CN109542743B - Log checking method and device, electronic equipment and computer readable storage medium - Google Patents
Log checking method and device, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109542743B CN109542743B CN201811367928.8A CN201811367928A CN109542743B CN 109542743 B CN109542743 B CN 109542743B CN 201811367928 A CN201811367928 A CN 201811367928A CN 109542743 B CN109542743 B CN 109542743B
- Authority
- CN
- China
- Prior art keywords
- log
- behavior
- verified
- preset
- standard
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 238000012795 verification Methods 0.000 claims abstract description 109
- 238000012544 monitoring process Methods 0.000 claims abstract description 35
- 230000006399 behavior Effects 0.000 claims description 175
- 230000006870 function Effects 0.000 description 15
- 238000002372 labelling Methods 0.000 description 10
- 238000010586 diagram Methods 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000011156 evaluation Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 230000003287 optical effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012827 research and development Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 239000003208 petroleum Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The embodiment of the disclosure provides a log verification method, a log verification device, an electronic device and a computer-readable storage medium, which are applied to the technical field of log verification, wherein the method comprises the following steps: the method comprises the steps of monitoring corresponding embedded point events in an application program through a plurality of preset event monitoring modules, generating a plurality of behavior logs to be verified corresponding to the embedded point events, verifying the behavior logs to be verified based on a preset log rule list, and determining a log verification result, namely, realizing automatic verification of the behavior logs to be verified through the preset log rule list, and verifying the behavior logs to be verified one by one without using a manual mode by a verifier, so that the verification efficiency of the behavior logs to be verified is improved, and the verification cost is reduced.
Description
Technical Field
The present disclosure relates to the technical field of log verification, and in particular, to a log verification method and apparatus, an electronic device, and a computer-readable storage medium.
Background
With the transition from the information economy era to the digital economy era, data becomes "petroleum" for economic development, wherein the data platform acquires behavior data of a user on a website or an application App through technologies such as a buried point, and the acquired user behavior data can be utilized to subsequently provide targeted or personalized services for the user.
Currently, obtaining user behavior data from a user behavior log is an important way to obtain user behavior data, and for the obtained user behavior log, the obtained behavior log is verified one by one in the prior art in a manual verification way to verify the accuracy and completeness of the obtained user behavior log. However, the existing manual verification method relies too much on the experience of the verifier, the verifier needs to master the standard format of each behavior log, and then compares and counts the behavior logs to be verified one by one with the standard behavior logs to determine the accuracy and completeness of the behavior logs to be verified. Therefore, the existing mode of manually checking the behavior logs has the problems of over dependence on the experience of checking personnel, low checking efficiency and high labor cost.
Disclosure of Invention
The disclosure provides a log verification method, a log verification device, an electronic device and a computer-readable storage medium, which are used for efficiently and automatically verifying a user behavior log, and the technical scheme adopted by the disclosure is as follows:
in a first aspect, a method for behavior log verification is provided, the method comprising,
monitoring corresponding embedded point events in an application program through a plurality of preset event monitoring modules, and generating a plurality of behavior logs to be verified corresponding to the embedded point events;
and verifying the behavior logs to be verified based on a preset log rule list, and determining a log verification result.
In a second aspect, there is provided a behavior log checking apparatus, comprising,
the monitoring module is used for monitoring corresponding embedded point events in the application program through a plurality of preset event monitoring modules and generating a plurality of behavior logs to be checked corresponding to the embedded point events;
and the verification module is used for verifying the behavior logs to be verified generated by the monitoring module based on a preset log rule list and determining a log verification result.
In a third aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the behavior log checking method shown in the first aspect is performed.
In a fourth aspect, there is provided a computer-readable storage medium for storing computer instructions which, when run on a computer, cause the computer to perform the behavior log checking method of the first aspect.
Compared with the prior art that the accuracy and the completeness of the behavior logs to be verified are determined in a manual verification mode, the method, the device, the electronic equipment and the computer-readable storage medium have the advantages that the corresponding embedded point events in the application program are monitored through the multiple preset event monitoring modules, the multiple behavior logs to be verified corresponding to the multiple embedded point events are generated, then the multiple behavior logs to be verified are verified based on the preset log rule list, and the log verification result is determined, namely, the automatic verification of the behavior logs to be verified is realized through the preset log rule list, the logs to be verified are not required to be manually verified one by a verifier, so that the verification efficiency of the behavior logs to be verified is improved, and the verification cost is reduced.
Additional aspects and advantages of the disclosure will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the disclosure.
Drawings
The foregoing and/or additional aspects and advantages of the present disclosure will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
fig. 1 is a schematic flow chart of a behavior log verification method according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a behavior log verification apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of another behavior log verification apparatus according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Reference will now be made in detail to the embodiments of the present disclosure, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of illustrating the present disclosure and should not be construed as limiting the same.
As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
The following describes the technical solutions of the present disclosure and how to solve the above technical problems in specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present disclosure will be described below with reference to the accompanying drawings.
An embodiment of the present disclosure provides a behavior log checking method, as shown in fig. 1, the method may include the following steps:
step S101, monitoring corresponding embedded point events in an application program through a plurality of preset event monitoring modules, and generating a plurality of behavior logs to be checked corresponding to the embedded point events;
for the embodiment of the present disclosure, a plurality of event monitoring modules are preset, and are used to monitor the embedded point events corresponding to each event monitoring module in the application program, and when any embedded point event is triggered, a behavior log to be verified corresponding to the embedded point event is generated.
The embedded point is a method for acquiring data of a webpage Web, an application App and the like, and behavior data generated by a user in the application can be collected through the embedded point so as to be used for analyzing and optimizing subsequent experience of a product and also provide data support for operation of the product; the embedded point event can be an event of tracking or recording the behavior or business process (such as account registration, login, content search, commodity purchase, video watching, approval, comment, attention, collection and the like) of a user on a webpage Web or an application App; the preset event monitoring module may be a JS code (JS is Javascript, which is a script language developed from LiveScript of Netscape) added to a page corresponding to the corresponding embedded point event, a process of adding a code to the corresponding page of the collected data is called "embedded point", and when a behavior of the user meets a certain condition, the added JS code is executed to generate a corresponding user behavior log, and the generated behavior log is reported.
Step S102, a plurality of behavior logs to be verified are verified based on a preset log rule list, and a log verification result is determined.
For the embodiment of the disclosure, a rule list for verifying the behavior logs is preset, and then the obtained multiple behavior logs to be verified are verified, so that log verification results are obtained.
The embodiment of the disclosure provides a behavior log checking method, and compared with the prior art that the accuracy and completeness of a behavior log to be checked are determined through a manual checking mode, the embodiment of the disclosure monitors corresponding embedded point events in an application program through a plurality of preset event monitoring modules, generates a plurality of behavior logs to be checked corresponding to the plurality of embedded point events, checks the plurality of behavior logs to be checked based on a preset log rule list, and determines a log checking result, that is, the automatic checking of the behavior log to be checked is realized through the preset log rule list, and a checker does not need to manually check the behavior log to be checked one by one, so that the checking efficiency of the behavior log to be checked is improved, and the checking cost is reduced.
The embodiment of the present disclosure provides a possible implementation manner, wherein step S102 includes,
step S1021 (not shown in the figure), searching a plurality of log standard rules included in a preset check rule list based on the log identifier of any behavior log to be checked, and determining a log standard parameter corresponding to the log identifier of any behavior log to be checked, where any log standard rule includes a log label and a corresponding log standard parameter;
for the embodiment of the disclosure, the preset verification rule list includes a plurality of log standard rules, wherein any log standard rule includes a log mark and a corresponding standard parameter, and the log standard parameter corresponding to any behavior log to be verified is determined according to the matching relationship between the log mark of any behavior log to be verified and the log mark in the log standard rule.
Wherein, a buried point event may include but is not limited to three elements: operations (such as clicking, dragging and the like), attributes (such as business information including people, events, places, equipment and operations triggering the events, such as commodity names, types, quantities, money and the like of attributes needing to be recorded in purchasing events), attribute values (such as the quantity of purchased commodities); the number of elements included and the corresponding format of each element value are specified in the log standard parameter, for example, the type of the attribute value of the purchased number is int, wherein a length value of int may also be specified, for example, the int is a numerical value not exceeding 8 bits.
Step S1022 (not shown in the figure), the log parameter of any behavior log to be verified is verified according to the log standard parameter, if the log parameter is consistent with the log standard parameter, the log verification result of any behavior log to be verified is determined to be that the log parameter is correct, and if the log parameter is inconsistent with the log standard parameter, the log verification result of any behavior log to be verified is determined to be that the log parameter is wrong.
For the embodiment of the disclosure, the log parameters of any behavior log to be verified are verified according to the determined log standard parameters, if the log parameters of the behavior log to be verified are consistent with the corresponding log standard parameters, the log verification result of the behavior log to be verified is determined to be that the log parameters are correct, and if the log parameters of the behavior log to be verified are not consistent with the corresponding log standard parameters, the log verification result of the behavior log to be verified is determined to be that the log parameters are wrong.
The log standard parameters comprise optional attribute items and optional attribute items (such as id of watching video, watching duration, video type as optional attribute items, and playing equipment, watching time as optional attribute items), whether the log parameters of the behavior log to be verified contain the number of attribute items which must be contained in the log standard parameters can be verified, and if the number of the included optional attribute items is less than the number of the optional attribute items in the log standard parameters, the log verification result of the behavior log to be verified is determined to be a log parameter error; and if the attribute value type of the viewing duration in the log standard parameter is int and the attribute value type of the viewing duration in the log parameter of the behavior log to be verified is string, determining that the log verification result of the behavior log to be verified is a log parameter error.
For the embodiment of the disclosure, the log standard parameter corresponding to the behavior log to be verified is determined, and then the log parameter of the behavior log to be verified is verified according to the determined log standard parameter, so that the automatic verification of the log parameter of the behavior log to be verified is realized, the verification efficiency is improved, and the verification cost is reduced.
The disclosed embodiment provides one possible implementation manner, wherein step 102 includes,
step S1023 (not shown in the figure), labeling log standard rules corresponding to a plurality of behavior logs to be verified in the log rule list;
for the embodiment of the present disclosure, based on the log identifiers of the behavior logs to be verified, the log standard rule corresponding to each behavior log to be verified in the log rule list is respectively determined, and the determined corresponding log standard rule is labeled, where the labeling may be statistics of the number of times, and if the corresponding log standard rule is determined according to the behavior logs to be verified, 1 is added to the number of times corresponding to the log standard rule.
Step S1024 (not shown in the figure), when the verification for the behavior logs to be verified is completed, determining a log verification result according to the marked log rule list.
For the embodiment of the disclosure, after the plurality of behavior logs to be verified are verified, a marked log rule list (for example, a log rule list obtained by counting and counting each log standard rule in a preset log rule list) is obtained, and a log verification result is determined according to the marked log rule list.
For the embodiment of the disclosure, the log standard rules corresponding to the behavior logs to be verified are marked in the log rule list, and then the log verification result is determined according to the marked log rule list, so that the automatic verification of the completeness of the behavior logs is realized, the verification efficiency of the behavior logs to be verified is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides a possible implementation manner, wherein the determining the log verification result according to the annotated log rule list in step S1024 includes,
step S10241 (not shown in the figure), if the marked log rule list includes the unmarked log standard rule and/or the log standard rule with the marking frequency less than the predetermined marking frequency, determining that the log verification result is a behavior log omission corresponding to the unmarked log standard rule and/or the log standard rule with the marking frequency less than the predetermined marking frequency;
step S10242 (not shown in the figure), if the labeled log rule list includes a labeling frequency of the log standard rule greater than a predetermined labeling frequency, determining that the log verification result is a behavior log repetition corresponding to the log standard rule.
For the embodiment of the disclosure, the preset marking times of each log standard rule are preset, that is, the times of points to be buried of each buried point event can be preset, if the marked log rule list comprises the unmarked log standard rule and/or the log standard rule with the marking times less than the preset marking times, the log verification result is determined to be the behavior log omission corresponding to the unmarked log standard rule and/or the log standard rule with the marking times less than the preset marking times, that is, the page omission buried points corresponding to the corresponding events is determined; and if the marked times of the log rule list including the log standard rule are larger than the preset marking times, determining that the log verification result is the behavior log repetition corresponding to the log standard rule, namely the page repetition buried point corresponding to the corresponding event.
For the embodiment of the disclosure, the completeness of the behavior log to be verified is verified by comparing the labeling times of the log standard rules in the labeled log rule list with the preset labeling times, so that the verification efficiency of the behavior log to be verified is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides a possible implementation manner, where a preset log rule list corresponds to a function module in an application, and the checking, in step S102, of a plurality of behavior logs to be checked based on the preset log rule list includes:
step S1025 (not shown in the figure) verifies the behavior log to be verified corresponding to the functional module corresponding to the log rule list based on the preset log rule list.
For the embodiment of the present disclosure, different functional modules of an application correspond to corresponding preset log rule lists, for example, a login registration module, a video browsing module, and the like respectively correspond to corresponding preset log rule lists, and corresponding behavior logs to be verified in the functional modules corresponding to the preset log rule lists are verified through the preset log rule lists.
For the embodiment of the disclosure, the corresponding preset log rule lists are respectively set for different application program function modules, so that the verification of behavior logs to be verified in different function modules is realized.
The embodiment of the present disclosure provides another possible implementation manner, and the method further includes,
step S103 (not shown in the figure), based on the log verification result, generating corresponding prompt information for prompting the tester to perform a corresponding operation.
For the embodiment of the disclosure, corresponding prompt information is generated based on the log verification result to prompt the tester to execute corresponding operations, for example, the verification result is a behavior log repetition corresponding to the corresponding log standard rule, that is, an event repetition burying point corresponding to the corresponding log, and prompts the tester to perform a burying point deleting operation.
For the embodiment of the disclosure, the corresponding prompt information is generated based on the log verification result to prompt the tester to execute the corresponding operation, so that the problem of accuracy and completeness of behavior log acquisition is timely discovered, and the research and development efficiency is improved.
Fig. 2 is a behavior log verification apparatus provided in an embodiment of the present disclosure, where the apparatus 20 includes: a monitoring module 201, a verification module 202, wherein,
the monitoring module 201 is configured to monitor a corresponding embedded point event in the application program through a plurality of preset event monitoring modules, and generate a plurality of behavior logs to be checked, which correspond to the plurality of embedded point events;
the verification module 202 is configured to verify the multiple behavior logs to be verified, which are generated by the monitoring module 201, based on a preset log rule list, and determine a log verification result.
The embodiment of the disclosure provides a behavior log checking device, and compared with the prior art that the accuracy and completeness of a behavior log to be checked are determined through a manual checking mode, the embodiment of the disclosure monitors corresponding embedded point events in an application program through a plurality of preset event monitoring modules, generates a plurality of behavior logs to be checked corresponding to the plurality of embedded point events, checks the plurality of behavior logs to be checked based on a preset log rule list, and determines a log checking result, that is, the automatic checking of the behavior log to be checked is realized through the preset log rule list, and a checker does not need to manually check the behavior log to be checked one by one, so that the checking efficiency of the behavior log to be checked is improved, and the checking cost is reduced.
The behavior log verification apparatus of this embodiment may perform the behavior log verification method provided in the above embodiments of the present disclosure, and the implementation principles thereof are similar, and are not described herein again.
An embodiment of the present disclosure provides another behavior log verification apparatus, as shown in fig. 3, the apparatus 30 of the present embodiment may include: a monitoring module 301, a verification module 302, wherein,
the monitoring module 301 is configured to monitor a corresponding embedded point event in the application program through a plurality of preset event monitoring modules, and generate a plurality of behavior logs to be verified, which correspond to the plurality of embedded point events;
the monitoring module 301 in fig. 3 has the same or similar functions as the monitoring module 201 in fig. 2, and is not described herein again.
The checking module 302 is configured to check the behavior logs to be checked generated by the monitoring module 301 based on a preset log rule list, and determine a log checking result.
The function of the check module 301 in fig. 3 is the same as or similar to that of the check module 201 in fig. 2, and is not described herein again.
The embodiment of the present disclosure provides a possible implementation manner, wherein the checking module 302 includes a searching unit 3021 and a checking unit 3022;
the search unit 3021 is configured to search a plurality of log standard rules included in a preset check rule list based on a log identifier of any behavior log to be checked, and determine a log standard parameter corresponding to the log identifier of any behavior log to be checked, where any log standard rule includes a log label and a corresponding log standard parameter;
the checking unit 3022 is configured to check a log parameter of any behavior log to be checked according to the log standard parameter found and determined by the finding unit 3021, determine that a log checking result for any behavior log to be checked is a log parameter correct if the log standard parameter is consistent with the log parameter, and determine that a log checking result for any behavior log to be checked is a log parameter error if the log standard parameter is inconsistent with the log standard parameter.
For the embodiment of the disclosure, the log standard parameter corresponding to the behavior log to be verified is determined, and then the log parameter of the behavior log to be verified is verified according to the determined log standard parameter, so that the automatic verification of the log parameter of the behavior log to be verified is realized, the verification efficiency is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides a possible implementation manner, wherein the checking module 302 includes a labeling unit 3023 and a determining unit 3024;
a labeling unit 3023, configured to label, in the log rule list, the log standard rule corresponding to the multiple behavior logs to be verified;
a determining unit 3024, configured to determine, when verification of multiple behavior logs to be verified is completed, a log verification result according to the log rule list marked by the marking unit 3023.
For the embodiment of the disclosure, the log standard rules corresponding to the behavior logs to be verified are marked in the log rule list, and then the log verification result is determined according to the marked log rule list, so that the automatic verification of the completeness of the behavior logs is realized, the verification efficiency of the behavior logs to be verified is improved, and the verification cost is reduced.
The disclosed embodiments provide another possible implementation manner, in which a log verification result is determined according to a marked log rule list, including,
if the marked log rule list comprises the unmarked log standard rule and/or the log standard rule with the marking frequency less than the preset marking frequency, determining that the log verification result is the behavior log omission corresponding to the unmarked log standard rule and/or the log standard rule with the marking frequency less than the preset marking frequency;
and if the marked times of the log rule list including the log standard rule are larger than the preset marking times, determining that the log verification result is the behavior log repetition corresponding to the log standard rule.
For the embodiment of the disclosure, the completeness of the behavior log to be verified is verified by comparing the labeling times of the log standard rules in the labeled log rule list with the preset labeling times, so that the verification efficiency of the behavior log to be verified is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides a possible implementation manner, where a preset log rule list corresponds to a function module in an application, and the verifying a plurality of behavior logs to be verified based on the preset log rule list includes:
and verifying the behavior log to be verified corresponding to the functional module corresponding to the log rule list based on a preset log rule list.
For the embodiment of the disclosure, different application function modules respectively set corresponding preset log rule lists, so that the verification of behavior logs to be verified in different function modules is realized.
The embodiment of the present disclosure provides another possible implementation manner, where the apparatus further includes a prompt module 303;
and the prompting module 303 is configured to generate corresponding prompting information based on the log verification result, so as to prompt the tester to execute a corresponding operation.
For the embodiment of the disclosure, corresponding prompt information is generated based on the log verification result to prompt the tester to execute corresponding operations, so that the problems of the behavior log in the aspects of acquisition accuracy and completeness are discovered in time, and the research and development efficiency is improved.
The embodiment of the disclosure provides a behavior log checking device, and compared with the prior art that the accuracy and completeness of a behavior log to be checked are determined through a manual checking mode, the embodiment of the disclosure monitors corresponding embedded point events in an application program through a plurality of preset event monitoring modules, generates a plurality of behavior logs to be checked corresponding to the plurality of embedded point events, checks the plurality of behavior logs to be checked based on a preset log rule list, and determines a log checking result, that is, the automatic checking of the behavior log to be checked is realized through the preset log rule list, and a checker does not need to manually check the behavior log to be checked one by one, so that the checking efficiency of the behavior log to be checked is improved, and the checking cost is reduced.
The embodiment of the present disclosure provides a behavior log verification apparatus, which is suitable for the method shown in the above embodiment, and is not described herein again.
The embodiment of the present disclosure provides an electronic device, as shown in fig. 4, which shows a schematic structural diagram of an electronic device (e.g., a terminal device or a server) 40 suitable for implementing the embodiment of the present disclosure. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, the electronic device 40 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage means 408 into a Random Access Memory (RAM) 403. In the RAM 403, various programs and data necessary for the operation of the electronic apparatus 40 are also stored. The processing device 401, the ROM 402, and the RAM 403 are connected to each other via a bus 404. An input/output (I/O) interface 405 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 405: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 408 including, for example, tape, hard disk, etc.; and a communication device 409. The communication device 409 may allow the electronic device 40 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates an electronic device 40 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
The embodiment of the disclosure provides an electronic device, and compared with the prior art that the accuracy and completeness of a behavior log to be verified are determined through a manual verification mode, the embodiment of the disclosure monitors corresponding embedded point events in an application program through a plurality of preset event monitoring modules, generates a plurality of behavior logs to be verified corresponding to the plurality of embedded point events, verifies the plurality of behavior logs to be verified based on a preset log rule list, and determines a log verification result, namely, the automatic verification of the behavior log to be verified is realized through the preset log rule list, and a verifier does not need to manually verify the behavior log to be verified one by one, so that the verification efficiency of the behavior log to be verified is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides an electronic device suitable for the above method embodiment, and details are not repeated here.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication device 409, or from the storage device 408, or from the ROM 402. The computer program performs the above-described functions defined in the methods of the embodiments of the present disclosure when executed by the processing device 401.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The embodiment of the disclosure provides a computer-readable storage medium, and compared with the prior art that the accuracy and completeness of a behavior log to be verified are determined through a manual verification mode, the embodiment of the disclosure monitors a corresponding embedded point event in an application program through a plurality of preset event monitoring modules, generates a plurality of behavior logs to be verified corresponding to the plurality of embedded point events, verifies the plurality of behavior logs to be verified based on a preset log rule list, and determines a log verification result, that is, the automatic verification of the behavior log to be verified is realized through the preset log rule list, and a verifier does not need to manually verify the behavior log to be verified one by one, so that the verification efficiency of the behavior log to be verified is improved, and the verification cost is reduced.
The embodiment of the present disclosure provides a computer-readable storage medium suitable for the above method embodiments, and details are not repeated herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of an element does not in some cases constitute a limitation on the element itself.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Claims (10)
1. A behavior log verification method, comprising,
monitoring corresponding embedded point events in an application program through a plurality of preset event monitoring modules, and generating a plurality of behavior logs to be verified corresponding to the embedded point events;
verifying a plurality of behavior logs to be verified based on a preset log rule list, and determining a log verification result;
the verifying the plurality of behavior logs to be verified based on the preset log rule list, and determining a log verification result, including: searching a plurality of log standard rules included in the preset verification rule list based on the log identification of any behavior log to be verified, and determining log standard parameters corresponding to the log identification of any behavior log to be verified, wherein any log standard rule comprises a log mark and corresponding log standard parameters; the log standard parameters comprise selectable attribute items and optional attribute items;
and checking whether the log parameters of the behavior log to be checked contain the number of the required attribute items which must be contained in the log standard parameters, and if the number of the required attribute items is less than the number of the required attribute items in the log standard parameters, determining that the log checking result of the behavior log to be checked is a log parameter error.
2. The method according to claim 1, wherein the plurality of behavior logs to be verified are verified based on a preset log rule list, a log verification result is determined, and further comprising,
and checking the log parameters of any behavior log to be checked according to the log standard parameters, if the log standard parameters are consistent with the log standard parameters, determining that the log checking result of any behavior log to be checked is correct log parameters, and if the log standard parameters are inconsistent with the log standard parameters, determining that the log checking result of any behavior log to be checked is wrong log parameters.
3. The method according to claim 1 or 2, wherein the plurality of behavior logs to be verified are verified based on a preset log rule list, and a log verification result is determined, including,
marking log standard rules corresponding to the behavior logs to be verified in the log rule list;
and when the verification of the behavior logs to be verified is completed, determining a log verification result according to the marked log rule list.
4. The method of claim 3, wherein determining the log verification result according to the annotated list of log rules comprises,
if the marked log rule list comprises the unmarked log standard rule and/or the log standard rule with the marking frequency less than the preset marking frequency, determining that the log verification result is the behavior log omission corresponding to the unmarked log standard rule and/or the log standard rule with the marking frequency less than the preset marking frequency;
and if the marked times of the log rule list including the log standard rule are larger than the preset marking times, determining that the log verification result is the behavior log repetition corresponding to the log standard rule.
5. The method according to claim 1, wherein the preset log rule list corresponds to a functional module in the application program, and the checking the behavior logs to be checked based on the preset log rule list comprises:
and verifying the behavior log to be verified corresponding to the functional module corresponding to the log rule list based on a preset log rule list.
6. The method of claim 1, further comprising,
and generating corresponding prompt information based on the log verification result so as to prompt a tester to execute corresponding operation.
7. A behavior log verification device, comprising,
the monitoring module is used for monitoring corresponding embedded point events in the application program through a plurality of preset event monitoring modules and generating a plurality of behavior logs to be checked corresponding to the embedded point events;
the verification module is used for verifying a plurality of behavior logs to be verified generated by the monitoring module based on a preset log rule list and determining a log verification result;
the checking module comprises a searching unit and a checking unit;
the searching unit is used for searching a plurality of log standard rules included in the preset checking rule list based on the log identification of any behavior log to be checked, and determining log standard parameters corresponding to the log identification of any behavior log to be checked, wherein any log standard rule includes a log mark and a corresponding log standard parameter; the log standard parameters comprise selectable attribute items and optional attribute items;
and the checking unit is used for checking whether the log parameters of the behavior log to be checked contain the number of the required attribute items which must be contained in the log standard parameters, and if the number of the required attribute items is less than the number of the required attribute items in the log standard parameters, determining that the log checking result of the behavior log to be checked is a log parameter error.
8. The apparatus of claim 7,
the checking unit is configured to check the log parameters of any behavior log to be checked according to the log standard parameters found and determined by the finding unit, determine that a log checking result for any behavior log to be checked is correct if the log standard parameters are consistent with the log standard parameters, and determine that a log checking result for any behavior log to be checked is incorrect if the log standard parameters are inconsistent with the log standard parameters.
9. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: performing a behaviour log verification method according to any of claims 1 to 6.
10. A computer-readable storage medium for storing computer instructions which, when executed on a computer, cause the computer to perform the behaviour log verification method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367928.8A CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367928.8A CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109542743A CN109542743A (en) | 2019-03-29 |
CN109542743B true CN109542743B (en) | 2022-04-12 |
Family
ID=65847765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811367928.8A Active CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109542743B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444099A (en) * | 2020-03-27 | 2020-07-24 | 携程计算机技术(上海)有限公司 | Data inconsistency analysis method, system, electronic device and storage medium |
CN113886489A (en) * | 2021-09-07 | 2022-01-04 | 掌阅科技股份有限公司 | Data processing method, electronic device and storage medium |
CN115017005A (en) * | 2022-04-24 | 2022-09-06 | 阿里巴巴(中国)有限公司 | Method, device, storage medium and system for processing log data |
CN115495358A (en) * | 2022-09-21 | 2022-12-20 | 平安银行股份有限公司 | Log automatic test method, device, system and medium |
CN116166501B (en) * | 2023-02-03 | 2024-03-08 | 上海擎创信息技术有限公司 | Log verification method and device, electronic equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915296A (en) * | 2015-06-29 | 2015-09-16 | 北京金山安全软件有限公司 | Buried point testing method, data query method and device |
CN107844400A (en) * | 2017-10-16 | 2018-03-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of a kind of daily record data |
CN107995283A (en) * | 2017-11-29 | 2018-05-04 | 上海恺英网络科技有限公司 | A kind of data bury the method, equipment and system of point analysis |
CN108280022A (en) * | 2018-02-08 | 2018-07-13 | 无线生活(杭州)信息科技有限公司 | Performance monitoring method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8930330B1 (en) * | 2011-06-27 | 2015-01-06 | Amazon Technologies, Inc. | Validation of log formats |
-
2018
- 2018-11-16 CN CN201811367928.8A patent/CN109542743B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104915296A (en) * | 2015-06-29 | 2015-09-16 | 北京金山安全软件有限公司 | Buried point testing method, data query method and device |
CN107844400A (en) * | 2017-10-16 | 2018-03-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of a kind of daily record data |
CN107995283A (en) * | 2017-11-29 | 2018-05-04 | 上海恺英网络科技有限公司 | A kind of data bury the method, equipment and system of point analysis |
CN108280022A (en) * | 2018-02-08 | 2018-07-13 | 无线生活(杭州)信息科技有限公司 | Performance monitoring method and device |
Also Published As
Publication number | Publication date |
---|---|
CN109542743A (en) | 2019-03-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109542743B (en) | Log checking method and device, electronic equipment and computer readable storage medium | |
CN111784380B (en) | Advertisement putting attribution method and device | |
CN111209202A (en) | Terminal application testing method and device | |
CN111401228B (en) | Video target labeling method and device and electronic equipment | |
CN112684968A (en) | Page display method and device, electronic equipment and computer readable medium | |
CN110097397B (en) | Feedback-based information pushing method and device and electronic equipment | |
CN113592535B (en) | Advertisement recommendation method and device, electronic equipment and storage medium | |
CN111258998A (en) | Data verification method, device, medium and electronic equipment | |
CN118965348B (en) | Detection method, device, equipment and computer medium applied to program code | |
CN111813685A (en) | Automatic testing method and device | |
CN113626301B (en) | Method and device for generating test script | |
CN112884376A (en) | Work order processing method and device, electronic equipment and computer readable storage medium | |
US20130339834A1 (en) | Dynamic presentation of a results set by a form-based software application | |
CN111752834A (en) | Automated testing method and device | |
CN109902726B (en) | Resume information processing method and device | |
CN114510305B (en) | Model training method and device, storage medium and electronic equipment | |
CN112084114B (en) | Method and apparatus for testing interfaces | |
CN112291121B (en) | Data processing method and related equipment | |
CN112379967B (en) | Simulator detection method, device, equipment and medium | |
CN112083982B (en) | Information processing method and device | |
CN111209739A (en) | Electronic form, electronic device, storage medium, and electronic form verification method | |
CN113609516B (en) | Information generation method and device based on abnormal user, electronic equipment and medium | |
CN112291276B (en) | Flow alarm method and device and electronic equipment | |
CN111241368B (en) | Data processing method, device, medium and equipment | |
CN115185798A (en) | Data acquisition and analysis method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221228 Address after: Room 1445A, No. 55 Xili Road, China (Shanghai) Pilot Free Trade Zone, Pudong New Area, Shanghai, 200120 Patentee after: Honey Grapefruit Network Technology (Shanghai) Co.,Ltd. Address before: 408, 4th floor, 51 Zhichun Road, Haidian District, Beijing 100086 Patentee before: BEIJING MICROLIVE VISION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |