CN117609025A - Data processing method and device, readable medium and electronic equipment - Google Patents

Data processing method and device, readable medium and electronic equipment Download PDF

Info

Publication number
CN117609025A
CN117609025A CN202311553613.3A CN202311553613A CN117609025A CN 117609025 A CN117609025 A CN 117609025A CN 202311553613 A CN202311553613 A CN 202311553613A CN 117609025 A CN117609025 A CN 117609025A
Authority
CN
China
Prior art keywords
data
target
buried point
verification
data verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311553613.3A
Other languages
Chinese (zh)
Inventor
张宇晗
张水生
樊丹驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Volcano Engine Technology Co Ltd
Original Assignee
Beijing Volcano Engine Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Volcano Engine Technology Co Ltd filed Critical Beijing Volcano Engine Technology Co Ltd
Priority to CN202311553613.3A priority Critical patent/CN117609025A/en
Publication of CN117609025A publication Critical patent/CN117609025A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3608Software analysis for verifying properties of programs using formal methods, e.g. model checking, abstract interpretation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • G06F11/3072Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting
    • G06F11/3082Monitoring arrangements determined by the means or processing involved in reporting the monitored data where the reporting involves data filtering, e.g. pattern matching, time or event triggered, adaptive or policy-based reporting the data filtering being achieved by aggregating or compressing the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/32Monitoring with visual or acoustical indication of the functioning of the machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • G06F11/3644Software debugging by instrumenting at runtime
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Testing And Monitoring For Control Systems (AREA)

Abstract

The disclosure relates to a data processing method, a data processing device, a readable medium and electronic equipment, so as to check whether a reporting timer of a buried point is abnormal or not and improve buried point verification efficiency. The method comprises the following steps: displaying a data verification interface, wherein the data verification interface is used for verifying buried data in real time; responding to the embedded point verification operation triggered on the data verification interface, and acquiring target embedded point data to be verified according to a preset target verification rule; and aggregating and displaying the buried point data belonging to the same buried point in the target buried point data, and displaying a data verification result corresponding to each buried point data.

Description

Data processing method and device, readable medium and electronic equipment
Technical Field
The disclosure relates to the technical field of data processing, and in particular relates to a data processing method, a data processing device, a readable medium and electronic equipment.
Background
The buried point data is the data reported when the buried point is triggered, the use condition of the application can be known through the buried point data, and in order to improve the accuracy of the buried point, the accuracy of the buried point can be determined through buried point verification.
The embedded point verification mainly verifies the reporting time and embedded point content of the embedded point, in the related technology, the accuracy of the embedded point content can only be verified automatically, and the accuracy of the reporting time of the embedded point needs users to perform naked eye identification in a large amount of complicated embedded point data, so that the verification efficiency is low.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In a first aspect, the present disclosure provides a data processing method, the method comprising:
displaying a data verification interface, wherein the data verification interface is used for verifying buried data in real time;
responding to the embedded point verification operation triggered on the data verification interface, and acquiring target embedded point data to be verified according to a preset target verification rule;
and aggregating and displaying the buried point data belonging to the same buried point in the target buried point data, and displaying a data verification result corresponding to each buried point data.
In a second aspect, the present disclosure provides a data processing apparatus, the apparatus comprising:
the display module is used for displaying a data verification interface, and the data verification interface is used for verifying the buried data in real time;
the acquisition module is used for responding to the embedded point verification operation triggered at the data verification interface and acquiring target embedded point data to be verified according to a preset target verification rule;
and the aggregation display module is used for carrying out aggregation display on the buried point data belonging to the same buried point in the target buried point data and displaying a data verification result corresponding to each buried point data.
In a third aspect, the present disclosure provides a computer readable medium having stored thereon a computer program which, when executed by a processing device, implements the steps of the method of any of the first aspects.
In a fourth aspect, the present disclosure provides an electronic device comprising:
a storage device having a computer program stored thereon;
processing means for executing said computer program in said storage means to carry out the steps of the method according to any one of the first aspects.
According to the technical scheme, a data verification interface for verifying the buried point data in real time is displayed first, then target buried point data to be verified is obtained according to a preset target verification rule in response to buried point verification operation triggered by the data verification interface, buried point data belonging to the same buried point in the target buried point data are displayed in an aggregation mode, and a data verification result corresponding to each buried point data is displayed. Through the aggregation display, whether the reporting timer of the buried point is abnormal or not is conveniently and rapidly checked, for example, the repeated reporting condition of the buried point is easier to check, and further, the abnormal buried point can be rapidly found and positioned, and the buried point verification efficiency is improved.
Additional features and advantages of the present disclosure will be set forth in the detailed description which follows.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale. In the drawings:
FIG. 1 is a flow chart of a method of data processing provided in accordance with an exemplary embodiment;
FIG. 2 is a schematic diagram of a device connection step provided in accordance with an exemplary embodiment;
FIG. 3 is a schematic diagram of another device connection step provided in accordance with an exemplary embodiment;
FIG. 4 is a schematic diagram of a device commissioning provided in accordance with an example embodiment;
FIG. 5 is a schematic diagram of a connection history device provided in accordance with an exemplary embodiment;
FIG. 6 is a schematic diagram of a data verification interface provided in accordance with an exemplary embodiment;
FIG. 7 is a schematic diagram of a data verification interface provided in accordance with an exemplary embodiment;
FIG. 8 is a schematic diagram of a data verification interface provided in accordance with an exemplary embodiment;
FIG. 9 is a schematic diagram of a data verification interface provided in accordance with an exemplary embodiment;
FIG. 10 is a schematic diagram of a report save interface provided in accordance with an exemplary embodiment;
FIG. 11 is a schematic diagram of a report viewing interface provided in accordance with an exemplary embodiment;
FIG. 12 is a block diagram of a data processing apparatus provided in accordance with an exemplary embodiment;
fig. 13 is a block diagram of an electronic device provided in accordance with an exemplary embodiment.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure have been shown in the accompanying drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but are provided to provide a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
It will be appreciated that prior to using the technical solutions disclosed in the embodiments of the present disclosure, the user should be informed and authorized of the type, usage range, usage scenario, etc. of the personal information related to the present disclosure in an appropriate manner according to the relevant legal regulations.
For example, in response to receiving an active request from a user, a prompt is sent to the user to explicitly prompt the user that the operation it is requesting to perform will require personal information to be obtained and used with the user. Thus, the user can autonomously select whether to provide personal information to software or hardware such as an electronic device, an application program, a server or a storage medium for executing the operation of the technical scheme of the present disclosure according to the prompt information.
As an alternative but non-limiting implementation, in response to receiving an active request from a user, the manner in which the prompt information is sent to the user may be, for example, a popup, in which the prompt information may be presented in a text manner. In addition, a selection control for the user to select to provide personal information to the electronic device in a 'consent' or 'disagreement' manner can be carried in the popup window.
It will be appreciated that the above-described notification and user authorization process is merely illustrative and not limiting of the implementations of the present disclosure, and that other ways of satisfying relevant legal regulations may be applied to the implementations of the present disclosure.
Meanwhile, it can be understood that the data (including but not limited to the data itself, the acquisition or the use of the data) related to the technical scheme should conform to the requirements of the corresponding laws and regulations and related regulations.
The embedded point verification mainly verifies the reporting time and embedded point content of the embedded point, and the reporting time refers to what time to report the embedded point data after triggering the embedded point, such as immediately reporting after clicking a submit button or reporting after successful submitting. The embedded point content refers to attribute information of the embedded point, such as whether an attribute Device ID (Device number) is reported, or not. In the business scenario of embedded point verification, the embedded point verification is usually required to be tested by a front-end engineer, then tested by a data tester, and finally accepted by a data analyzer. In the related art, the accuracy of the embedded point content can only be automatically verified, and the accuracy of the reporting time of the embedded point needs to be identified by naked eyes of a user in a large amount of complicated embedded point data, so that the verification efficiency is low.
In view of the above, the present disclosure provides a data processing method, apparatus, readable medium and electronic device, so as to solve the above technical problems.
It should be noted that, the data processing method provided by the present disclosure may be applied to a data management platform, taking a management platform of a full life cycle of traffic data as an example, where the management platform may provide functions of collection, production, distribution, and management of traffic data. By providing relevant operation interfaces for verifying the buried point data in real time, users such as data testers, data analysts, front-end engineers and the like are helped to perform buried point verification work.
Embodiments of the present disclosure are further explained below with reference to the drawings.
Fig. 1 is a flowchart illustrating a data processing method according to an exemplary embodiment of the present disclosure. Referring to fig. 1, the method includes:
s101, displaying a data verification interface.
The data verification interface is used for verifying the buried data in real time.
S102, responding to the embedded point verification operation triggered at the data verification interface, and acquiring target embedded point data to be verified according to a pre-configured target verification rule.
S103, aggregating and displaying the buried point data belonging to the same buried point in the target buried point data, and displaying a data verification result corresponding to each buried point data.
By adopting the method, the report timer of the buried point is displayed in an aggregation mode so as to quickly check whether the report timer of the buried point is abnormal or not, for example, the repeated report condition of the buried point is easier to check, so that the abnormal buried point can be quickly found and positioned, and the buried point verification efficiency is improved.
In a possible manner, the method further comprises: responding to the selection operation aiming at the target application type in the data verification interface, displaying a device connection step corresponding to the target application type, wherein the device connection step is used for indicating a user to establish connection with a device to be subjected to embedded point verification according to the device connection step; according to a pre-configured target verification rule, obtaining target embedded data to be verified, including: after connection is established with the target equipment according to the equipment connection step, target embedded point data which are to be verified and reported by the target equipment are obtained according to a preset target verification rule.
For example, device connection steps for different types of applications may be carded, decimated into generic device connection steps, and presented in the form of step bars. Taking embedded point verification for application XXX as an example, a data verification interface as shown in fig. 2, a corresponding application type, such as iOS, android, H5/applet, PC web page, server, etc. is selected first, and a corresponding option is provided specifically according to an actual application type, which is not limited in this disclosure. The device connection steps corresponding to different application types may be different, as shown in fig. 2, the iOS, android or H5/applet type applications may be installed on the mobile device, so that the applications may be quickly connected in a code scanning connection manner, as shown in fig. 3, the PC web page or server type applications may not support the code scanning connection manner, but use the connection manner of the input device ID (number), and may also be compatible with multiple connection manners of the same application type, which is specifically set according to requirements. Thus, the embedded point verification requirements of different types of applications can be met.
In addition, applications of the same type but different versions may also have differences in device connection steps, so that, in other possible manners, different versions of options and corresponding device connection steps may also be provided for a user to make a device connection, which is not limited by the present disclosure.
For example, after selecting a corresponding application type, the data verification interface may display a device connection step of the application type in a step bar, as shown in fig. 2, and may download and install a corresponding internal test packet, and if the internal test packet has been installed, may skip the step and connect with the target device, so as to obtain target embedded point data to be verified and reported by the target device according to a preset target verification rule.
It should be understood that the manner of adopting the code scanning connection is equivalent to that of the interaction between the target device and the device of the data verification interface, so that the target device can sense whether the connection is successful, and after the code scanning connection is successful, prompt information indicating that the connection is successful is usually displayed, so that the user can know the connection condition of the target device. As shown in fig. 2, corresponding prompt information may be displayed on the data verification interface to remind the user that no reaction or failure may be performed after the code scanning, such as checking a network, changing a connection mode, updating an internal test packet, etc., which is not limited in the present disclosure.
In a manner of inputting the device ID for connection, since the target device does not interact with the device of the data verification interface, in order to obtain the connection situation of the target device, in a possible manner, the method further includes: in response to a device commissioning operation for the target device, a connection state of the target device is displayed.
For example, with continued reference to fig. 3, a control of "debug device" may be clicked, so that the connection status of the target device, such as connection success, connection failure, connection being performed, etc., may be obtained based on the device ID, and displayed so that the user knows the connection condition of the target device.
In a possible manner, the method further comprises: responding to a connection configuration operation aiming at the equipment connection mode, displaying a connection configuration interface, wherein the connection configuration interface is provided with a connection operation template for a user to configure the equipment connection mode; and responding to the editing operation aiming at the connection operation template, and determining a target device connection mode corresponding to the editing operation. The step of displaying the device connection corresponding to the target application type may include: and displaying the equipment connection step corresponding to the target application type according to the target equipment connection mode.
For example, to be compatible with applications or SDKs (Software Development Kit, software development kits) of applications of different versions, an operation template may be provided for the user to maintain the device connection mode by himself, and the device connection step of the data verification interface is embedded. For example, the "edit" control shown in fig. 4 may be clicked, a connection configuration interface may be entered, an appropriate connection operation template may be selected for editing according to an application, a connection manner of the target device may be determined, for example, a text-based device ID search path may be used, or a device ID search path may be shown in a device screenshot form, etc., which is not limited in this disclosure.
For example, the "new page open" control shown in FIG. 4 may also be clicked, and specific steps of opening the device connection in the new page, such as displaying in small graphics on the data verification interface, may be displayed in large graphics on the new page. Or, the specific steps of the device connection mode are more, when the data verification interface is insufficient for complete display, the specific steps can be completely displayed in the new page, and the like, which is not limited in the disclosure. In addition, the new page may be displayed when a new interface is opened, or may be displayed in a popup window over the data verification interface, which is not limited in this disclosure. So that specific steps of the device connection mode can be clearly shown to the user.
In other possible ways, the method may further comprise: responding to triggering operation of target historical equipment for historical connection, and connecting with the target historical equipment to acquire target embedded point data to be verified and reported by the historical target equipment according to a preset target verification rule.
For example, after a device is successfully connected once, it may be quickly connected by clicking on the history device. As shown in fig. 5, a historically connected device a may be displayed and connected to device a by clicking on the "connect" control. And the last connected device, the plurality of devices connected for the previous time, and all connected devices may be displayed, which may be specifically set according to the needs, and the present disclosure is not limited thereto. Therefore, aiming at the connected equipment, the equipment connection step is not required to be re-executed, the equipment connection process is simplified, and the embedded point verification efficiency is improved.
After the connection with the target device is successful, the embedded point verification can be performed, referring to fig. 6, when the embedded point verification is performed, the left menu bar can be folded to facilitate the embedded point verification operation of the user, and different menu items can be represented in the form of icons for the user to switch, wherein the icon 60 represents a specific application for performing the embedded point verification, the icon 61 represents real-time verification, the icon 62 represents a verification report, and the icon 63 represents a filter.
In a possible manner, the target validation rule is configured as follows: determining a target verification rule corresponding to the selection operation in response to the selection operation for the candidate verification rule; the candidate validation rules include a first candidate rule determined based on the buried point validation requirements and/or a second candidate rule configured based on the filter.
For example, before acquiring the embedded point data, the verification rule needs to be determined, that is, the uploaded embedded point event, event parameters, log format and so on data need to be determined, which may be specifically determined according to the requirement, and the disclosure is not limited. With continued reference to fig. 6, a drop-down selection mode may be used to select a validation rule of a buried point validation requirement type or a screener type, and further a drop-down selection mode may be used to select a candidate rule under a corresponding type, thereby determining a target validation rule.
It should be understood that the embedded point verification requirement is determined based on the embedded point requirement or the embedded point scheme of the user, and the embedded point requirement or the embedded point scheme can be configured in the embedded point management, which generally includes the whole embedded point requirement or the whole embedded point of the whole embedded point scheme, and the embedded point data corresponding to the embedded point verification requirement can be determined and acquired by directly selecting the corresponding candidate rule during verification without additionally configuring the embedded point verification requirement. The filter may be set in a filter menu of the icon 63, and the buried point to be verified may be configured by user definition according to the user requirement, so as to obtain corresponding buried point data.
In a possible manner, aggregating and displaying the buried point data belonging to the same buried point in the target buried point data may include: and responding to the triggering operation of the aggregation display control in the data verification interface, determining that the data display mode is an aggregation display mode, and performing aggregation display on the buried point data belonging to the same buried point in the target buried point data.
For example, with continued reference to fig. 6, the aggregation display control 65 may be clicked, in the event list display area, the buried point data belonging to the same buried point in the target buried point data may be displayed in an aggregate manner, and may be specific to data uploaded by parameters of the buried point data, and an icon representing a data verification result corresponding to each buried point data is displayed, for example, reporting is prohibited, abnormal, successful, not reported, partial abnormal, and the like, which is not limited in the present disclosure. For example, the same buried point (event 1) is triggered once, but a plurality of buried point data are reported, the buried point is indicated to be abnormal, so that a user can conveniently and rapidly check whether the reporting timer of the buried point is abnormal.
In a possible manner, aggregating and displaying the buried point data belonging to the same buried point in the target buried point data may include: determining a target screening condition in response to a configuration operation of at least one of the following screening condition items: buried point event condition items, event parameter condition items, log format condition items and abnormal data condition items; screening the target buried point data based on the target screening conditions to obtain screened target buried point data; and aggregating and displaying the buried point data belonging to the same buried point in the screened target buried point data.
For example, referring to fig. 7, showing screening conditions for a buried event, an event parameter, a log format, whether to display abnormal data, etc., an event screening condition corresponding to a first configuration operation may be determined in response to the first configuration operation for a buried event condition item. The parameter screening condition corresponding to the second configuration operation can also be determined in response to the second configuration operation for the event parameter condition item. The log format screening condition corresponding to the third configuration operation may also be determined in response to the third configuration operation for the log format condition item. In response to the fourth configuration operation for the abnormal data condition item, an abnormal data screening condition corresponding to the fourth configuration operation may be determined, for example, a hook option of "only displaying abnormal buried points" is checked, and then the target buried point data only displaying the abnormality is indicated.
The target screening condition may be set independently by any one of the screening conditions, may be set by a mixture of a plurality of screening conditions, and may be provided with or without two types of screening logic, which is not limited in this disclosure. Therefore, the verification range can be quickly reduced, and a user can conveniently focus on the target buried point.
It should be understood that other screening conditions may be provided as desired in addition to the above-described exemplary screening conditions, and this disclosure is not limited in this regard.
In a possible manner, the method further comprises: in response to a save operation for the target screening condition, the target screening condition is saved as a first validation rule for use as a candidate validation rule for configuring the target validation rule.
Illustratively, continuing with parameter FIG. 7, after configuring the target screening conditions, the user may click on the control "save as filter" to save the target screening conditions as filter-based candidate validation rules as described above. For example, the target verification rule needs to verify the buried point 1, the buried point 2 and the buried point 3, and then when the user wants to view the buried point data of the buried point 1 and the buried point 2, corresponding screening conditions can be set to screen out the buried point data of the buried point 1 and the buried point 2. If the user wants to directly verify the buried point 1 and the buried point 2 next time, the target screening rule can be saved as a candidate verification rule, and the candidate verification rule is directly selected as the target verification rule for buried point verification when the buried point verification is performed next time, so that the user does not need to additionally configure the corresponding candidate verification rule, the user operation is simplified, and the buried point verification efficiency is improved.
In a possible manner, the method further comprises: and responding to the triggering operation of the time sequence display control in the data verification interface, determining the data display mode to be the time sequence display mode, and displaying the target embedded point data according to the sequence of the reporting time.
For example, referring to FIG. 8, the time sequence display control 64 may be clicked, and the target buried data displayed in the event list display area in the order of reporting time. In addition, each buried event may be expanded to display data uploaded by parameters of the buried data, and an icon representing a data verification result corresponding to each buried data may be displayed, such as reporting prohibition, exception, success, non-reporting, partial exception, etc., which is not limited by the present disclosure. The target buried point data is displayed in a time axis mode, so that a user can know the buried point data reported at any time point conveniently, and whether the reporting timer of the buried point is abnormal or not can be verified rapidly.
It should be noted that, a default display mode of the target embedded data may be set, for example, the target embedded data is displayed according to an aggregate display mode or a time sequence display mode by default, and then is displayed in a switching mode according to a corresponding mode of the control after the user triggers the corresponding control, which is not limited in this disclosure.
In addition, whether in the aggregate display mode or the time sequence display mode, the filtering condition item can be provided for the user to configure so as to filter the target embedded data, and the display area of the filtering condition item can be folded or unfolded, as shown in an unfolded form in fig. 7, and as shown in a folded form in fig. 8.
In a possible manner, the method further comprises: and responding to the selection operation of the target data in the target buried point data, marking and displaying the log detail data corresponding to the target data in a log detail area in the data verification interface, wherein the log detail area is used for displaying all the log detail data corresponding to the target buried point data.
For example, referring to fig. 9, the log detail area in the data verification interface is used for displaying all log detail data corresponding to the target embedded point data, in response to a selection operation for the target data in the target embedded point data, for example, the embedded point event is quickly switched by clicking an event list, a mouse up-down key or a scroll bar, for example, the log detail data corresponding to the target data is marked and displayed in the log detail area, so that a user is convenient to locate the log detail of the target data.
In a possible manner, the method further comprises: responding to the selection operation of target data in target buried point data, and displaying a buried point triggering scene corresponding to the target data; and in response to the selection operation of the target buried point trigger scene in the buried point trigger scene, marking and displaying log detail data corresponding to the target buried point trigger scene in a log detail area in the data verification interface, wherein the log detail area is used for displaying all log detail data corresponding to the target buried point data.
For example, with continued reference to fig. 9, in a case where different application scenarios may trigger the same embedded point, for example, for an embedded point of playing a video, the embedded point of playing the video may be triggered on the front page, or the embedded point of playing the video may be triggered on the video detail page, then the identification information of the embedded point trigger scenario corresponding to each event, such as a scenario name, may be displayed in the event list, the content such as the embedded point trigger scenario and the scenario information corresponding to the target data may be displayed in the "result verification area", and in response to the selection operation for the target embedded point trigger scenario in the embedded point trigger scenario, the log detail data corresponding to the target embedded point trigger scenario may be marked and displayed in the log detail area, so that the user may quickly select the corresponding log detail according to the trigger scenario for viewing.
Note that with continued reference to fig. 9, the "copy" control may be clicked on to copy the log details. And in the embedded point verification process, the "pause" control can be clicked to pause the embedded point verification, the "end" control can be clicked to end the embedded point verification, the "empty embedded point" control can be clicked to empty the event list, log details, content displayed by the verification result, and the like, and the present disclosure is not limited to this.
It is worth to say that in the related art, the verification result needs to be manually recorded by a tester to generate a verification report, and further needs to be subjected to on-line management and maintenance, so that the workload is large, the efficiency is low, and the maintenance is difficult to trace.
Thus, in a possible manner, the method further comprises: responding to the save operation for the data verification result, displaying a report save interface, wherein the report save interface displays the data verification result; responding to the editing operation aiming at the data verification result, and determining a target data verification result corresponding to the editing operation; a data verification report is generated based on the target data verification result.
For example, referring to fig. 10, the "save as report" control in the data verification interface may be clicked, the report save interface may be displayed when a new interface is opened, or may be displayed in a popup window over the data verification interface, which is not limited in this disclosure. Basic information such as report names, report descriptions and the like can be filled in a report storage interface, and data verification results can be edited to obtain a final data verification report, so that an online report function is built, connection between the verification report and real-time verification is opened, the report is automatically generated quickly, and the system is high in efficiency and easy to maintain.
In a possible manner, in response to an editing operation for a data verification result, determining a target data verification result corresponding to the editing operation may include: displaying data identification information of buried data corresponding to the data verification result on a report storage interface; deleting a data verification result corresponding to the target data identification information in the data verification results in response to the deleting operation of the target data identification information in the data identification information, so as to obtain the target data verification result; and/or, in response to the modification operation for the data verification result, determining a new data verification result corresponding to the modification operation, and determining the new data verification result as a target data verification result.
For example, as shown in fig. 10, in the statistical range, the data identification information of the buried point data corresponding to the data verification result is displayed on the report saving interface, the buried point data that does not need to generate the report may be deleted, for example, the buried point "rrr" is deleted, and the data verification result corresponding to the buried point "rrr" displayed in the verification area is synchronously deleted, and the generated data verification report does not include the data verification result corresponding to the buried point "rrr". The buried point "rrr" may also be deleted without deleting the data verification result corresponding to the buried point "rrr" displayed in the result verification area, and then the data verification report generated according to the data verification result corresponding to the buried point in the statistical range is not limited in this disclosure. In this way, the user can adjust the data range of the data verification report according to the requirements.
In addition, other ways may be provided to determine the data range of the data verification report, for example, according to the data identification information of the buried point data input by the user in the statistical range, further select the corresponding data verification result according to the data identification information input by the user to generate the data verification report, and the disclosure is not limited thereto.
By way of example, with continued reference to fig. 10, the user may calibrate the data verification results generated by the system, i.e., the system verification results, may provide a single option for the user to select, may also take the form of a drop-down box for the user to select, and may set options according to the actual verification results, such as verification failure, in addition to "success", "anomaly" options, etc., which the present disclosure does not limit. Therefore, the data verification result generated by the system can be manually calibrated, and the defect that the system verification is possibly inaccurate is overcome.
In a possible manner, the method further comprises: in response to a modification reason input operation for the new data verification result, a target modification reason for the new data verification result is determined. Generating a data verification report based on the target data verification result may include: a data verification report is generated based on the new data verification result and the target modification reason.
For example, with continued reference to fig. 10, the user may remark the cause of the manual calibration for the buried point that modifies the data verification result, and save the cause of the remark to the data verification report, facilitating the later user to view and maintain the data verification report.
In a possible manner, the method further comprises: responding to a triggering operation aiming at a target data verification report in a report checking interface, and displaying a quick screening item card aiming at the target data verification report, wherein the quick screening item card comprises at least one item card of a data verification result which represents that a buried point is not reported, verification is abnormal and verification is successful; and responding to the selection operation aiming at the target quick screening item card, displaying target report content corresponding to the target quick screening item card in the target data verification report, wherein the data verification result corresponding to the target report content is consistent with the data verification result represented by the target quick screening item card.
For example, first, a report viewing interface may be displayed in response to a triggering operation for the report viewing interface, where the report viewing interface is configured to display a verification report list corresponding to verified buried data, and the verification report list displays identification information of a data verification report corresponding to the verified buried data; and responding to the triggering operation aiming at the target identification information in the verification report list, and displaying a target data verification report corresponding to the target identification information.
For example, referring to FIG. 11, the verification report menu corresponding to icon 62 in the left menu bar may be clicked to enter the report viewing interface, or through an entry provided by other systems, which is not limiting to the present disclosure. The report viewing interface is used for displaying a verification report list corresponding to the verified buried data, wherein the verification report list displays identification information of a data verification report corresponding to the verified buried data, such as report 1, report 2, report 3 and the like. In response to a triggering operation for the target identification information in the verification report list, a target data verification report corresponding to the target identification information is displayed, as shown in fig. 11, which is a report content corresponding to "www verification report".
For example, with continued reference to fig. 11, basic information such as a verification result, verification time, verification description, verification personnel, etc. of the target data verification report may be displayed, and the report result of the target data verification report and the content of the log detail may also be checked, which may be specifically set according to the requirement, and the present disclosure is not limited thereto. The report result may show the embedded point information such as the embedded point name and description, the scene, the system verification result, the calibration result of the manual calibration, the calibration reason of the remarks, the embedded point report log or provide the log checking link, etc., which may be specifically set according to the requirement, and the disclosure is not limited thereto. By intuitively presenting the report content to the user, the user is facilitated to maintain a data verification report.
Further, with continued reference to fig. 11, a fast filtering tab for a target data verification report is displayed in the report viewing interface, where the fast filtering tab includes at least one tab for characterizing a data verification result that is not reported by a buried point, is verified to be abnormal, and is verified to be successful, and specifically may be set according to an actual verification result, which is not limited by the present disclosure. For example, when the user clicks the tab card with abnormal verification, report contents corresponding to the data verification result with abnormal verification are displayed, so that the user can conveniently and quickly screen out target report contents for viewing.
In addition, a control for sharing and downloading the data verification report can be provided, so that the user can share and download the data verification report conveniently, and the disclosure is not limited to this.
It should be noted that, the typesetting, control functions, styles and names in the interfaces shown in fig. 2 to 11, the jump modes of different interfaces, and the like in the disclosure are merely illustrative, and may be specifically set according to the requirements, which is not limited in the disclosure.
By adopting the method, the universal equipment connection steps are obtained through carding and extraction, the steps are presented in a step bar mode, so that a user can conveniently connect test equipment, an aggregation display mode and a time sequence display mode are provided for the user to select, whether a reporting timer of a buried point is abnormal or not can be conveniently and rapidly checked, the buried point verification efficiency is improved, an online reporting function is also established, the connection between a verification report and real-time verification is opened, a data verification report is rapidly and automatically generated, and the artificial modification of a verification result is supported.
Based on the same concept, the present disclosure also provides a data processing apparatus, referring to fig. 12, the apparatus 120 includes:
the display module 121 is configured to display a data verification interface, where the data verification interface is configured to verify buried data in real time;
an obtaining module 121, configured to obtain target embedded point data to be verified according to a pre-configured target verification rule in response to an embedded point verification operation triggered at the data verification interface;
and the aggregation display module 123 is configured to aggregate and display the buried point data belonging to the same buried point in the target buried point data, and display a data verification result corresponding to each buried point data.
By adopting the device, whether the reporting timer of the buried point is abnormal or not can be conveniently and rapidly checked through the aggregation display mode, for example, the repeated reporting condition of the buried point can be more easily checked, and further, the abnormal buried point can be rapidly found, positioned and verified, and the buried point verification efficiency is improved.
Optionally, the aggregation display module 123 is configured to:
and responding to the triggering operation of the aggregation display control in the data verification interface, determining the data display mode as the aggregation display mode, and performing aggregation display on the buried point data belonging to the same buried point in the target buried point data.
Optionally, the apparatus further comprises a timing display module, the timing display module is configured to:
and responding to the triggering operation of the time sequence display control in the data verification interface, determining the data display mode to be a time sequence display mode, and adjusting the target embedded point data displayed in an aggregation mode to be displayed according to the sequence of the reporting time.
Optionally, the target verification rule is configured by:
responding to a selection operation aiming at candidate verification rules, and determining a target verification rule corresponding to the selection operation;
the candidate validation rules include a first candidate rule determined based on buried point validation requirements and/or a second candidate rule configured based on a filter.
Optionally, the aggregation display module 123 is configured to:
determining a target screening condition in response to a configuration operation of at least one of the following screening condition items: buried point event condition items, event parameter condition items, log format condition items and abnormal data condition items;
screening the target buried point data based on the target screening conditions to obtain screened target buried point data;
and aggregating and displaying the buried point data belonging to the same buried point in the screened target buried point data.
Optionally, the apparatus further comprises a scene selection module, the scene selection module being configured to:
responding to the selection operation of target data in the target buried point data, and displaying a buried point triggering scene corresponding to the target data;
responding to the selection operation of the target buried point trigger scene in the buried point trigger scene, and marking and displaying the log detail data corresponding to the target buried point trigger scene in a log detail area in the data verification interface, wherein the log detail area is used for displaying all the log detail data corresponding to the target buried point data.
Optionally, the apparatus further comprises a report saving module, the report saving module is configured to:
responding to a save operation for the data verification result, displaying a report save interface, wherein the report save interface displays the data verification result;
responding to the editing operation aiming at the data verification result, and determining a target data verification result corresponding to the editing operation;
and generating a data verification report based on the target data verification result.
Optionally, the report holding module is configured to:
displaying data identification information of the buried data corresponding to the data verification result on the report storage interface;
Deleting a data verification result corresponding to the target data identification information in the data verification results in response to a deleting operation aiming at the target data identification information in the data identification information, so as to obtain the target data verification result; and/or the number of the groups of groups,
and responding to the modification operation aiming at the data verification result, determining a new data verification result corresponding to the modification operation, and determining the new data verification result as the target data verification result.
Optionally, the apparatus further comprises a report modification module for:
determining a target modification reason for the new data verification result in response to a modification reason input operation for the new data verification result;
the report saving module is used for:
the data verification report is generated based on the new data verification result and the target modification reason.
Optionally, the apparatus further comprises a report viewing module for:
responsive to a triggering operation for a target data verification report in a report viewing interface, displaying a fast screening tab for the target data verification report, the fast screening tab including at least one tab that characterizes a data verification result of a buried point not reported, verification anomalies, and verification success;
And responding to the selection operation aiming at the target quick screening item card, displaying target report content corresponding to the target quick screening item card in the target data verification report, wherein the data verification result corresponding to the target report content is consistent with the data verification result represented by the target quick screening item card.
Optionally, the apparatus further comprises a device connection module, the device connection module is configured to:
responding to the selection operation aiming at the target application type in the data verification interface, displaying a device connection step corresponding to the target application type, wherein the device connection step is used for indicating a user to establish connection with a device to be subjected to embedded point verification according to the device connection step;
the obtaining module 122 is configured to:
after the connection is established with the target equipment according to the equipment connection step, acquiring target embedded point data to be verified and reported by the target equipment according to the pre-configured target verification rule.
Optionally, the apparatus further comprises a connection configuration module, the connection configuration module is configured to:
responding to a connection configuration operation aiming at a device connection mode, displaying a connection configuration interface, wherein the connection configuration interface is provided with a connection operation template for a user to configure the device connection mode;
Responding to the editing operation aiming at the connection operation template, and determining a target equipment connection mode corresponding to the editing operation;
the device connection module is used for:
and displaying the equipment connection step corresponding to the target application type according to the target equipment connection mode.
Optionally, the apparatus further includes a device debugging module, where the device debugging module is configured to:
and displaying the connection state of the target device in response to the device debugging operation for the target device.
The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.
Based on the same conception, the embodiments of the present disclosure also provide a computer readable medium having stored thereon a computer program which, when executed by a processing device, implements the steps of the above-described data processing method.
Based on the same concept, the embodiments of the present disclosure also provide an electronic device including:
a storage device having a computer program stored thereon;
processing means for executing said computer program in said storage means to implement the steps of the data processing method described above.
Referring now to fig. 13, a schematic diagram of an electronic device 130 suitable for use in implementing embodiments of the present disclosure is shown. The terminal devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 13 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 13, the electronic device 130 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 131, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 132 or a program loaded from a storage means 138 into a Random Access Memory (RAM) 133. In the RAM 133, various programs and data necessary for the operation of the electronic device 130 are also stored. The processing device 131, the ROM 132, and the RAM 133 are connected to each other through a bus 134. An input/output (I/O) interface 135 is also connected to bus 134.
In general, the following devices may be connected to the I/O interface 135: input devices 136 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, and the like; an output device 137 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, etc.; storage 138 including, for example, magnetic tape, hard disk, etc.; and communication means 139. The communication means 139 may allow the electronic device 130 to communicate with other devices wirelessly or by wire to exchange data. While fig. 13 shows an electronic device 130 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via communications device 139, or from storage device 138, or from ROM 132. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing means 131.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, communications may be made using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: displaying a data verification interface, wherein the data verification interface is used for verifying buried data in real time; responding to the embedded point verification operation triggered on the data verification interface, and acquiring target embedded point data to be verified according to a preset target verification rule; and aggregating and displaying the buried point data belonging to the same buried point in the target buried point data, and displaying a data verification result corresponding to each buried point data.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including, but not limited to, an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present disclosure may be implemented in software or hardware. The name of a module does not in some cases define the module itself.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this disclosure is not limited to the specific combinations of features described above, but also covers other embodiments which may be formed by any combination of features described above or equivalents thereof without departing from the spirit of the disclosure. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).
Moreover, although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limiting the scope of the present disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are example forms of implementing the claims. The specific manner in which the various modules perform the operations in the apparatus of the above embodiments have been described in detail in connection with the embodiments of the method, and will not be described in detail herein.

Claims (16)

1. A method of data processing, the method comprising:
displaying a data verification interface, wherein the data verification interface is used for verifying buried data in real time;
responding to the embedded point verification operation triggered on the data verification interface, and acquiring target embedded point data to be verified according to a preset target verification rule;
and aggregating and displaying the buried point data belonging to the same buried point in the target buried point data, and displaying a data verification result corresponding to each buried point data.
2. The method according to claim 1, wherein aggregating and displaying the buried point data belonging to the same buried point in the target buried point data includes:
And responding to the triggering operation of the aggregation display control in the data verification interface, determining the data display mode as the aggregation display mode, and performing aggregation display on the buried point data belonging to the same buried point in the target buried point data.
3. The method according to claim 1, wherein the method further comprises:
and responding to the triggering operation of the time sequence display control in the data verification interface, determining the data display mode to be a time sequence display mode, and adjusting the target embedded point data displayed in an aggregation mode to be displayed according to the sequence of the reporting time.
4. The method of claim 1, wherein the target validation rule is configured by:
responding to a selection operation aiming at candidate verification rules, and determining a target verification rule corresponding to the selection operation;
the candidate validation rules include a first candidate rule determined based on buried point validation requirements and/or a second candidate rule configured based on a filter.
5. The method according to claim 1, wherein aggregating and displaying the buried point data belonging to the same buried point in the target buried point data includes:
Determining a target screening condition in response to a configuration operation of at least one of the following screening condition items: buried point event condition items, event parameter condition items, log format condition items and abnormal data condition items;
screening the target buried point data based on the target screening conditions to obtain screened target buried point data;
and aggregating and displaying the buried point data belonging to the same buried point in the screened target buried point data.
6. The method according to claim 1, wherein the method further comprises:
responding to the selection operation of target data in the target buried point data, and displaying a buried point triggering scene corresponding to the target data;
responding to the selection operation of the target buried point trigger scene in the buried point trigger scene, and marking and displaying the log detail data corresponding to the target buried point trigger scene in a log detail area in the data verification interface, wherein the log detail area is used for displaying all the log detail data corresponding to the target buried point data.
7. The method according to any one of claims 1-6, further comprising:
responding to a save operation for the data verification result, displaying a report save interface, wherein the report save interface displays the data verification result;
Responding to the editing operation aiming at the data verification result, and determining a target data verification result corresponding to the editing operation;
and generating a data verification report based on the target data verification result.
8. The method of claim 7, wherein the determining, in response to the editing operation for the data verification result, a target data verification result corresponding to the editing operation comprises:
displaying data identification information of the buried data corresponding to the data verification result on the report storage interface;
deleting a data verification result corresponding to the target data identification information in the data verification results in response to a deleting operation aiming at the target data identification information in the data identification information, so as to obtain the target data verification result; and/or the number of the groups of groups,
and responding to the modification operation aiming at the data verification result, determining a new data verification result corresponding to the modification operation, and determining the new data verification result as the target data verification result.
9. The method of claim 8, wherein the method further comprises:
determining a target modification reason for the new data verification result in response to a modification reason input operation for the new data verification result;
The generating a data verification report based on the target data verification result includes:
the data verification report is generated based on the new data verification result and the target modification reason.
10. The method of claim 7, wherein the method further comprises:
responsive to a triggering operation for a target data verification report in a report viewing interface, displaying a fast screening tab for the target data verification report, the fast screening tab including at least one tab that characterizes a data verification result of a buried point not reported, verification anomalies, and verification success;
and responding to the selection operation aiming at the target quick screening item card, displaying target report content corresponding to the target quick screening item card in the target data verification report, wherein the data verification result corresponding to the target report content is consistent with the data verification result represented by the target quick screening item card.
11. The method according to any one of claims 1-6, further comprising:
responding to the selection operation aiming at the target application type in the data verification interface, displaying a device connection step corresponding to the target application type, wherein the device connection step is used for indicating a user to establish connection with a device to be subjected to embedded point verification according to the device connection step;
The obtaining target embedded point data to be verified according to a pre-configured target verification rule comprises the following steps:
after the connection is established with the target equipment according to the equipment connection step, acquiring target embedded point data to be verified and reported by the target equipment according to the pre-configured target verification rule.
12. The method of claim 11, wherein the method further comprises:
responding to a connection configuration operation aiming at a device connection mode, displaying a connection configuration interface, wherein the connection configuration interface is provided with a connection operation template for a user to configure the device connection mode;
responding to the editing operation aiming at the connection operation template, and determining a target equipment connection mode corresponding to the editing operation;
the step of displaying the device connection corresponding to the target application type includes:
and displaying the equipment connection step corresponding to the target application type according to the target equipment connection mode.
13. The method of claim 11, wherein the method further comprises:
and displaying the connection state of the target device in response to the device debugging operation for the target device.
14. A data processing apparatus, the apparatus comprising:
The display module is used for displaying a data verification interface, and the data verification interface is used for verifying the buried data in real time;
the acquisition module is used for responding to the embedded point verification operation triggered at the data verification interface and acquiring target embedded point data to be verified according to a preset target verification rule;
and the aggregation display module is used for carrying out aggregation display on the buried point data belonging to the same buried point in the target buried point data and displaying a data verification result corresponding to each buried point data.
15. A computer readable medium on which a computer program is stored, characterized in that the program, when being executed by a processing device, carries out the steps of the method according to any one of claims 1-13.
16. An electronic device, comprising:
a storage device having a computer program stored thereon;
processing means for executing said computer program in said storage means to carry out the steps of the method according to any one of claims 1-13.
CN202311553613.3A 2023-11-20 2023-11-20 Data processing method and device, readable medium and electronic equipment Pending CN117609025A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311553613.3A CN117609025A (en) 2023-11-20 2023-11-20 Data processing method and device, readable medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311553613.3A CN117609025A (en) 2023-11-20 2023-11-20 Data processing method and device, readable medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN117609025A true CN117609025A (en) 2024-02-27

Family

ID=89947290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311553613.3A Pending CN117609025A (en) 2023-11-20 2023-11-20 Data processing method and device, readable medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN117609025A (en)

Similar Documents

Publication Publication Date Title
US20120230587A1 (en) Systems and methods for testing content of mobile communication devices
CN110716853A (en) Test script recording method, application program testing method and related device
CN112597047A (en) Test method, test device, electronic equipment and computer readable medium
CN113485918B (en) Test method, test device, electronic equipment and storage medium
CN110674047A (en) Software testing method and device and electronic equipment
CN112015654A (en) Method and apparatus for testing
CN113806212A (en) Application program exception positioning method and device and electronic equipment
CN112019404A (en) Method and device for automatically testing FC-AE-1553 communication protocol chip
CN110489333B (en) Method, device, medium and electronic equipment for debugging data based on inspector
CN112291121B (en) Data processing method and related equipment
CN114896168B (en) Quick debugging system, method and memory for automatic driving algorithm development
CN116450511A (en) Information updating method, device, electronic equipment and computer readable medium
CN117609025A (en) Data processing method and device, readable medium and electronic equipment
CN114510305B (en) Model training method and device, storage medium and electronic equipment
US10169216B2 (en) Simulating sensors
CN115599683A (en) Automatic testing method, device, equipment and storage medium
US20150156090A1 (en) Systems and Methods for Monitoring Multiple Services
CN115098116A (en) Simulation operation method and device of application program, terminal and storage medium
CN114116480A (en) Method, device, medium and equipment for determining application program test coverage rate
CN113849416A (en) Test method, test device, storage medium and electronic equipment
CN116257422A (en) Self-test case generation method and device and electronic equipment
CN115391770A (en) Program monitoring method, device, electronic equipment and computer readable storage medium
US10541860B2 (en) Filtering a large group of devices
CN114092169A (en) Ordering test method and system and equipment for executing ordering test method
CN117389877A (en) Test method, test device, computer readable medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination