CN111858369A - Memory monitoring method, device, equipment and storage medium - Google Patents

Memory monitoring method, device, equipment and storage medium Download PDF

Info

Publication number
CN111858369A
CN111858369A CN202010734654.2A CN202010734654A CN111858369A CN 111858369 A CN111858369 A CN 111858369A CN 202010734654 A CN202010734654 A CN 202010734654A CN 111858369 A CN111858369 A CN 111858369A
Authority
CN
China
Prior art keywords
memory
point
buried point
buried
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010734654.2A
Other languages
Chinese (zh)
Inventor
倪文飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202010734654.2A priority Critical patent/CN111858369A/en
Publication of CN111858369A publication Critical patent/CN111858369A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/368Test management for test version control, e.g. updating test cases to a new software version

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to the field of performance monitoring, and particularly discloses a memory monitoring method, a device, equipment and a storage medium, wherein the method comprises the following steps: acquiring application programs of different versions, and respectively configuring the same operation buried points in the application programs of different versions; acquiring the embedded point number of the operation embedded point, and testing the application programs of different versions based on the operation embedded point; acquiring the buried point number of the operation buried point and a corresponding memory data log in each version in real time to obtain a buried point memory value corresponding to the operation buried point; and analyzing the buried point memory values of the operation buried points in the application programs of different versions according to the buried point numbers to generate a monitoring result. And further, the memory monitoring of the application programs of different versions is realized, the error caused by manual testing is avoided, and the accuracy of the memory monitoring is improved.

Description

Memory monitoring method, device, equipment and storage medium
Technical Field
The present application relates to the field of information extraction, and in particular, to a method, an apparatus, a device, and a storage medium for monitoring a memory.
Background
Currently, with the continuous development of the internet and smart terminals, the number and kinds of applications installed on mobile terminals such as mobile phones are increasing. The occupation of the application program on the mobile phone memory is gradually increased, and if the occupation of the application program on the mobile phone memory is too high, the mobile phone is jammed in operation, and the user experience is affected.
Because the memory occupation of the application programs of different versions is different, and further different differences exist in the running process, the analysis of the differences is beneficial to the memory optimization of the application programs. The existing memory monitoring of the application program mainly depends on manual means, but the manual memory monitoring not only consumes long time, but also has lower accuracy of the monitoring result.
Therefore, how to automatically perform memory monitoring on the application memory, so as to improve the accuracy of memory monitoring becomes an urgent problem to be solved.
Disclosure of Invention
The application provides a memory monitoring method, a memory monitoring device, memory monitoring equipment and a memory medium, so that the memory monitoring of an application memory is automatically carried out, and the accuracy of the memory monitoring is improved.
In a first aspect, the present application provides a memory monitoring method, where the method includes:
acquiring application programs of different versions, and respectively configuring the same operation buried points in the application programs of different versions;
acquiring the embedded point number of the operation embedded point, and testing the application programs of different versions based on the operation embedded point;
acquiring the buried point number of the operation buried point and a corresponding memory data log in each version in real time to obtain a buried point memory value corresponding to the operation buried point;
and analyzing the buried point memory values of the operation buried points in the application programs of different versions according to the buried point numbers to generate a monitoring result.
In a second aspect, the present application further provides a memory monitoring device, where the device includes:
the embedded point configuration module is used for acquiring application programs of different versions and respectively configuring the same operation embedded points in the application programs of different versions;
the program testing module is used for acquiring the embedded point number of the operation embedded point and testing the application programs of different versions based on the operation embedded point;
the log acquisition module is used for acquiring the buried point number of the operation buried point and the corresponding memory data log in each version in real time so as to obtain a buried point memory value corresponding to the operation buried point;
and the result generation module is used for analyzing the embedded point memory values of the operation embedded points in the application programs of different versions according to the embedded point numbers so as to generate monitoring results.
In a third aspect, the present application further provides a computer device comprising a memory and a processor; the memory is used for storing a computer program; the processor is configured to execute the computer program and implement the memory monitoring method when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program causes the processor to implement the memory monitoring method as described above.
The application discloses a memory monitoring method, a device, equipment and a storage medium, wherein different versions of application programs are obtained, the same operation embedded points are configured in the multiple versions of application programs respectively, then the embedded point numbers of the operation embedded points are obtained, the application programs of different versions are tested based on the operation embedded points, then the embedded point numbers of the operation embedded points and corresponding memory data logs are obtained in real time, embedded point memory values corresponding to the operation embedded points are obtained, and finally the embedded point memory values of the operation embedded points in the application programs of different versions are analyzed according to the embedded point numbers to generate monitoring results. The operating embedded points are configured in the application programs of different versions, and then the application programs are tested through the operating embedded points, so that corresponding embedded point memory values are obtained, further, the memory monitoring of the application programs of different versions is realized, errors caused by manual testing are avoided, and the accuracy of the memory monitoring is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a memory monitoring method according to an embodiment of the present disclosure;
FIG. 2 is a flow diagram illustrating sub-steps of the memory monitoring method provided in FIG. 1;
fig. 3 is a schematic flowchart illustrating an analysis of a buried point memory value of an operation buried point according to a buried point number according to an embodiment of the present application;
FIG. 4 is a schematic flow chart illustrating another example of analyzing a buried point memory value of an operation buried point according to a buried point number according to an embodiment of the present disclosure;
fig. 5 is a schematic block diagram of a memory monitoring apparatus according to an embodiment of the present application;
fig. 6 is a schematic block diagram of a structure of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The flow diagrams depicted in the figures are merely illustrative and do not necessarily include all of the elements and operations/steps, nor do they necessarily have to be performed in the order depicted. For example, some operations/steps may be decomposed, combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It is to be understood that the terminology used in the description of the present application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in the specification of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
The embodiment of the application provides a memory monitoring method and device, computer equipment and a storage medium. The memory monitoring method can be used for monitoring the memory of the application program, so that the accuracy of memory monitoring is improved. Wherein the application can be installed in the terminal.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 is a schematic flow chart illustrating a memory monitoring method according to an embodiment of the present disclosure. The memory monitoring method realizes the memory monitoring of the application program by adding the same operation buried points in the application programs of different versions.
As shown in fig. 1, the memory monitoring method specifically includes: step S101 to step S104.
S101, acquiring application programs of different versions, and respectively configuring the same operation buried points in the application programs of different versions.
Specifically, different version numbers of the same application program may be obtained, and then the same buried point may be configured at the same position in the application program of the version corresponding to each version number. The buried point may include an exposure buried point, an operation buried point, a parent buried point, a child buried point, and the like.
The buried point is used for controlling the current operation to be exposed on the same parent page or child page, and the same operation (clicking, sliding) is carried out, and the like. The same buried point refers to a buried point of the same role added in different versions of the application. When the same embedded points are respectively set for the application programs of different versions, the setting can be carried out on the same page, and the judgment standard of the same page is that the Activity or Fragment names are the same.
When memory monitoring is performed on application programs of different versions, in order to reduce data errors caused by different terminal devices, one terminal device may be used to perform memory monitoring on application programs of multiple versions, that is, multiple application programs of different versions are installed in one terminal device.
Specifically, it is possible to implement installation of a plurality of different versions of an application in one terminal device by modifying the application id of the application. That is, the application Ids of multiple different versions of an application are made inconsistent, and it is also noted that the assets property under the provider label also contains the same application Id.
S102, acquiring the embedded point number of the operation embedded point, and testing the application programs of different versions based on the operation embedded point.
Specifically, the embedded point number of the operation embedded point may be set according to the number of services, the service type corresponding to the operation embedded point, and the operation corresponding to the operation embedded point. The operation pad may perform a variety of operations, such as clicking, page switching, list sliding, and so forth.
And the embedded points corresponding to the same operation embedded points in the application programs of different versions are the same in number. For example, buried point 1000001000 buried at version number 1 and buried point 1000001000 buried at version number 2.
During testing, the application software can be automatically tested by adopting a cloud test or an adbmonkey principle.
In some embodiments, in order to improve the accuracy of the data and reduce the error, the testing the different versions of the application program based on the operation buried point comprises: and testing the application programs of different versions for multiple times according to preset times or a preset time range on the basis of the operation embedded point.
The preset times refer to times for testing the application software of each version, which are preset by a developer. The preset time range refers to a preset period of time set by a developer to test each version of the application software, for example, from eleven o 'clock in the evening to five o' clock in the morning.
And multiple versions of application software are tested for multiple times based on the operation buried point, so that the data volume obtained by testing is increased, the accuracy of the data is improved, and the error is reduced.
S103, acquiring the buried point number of the operation buried point and the corresponding memory data log in each version in real time to obtain a buried point memory value corresponding to the operation buried point.
Specifically, the buried point memory value refers to a memory occupation value of the operation buried point. When the memory data log is obtained, the printed memory data log can be obtained, that is, the memory data log is output, and then the output memory data log is obtained. In the specific implementation process, a native method can be used to output the memory data log as a txt log, and the txt text is stored, and when the txt text is stored, the txt text can be named by the number of the test time, the test times and the like.
The memory occupation value of the operation buried point is stored in the printed memory data log, so that the buried point memory value corresponding to the operation buried point can be obtained according to the printed memory data log.
In some embodiments, in order to improve the accuracy of the data and reduce the error, referring to fig. 2, step S103 includes step S1031 and step S1032.
S1031, acquiring a buried point number of the operation buried point in each version of each test and a corresponding memory data log in real time, wherein the memory data log comprises a memory occupation value;
s1032, calculating a memory occupation average value corresponding to each operation buried point based on the plurality of memory occupation values, and taking the memory occupation average value as a buried point memory value of the operation buried point.
After multiple tests are carried out on multiple versions of application software, the embedded point number of each version of application software and the corresponding memory data log in each test are obtained in real time, and therefore the memory occupation value of the same operation embedded point in the multiple tests is obtained. And calculating the average memory occupation value according to a plurality of memory occupation values of the same operation buried point, wherein the calculated average memory occupation value can be used as the buried point memory value corresponding to the operation buried point.
And calculating the buried point memory value of the operation buried point by using the memory occupation value of the operation buried point in multiple tests, so that accidental data caused by single test can be reduced, and the accuracy of the obtained buried point memory value data is improved.
And S104, analyzing the buried point memory values of the operation buried points in the application programs of different versions according to the buried point numbers to generate monitoring results.
Specifically, the embedded point memory values of the plurality of operation embedded points in the application programs of different versions are analyzed respectively according to the embedded point numbers, so that a monitoring result is generated. The monitoring result may include an abnormal buried point existing in the operation buried point and a memory occupancy curve.
In some embodiments, referring to fig. 3, the analyzing the buried point memory value of the operation buried point according to the buried point number specifically includes steps S1041 and S1042.
S1041, calculating the memory difference ratio of each operation buried point according to the buried point number and the corresponding buried point memory value of the operation buried point in the application programs of different versions.
Specifically, the memory difference ratio of each operation buried point refers to the difference ratio of the buried point memory value corresponding to each operation buried point. When the memory difference occupation ratio is calculated, the calculation can be performed according to the buried point memory values of the operation buried points in the application programs of the multiple versions, and if the application programs of the more than two versions exist, the calculation can be performed in a pairwise combination mode.
The calculation formula of the memory difference ratio can be specifically expressed as follows: p ═ M | (M)1-M2| 100%). Wherein P represents the memory difference ratio, M1Representing the buried point memory value of the operating buried point in version 1, M2Indicating the buried point memory value of the operation buried point in version 2.
S1042, sorting the memory difference proportion of each operation buried point to output abnormal buried points which accord with the screening rule.
The screening rule refers to a rule that the memory difference occupation ratio of the operation buried points is larger than a preset threshold value and the sequence is located before a preset digit. The preset threshold and the preset number of bits may be preset by a developer and may be changed according to different applications, for example, the preset threshold may be 15%, and the preset number of bits may be the tenth.
And after the operation buried points which accord with the screening rule are obtained, the operation buried points which accord with the screening rule can be used as abnormal buried points. In some embodiments, the next layer of operation burial points adjacent to the operation burial points meeting the screening rules can also be output as abnormal burial points.
In some embodiments, the monitoring result may include a monitoring report, wherein the monitoring report includes the abnormal buried points meeting the screening rule.
Specifically, the abnormal buried points in the monitoring report may be displayed in sequence according to the memory difference ratio, for example, the abnormal buried points with the largest memory difference ratio to the abnormal buried points with the smallest memory difference ratio are displayed in sequence. In the specific implementation process, different colors can be adopted to highlight memory difference ratios of different numerical values or different numerical value ranges.
In some embodiments, the method further comprises: and sequencing the memory difference ratio of each operation buried point to output a monitoring report.
The monitoring report shows the memory difference ratio of each operation buried point, and in the specific implementation process, the memory difference ratios of different values can be highlighted by adopting different colors.
In some embodiments, the memory monitoring method further includes: and determining the abnormal grade of the abnormal buried point according to the memory difference ratio of the abnormal buried point so as to select the corresponding alarm grade according to the abnormal grade.
Specifically, the corresponding alarm level may be selected according to the abnormal level of the abnormal buried point, so as to remind the user. For example, the higher the anomaly level of the anomaly buried point is, the higher the alarm level is, and different alarm levels can correspond to different alarm modes. The alarm mode may include a mailbox, a short message, or a system broadcast.
The abnormal level corresponding to the memory difference ratio of the operation buried point may be an abnormal level determined by calculating a difference between the memory difference ratio and a preset threshold in the screening rule and according to the difference. For example, the table of the correspondence between the specific abnormal level and the warning level is shown as the following table:
difference (T) Grade of anomaly Alarm rating Alarm mode
15%<T≤20% 1 1 In-system broadcasting
20%<T≤30% 2 2 Mailbox
30%<T<50% 3 3 Short message, QQ, Wechat
≥50% 4 4 Telephone set
If the preset threshold value in the screening rule is 15% and the memory difference proportion of the operation buried point is 55%, the difference value between the memory difference proportion of the operation buried point and the preset threshold value in the screening rule is 40%, the difference value corresponds to a 3-level abnormal level and a 3-level alarm level, and at this time, at least one of a short message, a QQ (quality assurance) and a WeChat is adopted to alarm developers.
In some embodiments, referring to fig. 4, the analyzing the burial point memory value of the operation burial point according to the burial point number specifically includes step S1043 and step S1044.
S1043, acquiring an execution sequence of each operation buried point according to the buried point number;
and S1044, generating a memory occupation curve according to the execution sequence and the embedded point memory values of the operation embedded points in the application programs of different versions.
Specifically, the execution order of the operation burial points can be embodied in the burial point numbers of the operation burial points. For example, version number 1 is embedded operation embedded point a, embedded point number 1000001000 and version number 1 is embedded operation embedded point B1, embedded point number 000001001, where a is executed first and B is executed later.
Therefore, the execution sequence of each operation buried point can be obtained according to the buried point number, and after the execution sequence of the operation buried points is determined, the memory occupation curve can be generated according to the execution sequence and the buried point memory values of the operation buried points in the application programs of different versions. The memory occupancy curve can represent the change trend of the memory value of the buried point between two adjacent operation buried points.
The memory occupation curve can be a line graph, the abscissa is the execution sequence of the plurality of operation buried points, and the ordinate is the buried point memory value corresponding to the operation buried points.
By generating the memory occupation curve, the change situation of the memory value of the embedded point between the adjacent operation embedded points can be observed conveniently, and the whole memory occupation of the application program can be observed conveniently.
In some embodiments, the memory monitoring method further includes: and generating a statistical table according to the embedded point number and the memory data log of the operation embedded point corresponding to the embedded point number in the application program of each version.
Specifically, when the memory data log is output as a txt log, dos, sh and pothy commands can be called to copy the data in the txt to fill in excel, and a statistical table is generated.
When the application program is tested for multiple times, the data in the txt log can be copied once every two times of testing to generate the statistical table.
The operation embedded points of the application software of multiple versions, the corresponding embedded point numbers and the corresponding memory data logs are commonly stored in the same statistical table, and when statistical analysis is carried out on the data, the table macro can be used for processing and treating the data, so that the data processing efficiency is improved.
In the memory monitoring method provided in the above embodiment, the embedded point numbers of the operation embedded points and the corresponding memory data logs are obtained in real time by obtaining the application programs of different versions and configuring the same operation embedded points in the application programs of the multiple versions respectively, then obtaining the embedded point numbers of the operation embedded points, testing the application programs of the different versions based on the operation embedded points, and finally analyzing the embedded point memory values of the operation embedded points in the application programs of the different versions according to the embedded point numbers to generate the monitoring result. The operating embedded points are configured in the application programs of different versions, and then the application programs are tested through the operating embedded points, so that corresponding embedded point memory values are obtained, further, the memory monitoring of the application programs of different versions is realized, errors caused by manual testing are avoided, and the accuracy of the memory monitoring is improved.
Referring to fig. 5, fig. 5 is a schematic block diagram of a memory monitoring device according to an embodiment of the present application, where the memory monitoring device is configured to execute the memory monitoring method. The memory monitoring device can be configured in a server or a terminal.
The server may be an independent server or a server cluster. The terminal can be an electronic device such as a mobile phone, a tablet computer, a notebook computer, a desktop computer, a personal digital assistant and a wearable device.
As shown in fig. 5, the memory monitoring apparatus 200 includes: a buried point configuration module 201, a program test module 202, a log acquisition module 203 and a result generation module 204.
The buried point configuration module 201 is configured to obtain application programs of different versions, and configure the same operation buried point in the application programs of different versions respectively.
And the program testing module 202 is configured to obtain the embedded point number of the operation embedded point, and test the application programs of different versions based on the operation embedded point.
The log obtaining module 203 is configured to obtain the buried point number of the operation buried point and the corresponding memory data log in each version in real time, so as to obtain a buried point memory value corresponding to the operation buried point.
The log obtaining module 203 includes a data obtaining sub-module 2031 and an average value calculating sub-module 2032.
Specifically, the data obtaining sub-module 2031 is configured to obtain, in real time, a buried point number of the operation buried point in each test version and a corresponding memory data log, where the memory data log includes a memory occupied value; the average value calculating submodule 2032 is configured to calculate, based on the plurality of memory occupancy values, a memory occupancy average value corresponding to each operation buried point, and use the memory occupancy average value as a buried point memory value of the operation buried point.
And the result generating module 204 is configured to analyze the embedded point memory values of the operation embedded points in the application programs of different versions according to the embedded point numbers to generate a monitoring result.
The result generating module 204 includes a proportion calculating sub-module 2041 and a buried point screening sub-module 2042.
Specifically, the proportion calculating submodule 2041 is configured to calculate a memory difference proportion of each operation buried point according to the buried point number and the corresponding buried point memory value of the operation buried point in the application programs of different versions; the buried point screening submodule 2042 is configured to sort the memory difference ratios of the operation buried points to output abnormal buried points that meet the screening rule.
It should be noted that, as will be clear to those skilled in the art, for convenience and brevity of description, the specific working processes of the memory monitoring apparatus and each module described above may refer to corresponding processes in the foregoing memory monitoring method embodiment, and are not described herein again.
The memory monitoring apparatus may be implemented in the form of a computer program that can be run on a computer device as shown in fig. 6.
Referring to fig. 6, fig. 6 is a schematic block diagram of a computer device according to an embodiment of the present disclosure. The computer device may be a server or a terminal.
Referring to fig. 6, the computer device includes a processor, a memory, and a network interface connected through a system bus, wherein the memory may include a nonvolatile storage medium and an internal memory.
The non-volatile storage medium may store an operating system and a computer program. The computer program includes program instructions that, when executed, cause a processor to perform any of the memory monitoring methods.
The processor is used for providing calculation and control capability and supporting the operation of the whole computer equipment.
The internal memory provides an environment for the execution of a computer program on a non-volatile storage medium, which when executed by a processor, causes the processor to perform any of the memory monitoring methods.
The network interface is used for network communication, such as sending assigned tasks and the like. Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
It should be understood that the Processor may be a Central Processing Unit (CPU), and the Processor may be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
Wherein, in one embodiment, the processor is configured to execute a computer program stored in the memory to implement the steps of:
acquiring application programs of different versions, and respectively configuring the same operation buried points in the application programs of different versions;
acquiring the embedded point number of the operation embedded point, and testing the application programs of different versions based on the operation embedded point;
acquiring the buried point number of the operation buried point and a corresponding memory data log in each version in real time to obtain a buried point memory value corresponding to the operation buried point;
and analyzing the buried point memory values of the operation buried points in the application programs of different versions according to the buried point numbers to generate a monitoring result.
In one embodiment, the processor, when implementing the testing of the different versions of the application based on the operating site, is configured to implement:
and testing the application programs of different versions for multiple times according to preset times or a preset time range on the basis of the operation embedded point.
In one embodiment, when the processor obtains the buried point number of the operation buried point and the corresponding memory data log in each version in real time to obtain the buried point memory value corresponding to the operation buried point, the processor is configured to:
acquiring a buried point number of the operation buried point in each version of each test and a corresponding memory data log in real time, wherein the memory data log comprises a memory occupation value;
and calculating a memory occupation average value corresponding to each operation buried point based on a plurality of memory occupation values, and taking the memory occupation average value as a buried point memory value of the operation buried point.
In one embodiment, the processor, when implementing the analyzing, according to the burial point number, the burial point memory value of the operation burial point in the application programs of the different versions to generate a monitoring result, is configured to implement:
calculating the memory difference occupation ratio of each operation buried point according to the buried point number and the corresponding buried point memory value of the operation buried point in the application programs of different versions;
and sequencing the memory difference proportion of each operation buried point to output abnormal buried points which accord with a screening rule.
In one embodiment, the processor is further configured to implement:
and determining the abnormal grade of the abnormal buried point according to the memory difference ratio of the abnormal buried point so as to select the corresponding alarm grade according to the abnormal grade.
In one embodiment, the processor, when implementing the analyzing the embedded point memory value of the operation embedded point in the different versions of the application program according to the embedded point number, is configured to implement:
acquiring the execution sequence of each operation buried point according to the buried point number;
and generating a memory occupation curve according to the execution sequence and the embedded point memory values of the operation embedded points in the application programs of different versions.
In one embodiment, the processor is further configured to implement:
and generating a statistical table according to the embedded point number and the memory data log of the operation embedded point corresponding to the embedded point number in the application program of each version.
An embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program includes program instructions, and the processor executes the program instructions to implement any one of the memory monitoring methods provided in the embodiments of the present application.
The computer-readable storage medium may be an internal storage unit of the computer device described in the foregoing embodiment, for example, a hard disk or a memory of the computer device. The computer readable storage medium may also be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device.
While the invention has been described with reference to specific embodiments, the scope of the invention is not limited thereto, and those skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the invention. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A memory monitoring method is characterized by comprising the following steps:
acquiring application programs of different versions, and respectively configuring the same operation buried points in the application programs of different versions;
acquiring the embedded point number of the operation embedded point, and testing the application programs of different versions based on the operation embedded point;
acquiring the buried point number of the operation buried point and a corresponding memory data log in each version in real time to obtain a buried point memory value corresponding to the operation buried point;
and analyzing the buried point memory values of the operation buried points in the application programs of different versions according to the buried point numbers to generate a monitoring result.
2. The method according to claim 1, wherein the testing the different versions of the application based on the operation site comprises:
and testing the application programs of different versions for multiple times according to preset times or a preset time range on the basis of the operation embedded point.
3. The memory monitoring method according to claim 2, wherein the obtaining of the buried point number of the operation buried point and the corresponding memory data log in each version in real time to obtain the buried point memory value corresponding to the operation buried point comprises:
acquiring a buried point number of the operation buried point in each version of each test and a corresponding memory data log in real time, wherein the memory data log comprises a memory occupation value;
and calculating a memory occupation average value corresponding to each operation buried point based on a plurality of memory occupation values, and taking the memory occupation average value as a buried point memory value of the operation buried point.
4. The method according to claim 1, wherein the analyzing the embedded point memory values of the operation embedded points in the application programs of different versions according to the embedded point numbers to generate the monitoring result includes:
calculating the memory difference occupation ratio of each operation buried point according to the buried point number and the corresponding buried point memory value of the operation buried point in the application programs of different versions;
and sequencing the memory difference proportion of each operation buried point to output abnormal buried points which accord with a screening rule.
5. The memory monitoring method of claim 4, further comprising:
and determining the abnormal grade of the abnormal buried point according to the memory difference ratio of the abnormal buried point so as to select the corresponding alarm grade according to the abnormal grade.
6. The method according to claim 1, wherein the analyzing the embedded point memory values of the operation embedded points in the different versions of the application program according to the embedded point numbers comprises:
acquiring the execution sequence of each operation buried point according to the buried point number;
and generating a memory occupation curve according to the execution sequence and the embedded point memory values of the operation embedded points in the application programs of different versions.
7. The memory monitoring method of claim 1, further comprising:
and generating a statistical table according to the embedded point number and the memory data log of the operation embedded point corresponding to the embedded point number in the application program of each version.
8. A memory monitoring device, comprising:
the embedded point configuration module is used for acquiring application programs of different versions and respectively configuring the same operation embedded points in the application programs of different versions;
the program testing module is used for acquiring the embedded point number of the operation embedded point and testing the application programs of different versions based on the operation embedded point;
the log acquisition module is used for acquiring the buried point number of the operation buried point and the corresponding memory data log in each version in real time so as to obtain a buried point memory value corresponding to the operation buried point;
and the result generation module is used for analyzing the embedded point memory values of the operation embedded points in the application programs of different versions according to the embedded point numbers so as to generate monitoring results.
9. A computer device, wherein the computer device comprises a memory and a processor;
the memory is used for storing a computer program;
the processor is configured to execute the computer program and to implement the memory monitoring method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to implement the memory monitoring method according to any one of claims 1 to 7.
CN202010734654.2A 2020-07-27 2020-07-27 Memory monitoring method, device, equipment and storage medium Pending CN111858369A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010734654.2A CN111858369A (en) 2020-07-27 2020-07-27 Memory monitoring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010734654.2A CN111858369A (en) 2020-07-27 2020-07-27 Memory monitoring method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111858369A true CN111858369A (en) 2020-10-30

Family

ID=72947724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010734654.2A Pending CN111858369A (en) 2020-07-27 2020-07-27 Memory monitoring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111858369A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138905A (en) * 2021-05-11 2021-07-20 北京京东拓先科技有限公司 Software function monitoring method and device
CN113419933A (en) * 2021-05-26 2021-09-21 深圳开源互联网安全技术有限公司 Monitoring method and device of monitoring tool and storage medium
CN113468074A (en) * 2021-08-09 2021-10-01 北京映客芝士网络科技有限公司 Application program version comparison monitoring method, device, medium and electronic equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113138905A (en) * 2021-05-11 2021-07-20 北京京东拓先科技有限公司 Software function monitoring method and device
CN113419933A (en) * 2021-05-26 2021-09-21 深圳开源互联网安全技术有限公司 Monitoring method and device of monitoring tool and storage medium
CN113419933B (en) * 2021-05-26 2023-02-03 深圳开源互联网安全技术有限公司 Monitoring method and device of monitoring tool and storage medium
CN113468074A (en) * 2021-08-09 2021-10-01 北京映客芝士网络科技有限公司 Application program version comparison monitoring method, device, medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN111858369A (en) Memory monitoring method, device, equipment and storage medium
US20210216303A1 (en) Deployment routing of clients by analytics
CN112199093B (en) Resource checking method, device, equipment and computer readable storage medium
CN107392259B (en) Method and device for constructing unbalanced sample classification model
CN112783800B (en) Test case screening method and device
CN112181430B (en) Code change statistical method, device, electronic equipment and storage medium
CN111859047A (en) Fault solving method and device
CN111352794A (en) Abnormality detection method, abnormality detection device, computer device, and storage medium
CN111949550A (en) Method, device and equipment for automatically generating test data and storage medium
CN112241362A (en) Test method, test device, server and storage medium
CN111932348B (en) Alarm method and device for abnormal order, electronic equipment and readable medium
CN111143209B (en) Layering pressure testing method and device, electronic equipment and storage medium
CN109213513B (en) Method and device for determining share ratio of software and computer readable storage medium
CN108470242B (en) Risk management and control method, device and server
CN108961071B (en) Method for automatically predicting combined service income and terminal equipment
CN106817383B (en) Access cycle management method and device based on data statistics reporting
CN113961565A (en) Data detection method, system, computer system and readable storage medium
CN113778511A (en) Resource allocation method, device, equipment and storage medium
CN109857632B (en) Test method, test device, terminal equipment and readable storage medium
CN109460397B (en) Data output control method and device, storage medium and electronic equipment
CN111382068A (en) Hierarchical testing method and device for mass data
CN111858542A (en) Data processing method, device, equipment and computer readable storage medium
CN111274128A (en) Test method, test device, computer equipment and computer readable storage medium
CN113872947B (en) Data reporting method and device, electronic equipment and computer readable storage medium
CN113901731B (en) Electric quantity prediction method, device, medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination