CN115827276A - Reporting method and device of embedded point information, readable storage medium and electronic equipment - Google Patents

Reporting method and device of embedded point information, readable storage medium and electronic equipment Download PDF

Info

Publication number
CN115827276A
CN115827276A CN202211644224.7A CN202211644224A CN115827276A CN 115827276 A CN115827276 A CN 115827276A CN 202211644224 A CN202211644224 A CN 202211644224A CN 115827276 A CN115827276 A CN 115827276A
Authority
CN
China
Prior art keywords
buried point
resource
transparent transmission
transmission rule
rule set
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211644224.7A
Other languages
Chinese (zh)
Inventor
陈锦海
曹偲
邹衍芳
丁立
程实
熊鋆洋
张腾飞
杨义春
胡持
王健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Netease Cloud Music Technology Co Ltd
Original Assignee
Hangzhou Netease Cloud Music Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Netease Cloud Music Technology Co Ltd filed Critical Hangzhou Netease Cloud Music Technology Co Ltd
Priority to CN202211644224.7A priority Critical patent/CN115827276A/en
Publication of CN115827276A publication Critical patent/CN115827276A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosed embodiments relate to a reporting method of embedded point information, a reporting device of embedded point information, a readable storage medium and an electronic device, and relate to the technical field of computers. The reporting method of the embedded point information comprises the following steps: responding to a resource request of an application program client, analyzing return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request; determining candidate resources according to resources in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resources; and reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources. The method and the device can realize the transparent transmission of the embedded point parameters based on the matching of the embedded point transparent transmission rules, and improve the reporting efficiency and the reporting accuracy of the embedded point information.

Description

Reporting method and device of embedded point information, readable storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for reporting embedded point information, a computer-readable storage medium, and an electronic device.
Background
This section is intended to provide a background or context to the embodiments of the disclosure and the description herein is not an admission that it is prior art, nor is it admitted to be prior art by inclusion in this section.
In a data buried point, a lot of information is irrelevant to content rendering and operation performed by a front end, so that the information can be reported in a parameter transparent transmission mode, namely, the algorithm and the server side combine the content, strategy and other information which only serve the data buried point into a character string, and the front end does not need to analyze the information and only needs to assign and return the value without changing the value.
The first one is to realize parameter return of request level through request return capability of RPC (Remote Procedure Call), and manually bind resources in clients; the second method is that the DTO (Data Transfer Object) of RPC at each level realizes the binding and returning of the request resource level parameters; and thirdly, when a request occurs, each RPC service writes related information into a unified server-side log cache or a data cache layer by taking a traceid (a unique id for identifying a primary network request) as a key, and then in a buried point processing flow, takes out previously cached transparent transmission information from a cache according to the traceid information reported by the data buried point for association so as to obtain the buried point transparent transmission information.
Disclosure of Invention
However, the same binding mode is adopted for all resources in the request by the transparent transmission parameter in the first scheme, so that the transparent transmission parameter cannot be accurately bound and distinguished, all transparent transmission parameters need to be bound on different resource models, the transmission data volume is large, the workload is large during the subsequent manual distinguishing, the reporting efficiency of the embedded point information is reduced, meanwhile, if two RPCs use the same keyword in the transparent transmission parameter on a request link, the accurate distinguishing cannot be realized, and the accuracy of the embedded point information reporting is low; the second scheme needs to carry out accurate transparent transmission field agreement in the request and response DTO of each grade of RPC at the server side, and carries out corresponding assignment in each RPC, so that the cost is high, the workload is large, and the accuracy is low; the third scheme causes the storage cost of the server to be very high, and due to the fact that the log embedding points of the client and the server have delay, the success rate of timely association is not high, more secondary and third associations need to be performed, the efficiency is low, and due to the delay, in order to ensure the accuracy of the information reporting of the embedding points, the third scheme can only be used in offline analysis and cannot meet the requirement of actual analysis
Time-data processing scenarios.
Therefore, an improved method for reporting the buried point information is highly needed, which can simultaneously improve the accuracy of reporting the buried point transparent transmission parameter and the efficiency of reporting the buried point transparent transmission parameter, and reduce the maintenance cost of the buried point transparent transmission parameter.
In this context, embodiments of the present disclosure desirably provide a method and an apparatus for reporting embedded point information, a computer-readable storage medium, and an electronic device.
According to a first aspect of the embodiments of the present disclosure, a method for reporting buried point information is provided, including: responding to a resource request of an application program client, analyzing return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request; determining candidate resources according to resources in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resources; and reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources.
In an optional implementation manner, the parsing, in response to a resource request of an application client, return data of the resource request to obtain a set of buried point transparent transmission rules includes: responding to a resource request of an application program client, and analyzing returned data of the resource request based on a preset base class to obtain a buried point transparent transmission rule set; determining a candidate resource according to the resource in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource, wherein the method comprises the following steps: and determining a candidate resource according to the resource inherited to the subclass indication of the base class in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource.
In an optional implementation, the associating the set of landfill transparent transmission rules with the candidate resource includes: respectively creating a class object for the subclass corresponding to each candidate resource; and binding the buried point transparent transmission rule set for the class object corresponding to the subclass of each candidate resource respectively so as to associate the buried point transparent transmission rule set with the candidate resource.
In an optional implementation manner, the set of the transparent buried point transmission rules is determined according to one or more of a resource identifier, a service identifier, buried point information, and remote procedure call service information in the return data of the resource request.
In an optional implementation manner, the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in the return data of the resource request; the reporting of the buried point information based on the buried point transparent transmission rule set associated with the candidate resource comprises the following steps: responding to a trigger operation in the application program client, and acquiring a target resource identifier of a buried point object to which the trigger operation aims; and matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource, so as to determine the target buried point information of the buried point object based on the matching result, and reporting the buried point information of the buried point object according to the target buried point information.
In an optional implementation manner, the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: determining target resources from the candidate resources, wherein the target resources comprise the candidate resources corresponding to the buried point object; matching the target resource identification with the resource identification in the buried point transparent transmission rule set associated with the target resource; determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the resource identifier successfully matched with the target resource identifier in the buried point transparent transmission rule set; and determining the target buried point information of the buried point object based on the buried point information in the target buried point transparent transmission rule.
In an optional implementation manner, the determining a target resource from the candidate resources includes: under the condition that the buried point parameters to be reported of the buried point object comprise buried point transparent transmission parameters, determining a server interface associated with the buried point transparent transmission parameters of the buried point object; and determining a target resource from the candidate resources according to the resource in the return data of the server-side interface.
In an optional implementation manner, the determining a target buried point transparent transmission rule according to a buried point transparent transmission rule indicated by a resource identifier that is successfully matched with the target resource identifier in the buried point transparent transmission rule set includes: under the condition that a resource identifier in a buried point transparent transmission rule is a preset resource identifier, if the preset resource identifier is the same as the target resource identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the preset resource identifier; and under the condition that the resource identifier in the buried point transparent transmission rule is a wildcard identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the wildcard identifier.
In an optional embodiment, the set of buried point transparent transmission rules includes a list of buried point transparent transmission rules; the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: and traversing the resource identifiers in the buried point transparent transmission rule list associated with the candidate resources according to a preset sequence, stopping traversing under the condition that the currently traversed resource identifiers are successfully matched with the target resource identifiers, and determining the target buried point information of the buried point object according to the buried point information in the buried point transparent transmission rule indicated by the currently traversed resource identifiers.
In an optional embodiment, the set of buried point transparent transmission rules includes a list of buried point transparent transmission rules; the method for responding to the resource request of the application program client and analyzing the returned data of the resource request to obtain the buried point transparent transmission rule set comprises the following steps: responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the head of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource request is preset to be added in a first mode; responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the tail of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource solution is preset to be added in a second mode.
In an optional embodiment, the parsing, in response to a resource request of an application client, return data of the resource request to obtain a set of buried point transparent transmission rules includes: responding to a resource request of an application program client, analyzing return data of the resource request based on a preset base class to generate a structured buried point transparent transmission rule; and obtaining the buried point transparent transmission rule set based on the structured buried point transparent transmission rule.
In an optional implementation manner, the reporting method of the buried point information further includes: and responding to an event for triggering the calling of the server-side interface, acquiring a buried point transparent transmission parameter value of a server-side buried point object associated with the called server-side interface, and reporting the buried point transparent transmission parameter value.
In an optional implementation manner, in a case that the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in the return data of the resource request, the method for reporting the buried point information further includes: under the condition that the resource request belongs to a preset resource request to be verified, sending a buried point transparent transmission parameter rule set corresponding to the resource request to a buried point verification platform, so that the buried point verification platform verifies buried point report information of the resource request; the method for the embedded point checking platform to check the embedded point reported information of the resource request comprises the following steps: acquiring a resource identifier of a buried point object pre-associated with the resource request; matching the resource identifier of the buried point object with the resource identifier in the buried point transparent transmission rule set corresponding to the resource request; determining a check rule according to the buried point transparent transmission rule indicated by the successfully matched resource identifier in the buried point transparent transmission rule set; and checking the buried point reporting information of the buried point object based on the checking rule.
According to a second aspect of the embodiments of the present disclosure, there is provided a reporting apparatus for reporting embedded point information, including: the analysis module is configured to respond to a resource request of an application program client, analyze return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request; the uniform resource binding module is configured to determine a candidate resource according to the resource in the return data of the resource request, and associate the buried point transparent transmission rule set with the candidate resource; and the reporting module is configured to report the buried point information based on the buried point transparent transmission rule set associated with the candidate resource.
In an optional implementation, the parsing module is specifically configured to: responding to a resource request of an application program client, and analyzing returned data of the resource request based on a preset base class to obtain a buried point transparent transmission rule set; the uniform resource binding module is configured to: and determining a candidate resource according to the resource inherited to the subclass indication of the base class in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource.
In an optional implementation, the associating the set of landfill transparent transmission rules with the candidate resource includes: respectively creating a class object for the subclass corresponding to each candidate resource; and binding the buried point transparent transmission rule set for the class object corresponding to the subclass of each candidate resource respectively so as to associate the buried point transparent transmission rule set with the candidate resource.
In an optional implementation manner, the set of the transparent buried point transmission rules is determined according to one or more of a resource identifier, a service identifier, buried point information, and remote procedure call service information in the return data of the resource request.
In an optional implementation manner, the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in the return data of the resource request; the reporting module is configured to: responding to a trigger operation in the application program client, and acquiring a target resource identifier of a buried point object to which the trigger operation aims; and matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource, so as to determine the target buried point information of the buried point object based on the matching result, and reporting the buried point information of the buried point object according to the target buried point information.
In an optional implementation manner, the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: determining target resources from the candidate resources, wherein the target resources comprise the candidate resources corresponding to the buried point object; matching the target resource identification with the resource identification in the buried point transparent transmission rule set associated with the target resource; determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the resource identifier successfully matched with the target resource identifier in the buried point transparent transmission rule set; and determining the target buried point information of the buried point object based on the buried point information in the target buried point transparent transmission rule.
In an optional implementation manner, the determining a target resource from the candidate resources includes: under the condition that the buried point parameters to be reported of the buried point object comprise buried point transparent transmission parameters, determining a server interface associated with the buried point transparent transmission parameters of the buried point object; and determining a target resource from the candidate resources according to the resource in the return data of the server-side interface.
In an optional implementation manner, the determining a target buried point transparent transmission rule according to a buried point transparent transmission rule indicated by a resource identifier that is successfully matched with the target resource identifier in the buried point transparent transmission rule set includes: under the condition that a resource identifier in a buried point transparent transmission rule is a preset resource identifier, if the preset resource identifier is the same as the target resource identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the preset resource identifier; and under the condition that the resource identifier in the buried point transparent transmission rule is a wildcard identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the wildcard identifier.
In an optional embodiment, the set of buried point transparent transmission rules includes a list of buried point transparent transmission rules; the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: and traversing the resource identifiers in the buried point transparent transmission rule list associated with the candidate resources according to a preset sequence, stopping traversing under the condition that the currently traversed resource identifiers are successfully matched with the target resource identifiers, and determining the target buried point information of the buried point object according to the buried point information in the buried point transparent transmission rule indicated by the currently traversed resource identifiers.
In an optional embodiment, the set of buried point transparent transmission rules includes a list of buried point transparent transmission rules; the parsing module is specifically configured to: responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the head of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource request is preset to be added in a first mode; responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the tail of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource solution is preset to be added in a second mode.
In an optional implementation, the parsing module is specifically configured to: responding to a resource request of an application program client, analyzing return data of the resource request based on a preset base class to generate a structured buried point transparent transmission rule; and obtaining the buried point transparent transmission rule set based on the structured buried point transparent transmission rule.
In an optional implementation manner, the reporting apparatus of the buried point information further includes a server interface invoking an event reporting module, where the module is configured to: and responding to an event for triggering the calling of the server-side interface, acquiring a buried point transparent transmission parameter value of a server-side buried point object associated with the called server-side interface, and reporting the buried point transparent transmission parameter value.
In an optional implementation manner, in a case that the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in the return data of the resource request, the reporting apparatus of the buried point information further includes a checking module, where the checking module is configured to: under the condition that the resource request belongs to a preset resource request to be verified, sending a buried point transparent transmission parameter rule set corresponding to the resource request to a buried point verification platform, so that the buried point verification platform verifies buried point report information of the resource request; the method for verifying the buried point reporting information of the resource request by the buried point verification platform comprises the following steps: acquiring a resource identifier of a buried point object pre-associated with the resource request; matching the resource identifier of the buried point object with the resource identifier in the buried point transparent transmission rule set corresponding to the resource request; determining a check rule according to the buried point transparent transmission rule indicated by the successfully matched resource identifier in the buried point transparent transmission rule set; and checking the buried point reporting information of the buried point object based on the checking rule.
According to a third aspect of the embodiments of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, and when the computer program is executed by a processor, the reporting method of the information about the embedded point according to the first aspect is implemented.
According to a fourth aspect of the disclosed embodiments, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; the processor is configured to execute the executable instructions to perform the reporting method of the buried point information according to the first aspect.
According to the reporting method of the buried point information, the reporting device of the buried point information, the computer readable storage medium and the electronic device of the embodiment of the present disclosure, in response to a resource request of an application client, return data of the resource request is analyzed to obtain a buried point transparent transmission rule set, where the buried point transparent transmission rule set is used for describing the buried point information of resources in the return data of the resource request; determining a candidate resource according to the resource in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource; and reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources. On one hand, all resources in the resource request are analyzed during the request to obtain a buried point transparent transmission rule set, and then matching association is carried out from the buried point transparent transmission rule during the reporting, so that the automatic binding of the resources is realized, and the reporting efficiency of the buried point transparent transmission information is improved; on the other hand, the buried point transparent transmission parameters in the buried point information report can be accurately determined based on the buried point transparent transmission rule set, so that the accuracy of the buried point information report is improved; on the other hand, based on the buried point transparent transmission rule set associated with the candidate resource, real-time uploading of the buried point transparent transmission parameter can be realized, and the method can be applied to scenes in which real-time analysis processing needs to be performed on the buried point transparent transmission parameter.
Drawings
The above and other objects, features and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings and in which:
fig. 1 is a schematic diagram illustrating a reporting method of embedded point information according to an embodiment of the present disclosure;
fig. 2 illustrates a flow diagram of a method for obtaining a set of buried point transparent transmission rules according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram illustrating a method for associating a set of burial point unvarnished rules with a candidate resource according to an embodiment of the disclosure;
fig. 4 is a schematic flowchart illustrating a method for reporting buried point information based on a set of buried point transparent transmission rules associated with candidate resources according to an embodiment of the present disclosure;
FIG. 5 illustrates a flow diagram of a method of determining target site information in accordance with an embodiment of the present disclosure;
FIG. 6 illustrates a buried point parameter configuration interface diagram according to an embodiment of the present disclosure;
FIG. 7 illustrates a schematic diagram of a buried point parameter pass-through process in accordance with an embodiment of the present disclosure;
fig. 8 is a schematic flowchart illustrating a method for verifying information reported by a buried point according to an embodiment of the present disclosure;
fig. 9 is a structural diagram of a reporting apparatus of embedded point information according to an embodiment of the present disclosure;
FIG. 10 shows a block diagram of an electronic device according to an embodiment of the disclosure.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Detailed Description
The principles and spirit of the present disclosure will be described with reference to a number of exemplary embodiments. It is understood that these embodiments are given solely for the purpose of enabling those skilled in the art to better understand and to practice the present disclosure, and are not intended to limit the scope of the present disclosure in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be embodied as a system, apparatus, device, method, or computer program product. Accordingly, the present disclosure may be embodied in the form of: entirely hardware, entirely software (including firmware, resident software, micro-code, etc.), or a combination of hardware and software.
According to an embodiment of the present disclosure, a reporting method of embedded point information, a reporting device of embedded point information, a computer-readable storage medium, and an electronic device are provided.
In this document, any number of elements in the drawings is by way of example and not by way of limitation, and any nomenclature is used solely for differentiation and not by way of limitation.
The principles and spirit of the present disclosure are explained in detail below with reference to several representative embodiments of the present disclosure.
Summary of The Invention
The inventor of the present disclosure finds that, in some existing embedded point transparent transmission parameter schemes, all transparent transmission parameters need to be bound to different resource models, the amount of transmission data is large, embedded point transparent transmission parameters associated with different resource models need to be manually distinguished, the workload is large, and the determination efficiency of embedded point information is reduced.
In view of the above, the basic technical solution of the present disclosure is: the method comprises the steps of providing a reporting method of buried point information, a reporting device of the buried point information, a computer readable storage medium and electronic equipment, responding to a resource request of an application program client, analyzing return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing the buried point information of resources in the return data of the resource request; determining a candidate resource according to the resource in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource; and reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources. On one hand, all resources in the resource request are analyzed during the request to obtain a buried point transparent transmission rule set, and then matching association is performed from the buried point transparent transmission rules during reporting, so that automatic binding of the resources is realized, and the reporting efficiency of the buried point transparent transmission information is improved; on the other hand, the buried point transparent transmission parameters in the buried point information report can be accurately determined based on the buried point transparent transmission rule set, so that the accuracy of the buried point information report is improved; on the other hand, based on the buried point transparent transmission rule set associated with the candidate resource, the real-time uploading of the buried point transparent transmission parameters can be realized, so that the method is applied to scenes in which the buried point transparent transmission parameters need to be analyzed and processed in real time.
Having described the general principles of the present disclosure, various non-limiting embodiments of the present disclosure are described in detail below.
Application scene overview
It should be noted that the following application scenarios are merely illustrated to facilitate understanding of the spirit and principles of the present disclosure, and embodiments of the present disclosure are not limited in this respect. Rather, embodiments of the present disclosure may be applied to any scenario where applicable.
The present disclosure may be applied to scenarios where data is collected, such as: the reporting method of the embedded point information provided by the disclosure can be used for collecting the use data (such as access number, visitor number, dwell time, page browsing number and the like) of the application, and tracking the use condition of the application based on the use data so as to provide data support for further optimization of the application; in a message recommendation scene, historical data of an object can be collected by using the reporting method of the embedded point information provided by the disclosure, then, structural data can be constructed based on the collected historical data, and multi-scene analysis can be performed by using the historical data and/or the structural data, so that accurate decision information can be provided for corresponding services.
Exemplary method
In a data site, there is often much information that is unrelated to content rendering and operation on the front end, such as: algorithm information (recall strategy, sequencing strategy, intervention strategy and the like), a delivery strategy, content experiment barreled information, recommendation reason and the like; and other content or commodity carrying variable information such as comment number, collection, label, author concern state and the like exists, and the information can be associated through pseudo table information stored in a server after a client uploads a buried point. However, there is a certain delay and data processing hysteresis in the reporting of the embedded point, and the associated state may not be the actual situation at that time when the data processing is finally performed, so that the associated information is biased.
Taking a common audio and video APP (Application), for example, in a page card, besides information such as main images, titles and the like, there are also a great number of upper and lower corner marks, such as a corner mark for showing the play amount of content represented by the page card, a corner mark for showing the user authority of the content represented by the page card, and the like. Therefore, in the buried point information, it is required to accurately know the specific numerical value and the tag type of the corner mark in the clicked page card when the user clicks the page card in the client, however, for the display of the client, the meaning of different corner marks is not important, and it is only the display effect of the view that is different. If information is to be reported in the embedded point, a clear protocol and model agreement is required, information which is originally not capable of perceiving specific content in the client is sent and the oriented parameter is embedded in the point, extra workload is brought, a working link is long and cannot be brought into effect on line at any time, and the method is not flexible enough.
Based on the method, the embedded point transparent transmission information is added in the embedded point reported information, so that the content, strategy and other information only serving the data embedded points are combined into a character string by an algorithm and a server, the front end does not need to analyze the information and only needs to carry out assignment feedback intact, the maximum flexibility and accuracy and the minimum dependency and workload are realized, and the transparent transmission of the embedded point parameters is realized.
Taking resource burial requirements of a song sheet recommending module and a song recommending module of a home page of a common audio and video APP as an example, for relevant fields in a song sheet and a song request in one request, the capability of transmitting the information is required to be provided in multi-layer rpc requests of a server, so that the information needs to be invaded into code architectures of the whole server and a client to a great extent, and higher cost is brought.
The embedded point parameter transparent transmission scheme in the related technology can be mainly divided into 3 types, the first type is to realize the parameter return of the request level through the request return capability of RPC, and manually bind the resource in the client; the second method is that the DTO of each level of RPC realizes the binding and returning of the request resource level parameters; and thirdly, when a request occurs, each RPC service writes related information into a unified server log cache or a data cache layer by taking the traceid as a key, and then in a buried point processing flow, the previously cached transparent transmission information is taken out from the cache according to the traceid information reported by the data buried point for association so as to obtain the buried point transparent transmission information.
However, for the first scheme, the transparent transmission parameters cannot be accurately bound and distinguished for all resources in the request at the same time (for example, k1= v1 in the transparent transmission parameters is only required by song list resources; k2= v2 is only required by song resources, but cannot be distinguished), so that all transparent transmission parameters need to be bound on different resource models, and the transmission data volume is large. For the request transparent transmission parameter, the information returned by the interface often exists in a certain independent data node of Body (actual data content of the request result), or is unified in the Header (request Header) of the request, rather than being directly bound to each specific content resource model, so that the scheme requires the client to perform one-to-one manual binding to perform resource assignment in the analysis request packet, which requires a large workload, resulting in low efficiency of determining the buried point transparent transmission parameter. And because the embedded point transparent transmission parameters are uniformly bound firstly and then distinguished manually, if two RPCs exist on the request link and the same key is used in the transparent transmission parameters, the RPCs to which the transparent transmission parameters belong cannot be distinguished, and the accuracy of determining the embedded point transparent transmission parameters is low.
For the second scheme, it needs to perform accurate transparent transmission field agreement in the request and response DTO of each stage of RPC at the server, and perform corresponding assignment in each RPC. Therefore, the research and development cost and the maintenance cost are very high, and the RPC requests at all levels are difficult to be fully covered.
For the third scheme, on the one hand, it results in very high storage cost of the server; on the other hand, due to the fact that the client and the service end have delay, the timely association success rate is not high, and more secondary and tertiary association needs to be carried out. And due to the existence of the delay, the method can only serve offline analysis and cannot meet the requirement in real-time data processing.
The exemplary embodiment of the present disclosure first provides a reporting method of buried point information, so as to overcome at least all or part of the above-mentioned drawbacks in the related art.
Fig. 1 shows a reporting method of buried point information in an exemplary embodiment of the present disclosure, where the method may include:
step S110, responding to a resource request of an application program client, analyzing return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request;
step S120, determining candidate resources according to resources in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resources;
and step S130, reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources.
Each step in fig. 1 will be described in detail below.
In step S110, in response to the resource request of the application client, the returned data of the resource request is analyzed to obtain a buried point transparent transmission rule set.
For example, when a user opens an application client or performs an operation in the application client, the application client may send a resource request to a server corresponding to the application client, so as to request, from the server, content for displaying in a page of the application client.
In other words, a resource may be understood as the presentation content of the front-end page. The resource request is to request the display content of the front-end page from the server, and the return data of the resource request includes the determined display content of the front-end page.
Taking an application client of a music type as an example, the application client may send a resource request to the server, so as to determine a recommended song sheet and/or recommended songs displayed in the application client according to return data of the resource request.
In an exemplary embodiment, the resource request may include an RPC request, i.e., a Remote Procedure Call (Remote Procedure Call) request.
For example, step S110 may be executed in the server, that is, the server sends the return data to the application client in response to the resource request of the application client, and parses the return data sent to the application client to obtain the set of the burial point transparent transmission rules. Step S110 may also be executed in the application client, that is, in response to the resource request of the application client, the application client analyzes the return data of the resource request to obtain the buried point transparent transmission rule set. Step S110 may also be executed by both the server and the application client, for example, if the application client sends a resource request to the server, the server determines the return data of the resource request and sends the return data to the application client, and then the application client analyzes the return data to obtain the buried point transparent transmission rule set. The present exemplary embodiment is not particularly limited in this regard.
In an exemplary embodiment, the set of buried point transparent transmission rules is used to describe the buried point information of the resource in the return data of the resource request. That is, the buried point transparent transmission rule set includes the buried point information of all the resources in the return data of the resource request. In other words, the point-of-burial pass-through rule can be understood as a rule that tells the application program how to bury the point, namely, which pass-through parameters need to be buried in which resources.
In an exemplary embodiment, the set of the point-of-burial transparent transmission rules is determined according to one or more of resource identification, service identification, point-of-burial information and remote procedure call service information in return data of the resource request. The resource identifier may include one or more of a resource type and a resource identity identifier. In other words, the fixed point transparent transmission rule may be determined according to one or more of the resource identifier, the service identifier, the fixed point information, and the remote procedure call service information.
For example, a transparent transmission protocol of the buried point transparent transmission parameter may be predefined, for example, the transparent transmission protocol of the buried point transparent transmission parameter may be defined as "$ { ctype }, $ { cid }, $ { kv _ str }, $ { rpcinfo }". Where ctype represents a resource type, which may be uniformly defined by the landed platform. The cid identifies the resource identity, and can take the value of a wildcard or a designated value. If the cid value is a wildcard, all resources of the representative are in effect, and if the cid value is a specified value, the cid array corresponding to the specified value can be used. kv _ str represents specific buried point information, and if 3 service parties perform buried points in pit positions corresponding to the same resource, there are 3 groups of kv, which are k1v1, k2v2, and k3v3, respectively, and then are spliced into m _ k1_ v1-n _ k2_ v2-q _ k3_ v3, where m, n, and q are service identifiers and defined by the service parties. rpcinfo represents information of rpc service currently inserted with buried point transparent transmission parameters, is used for checking and positioning problems on the whole link, and can be automatically acquired according to rpc context.
The service party can configure the corresponding buried point transparent transmission rule for the service resource in advance according to the protocol and the requirement. If the embedded point information kv is determined to be effective for all the resources of the request according to the above protocol, that is, the embedded point transparent transmission rule is a ctype and cid wildcard, kv _ str is the embedded point information of itself, and the example of "x" representing wildcard indicates that all the resources of the request are effective may include "x:: k-v". According to the protocol, the embedded point information kv is embedded, all the resources under the specified resource type are determined to be in effect, namely the specified resource type, and the resource identity identifier is a wildcard, for example, the embedded point transparent transmission rule indicating that all the resources under the specified resource type are in effect can include ctype:: k-v ″, wherein ctype is the specified resource type. The method also can embed the embedding point information kv according to the protocol, and determines that the specified resource type and the resource identity are effective, and the embedding point transparent transmission rule at this time can comprise' ctype:: cid:: k-v ″, wherein the ctype is the specified resource type, and the cid is the specified resource identity.
Under the condition that the embedded point transparent transmission rule comprises the service identifier, the embedded point transparent transmission rule disclosed by the disclosure can determine the resource range to be bound by the transparent transmitted embedded point information kv, and can effectively distinguish keywords set by each service by using the service identifier as kv prefix, thereby avoiding parameter coverage among multi-level services and improving the accuracy of the transparent transmission of the embedded point parameters.
For example, a specific implementation of step S110 may include: responding to a resource request of an application program client, and analyzing return data of the resource request based on a preset base class so as to
And obtaining a buried point transparent transmission rule set.
Taking the example that the embedded point transparent transmission rule is expressed by ctrp, a uniform base class resource model BaseData can be defined, so that the resource models needing to analyze transparent transmission parameters are inherited to the BaseData. A buried point transparent transmission parameter analysis method parseCTrp is provided in BaseData to analyze the ctrp in the return data of the resource request, a method for storing the ctrp data is provided to store the analyzed ctrp data, and a method for acquiring the ctrp data is provided to acquire the analyzed ctrp data. All the service data classes needing to be subjected to the embedded point parameter transparent transmission can inherit from the base class BaseData, a parseCTrp method is called to analyze ctrp data from returned data, and a getCTrp method is called to obtain ctrp corresponding to a class object of the current service data class so as to bind the ctrp and the class object of the current service data class.
For example, each service data class may configure a buried point transparent transmission rule in advance for its own resource customization based on the above buried point transparent transmission protocol, such as a buried point transparent transmission rule that it is determined that the buried point transparent transmission information takes effect on all resources, and it is determined that the buried point transparent transmission information takes effect on a resource of a specified type. In response to a resource request of the application client, the service side can provide return data of the resource request, and the return data includes ctrp data of the service side. If the returned data may include multiple resources, multiple ctrp data correspond to the returned data, and the base class resource model BaseData may analyze the returned data of the resource request to obtain the buried point transparent transmission rule corresponding to each resource in the returned data of the resource request, so as to generate a buried point transparent transmission rule set.
For example, another specific implementation of step S110 may include: responding to a resource request of an application program client, and analyzing returned data of the resource request based on a preset base class to generate a structured buried point transparent transmission rule; and obtaining the buried point transparent transmission rule set based on the structured buried point transparent transmission rule.
For example, the parsed ctrp data may be directly saved as structured data, such as storing the parsed ctrp data as map-structured data. A map is a dictionary data structure, which is a hash structure used to store non-repeated keys, and stores data in the form of key-value pairs. For example, in the front-end json (JavaScript Object Notation, JS Object Notation, which is a lightweight data exchange format), the ctrp data in the returned data may be analyzed first, and then the analyzed ctrp data is directly converted into data with a map structure, so as to store the data with the map structure in the BaseData Object.
In an exemplary embodiment, moshi (an deserialization library of an android client) sequentially parses the fields according to the field order in json, so that the ctrp data can be agreed with the server in advance and placed in the first place in json, and thus, the ctrp data can be parsed first. During analysis, the life cycle of the JsonReader analyzer is the same as that of a single analysis process, and the default JsonReader added storage field can be inherited to serve as the content of word analysis, so that the storage and access of the data of the map result corresponding to the ctrp in the single analysis process can be realized, and the data of the map structure corresponding to the ctrp obtained through the previous analysis can be reused in the subsequent analysis process. That is, the ctrp of each level can be analyzed into data of a corresponding map structure, so that when the ctrp is analyzed in a subsequent level, repeated analysis on the ctrp is not needed, and the ctrp is directly obtained from the map, which is also a reason for converting the ctrp data into map data for storage, thereby increasing the number of the ctrp
According to the analysis efficiency.
The moshi can be sequentially matched according to the adding sequence during construction, a JsonAdapter is created by using a JsonAdapter.Factory method on the first matching, and the JsonAdapter is combined in a proxy mode, so that the ctrp data can be converted into a map format and stored in a self-defined JsonReader in the analyzing process, and the data of a map structure corresponding to the ctrp can be obtained from the self-defined JsonReader to be stored in the logic of the analyzed BaseData object based on the characteristic.
In an exemplary embodiment, the set of buried point transparent transmission rules includes a list of buried point transparent transmission rules. Namely, the parsed embedded point transparent transmission rule can be stored in the embedded point transparent transmission rule list. Based on this, fig. 2 shows a flow chart of a method for obtaining a buried point transparent transmission rule set according to an embodiment of the present disclosure. Referring to fig. 2, the method may include steps S210 to S230.
In step S210, in response to the resource request of the application client, a transparent transmission rule preset adding manner corresponding to the resource in the resource request is determined.
For example, for a resource request, multiple service parties may give return data, for example, the request first arrives at the service party 1, the service party 1 recommends the song list 1 based on its recommendation policy, and the service party 2 recommends 10 songs based on its recommendation policy. Because it is unknown whether the client user clicks one of the song list 1 or the 10 songs, the buried point unvarnished transmission rule corresponding to the song list 1 and the buried point unvarnished transmission rule corresponding to the 10 songs both need to be added to the buried point unvarnished transmission rule set, for example, to the buried point unvarnished transmission rule list.
In an exemplary embodiment, the priority of the head of the buried point transparent transmission rule list may be predetermined to be highest and sequentially decreased from the top to the bottom, or the priority of the head of the buried point transparent transmission rule list may be predetermined to be lowest and sequentially increased from the top to the bottom, which is not particularly limited in this exemplary embodiment. The priority is used for determining whether the buried point transparent transmission rule is added to the head or the tail of the buried point transparent transmission rule list, namely, for indicating the adding mode of the buried point transparent transmission rule added to the buried point transparent transmission rule list. For the buried point transparent transmission parameter of the server, after receiving the buried point transparent transmission parameter rule list sent by the upstream service, the downstream service only adds the list without any modification or deletion, that is, after receiving the buried point transparent transmission rule list sent by the upstream service, the downstream service adds the buried point transparent transmission rule of the resource thereof to the buried point transparent transmission rule list.
Taking the example that the priority of the head of the buried point transparent transmission rule list is the highest, if the preset adding mode of the transparent transmission rule configured in advance for a certain resource is the adding mode with the highest priority, the buried point transparent transmission rule corresponding to the resource is added to the head of the buried point transparent transmission rule list, and if the preset adding mode of the buried point transparent transmission fish configured in advance for a certain resource is the adding mode with the lowest priority, the buried point transparent transmission rule corresponding to the resource is added to the tail of the buried point transparent transmission rule list.
In step S220, if the predetermined adding manner of the transparent transmission rule corresponding to the resource in the resource request is the first manner, the parsed embedded point transparent transmission rule corresponding to the resource is added to the head of the embedded point transparent transmission rule list.
For example, in a case that the priority of the head of the buried point transparent transmission rule list is the highest, the first manner is the addition manner with the highest priority, so that the buried point transparent transmission rule corresponding to the analyzed resource is added to the head of the buried point transparent transmission rule list. In the case that the priority of the head of the buried point transparent transmission rule list is the lowest, the first mode is the addition mode with the lowest priority, so that the buried point transparent transmission rule corresponding to the analyzed resource is added to the head of the buried point transparent transmission rule list.
In step S230, when the predetermined adding manner of the transparent transmission rule corresponding to the resource in the resource solution is the second manner, the parsed embedded point transparent transmission rule corresponding to the resource is added to the tail of the embedded point transparent transmission rule list.
For example, in the case that the priority of the head of the buried point transparent transmission rule list is the highest, the second manner is the addition manner with the lowest priority, so that the buried point transparent transmission rule corresponding to the analyzed resource is added to the tail of the buried point transparent transmission rule list. In the case that the priority of the head of the buried point transparent transmission rule list is the lowest, the second mode is the addition mode with the highest priority, so that the buried point transparent transmission rule corresponding to the analyzed resource is added to the tail of the buried point transparent transmission rule list.
When the buried point information is reported in the subsequent step S130, matching is performed in the buried point transparent transmission rule list according to the priority in the order of high and low, and if a buried point transparent transmission rule matching successfully is encountered, matching is not continued. Therefore, taking the highest priority of the head of the buried point transparent transmission rule list as an example, if the transparent transmission rule preset addition mode configured in advance for a certain resource is the addition mode with the highest priority, the buried point transparent transmission rule covers other buried point transparent transmission rules which are the same as the corresponding resource identifier and have been added to the buried point transparent transmission rule list before, and if the transparent transmission rule configured in advance for a certain resource is the addition mode with the lowest priority, the buried point transparent transmission rule does not cover other buried point transparent transmission rules which are the same as the corresponding resource identifier and have been added to the buried point transparent transmission rule list before.
With continued reference to fig. 1, in step S120, candidate resources are determined according to resources in the return data of the resource request, and the buried point transparent transmission rule set is associated with the candidate resources.
For example, one implementation in step S120 may include: and determining a candidate resource according to the resource inherited to the subclass indication of the base class in the return data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource.
For example, as described above, all resource models that need to analyze the transparent transmission parameters may be inherited to the base class resource model in advance. In other words, the resource that inherits the subclass indication of the base class may be a resource in a whitelist, where the whitelist may be custom determined. After the return data of the resource request is obtained, the resources in the return data of the resource request and the resources in the white list may be matched, and the successfully matched resources are determined as candidate resources. That is, the candidate resource includes a resource indicated by a subclass inherited from the base class in the return data of the resource request. After the candidate resources are determined, the buried point transparent transmission rule set determined in step S110 and each determined candidate resource may be associated respectively.
Illustratively, fig. 3 shows a schematic diagram of a method for associating a set of buried point unvarnished rule with a candidate resource according to an embodiment of the present disclosure. Referring to fig. 3, the method may include steps S310 to S320. Wherein: in step S310, respectively creating a class object for each subclass corresponding to each candidate resource; in step S320, a buried point transparent transmission rule set is bound for each class object corresponding to the subclass of each candidate resource, so as to associate the buried point transparent transmission rule set with the candidate resource.
For example, for each candidate resource, a new class object may be created for the sub-class characterizing the candidate resource, and then the buried point transparent transmission rule determined in step S110 is bound and associated with the class object, so as to associate the buried point transparent transmission rule set with the candidate resource.
With reference to fig. 1, in step S130, the buried point information is reported based on the buried point transparent transmission rule set associated with the candidate resource.
In an exemplary embodiment, as described above, the set of landed point transparent transmission rules includes resource identifiers corresponding to resources in the return data of the resource request. Based on this, fig. 4 shows a flowchart of a method for reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resource according to the embodiment of the present disclosure. Referring to fig. 4, the method may include steps S410 to S430.
In step S410, in response to a trigger operation in the application client, a target resource identifier of a buried point object to which the trigger operation is directed is acquired.
For example, the application client performs content presentation in the graphical user interface according to the return data of the resource request, such as the return data of the resource request including the recommended menu 1 and the recommended 10 songs. Then the recommended menu 1 and 10 songs are displayed in the display page of the application client. The user may select content of interest to the user based on the displayed content of the application client, such as the user may play menu 1 or play any of 10 songs. Of course, the user may trigger other content, which is not limited in this exemplary embodiment.
When a trigger operation occurs in the application program client, the target resource identifier of the buried point object to which the trigger operation is directed can be acquired. Wherein the buried object targeted by the trigger operation may be understood as the element or page targeted by the trigger operation. In other words, when a trigger operation occurs in the application client, a target resource identifier corresponding to an element or page to which the trigger operation is directed may be obtained.
A page may be understood as a whole area displayed exclusively at a certain user interface level, such as a newly opened underlying page, a TAB (TAB/TAB), a channel, etc.; the page is generally used for organizing a plurality of contents to distribute or used as an actual function bearing of a single content, and information such as circulation exposure and dwell time of the page has great significance for application analysis. An element may be understood as a UI component and/or element in a page that may be interacted with by a User, such as a list element, a button, a slideable content module, etc. The lists and modules are generally used for carrying content distribution, the click rate of the lists and modules has analytical significance on content distribution effects, the buttons are generally used for carrying user interaction, and the buttons are generally mounted on a certain content unit or a bottom page of a content function.
Both pages and elements can be considered as buried point objects. The page can comprise sub-pages and elements, for one page, the page itself, the sub-pages and the elements in the page can be used as buried point objects in the page, and a user can perform self-defined setting according to the needs of the user.
In an exemplary embodiment, in response to a trigger operation occurring in an application client, it may be determined whether an object targeted by the trigger operation is a buried point object. The method may determine whether the object is a buried object according to whether the object to which the trigger operation is directed is configured with a buried object identifier oid, determine that the object is a buried object if the object is configured with the buried object identifier, and determine that the object is not a buried object if the object is not configured with the buried object identifier.
If the object targeted by the trigger operation is not the buried point object, it indicates that the buried point information reporting is not needed at this time, and no processing may be performed. In the case where the object targeted by the trigger operation is a buried object, then the target resource identification of the resource indicated by the buried object may be obtained.
In step S420, the target resource identifier is matched with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource, so as to determine the target buried point information of the buried point object based on the matching result.
For example, a specific implementation of step S420 may be as shown in fig. 5. Fig. 5 shows a flow chart of a method for determining target buried point information according to an embodiment of the present disclosure.
Referring to fig. 5, the method may include steps S510 to S540. Wherein:
in step S510, a target resource is determined from the candidate resources.
In an exemplary embodiment, the target resource includes a candidate resource corresponding to the buried point object determined in step S410.
For example, a specific implementation of step S510 may include: under the condition that the buried point parameters to be reported of the buried point object comprise buried point transparent transmission parameters, determining a server interface associated with the buried point transparent transmission parameters of the buried point object; and determining the target resource from the candidate resources according to the resource in the return data of the server-side interface.
For example, for a server-side embedded point, the embedded point object is an HTTP (Hyper Text Transfer Protocol) or RPC interface, and what needs to be defined is a parameter value to be set in an embedded point transparent transmission parameter and information of a server-side embedded point to be called separately by a service under a corresponding interface. In other words, the service end buried point object parameters become buried point transparent transmission parameter management, that is, the task service needs to call the HTTP or RPC interface set by the buried point object and add the parameter value of the buried point transparent transmission parameter agreed in the interface to the RPC buried point transparent transmission parameter. For a service end buried point object, its buried point parameter can be directly agreed on the event that a service end interface is called, that is, when a certain service interface is called, the parameter value of the buried point parameter of the interface is uploaded. After the management and the guarantee of the buried point transparent transmission parameters are realized through the service object, in the front-end buried point object, the value of the target buried point parameter and the buried point transparent transmission parameter of the corresponding service end can be bound in a correlation mode on the target buried point parameter representing the buried point transparent transmission parameters of the buried point object, and then the assignment condition of the target buried point parameter can be described. As shown in fig. 6, the value of the target buried point parameter s _ ctrp representing the buried point transparent transmission parameter in the buried point reporting parameters of the buried point object may be configured as a server interface/api/v 1/resource/details/add, so as to associate the target buried point parameter representing the buried point transparent transmission parameter in the buried point parameters to be reported with the buried point transparent transmission parameter in the server interface, thereby implementing management of the buried point transparent transmission parameter.
Because the target buried point parameter is associated with the server interface in advance, under the condition that the buried point parameter to be reported of the buried point object is determined to include the target buried point parameter representing the buried point transparent transmission parameter, the candidate resource corresponding to the buried point object can be determined through the return data of the server interface associated with the target buried point parameter in advance, and the resource is used as the target resource. In other words, the candidate resource to which the buried object belongs may be determined as the target resource.
In step S520, the target resource identifier is matched with the resource identifier in the buried point transparent transmission rule set associated with the target resource.
For example, the buried point transparent transmission rule set associated with each candidate resource includes the buried point transparent transmission rules of all candidate resources, so that the target resource identifier may be matched with the resource identifier in the buried point transparent transmission rule set associated with the target resource, so as to determine the target buried point transparent transmission rule according to the matching result, and thus determine the value of the buried point transparent transmission parameter of the buried point object for which the trigger operation is directed according to the buried point information in the target buried point transparent transmission rule.
In step S530, a target buried point transparent transmission rule is determined according to the buried point transparent transmission rule indicated by the resource identifier that is successfully matched with the target resource identifier in the buried point transparent transmission rule set.
For example, a specific implementation of step S530 may include: under the condition that the resource identifier in the buried point transparent transmission rule is a preset resource identifier, if the preset resource identifier is the same as the target resource identifier, determining the target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the preset resource identifier; and under the condition that the resource identifier in the buried point transparent transmission rule is a wildcard identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the wildcard identifier.
For example, as described above, the buried point transparent transmission rule may take effect on a specified type of resource, may also take effect on a specified resource, and may also take effect on all resources requested this time. Therefore, the resource identifier in the buried point transparent transmission rule is the preset resource identifier, that is, the specified resource is effective according to the buried point information in the buried point transparent transmission rule where the preset resource identifier is located, and then if the target resource identifier is the same as the preset resource identifier, the matching is successful, and the target buried point transparent transmission rule can be determined according to the buried point transparent transmission rule indicated by the same preset resource identifier. Under the condition that the resource identifier in the buried point transparent transmission rule is a wildcard, the target resource identifier can be successfully matched with the wildcard directly, that is, the target buried point transparent transmission rule can be determined according to the buried point transparent transmission rule indicated by the wildcard.
In step S540, target buried point information of the buried point object is determined based on the buried point information in the target buried point transparent transmission rule.
For example, after the target buried point transparent transmission rule is determined, the buried point information in the target buried point transparent transmission rule may be determined as a parameter value of the buried point transparent transmission parameter of the buried point object, so as to determine the target buried point information of the target buried point object according to the parameter value.
Through the steps S510 to S540, the buried point transparent transmission parameter of the buried point object can be automatically determined, so that the buried point transparent transmission parameter is automatically reported.
In an exemplary embodiment, the set of buried point transparent transmission rules includes a buried point transparent transmission rule list, and based on this, a specific implementation manner of step S420 may include: and traversing the resource identifiers in the buried point transparent transmission rule list associated with the candidate resources according to a preset sequence, stopping traversing under the condition that the currently traversed resource identifiers are successfully matched with the target resource identifiers, and determining the target buried point information of the buried point object according to the buried point information in the buried point transparent transmission rule indicated by the currently traversed resource identifiers.
The preset sequence may include a sequence of the priority of the buried point transparent transmission rule from high to low. For example, in the case where the priority of the buried point transparent transmission rule at the head of the buried point transparent transmission rule list is the highest, the buried point transparent transmission rule list may be traversed from the head. In other words, the buried point transparent transmission rule list can be traversed from high to low according to the priority of the buried point transparent transmission rule, the traversal can be stopped under the condition that the currently traversed resource identifier and the target resource identifier are successfully matched, and then the target buried point information of the buried point object is determined according to the buried point information in the buried point transparent transmission rule which is successfully matched.
If the preset adding mode is the adding mode with the lowest priority, the embedded point transparent transmission rule will not cover other embedded point transparent transmission rules which have the same resource identifier and are added into the embedded point transparent transmission rule list before, and if the preset adding mode is the adding mode with the lowest priority. In this way, the buried point transparent transmission parameter cannot be distinguished because the same keyword is used.
In an exemplary embodiment, if the traversal of the buried point transparent transmission rule list is completed, and no buried point transparent transmission rule successfully matched with the target resource identifier is found, it is determined that no buried point transparent transmission parameter of the currently triggered object needs to be reported.
With continued reference to fig. 4, in step S430, the buried point object is reported with buried point information according to the target buried point information.
After the target embedded point information is determined, the target embedded point information can be used as an embedded point transparent transmission value of an embedded point transparent transmission parameter configured for the embedded point object, so that the embedded point information is reported.
In the disclosure, when an application client needs to update content displayed on a page, the application client may send a resource request to a server, and if the client needs to recommend the content displayed on the page, the client may send a service request to the server, and the server may invoke different service interfaces to generate return data of the service request, for example, the server invokes the service interface 1 first to obtain a recommended song list 1, then invokes the service interface 2 to obtain a recommended song list 2, and then continues to invoke the service interface 3 to obtain 10 recommended songs. Then the menu 1, the menu 2 and 10 songs are included in the return data of the service request, so that a display page is generated based on the menu 1, the menu 2 and 10 songs.
Since each server pre-configures the corresponding buried point unvarnished transmission rule according to the buried point unvarnished transmission protocol, after the returned data of the service request is determined, the returned data can be analyzed to obtain buried point unvarnished transmission rules corresponding to the song list 1, the song list 2 and the song list 10 respectively, so that a buried point unvarnished transmission rule set is determined. Under the condition that the resource models corresponding to the song list 1, the song list 2 and the song list 10 inherit the base class resource model, it is indicated that the resource models corresponding to the song list 1, the song list 2 and the song list 10 all need to be subjected to point burying parameter unvarnished transmission, and because the user does not know how to operate in the page at the moment, the point burying unvarnished transmission rule set can be bound with the song list 1, the song list 2 and the song list 10 respectively.
When a user performs a triggering operation in a client, if the user clicks the song list 1, a target resource identifier corresponding to the song list 1 clicked by the user can be obtained, the target resource identifier is matched with a resource identifier in a buried point transparent transmission rule set bound by the song list 1, a parameter value of a buried point transparent transmission parameter of a buried point object triggered by the triggering operation of the user is determined according to buried point information in the successfully matched resource identifier, and therefore the parameter value of the buried point transparent transmission parameter is reported, automatic analysis binding of the buried point transparent transmission parameter to a resource model is achieved, and efficiency and accuracy of buried point parameter transparent transmission are improved.
Illustratively, fig. 7 shows a schematic diagram of a buried point parameter transparent transmission process according to an embodiment of the present disclosure. The process of transmitting the buried point parameters throughout the present disclosure is further described with reference to fig. 7. In the disclosure, a fixed parameter ctrp may be transparently transmitted based on a request parameter transparent transmission capability between RPCs at a server, where a value of the fixed parameter is the above-mentioned buried point transparent transmission rule set, and in a case where the buried point transparent transmission rule set is a buried point transparent transmission rule list, an ordered buried point transparent transmission rule list may be maintained by the ctrp, and each buried point transparent transmission rule in the buried point transparent transmission rule list may be used to describe one buried point information kv and a resource range used by the buried point information kv, such as the above-mentioned method takes effect on all resources, takes effect on a specified type of resource, or takes effect on a specified resource.
When analyzing json data returned by the service request, each front end can perform white list matching according to class description information of each serialization framework in a traversal process so as to perform uniform resource binding on the ctrp corresponding to the service request in a network library of an application program client, as shown in fig. 7, judge whether the returned resource is in a configured white list ClassType, and bind the ctrp for the resource if the returned resource is in the configured white list ClassType, so that the automatic uniform resource binding of the ctrp is realized. Specifically, json data returned by the service request can be analyzed, for example, when a resource, a module, a sub-page and the like are bound to the current json level, a new class object can be created through the introduced meta-information Metainfo and a part of json character strings, so that the ctrp is assigned to the class object, and thus the binding between the ctrp and the resource is realized.
Therefore, in the analysis process of the network request report, the ctrp is automatically and uniformly bound to the subclass resource model inheriting the base class resource model. The request-level parameter transparent transmission capability of the RPC is utilized, resource-level parameter transparent transmission is achieved, layer-by-layer DTO extension coverage at a server side is not needed, maintenance cost of the buried point transparent transmission parameter is low, and full coverage is easy. However, the ctrp at this time includes transparent transmission parameters required by all resources in the request, and when the buried point reports, if the full amount of the buried point transparent transmission parameters are returned, on one hand, the data volume is too large, on the other hand, pressure is brought when data matching is performed in the later period, and the matching error rate is high.
Therefore, in the present disclosure, when reporting the buried point information, the resource identifier of the triggered buried point object may be matched with the resource identifier of the buried point transparent transmission rule in the ctrp to extract the buried point information only related to the current resource, so as to combine the buried point information with the buried point type and the buried point identity identifier of the current resource to form the resource content of the current resource. Namely, the ctrp is matched with the resource type or resource identity corresponding to the resource triggered by the user according to the stored full-amount buried point parameter transparent transmission rule ctrp, so as to extract the parameter value of the buried point transparent transmission parameter s _ ctrp of the resource triggered by the user, thereby realizing the timely and accurate automatic transparent transmission of the buried point parameter.
In an exemplary embodiment, the reporting method of the buried point information in the present disclosure may further include: and responding to an event for triggering the calling of the server-side interface, acquiring a buried point transparent transmission parameter value of a server-side buried point object associated with the called server-side interface, and reporting the buried point transparent transmission parameter value.
As described above, for the server-side buried point object, the buried point transparent transmission parameter of the server-side buried point object may be agreed on the event that the server-side interface is called, that is, the buried point transparent transmission parameter value of the server-side buried point object is associated with the server-side interface in advance. Therefore, when the server-side interface is called, the buried point transparent transmission parameter value of the server-side buried point object associated with the interface can be obtained. The buried point transparent transmission parameter value is preset by each server interface according to the service requirement, so that the buried point transparent transmission parameter value is preset for the buried point
And reporting the point transparent transmission parameter value.
In an exemplary embodiment, in a case that the set of the hidden point transparent transmission rules includes a resource identifier corresponding to a resource in return data of a resource request, the method for uploading the hidden point information in the present disclosure may further include: and under the condition that the resource request belongs to a preset resource request to be verified, sending the buried point transparent transmission parameter rule set corresponding to the resource request to the buried point verification platform, so that the buried point verification platform verifies the buried point reported information of the resource request.
For example, it may be predetermined which resource requests need to be checked, so as to determine a preset resource request set to be checked. Then, the current resource request may be matched with the identifier of the resource request in the preset resource request set to be verified, so as to determine whether the current resource request belongs to the preset resource request to be verified. Under the condition that the current resource request is a preset resource request, the embedded point transparent transmission rule set of the resource request can be uploaded to the embedded point checking platform so as to check the embedded point transparent transmission parameter values in the embedded point reporting information of the resource request.
Fig. 8 is a schematic flowchart illustrating a method for verifying reporting information of a buried point according to an embodiment of the present disclosure. Referring to fig. 8, the method may include steps S810 to S840. Wherein: in step S810, a resource identifier of a buried point object pre-associated with the resource request is obtained; in step S820, matching the resource identifier of the buried point object with the resource identifier in the buried point transparent transmission rule set corresponding to the resource request; in step S830, a verification rule is determined according to the buried point transparent transmission rule indicated by the resource identifier that is successfully matched in the buried point transparent transmission rule set; in step S840, based on the verification rule, the reporting information of the embedded point object is verified.
For example, information maintenance of the acquisition interface can be performed through the type of the point-buried transparent transmission parameter, then in the real-time point-buried testing process, when it is determined that the current resource request belongs to the preset resource request to be verified, a mark to be verified can be added to the current resource request, and the point-buried transparent transmission rule set ctrp of the current resource request is transmitted back to the point-buried platform through the gateway. Therefore, in the buried point platform, the buried point transparent transmission parameter value verification can be carried out on the resource request added with the mark to be verified. Specifically, a resource identifier configured in advance by a buried point object associated in advance with a marked resource request can be obtained, then the resource identifier is matched with a resource identifier in a buried point transparent transmission rule set ctrp of the resource request, a correct buried point transparent transmission parameter value is determined according to a buried point transparent transmission rule successfully matched, that is, buried point information in the buried point transparent transmission parameter value successfully matched is the correct buried point transparent transmission parameter value, the correct buried point transparent transmission parameter value is used as a check rule, a buried point transparent transmission parameter value in buried point report information is matched with the check rule, and automatic check of information in the transparent transmission parameter is realized according to a matching result. And if the matching is successful, the verification is passed, otherwise, the verification fails.
Through the steps S810 to S840, it can be tested whether the value of the buried point transparent transmission parameter S _ ctrp in the information reported by the buried point is matched with the content of the buried point transparent transmission rule set ctrp issued by the service request, so as to ensure the accuracy of information transmission of the whole link, implement automatic verification of the buried point transparent transmission parameter of the service end, and can verify the automatic verification of the accuracy of the value of the buried point transparent transmission parameter of the service end, and improve the quality of the verification of the buried point transparent transmission parameter of the service end.
The reporting method of the embedded point information can realize conflict-free resource level request parameter transparent transmission among all levels of micro services of the service request link, and improves the efficiency and accuracy of embedded point parameter transparent transmission. By the aid of the method for reporting the buried point information, automatic analysis and binding of the transparent transmission parameters to the resource model can be realized only through one buried point transparent transmission rule set parameter, accuracy of transparent transmission of the buried point information is guaranteed, and maintenance cost of the buried point transparent transmission parameters is reduced.
In addition, the method for reporting the buried point information in the disclosure can also automatically check the buried point transparent transmission parameter, thereby ensuring the uploading quality of the buried point transparent transmission parameter.
Exemplary devices
Referring to fig. 9, the reporting apparatus 900 of the embedded point information may include an analysis module 910, a uniform resource binding module 920, and a reporting module 930. Wherein:
the analysis module 910 is configured to, in response to a resource request of an application client, analyze return data of the resource request to obtain a buried point transparent transmission rule set, where the buried point transparent transmission rule set is used to describe buried point information of a resource in the return data of the resource request;
a uniform resource binding module 920, configured to determine a candidate resource according to a resource in the returned data of the resource request, and associate the buried point transparent transmission rule set with the candidate resource;
a reporting module 930 configured to report the buried point information based on the buried point transparent transmission rule set associated with the candidate resource.
In an alternative implementation manner, based on the foregoing embodiment, the parsing module 910 may be specifically configured to: responding to a resource request of an application program client, and analyzing returned data of the resource request based on a preset base class to obtain a buried point transparent transmission rule set. Based on this, the uniform resource binding module 920 described above may be specifically configured to: and determining a candidate resource according to the resource inherited to the subclass indication of the base class in the return data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource.
In an optional implementation manner, based on the foregoing embodiment, the associating the set of burial point unvarnished transmission rules with the candidate resource includes: respectively creating a class object for the subclass corresponding to each candidate resource; and respectively binding the buried point transparent transmission rule set for the class object corresponding to the subclass of each candidate resource so as to associate the buried point transparent transmission rule set with the candidate resource.
In an optional implementation manner, based on the foregoing embodiment, the set of burial point transparent transmission rules is determined according to one or more of resource identifiers, service identifiers, burial point information, and remote procedure call service information in the return data of the resource request.
In an optional implementation manner, based on the foregoing embodiment, the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in the return data of the resource request; based on this, the reporting module 930 may be specifically configured to: responding to a trigger operation in the application program client, and acquiring a target resource identifier of a buried point object to which the trigger operation aims; matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine target buried point information of the buried point object based on a matching result; and reporting the embedded point information of the embedded point object according to the target embedded point information.
In an optional implementation manner, based on the foregoing embodiment, the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: determining target resources from the candidate resources, wherein the target resources comprise the candidate resources corresponding to the buried point object; matching the target resource identification with the resource identification in the buried point transparent transmission rule set associated with the target resource; determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the resource identifier successfully matched with the target resource identifier in the buried point transparent transmission rule set; and determining the target buried point information of the buried point object based on the buried point information in the target buried point transparent transmission rule.
In an optional implementation manner, based on the foregoing embodiment, the determining a target resource from the candidate resources includes: under the condition that the buried point parameters to be reported of the buried point object comprise buried point transparent transmission parameters, determining a server interface associated with the buried point transparent transmission parameters of the buried point object; and determining a target resource from the candidate resources according to the resource in the return data of the server-side interface.
In an optional implementation manner, based on the foregoing embodiment, the determining a target buried point transparent transmission rule according to a buried point transparent transmission rule indicated by a resource identifier that is successfully matched with the target resource identifier in the buried point transparent transmission rule set includes: under the condition that a resource identifier in a buried point transparent transmission rule is a preset resource identifier, if the preset resource identifier is the same as the target resource identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the preset resource identifier; and under the condition that the resource identifier in the buried point transparent transmission rule is a wildcard identifier, determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the wildcard identifier.
In an optional implementation manner, based on the foregoing embodiment, the set of the transparent transmission rule of the buried point includes a list of transparent transmission rule of the buried point; the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes: and traversing the resource identifiers in the buried point transparent transmission rule list associated with the candidate resources according to a preset sequence, stopping traversing under the condition that the currently traversed resource identifiers are successfully matched with the target resource identifiers, and determining the target buried point information of the buried point object according to the buried point information in the buried point transparent transmission rule indicated by the currently traversed resource identifiers.
In an optional implementation manner, based on the foregoing embodiment, the set of the transparent transmission rule of the buried point includes a list of transparent transmission rule of the buried point; the parsing module 910 may also be specifically configured to: responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the head of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource request is preset to be added in a first mode; responding to a resource request of an application program client, and adding the analyzed buried point transparent transmission rule corresponding to the resource to the tail of the buried point transparent transmission rule list under the condition that the transparent transmission rule corresponding to the resource in the resource request is preset to be added in a second mode.
In an optional implementation manner, based on the foregoing embodiment, the parsing module 910 may also be specifically configured to: responding to a resource request of an application program client, analyzing return data of the resource request based on a preset base class to generate a structured buried point transparent transmission rule; and obtaining the buried point transparent transmission rule set based on the structured buried point transparent transmission rule.
In an optional implementation manner, based on the foregoing embodiment, the reporting apparatus 900 of the burial point information may further include a server interface call event reporting module, where the module may be specifically configured to: and responding to an event for triggering the calling of the server-side interface, acquiring a buried point transparent transmission parameter value of a server-side buried point object associated with the called server-side interface, and reporting the buried point transparent transmission parameter value.
In an optional implementation manner, based on the foregoing embodiment, in a case that the set of the cloud point transparent transmission rules includes a resource identifier corresponding to a resource in the return data of the resource request, the apparatus 900 may further include a checking module, where the checking module may be specifically configured to: under the condition that the resource request belongs to a preset resource request to be verified, sending a buried point transparent transmission parameter rule set corresponding to the resource request to a buried point verification platform, so that the buried point verification platform verifies buried point report information of the resource request;
in an optional implementation manner, based on the foregoing embodiment, the manner in which the buried point verification platform verifies the buried point report information of the resource request includes: acquiring a resource identifier of a buried point object pre-associated with the resource request; matching the resource identifier of the buried point object with the resource identifier in the buried point transparent transmission rule set corresponding to the resource request; determining a check rule according to the buried point transparent transmission rule indicated by the successfully matched resource identifier in the buried point transparent transmission rule set; and checking the buried point reporting information of the buried point object based on the checking rule.
In addition, other specific details of the embodiments of the present disclosure have been described in detail in the embodiments of the invention of the above method, and are not described herein again.
Exemplary storage Medium
Storage media of exemplary embodiments of the present disclosure are explained below.
In the present exemplary embodiment, the above-described method may be implemented by a program product, such as a portable compact disc read only memory (CD-ROM) and including program code, and may be executed on a device, such as a personal computer. However, the program product of the present disclosure is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RE, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Exemplary electronic device
An electronic device of an exemplary embodiment of the present disclosure is explained with reference to fig. 10. The electronic device may be a client or a server.
The electronic device 1000 shown in fig. 10 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 10, the electronic device 1000 is embodied in the form of a general purpose computing device. The components of the electronic device 1000 may include, but are not limited to: at least one processing unit 1010, at least one memory unit 1020, a bus 1030 that couples various system components including the memory unit 1020 and the processing unit 1010, and a display unit 1040.
Where the storage unit stores program code that may be executed by the processing unit 1010 to cause the processing unit 1010 to perform the steps according to various exemplary embodiments of the present disclosure as described in the "exemplary methods" section above in this specification. For example, the processing unit 1010 may perform the method steps, etc., as shown in fig. 1.
The memory unit 1020 may include volatile memory units such as a random access memory unit (RAM) 1021 and/or a cache memory unit 1022, and may further include a read only memory unit (ROM) 1023.
Storage unit 1020 may also include a program/utility 1024 having a set (at least one) of program modules 1025, such program modules 1025 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 1030 may include a data bus, an address bus, and a control bus.
The electronic device 1000 may also communicate with one or more external devices 1100 (e.g., keyboard, pointing device, bluetooth device, etc.), which may be through an input/output (I/O) interface 1050. The electronic device 1000 further comprises a display unit 1040 connected to the input/output (I/O) interface 1050 for displaying. Also, the electronic device 1000 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 1060. As shown, the network adapter 1060 communicates with the other modules of the electronic device 1000 over the bus 1030. It should be appreciated that although not shown, other hardware and/or software modules may be used in conjunction with the electronic device 1000, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, to name a few.
It should be noted that although in the above detailed description several modules or sub-modules of the apparatus are mentioned, such division is merely exemplary and not mandatory. Indeed, the features and functionality of two or more of the units/modules described above may be embodied in one unit/module, in accordance with embodiments of the present disclosure. Conversely, the features and functions of one unit/module described above may be further divided into embodiments by a plurality of units/modules.
Further, while the operations of the disclosed methods are depicted in the drawings in a particular order, this does not require or imply that these operations must be performed in this particular order, or that all of the illustrated operations must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions.
While the spirit and principles of the present disclosure have been described with reference to several particular embodiments, it is to be understood that the present disclosure is not limited to the particular embodiments disclosed, nor is the division of aspects, which is for convenience only as the features in such aspects may not be combined to benefit. The disclosure is intended to cover various modifications and equivalent arrangements included within the spirit and scope of the appended claims.

Claims (10)

1. A reporting method of embedded point information is characterized by comprising the following steps:
responding to a resource request of an application program client, analyzing return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request;
determining a candidate resource according to the resource in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource;
and reporting the buried point information based on the buried point transparent transmission rule set associated with the candidate resources.
2. A reporting method of buried point information according to claim 1, wherein the analyzing, in response to a resource request of an application client, return data of the resource request to obtain a buried point transparent transmission rule set includes:
responding to a resource request of an application program client, and analyzing returned data of the resource request based on a preset base class to obtain a buried point transparent transmission rule set;
determining a candidate resource according to the resource in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource, wherein the method comprises the following steps:
and determining a candidate resource according to the resource inherited to the subclass indication of the base class in the returned data of the resource request, and associating the buried point transparent transmission rule set with the candidate resource.
3. A reporting method of the buried point information according to claim 2, wherein the associating the set of the buried point transparent transmission rules with the candidate resource includes:
respectively creating a class object for the subclass corresponding to each candidate resource;
and binding the buried point transparent transmission rule set for the class object corresponding to the subclass of each candidate resource respectively so as to associate the buried point transparent transmission rule set with the candidate resource.
4. A reporting method of the buried point information according to claim 1, wherein the buried point transparent transmission rule set is determined according to one or more of a resource identifier, a service identifier, the buried point information, and remote procedure call service information in the return data of the resource request.
5. A reporting method of the buried point information according to claim 1, wherein the buried point transparent transmission rule set includes a resource identifier corresponding to a resource in return data of the resource request; the reporting of the buried point information based on the buried point transparent transmission rule set associated with the candidate resource comprises the following steps:
responding to a trigger operation in the application program client, and acquiring a target resource identifier of a buried point object to which the trigger operation aims;
matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine target buried point information of the buried point object based on a matching result;
and reporting the buried point information of the buried point object according to the target buried point information.
6. A reporting method of buried point information according to claim 5, wherein the matching the target resource identifier with the resource identifier in the buried point transparent transmission rule set associated with the candidate resource to determine the target buried point information of the buried point object based on the matching result includes:
determining target resources from the candidate resources, wherein the target resources comprise the candidate resources corresponding to the buried point object;
matching the target resource identification with the resource identification in the buried point transparent transmission rule set associated with the target resource;
determining a target buried point transparent transmission rule according to the buried point transparent transmission rule indicated by the resource identifier successfully matched with the target resource identifier in the buried point transparent transmission rule set;
and determining the target buried point information of the buried point object based on the buried point information in the target buried point transparent transmission rule.
7. A reporting method of buried point information as claimed in claim 6, wherein the determining a target resource from the candidate resources includes:
under the condition that the buried point parameters to be reported of the buried point object comprise buried point transparent transmission parameters, determining a server interface associated with the buried point transparent transmission parameters of the buried point object;
and determining a target resource from the candidate resources according to the resource in the return data of the server-side interface.
8. A device for reporting embedded point information is characterized by comprising:
the analysis module is configured to respond to a resource request of an application program client, analyze return data of the resource request to obtain a buried point transparent transmission rule set, wherein the buried point transparent transmission rule set is used for describing buried point information of resources in the return data of the resource request;
the uniform resource binding module is configured to determine a candidate resource according to the resource in the return data of the resource request, and associate the buried point transparent transmission rule set with the candidate resource;
and the reporting module is configured to report the buried point information based on the buried point transparent transmission rule set associated with the candidate resource.
9. A computer-readable medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to carry out the method of any one of claims 1 to 7.
CN202211644224.7A 2022-12-20 2022-12-20 Reporting method and device of embedded point information, readable storage medium and electronic equipment Pending CN115827276A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211644224.7A CN115827276A (en) 2022-12-20 2022-12-20 Reporting method and device of embedded point information, readable storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211644224.7A CN115827276A (en) 2022-12-20 2022-12-20 Reporting method and device of embedded point information, readable storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115827276A true CN115827276A (en) 2023-03-21

Family

ID=85517137

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211644224.7A Pending CN115827276A (en) 2022-12-20 2022-12-20 Reporting method and device of embedded point information, readable storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115827276A (en)

Similar Documents

Publication Publication Date Title
US11669503B2 (en) Building and managing data-processing attributes for modeled data sources
US10289275B2 (en) Standard commands for native commands
US7877732B2 (en) Efficient stress testing of a service oriented architecture based application
US20190188006A1 (en) Adapter configuration
CN111209202A (en) Terminal application testing method and device
US10936645B2 (en) Method and apparatus for generating to-be-played multimedia content
AU2014400621B2 (en) System and method for providing contextual analytics data
CN110515827A (en) Automated testing method, device, computer equipment and storage medium
CN113010395A (en) Data acquisition method, apparatus, device, medium, and program product
US11095957B2 (en) Method and apparatus for publishing information, and method and apparatus for processing information
CN109547234A (en) A kind of data processing, report method, device, equipment and storage medium
CN114816499A (en) Electronic resource sharing method and device and storage medium
US20110047274A1 (en) System and Method to Manage a Policy Related to a Network-Based Service
CN116360735A (en) Form generation method, device, equipment and medium
CN113778897B (en) Automatic test method, device and equipment for interface and storage medium
CN113094236A (en) System data acquisition method and device, computer equipment and storage medium
CN114928566B (en) Function test method and device of client, storage medium and electronic equipment
CN105912573A (en) Data updating method and data updating device
CN115827276A (en) Reporting method and device of embedded point information, readable storage medium and electronic equipment
US11288322B2 (en) Conversational agents over domain structured knowledge
CN114297495A (en) Service data searching method and device, electronic equipment and storage medium
CN114567543A (en) Problem interface positioning method and device, electronic equipment and storage medium
CN113961835A (en) Data processing method and device, electronic equipment and storage medium
CN113886216A (en) Interface test and tool configuration method, device, electronic equipment and storage medium
CN110908763A (en) Acceptance method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination