2015-12-09 2016-05-04 百度在线网络技术(北京)有限公司 Access log processing method and apparatus
CN105791247A (en) * 2014-12-25 2016-07-20 中国移动通信集团公司 Unified traffic payment business implementation method and associated equipment and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9075718B2 (en) * 2013-03-14 2015-07-07 Vmware, Inc. Dynamic field extraction of log data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544298A (en) * 2013-10-30 2014-01-29 曙光信息产业(北京)有限公司 Log analysis method and analysis device for component
CN105791247A (en) * 2014-12-25 2016-07-20 中国移动通信集团公司 Unified traffic payment business implementation method and associated equipment and system
CN105357054A (en) * 2015-11-26 2016-02-24 上海晶赞科技发展有限公司 Website traffic analysis method and apparatus, and electronic equipment
CN105550250A (en) * 2015-12-09 2016-05-04 百度在线网络技术(北京)有限公司 Access log processing method and apparatus

Also Published As

Publication number Publication date
CN106294559A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN106294559B (en) A kind of application traffic analysis method and device
Dumais et al. Understanding user behavior through log data and analysis
Thomson Qualitative research: validity
Rubin et al. Agile development with software process mining
CN105183870B (en) A kind of urban function region detection method and system using microblogging location information
Anderson et al. The crowd is the territory: Assessing quality in peer-produced spatial data during disasters
CN104298782B (en) Internet user actively accesses the analysis method of action trail
Espina et al. Infodemiology for syndromic surveillance of dengue and typhoid fever in the Philippines
CN108023768A (en) Network event chain establishment method and network event chain establish system
Sun et al. Socialwave: visual analysis of spatio-temporal diffusion of information on social media
JP2015191333A (en) Detection device, detection method, and detection program
Ross et al. Household visitation during the COVID-19 pandemic
Madlberger et al. Predictions based on Twitter—A critical view on the research process
Gao et al. Gender influences in Digital Humanities co-authorship networks
Castro-Gessner et al. Hidden patterns of LibGuides usage: Another facet of usability
Mangold et al. How do filtering choices impact the structures of audience networks? A simulation study using data from 26 countries
Pesare et al. Engagement in social learning: Detecting engagement in online communities of practice
Ahmed et al. A systematic literature review on challenges in service oriented software engineering
Schmidt et al. Identifying the Giants: A Social Network Analysis of the Literature on Information Technology Outsourcing Relationships.
Halse et al. Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters.
CN110493044A (en) A kind of method and system of quantifiable Situation Awareness
Haqbeen et al. Insights from a large-scale discussion on COVID-19 in collective intelligence
Oliveira et al. 25 Years of Requirements Engineering in Brazil: A Systematic Mapping.
Center Learning from student browsing data on E-learning platforms: case study
CN108376081A (en) A method of detection mobile application third party library function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant