CN111611140B - Report verification method and device for buried point data, electronic equipment and storage medium - Google Patents

Report verification method and device for buried point data, electronic equipment and storage medium Download PDF

Info

Publication number
CN111611140B
CN111611140B CN202010366130.2A CN202010366130A CN111611140B CN 111611140 B CN111611140 B CN 111611140B CN 202010366130 A CN202010366130 A CN 202010366130A CN 111611140 B CN111611140 B CN 111611140B
Authority
CN
China
Prior art keywords
point data
buried point
buried
network environment
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010366130.2A
Other languages
Chinese (zh)
Other versions
CN111611140A (en
Inventor
林佳铖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN202010366130.2A priority Critical patent/CN111611140B/en
Publication of CN111611140A publication Critical patent/CN111611140A/en
Application granted granted Critical
Publication of CN111611140B publication Critical patent/CN111611140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3457Performance evaluation by simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Geophysics And Detection Of Objects (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a report verification method, a report verification device, electronic equipment and a storage medium for buried point data, wherein the method comprises the following steps: when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is buried point data received by a server after the testing equipment reports the first buried point data in real time; forwarding the second buried data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried data to the server, and the third buried data is buried data received by the forwarding node equipment after the second buried data is forwarded; and when the fourth buried point data is received, verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data. The method and the device can check reporting conditions of the buried point data in different network environments.

Description

Report verification method and device for buried point data, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and apparatus for reporting and verifying buried point data, an electronic device, and a storage medium.
Background
At present, operation information of a user in a using process is generally obtained by setting buried points in an Application (App) or a webpage, so that a user group can be known from the angles of the user and a product, and the App and the website are improved to be closer to the user. The embedded point is a common data acquisition method of network application products, and when a user uses a website or an APP to trigger a function corresponding to the embedded point, the client side reports data related to the embedded point to the server side, so that the server side performs data statistics and analysis according to the received embedded point data.
However, due to the network environment influence or the situation that the code of the terminal application software may be missing, the server side may not receive the embedded point data or the embedded point data may not be received correctly. Therefore, the reported buried point data needs to be tested.
Disclosure of Invention
The embodiment of the application provides a reporting verification method and device for embedded point data, electronic equipment and a storage medium, and the reported embedded point data can be verified.
In a first aspect, an embodiment of the present application provides a method for reporting and verifying buried point data, where the method includes: when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is buried point data received by a server after the test equipment reports the first buried point data in real time; forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate a process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is buried point data received by the forwarding node equipment after the second buried point data is forwarded; and when fourth buried point data is received, verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In a second aspect, an embodiment of the present application provides a report verification device for buried point data, including: the environment acquisition module is used for acquiring a network environment to be tested when receiving second buried point data, wherein the second buried point data is buried point data received by the server after the test equipment reports the first buried point data in real time; the data forwarding module is used for forwarding the second buried point data to forwarding node equipment corresponding to the network environment, and the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that the test equipment in the network environment reports the buried point data to the server, wherein the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded; and the data verification module is used for verifying the fourth buried point data when the fourth buried point data is received, so as to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory; one or more processors coupled with the memory; one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to perform the reporting verification method of buried point data provided in the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer readable storage medium, where a program code is stored, where the program code may be called by a processor to perform the method for reporting and verifying buried point data provided in the first aspect.
According to the report verification method, the device, the electronic equipment and the storage medium for the embedded point data, when the server receives the second embedded point data, the second embedded point data is forwarded to forwarding node equipment corresponding to the network environment by acquiring the network environment to be tested, wherein the second embedded point data is embedded point data actually received by the server after the first embedded point data is reported by the test equipment in real time, the forwarding node equipment is used for returning third embedded point data to the server so as to simulate the process that the test equipment in the network environment reports the embedded point data to the server, the third embedded point data is embedded point data actually received by the forwarding node equipment after the second embedded point data is forwarded, and then verification can be performed on fourth embedded point data when the server receives the fourth embedded point data, so that a report verification result of the embedded point data in the network environment can be obtained, wherein the fourth embedded point data is embedded point data actually received by the server after the forwarding node equipment returns the third embedded point data. Therefore, the embedded data is forwarded to the forwarding node equipment corresponding to the network environment to be tested, and reporting verification of the embedded data in the network environment to be tested is achieved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 shows an application scenario diagram of a report verification method for buried point data provided in an embodiment of the present application.
Fig. 2 is a flow chart illustrating a method for reporting and verifying buried point data according to an embodiment of the present application.
Fig. 3 shows a schematic architecture diagram of a buried point system according to an embodiment of the present application.
Fig. 4 is a schematic flow chart of a report verification method for buried point data according to another embodiment of the present application.
Fig. 5 shows a schematic flow chart of step S230 in fig. 4.
Fig. 6 is a schematic overall flow chart of a report verification method suitable for the buried point data provided in the embodiment of the present application.
Fig. 7 is a schematic overall flow chart of another method for reporting and verifying buried point data according to an embodiment of the present application.
Fig. 8 is a flow chart illustrating a method for reporting and verifying buried point data according to another embodiment of the present application.
Fig. 9 shows a block diagram of a report verification device for buried point data according to an embodiment of the present application.
Fig. 10 shows a block diagram of an electronic device according to an embodiment of the present application.
Fig. 11 shows a storage unit for storing or carrying program codes implementing a report verification method of buried point data according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the present application, the following description will make clear and complete descriptions of the technical solutions in the embodiments of the present application with reference to the accompanying drawings in the embodiments of the present application.
With the continuous development of internet technology, various websites and APP have been developed, and users can implement various functions through these websites or APP to meet daily life or entertainment demands. When a user uses a website or an APP through interaction, a large amount of behavior data can be generated, and based on the behavior data, the user can be used as a basis for updating iteration of the website or the APP, or can develop a new product according to the behavior data of the user so as to meet the requirements of the user.
In some embodiments, user behavior data may be obtained by setting a buried point in an App or web page. After the server collects, counts and analyzes the user behavior data, the statistics data for reference can be formed finally. However, due to the influence of network environment or the condition that the code may be missing in the terminal application software, the server may not receive the embedded point data or the received embedded point data is incorrect, so that the reported embedded point data needs to be tested.
Although each internet enterprise basically has a buried point management system supporting real-time testing at present, as the business of the home is saturated gradually, a plurality of enterprises start to come out of the sea, and the main stream buried point management system lacks a method for checking buried point data in real time under multi-network environments of different countries, different operators and the like. With increasing importance of data fine operation by large internet enterprises, how to verify the accuracy of reporting internet product events is becoming one of the technical points of interest in the industry.
Therefore, the inventor researches and puts forward the report verification method, the report verification device, the report verification electronic device and the report verification storage medium for the buried point data in the embodiment of the application, can automatically verify the buried point data reported in a multi-network environment, reduces errors and missing caused by verification of only a single network environment, and effectively improves the accuracy of the buried point data of the Internet product.
The following will explain in detail specific examples.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an application scenario of a report verification method for embedded point data provided in an embodiment of the present application, where the application scenario includes an embedded point verification system 10 provided in an embodiment of the present application. The point of burial verification system 10 includes: test apparatus 100 and server 200. Wherein the test device 100 and the server 200 are located in a wireless network or a wired network, the test device 100 and the server 200 can perform data interaction. In some embodiments, the test device 100 may be multiple, the server 200 may be communicatively connected to the multiple test devices 100, and the multiple test devices 100 may also be communicatively connected to each other through the internet.
In the embodiment of the present application, the test device 100 may be a mobile phone, a smart phone, a notebook computer, a desktop computer, a tablet computer, a personal digital assistant (Personal Digital Assistant, PDA), a media player, a smart television, a wearable electronic device, or the like, and the type of the specific test device may not be limited in the embodiment of the present application. The server 200 may be a separate server, may be a server cluster, may be a local server, may be a cloud server, and may not be limited in the embodiment of the present application.
In some embodiments, a client may be installed within test equipment 100. The client may be a computer Application (APP) installed on the terminal device 100, or may be a Web client, which may refer to an Application developed based on a Web architecture. Such as microblogs, weChat, various live APP, various browsers, etc. One or more buried points are set in the client to be tested, and the buried points are used for analyzing the operation behaviors of a user on the client and/or testing the functional effects of the client. When the user uses the client, the embedded point is triggered, and the functional module corresponding to the embedded point is executed, so that embedded point data can be obtained. The test equipment may send the buried data to the server 200, and the server 200 may process and analyze the received buried data.
In some examples, the server 200 may be a server currently available to support the receiving of embedded data and real-time/offline computing services, which may store the received embedded data, and may also verify and calculate the accuracy and integrity of the embedded data in real time. In some embodiments, after the verification result of the buried point data is calculated, the result may be returned to the buried point configuration background of the tester.
Referring to fig. 2, fig. 2 shows a flow chart of a report verification method for embedded point data, which is provided in the embodiment of the present application and can be applied to the server. In a specific embodiment, the report verification method of the embedded point data may also be applied to the report verification device 600 of the embedded point data shown in fig. 9 and the electronic device 800 shown in fig. 10. The flow shown in fig. 2 will be described in detail. The report verification method of the buried point data can comprise the following steps:
step S110: and when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is buried point data received by a server after the test equipment reports the first buried point data in real time.
In this embodiment of the present application, when a buried point set in a test device is triggered, the test device may report, in real time, first buried point data generated correspondingly to a server. The first buried data is used for representing the complete buried data actually generated by the test equipment, and can be one piece of data or a plurality of pieces of data.
The buried point is a common data acquisition method, and captures, processes and transmits specific user behaviors or events. The method mainly monitors events in the running process of the software application, and judges and captures the events when the events needing to be concerned occur. The method for embedding the embedded point can be code embedded point, wherein the code embedded point is to implant some codes in a webpage or APP and other clients installed on the test equipment, and when a user triggers corresponding actions, the client acquires embedded point data through the codes and can report the acquired embedded point data to a server. The embedded point codes can be correspondingly generated according to actual test requirements.
As one way, the tester may pre-configure the background to enter event information in the buried point, where the event information may include an event interaction diagram (i.e., an interface diagram when the interaction is triggered in the client), reported field information, and definitions of the event. And then the embedded point configuration background can generate a corresponding event test page according to the recorded event information, wherein the event test page can contain information such as embedded point values, embedded point codes and the like. The event may be a click event, a page event, etc., where the click event may refer to a click behavior of a user in an application to be tested in the test device, such as clicking a tab tag, clicking a button, etc., and the page event may refer to a page browsed by the user, such as a home page, a detail page, etc., where a specific event type is not limited at this time. The embedded point value may be related information for uniquely identifying the test event, and may be uniquely identified by one identification field or may be uniquely identified by a plurality of identification fields.
Of course, the specific embedding method is not limited herein, and other embedding methods may be used, such as visual embedding, no embedding, and the like.
For example, when the tester configures related information of the embedded point event in the embedded point configuration background in advance, after generating a corresponding embedded point code, the client developer may implant the embedded point code in the client to be tested according to the service specification, so as to generate a test client, and provide the generated test client to the tester. After a tester opens a test client installed on the test equipment, service operation can be performed on service data on a page of the test client, and an operation carrier (which may be a button or another Action, such as a control, for transmitting data operation) for performing the service operation by a user is arranged on the page. According to the embedded point code, an operation carrier with embedded points can be determined, and the business operation of a user through the operation carrier can be monitored, so that the change of the business data and the information (such as operators and operation time) of the business operation can be monitored through the embedded point code.
It can be understood that, due to the network environment influence or the occurrence of problems in the embedded point code setting, the embedded point data reported by the test device may be wrong or lost, or the embedded point data that cannot be reported by the test device may not be completely received by the server, that is, may not be consistent with the first embedded point data. In the embodiment of the application, the embedded point data received by the server after the test equipment reports the first embedded point data in real time can be used as the second embedded point data. When the report verification of the buried point data is required, the server can carry out the report verification of the buried point data according to the second buried point data.
Specifically, when the server receives the second embedded point data, the server may acquire the network environment to be tested, so as to perform reporting verification of the embedded point data with respect to the network environment to be tested. In some embodiments, the network environment to be tested may be configured by the tester in advance in the embedded point configuration background, so that when the server receives the second embedded point data, the network environment to be tested configured by the tester may be obtained. The network environment to be tested may include a regional environment to be tested, and the specific size of the region is not limited herein, for example, may be countries, provinces, cities, counties, regions, and the like. Network operators to be tested, e.g. mobile, corporate, telecommunications, etc. may also be included. The specific network environment type is not limited herein, and can be set reasonably according to the test requirements.
In some embodiments, after receiving the buried point data reported by the test device in real time, the server may also store the received second buried point data into the database, so as to perform data verification or data analysis subsequently.
Step S120: and forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded.
In this embodiment of the present application, the server may forward, according to the acquired network environment to be tested, the received second buried point data to a forwarding node device corresponding to the network environment, so that the forwarding node device may simulate a process in which the test device in the network environment to be tested reports the buried point data to the server. Therefore, a plurality of buried point management systems are not required to be distributed under the multi-network environments of different countries and operators, and test equipment is not required to be truly located under the network environment to be tested, but the local buried point management systems and the local test equipment can be directly utilized to realize real-time verification of the report condition of buried point data under different network environments.
Similarly, due to the network environment influence and other conditions, the second buried point data forwarded by the server may be lost, or the server cannot forward the second buried point data, so that the forwarding node device may not actually receive the second buried point data completely, that is, may not be consistent with the second buried point data. In the embodiment of the present application, the buried point data actually received by the forwarding node device may be used as third buried point data. When the forwarding node device needs to report the buried point data, the received third buried point data can be reported to the server.
In some embodiments, the forwarding node device may be a forwarding proxy server, i.e. a server with forwarding proxy services. The tester can correspondingly deploy the forwarding proxy servers under the network environment needing to be checked, so that each forwarding proxy server can simulate the embedded point reporting of the test equipment under the network environment where the tester is located. As a way, the forwarding proxy service may be implemented by renting one server, for example, by ari cloud or amazon, or may be implemented by using an existing server, so as to reduce deployment costs, for example, by using a cloud server provided by a cloud service manufacturer that has deployed servers in a plurality of country regions. Of course, the specific type of forwarding node device is not limited herein, and it is only required that it is in the network environment to be tested and that it can receive the embedded point data and send the embedded point data to the server.
Illustratively, taking a network environment to be tested as an example, including a regional environment, in some application scenarios, an application developed by a developer in China may be provided for users in other countries to use. When the buried point reporting test is performed, if whether the buried point data can be reported normally in other country regions is required to be determined, if a user equipment is found in each country, the buried point test is triggered to be performed by using the test client application in a local network environment, so that the cost is high and the implementation is not easy. Therefore, in the embodiment of the application, in the country region needing to be tested, the server with the forwarding proxy service can be deployed to simulate that the test equipment in different network environments reports the buried point data to the server.
As one way, the tester may pre-enter the country region that needs to be tested before formally performing the buried point reporting test. When receiving the buried point data reported by the local test equipment, the server can distribute the buried point data to the servers (namely the forwarding proxy servers) in the test country regions, the servers in the test country regions can simulate real user equipment and report (return) the buried point data to the server, so that the data reporting in the environment outside the country can be simulated in China, which is equivalent to simulating that test personnel exist in other country regions, and the test equipment triggers the reporting flow of the buried point data. The method and the system realize that even the local embedded point system management can also check test equipment in different network environments in real time, and whether reported embedded point data is accurate and complete.
Step S130: and when fourth buried point data is received, verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In this embodiment of the present application, when the forwarding node device receives the third buried point data, the forwarding node device may report (return) the third buried point data to the server, so that the server may receive the buried point data reported by the forwarding node device. Similarly, due to the network environment, the server may not actually receive the third embedded point data, which is not the complete third embedded point data, that is, may not be consistent with the third embedded point data. Therefore, in the embodiment of the present application, after the forwarding node device reports the third buried point data to the server, the buried point data actually received by the server may be used as the fourth buried point data. When the server receives the fourth embedded point data, the received fourth embedded point data can be verified, and a reporting verification result of the embedded point data in the network environment to be tested is obtained.
In some embodiments, the verification of the fourth buried data may be performed to verify the accuracy of the buried data, so as to determine whether an event triggered by the tester on the test client interface is consistent with the reported buried data, and whether there is a false alarm. In other embodiments, the fourth buried point data may be verified, or the delay of reporting the buried point data may be verified, so as to determine the delay condition of reporting the buried point data in different network environments. The specific verification type is not limited herein, and the verification can be performed according to the test requirement. For example, the fourth buried point data may be verified for loss.
In some embodiments, the execution body server of the present application may be specifically subdivided into sub-servers having different functions. As one mode, the system may be divided into a distribution server and a receiving and computing server, where the distribution server (a server with a distribution service) may be configured to distribute, according to pre-entered network environment information to be tested, embedded point data reported by a test device to a forwarding proxy server corresponding to each network environment. As an implementation manner, the test device may report the reported first embedded point data to the distribution server, and the distribution server obtains the network environment to be tested, and distributes the actually received second embedded point data to the forwarding proxy server corresponding to the network environment to be tested.
In some embodiments, when the application scenario is a client test (e.g., a test stage before gray level release) performed by a tester, the tester clicks interactive content corresponding to a test event on an interface of the test client, and then the test client reports triggered embedded point data to the distribution server. When the application scene is in a gray level release stage, namely, a client test is executed by an online real user, at the moment, the user equipment is provided with a client embedded with a buried point code, the user can click interactive content corresponding to a buried point event on an interface of the client, and then the client reports triggered buried point data to a distribution server.
The receiving and calculating server (a server with receiving and calculating service) can be used for receiving the buried point data returned by each forwarding proxy server, and can check and calculate the accuracy and the integrity of the buried point data in real time, and can also return the reporting and verifying result to the buried point configuration background and store the reported buried point test/verification data. As a way, if there is a server for receiving buried data and for real-time/offline computing service, the existing receiving and computing server can be directly used, so as to ensure the consistency of the test data and the data of the online real user equipment. In some embodiments, the receiving and computing servers may be further divided into a receiving server and a computing server, where after the receiving server receives the buried data returned by the forwarding proxy server, the buried data may be pushed to the computing server in real time, and the computing server verifies the buried data.
