CN114579415A - Method, device, equipment and medium for configuring and acquiring buried point data - Google Patents

Method, device, equipment and medium for configuring and acquiring buried point data Download PDF

Info

Publication number
CN114579415A
CN114579415A CN202210197830.2A CN202210197830A CN114579415A CN 114579415 A CN114579415 A CN 114579415A CN 202210197830 A CN202210197830 A CN 202210197830A CN 114579415 A CN114579415 A CN 114579415A
Authority
CN
China
Prior art keywords
target event
event
buried point
point data
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210197830.2A
Other languages
Chinese (zh)
Inventor
赵东钏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202210197830.2A priority Critical patent/CN114579415A/en
Publication of CN114579415A publication Critical patent/CN114579415A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Abstract

The application relates to the technical field of data processing, in particular to a configuration method, an acquisition method, a device, equipment and a medium of buried point data, which are used for solving the problem that service codes are more invasive due to the fact that data acquisition is carried out in a code buried point mode in the related art. The method comprises the following steps: acquiring a target event set of a designated browser, and determining a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on a specified browser; and aiming at each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event so as to acquire buried point data of the target event corresponding to the preset trigger mark and report the buried point data to a server based on a pre-configured capture function after a page of an appointed browser is initialized. The method does not need to add or change the service code of the designated browser, thereby reducing the invasiveness of the service code.

Description

Method, device, equipment and medium for configuring and acquiring buried point data
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method, an apparatus, a device, and a medium for configuring and acquiring buried point data.
Background
With the rapid development of internet technology, internet enterprises often obtain behavior data generated by users when using applications by embedding points in enterprise products (such as applications, browsers, etc.). And then optimizing the product through analyzing the user behavior data. The so-called burial point is that certain information is collected in a specific process in a product, and is used for tracking the use condition of the product, and then is used for further optimizing the product or providing data support of operation, wherein the data support comprises access number, visitor number, stay time, page browsing number, jump rate and the like.
In the related art, data acquisition is performed in a code point burying mode. According to the method, a buried point code needs to be added into a service code of a page node, and when an event to be acquired occurs, relevant data of the event is acquired through the buried point code. In practical application, user behaviors which need to be collected and the number of related page nodes are huge, and the point burying mode writes a large number of repeated codes which are irrelevant to service logic in original service codes for burying points, so that the service codes are more invasive. This makes the service code and the embedded point code have high coupling, which is not beneficial to the maintenance of the service code.
Disclosure of Invention
The embodiment of the application provides a configuration method, an acquisition method, a device, equipment and a medium of buried point data, which are used for solving the problem that data acquisition is carried out in a code buried point mode in the prior art, and the invasion to service codes is large.
In a first aspect, an embodiment of the present invention provides a method for configuring buried point data, where the method includes:
acquiring a target event set of a designated browser, and determining a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
and for each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event so as to acquire buried point data of the target event corresponding to the preset trigger mark based on a pre-configured capture function and report the buried point data to a server after the page of the specified browser is initialized.
The method and the device for processing the target events in the browser predetermine the preset classification of each target event in the designated browser. And then, aiming at each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event. Therefore, after the page of the designated browser is initialized, whether the preset trigger mark is triggered or not can be monitored in real time, and when the preset trigger mark is triggered, the data of the buried point of the target event corresponding to the preset trigger mark is collected through a capture function configured in advance and reported to a server. According to the method, the target event is embedded in the configuration file, the business code of the specified browser does not need to be modified, and the invasion to the business code is reduced.
In some possible embodiments, the preset classification of the target event comprises at least: specifying a click event, a page browsing event and an interface calling event; the configuring, in a configuration file, a preset trigger of the target event according to the preset classification of the target event includes:
if the preset classification of the target event is the specified click event, taking a page class name or a page unique identifier of the target event in the specified browser as a preset trigger mark of the target event;
if the preset classification of the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the preset classification of the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
According to the method and the device, the corresponding preset trigger marks are arranged according to the preset classification of the target event, so that the embedded data of the corresponding target event is determined by monitoring the trigger state of the preset trigger marks after the browser page is initialized, and the acquisition efficiency of the embedded data of the target event is improved.
In some possible embodiments, after configuring the preset trigger flag of the target event in a configuration file according to the preset classification of the target event, the method further includes:
setting a switch control for the target event;
before the acquiring of the buried point data of the target event corresponding to the preset trigger mark based on the preconfigured capture function, the method further includes:
and determining that the switch control of the target event is in an opening state.
After the preset trigger flag of the target event is configured in the configuration file, the embodiment of the application can also set a switch control for the target event, wherein the switch control is used for determining whether to report the buried point data of the target event, so that the reporting condition of the buried point data can be flexibly set according to the service requirement of a user.
In some possible embodiments, the switch control includes a custom switch function and an on-off key value, and the custom switch function is used for determining an on-off condition of the switch control.
The switch control in the embodiment of the application comprises a user-defined switch function which can be configured by a user in a user-defined manner, so that the reporting condition of the buried point data can be flexibly set according to the service requirement of the user.
In some possible embodiments, after configuring the preset trigger flag of the target event in a configuration file according to the preset classification of the target event, the method further includes:
configuring a designated interface for reporting buried point data for the target event; the specified interface is a custom interface set by a user or a default interface of the server.
The embodiment of the application supports the user-defined configuration of the target event and the user-defined configuration of the target event to the designated interface for reporting the buried point data. If the user-defined interface is not set, the default interface of the server can be adopted to report the buried point data so as to improve the flexibility of reporting the buried point data.
In a second aspect, an embodiment of the present application provides a method for obtaining buried point data, where the method includes:
responding to a buried point data acquisition request issued aiming at a target event, and acquiring a preset trigger mark of the buried point data corresponding to the target event;
monitoring the trigger state of the preset trigger mark, if the preset trigger mark is triggered, acquiring buried point data of a target event corresponding to the trigger mark according to a preset capture function, and reporting the buried point data to a server.
In some possible embodiments, the target event comprises at least: specifying a click event, a page browsing event and an interface calling event; the obtaining of the preset trigger mark of the target event corresponding to the buried point data includes:
if the target event is the specified click event, taking a page class name or a page unique identifier corresponding to the target event as a preset trigger mark of the target event;
if the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
In some possible embodiments, before the collecting, according to a pre-configured capture function, the buried point data of the target event corresponding to the trigger flag and reporting the collected buried point data to the server, the method further includes:
and determining that the switch control of the target event corresponding to the trigger mark is in an on state.
In some possible embodiments, the reporting the collected buried point data to a server includes:
determining a reporting interface of the buried point data corresponding to a target event;
reporting the buried point data to the server by adopting the reporting interface; the reporting interface is a user-defined interface set by a user or a default interface of the server.
In a third aspect, an embodiment of the present application provides an apparatus for configuring buried point data, where the apparatus includes:
the system comprises a classification acquisition module, a classification acquisition module and a classification analysis module, wherein the classification acquisition module is configured to execute acquisition of a target event set of a specified browser and determine a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
and the event configuration module is configured to execute configuring a preset trigger mark of each target event in a configuration file according to the preset classification of the target event so as to acquire and report buried point data of the target event corresponding to the preset trigger mark to a server based on a pre-configured capture function after the page of the specified browser is initialized.
In some possible embodiments, the preset classification of the target event comprises at least: specifying a click event, a page browsing event and an interface calling event;
executing the preset trigger flag for configuring the target event in a configuration file according to the preset classification of the target event, wherein the event configuration module is configured to:
if the preset classification of the target event is the specified click event, taking a page class name or a page unique identifier of the target event in the specified browser as a preset trigger mark of the target event;
if the preset classification of the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the preset classification of the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
In some possible embodiments, after performing the configuring of the preset trigger flag of the target event in the configuration file according to the preset classification of the target event, the event configuration module is further configured to:
setting a switch control for the target event;
before the capture function based on the pre-configuration is executed to collect the buried point data of the target event corresponding to the preset trigger mark, the event configuration module is further configured to:
and determining that the switch control of the target event is in an opening state.
In some possible embodiments, the switch control includes a custom switch function and an on-off key value, and the custom switch function is used for determining an on-off condition of the switch control.
In some possible embodiments, after performing the configuring of the preset trigger flag of the target event in the configuration file according to the preset classification of the target event, the event configuration module is further configured to:
configuring a designated interface for reporting buried point data for the target event; the designated interface is a custom interface set by a user or a default interface of the server.
In a fourth aspect, an embodiment of the present application provides an apparatus for obtaining buried point data, where the apparatus includes:
the event determining module is configured to execute a preset trigger mark of the buried point data corresponding to the target event in response to a buried point data obtaining request issued aiming at the target event;
and the data acquisition module is configured to monitor the trigger state of the preset trigger mark, and if the preset trigger mark is monitored to be triggered, the data acquisition module acquires the buried point data of the target event corresponding to the trigger mark according to a pre-configured capture function and reports the data to the server.
In some possible embodiments, the target event comprises at least: specifying a click event, a page browsing event and an interface calling event;
executing a preset trigger mark of the target event corresponding to the obtained buried point data, wherein the event determination module is configured to:
if the target event is the specified click event, taking a page class name or a page unique identifier corresponding to the target event as a preset trigger mark of the target event;
if the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
In some possible embodiments, before the collecting of the buried point data of the target event corresponding to the trigger flag according to the preconfigured capture function is executed and reported to the server, the data collecting module is further configured to:
and determining that the switch control of the target event corresponding to the trigger mark is in an on state.
In some possible embodiments, the reporting of the collected buried point data to a server is performed, and the data collection module is configured to:
determining a reporting interface of the buried point data corresponding to a target event;
reporting the buried point data to the server by adopting the reporting interface; the reporting interface is a user-defined interface set by a user or a default interface of the server.
In a fifth aspect, the present application provides an electronic device, comprising:
a memory for storing program instructions;
a processor for calling the program instructions stored in the memory and executing the steps included in the method of any one of the first and second aspects according to the obtained program instructions.
In a sixth aspect, the present application provides a computer readable storage medium having stored thereon a computer program comprising program instructions which, when executed by a computer, cause the computer to perform the method of any one of the first and second aspects.
In a seventh aspect, the present application provides a computer program product comprising: computer program code which, when run on a computer, causes the computer to perform the method of any one of the first and second aspects.
Drawings
Fig. 1a is an overall flowchart of a method for configuring buried point data according to an embodiment of the present disclosure;
FIG. 1b is a schematic diagram of a specified click event provided by an embodiment of the present application;
fig. 1c is a schematic view illustrating a report of a specified click event according to an embodiment of the present application;
fig. 1d is a schematic diagram of a switch control provided in an embodiment of the present application;
fig. 2 is an overall flowchart of a method for obtaining buried point data according to an embodiment of the present disclosure;
fig. 3 is a structural diagram of an apparatus 300 for configuring embedded data according to an embodiment of the present application;
fig. 4 is a structural diagram of an apparatus 400 for acquiring buried point data according to an embodiment of the present application;
fig. 5 is a structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions in the embodiments of the present application will be described clearly and completely with reference to the accompanying drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. In the present application, the embodiments and features of the embodiments may be arbitrarily combined with each other without conflict. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
The terms "first" and "second" in the description and claims of the present application and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the term "comprises" and any variations thereof, which are intended to cover non-exclusive protection. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. The term "a plurality" in the present application may mean at least two, for example, two, three or more, and the embodiments of the present application are not limited.
In the technical scheme, the data acquisition, transmission, use and the like meet the requirements of relevant national laws and regulations.
As mentioned above, in the related art, data acquisition is performed by means of code embedding. According to the method, a buried point code needs to be added into a service code of a page node, and when an event to be acquired occurs, relevant data of the event is acquired through the buried point code. In practical application, user behaviors which need to be collected and the number of related page nodes are huge, and the point burying mode writes a large number of repeated codes which are irrelevant to service logic in original service codes for burying points, so that the service codes are more invasive. This makes the service code and the embedded point code have high coupling, which is not beneficial to the maintenance of the service code.
In order to solve the above problems, the inventive concept of the present application is: after a target event set of a specified browser is obtained, a preset classification of each target event in the target event set is determined. And aiming at each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event so as to collect and report buried point data of the target event corresponding to the preset trigger mark to a server based on a pre-configured capture function after the page of the specified browser is initialized. According to the method, the target event is embedded in the configuration file, the business code of the specified browser does not need to be modified, and the invasion to the business code is reduced.
Fig. 1a schematically illustrates a flow chart of a method for configuring buried point data according to an embodiment of the present application. As shown in fig. 1a, the method comprises the following steps:
step 101: acquiring a target event set of a designated browser, and determining a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
the method includes the steps that target events executed by a representation user in a specified browser are classified in advance, and the preset classification of the target events at least comprises the following steps: specifying click events, page view events, and interface call events.
The specified click event is an event triggered by a user clicking a specified control in a browser page, specifically, multiple commodities such as commodities 1 to N are displayed in a commodity selling page shown in fig. 1b, wherein a commodity 2 is a specified commodity, a "commodity detail" key of the commodity 2 is a specified control, and the user's interest level in the specified commodity can be obtained by monitoring the click behavior of the user on the specified control. The page browsing event represents the user operation triggered by the user on the specified browsing interface, and the event can be specifically divided into the number of times of access, the stay time and the like of the user to the specified browsing interface. The interface calling event is a call of a user to a specified interface, for example, the user can check the latest commodity selling activity by clicking the activity profile. The user's query for the activity profile is a call to a specified interface.
Step 102: and for each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event so as to acquire buried point data of the target event corresponding to the preset trigger mark based on a pre-configured capture function and report the buried point data to a server after the page of the specified browser is initialized.
As mentioned above, in the related art, data acquisition is performed by means of code embedding. According to the method, a buried point code needs to be added into a service code of a page node, and when an event to be acquired occurs, relevant data of the event is acquired through the buried point code.
In order to solve the above problem, in the embodiment of the present application, a preset trigger of a target event is configured in a configuration file according to a preset classification of the target event. Specifically, each page in the service code of the front-end page basically has at least a page Class name (Class) or a unique page Identifier (ID), so that in order to ensure capture of buried point data of the target event, when the preset classification of the target event is a specified click event, the page Class name or the unique page identifier of the target event in a specified browser can be used as a preset trigger mark of the target event. Correspondingly, when the preset classification of the target event is a page browsing event, a route (path) corresponding to the target event can be used as a preset trigger of the target event. When the preset classification of the target event is an interface call event, a Uniform Resource Locator (URL) address corresponding to the target event may be used as a preset trigger of the target event.
The process buries a point in a configuration file in advance, takes a preset trigger mark of a target event as a key, and buries point data of the target event as a value to be mapped into a hash table, so that when the preset trigger mark of the target event is triggered, the buries point data corresponding to the target event can be collected in real time and reported to a server through a pre-configured reporting interface.
In order to apply more application scenarios, the specified click event of the page child node may be set to trigger the specified click event of the parent node, for example, in the goods sale page shown in fig. 1c, the specified control of "goods details" is named Class1 in the service code of the page, and the specified control of "purchase" is named Class2 in the page. Assume that Class2 is nested below Class1 in the business code of the page, i.e., Class1 is the parent node of Class 2. After the specified click events of commodity details and purchase are simultaneously subjected to point burying, the user clicks the purchase to trigger the point burying data report of the specified click event. That is, the number of times of purchasing the commodity is reported plus one, and the number of times of browsing the details of the commodity is reported plus one.
Further, after the preset trigger flag of the target event is configured in the configuration file, a switch control may also be set for the target event, where the switch control includes a custom switch function and a switch key value. Specifically, a user-defined switch function may be set by the user, the user-defined switch function is used to determine the on-off condition of the switch control, and the switch values may be set to 1 and 0. 1 represents an opening switch control, and 0 represents a closing switch control.
In the goods selling page shown in fig. 1d, if the number of clicks of the specified control "goods details" by the user is desired to be known, a buried point may be set for the click behavior of the specified control by the user. During implementation, the preset classification of the target event corresponding to the clicking behavior of the specified control by the user is the specified clicking event, so that the page class name corresponding to the specified control, namely 'commodity details', can be added to the configuration file. Further, a switch control can be set for the specified click event according to the requirements of the user.
For example, if a user wants to know the number of times of clicking the commodity details by the member user, a judgment condition for the user login identity can be set in a custom function of the switch control, when clicking of the specified control of the commodity details is triggered, the user login identity is judged through the custom function, if the login identity of the user is a non-member or a tourist, a starting key value 0 is returned, namely the switch is turned off, the buried point data of the specified clicking event cannot be collected and reported, otherwise, when the user login identity is a member, a starting key value 1 is returned, and the specified clicking event can be collected and reported.
In addition, the embodiment of the application also supports the user-defined configuration of the capture function of the target event by the user and the user-defined configuration of the target event to the specified interface for reporting the buried point data. During implementation, the method for collecting the buried point data can be edited in the function () by self, so that the buried point data can be collected in a user-defined manner according to the requirements of a user. Correspondingly, the buried point data of the target event can be reported through a reporting interface defined by a user after collection. If the user does not set the self-defined interface, the buried point data can be reported by adopting a default interface of the server.
According to the method, the target event is embedded in the configuration file, the business code of the specified browser does not need to be increased or changed, and the invasion to the business code is reduced. And the method supports the user-defined collection of the target event buried point data, and is easier to meet the requirements of users.
Based on the same inventive concept, the embodiment of the present application provides a method for obtaining buried point data, specifically as shown in fig. 2, including the following steps:
step 201: responding to a buried point data acquisition request issued aiming at a target event, and acquiring a preset trigger mark of the buried point data corresponding to the target event;
after the buried point data is configured by adopting the steps of the steps 101 to 102, the initialization operation can be carried out on the specified browser. And the initialized specified browser monitors a preset trigger mark which is configured in the configuration file in real time.
Step 202: monitoring the trigger state of the preset trigger mark, if the preset trigger mark is triggered, acquiring buried point data of a target event corresponding to the trigger mark according to a preset capture function, and reporting the buried point data to a server.
In some possible embodiments, the target event comprises at least: specifying a click event, a page browsing event and an interface calling event; the obtaining of the preset trigger mark of the target event corresponding to the buried point data includes:
if the target event is the specified click event, taking a page class name or a page unique identifier corresponding to the target event as a preset trigger mark of the target event;
if the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
Specifically, if it is monitored that the preset trigger mark is triggered, the target event corresponding to the preset trigger mark is determined based on the triggered preset trigger mark. For example, if the triggered preset trigger is monitored to be a page Class name (Class) or a page unique Identifier (ID), the corresponding target event is determined to be an appointed click event. Correspondingly, if the triggered preset trigger mark is a route, determining that the corresponding target event is a page browsing event. And if the triggered preset trigger mark is the URL address, determining that the corresponding target event is an interface calling event.
The above process can accurately acquire the target event currently triggered by the user by monitoring the preset trigger mark, and further collect the buried point data generated by triggering the target event.
In some possible embodiments, before the collecting the buried point data of the target event corresponding to the trigger flag according to the preconfigured capture function and reporting the collected buried point data to the server, the method further includes:
and determining that the switch control of the target event corresponding to the trigger mark is in an on state.
In some possible embodiments, the reporting the collected buried point data to a server includes:
determining a reporting interface of the buried point data corresponding to a target event;
reporting the buried point data to the server by adopting the reporting interface; the reporting interface is a user-defined interface set by a user or a default interface of the server.
After the buried point data is collected, the buried point data is reported to the server according to a reporting interface set by a user. The embodiment of the application supports user-defined setting of the reporting interface by a user. If the user does not set the self-defined interface, the buried point data can be reported by adopting a default interface of the server.
Based on the same inventive concept, the embodiment of the present application provides a device 300 for configuring buried point data, specifically as shown in fig. 3, including:
a category obtaining module 301, configured to perform obtaining a target event set of a specified browser, and determine a preset category of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
the event configuration module 302 is configured to execute, for each target event, configuring a preset trigger flag of the target event in a configuration file according to a preset classification of the target event, so that after the page of the specified browser is initialized, acquiring buried point data of the target event corresponding to the preset trigger flag based on a preconfigured capture function, and reporting the buried point data to a server.
In some possible embodiments, the preset classification of the target event comprises at least: specifying a click event, a page browsing event and an interface calling event;
executing the preset trigger flag for configuring the target event in a configuration file according to the preset classification of the target event, wherein the event configuration module 302 is configured to:
if the preset classification of the target event is the specified click event, taking a page class name or a page unique identifier of the target event in the specified browser as a preset trigger mark of the target event;
if the preset classification of the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the preset classification of the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
In some possible embodiments, after performing the configuring the preset trigger flag of the target event in the configuration file according to the preset classification of the target event, the event configuring module 302 is further configured to:
setting a switch control for the target event;
before the capture function based on the pre-configuration is executed to collect the buried point data of the target event corresponding to the preset trigger mark, the event configuration module 302 is further configured to:
and determining that the switch control of the target event is in an opening state.
In some possible embodiments, the switch control includes a custom switch function and an on-off key value, and the custom switch function is used for determining an on-off condition of the switch control.
In some possible embodiments, after performing the configuring the preset trigger flag of the target event in the configuration file according to the preset classification of the target event, the event configuring module 302 is further configured to:
configuring a designated interface for reporting buried point data for the target event; the specified interface is a custom interface set by a user or a default interface of the server.
Based on the same inventive concept, an embodiment of the present application provides an apparatus 400 for obtaining buried point data, specifically as shown in fig. 4, including:
the event determining module 401 is configured to execute a preset trigger flag for acquiring buried point data corresponding to a target event in response to a buried point data acquisition request issued for the target event;
and the data acquisition module 402 is configured to monitor a trigger state of the preset trigger flag, and if the preset trigger flag is monitored to be triggered, acquire buried point data of a target event corresponding to the trigger flag according to a preset capture function, and report the buried point data to a server.
In some possible embodiments, the target event comprises at least: specifying a click event, a page browsing event and an interface calling event;
executing the preset trigger flag of the target event corresponding to the obtained buried point data, where the event determination module 401 is configured to:
if the target event is the specified click event, taking a page class name or a page unique identifier corresponding to the target event as a preset trigger mark of the target event;
if the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
In some possible embodiments, before the collecting of the buried point data of the target event corresponding to the trigger flag according to the preconfigured capture function is executed and reported to the server, the data collecting module 402 is further configured to:
and determining that the switch control of the target event corresponding to the trigger mark is in an on state.
In some possible embodiments, performing the reporting of the collected buried point data to a server, the data collection module 402 is configured to:
determining a reporting interface of the buried point data corresponding to a target event;
reporting the buried point data to the server by adopting the reporting interface; the reporting interface is a user-defined interface set by a user or a default interface of the server.
The electronic device 130 according to this embodiment of the present application is described below with reference to fig. 5. The electronic device 130 shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the electronic device 130 is represented in the form of a general electronic device. The components of the electronic device 130 may include, but are not limited to: the at least one processor 131, the at least one memory 132, and a bus 133 that connects the various system components (including the memory 132 and the processor 131).
Bus 133 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
The memory 132 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1321 and/or cache memory 1322, and may further include Read Only Memory (ROM) 1323.
Memory 132 may also include a program/utility 1325 having a set (at least one) of program modules 1324, such program modules 1324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The electronic device 130 may also communicate with one or more external devices 134 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with the electronic device 130, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 130 to communicate with one or more other electronic devices. Such communication may occur via input/output (I/O) interfaces 135. Also, the electronic device 130 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 136. As shown, network adapter 136 communicates with other modules for electronic device 130 over bus 133. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 130, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 132 comprising instructions, executable by the processor 131 of the apparatus 400 to perform the above-described method is also provided. Alternatively, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, there is also provided a computer program product comprising computer programs/instructions which, when executed by the processor 131, implement any one of a method of configuring buried point data or a method of obtaining buried point data as provided herein.
In exemplary embodiments, various aspects of a method for configuring or acquiring buried point data provided by the present application may also be implemented in the form of a program product including program code for causing a computer device to perform the steps in a method for configuring or acquiring buried point data according to various exemplary embodiments of the present application described above in this specification when the program product is run on the computer device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for configuration of buried point data or acquisition of buried point data of the embodiments of the present application may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on an electronic device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "for example" programming language or similar programming languages. The program code may execute entirely on the consumer electronic device, partly on the consumer electronic device, as a stand-alone software package, partly on the consumer electronic device and partly on a remote electronic device, or entirely on the remote electronic device or server. In the case of remote electronic devices, the remote electronic devices may be connected to the consumer electronic device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to external electronic devices (e.g., through the internet using an internet service provider).
It should be noted that although several units or sub-units of the apparatus are mentioned in the above detailed description, such division is merely exemplary and not mandatory. Indeed, the features and functions of two or more units described above may be embodied in one unit, according to embodiments of the application. Conversely, the features and functions of one unit described above may be further divided into embodiments by a plurality of units.
Further, while the operations of the methods of the present application are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable image scaling apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable image scaling apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable image scaling apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable image scaling device to cause a series of operational steps to be performed on the computer or other programmable device to produce a computer implemented process such that the instructions which execute on the computer or other programmable device provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (14)

1. A method for configuring buried point data, the method comprising:
acquiring a target event set of a designated browser, and determining a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
and for each target event, configuring a preset trigger mark of the target event in a configuration file according to the preset classification of the target event so as to acquire buried point data of the target event corresponding to the preset trigger mark based on a pre-configured capture function and report the buried point data to a server after the page of the specified browser is initialized.
2. The method according to claim 1, wherein the preset classification of the target event comprises at least: specifying a click event, a page browsing event and an interface calling event; the configuring, in a configuration file, a preset trigger of the target event according to the preset classification of the target event includes:
if the preset classification of the target event is the specified click event, taking a page class name or a page unique identifier of the target event in the specified browser as a preset trigger mark of the target event;
if the preset classification of the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the preset classification of the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
3. The method according to claim 1, wherein after configuring the preset trigger flag of the target event in a configuration file according to the preset classification of the target event, the method further comprises:
setting a switch control for the target event;
before the acquiring of the buried point data of the target event corresponding to the preset trigger mark based on the preconfigured capture function, the method further includes:
and determining that the switch control of the target event is in an opening state.
4. The method of claim 3, wherein the switch control comprises a custom switch function and an on-off key value, and wherein the custom switch function is used to determine an on-off condition of the switch control.
5. The method according to any one of claims 1-4, wherein after configuring the preset trigger flag of the target event in a configuration file according to the preset classification of the target event, the method further comprises:
configuring a designated interface for reporting buried point data for the target event; the designated interface is a custom interface set by a user or a default interface of the server.
6. A method for acquiring buried point data is characterized by comprising the following steps:
responding to a buried point data acquisition request issued aiming at a target event, and acquiring a preset trigger mark of the buried point data corresponding to the target event;
monitoring the trigger state of the preset trigger mark, if the preset trigger mark is triggered, acquiring buried point data of a target event corresponding to the trigger mark according to a preset capture function, and reporting the buried point data to a server.
7. The method of claim 6, wherein the target event comprises at least: specifying a click event, a page browsing event and an interface calling event; the obtaining of the preset trigger mark of the target event corresponding to the buried point data includes:
if the target event is the specified click event, taking a page class name or a page unique identifier corresponding to the target event as a preset trigger mark of the target event;
if the target event is the page browsing event, taking a route corresponding to the target event as a preset trigger mark of the target event;
and if the target event is the interface calling event, taking a Uniform Resource Locator (URL) address corresponding to the target event as a preset trigger mark of the target event.
8. The method of claim 6, wherein before collecting the buried point data of the target event corresponding to the trigger according to a pre-configured capture function and reporting the buried point data to the server, the method further comprises:
and determining that the switch control of the target event corresponding to the trigger mark is in an on state.
9. The method according to any one of claims 6-8, wherein reporting the collected buried point data to a server comprises:
determining a reporting interface of the buried point data corresponding to a target event;
reporting the buried point data to the server by adopting the reporting interface; the reporting interface is a user-defined interface set by a user or a default interface of the server.
10. An apparatus for deploying buried point data, the apparatus comprising:
the system comprises a classification acquisition module, a classification acquisition module and a classification analysis module, wherein the classification acquisition module is configured to execute acquisition of a target event set of a specified browser and determine a preset classification of each target event in the target event set; each target event is an event generated by executing a specified operation on the specified browser;
and the event configuration module is configured to execute configuring a preset trigger mark of each target event in a configuration file according to the preset classification of the target event so as to acquire and report buried point data of the target event corresponding to the preset trigger mark to a server based on a pre-configured capture function after the page of the specified browser is initialized.
11. An apparatus for obtaining buried point data, the apparatus comprising:
the event determining module is configured to execute a preset trigger mark of the buried point data corresponding to the target event in response to a buried point data obtaining request issued aiming at the target event;
and the data acquisition module is configured to monitor the trigger state of the preset trigger mark, and if the preset trigger mark is monitored to be triggered, the data acquisition module acquires the buried point data of the target event corresponding to the trigger mark according to a pre-configured capture function and reports the buried point data to the server.
12. An electronic device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory and for executing the steps comprised by the method of any one of claims 1 to 9 in accordance with the obtained program instructions.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a computer, cause the computer to perform the method of any of claims 1-9.
14. A computer program product, the computer program product comprising: computer program code which, when run on a computer, causes the computer to perform the method according to any of the preceding claims 1-9.
CN202210197830.2A 2022-03-02 2022-03-02 Method, device, equipment and medium for configuring and acquiring buried point data Pending CN114579415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210197830.2A CN114579415A (en) 2022-03-02 2022-03-02 Method, device, equipment and medium for configuring and acquiring buried point data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210197830.2A CN114579415A (en) 2022-03-02 2022-03-02 Method, device, equipment and medium for configuring and acquiring buried point data

Publications (1)

Publication Number Publication Date
CN114579415A true CN114579415A (en) 2022-06-03

Family

ID=81771506

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210197830.2A Pending CN114579415A (en) 2022-03-02 2022-03-02 Method, device, equipment and medium for configuring and acquiring buried point data

Country Status (1)

Country Link
CN (1) CN114579415A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510352A (en) * 2022-11-15 2022-12-23 中国外运股份有限公司 User behavior acquisition method and device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510352A (en) * 2022-11-15 2022-12-23 中国外运股份有限公司 User behavior acquisition method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US8640037B2 (en) Graphical overlay related to data mining and analytics
CN107480277B (en) Method and device for collecting website logs
CN113987074A (en) Distributed service full-link monitoring method and device, electronic equipment and storage medium
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
US20110161395A1 (en) Synthetic transaction monitoring and management of scripts
CN110704097A (en) Data collection method and device, electronic equipment and storage medium
US10291492B2 (en) Systems and methods for discovering sources of online content
CN115033876A (en) Log processing method, log processing device, computer device and storage medium
WO2013143407A1 (en) Data processing, data collection
CN114579415A (en) Method, device, equipment and medium for configuring and acquiring buried point data
CN110674045B (en) Information tracking detection method and device, electronic equipment and storage medium
Diakun et al. Splunk Operational Intelligence Cookbook
CN111797340A (en) Service packaging system for user-defined extraction flow
CN113515715B (en) Buried point event code generation method, buried point event code processing method and related equipment
CN115563423A (en) Data acquisition method and device, computer equipment and storage medium
Kumar et al. A brief investigation on web usage mining tools (WUM)
CN110554892A (en) Information acquisition method and device
KR102349495B1 (en) A computer system and method for processing large log files from virtual servers.
CN105262829B (en) Geographical position monitoring method and system
US20220405157A1 (en) System, device, method and datastack for managing applications that manage operation of assets
CN111767447A (en) Method and device for determining user traffic path
KR102620885B1 (en) System for providing channel management service based on robotic process automation
CN109799981A (en) A kind of integrated system and method based on execution chain
KR102278878B1 (en) Server for generating integrated usage log data and operating method thereof
CN110569459A (en) statistical method and device for webpage information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination