Disclosure of Invention
In view of the above, it is desirable to provide a buried point real-time stream data processing apparatus, a computer device, and a storage medium capable of improving the effectiveness of data push.
A buried point data processing method, the method comprising:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the buried point data comprises a plurality of fields for recording at least one of user information, device information and session information; before combining the buried point events corresponding to the same execution destination to form corresponding key events, the method further comprises the following steps:
screening out a plurality of target buried point data lacking user information from the plurality of buried point data;
and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, before loading the subscription application configuration written in the memory in advance, the method further includes:
determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a business event and an interface calling event;
configuring a target code value corresponding to a target event in a page of the application program;
and generating corresponding subscription application configuration based on the configured target code value and corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the obtaining of the plurality of interface call events uploaded by the interface gateway includes:
acquiring a plurality of interface calling events output by an interface gateway in real time through an information acquisition tool; the information collection tool comprises at least one of a Filebeat (a log data collector of local files, which can monitor log directories or specific log files) tool and a Logstash (a platform for transmitting, processing, managing and searching application program logs and events, which can be used for uniformly collecting and managing the application program logs).
In one embodiment, the pushing the target event to a corresponding subscriber includes:
sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue;
and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, each service event carries a corresponding attribute field, and before the target event is pushed to a corresponding subscriber, the method further includes:
determining a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each business event;
renaming each target attribute field according to a uniform identification naming mode;
and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the subscriber includes at least one of a marketing application, a wind control application, a loan monitoring application, and an exhibition data application provided in an application server, and the method further includes:
when a corresponding subscriber receives a target event, the subscriber triggers a corresponding service processing process according to the target event and when determining that a user executes a preset operation behavior in the page; the service processing process comprises at least one of preset information pushing and access interception.
A buried point real-time streaming data processing apparatus, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for receiving a plurality of buried point data acquired through an application program and determining corresponding buried point events according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
the merging module is used for merging the embedded point events corresponding to the same execution destination to form corresponding key events;
the second acquisition module is used for acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
a code value acquisition module, configured to acquire a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event;
a loading module, configured to load a subscription application configuration written in advance in a memory, and determine target code values corresponding to respective subscribers based on the subscription application configuration, where the target code values include at least one of the buried point code value, the key event code value, the service code value, and the interface call code value;
the pushing module is used for acquiring a target event corresponding to the target code value and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
The buried point data processing method, the buried point data processing device, the computer equipment and the storage medium receive a plurality of buried point data acquired through different application programs, and merge buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The buried point data processing method provided by the application can be applied to the application environment shown in fig. 1. Wherein, the terminal 102, the plurality of service systems 104, the interface gateway 106, and the plurality of subscribers 108 communicate with the server 110 through the network, respectively. The application program is arranged in the terminal 102, and firstly, the server 110 receives a plurality of embedded point data collected by the application program and determines corresponding embedded point events according to the embedded point data; currently, the server 110 merges the events corresponding to the same execution destination into corresponding key events. Second, the server 110 obtains a plurality of service events uploaded by the service system 104 and a plurality of interface calling events uploaded by the interface gateway 106. Next, the server 110 generates a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event. Finally, the server 110 loads the pre-written subscription application configuration in the memory, and determines target code values respectively corresponding to all subscribers based on the subscription application configuration; by obtaining the target event corresponding to the target code value, the target event is pushed to the corresponding subscriber 108.
The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 110 may be implemented by an independent first server or a server cluster formed by a plurality of first servers. The plurality of business systems 104 may also operate in separate second servers or may each operate in a different second server. The plurality of subscribers 108 may include, but are not limited to, a marketing application, a wind control application, a loan monitoring application, and an exhibition data application hosted in an application server.
In one embodiment, as shown in fig. 2, a method for processing buried point data is provided, which is exemplified by the application of the method to the server 110 in fig. 1, and includes the following steps:
step S202, receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behaviors executed by a user on the page of the application program.
Wherein, the application program can be deployed in a plurality of execution terminals. The embedded point event refers to a specific operation event for which a user executes corresponding operation in a page or a program and triggers a corresponding embedded point; the embedded point is some information collected from a specific process in an application or an interface running on a device such as a terminal, and is used for tracking the use condition of the application, which refers to a related technology for collecting and processing user behaviors and an implementation process thereof, such as the number of clicks of a certain button in a page by a user, the duration of watching a certain video, and the like. The data of the embedded points can be used for optimizing the application or providing data support for subsequent operation of the application, and the data can be identified and applied by the server after screening, processing and integrating the information of the embedded points; the embedded point information may include access number, visitor, dwell time, page browsing number, hop rate, and the like, which is not limited in this embodiment of the present application.
Specifically, the server receives the data of the buried point fed back by each execution terminal, and determines the corresponding buried point event according to the received data of the buried point. The server may receive a buried point data packet composed of a plurality of buried point data, and when the server acquires the buried point data packet, the server splits the corresponding buried point data from the buried point data packet, and determines a corresponding buried point event according to the split buried point data.
In one embodiment, referring to fig. 3, an application program may be an APP provided in an execution terminal, where by performing embedded point setting in the APP in advance, when a user calls a plurality of interfaces provided by an interface gateway to execute a service function provided by the APP and triggers an embedded point, the embedded point data is collected, where the collected embedded point data is asynchronously reported to a server, and the data gateway provided in the server receives and processes the embedded point data.
In the above embodiment, when the embedded point is triggered, the embedded point data is collected through an application program, wherein the collected embedded point data is asynchronously reported to the server and is uniformly processed by the server. Therefore, the subscriber does not need to be connected to different streaming data sources, and can acquire the required subscription data only when being connected to the server. Therefore, the current embodiment can improve development efficiency and guarantee data quality.
And step S204, combining the embedded point events corresponding to the same execution destination to form corresponding key events.
The buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information. It should be noted that the user information refers to some basic information about the user, such as user preferences, user details, user requirements, and user contact information. The device information refers to some basic information about the device, such as device identification, device location, device number, etc., and the session information refers to some basic information about the session, such as access address, access object, session identification, etc., involved in the session.
Specifically, the server determines the execution purpose corresponding to each embedded point time, and merges embedded point data having the same execution purpose.
In one embodiment, before the server merges the embedded point events corresponding to the same execution destination to form the corresponding key event, in order to further ensure the integrity of the embedded point data, the server also needs to screen out a plurality of target embedded point data lacking user information from a plurality of embedded point data; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In the embodiment, based on the data analysis requirement, the server merges the embedded point events corresponding to the same execution destination, so that a foundation is laid for the subsequent data analysis work, and the accuracy of data analysis can be effectively improved.
Step S206, acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected.
The service system can be a back-end service processing system, and the interface calling event can be acquired in real time through an information acquisition tool; in one embodiment, the information gathering tool comprises at least one of a Filebeat tool and a Logstash tool. Illustratively, the back-end service processing system may be a service system dedicated to processing user identity registration. Currently, after a user inputs corresponding user identity information in a terminal with a front-end interface, the input user identity information is further fed back to a back-end service processing system, the back-end service processing system judges whether the user meets an application condition according to the received user information, and if the user meets the application condition, execution result information such as 'successful registration' and the like is output, namely, a corresponding service event is generated.
Step S208, generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event.
The embedded point code value, the key event code value, the service code value and the interface calling code value are defined by the server and used for identifying corresponding events, and the embedded point code value, the key event code value, the service code value and the interface calling code value specifically play a role in identification.
Step S210, the subscription application configuration written in the memory in advance is loaded, and target code values corresponding to all subscribers are determined based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value.
Before the subscription application configuration written in the memory in advance is loaded, the user needs to set the relevant information of the subscription application configuration, where the relevant information may be a target event that needs to be pushed to the subscriber, a target code value corresponding to the target event, and the like.
Specifically, before the subscription application configuration written in the memory in advance is loaded, the server determines a plurality of target events to be pushed, wherein the target events include at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, please refer to fig. 4, which is a front-end interface diagram of a configuration of a subscription application. Determining a plurality of target events needing to be pushed by a target user currently, wherein the target events comprise at least one of a buried point event, a key event, a business event and an interface calling event; the target user clicks a code value adding button in a page of an application program, and configures a target code value corresponding to a target event in a configuration page switched therewith; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory. The information of the configurator may be a page name and an affiliated module (an exemplary affiliated module may be a default module and a standard application flow). In the currently displayed front-end interface of the subscription application configuration, the type of the application program, the application scene, the application description, and the like may be determined according to the displayed basic information. Illustratively, when the previously configured target code value and the corresponding configurator information need to be deleted, the deletion link is triggered to delete the target code and the configurator information, and the change notification instruction is generated while the deletion link is triggered, and the server receives the change notification instruction and updates the configuration data in the memory in time.
In the embodiment, before the subscription application configuration written in the memory in advance is loaded, the user sets the relevant information of the subscription application configuration, so that the server can realize the directional pushing of the target event under the condition of determining the subscription requirement of the user, and the system development efficiency is improved.
Step S212, acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
The server sends the target event to a designated message queue, the message queue stores the target event, and after the subscriber completes the subscription operation, the target event stored in the message queue is pushed to the corresponding subscriber.
Specifically, the subscriber includes at least one of a marketing application, a wind control application, a loan monitoring application, and an exhibition data application provided in the application server. When a corresponding subscriber receives a target event, the subscriber triggers a corresponding service processing process according to the target event when determining that a user executes a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception. In addition, each service event carries a corresponding attribute field. In the current embodiment, the server further needs to determine a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each service event; renaming each target attribute field by the server according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, when the marketing application finds that the target user enters the borrowing page according to the received target event, a preset message pushing processing process is triggered, and the interest-free ticket is pushed to the target user. In another embodiment, when the wind control application finds that the target user executes illegal operation behaviors according to the received target event, a preset access interception process is triggered to carry out access interception.
In the embodiment, because the identification identifiers corresponding to the same type of service events uploaded by different service systems may have different conditions, in order to facilitate subsequent uniform management of data, the server renames each target identification identifier according to a uniform identifier naming mode, thereby effectively improving the system development efficiency.
According to the buried point data processing method, a plurality of buried point data acquired through different application programs are received, buried point events with the same execution purpose are combined into corresponding key events based on data analysis requirements, a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
It should be understood that although the steps in the flowcharts of fig. 2 and 3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 5, there is provided a buried point data processing apparatus 500 including: a first obtaining module 501, a merging module 502, a second obtaining module 503, a code value obtaining module 504, a loading module 505, and a pushing module 506, wherein:
a first obtaining module 501, configured to receive multiple buried point data acquired by an application program, and determine a corresponding buried point event according to the buried point data; the buried point data represents the operation behaviors performed by the user on the page of the application program.
The merging module 502 is configured to merge the embedded point events corresponding to the same execution destination to form corresponding key events.
A second obtaining module 503, configured to obtain multiple service events uploaded by different service systems and multiple interface call events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected.
A code value obtaining module 504, configured to obtain a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event.
The loading module 505 is configured to load a subscription application configuration written in the memory in advance, and determine target code values corresponding to each subscriber based on the subscription application configuration, where the target code values include at least one of a buried point code value, a key event code value, a service code value, and an interface call code value.
The pushing module 506 is configured to obtain a target event corresponding to the target code value, and push the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the buried point data processing apparatus 500 further comprises a screening module, wherein:
the screening module is used for screening out a plurality of target buried point data lacking user information from the plurality of buried point data; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the buried point data processing apparatus 500 further comprises a configuration module, wherein:
the system comprises a configuration module, a service module and a service module, wherein the configuration module is used for determining a plurality of target events needing to be pushed, and the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the second obtaining module 503 is further configured to perform real-time collection on a plurality of interface call events output by the interface gateway through an information collection tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In an embodiment, the pushing module 506 is further configured to send the target event obtained by the corresponding screening to an assigned message queue, and store the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the buried point data processing apparatus 500 further comprises an update module, wherein:
the updating module is used for determining a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each business event; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the buried point data processing apparatus 500 further comprises an execution module, wherein:
the execution module is used for triggering a corresponding service processing process when the corresponding subscriber receives the target event and the subscriber determines that the user executes the preset operation behavior in the page according to the target event; the service processing process comprises at least one of preset information pushing and access interception.
The embedded point real-time stream data processing device receives a plurality of embedded point data acquired through different application programs, and based on data analysis requirements, embedded point events with the same execution purpose are combined into corresponding key events, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
For specific limitations of the device for processing the real-time stream data of the buried point, reference may be made to the above limitations on the method for processing the real-time stream data of the buried point, which are not described herein again. All or part of the modules in the device for processing the real-time streaming data of the embedded point can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used to store the target time. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of processing the buried point real-time stream data.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program: receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program; combining the embedded point events corresponding to the same execution destination to form corresponding key events; acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected; generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event; loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value; acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information; screening out a plurality of target buried point data lacking user information from a plurality of buried point data before merging corresponding embedded point events corresponding to the same execution destination to form corresponding key events; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the processor, when executing the computer program, further performs the steps of: before the pre-written subscription application configuration in a memory is loaded, determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a plurality of interface calling events output by an interface gateway in real time through an information acquisition tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the processor, when executing the computer program, further performs the steps of: each business event carries a corresponding attribute field, and a plurality of target attribute fields which belong to different event types and have different naming modes are determined based on the attribute fields corresponding to each business event before the target event is pushed to a corresponding subscriber; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the method comprises the steps that a subscriber comprises at least one of a marketing application, a wind control application, a borrowing monitoring application and an exhibition data application which are arranged in an application server, and when the corresponding subscriber receives a target event, the subscriber triggers a corresponding business processing process according to the target event and when the user is determined to execute a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception.
The computer equipment receives a plurality of buried point data acquired through different application programs, and merges the buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program; combining the embedded point events corresponding to the same execution destination to form corresponding key events; acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected; generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event; loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value; acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the computer program when executed by the processor further performs the steps of: the buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information; screening out a plurality of target buried point data lacking user information from a plurality of buried point data before merging corresponding embedded point events corresponding to the same execution destination to form corresponding key events; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: before the pre-written subscription application configuration in a memory is loaded, determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the computer program when executed by the processor further performs the steps of collecting in real time a plurality of interface call events output by the interface gateway via the information collection tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the computer program when executed by the processor further performs the steps of: each business event carries a corresponding attribute field, and a plurality of target attribute fields which belong to different event types and have different naming modes are determined based on the attribute fields corresponding to each business event before the target event is pushed to a corresponding subscriber; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method comprises the steps that a subscriber comprises at least one of a marketing application, a wind control application, a borrowing monitoring application and an exhibition data application which are arranged in an application server, and when the corresponding subscriber receives a target event, the subscriber triggers a corresponding business processing process according to the target event and when the user is determined to execute a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception.
The storage medium receives a plurality of buried point data acquired by different application programs, and merges the buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), for example.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.