Referring to fig. 3, an architecture diagram of a buried point system is shown in fig. 3. The embedded point system 11 includes a test client 101, a receiving and computing server 201, a distributing server 202, an embedded point configuration background 200, and one or more forwarding proxy servers (1, 2, 3, … …). The test client 101 is installed in the test equipment, and the tester can use the trigger embedded point. And the database in the receiving and calculating server is used for storing the reported buried point data.
In some embodiments, the number of network environments to be tested may be multiple, and the server may verify the reporting of the embedded point data of the multiple network environments to be tested by using the verification method, so as to reduce errors and missing caused by verification of only a single network environment, and effectively improve accuracy and integrity of embedded point data of internet products.
According to the report verification method for the embedded point data, when the server receives the second embedded point data, the second embedded point data is transmitted to the transmitting node equipment corresponding to the network environment by acquiring the network environment to be tested, wherein the second embedded point data is embedded point data actually received by the server after the first embedded point data is reported in real time by the testing equipment, the transmitting node equipment is used for returning third embedded point data to the server so as to simulate the process that the embedded point data is reported to the server by the testing equipment in the network environment, the third embedded point data is embedded point data actually received by the transmitting node equipment after the second embedded point data is transmitted, then when the server receives fourth embedded point data, verification can be carried out on the fourth embedded point data, and accordingly a report verification result of the embedded point data in the network environment can be obtained, wherein the fourth embedded point data is embedded point data actually received by the server after the transmitting node equipment returns the third embedded point data. Therefore, the embedded point data is forwarded to the forwarding node equipment corresponding to the network environment to be tested, and real-time verification of the embedded point data reporting under the network environment to be tested is achieved. When the report condition of the buried point data in the target network environment needs to be tested, the buried point data reported by the test equipment in the current network environment can be forwarded to the forwarding node equipment corresponding to the target network environment, so that the forwarding node equipment simulates the report process of the buried point data in the target network environment, and the test equipment is not required to be actually in the target network environment, thus, the test equipment can be managed by the local buried point system immediately, and the test equipment in different network environments can be verified in real time.
Referring to fig. 4, fig. 4 shows a flow chart of a report verification method for embedded point data according to another embodiment of the present application, which may be applied to the server, and the report verification method for embedded point data may include:
step S210: and when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is buried point data received by a server after the test equipment reports the first buried point data in real time.
In some embodiments, before performing the report verification of the embedded point, the test device needs to connect to the server, so that the server can receive the data of the embedded point reported by the test device. Therefore, before step S210, the report verification method of the buried point data may further include: detecting whether the test equipment is successfully connected with the server; and when the test equipment is successfully connected with the server, waiting to receive first buried point data reported by the test equipment.
As one implementation, the test device may be connected to the server by scanning the code. As a way, after a tester selects an event to be tested on a management interface of the embedded point configuration background, the background enters an event test page, after the tester selects a country, an operator and other network environments to be tested, the embedded point configuration background can generate a two-dimensional code, after the tester uses a test client on test equipment to scan the two-dimensional code, the test client can establish connection with a server by requesting a network address (such as url (Uniform Resource Locator, uniform resource locator address)) contained in the two-dimensional code. After a connection is successfully established, the test client can upload the buried point data to the server. Meanwhile, the event test page enters a test state.
In some embodiments, when the test device successfully connects to the server, the server may return a connection result to the test device to indicate that the connection was successful. At this time, the server may be in a waiting state to wait for receiving the first buried point data reported by the test device.
In some embodiments, since testing multiple embedded point events on the same event testing page may cause verification confusion, it may be that testing one embedded point event corresponds to one event testing page. If multiple buried point events need to be tested at the same time, each buried point event can be tested through multiple testing devices. As one way, each piece of the reported embedded point data may include a client identifier (device ID (Identity document, identifier)) of the test device, so that the server may classify the acquired embedded point data of the plurality of test devices according to the client identifier, so as to accurately verify the embedded point event tested by each test device. In some embodiments, each piece of reported embedded point data may also include a unique identifier (report ID), a network configuration, an event ID, etc., so that reporting situations of different events and different networks can be analyzed later. As one way, the unique identification may be generated by using a device id+client unix timestamp after MD5 (message-digest algorithm) or base64 (representing binary data based on 64 printable characters) processing.
Step S220: and forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded.
In some embodiments, when the network environment to be detected is plural, the server may also distribute the received second buried data to plural forwarding node devices corresponding to the plural network environments. After the second buried data is successfully forwarded, each forwarding node device can return the third buried data actually received to the server so as to simulate the process that the test device in each network environment reports the buried data to the server.
In some embodiments, if only the report condition of the buried point data in the local network environment is tested, the report condition may be forwarded to the forwarding node device differently. Therefore, before forwarding the second embedded data to the forwarding node device corresponding to the network environment, it may be determined whether the network environment to be tested is consistent with the network environment where the testing device is currently located. When the network environment to be tested is inconsistent with the network environment where the test device is currently located, step S220 may be executed.
It can be understood that when the network environment to be tested is inconsistent with the network environment where the testing device is currently located, the reporting condition under the non-local network environment can be considered to be tested currently, so that the embedded point data can be distributed to the forwarding node device corresponding to the network environment to be tested, and the embedded point reporting verification of the non-local network environment can be realized. When the network environment to be tested is consistent with the network environment where the test equipment is currently located, the report condition under the local network environment can be considered to be tested currently, and the report condition can be not forwarded to the forwarding node equipment.
In some embodiments, when the network environment to be tested is consistent with the network environment where the test device is currently located, the second embedded point data can be directly verified, so as to obtain a reporting verification result of the embedded point data in the current network environment.
In some embodiments, when there are multiple network environments to be tested and the network environment where the testing device is currently located is included, the second embedded point data may be forwarded only to the forwarding node device corresponding to the non-local network environment, and after the forwarding node device returns the embedded point data, the server may perform reporting verification of different network environments according to the received fourth embedded point data and the second embedded point data that is not forwarded. And verifying the fourth buried point data to obtain the buried point reporting condition of the non-local network environment, and verifying the second buried point data to obtain the buried point reporting condition of the local network environment.
Step S230: and when fourth buried point data is received, verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data.
In some embodiments, verifying the fourth buried data may be verifying the accuracy of the buried data. Specifically, referring to fig. 5, step S230 may include:
step S231: and comparing the fourth buried point data with the standard buried point data.
Step S232: and determining the correctness result of the buried point data reported in the network environment according to the comparison result.
In some embodiments, the standard buried point data may be a buried point value generated in the background of the buried point configuration. Because the reported buried point value used for uniquely identifying the triggering event can be included in the buried point data reported by the test equipment, whether the reported buried point data is correct or not can be judged by comparing the reported buried point value in the fourth buried point data with the buried point value in the standard buried point data. If the comparison is inconsistent, the reported buried point data is inaccurate, the buried point code can be considered to have a problem, the corresponding buried point code on the test client can be checked later, and after the check is successful, the buried point verification can be performed again. If the comparison is consistent, the reported embedded point data is accurate, the embedded point code can be considered to be free of problems, and the test client can be formally released on line later.
For example, when a tester enters button a event information and button B event information of a test client into a buried point background, the buried point background generates two buried point codes, wherein the existence of one field value (buried point value) distinguishes whether the button is button a or button B. When a tester clicks the button A or the button B in the application of the test client, the test client reports a piece of embedded point data to the server, and the embedded point value in the reported embedded point data can indicate whether the user points the button A or the button B. And comparing whether the embedded point value in the reported embedded point data is consistent with the embedded point value in the embedded point code generated by the embedded point background or not by the server, and if the user clicks the button A and the reported button B, indicating that the embedded point has a problem.
In some embodiments, when the buried data is forwarded to a plurality of forwarding node devices corresponding to a plurality of network environments, each forwarding node device returns the received buried data to the server, so that the server may receive fourth buried data corresponding to each forwarding node device. The server can compare the fourth buried point data corresponding to each forwarding node device in the plurality of forwarding node devices with the standard buried point data respectively, and determine the reporting and verifying result of the buried point data under the network environment corresponding to each forwarding node device according to the comparison result corresponding to each forwarding node device.
In some embodiments, the server may verify the fourth buried data for a preset duration every other specified duration. The specified duration may refer to a refresh duration of the verification result of the buried point data, for example, 30 seconds, that is, the received buried point data is verified every 30 seconds, so that the verification result is refreshed every 30 seconds. The preset duration may be the longest duration of reporting verification by the buried point, that is, beyond the preset duration, the server may end verification of the buried point data. For example, the fourth embedded data reported within 10 minutes is parsed and verified, and after more than 10 minutes the server may receive the verification. The designated duration may be less than a preset duration, so as to continuously refresh the verification result of the buried point data within the preset duration. As in the example above, the verification results are refreshed every 30 seconds within 10 minutes.
It should be noted that specific numerical values of the specified duration and the preset duration are not limited herein, and the specific numerical values are reasonably configured according to the test requirements. For example, a tester can configure a designated time length and a preset time length in a buried point configuration background, if the designated time length is configured to be 30 seconds, the preset time length is configured to be 10 minutes, when an event test page is in a test state, the buried point configuration background can automatically request a server to perform buried point data verification once every 30 seconds, analyze reported data within 10 minutes, and compare whether the reported buried point value is consistent with a buried point value generated by the background.
In some embodiments, if the event test page of the embedded point configuration background is not closed and is always in the test state, the test state can be automatically exited after a preset period of time. As one way, the embedded point configuration background may automatically pop up the interface to prompt the end of verification after a preset period of time. If the test is needed to be verified again, the event to be tested needs to be reselected and enters the event test page, and the network environment to be tested is reselected.
In some embodiments, when obtaining the report verification result of the buried point data in the network environment, the server may send the report verification result to the client, so that the client displays a preset interface according to the report verification result. The client may be a client corresponding to the embedded point configuration background, and the preset interface may be an interface for prompting a comparison result, or may be an interface for prompting that the comparison is successful.
As a way, when the working verification result shows that the reported buried point data is correct, the buried point configuration background can display a corresponding event interaction interface. The event interaction interface is a pre-recorded client interaction interface schematic diagram matched with the test time, and a tester can compare the pre-recorded client interaction interface schematic diagram with an interaction interface actually operated on the test client through the displayed event interaction interface to further determine whether the triggered event is correct. In some embodiments, the embedded point configuration background may also display network environment information, so that a tester may learn about reporting conditions of embedded points in each network environment.
For example, if the pre-entered event interaction interface is a mobile phone login interface, and the mobile phone login interface can mark a tested embedded event, such as a "mobile phone number one-key login" button (e.g. the button is framed by a frame with a striking color), a tester can configure the pre-entered mobile phone login interface popped up in the background through the embedded point, and determine whether the event actually clicked by the tester on the mobile phone login interface of the test client is the "mobile phone number one-key login" button. If so, the buried point is indicated to be correct. In addition, the embedded point configuration background may pop up a successfully verified embedded point data list, where the list includes network environment information such as country, region, operator, and the like, and other information such as receiving time, ID of the test device, and the like, which is not limited herein.
Step S240: and when the fourth buried point data is not received, detecting whether the network state of the forwarding node equipment is normal.
In some embodiments, when the server does not receive the buried data returned by the forwarding node device, it may be considered that there is a fault in the connection with the forwarding node device, and the server may determine whether the connection between the server and the forwarding node device is normal by detecting the network state of the forwarding node device. The network status of the forwarding node device may be detected in a variety of ways, for example, the network connection of the server to the forwarding node device may be tested by way of PING (Packet Internet Groper, internet packet explorer) forwarding node device, which is not specifically limited.
Step S250: and when the network state of the forwarding node equipment is abnormal, forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment, and reporting the buried point data to the server.
In some embodiments, when detecting that the network state of the forwarding node device is abnormal, the embedded point verification may also be performed again through the backup node device corresponding to the forwarding node device. Specifically, the server may forward the second buried data to a backup node device corresponding to the forwarding node device, where the backup node device is used to replace the forwarding node device to simulate a test device under a network environment to be tested, and report the buried data to the server.
In some embodiments, a tester may deploy a plurality of forwarding node devices in some network environments, so that when a network of one forwarding node device is abnormal, a subsequent buried point verification may be performed by another forwarding node device, thereby ensuring that the verification process is not interrupted. In some embodiments, there may be some network environments where only one forwarding node device may be deployed, or when the buried point verification result of the network environment is not important, the server may end the buried point verification, or wait for a period of time and then perform the buried point verification again.
In some embodiments, when the network environment to be monitored is multiple, if there is consistent buried point data in the fourth buried point data received by the server, the server may return the consistent buried point data to the buried point configuration background, and at this time, the buried point configuration background may display relevant information of the buried point data. If the server verifies only the embedded data of a part of the network environments, but the embedded data of other network environments may not be received by the server due to various reasons, the verification result returned to the embedded management background is only the data of a part of the network environments. The tester can also determine whether to re-verify the missing network environment according to the verification result of the missing network environment. When the tester determines to re-check, it may be checked whether it is a network problem of the forwarding node device. When detecting network abnormality of the forwarding node device, the switchable backup node device performs re-authentication.
In a specific embodiment, referring to fig. 6, fig. 6 is a schematic diagram illustrating an overall flow of reporting verification of buried point data. Specifically, after the tester inputs event information in the embedded point configuration background, the embedded point configuration background can generate corresponding event ID and embedded point code according to the input information. The embedded point code may then be embedded in the test client and provided to the tester for use. The tester can select an event to be tested in the embedded point configuration background, select a network environment to be tested, and then correspondingly generate the two-dimensional code in the embedded point configuration background. After the test client scans the two-dimensional code, a tester can judge whether the embedded point configuration background is in a verification state or not, and when the code scanning is successfully accessed to the server, the tester can consider that the embedded point configuration background is in the verification state. When the code scanning is not successfully accessed to the server, whether the network connection between the test client and the server is normal or not can be checked, if the network connection is normal, the description is possibly that the embedded point configuration is wrong, and the embedded point code of the test client can be checked. And then regenerating the two-dimensional code, and accessing the code scanning into the server until the embedded point background enters a verification state.
In some embodiments, the embedded point configuration background may determine whether to pop up the pre-recorded event interaction graph and the reported embedded point data content within a set time (the preset duration), if so, it indicates that the embedded point data is accurately reported, if not, it indicates that the embedded point configuration is possibly wrong, it may check the embedded point code of the test client, and then check again.
Further, when the network environment to be detected is a plurality of, the tester can determine whether all the embedded point data in the network environment accord with the set value according to the embedded point data information displayed by the embedded point configuration background. The method can judge whether the number of the network environments to be tested is consistent with the number of the network environments actually receiving the verification result, and if not, the method indicates that the report of the buried points of part of the network environments has a problem. The tester can determine whether to re-verify the missing network environment according to the verification result of the missing network environment. When the tester determines to re-check, it may be checked whether it is a network problem of the forwarding node device. When detecting network abnormality of the forwarding node device, the switchable backup node device performs re-authentication.
According to the report verification method for the embedded point data, when the server receives the second embedded point data, the second embedded point data is transmitted to the transmitting node equipment corresponding to the network environment by acquiring the network environment to be tested, wherein the second embedded point data is embedded point data actually received by the server after the first embedded point data is reported in real time by the testing equipment, the transmitting node equipment is used for returning third embedded point data to the server so as to simulate the process that the embedded point data is reported to the server by the testing equipment in the network environment, the third embedded point data is embedded point data actually received by the transmitting node equipment after the second embedded point data is transmitted, then when the server receives fourth embedded point data, verification can be carried out on the fourth embedded point data, and accordingly a report verification result of the embedded point data in the network environment can be obtained, wherein the fourth embedded point data is embedded point data actually received by the server after the transmitting node equipment returns the third embedded point data. And when the network state of the forwarding node equipment is abnormal, forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in a network environment, and reporting the buried point data to a server. Therefore, the embedded point data is forwarded to the forwarding node equipment corresponding to the network environment to be tested, and when the network of the forwarding node equipment is abnormal, the embedded point data can be forwarded to the backup node equipment corresponding to the forwarding node equipment, so that real-time verification of the embedded point data report under the network environment to be tested is realized. Thus, the test equipment under different network environments can be checked in real time even if the test equipment is managed by the local embedded point system.
In some embodiments, the buried data test verification may also be performed by an online real user. Specifically, the embedded point data reported by the real users on the line are extracted and forwarded to the forwarding node equipment corresponding to the network environment to be tested, and then the forwarding node equipment returns the embedded point data, so that the server can verify the correctness of the embedded point data reported by the real users on the line, and can also verify the loss rate of the embedded point data reporting.
In some embodiments, the loss rate of the buried point data can be verified by a double reporting mode. Specifically, after the test equipment reports the embedded point data in real time, the test equipment reports the embedded point data once in a delayed manner, so that the server can determine the reporting loss condition of the embedded point data according to the embedded point data reported and reported in real time by the same or the same batch of test equipment, the integrity of the embedded point data of the Internet product can be effectively improved, and the accuracy of the subsequent user behavior analysis is ensured.
The process of dual reporting verification is exemplarily described as follows:
reporting in real time: and if the date of the day is t, reporting all the behaviors triggered by the user in real time according to normal logic, and storing the total amount.
And (3) delay reporting: after the client application is started for the first time every day, all the generated buried data of the previous day are packed, compressed and reported according to the time stamp of the triggering action of the user, and the whole amount of the buried data is stored. That is, the report of t+1 is the total buried point data of t days.
And then the server automatically matches and verifies all delay data received from the previous day with corresponding real-time data every day. And comparing and checking the buried point data reported by the time delay of t+1 day with the buried point data reported by the time delay of t day in t+2 days, and counting the difference of the buried point data to obtain the loss condition of the data.
As a way, the server may store the reported buried point data with a day as a file, and store the data file reported in real time separately from the data file reported in a delayed manner. When the test client side reports buried point data of t days in t+1 days, the total number of data reported in the time delay can be counted and reported independently. The server can acquire all embedded point detail data reported in the time delay of t+1 day at t+2 days, and can store the embedded point detail data into a database, then the server can count the number of data of each test client according to the actually acquired embedded point detail data reported in the time delay of t+1 day, and then the test client with the statistical value of the number equal to the total number of the data reported by the test client is used as a subsequent verification object. The server can then fetch all the embedded point clear data with the above verification object device ID from the real-time report data of t days (denoted as a 1) and the delay report data of t+1 days (denoted as a 2). As a way, the server can count the ratio of the total number of data of a1 and a2 and the ratio of the number of data of a1 and a2 in different network configurations, event IDs and other judgment dimensions respectively, so that the loss rate of each event in different network environments can be obtained, and the statistical result can be displayed in the background of the embedded point configuration.
That is, the test device was at t days: reporting data in real time; the test equipment then tests for day t+1: reporting all detail data of t days once in a delay way, and reporting the total number of the data; the server was on day t+2: firstly judging whether the number of the detail data of the t day, which is actually received by the server and reported by the time delay of the t+1 day, is consistent with the total number of the detail data of the t day, which is reported by the time delay of the t+1 day, if not, indicating that the data is lost in the time delay report; if the numbers are consistent, comparing the number of the bright and thin stripes of the t days reported in the time delay of the t+1 days with the number of the bright and thin stripes reported in the real time of the t days, and obtaining the loss rate reported in the real time.
In some embodiments, the accuracy of reporting the buried point may be verified by using a buried point data verification method in the multi-network environment of the present application in a test stage before the gray level stage, and the gray level stage may be performed after passing through, and the integrity (i.e. the loss condition) of reporting the buried point data may be verified by using the above dual report verification method. The gray level stage may refer to that gray level release may be performed in a small range before a new function of a product is released, that is, a part of users start to use the new function of the product. The extracted user equipment is the user equipment corresponding to the gray-scale formal client.
In some practical application scenarios, before performing the verification of the buried data, related personnel may perform early deployment, which may include: the embedded point configuration background (embedded point background), the test client, the formal client, the distribution server, the forwarding proxy server and the receiving and calculating server. Wherein:
buried point configuration background (buried point background): the contents such as event ID, buried point code, two-dimensional code and the like can be automatically generated according to the input information; and the tester selects an event needing to trigger the verification and can display buried point data and statistical results reported by the client after the client finishes the verification. If a buried point management background exists at present, the buried point management background can be used as a component of the existing background to supplement the missing function based on the existing background. In some embodiments, the tester may pre-enter a threshold (e.g., 95% to verify the rationality of the buried point data), and if the ratio of the buried point data is below the threshold, the statistics may be set to a different color to alert the relevant personnel. For example, if the ratio of the total number of devices receiving buried point data to the test devices (i.e., the login rate) is too low, it is indicated that there are too few login users, and there is a problem that attention is required.
And (3) testing the client: user devices have been installed that require test/verification applications. The application program is embedded with the embedded point codes and has the functions of scanning the two-dimensional codes and triggering embedded point interaction and then reporting embedded point data to the distribution server.
Formal client: after the user triggers the embedded point interaction, the embedded point data is sent to the receiving server through the current network of the user. Whether delay reporting is needed or not can be judged by a mode of receiving a notification sent by the server.
Distribution server: and distributing the received client embedded point data to each network forwarding proxy server according to the pre-input information. And a notification of whether to open the delay report can be issued to the formal client.
Forwarding proxy server: and deploying servers in areas needing verification, and simulating clients in different network environments to send the embedded point data to a receiving server. The cloud server provided by the cloud service manufacturer can be used, so that the deployment cost is reduced.
The receiving and computing server: and receiving the buried point data returned by each forwarding proxy server, checking and calculating the accuracy and the integrity of the buried point data in real time, returning the result to the buried point configuration background, and storing the reported buried point test/check data. If the existing buried data receiving and real-time/off-line computing server is available, the existing receiving and computing server can be directly used to ensure the consistency of the test data and the on-line data.
In a specific embodiment, referring to fig. 7, fig. 7 is a schematic diagram illustrating an overall flow chart of reporting verification of another embedded point data according to an embodiment of the present application. After the tester inputs event information in the embedded point configuration background, the embedded point configuration background can generate corresponding event ID and embedded point code according to the input information. Embedded point code may then be embedded in the client version and provided for use by an online real user. The tester can select events to be tested in the embedded point configuration background, and select a time range and a client version to be tested. At this time, after the test device receives a preset instruction (delay report notification) issued by the server, the test device may trigger double report verification. I.e. reporting in real time on the T day, reporting in time delay on the T+1 day, calculating and comparing on the T+2 day, and configuring a background display result on the buried point. And when the display result does not accord with the set value, the code of the client can be detected, and the buried point test can be restarted. When the display result accords with the set value, the verification can be ended.
In another specific embodiment, referring to fig. 8, fig. 8 is a schematic overall flow chart of reporting verification of buried point data according to another embodiment of the present application. Before the dual reporting embedded point test, a tester can manually trigger the embedded point to test the test version of the client in a single-point multi-network environment. Specifically, client developers can embed embedded point codes in test client versions according to business specifications. And then, a tester selects an event to be tested in the embedded point configuration background, and generates a two-dimensional code in the embedded point configuration background after selecting network environments such as countries, operators and the like to be tested. The tester scans the two-dimensional code at the client embedded with the embedded point code, and the client automatically accesses the reported embedded point data stream to the server. When the server is not successfully accessed, the embedded point code of the version of the test client and whether the network state is normal can be checked. And then the code scanning access server is carried out again. When the test personnel pass the test of the test version of the client, the test version of the client can be subjected to gray release, and partial online real users can be extracted to perform double reporting verification.
Referring to fig. 9, fig. 9 shows a block diagram of a report verification device 600 for embedded point data according to an embodiment of the present application, where the report verification device 600 for embedded point data is applied to a server. The report verification device 600 for buried point data may include: an environment acquisition module 610, a data forwarding module 620, and a data verification module 630. The environment obtaining module 610 is configured to obtain, when receiving second embedded point data, a network environment to be tested, where the second embedded point data is embedded point data received by the server after the test device reports the first embedded point data in real time; the data forwarding module 620 is configured to forward the second embedded data to a forwarding node device corresponding to the network environment, where the forwarding node device is configured to return third embedded data to a server, so as to simulate a process that the embedded data is reported to the server by a test device in the network environment, where the third embedded data is embedded data received by the forwarding node device after the second embedded data is forwarded; the data verification module 630 is configured to, when receiving fourth buried point data, verify the fourth buried point data to obtain a report verification result of the buried point data in the network environment, where the fourth buried point data is the buried point data received by the server after the forwarding node device returns the third buried point data.
In some embodiments, the reporting verification apparatus 600 may further include: a network detection module and a backup forwarding module. The network detection module is used for detecting whether the network state of the forwarding node equipment is normal or not when the fourth buried point data is not received; and the backup forwarding module is used for forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment when the network state of the forwarding node equipment is abnormal, and the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment and reporting the buried point data to the server.
In some embodiments, the data verification module 630 may be specifically configured to: comparing the fourth buried point data with the standard buried point data; and determining the correctness result of the buried point data reported in the network environment according to the comparison result.
In some embodiments, the data verification module 630 may also be specifically configured to: and verifying the fourth buried data of the preset duration every other preset duration, wherein the preset duration is smaller than the preset duration.
In some embodiments, the network environment is plural, and the data forwarding module 620 may be specifically configured to: and distributing the second buried data to a plurality of forwarding node devices corresponding to the plurality of network environments. In this embodiment, the data verification module 630 may be specifically configured to: respectively comparing the fourth buried point data corresponding to each forwarding node device in the plurality of forwarding node devices with standard buried point data; and determining reporting and verifying results of the buried point data under the network environment corresponding to each forwarding node device according to the corresponding comparison results of each forwarding node device.
In some embodiments, the report verification device 600 of the buried point data may further include: and the connection detection module and the data waiting module. The connection detection module is used for detecting whether the test equipment is successfully connected with the server or not; and the data waiting module is used for waiting to receive the first buried point data reported by the test equipment when the test equipment is successfully connected with the server.
In some embodiments, the report verification device 600 of the buried point data may further include: the device comprises a network judging module and a first executing module. The network judging module is used for judging whether the network environment to be tested is consistent with the network environment where the test equipment is currently located; and the first execution module is used for executing the step of forwarding the second embedded data to forwarding node equipment corresponding to the network environment when the network environment to be tested is inconsistent with the network environment where the test equipment is currently located.
In some embodiments, the report verification device 600 of the buried point data may further include: and the second execution module is used for executing the step of forwarding the second embedded data to forwarding node equipment corresponding to the network environment when the network environment to be tested is inconsistent with the network environment where the test equipment is currently located.
In some embodiments, the report verification device 600 of the buried point data may further include: the result sending module is used for sending the reporting verification result to a client, and the client is used for displaying a preset interface according to the reporting verification result.
The report verification device for embedded point data provided in the embodiment of the present application is used to implement the report verification method for the corresponding embedded point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which is not described herein again.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the apparatus and modules described above may refer to the corresponding process in the foregoing method embodiment, which is not repeated herein.
In the several embodiments provided herein, the illustrated or discussed coupling or direct coupling or communication connection of the modules to each other may be through some interfaces, indirect coupling or communication connection of devices or modules, electrical, mechanical, or other forms.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or two or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in software functional modules.
Referring to fig. 10, fig. 10 is a block diagram illustrating a structure of an electronic device according to an embodiment of the present application. The electronic device 800 may be the server described above. The electronic device 800 in the present application may include one or more of the following components: processor 810, memory 820, and one or more applications, wherein the one or more applications may be stored in memory 820 and configured to be executed by the one or more processors 810, the one or more applications configured to perform the methods described in the method embodiments of application to a server described above, and also configured to perform the methods described in the method embodiments of application to a test device described above.
Processor 810 may include one or more processing cores. The processor 810 utilizes various interfaces and lines to connect various portions of the overall electronic device 800, perform various functions of the electronic device 800, and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 820, and invoking data stored in the memory 820. Alternatively, the processor 810 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 810 may integrate one or a combination of several of a central processing unit (Central Processing Unit, CPU), a report validator of buried point data (Graphics Processing Unit, GPU), and a modem, etc. The CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for being responsible for rendering and drawing of display content; the modem is used to handle wireless communications. It will be appreciated that the modem may not be integrated into the processor 810 and may be implemented solely by a single communication chip.
The Memory 820 may include a random access Memory (Random Access Memory, RAM) or a Read-Only Memory (Read-Only Memory). Memory 820 may be used to store instructions, programs, code, sets of codes, or sets of instructions. The memory 820 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described below, etc. The storage data area may also store data created by the electronic device 800 in use, and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 10 is merely a block diagram of a portion of the structure associated with the present application and is not limiting of the electronic device to which the present application is applied, and that a particular electronic device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In summary, the electronic device provided in the embodiment of the present application is configured to implement the reporting and verifying method of the corresponding buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which is not described herein again.
Referring to fig. 11, a block diagram of a computer readable storage medium according to an embodiment of the present application is shown. The computer readable storage medium 900 has stored therein program code that can be invoked by a processor to perform the methods described in the method embodiments described above for a client application, or can be invoked by a processor to perform the methods described in the method embodiments described above for a server application.
The computer readable storage medium 900 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Optionally, the computer readable storage medium 900 comprises a non-transitory computer readable medium (non-transitory computer-readable storage medium). The computer readable storage medium 900 has storage space for program code 910 that performs any of the method steps described above. The program code can be read from or written to one or more computer program products. Program code 910 may be compressed, for example, in a suitable form.
In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, one of ordinary skill in the art will appreciate that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not drive the essence of the corresponding technical solutions to depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A reporting and verifying method for buried point data, the method comprising:
when second buried point data is received, acquiring a network environment to be tested, wherein the second buried point data is buried point data received by a server after the test equipment reports the first buried point data in real time;
forwarding the second buried point data to forwarding node equipment corresponding to the network environment, wherein the forwarding node equipment is used for returning third buried point data to a server so as to simulate a process that test equipment in the network environment reports the buried point data to the server, and the third buried point data is buried point data received by the forwarding node equipment after the second buried point data is forwarded;
When fourth buried point data is received, verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is buried point data received by a server after the forwarding node equipment returns the third buried point data;
when the fourth buried point data is not received, detecting whether the network state of the forwarding node equipment is normal; when the network state of the forwarding node equipment is abnormal, forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment, and reporting the buried point data to the server;
the verifying the fourth buried point data to obtain a reporting verification result of the buried point data in the network environment includes: comparing the fourth buried point data with the standard buried point data; and determining the correctness result of the buried point data reported in the network environment according to the comparison result.
2. The method of claim 1, wherein verifying the fourth buried data comprises:
And verifying the fourth buried data of the preset duration every other preset duration, wherein the preset duration is smaller than the preset duration.
3. The method of claim 1, wherein the network environment is a plurality of, the forwarding the second buried data to a forwarding node device corresponding to the network environment, comprising:
distributing the second buried data to a plurality of forwarding node devices corresponding to a plurality of network environments;
the verifying the fourth buried point data to obtain a report verification result of the buried point data in the network environment comprises the following steps:
respectively comparing the fourth buried point data corresponding to each forwarding node device in the plurality of forwarding node devices with standard buried point data;
and determining reporting and verifying results of the buried point data under the network environment corresponding to each forwarding node device according to the corresponding comparison results of each forwarding node device.
4. The method of claim 1, wherein prior to the acquiring the network environment to be tested when the second buried point data is received, the method further comprises:
detecting whether the test equipment is successfully connected with the server;
And when the test equipment is successfully connected with the server, waiting to receive first buried point data reported by the test equipment.
5. The method according to any of claims 1-4, wherein prior to said forwarding said second buried data to a forwarding node device corresponding to said network environment, said method further comprises:
judging whether the network environment to be tested is consistent with the network environment where the test equipment is currently located;
and when the network environment to be tested is inconsistent with the network environment where the test equipment is currently located, executing the step of forwarding the second embedded data to forwarding node equipment corresponding to the network environment.
6. The method of claim 5, wherein after said determining whether the network environment to be tested is consistent with the network environment in which the test device is currently located, the method further comprises:
and when the network environment to be tested is consistent with the network environment where the test equipment is currently located, directly verifying the second embedded point data to obtain a reporting verification result of the embedded point data in the network environment.
7. The method of claim 1, wherein after the obtaining the report verification result of the buried point data in the network environment, the method further comprises:
And sending the report verification result to a client, wherein the client is used for displaying a preset interface according to the report verification result.
8. A report verification device for buried point data, the device comprising:
the environment acquisition module is used for acquiring a network environment to be tested when receiving second buried point data, wherein the second buried point data is buried point data received by the server after the test equipment reports the first buried point data in real time;
the data forwarding module is used for forwarding the second buried point data to forwarding node equipment corresponding to the network environment, and the forwarding node equipment is used for returning third buried point data to a server so as to simulate the process that the test equipment in the network environment reports the buried point data to the server, wherein the third buried point data is the buried point data received by the forwarding node equipment after the second buried point data is forwarded;
the data verification module is used for verifying the fourth buried point data when the fourth buried point data is received, so as to obtain a reporting verification result of the buried point data in the network environment, wherein the fourth buried point data is the buried point data received by the server after the forwarding node equipment returns the third buried point data;
The network detection module is used for detecting whether the network state of the forwarding node equipment is normal or not when the fourth buried point data is not received; when the network state of the forwarding node equipment is abnormal, forwarding the second buried point data to backup node equipment corresponding to the forwarding node equipment, wherein the backup node equipment is used for replacing the forwarding node equipment to simulate test equipment in the network environment, and reporting the buried point data to the server;
the data verification module is further used for comparing the fourth buried point data with the standard buried point data; and determining the correctness result of the buried point data reported in the network environment according to the comparison result.
9. A server, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to perform the method of any of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a program code, which is callable by a processor for executing the method according to any one of claims 1-7.
CN202010366130.2A 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium Active CN111611140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010366130.2A CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010366130.2A CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111611140A CN111611140A (en) 2020-09-01
CN111611140B true CN111611140B (en) 2023-05-16

Family

ID=72205488

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010366130.2A Active CN111611140B (en) 2020-04-30 2020-04-30 Report verification method and device for buried point data, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111611140B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114490279A (en) * 2020-11-11 2022-05-13 广州市有车以后信息科技有限公司 Link strategy and architecture design method for improving reliability of buried point data link
CN112328504A (en) * 2020-12-03 2021-02-05 广州品唯软件有限公司 Buried point data inspection method, buried point data inspection device, buried point data inspection system, computer equipment and storage medium
CN112650659B (en) * 2020-12-22 2023-02-07 平安普惠企业管理有限公司 Buried point setting method and device, computer equipment and storage medium
CN113300912B (en) * 2021-05-21 2022-07-26 湖南快乐阳光互动娱乐传媒有限公司 Equipment testing method and device and electronic equipment
CN113642047B (en) * 2021-08-13 2024-10-11 上海哔哩哔哩科技有限公司 Buried point data verification method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297450A (en) * 2012-02-23 2013-09-11 百度在线网络技术(北京)有限公司 Distributed cluster simulation system, method and device
CN104092579A (en) * 2014-02-12 2014-10-08 腾讯科技(深圳)有限公司 Simulating method and device for network types
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN109582550A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of method, apparatus and server obtaining full dose business scenario failure collection
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8127000B2 (en) * 2006-06-30 2012-02-28 Tealeaf Technology, Inc. Method and apparatus for monitoring and synchronizing user interface events with network data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297450A (en) * 2012-02-23 2013-09-11 百度在线网络技术(北京)有限公司 Distributed cluster simulation system, method and device
CN104092579A (en) * 2014-02-12 2014-10-08 腾讯科技(深圳)有限公司 Simulating method and device for network types
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device
CN107870860A (en) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 Bury a checking system and method
CN109582550A (en) * 2018-09-29 2019-04-05 阿里巴巴集团控股有限公司 A kind of method, apparatus and server obtaining full dose business scenario failure collection
CN109960651A (en) * 2019-02-13 2019-07-02 北京达佳互联信息技术有限公司 Bury a test method, system, device and computer readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于插桩技术的漏洞自动化验证研究与实现;向琦;《中国优秀硕士学位论文全文数据库》;20170215(第02期);I139-148 *

Also Published As

Publication number Publication date
CN111611140A (en) 2020-09-01

Similar Documents

Publication Publication Date Title
CN111611140B (en) Report verification method and device for buried point data, electronic equipment and storage medium
US20200250024A1 (en) High-volume distributed script error handling
US10909028B1 (en) Multi-version regression tester for source code
CN107040816B (en) Client application operation abnormity analysis method and device
CN108696399B (en) Business service test method and device
CN108134708B (en) Method and device for monitoring third-party interface
CN107168844B (en) Performance monitoring method and device
CN109815119B (en) APP link channel testing method and device
CN110569159A (en) Baffle generation method, device, equipment and computer storage medium
CN114301673A (en) Vulnerability detection method and device, electronic equipment and storage medium
CN108459850B (en) Method, device and system for generating test script
CN112988608B (en) Data testing method and device, computer equipment and storage medium
CN111090592A (en) Automatic testing method of buried point, terminal and readable storage medium
CN105068935B (en) Method and device for processing software test result
CN112866261A (en) Flow detection method and storage medium based on cloud computing and user behavior analysis
US20080072321A1 (en) System and method for automating network intrusion training
CN115271736A (en) Method, device, equipment, storage medium and product for verifying transaction consistency
CN111431767A (en) Multi-browser resource synchronization method and device, computer equipment and storage medium
CN112965711B (en) Job testing method and device, electronic equipment and storage medium
CN112953904B (en) Abnormality detection method, abnormality detection device, server, and storage medium
CN116991677A (en) Timing anomaly detection method, apparatus, terminal device and storage medium
CN111611141A (en) Reporting verification method and device of buried point data, electronic equipment and storage medium
CN108390770B (en) Information generation method and device and server
CN113778800B (en) Error information processing method, device, system, equipment and storage medium
CN113656314A (en) Pressure test processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200901

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000031

Denomination of invention: Report verification method, device, electronic equipment and storage medium of buried point data

License type: Common License

Record date: 20210125

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant