CN115454800A - Log data verification method and device, electronic equipment, storage medium and product - Google Patents

Log data verification method and device, electronic equipment, storage medium and product Download PDF

Info

Publication number
CN115454800A
CN115454800A CN202211133269.8A CN202211133269A CN115454800A CN 115454800 A CN115454800 A CN 115454800A CN 202211133269 A CN202211133269 A CN 202211133269A CN 115454800 A CN115454800 A CN 115454800A
Authority
CN
China
Prior art keywords
log data
client
data
point location
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211133269.8A
Other languages
Chinese (zh)
Inventor
刘俊启
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202211133269.8A priority Critical patent/CN115454800A/en
Publication of CN115454800A publication Critical patent/CN115454800A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The disclosure provides a log data verification method, a log data verification device, electronic equipment, a storage medium and a log data verification product, and relates to the technical field of automation, in particular to the technical field of data processing. The specific implementation scheme is as follows: acquiring parameters for carrying out log dotting on a target application program; generating a pseudo code by using the parameter, wherein the pseudo code is used for recording log data by a client; and responding to the received log data sent by the client, and verifying the log data. The cost of log data verification can be saved through the method and the device.

Description

Log data verification method and device, electronic equipment, storage medium and product
Technical Field
The present disclosure relates to the field of automation technologies, and in particular, to a log data verification method and apparatus, an electronic device, a storage medium, and a product.
Background
The intelligent terminal relates to a plurality of application programs so as to provide different services for the intelligent terminal. In order to obtain the use condition of each application program, the relevant data of each application program can be obtained. In the process of obtaining the relevant data of the application program, the relevant data can be obtained in a mode of realizing log dotting and statistics.
When the log dotting and counting are realized, the human resource investment and the resource investment related to counting are relatively high.
Disclosure of Invention
The disclosure provides a log data verification method, a log data verification device, an electronic device, a storage medium and a product.
According to a first aspect of the present disclosure, there is provided a log data verification method, the method including:
acquiring parameters for carrying out log dotting on a target application program; generating pseudo codes by the parameters, wherein the pseudo codes are used for recording log data by a client; and responding to the received log data sent by the client, and verifying the log data.
According to a second aspect of the present disclosure, there is provided a log data verification apparatus, the apparatus including:
the acquisition module is used for acquiring parameters for performing log dotting on the target application program; the generating module is used for generating pseudo codes from the parameters, and the pseudo codes are used for recording log data by a client; and the verification module is used for responding to the received log data sent by the client and verifying the log data.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the first aspect.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method according to the first aspect.
According to a fifth aspect of the present disclosure, there is provided a computer product comprising a computer program which, when executed by a processor, implements the method according to the first aspect.
It should be understood that the statements in this section are not intended to identify key or critical features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic illustration of an application environment according to the present disclosure;
FIG. 2 is a flowchart illustrating a log data verification method according to an embodiment of the disclosure;
FIG. 3 is a flowchart illustrating a log data verification method according to an embodiment of the disclosure;
FIG. 4 is a schematic flowchart illustrating a log data verification method according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram illustrating a log data verification apparatus according to an embodiment of the present disclosure;
FIG. 6 illustrates a schematic block diagram of an example electronic device that can be used to implement embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
With the popularization of the internet and the increase of intelligent terminals, the intelligent terminals relate to a plurality of application programs to provide different services for the intelligent terminals. In order to obtain the use condition of each application program, the relevant data of each application program can be obtained. In the process of acquiring the relevant data of the application program, the relevant data can be acquired in a log dotting and counting manner. For example, the number of independent Visitors (UV), the Page Views (PV) or the click rate of the application program is counted for each application program.
The statistical function serves each product line as basic capability, and in the daily research and development process, the statistical work also becomes the human resource input of research and development personnel, and the resource input related to statistics is relatively high.
For example, in the communication aspect, statistics work is mainly provided by a worker of a product to a research and development worker, the worker of the product pays attention to a statistical target, the research and development worker pays attention to specific implementation, and a final implementation effect can be determined through multiple communications from the target to the implementation process.
In the research and development aspects: each statistical function has different point location information, the point location information contains a plurality of related parameters, the parameters can reach hundreds according to the requirement of occupation, the parameters are realized by a plurality of versions, the time span is large, and the learning cost and the maintenance cost of research personnel are involved.
In the aspect of effectiveness: for research and development personnel, due to the magnitude relation of the fields, the debugging process is mainly completed manually, whether the parameter fields are successfully checked or not is determined, the validity of the fields is verified, and the integrity cost is high.
In summary, in the related art, through the dotting capability in the application program, the service staff needs to record the point location, manually write the code, and report the recorded log data for verification. Resulting in increased communication costs and relatively high implementation and verification costs.
Based on the related problems involved in the above embodiments, the present disclosure provides a log data verification method and apparatus. The communication cost of the working personnel is reduced by generating the pseudo code of the parameter set by the working personnel of the service. The log data which is clicked by the application program is obtained based on the pseudo code, so that the implementation cost is reduced, the validity and the integrity of the data are automatically verified, and the verification cost can be reduced.
The log data verification method provided by the application can be applied to the application environment shown in fig. 1. In which a terminal 101 communicates with a server 102 via a network. The terminal 101 is a client in the present disclosure, and is configured to record log data and report the log data to the server 102. The server 102 is used to generate pseudo code and to verify the validity and integrity of the data. The terminal 101 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 102 may be implemented by an independent server or a server cluster formed by a plurality of servers.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in other sequences than those illustrated or described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the disclosure, as detailed in the appended claims.
Fig. 2 shows a flowchart of a log data verification method provided by an embodiment of the present disclosure, and as shown in fig. 2, the method may be applied to a server and includes:
in step S210, a parameter for performing logging on the target application is acquired.
In the embodiment of the present disclosure, a point location management system may be provided for an application, and a parameter limit, such as a parameter name to be set, a value standard of a parameter, and the like, is set for each point location.
In the disclosure, for a target application program, a point location where a log dotting is required is determined, so as to determine parameters required by the point location. The number of the points may be one or more.
Further, in response to detecting the operation of setting the parameters, parameters for performing logging on the target application program are acquired.
In step S220, the parameter is generated into a pseudo code.
The pseudo code is used for recording log data by the client.
In the embodiment of the disclosure, the server may generate a pseudo code from the acquired parameter set by the staff for subsequent research and development.
The client can receive the pseudo code sent by the server and input the received pseudo code into the specified device, so that the log data can be obtained based on the generated pseudo code.
In step S230, in response to receiving the log data sent by the client, the log data is verified.
In the embodiment of the disclosure, the client determines the service requirement according to the parameter in the pseudo code. Therefore, according to the service requirement, the parameter value in the point location is calculated, the log data generated by the point location is recorded and stored in the appointed data item. And subsequently sending the recorded log data to the server.
If the server side determines that the log data sent by the client side are received, the server side can verify the received log data to determine a verification result.
According to the log data verification method provided by the disclosure, the set parameters are generated into pseudo codes, so that the communication cost of manpower is saved. The log is automatically verified, so that the problems of the log data can be relatively quickly found, and the verification efficiency of the log data is improved.
In the embodiment of the disclosure, the parameters required for dotting the target application program log can be set by a user by a worker in a self-defined manner. For example, it may be a worker who needs log data for further work. Therefore, when the server detects the setting operation of the parameters, the server can acquire the parameters for logging the target application program.
In the present disclosure, the obtained parameters may also be generated into pseudo codes for use in subsequent steps. An implementation of which generates pseudo-code of parameters is as follows.
Fig. 3 shows a flowchart of a log data verification method provided by an embodiment of the present disclosure, and as shown in fig. 3, the method may be applied to a server and includes:
in step S310, the point location keywords, the point location dereferencing criteria, and the relationship between the point location keywords included in the parameters are determined.
In this disclosure, for example, in order to determine a factor that is influenced by a loading speed of a certain webpage, the point location keyword may be set to be time, the point location value criterion may be a start time and an end time of loading the webpage, and a networking type, such as a mobile network or wifi, may also be set. Geographical location information, client model, etc. may also be set.
Further, the obtained parameters of each point location for performing log dotting on the target application program may include a point location keyword, a point location value criterion, and a relationship between the point location keywords. The relationship between the point location keywords may be a hierarchical relationship between the point location keywords.
In step S320, a pseudo code of the research and development language is generated according to the relationship between the point location keyword, the point location dereferencing standard, and the point location keyword.
In the embodiment of the present disclosure, the pseudo code of the research and development language is generated according to the point location keyword, the point location value standard, and the relationship between the point location keywords. The research and development language may be, but not limited to, C language, C + + language, JAVA language, objective-C (OC) language, swift language, kotlin language, and the like.
In embodiments of the present disclosure, received log data may be validated to determine the validity and integrity of the log data. The following embodiments will describe the verification of log data in response to receiving log data sent by a client.
Fig. 4 shows a flowchart of a log data verification method provided by an embodiment of the present disclosure, and as shown in fig. 4, the method may be applied to a server and includes:
in step S410, the client is associated based on a preset association manner.
In the embodiment of the present disclosure, the server may be associated with the target terminal, or connected to the terminal through an entry of the capability of the server for debugging log data. In the association process, association can be performed based on the two-dimensional code.
In step S420, the associated client completes the association, and receives log data sent by the client based on a preset data entry.
In the embodiment of the present disclosure, after the association with the client to be connected is successful, the log data sent by the client may be received according to the entry for the capability of debugging the log data.
In step S430, in response to receiving the log data sent by the client, the log data is analyzed to obtain the variable name and the corresponding variable value, and the corresponding entry data is updated according to the variable name to which the variable value corresponds.
In step S440, the integrity of the log data and the validity of the value of the log data are verified to obtain an integrity verification result and a value validity verification result.
Further, after the log data is received, the variable name of the log data and the corresponding variable value of the log data are analyzed. And updating the corresponding entry data according to the resolved variable name.
For example, the variable may be time, and the corresponding rule may be an acquisition start time and an acquisition end time.
In the embodiment of the present disclosure, the integrity of the received log data and the validity of the value of the log data may be verified. And obtaining an integrity verification result and a value validity verification result of the received log data.
In step S450, the integrity verification result and the value validity verification result are sent to the client.
In the embodiment of the present disclosure, the server obtains the integrity verification result and the value validity verification result of the log data, and may send the result to the client.
In the present disclosure, the integrity verification result and the value validity verification result may be displayed to the user. The user may be a user using a client application program, or may be a worker who develops an application program.
In some embodiments of the present disclosure, in response to determining that the integrity verification result is a missing result, prompting the client for the name of the missing data.
For example, the parameters include Uniform Resource Locator (URL), size (size), and loading of load (isLoadS).
The URL is a compact representation of the location and access method of a resource available from the internet, and is the address of a standard resource on the internet.
After verification, if the log data includes a URL and does not contain size and isLoadS, the user may be prompted that size and isLoadS are missing.
In other embodiments of the present disclosure, the client is prompted for the name of the exception log data in response to determining that there is data for which the field is empty.
For example, if the field uploaded by the parameter URL is empty, it is determined that the log data uploaded by the URL is invalid, and if the field is abnormal log data, the client is prompted that the URL is abnormal, which is illegal.
In still other embodiments of the present disclosure, the log data of the newly added point of the application program may be separately prompted.
In this disclosure, the newly added point location may be a point location where the version of the application program where the current log data is located is different from the version of the application program where the last log data is located. For example, the current application version is an updated version.
For example, if URL is a new version and a new field is added, it is determined that log data uploaded by URL is invalid, and if URL is abnormal log data, URL abnormality is separately prompted to the client, which is illegal.
The following examples are provided to illustrate log data verification methods provided by the present disclosure in conjunction with embodiments.
Illustratively, the parameters of the server for logging the target application include URL, size, isLoadS.
The URL may be a URL of a web page, is a character string type, cannot be empty, and may be within 1024 bytes in length.
Size may be the Size of a web page, which is an integer type.
The isLoadS determines whether the load was loaded successfully, which is of Boolean type.
The server can further generate corresponding pseudo codes according to the configured parameters. For example, char url [1024]; the url of the web page is not allowed to be empty, and the length of the url does not exceed 1024 bytes. int size; // size of the web page. Cool isLoadS; // if the load was successful.
The client is based on the generated pseudo-code as an output of the data storage component. The variable name is used as the uploaded data key, and the variable value is the corresponding value.
And the server receives the data, analyzes the key and the value, and updates the corresponding entry data according to the key value.
And the research and development personnel operate the server and enter a debugging mode. Two embodiments may be used for the association device.
One embodiment is that, a device ID is input, and the system automatically filters the reported data of the device ID and routes the data to the current debug mode.
Another implementation way is that the request parameter is changed, a unique ID is generated in the debugging, and the client carries the parameter when reporting data.
Furthermore, the system can provide the capability of automatically setting the unique id, such as the server side provides a two-dimensional code, and the setparamid: xxxx, after the code is scanned by the client, analyzing the instruction, setting parameters, and carrying the parameters in the communication process.
And then the server side can perform data verification.
For example, integrity validation: for example, uploaded data, url only, system hint, size, isLoadS missing
Effectiveness test: for example, the field uploaded by url is empty, and the system prompts that url is illegal.
New version of the point specification alone: for example, the url is a new added field of a new version, and once an exception occurs, the url can be prompted independently, for example, the content of the prompt is different, the prompting mode is different, and the prompting area is different.
By the method and the device, the automatic generation of the data layer codes is realized, and meanwhile, the capability of quick debugging and validation is realized, so that research personnel can quickly find the problem of integrity and the problem of effectiveness. And simultaneously, independently prompting the newly added field of the new version. The research and development cost of research and development personnel is reduced, and meanwhile, for product personnel, the dotting data layer is subjected to image extraction and packaging in the process of requirement proposing, so that the communication cost is reduced, and the advanced verification can be realized in the product design stage based on the point location parameter reporting. In summary, the research and development efficiency of business statistics is improved. Based on the same principle as the method shown in fig. 2, fig. 5 shows a schematic structural diagram of a log data verification apparatus provided by an embodiment of the present disclosure, and as shown in fig. 5, the log data verification apparatus 500 may include:
an obtaining module 501, configured to obtain a parameter for performing log dotting on a target application program; a generating module 502, configured to generate a pseudo code from the parameter, where the pseudo code is used for a client to record log data; the verifying module 503 is configured to verify the log data in response to receiving the log data sent by the client.
In this embodiment of the present disclosure, the obtaining module 501 is configured to obtain a parameter for performing log dotting on a target application program in response to a detected setting operation of the parameter.
In this embodiment of the present disclosure, the generating module 502 is configured to determine a point location keyword, a point location dereferencing standard, and a relationship between the point location keywords that are included in the parameter; and generating pseudo codes of the research and development language according to the point location keywords, the point location value standard and the relationship among the point location keywords.
In the embodiment of the present disclosure, the verification module 503 is configured to associate a client based on a preset association manner; the method comprises the steps that after association of a client is completed, log data sent by the client are received based on a preset data entry; responding to received log data sent by a client, analyzing the log data to obtain a variable name and a corresponding variable value thereof, and updating corresponding entry data according to the variable name corresponding to the variable value; verifying the integrity of the entry data and the value validity of the log data to obtain an integrity verification result and a value validity verification result; and sending the integrity verification result and the value validity verification result to the client.
In an embodiment of the present disclosure, the apparatus further includes: a prompt module 504;
and the prompting module is used for responding to the condition that the integrity verification result is the missing result and prompting the name of the missing log data of the client.
In an embodiment of the present disclosure, the apparatus further includes: a prompt module 504;
and the prompting module is used for responding to the data with the empty field, and prompting the name of the abnormal log data of the client.
In this embodiment of the present disclosure, the prompt module 504 is further configured to separately prompt the name of the abnormal log data of the client in response to determining that the data with the empty existence field is the newly added log data.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the customs of public sequences.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 6 illustrates a schematic block diagram of an example electronic device 600 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 6, the apparatus 600 includes a computing unit 601, which can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 602 or a computer program loaded from a storage unit 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data required for the operation of the device 600 can also be stored. The calculation unit 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
A number of components in the device 600 are connected to the I/O interface 605, including: an input unit 606 such as a keyboard, a mouse, or the like; an output unit 607 such as various types of displays, speakers, and the like; a storage unit 608, such as a magnetic disk, optical disk, or the like; and a communication unit 609 such as a network card, modem, wireless communication transceiver, etc. The communication unit 609 allows the device 600 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
Computing unit 601 may be a variety of general and/or special purpose processing components with processing and computing capabilities. Some examples of the computing unit 601 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The calculation unit 601 performs the respective methods and processes described above, such as the log data verification method. For example, in some embodiments, the log data validation method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 608. In some embodiments, part or all of a computer program may be loaded onto and/or installed onto device 600 via ROM 602 and/or communications unit 609. When the computer program is loaded into RAM 603 and executed by the computing unit 601, one or more steps of the log data verification method described above may be performed. Alternatively, in other embodiments, the computing unit 601 may be configured to perform the log data validation method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program code, when executed by the processor or controller, causes the functions/acts specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server combining a blockchain.
It should be understood that various forms of the flows shown above, reordering, adding or deleting steps, may be used. For example, the steps described in the present disclosure may be executed in parallel or sequentially or in different orders, and are not limited herein as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (17)

1. A method of log data validation, the method comprising:
acquiring parameters for carrying out log dotting on a target application program;
generating a pseudo code by using the parameter, wherein the pseudo code is used for recording log data by a client;
and responding to the received log data sent by the client, and verifying the log data.
2. The method of claim 1, wherein the obtaining parameters for logging a target application comprises:
and acquiring parameters for logging the target application program in response to the detection of the setting operation of the parameters.
3. The method of claim 1 or 2, wherein said generating the parameter into pseudo code comprises:
determining point location keywords, point location dereferencing standards and relations among the point location keywords which are included in the parameters;
and generating pseudo codes of the research and development language according to the point location keywords, the point location value standard and the relationship among the point location keywords.
4. The method of claim 1, wherein the verifying the log data in response to receiving the log data sent by the client comprises:
associating the client based on a preset association mode;
the method comprises the steps that after association of a client is completed, log data sent by the client are received based on a preset data entry;
responding to received log data sent by a client, analyzing the log data to obtain a variable name and a corresponding variable value thereof, and updating corresponding entry data according to the variable name corresponding to the variable value;
verifying the integrity of the entry data and the value validity of the log data to obtain an integrity verification result and a value validity verification result;
and sending the integrity verification result and the value validity verification result to the client.
5. The method of claim 4, wherein the method further comprises:
and prompting the name of the log data missing from the client in response to the integrity verification result being determined as the missing result.
6. The method of claim 4, wherein the method further comprises:
prompting a name of the client exception log data in response to determining that there is data for which the field is empty.
7. The method of claim 6, wherein said prompting the client for the name of the anomalous data in response to determining that there is data for which the field is empty comprises:
and in response to determining that the data with the empty existing field is newly added log data, independently prompting the name of the abnormal log data of the client.
8. An apparatus for log data validation, the apparatus comprising:
the acquisition module is used for acquiring parameters for carrying out log dotting on the target application program;
the generating module is used for generating a pseudo code from the parameter, and the pseudo code is used for recording log data by a client;
and the verification module is used for responding to the received log data sent by the client and verifying the log data.
9. The apparatus of claim 8, wherein the means for obtaining is configured to:
and responding to the detected setting operation of the parameters, and acquiring parameters for logging the target application program.
10. The apparatus of claim 8 or 9, wherein the generating means is configured to:
determining point location keywords, point location value criteria and a relationship among the point location keywords which are included in the parameters;
and generating pseudo codes of the research and development language according to the point location keywords, the point location value standard and the relationship among the point location keywords.
11. The apparatus of claim 8, wherein the verification module is to:
associating the client based on a preset association mode;
the method comprises the steps that after association of a client is completed, log data sent by the client are received based on a preset data entry;
responding to received log data sent by a client, analyzing the log data to obtain a variable name and a corresponding variable value thereof, and updating corresponding entry data according to the variable name corresponding to the variable value;
verifying the integrity of the entry data and the value validity of the log data to obtain an integrity verification result and a value validity verification result;
and sending the integrity verification result and the value validity verification result to the client.
12. The apparatus of claim 11, wherein the apparatus further comprises: a prompt module;
and the prompting module is used for responding to the condition that the integrity verification result is the missing result and prompting the name of the missing log data of the client.
13. The apparatus of claim 11, wherein the apparatus further comprises: a prompt module;
and the prompting module is used for responding to the data with the empty field, and prompting the name of the abnormal log data of the client.
14. The apparatus of claim 13, wherein the prompting module is further configured to:
and in response to determining that the data with the empty existing field is newly added log data, independently prompting the name of the abnormal log data of the client.
15. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
16. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-7.
17. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-7.
CN202211133269.8A 2022-09-17 2022-09-17 Log data verification method and device, electronic equipment, storage medium and product Pending CN115454800A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211133269.8A CN115454800A (en) 2022-09-17 2022-09-17 Log data verification method and device, electronic equipment, storage medium and product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211133269.8A CN115454800A (en) 2022-09-17 2022-09-17 Log data verification method and device, electronic equipment, storage medium and product

Publications (1)

Publication Number Publication Date
CN115454800A true CN115454800A (en) 2022-12-09

Family

ID=84304811

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211133269.8A Pending CN115454800A (en) 2022-09-17 2022-09-17 Log data verification method and device, electronic equipment, storage medium and product

Country Status (1)

Country Link
CN (1) CN115454800A (en)

Similar Documents

Publication Publication Date Title
CN107809331B (en) Method and device for identifying abnormal flow
CN107819627B (en) System fault processing method and server
CN108628748B (en) Automatic test management method and automatic test management system
CN112183782B (en) Fault work order processing method and equipment
CN110858172A (en) Automatic test code generation method and device
CN112559354A (en) Front-end code specification detection method and device, computer equipment and storage medium
CN109840192B (en) Method and device for automatic testing
CN110895472A (en) Method and device for identifying service change
CN116107589B (en) Automatic compiling method, device and equipment of software codes and storage medium
CN111221727A (en) Test method, test device, electronic equipment and computer readable medium
CN112269706A (en) Interface parameter checking method and device, electronic equipment and computer readable medium
CN112559024A (en) Method and device for generating transaction code change list
CN116204428A (en) Test case generation method and device
CN115576831A (en) Test case recommendation method, device, equipment and storage medium
CN114693116A (en) Method and device for detecting code review validity and electronic equipment
CN111026629A (en) Method and device for automatically generating test script
CN115454800A (en) Log data verification method and device, electronic equipment, storage medium and product
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN114546799A (en) Point burying log checking method and device, electronic equipment, storage medium and product
CN115525521A (en) Log data verification method and device, electronic equipment, storage medium and product
CN113032256A (en) Automatic test method, device, computer system and readable storage medium
CN113760568A (en) Data processing method and device
CN113157911A (en) Service verification method and device
CN111290870A (en) Method and device for detecting abnormity
CN116301869B (en) Front-end page configuration management and control system, method, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination