CN115442225A - Method and device for reporting buried point log and method and device for monitoring buried point quality - Google Patents

Method and device for reporting buried point log and method and device for monitoring buried point quality Download PDF

Info

Publication number
CN115442225A
CN115442225A CN202210917829.2A CN202210917829A CN115442225A CN 115442225 A CN115442225 A CN 115442225A CN 202210917829 A CN202210917829 A CN 202210917829A CN 115442225 A CN115442225 A CN 115442225A
Authority
CN
China
Prior art keywords
event
buried point
session
reporting
reported
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210917829.2A
Other languages
Chinese (zh)
Inventor
黄成康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shuhe Information Technology Co Ltd
Original Assignee
Shanghai Shuhe Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shuhe Information Technology Co Ltd filed Critical Shanghai Shuhe Information Technology Co Ltd
Priority to CN202210917829.2A priority Critical patent/CN115442225A/en
Publication of CN115442225A publication Critical patent/CN115442225A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application relates to a method and a device for reporting a buried point log and a method and a device for monitoring buried point quality. The method for reporting the buried point log comprises the following steps: responding to the generation of the session, configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of the buried point events generated in the session; according to the sequence of the buried point events generated in the session, distributing corresponding event sequence numbers for the generated buried point events; controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter; and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server. By adopting the method, the quality monitoring of the buried point data can be realized.

Description

Method and device for reporting buried point log and method and device for monitoring buried point quality
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for reporting a buried point log, and a method and an apparatus for monitoring buried point quality.
Background
With the development of data processing technology, user behavior data acquisition technology appears, user behavior data can also be called buried point data, and characteristics and behaviors of users can be analyzed by analyzing the acquired buried point data, so that personalized schemes are provided for different users.
However, the quality of the buried point data affects the accuracy of the user's personalized analysis, and thus the business decision. In the conventional technology, there is no scheme for monitoring the quality of the buried point data, and if the buried point data is not reported to the server in time or the buried point data of the terminal is abnormal and cannot be reported to the server, the service decision result is likely to be affected. For example, for the test of an AB scheme, the effect of the a scheme is better in practice, but the effect of the a scheme is weakened when the actual decision is made due to poor quality of the buried point data corresponding to the a scheme and serious leakage, so that the accuracy of the decision is affected.
Disclosure of Invention
Therefore, in order to solve the above technical problems, it is necessary to provide a method, an apparatus, a computer device, and a storage medium for reporting a buried point log, which can improve efficiency of monitoring the buried point data quality, and also provide a method, an apparatus, a computer device, and a storage medium for monitoring the buried point data quality, which can improve accuracy of user behavior analysis and business decision.
A reporting method for a buried point log comprises the following steps:
responding to the generation of the session, configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of buried point events generated in the session;
according to the sequence of the embedded point events generated in the session, distributing corresponding event sequence numbers for the generated embedded point events;
controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter;
and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server.
In one embodiment, the buried point log further includes at least one of a source of the buried point event, a session identifier, a terminal reporting time, and a buried point event generation time.
In one embodiment, the method further comprises: and in response to the success of the reporting server, deleting the reported data of the embedded point event cached by the terminal.
In one embodiment, the method further comprises: and responding to the failure of the report server, and reporting again according to a preset retry rule.
A method of buried point quality monitoring, the method comprising:
receiving a buried point log reported by a terminal, wherein the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is distributed to a session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is distributed to the generated buried point event according to the sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event;
counting the actual reported number of the embedded point events reported to the server within a specified time period;
calculating the quantity to be reported of the embedded point events which should be reported to the server in a specified time period according to the current count value and the event sequence number of the embedded point events;
and generating quality monitoring indexes according to the actual reporting quantity and the sum of the reporting quantity, and monitoring the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
In one embodiment, the step of calculating the quantity to be reported of the embedded point events to be reported to the server in the specified time period according to the current count value and the event sequence number of the embedded point events includes:
grouping event sequence numbers of the embedded point events according to the session identification of each session;
respectively determining the minimum event sequence number from the event sequence numbers of the buried point events corresponding to all the sessions;
obtaining the reported number of the sessions of each session according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session;
and summing the number to be reported of each session to obtain the number to be reported.
In one embodiment, the step of generating the quality monitoring indicator according to the actual reporting quantity and the reporting quantity includes:
and obtaining the leakage quantity of the buried point events in the specified time period according to the difference value between the actual reporting quantity and the corresponding reporting quantity, and taking the leakage quantity as a quality monitoring index.
In one embodiment, the burial point log further includes a terminal reporting time and a burial point event generation time, and the method further includes:
and calculating the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generation time, determining the delay quantity of the buried point event which is reported in a delayed mode within a specified time period according to the delay time, and taking the delay quantity as a quality monitoring index.
In one embodiment, the method further comprises:
and performing visualization processing on the quality monitoring indexes and displaying the quality monitoring indexes.
In one embodiment, the method further comprises:
and generating alarm information in response to the quality monitoring index exceeding a preset alarm threshold.
A device for reporting a buried point log comprises:
the counter configuration module is used for responding to the generation of the session and configuring a corresponding global counter for the session, and the global counter is used for counting the number of the buried point events generated in the session;
the event sequence number distribution module is used for distributing a unique corresponding event sequence number for the generated buried point event according to the sequence of the buried point event generated in the session;
the sequence number and count unification module is used for controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter;
and the embedded point log reporting module is used for responding to a triggering reporting instruction, generating an embedded point log according to the event sequence number of the embedded point event in the specified time period and the current count value, and reporting the embedded point log to the server.
A buried site quality monitoring device, the device comprising:
the embedded point log receiving module is used for receiving an embedded point log reported by a terminal, the embedded point log is generated according to an event sequence number of an embedded point event in a specified time period and a current count value of a global counter, the global counter is distributed to a session when the session is generated, the global counter is used for counting the number of the embedded point events generated in the session, the event sequence number of the embedded point event is distributed to the generated embedded point events according to the sequence of the embedded point events generated in the session, and the current count value is consistent with the event sequence number of the current embedded point event;
the actual reporting quantity counting module is used for counting the actual reporting quantity of the embedded point events reported to the server within a specified time period;
the quantity to be reported calculating module is used for calculating the quantity to be reported of the embedded point events reported to the server in a specified time period according to the current count value and the event sequence number of the embedded point events;
and the buried point quality monitoring module is used for generating quality monitoring indexes according to the actual reported quantity and the reported quantity and monitoring the quality of the data of the buried point event in the specified time period according to the quality monitoring indexes.
A computer device comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the steps of the embedded point log reporting method of any one of 1 to 3 or the steps of the embedded point quality monitoring method of any one of 4 to 8 when executing the computer program.
A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the method for reporting a buried point log according to any one of 1 to 3, or the steps of the method for monitoring quality of a buried point according to any one of 4 to 8.
The method, the device, the computer equipment and the storage medium for reporting the embedded point logs are characterized in that corresponding global counters are configured for the sessions, the number of the embedded point events generated in the sessions is counted in real time, event sequence numbers are sequentially distributed for the embedded point events in the sessions according to the generated sequence, the embedded point logs are generated according to the event sequence numbers and the current count values of the global counters, and even if the problems of delay, interruption or omission and the like exist in the reporting process, the embedded point logs containing the event sequence numbers and the current count values can clearly present the relation between the number of the generated embedded point events in the sessions and the number of the reported embedded point events, so that the server can further efficiently monitor the embedded point events and the corresponding data thereof according to the content in the embedded point logs. On the other hand, the buried point quality monitoring method, the buried point quality monitoring device, the computer equipment and the storage medium can obtain the quality monitoring index by calculating the actual reporting quantity and the actual reporting quantity according to the received buried point log, and perform user behavior analysis and service decision based on the quality monitoring index, so that the reliability and the accuracy of an analysis result can be improved.
Drawings
Fig. 1 is an application environment diagram of a reporting method of a buried point log in an embodiment;
fig. 2 is a schematic flow chart of a reporting method of a buried point log in an embodiment;
FIG. 3 is a diagram illustrating a reporting method of a point burying event in the prior art;
fig. 4 is a schematic diagram illustrating a reporting method of a point burying log according to an embodiment of the present application;
FIG. 5 is a schematic flow chart diagram illustrating a method for embedded point quality monitoring in one embodiment;
FIG. 6 is a schematic diagram of an application environment of a buried point quality monitoring method in an application example;
fig. 7 is a block diagram illustrating a structure of a device for reporting a buried point log according to an embodiment;
FIG. 8 is a block diagram of a buried site quality monitoring apparatus in one embodiment;
FIG. 9 is a diagram showing an internal structure of a computer device in one embodiment;
FIG. 10 is a diagram showing an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The method for reporting the embedded point log and the method for monitoring the embedded point quality can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, the terminal 102 may configure a corresponding global counter for the session in response to the session generation, where the global counter is used to count the number of buried point events generated in the session; according to the sequence of the buried point events generated in the session, allocating a unique corresponding event sequence number for the generated buried point events; controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter; and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to the server 104.
In one embodiment, the server 104 receives a buried point log reported by the terminal 102, the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is allocated to a session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is allocated to the generated buried point event according to the sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event; the server 104 counts the actual reporting number of the embedded point events reported to the server 104 within a specified time period; calculating the quantity to be reported of the embedded point events which should be reported to the server 104 in a specified time period according to the current count value and the event sequence number of the embedded point events; the server 104 generates quality monitoring indexes according to the actual reporting quantity and the corresponding reporting quantity, and monitors the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
In one embodiment, as shown in fig. 2, a method for reporting a buried point log is provided, which is described by taking the application of the method to the terminal in fig. 1 as an example, and includes the following steps:
step S202: in response to session generation, a corresponding global counter is configured for the session, the global counter being used to count the number of buried point events generated within the session.
The Session (Session) is an uninterrupted request response sequence between the client and the server, and the client loaded on the terminal can generate one Session each time the client is started, and each Session uniquely corresponds to one Session ID (Identity). The global counter is configured to uniquely correspond to the generated session, coexist with the session in the life cycle of the session, and count the number of buried point events generated in the life cycle of the session, wherein the count value of the global counter is added by one and accumulated sequentially every time one buried point event is generated in the life cycle of the session. The buried point event is an event generated when a user behavior operation triggers the buried point, and corresponding data obtained when the buried point event is generated may be referred to as buried point data.
Specifically, the terminal responds to the generation of the session, configures a unique corresponding global counter for the generated session, the global counter coexists with the session in the life cycle of the session, is used for counting the number of buried point events generated in the life cycle of the session, and ends counting when the life cycle of the session is ended.
Step S204: and distributing corresponding event sequence numbers for the generated embedded point events according to the sequence of the embedded point events generated in the session.
In a session, one event sequence number corresponds to one embedded point event one by one, and the event sequence number is used for numbering the embedded point events generated in the session in sequence according to the generated sequence.
Specifically, in response to a buried point event being generated in the current session, the terminal may assign a corresponding event sequence number to the generated buried point event, and the event sequence number assigned to the generated buried point event is greater than the event sequence number assigned to the generated buried point event.
Step S204: and controlling the event sequence number of the current buried point event to be consistent with the current count value of the global counter.
The current buried point event refers to a buried point event generated at the current time, that is, a newly generated buried point event. The current count value of the global counter refers to the cumulative statistics of the global counter at the current time, i.e. the total statistics including the newly generated buried point events.
Specifically, in response to the generation of a buried point event in the session, the terminal allocates an event sequence number to the currently generated current buried point event, and at the same time, the terminal controls the count value of the global counter corresponding to the session to be incremented by one, and after the count value is incremented by one, the current count value of the global counter is consistent with the event sequence number allocated to the current buried point event.
Illustratively, in response to the generation of the current buried point event, the current buried point event is the 5 th buried point event generated in the session, the terminal assigns an event sequence number (for example, denoted by "eventNo") to the current buried point event to be 5, and at the same time, the count value of the global counter is correspondingly incremented by one, and the obtained current count value (for example, denoted by "globalEventNo") is also 5.
Step S204: and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server.
The buried point log is a log used for recording a buried point event and a generation process of data (buried point data) corresponding to the buried point event. The specified time period refers to a time period which is expected to be reported and corresponds to a currently triggered reporting instruction according to a preset reporting rule. The reporting rule may be set in a customized manner according to the service requirement, for example, the reporting rule may be set to trigger reporting every 3 s.
Specifically, when the reporting instruction is triggered, the terminal may obtain an event sequence number of each embedded point event in the session within a specified time period, obtain a current count value of a global counter of the session, respectively use the event sequence number and the current count value of each embedded point event as log fields, generate an embedded point log, and report the generated embedded point log to the server.
The method for reporting the buried point logs allocates the corresponding global counters for the sessions, counts the number of the buried point events generated in the sessions in real time, sequentially allocates the event sequence numbers for the buried point events in the sessions according to the generated sequence, and generates the buried point logs according to the event sequence numbers and the current count values of the global counters.
In one embodiment, the buried point log further includes at least one of a source of the buried point event, a session identifier, a terminal reporting time, and a buried point event generation time.
The session identifier refers to an identity identifier of a session, that is, a session ID, and since a plurality of different sessions may exist at the same time in a specified time period, the plurality of sessions may be from the same service of the same terminal, or from different services of the same terminal, or from the same service of different terminals, or from different services of different terminals, or the like. The buried point event source is used to identify the source of each buried point event, e.g., application, applet, or web page, etc. The terminal reporting time refers to the time of the terminal when the reporting instruction is triggered. The buried point event generation time refers to the time of the terminal when each buried point event is triggered to be generated.
Illustratively, the buried point log generated by the method of the present application may include the following fields:
1. uploadTimestamp (terminal reporting time)
2. eventNo (event number of buried event)
3. globaleeventno (current count value of global counter)
4. correlationId (Session ID)
5. eventSource (buried event source)
In one embodiment, the method further comprises: in response to the success of the reporting server, deleting the reported data of the embedded point event cached by the terminal; and/or, in response to the failure of reporting the server, reporting again according to a preset retry rule.
In this embodiment, if the reporting server is successful, the relevant data of the reported embedded point event can be timely deleted from the terminal cache, and since the embedded point log already contains the relevant data capable of reflecting the reporting quality, even if the embedded point log is deleted, the subsequent analysis is not affected, and the cache can be timely released. If the report server fails, the report server may report again according to the retry rule, for example, the retry rule may be: and after 3 times of retry, the report is abandoned if the failure still occurs.
In the following, the method for reporting a fixed point log according to the present application is further described in detail with reference to an application example. Comparing fig. 3 and fig. 4, fig. 3 shows a schematic diagram of a reporting method of a buried point event in the conventional technology, and fig. 4 shows a schematic diagram of a reporting method of a buried point log according to an embodiment of the present invention.
As shown in fig. 3, a user interacts with a terminal 302, generates a user behavior by operating an APP (Application), thereby triggering a buried point of the terminal 302, generating a new buried point event, adding the newly generated buried point event into a buried point event queue in a cache of the terminal 302, triggering reporting every 3s according to a rule configured for a timer 306 in advance, for example, batch-packing the buried point events in the buried point event queue to generate a buried point packet, and then uploading the buried point packet to a server 304.
As shown in fig. 4, a user interacts with a terminal 402, and each time a session (not shown in the figure) is started, a global counter 406 is configured for the started session, the user operates an APP (Application), generates a user behavior, triggers a buried point of the terminal 402, generates a new buried point event, configures a corresponding event sequence number for the newly generated buried point event, controls a current count value of the global counter 406 to be consistent with the event sequence number corresponding to the newly generated buried point event according to the event sequence number corresponding to the newly generated buried point event, then adds the newly generated buried point event to a buried point event queue in a cache of the terminal 402, triggers reporting once every 3 seconds according to a rule configured for a timer 408 in advance, for example, batches the buried point events in the buried point event queue to generate a buried point packet, obtains the current count value of the global counter and the event sequence number of the buried point event to be packaged to generate a point log when the buried point packet is generated, and reports the buried point log to a server 404 including the buried point.
In another aspect of the present application, there is also provided a buried point quality monitoring method, which is described with reference to fig. 5 by taking the example that the method is applied to the server in fig. 1, and includes the following steps:
step S502: receiving a buried point log reported by a terminal, wherein the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is distributed to a session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is distributed to the generated buried point event according to the sequence of the buried point event in the session, and the current count value is consistent with the event sequence number of the current buried point event.
Specifically, the server receives a buried point log reported by the terminal, and the buried point log may be generated according to an event sequence number of a buried point event within a specified time period and a current count value of the global counter. Illustratively, the process of generating the buried point log may include the steps of: configuring a corresponding global counter for the generated session, wherein the global counter is used for counting the number of buried point events generated in the session; according to the sequence of the embedded point events generated in the session, a unique corresponding event sequence number is distributed for the generated embedded point events, the event sequence number of the current embedded point event is controlled to be consistent with the current count value of the global counter, and an embedded point log is generated according to the event sequence number of the embedded point event in the specified time period and the current count value. More specifically, reference may be made to the description of how to generate the buried point log in the foregoing embodiment, and details are not described herein again.
Step S504: and counting the actual reported number of the embedded point events reported to the server within a specified time period.
The actual reporting quantity refers to the quantity of the embedded point events received by the server, which is obtained by counting the embedded point events reported to the server within a specified time period.
Step S506: and calculating the quantity to be reported of the embedded point events which are to be reported to the server in the appointed time period according to the current count value and the event sequence number of the embedded point events.
The quantity to be reported is the quantity of the embedded point events which should be reported to the server under the condition that the problems of delay, omission, failed uploading or cleaning and the like do not exist.
In particular, the current count value can represent the total number of buried point events generated in the current session
Source of event Session identification Event sequence number Current count value
app A 2 5
app A 3 5
The number of the embedded point events can be analyzed by the event sequence number, so that the number of the embedded point events which should be reported to the server can be calculated according to the number of the embedded point events and the event sequence number.
For example, only one session is available in a specified time period, the minimum event sequence number may be determined from the event sequence numbers of the multiple buried point events corresponding to the session, and then the number to be reported may be calculated according to the current count value of the global counter corresponding to the session and the minimum event sequence number. For example, the data within the statistical window (within a specified time period) is calculated, and the following formula can be referred to:
number to be reported = globaleeventno-minEventNo +1
Wherein, globalEventNo represents the current counting value, and minEventNo represents the minimum event sequence number in the event sequence numbers of the buried point events.
For example, the following flow table information is referred to:
the event sequence numbers of the buried point events uploaded in the specified time period are respectively 2 and 3, the current count value of the global counter with the session ID of a is 5, and the minimum event sequence number of the global counter with the session ID of a is 2, so that the number to be reported in the specified time period of this time is =5-2+1=3 according to the formula, however, only the two buried point events with the event sequence numbers of 2 and 3 and the corresponding data thereof are actually reported, and therefore, the number of missing losses of the buried point events reported in the specified time period of this time can be further determined to be 1.
In one embodiment, the method includes the steps of, in a specific time period, including a plurality of sessions, and calculating the number of buried point events to be reported to the server in the specific time period according to the current count value and the event sequence number of the buried point events, including: grouping event sequence numbers of the embedded point events according to the session identification of each session; respectively determining the minimum event sequence number from the event sequence numbers of the buried point events corresponding to all the sessions; obtaining the number of the sessions to be reported according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session; and summing the number to be reported of each session to obtain the number to be reported.
In this embodiment, a plurality of terminals may exist in the same time period to generate a plurality of sessions, and therefore, the embedded point events of each session may be grouped according to the identification information (session ID) of the session, the number to be reported corresponding to each session, that is, the number to be reported of the session, is calculated in units of sessions, and then the number to be reported in the specified time period is obtained by performing summation calculation.
For example, the following flow table information is referred to:
source of event Session identification Event sequence number Current count value
app A 2 5
app A 3 5
app B 101 102
Uploading the embedded point events from two different sessions in the specified time period, firstly grouping according to the session identifiers, and knowing that the first two embedded point events in the table are from the same session (session with ID of A) and are grouped into one group, the third is a group, and calculating by taking the session as a unit respectively:
session a shall report the number = current count value-minimum event sequence number +1=5-2+1=3;
the number = current count value-minimum event sequence number +1=102-101+1=2 to be reported by session B;
the number to be reported in the specified time period = number to be reported by session a + number to be reported by session B =3+2=5.
Step S508: and generating quality monitoring indexes according to the actual reporting quantity and the sum of the reporting quantity, and monitoring the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
In this step, the server may further calculate a leakage quantity according to a difference between the actual reporting quantity and the reported quantity, where the leakage quantity refers to the quantity of missed reports, and the server may use the leakage quantity as a quality monitoring index, or further calculate a leakage rate according to the leakage quantity, and use the leakage rate as a quality monitoring index, or analyze and process the actual reporting quantity and the reported quantity to generate other indexes capable of representing the reporting leakage condition, and use the other indexes as the quality monitoring indexes, without limitation. The quality monitoring index can reflect the leakage condition of the buried point event reported to the server within a specified time period, so that the quality of the buried point event and the corresponding data (buried point data) of the buried point event can be evaluated according to the quality monitoring index, when user behavior analysis and service decision are carried out, the quality problems of the leakage condition and the like are also taken as one of assessment dimensions while the data quantity of the buried point is considered, the buried point quality monitoring index is added into the analysis, the accuracy and reliability of the user behavior analysis and the service decision can be improved, and the fairness and the accuracy of the analysis result are guaranteed.
In one embodiment, the step of generating the quality monitoring indicator according to the actual reporting quantity and the reporting quantity includes: and obtaining the leakage quantity of the buried point events in the specified time period according to the difference value between the actual reporting quantity and the corresponding reporting quantity, and taking the leakage quantity as a quality monitoring index.
In this embodiment, the leakage quantity reported by the buried point event in the specified time period may be calculated according to the actual reporting quantity and the number to be reported, and the leakage quantity is used as one of the quality monitoring indexes, where the calculation formula of the leakage quantity is as follows:
the number of leakage = number of reports-number of actual reports.
Furthermore, the leakage rate can be calculated according to the actual reported quantity and the reported quantity, and the leakage quantity is also used as one of the quality monitoring indexes, and the calculation formula of the leakage rate is as follows:
loss rate =1- (actual reporting quantity/reporting quantity)
By calculating the leakage quantity or the leakage rate in a specified time period in real time, the leakage condition of a buried point event can be monitored in real time, further the monitoring and analysis of the buried point data can be perfected, and the reliability of real-time business decision is guaranteed.
In one embodiment, the burial point log further includes a terminal reporting time and a burial point event generation time, and the method further includes: and calculating the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generation time, determining the delay quantity of the buried point event which is reported in a delayed mode within a specified time period according to the delay time, and taking the delay quantity as a quality monitoring index.
In this embodiment, the embedded point log may further record the terminal reporting time and the embedded point event generation time. The buried point event generation time refers to an actual generation time of the buried point event, i.e., a time of the terminal when the buried point event is generated. The terminal reporting time refers to the time of the terminal when the buried point event is reported. The delay time refers to the difference between the actual generation time of the buried point event and the actual reporting time reported to the server. In this embodiment, the terminal reporting time is used as the actual reporting time of the buried point event to calculate the delay time, and since the buried point event generation time (event Timestamp) comes from the terminal and the terminal reporting time (upload Timestamp) also comes from the terminal, the calculation of the delay time by using the information recorded from the same terminal can improve the calculation accuracy.
Illustratively, the step of calculating the delay number of the buried point event reported in a delay manner within a specified time period according to the reporting delay time includes: sequentially judging whether each reported buried point event is a delayed reporting event, wherein the judgment logic can be as follows: if the delay time is larger than a preset threshold value, the buried point event is judged to be a delayed reporting event, if the delay time is smaller than the preset threshold value, the buried point event is judged not to be the delayed reporting event, and the number of the delayed reporting events is counted to be used as the delay number.
Furthermore, the delay rate can be calculated according to the delay quantity and the actual reporting quantity, and the delay rate is also used as one of the quality monitoring indexes. The delay rate calculation logic may be: delay amount/actual reporting amount.
If the delay time of the embedded point event and the related data thereof is too long, the server cannot timely capture the user behavior of the terminal, so that the decision accuracy of the real-time business strategy is influenced.
In one embodiment, the method further comprises: and carrying out visual processing on the quality monitoring indexes and displaying the quality monitoring indexes. In this embodiment, the quality monitoring index may be further processed, for example, a leakage rate report and/or a delay rate report is generated and displayed through a visualization platform, so that the quality of the buried point data can be more intuitively displayed, and a visualization support is provided for quality monitoring.
In one embodiment, the method further comprises: and generating alarm information in response to the quality monitoring index exceeding a preset alarm threshold. In this embodiment, an alarm threshold may be preset on the alarm platform, when the quality monitoring index exceeds the preset alarm threshold, alarm information may be generated, and further the alarm information may be sent to configured associated persons, so that the monitoring efficiency may be improved, the discovery rate of the buried point abnormality may be improved, and the occurrence of decision errors may be reduced.
In the following, the buried point quality monitoring method according to the present application is further described in detail with reference to an application example, and referring to fig. 6, fig. 6 shows an application environment schematic diagram of the buried point quality monitoring method in an application example.
As shown in fig. 6, a terminal reports a buried point log to a stats application (status monitoring application), the stats application distributes the buried point log to a buried point log message queue, a server in a Flink computing cluster acquires the buried point log from the buried point log message queue and performs statistical computation to obtain the actual reported number, the number to be reported, the number of leakage, the number of delay, and the like of buried point events in each minute period, distributes the quality monitoring index result obtained by the statistical computation to an index result message queue, a user tracking application (user tracking application) acquires the index result from the index result message queue and stores the index result Data in a DB (Data Base, e.g., a business Database mysql, and then, the business Database may be transferred to an ADB (Analytical Database) through a DTS (Data Transformation Services), and the Data may be visualized on a remote platform after secondary computation, or sent to an alarm platform for alarm processing, and the like.
It should be understood that although the steps in the flowcharts of fig. 2 and 5 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least some of the steps in fig. 2 and 5 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 7, a device for reporting a buried point log is provided, which includes: a counter configuration module 702, an event sequence number allocation module 704, a sequence number and count unification module 706, and a buried point log reporting module 708, wherein:
a counter configuration module 702, configured to configure a corresponding global counter for a session in response to a session generation, where the global counter is used to count the number of buried point events generated in the session;
an event sequence number allocation module 704, configured to allocate a unique corresponding event sequence number to a generated buried point event according to a sequence of the buried point event generated in a session;
a sequence number and count unifying module 706, configured to control an event sequence number of the current buried point event to be consistent with a current count value of the global counter;
and a buried point log reporting module 708, configured to respond to the trigger reporting instruction, generate a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and report the buried point log to the server.
In one embodiment, the buried point log reporting module 708 is further configured to delete the data of the reported buried point event cached by the terminal in response to the success of the reporting server.
In one embodiment, the buried point log reporting module 708 is further configured to, in response to a failure of reporting to the server, report again according to a preset retry rule.
In one embodiment, as shown in fig. 8, there is provided a buried site quality monitoring apparatus comprising: a buried point log receiving module 802, an actual reporting quantity counting module 804, a to-be-reported quantity calculating module 806 and a buried point quality monitoring module 808, wherein:
a buried point log receiving module 802, configured to receive a buried point log reported by a terminal, where the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is allocated to a session when the session is generated, the global counter is used to count the number of buried point events generated in the session, the event sequence number of the buried point event is allocated to the generated buried point event according to a sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event;
an actual reporting number counting module 804, configured to count an actual reporting number of the embedded point events reported to the server within a specified time period;
a quantity-to-be-reported calculating module 806, configured to calculate, according to the current count value and the event sequence number of the buried point event, a quantity-to-be-reported of the buried point event reported to the server within a specified time period;
and a buried point quality monitoring module 808, configured to generate a quality monitoring index according to the actual reported quantity and the reported quantity, and monitor the quality of the data of the buried point event in the specified time period according to the quality monitoring index.
In one embodiment, the to-be-reported number calculating module 806 groups the event sequence numbers of the buried point events according to the session identifier of each session; respectively determining the minimum event sequence number from the event sequence numbers of the buried point events corresponding to all the sessions; obtaining the reported number of the sessions of each session according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session; and summing the reported quantity of each session to obtain the reported quantity.
In one embodiment, the buried point quality monitoring module 808 obtains the leakage quantity of the buried point event in the specified time period according to the difference between the actual reported quantity and the reported quantity, and uses the leakage quantity as the quality monitoring index.
In one embodiment, the buried point quality monitoring module 808 calculates the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generation time, determines the delay number of the buried point event reported in a delay manner within a specified time period according to the delay time, and uses the delay number as the quality monitoring index.
In one embodiment, the buried point quality monitoring module 808 is further configured to perform visualization processing on the quality monitoring index and display the quality monitoring index.
In one embodiment, the buried point quality monitoring module 808 is further configured to generate an alarm message in response to the quality monitoring indicator exceeding a preset alarm threshold.
For specific limitations of the device for reporting the buried point log and the device for monitoring the buried point quality, reference may be made to the above limitations of the method for reporting the buried point log and the method for monitoring the buried point quality, which are not described herein again. All modules in the buried point log reporting device and the buried point quality monitoring device can be wholly or partially realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device comprises a processor, a memory and a network interface which are connected through a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a buried point quality monitoring method.
In one embodiment, a computer device is provided, and the computer device may be a terminal, and the internal structure diagram thereof may be as shown in fig. 10. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to realize a buried point log reporting method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on a shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the configurations shown in fig. 9 and 10 are merely block diagrams of some configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and that a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: responding to the generation of the session, configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of the buried point events generated in the session; according to the sequence of the embedded point events generated in the session, distributing corresponding event sequence numbers for the generated embedded point events; controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter; and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server.
In one embodiment, the processor when executing the computer program further performs the steps of: and in response to the success of the reporting server, deleting the reported data of the embedded point event cached by the terminal.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and responding to the failure of the report server, and reporting again according to a preset retry rule.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving a buried point log reported by a terminal, wherein the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is distributed to a session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is distributed to the generated buried point event according to the sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event; counting the actual reporting number of the buried point events reported to the server within a specified time period; calculating the quantity to be reported of the embedded point events which are to be reported to the server within a specified time period according to the current count value and the event sequence number of the embedded point events; and generating quality monitoring indexes according to the actual reporting quantity and the sum of the reporting quantity, and monitoring the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
In one embodiment, when the processor executes the computer program to calculate the quantity to be reported of the embedded point events which should be reported to the server in the specified time period according to the current count value and the event sequence number of the embedded point events, the following steps are specifically implemented: grouping event sequence numbers of the embedded point events according to the session identification of each session; respectively determining the minimum event sequence number from the event sequence numbers of the buried point events corresponding to all the sessions; obtaining the reported number of the sessions of each session according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session; and summing the reported quantity of each session to obtain the reported quantity.
In one embodiment, when the processor executes the computer program to generate the quality monitoring index according to the actual reporting quantity and the corresponding reporting quantity, the following steps are specifically implemented: and obtaining the leakage quantity of the buried point events in the specified time period according to the difference value between the actual reporting quantity and the corresponding reporting quantity, and taking the leakage quantity as a quality monitoring index.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and calculating the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generating time, determining the delay quantity of the buried point event reported in a delayed manner in a specified time period according to the delay time, and taking the delay quantity as a quality monitoring index.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and carrying out visual processing on the quality monitoring indexes and displaying the quality monitoring indexes.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and generating alarm information in response to the quality monitoring index exceeding a preset alarm threshold.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor performs the steps of: responding to the generation of the session, configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of the buried point events generated in the session; according to the sequence of the buried point events generated in the session, distributing corresponding event sequence numbers for the generated buried point events; controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter; and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server.
In one embodiment, the computer program when executed by the processor further performs the steps of: and in response to the success of the reporting server, deleting the reported data of the embedded point event cached by the terminal.
In one embodiment, the computer program when executed by the processor further performs the steps of: and responding to the failure of the report server, and reporting again according to a preset retry rule.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor performs the steps of: receiving a buried point log reported by a terminal, wherein the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is distributed to a session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is distributed to the generated buried point event according to the sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event; counting the actual reporting number of the buried point events reported to the server within a specified time period; calculating the quantity to be reported of the embedded point events which are to be reported to the server within a specified time period according to the current count value and the event sequence number of the embedded point events; and generating quality monitoring indexes according to the actual reporting quantity and the corresponding reporting quantity, and monitoring the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
In one embodiment, when the computer program is executed by the processor to calculate the number of the embedded point events to be reported to the server within the specified time period according to the current count value and the event sequence number of the embedded point event, the following steps are specifically implemented: grouping event sequence numbers of the embedded point events according to the session identification of each session; respectively determining a minimum event sequence number from the event sequence numbers of the buried point events corresponding to all the sessions; obtaining the number of the sessions to be reported according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session; and summing the reported quantity of each session to obtain the reported quantity.
In one embodiment, when the computer program is executed by the processor to generate the quality monitoring indicators according to the actual reporting quantity and the reported quantity, the following steps are specifically implemented: and obtaining the leakage quantity of the buried point events in the specified time period according to the difference value between the actual reporting quantity and the corresponding reporting quantity, and taking the leakage quantity as a quality monitoring index.
In one embodiment, the computer program, when executed by the processor, further performs the steps of: and calculating the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generating time, determining the delay quantity of the buried point event reported in a delayed manner in a specified time period according to the delay time, and taking the delay quantity as a quality monitoring index.
In one embodiment, the computer program, when executed by the processor, further performs the steps of: and performing visualization processing on the quality monitoring indexes and displaying the quality monitoring indexes.
In one embodiment, the computer program, when executed by the processor, further performs the steps of: and generating alarm information in response to the quality monitoring index exceeding a preset alarm threshold.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above may be implemented by hardware instructions of a computer program, which may be stored in a non-volatile computer-readable storage medium, and when executed, may include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), rambus (Rambus) direct RAM (RDRAM), direct Rambus Dynamic RAM (DRDRAM), and Rambus Dynamic RAM (RDRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In addition, the term "and/or" herein is only one kind of association relationship describing the association object, and means that there may be three kinds of relationships, for example, a and/or B, and may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, characters herein generally indicate that the front and rear associated objects are in an "or" relationship.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (12)

1. A method for reporting a buried point log comprises the following steps:
responding to session generation, configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of buried point events generated in the session;
according to the sequence of the embedded point events generated in the session, distributing corresponding event sequence numbers for the generated embedded point events;
controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter;
and responding to a report triggering instruction, generating a buried point log according to the event sequence number of the buried point event in the specified time period and the current count value, and reporting the buried point log to a server.
2. The method of claim 1, wherein the pit log further comprises at least one of a pit event source, a session identifier, a terminal reporting time, and a pit event generation time.
3. The method of claim 1, further comprising:
in response to the success of the reporting server, deleting the reported data of the embedded point event cached by the terminal;
and responding to the failure of the report server, and reporting again according to a preset retry rule.
4. A method of buried point quality monitoring, the method comprising:
receiving a buried point log reported by a terminal, wherein the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is distributed to the session when the session is generated, the global counter is used for counting the number of the buried point events generated in the session, the event sequence number of the buried point event is distributed to the generated buried point event according to the sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event;
counting the actual reported number of the embedded point events reported to the server within the specified time period;
calculating the quantity to be reported of the embedded point events which are to be reported to the server in the appointed time period according to the current count value and the event sequence number of the embedded point events;
and generating quality monitoring indexes according to the actual reporting quantity and the quantity to be reported, and monitoring the data quality of the buried point event in the specified time period according to the quality monitoring indexes.
5. The method of claim 4, wherein the specified time period includes a plurality of sessions, and the step of calculating the reporting number of the point burying events to be reported to the server in the specified time period according to the current count value and the event sequence number of the point burying events comprises:
grouping event sequence numbers of the embedded point events according to the session identification of each session;
respectively determining the minimum event sequence number from the event sequence numbers of the buried point events corresponding to the sessions;
obtaining the reported number of the session of each session according to the current count value corresponding to each session and the minimum event sequence number corresponding to each session;
and summing the reported quantity of each session to obtain the reported quantity.
6. The method of claim 4, wherein the step of generating the quality monitoring indicator according to the actual reporting quantity and the quantity to be reported comprises:
and obtaining the leakage quantity of the buried point events in the specified time period according to the difference value between the actual reporting quantity and the quantity to be reported, and taking the leakage quantity as the quality monitoring index.
7. The method of claim 4, wherein the burial point log further comprises a terminal reporting time and a burial point event generation time, and the method further comprises:
and calculating the delay time of the corresponding buried point event according to the terminal reporting time and the buried point event generating time, determining the delay quantity of the buried point event reported in a delayed manner in the specified time period according to the delay time, and taking the delay quantity as the quality monitoring index.
8. The method of claim 4, further comprising:
performing visualization processing on the quality monitoring index and displaying the quality monitoring index; and/or
And generating alarm information in response to the quality monitoring index exceeding a preset alarm threshold.
9. A device for reporting a buried point log is characterized in that the device comprises:
the counter configuration module is used for responding to session generation and configuring a corresponding global counter for the session, wherein the global counter is used for counting the number of buried point events generated in the session;
the event sequence number distribution module is used for distributing a unique corresponding event sequence number for the generated embedded point event according to the sequence of the embedded point event generated in the session;
the sequence number and count unification module is used for controlling the event sequence number of the current embedded point event to be consistent with the current count value of the global counter;
and the embedded point log reporting module is used for responding to a triggering reporting instruction, generating an embedded point log according to the event sequence number of the embedded point event in the specified time period and the current count value, and reporting the embedded point log to a server.
10. A buried point quality monitoring device, the device comprising:
a buried point log receiving module, configured to receive a buried point log reported by a terminal, where the buried point log is generated according to an event sequence number of a buried point event in a specified time period and a current count value of a global counter, the global counter is allocated to a session when the session is generated, the global counter is configured to count the number of buried point events generated in the session, the event sequence number of the buried point event is allocated to the generated buried point event according to a sequence of the buried point event generated in the session, and the current count value is consistent with the event sequence number of the current buried point event;
the actual reporting quantity counting module is used for counting the actual reporting quantity of the embedded point events reported to the server within the specified time period;
a reporting quantity calculating module, configured to calculate, according to the current count value and the event sequence number of the embedded point event, a reporting quantity of the embedded point event reported to the server within the specified time period;
and the buried point quality monitoring module is used for generating quality monitoring indexes according to the actual reported quantity and the quantity to be reported and monitoring the quality of the data of the buried point event in the specified time period according to the quality monitoring indexes.
11. A computer arrangement comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method of any one of claims 1 to 3 or 4 to 8 when executing the computer program.
12. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 3 or 4 to 8.
CN202210917829.2A 2022-08-01 2022-08-01 Method and device for reporting buried point log and method and device for monitoring buried point quality Pending CN115442225A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210917829.2A CN115442225A (en) 2022-08-01 2022-08-01 Method and device for reporting buried point log and method and device for monitoring buried point quality

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210917829.2A CN115442225A (en) 2022-08-01 2022-08-01 Method and device for reporting buried point log and method and device for monitoring buried point quality

Publications (1)

Publication Number Publication Date
CN115442225A true CN115442225A (en) 2022-12-06

Family

ID=84242067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210917829.2A Pending CN115442225A (en) 2022-08-01 2022-08-01 Method and device for reporting buried point log and method and device for monitoring buried point quality

Country Status (1)

Country Link
CN (1) CN115442225A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116795656A (en) * 2023-06-05 2023-09-22 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111611141A (en) * 2020-04-30 2020-09-01 广州华多网络科技有限公司 Reporting verification method and device of buried point data, electronic equipment and storage medium
CN112000541A (en) * 2020-07-23 2020-11-27 招联消费金融有限公司 Buried point data reporting method and device, computer equipment and storage medium
CN112486841A (en) * 2020-12-16 2021-03-12 江苏苏宁云计算有限公司 Method and device for checking data collected by buried point
CN112631879A (en) * 2019-09-24 2021-04-09 北京京东尚科信息技术有限公司 Data acquisition method and device, computer readable medium and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112631879A (en) * 2019-09-24 2021-04-09 北京京东尚科信息技术有限公司 Data acquisition method and device, computer readable medium and electronic equipment
CN111611141A (en) * 2020-04-30 2020-09-01 广州华多网络科技有限公司 Reporting verification method and device of buried point data, electronic equipment and storage medium
CN112000541A (en) * 2020-07-23 2020-11-27 招联消费金融有限公司 Buried point data reporting method and device, computer equipment and storage medium
CN112486841A (en) * 2020-12-16 2021-03-12 江苏苏宁云计算有限公司 Method and device for checking data collected by buried point

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116795656A (en) * 2023-06-05 2023-09-22 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error
CN116795656B (en) * 2023-06-05 2024-05-14 深圳市同行者科技有限公司 Early warning prompting method, device, equipment and storage medium for buried point error

Similar Documents

Publication Publication Date Title
CN111143163B (en) Data monitoring method, device, computer equipment and storage medium
US20160224400A1 (en) Automatic root cause analysis for distributed business transaction
CN108052440B (en) Method, device, equipment and storage medium for correcting operation logic of business system
CN110750414B (en) Mobile data monitoring and analyzing method and device, computer equipment and storage medium
CN108073499B (en) Application program testing method and device
CN107566148B (en) Method, system and device for analyzing terminal application operation data and terminal
CN110569222A (en) link tracking method and device, computer equipment and readable storage medium
CN115442225A (en) Method and device for reporting buried point log and method and device for monitoring buried point quality
CN113704018A (en) Application operation and maintenance data processing method and device, computer equipment and storage medium
CN110674149B (en) Service data processing method and device, computer equipment and storage medium
CN112051771A (en) Multi-cloud data acquisition method and device, computer equipment and storage medium
CN112866319A (en) Log data processing method, system and storage medium
US10191844B2 (en) Automatic garbage collection thrashing monitoring
CN110659435A (en) Page data acquisition processing method and device, computer equipment and storage medium
CN113609230A (en) Data synchronization abnormity warning method and device, computer equipment and storage medium
JP5623333B2 (en) Monitoring server and monitoring evaluation method
CN113824590A (en) Method for predicting problem of micro service network, computer device and storage medium
CN114185920A (en) Log data processing method and device, computer equipment and storage medium
JP4934660B2 (en) Communication bandwidth calculation method, apparatus, and traffic management method
CN111176930B (en) Component operation data processing method and device, computer equipment and storage medium
CN114598622A (en) Data monitoring method and device, storage medium and computer equipment
CN114157582A (en) Switch port state monitoring method and device and network communication system
CN109508356B (en) Data abnormality early warning method, device, computer equipment and storage medium
CN113672449A (en) Intelligent operation and maintenance abnormity monitoring method and device, computer equipment and storage medium
CN113689042A (en) Fault source prediction method for monitoring node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination