CN114546799A - Point burying log checking method and device, electronic equipment, storage medium and product - Google Patents

Point burying log checking method and device, electronic equipment, storage medium and product Download PDF

Info

Publication number
CN114546799A
CN114546799A CN202210109294.6A CN202210109294A CN114546799A CN 114546799 A CN114546799 A CN 114546799A CN 202210109294 A CN202210109294 A CN 202210109294A CN 114546799 A CN114546799 A CN 114546799A
Authority
CN
China
Prior art keywords
target
point location
point
test
test case
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210109294.6A
Other languages
Chinese (zh)
Inventor
李笑笑
胡重
章海华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202210109294.6A priority Critical patent/CN114546799A/en
Publication of CN114546799A publication Critical patent/CN114546799A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis

Abstract

The disclosure provides a method and a device for checking a buried point log, an electronic device, a storage medium and a product. Relate to data check-up technical field, especially relate to buried point log test technical field. The specific implementation scheme is as follows: determining a target to be detected, and acquiring a target point corresponding to the target to be detected; setting a test rule of the target point location based on the requirement of the target to be tested, and determining a test case of the target point location; executing the test case based on the target to be tested, and acquiring a buried point log reported after the test case is executed; and checking the buried point log based on the test rule to obtain a check result of the buried point log. Time and human resources can be saved, and service handover cost can be saved through the method and the system.

Description

Point burying log checking method and device, electronic equipment, storage medium and product
Technical Field
The present disclosure relates to the field of data verification technologies, and in particular, to a method and an apparatus for verifying a point-buried log, an electronic device, a storage medium, and a product.
Background
Due to the continuous development of smart devices, more and more applications are emerging in smart devices. To obtain user behavior based on the application and to detect the quality of the application, points may be generally set in the flow specified in the application for collecting data. Depending on the respective function of the application. A number of different point locations may be provided, with each point location having a number of fields, i.e., each point location having a number of attributes.
Disclosure of Invention
The disclosure provides a method and a device for checking a buried point log, an electronic device, a storage medium and a product.
According to one aspect of the disclosure, a method for checking a buried point log is provided, which is applied to a test platform, and the method includes:
determining a target to be detected, and acquiring a target point corresponding to the target to be detected; setting a test rule of the target point location based on the requirement of the target to be tested, and determining a test case of the target point location; executing the test case based on the target to be tested, and acquiring a buried point log reported after the test case is executed; and checking the buried point log based on the test rule to obtain a check result of the buried point log.
According to a second aspect of the present disclosure, there is provided a device for checking a buried point log, which is applied to a test platform, the device including:
the acquisition module is used for determining a target to be detected and acquiring a target point corresponding to the target to be detected; the determining module is used for setting a test rule of the target point location based on the requirement of the target to be tested and determining a test case of the target point location; the acquisition module is also used for executing the test case based on the target to be tested and acquiring a buried point log reported after the test case is executed; and the checking module is used for checking the buried point log based on the test rule to obtain a buried point log checking result.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the first aspect.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method according to the first aspect.
According to a fifth aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the method according to the first aspect.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 shows a schematic flow chart of a method for checking a buried point log according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart illustrating a rule setting in a method for verifying a buried point log according to an embodiment of the present disclosure;
fig. 3 shows a schematic flow diagram of obtaining a test case in a method for verifying a buried point log according to an embodiment of the present disclosure;
fig. 4 shows a schematic flow diagram of a matching test case in a buried point log verification method according to an embodiment of the present disclosure;
fig. 5 shows a schematic flow chart of obtaining a test case in a method for verifying a buried point log according to an embodiment of the present disclosure;
fig. 6 is a schematic flow chart illustrating a verification result generated in a method for verifying a buried point log according to an embodiment of the present disclosure;
fig. 7 is a schematic flowchart illustrating a method for checking a buried point log according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram illustrating a buried point log verification apparatus according to an embodiment of the present disclosure;
fig. 9 is a block diagram of an electronic device for implementing the method for checking a buried point log according to an embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Due to the continuous development of smart devices, more and more applications are emerging in smart devices. To obtain user behavior based on the application and to detect the quality of the application, points may be generally set for collecting data in a flow specified in the application. Depending on the respective function of the application. A number of different point locations may be provided, with each point location having a number of fields, i.e., each point location having a number of attributes.
It can be understood that the field of each point location changes with the target to be measured, and therefore, in order to collect more complete data, in the application iteration process, the field of the existing point location may be modified according to the target to be measured, or a new point location may be added. Thereby performing point location test based on the target point corresponding to the target to be tested.
An embodiment of performing the test may be that information of the target point location change is determined, including a field of the point location change and a field of the point location change that remains unchanged. Determining a trigger condition, that is, determining under what service scenario several conditions of the current change can be obtained. And manually triggering a dotting action, and executing a corresponding service scene trigger log reporting mechanism according to the point change of the point. And acquiring a log reported by the point location. And inquiring the logs reported in the last step from a database stored in the dotting logs. The log information is collated, i.e., the fetched log is compared to the expected log.
According to the embodiment, when the dotting action is triggered, manual triggering is needed, the number of requests caught from the beginning of packet catching to the triggering of the dotting logic is large, the triggered dotting logic is not only one point, and human resources are wasted by screening. If the requested data is screened based on the platform, time is consumed seriously, and time is wasted.
Based on this, the present disclosure provides a method and an apparatus for checking a buried point log. The test case corresponding to the target point is automatically obtained by setting a rule for the target point, and the embedded point log of the target point is automatically checked, so that a check result of the embedded point log is obtained, and time, human resources and service handover cost are saved.
The following embodiments will explain the method and apparatus for checking a fixed point log according to the present disclosure with reference to the drawings.
Fig. 1 shows a schematic flowchart of a method for checking a buried point log according to an embodiment of the present disclosure, and as shown in fig. 1, the method is applied to a test platform, and may include:
in step S110, a target to be measured is determined, and a target point corresponding to the target to be measured is obtained.
In the embodiment of the present disclosure, the target to be measured and the requirement of the target to be measured need to be determined. And acquiring target point positions according to the determined target to be detected. Wherein. The target to be tested can be an independent function, can also be a branch in the function which can be realized by application, and can also be an application integrating a plurality of functions, which is not listed one by one; the target point may be one or more.
In step S120, based on the requirement of the target to be tested, a test rule of the target point location is set, and a test case of the target point location is determined.
In the disclosure, a test rule of a target point location is set according to the requirement of a target to be tested. Wherein the test rule includes a plurality of standard point location fields. Each point bit field corresponds to the value of the field. For example, the value corresponding to the field provision is city a, the value corresponding to the field city is region B, and the field district is region C included in region B.
In the embodiment of the present disclosure, a test case corresponding to the target point is also required to be obtained. The test case may be an operation for executing a certain function of the target to be tested, and the test case is determined based on the program language.
In step S130, a test case is executed based on the target to be tested, and a buried point log reported after the test case is executed is obtained.
In the embodiment of the disclosure, the test case is executed according to the target to be tested, so as to trigger the dotting logic and automatically obtain the embedded point log reported after the test case is executed.
The test case can be directly obtained or recorded according to the requirement of the target to be tested. The test purpose may be determined based on the target point bit.
In step S140, the buried point log is verified based on the test rule, so as to obtain a buried point log verification result.
In the embodiment of the disclosure, the reported embedded point log is automatically verified based on the set test rule, so as to obtain the verification result of the embedded point log, and thus obtain the detection report recording the verification result.
Further in the present disclosure, detailed information of the determination of the test result may also be included based on the detection.
By the aid of the method for checking the embedded point logs, rules can be automatically configured for point locations, test cases can be automatically matched, and dotting logic is triggered, so that checking results of the embedded point logs are obtained. The process does not need to reduce the use of human resources, and can save the time of test application and the service handover cost.
In the embodiment of the present disclosure, the target point corresponding to the target to be detected may be an existing point, or may be a newly added point according to the requirement of the target to be detected. And setting test rules for the existing point positions or newly added point positions in the target point positions. The setting of the test rule comprises setting a point location field of the log and setting a corresponding value of each point location field.
Fig. 2 is a schematic flow chart illustrating a rule setting process in a method for verifying a fixed point log according to an embodiment of the present disclosure, and as shown in fig. 2, a field modified by a target point bit log is determined. And acquiring a test rule base, and searching target point positions in the test rule base. If the target point is found, that is, in response to the target point being an existing point, an existing rule corresponding to the target point is obtained based on the rule base. And based on the requirement of the target to be tested, modifying the existing rule and setting the test rule of the target point position. If the target point is not searched, the target point is a newly added point, that is, a corresponding test rule is newly established for the target point based on the requirement of the target to be tested in response to the target point being the newly added point.
Fig. 3 shows a schematic flowchart of a test case obtained in a method for verifying a buried point log according to an embodiment of the present disclosure, and as shown in fig. 3, the method is applied to a test platform and may include the following steps.
In step S210, a test case library is obtained, and a test case corresponding to the target point location is matched based on the test case library.
In step S220, based on the matching result, a test case of the target point location is determined.
In the embodiment of the present disclosure, after the test rule is set for each target point location, the function of the target to be tested needs to be triggered by using the corresponding test case. The test cases can be directly obtained from the existing test cases in the test case library, and can also be newly added according to the target point.
Fig. 4 shows a schematic flow chart of matching test cases in the method for verifying the buried point log according to the embodiment of the present disclosure, and as shown in fig. 4, a test case library is obtained, and a test case corresponding to a target point location is matched based on the test case library. And if the test case corresponding to the target point is matched based on the test case library, the matching is successful. And determining the test case corresponding to the target point in the test case library. If the test case corresponding to the target point is not matched based on the test case library, the matching is failed. Then matching the target point in the test case library with the existing test case, or recording the test case corresponding to the target point.
In this disclosure, the embedded point log reported after the test case is executed may further include log information of a non-target point location.
In the embodiment of the present disclosure, after acquiring the buried point log, the buried point log of the target point location needs to be acquired. As described above, the rule set in the present disclosure at least includes a point location field of a target point location and a first point location value corresponding to the point location field. For convenience of description, the value corresponding to the bit field when the test rule is set is referred to as a first bit value.
The following embodiments will describe the verification result of the embedded point log obtained by verifying the embedded point log based on the test rule.
Fig. 5 shows a schematic flowchart of a test case obtained in a method for verifying a buried point log according to an embodiment of the present disclosure, and as shown in fig. 5, the method is applied to a test platform and may include the following steps.
In step S310, a second point location value corresponding to the embedded point log and the point location field is obtained.
In the embodiment of the disclosure, after the test case is executed for a certain time, the screening of the embedded point logs is triggered, and the embedded point logs of the target point locations are obtained. And acquiring a second point location value corresponding to the point location field in the screened embedded point log based on the acquired embedded point log of the target point location and the point location field in the setting rule.
For the convenience of distinguishing, the point location value recorded in the log and corresponding to the point location field is referred to as a second point location value.
In step S320, the second point location value is verified based on the first point location value, and a verification result is obtained.
In step S330, a buried point log check result is generated based on the check result.
In the embodiment of the present disclosure, the second point location value of the buried point log record may be verified by setting the first point location value set in the test rule, so as to obtain a verification result. And automatically generating a verification result corresponding to the embedded point log according to the verification result.
Fig. 6 shows a schematic flow chart of generating a check result in the method for checking a buried point log according to the embodiment of the present disclosure, and as shown in fig. 6, after collecting the buried point log corresponding to a target point, a second point value in the buried point log is checked according to a first point value in a set test rule.
And if the verification result is that the first point location value is the same as the second point location value, determining that the verification is successful, and recording the verification result.
If the first point location value is different from the second point location value, the verification is determined to fail, and the verification result is recorded in the same way.
When it needs to be explained, the two situations are included that the first point location value is different from the second point location value. In one case, the second point location value has a recorded true value, and the value is different from the first point location value. In another case, the second point location value does not record a real value, and if the second point location value is null, it is determined that the first point location value is different from the second point location value.
And after all the embedded point logs are detected, a detection report is generated, and a verification result is obtained.
Fig. 7 shows a schematic flow diagram of a method for verifying a point-buried log according to an embodiment of the present disclosure, and as shown in fig. 7, in an embodiment of the present disclosure, a point-hitting logic is automatically triggered to obtain a point-buried log of a target point location by configuring a target point location test rule, acquiring and recording a target point location test case. And checking the obtained buried point log of the target point according to the test rule so as to determine the checking result of the buried point log. In the process, a large amount of human resources can be saved, and time is saved.
Based on the same principle as the method shown in fig. 1, fig. 8 shows a schematic structural diagram of a buried point log testing apparatus provided by an embodiment of the present disclosure, and as shown in fig. 8, the buried point log testing apparatus 100 may include:
an obtaining module 101, configured to determine a target to be detected and obtain a target point corresponding to the target to be detected; the determining module 102 is configured to set a test rule of the target point location based on a requirement of the target to be tested, and determine a test case associated with the target point location; the obtaining module 101 is further configured to execute the test case based on the target to be tested, and obtain a buried point log reported after the test case is executed; the checking module 103 is configured to check the buried point log based on the test rule to obtain a check result of the buried point log.
In this embodiment of the present disclosure, the determining module 102 is configured to, in response to that the target point location is an existing point location, obtain, based on a rule base, an existing rule corresponding to the target point location; and modifying the existing rule based on the requirement of the target to be tested, and setting the test rule of the target point position.
In this embodiment of the present disclosure, the determining module 102 is configured to, in response to that the target point location is a newly added point location, establish a corresponding test rule for the target point location based on a requirement of the target to be tested.
In the embodiment of the present disclosure, the determining module 102 is configured to obtain a test case library, and match a test case corresponding to the target point location based on the test case library; and determining the test case of the target point location based on the matching result.
In the embodiment of the present disclosure, the determining module 102 is configured to determine, in response to a successful matching, a test case corresponding to the target point in the test case library; or, responding to the matching failure, matching the existing test cases in the test case library, or recording the test cases corresponding to the target point.
In the embodiment of the present disclosure, the test rule includes a point location field of a target point location and a first point location value corresponding to the point location field; the checking module 103 is configured to obtain a second point location value corresponding to the embedded point log and the point location field; verifying the second point location value based on the first point location value to obtain a verification result; and generating the buried point log checking result based on the checking result.
In this embodiment of the present disclosure, the verification module 103 is configured to determine that the verification is successful in response to that the verification result is that the first point location value is the same as the second point location value; or, in response to the first point location value being different from the second point location value, determining that the verification failed.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 9 shows a schematic block diagram of an example electronic device 200 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 9, the apparatus 200 includes a computing unit 201 that can perform various appropriate actions and processes in accordance with a computer program stored in a Read Only Memory (ROM)202 or a computer program loaded from a storage unit 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data required for the operation of the device 200 can also be stored. The computing unit 201, the ROM 202, and the RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
Various components in the device 200 are connected to the I/O interface 205, including: an input unit 206 such as a keyboard, a mouse, or the like; an output unit 207 such as various types of displays, speakers, and the like; a storage unit 208, such as a magnetic disk, optical disk, or the like; and a communication unit 209 such as a network card, modem, wireless communication transceiver, etc. The communication unit 209 allows the device 200 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 201 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 201 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 201 performs the various methods and processes described above, such as the buried point log check method. For example, in some embodiments, the pit log verification method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 208. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 200 via the ROM 202 and/or the communication unit 209. When the computer program is loaded into RAM 203 and executed by the computing unit 201, one or more steps of the above described method of fixed point log verification may be performed. Alternatively, in other embodiments, the computing unit 201 may be configured to perform the buried point log verification method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A method for checking a buried point log is applied to a test platform and comprises the following steps:
determining a target to be detected, and acquiring a target point corresponding to the target to be detected;
setting a test rule of the target point location based on the requirement of the target to be tested, and determining a test case of the target point location;
executing the test case based on the target to be tested, and acquiring a buried point log reported after the test case is executed;
and checking the buried point log based on the test rule to obtain a check result of the buried point log.
2. The method of claim 1, wherein the setting of the test rule of the target point location based on the requirement of the target to be tested comprises:
responding to the target point location as an existing point location, and acquiring an existing rule corresponding to the target point location based on a rule base;
and modifying the existing rule based on the requirement of the target to be tested, and setting the test rule of the target point position.
3. The method according to claim 1 or 2, wherein the setting of the test rule of the target point location based on the requirement of the target to be tested comprises:
and in response to the target point location being a newly added point location, establishing a corresponding test rule for the target point location based on the requirement of the target to be tested.
4. The method of claim 1, wherein the determining the test case for the target point location comprises:
acquiring a test case library, and matching test cases corresponding to the target point positions based on the test case library;
and determining the test case of the target point location based on the matching result.
5. The method of claim 4, wherein the determining the test case of the target point location based on the matching result comprises:
in response to the successful matching, determining a test case corresponding to the target point in the test case library; or
And responding to the matching failure, matching the existing test cases for the target point in the test case library, or recording the test cases corresponding to the target point.
6. The method of claim 1, wherein the test rule includes a point location field of a target point location and a first point location value corresponding to the point location field;
the checking the buried point log based on the test rule to obtain a checking result of the buried point log comprises the following steps:
acquiring a second point location value corresponding to the embedded point log and the point location field;
verifying the second point location value based on the first point location value to obtain a verification result;
and generating the buried point log checking result based on the checking result.
7. The method of claim 6, wherein the verifying the second point location value based on the first point location value to obtain a verification result comprises:
determining that the verification is successful in response to the verification result that the first point position value is the same as the second point position value; or
And determining that the verification fails in response to the first point location value being different from the second point location value.
8. The utility model provides a buried point log verifying attachment, is applied to test platform, the device includes:
the acquisition module is used for determining a target to be detected and acquiring a target point corresponding to the target to be detected;
the determining module is used for setting a test rule of the target point location based on the requirement of the target to be tested and determining a test case of the target point location;
the acquisition module is also used for executing the test case based on the target to be tested and acquiring a buried point log reported after the test case is executed;
and the checking module is used for checking the buried point log based on the test rule to obtain a buried point log checking result.
9. The apparatus of claim 8, wherein the means for determining is configured to:
responding to the target point location as an existing point location, and acquiring an existing rule corresponding to the target point location based on a rule base;
and modifying the existing rule based on the requirement of the target to be tested, and setting the test rule of the target point position.
10. The apparatus of claim 8 or 9, wherein the means for determining is configured to:
and in response to the target point location being a newly added point location, establishing a corresponding test rule for the target point location based on the requirement of the target to be tested.
11. The apparatus of claim 8, wherein the means for determining is configured to:
acquiring a test case library, and matching test cases corresponding to the target point positions based on the test case library;
and determining the test case of the target point location based on the matching result.
12. The apparatus of claim 11, wherein the means for determining is configured to:
in response to the successful matching, determining a test case corresponding to the target point in the test case library; or
And responding to the matching failure, matching the existing test cases in the test case library, or recording the test cases corresponding to the target point.
13. The apparatus of claim 8, wherein the test rule includes a point location field of a target point location and a first point location value corresponding to the point location field;
the verification module is configured to:
acquiring a second point location value corresponding to the embedded point log and the point location field;
verifying the second point location value based on the first point location value to obtain a verification result;
and generating the buried point log checking result based on the checking result.
14. The apparatus of claim 13, wherein the verification module is to:
determining that the verification is successful in response to the verification result that the first point position value is the same as the second point position value; or
And determining that the verification fails in response to the first point location value being different from the second point location value.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
16. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-7.
17. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-7.
CN202210109294.6A 2022-01-28 2022-01-28 Point burying log checking method and device, electronic equipment, storage medium and product Pending CN114546799A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210109294.6A CN114546799A (en) 2022-01-28 2022-01-28 Point burying log checking method and device, electronic equipment, storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210109294.6A CN114546799A (en) 2022-01-28 2022-01-28 Point burying log checking method and device, electronic equipment, storage medium and product

Publications (1)

Publication Number Publication Date
CN114546799A true CN114546799A (en) 2022-05-27

Family

ID=81673924

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210109294.6A Pending CN114546799A (en) 2022-01-28 2022-01-28 Point burying log checking method and device, electronic equipment, storage medium and product

Country Status (1)

Country Link
CN (1) CN114546799A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114860549A (en) * 2022-05-30 2022-08-05 北京新唐思创教育科技有限公司 Buried point data checking method, device, equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114860549A (en) * 2022-05-30 2022-08-05 北京新唐思创教育科技有限公司 Buried point data checking method, device, equipment and storage medium
CN114860549B (en) * 2022-05-30 2024-02-20 北京新唐思创教育科技有限公司 Buried data verification method, buried data verification device, buried data verification equipment and storage medium

Similar Documents

Publication Publication Date Title
CN112559086B (en) Applet page rendering method and device, electronic equipment and readable storage medium
CN111654495B (en) Method, apparatus, device and storage medium for determining traffic generation source
CN113438106A (en) Content distribution network processing method and device and electronic equipment
CN110688305B (en) Test environment synchronization method, device, medium and electronic equipment
CN116881156A (en) Automatic test method, device, equipment and storage medium
CN113656252B (en) Fault positioning method, device, electronic equipment and storage medium
CN114546799A (en) Point burying log checking method and device, electronic equipment, storage medium and product
CN115705190A (en) Method and device for determining dependence degree
CN116107589B (en) Automatic compiling method, device and equipment of software codes and storage medium
CN115687406B (en) Sampling method, device, equipment and storage medium for call chain data
CN115576831A (en) Test case recommendation method, device, equipment and storage medium
CN115061921A (en) Automatic test method, device, electronic equipment and readable storage medium
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN114693116A (en) Method and device for detecting code review validity and electronic equipment
CN113778849A (en) Method, apparatus, device and storage medium for testing code
CN113127357A (en) Unit testing method, device, equipment, storage medium and program product
CN113760765B (en) Code testing method and device, electronic equipment and storage medium
CN114095394B (en) Network node fault detection method and device, electronic equipment and storage medium
CN112527537B (en) Quality monitoring method, device, equipment and medium of online service system
CN113836016B (en) Writing interface storage quality testing method, system, electronic equipment and storage medium
CN114528215A (en) Interactive page testing method and element template generating method and device
CN114238149A (en) Batch testing method of accounting system, electronic device and storage medium
CN113536163A (en) Processing method, device and equipment for picture linking and storage medium
CN115470149A (en) Database preprocessing function testing method, device, equipment and storage medium
CN116401113A (en) Environment verification method, device and medium for heterogeneous many-core architecture acceleration card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination