CN106294559B - A kind of application traffic analysis method and device - Google Patents
A kind of application traffic analysis method and device Download PDFInfo
- Publication number
- CN106294559B CN106294559B CN201610597004.1A CN201610597004A CN106294559B CN 106294559 B CN106294559 B CN 106294559B CN 201610597004 A CN201610597004 A CN 201610597004A CN 106294559 B CN106294559 B CN 106294559B
- Authority
- CN
- China
- Prior art keywords
- log
- funnel
- application
- analyzed
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application provides a kind of application traffic analysis methods, belong to field of computer technology.The access log that the application passes through acquisition application to be analyzed;Funnel configuration file based on the preset application matches every access log, is determined for compliance with the log index table of the access log of the funnel configuration file;The path list obtained after being decomposed based on access path to be analyzed matches the actual access path determined according to the log index table;The flow analysis index of the application to be analyzed is calculated according to matching result, it solves to excavate to calculate based on frequent path in the prior art and shows rate or clicking rate, the problem of macroscopic analysis can not being carried out to the same type page or module, by to the identical analysis object identity of same type page setup, polymerization analysis can be carried out to the data of the same type page, obtain macroscopic analysis result.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of application traffic analysis method and device.
Background technique
In the prior art, for application, user experience is further promoted, needs to analyze the flow of application,
Such as the conversion ratio of application, clicking rate are analyzed.In the stream of analysis application (such as: web application, application program for mobile terminal)
When amount, it usually needs the behavior of each module or the page to application counts.Behavior for module or the page specifically includes that
Show, click.In order to analyze user to application product using preference, the using effect for analyzing application product etc., the prior art
In, generally use the module and the method got ready of the page for application, analysis module or the page show rate or clicking rate.It is uniting
When meter shows rate and clicking rate, common method is that frequent path excavates, and is started with from the path that user accesses, for the core of access
Heart road diameter is calculated and is optimized.
The method of analysis application traffic in the prior art at least has the following deficiencies: to be excavated based on calculating frequent path,
Suitable for analyzing the conversion ratio of adjacent page, Result is partial to detailed user path, can not rapid pin to the same type page
Or the macroscopic analysis that module merges.
Summary of the invention
Technical problems to be solved in this application are: providing a kind of application traffic analysis method, solve base in the prior art
The problem of excavating to calculate in frequent path and show rate or clicking rate, macroscopic analysis can not being carried out to the same type page or module.
To solve the above-mentioned problems, the embodiment of the present application provides a kind of application traffic analysis method, comprising:
Obtain the access log of application to be analyzed;
Funnel configuration file based on the preset application to be analyzed matches every access log, is determined for compliance with institute
State the log index table of the access log of funnel configuration file;
The path list obtained after being decomposed based on access path to be analyzed, to the reality determined according to the log index table
Border access path is matched;
The flow analysis index of the application to be analyzed is calculated according to matching result;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration
File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed
Analyze object analysis object identity having the same.
Correspondingly, the embodiment of the present application also provides a kind of application traffic analysis devices, comprising:
Access log obtains module, for obtaining the access log of application to be analyzed;
Log index table determining module, for described in the funnel configuration file matching based on the preset application to be analyzed
Access log obtains every access log that module obtains, and is determined for compliance with the day of the access log of the funnel configuration file
Will concordance list;
Route matching module, the path list for being obtained after being decomposed based on access path to be analyzed, to according to
The actual access path that log index table determines is matched;
Flow analysis module, for calculating the stream of the application to be analyzed according to the matching result of the route matching module
Measure analysis indexes;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration
File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed
Analyze page analysis object identity having the same.
Application traffic analysis method disclosed in the present application, by the access log for obtaining application to be analyzed;Based on preset
The funnel configuration file of the application matches every access log, is determined for compliance with the access log of the funnel configuration file
Log index table;The path list obtained after being decomposed based on access path to be analyzed, to true according to the log index table
Fixed actual access path is matched;The flow analysis index of the application to be analyzed is calculated according to matching result;Wherein, institute
State the analysis object identity that access log includes the application to be analyzed of access;The funnel configuration file includes pre-generated
Based on analysis object identity carry out log matches formula;The analysis object of same type has identical in the application to be analyzed
Analysis object identity, solve in the prior art based on frequent path excavate calculate show rate or clicking rate, can not be to similar
The problem of type page or module carry out macroscopic analysis.The application is by being arranged identical analysis object to the same type page or module
Mark can carry out polymerization analysis to the data of the same type page or module, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed or module, spirit
The flow indicator that configuration pathdepth to be analyzed, the flexible configuration of living are applied, practicability are stronger.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be in embodiment or description of the prior art
Required attached drawing is briefly described, it should be apparent that, the accompanying drawings in the following description is only some realities of the application
Example is applied, it for those of ordinary skill in the art, without any creative labor, can also be attached according to these
Figure obtains other attached drawings.
Fig. 1 is the application traffic analysis method flow diagram of the embodiment of the present application one;
Fig. 2 is the application traffic analysis method flow diagram of the embodiment of the present application two;
Fig. 3 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application three;
Fig. 4 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application four.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Based on this Shen
Please in embodiment, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall in the protection scope of this application.
Funnel model full name of marketing is " search marketing effectiveness converts funnel ", and five layers of funnel have corresponded to enterprise search marketing
Links, reflect from showing, clicking, accessing, seeking advice from, until generating customer quantity and loss in order process.From
The maximum amount of showing arrive the smallest order volume, this procedural representation reduced from level to level constantly have client because a variety of causes from
It opens, loses interest or abandon to buy to enterprise.Thought of the application based on marketing funnel model, goes out from the actual demand of application
Hair, defines the flow funnel of application, and the customer flow of reflection each page of application or each module further analyzes the flow of application.
Apply described in the embodiment of the present application includes: web application, mobile terminal application and the application of the end PC etc., and the module of application.
Embodiment one
A kind of application traffic analysis method disclosed in the present application, as shown in Figure 1, this method comprises: step 100 is to step
130。
Step 100, the access log of application to be analyzed is obtained.
The daily record data of application stores in distributed file system, and log system can collect the daily record data of application, institute
Stating daily record data includes the log that all users access the application.It is generally included in daily record data: user identifier (id), using mark
Know, analyze analysis object upstream-downstream relationship (the i.e. page or module of object identity, the time of access analysis object and access
Jump relationship) etc..Then, log system extracts from the daily record data of application to be analyzed according to preset rules and belongs to certain
The daily record data of the session each time of a user generates the relevant access log of a session.Wherein, the primary meeting of some user
The access log of words includes: user identifier, application identities, session identification, session step.Wherein, session step is for indicating one
The sequence of the access log of secondary session.The preset rules can be with are as follows: analyzes upstream-downstream relationship, the access time interval of object
Deng.Wherein, the access log includes the analysis object identity of the application to be analyzed of access.
When it is implemented, analysis object can be the module on the page or the page.
Step 110, the funnel configuration file based on the preset application to be analyzed matches every access log, really
Surely meet the log index table of the access log of the funnel configuration file.
When it is implemented, configuring to be analyzed answer by graphic user interface first before carrying out application traffic analysis
Funnel configuration file.The funnel configuration file includes pre-generated based on analysis object (such as page) progress log
The formula matched.The funnel configuration file further includes according to preset log according to the parameters based on analysis object configuration
The corresponding relationship of matching condition, each field of the parameters of configuration and preset access log and parameters generates
For carrying out the formula of log matches.
Then, the funnel configuration file based on the preset application to be analyzed, to every access log of acquisition
It is matched, is determined for compliance with the access log of funnel configuration file, and extract the relevant information and funnel configuration text of access log
Part relevant parameter information generates log index table.For example, extracting log sessions mark, log mark, session step, and related
Parameter log mark, log sessions mark, session step and funnel description, the description life of funnel level of funnel configuration file
At log index table.
Step 120, the path list obtained after being decomposed based on access path to be analyzed, to according to the log index table
Determining actual access path is matched.
When product personnel or maintenance personnel need to analyze some access path or conversion ratio, the clicking rate of the page etc. of application
When index, the access path of analysis object to be analyzed can be inputted.
When it is implemented, decomposing first to access path to be analyzed, multiple paths are obtained, form path list.
Then, the log index table according to obtained in previous step is to the access log indexed in the log index table according to access
Step sequencing is arranged, and the access log after arrangement represents the actual access road that user accesses the analysis object of application
Diameter.When it is implemented, access analysis object queue can be generated according to the access log after arrangement, with the corresponding leakage of analysis object
The funnel hierarchical identification being arranged in bucket configuration file further identifies the analysis object queue of generation, so that it may obtain actual access
Path.Finally, each path in obtained actual access path and path list is matched.
Step 130, the flow analysis index of the application to be analyzed is calculated according to matching result.
After each path in obtained actual access path and path list is matched, successful match is determined
The number of path (path for including in actual access path) and successful match (includes path i.e. in actual access path
Number) etc..Then, the data obtained according to matching, calculate preset flow analysis index, such as page conversion ratio, clicking rate
Deng.
Application traffic analysis method disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on
The funnel configuration file of the preset application to be analyzed matches every access log, is determined for compliance with the funnel configuration text
The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to
The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result
Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file
Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed
Object analysis object identity having the same solves and shows rate or click based on frequent path excavation calculating in the prior art
Rate, the problem of macroscopic analysis can not being carried out to the same type page or module.By being arranged identical point to similar type analysis object
Object identity is analysed, polymerization analysis can be carried out to the data of similar type analysis object, obtain macroscopic analysis result.
Meanwhile the application is by configuration file, can according to business demand flexible configuration analysis object to be analyzed, flexibly
The flow indicator of pathdepth to be analyzed, flexible configuration application is configured, practicability is stronger.
Embodiment two
A kind of application traffic analysis method disclosed in the present application, as shown in Fig. 2, this method comprises: step 200 is to step
270。
Step 200, the funnel configuration file of the application to be analyzed is obtained.
When it is implemented, the funnel that maintenance personnel or business personnel are applied by the configuration of preset graphic user interface is matched
Set file.Funnel refers to that using in the process, user's Conversion Model between different step is answered for analyzing user's access
The efficiency of depth and each step, this programme are readily applicable to the active pointer pair of a certain module, some specific location
The efficiency of specific objective.The funnel configuration file for obtaining the application to be analyzed includes: to obtain to configure by graphic user interface
Application to be analyzed funnel description, the description of funnel level, wherein funnel level description includes at least: funnel level mark
Know, the analysis object identity and matching condition of the application to be analyzed that each level includes;According to the analysis object identity and
The mapping relations of matching condition, preset analysis object identity and each field of access log, generate level defined formula;It will be described
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration file of the application to be analyzed.
The configuration file of the funnel of the application is configured by preset human-computer interaction interface, comprising: funnel description, level
Description, level defined formula.Wherein, funnel description is for defining evaluation index;Level describes the number of levels for defining funnel
The analysis object information that amount, hierarchical identification, level path and each level include;The analysis object information includes analysis pair
It can also include the additional conditions of analysis object as mark.Level defined formula is believed according to the analysis object of each level of configuration
Breath generates, and it can also include additional conditions that the analysis object, which includes at least analysis object identity,.The additional conditions are according to tool
Body evaluation index determines.
The page, the module that object can be application are analyzed, in order to make it easy to understand, the present embodiment is answered to analyze object as one
With the specific implementation process for illustrating application traffic analysis method for the page of program.It is to configure three layers of funnel below
Example, illustrates the generating process of the configuration file of funnel.
Firstly, defining the funnel description of funnel, the evaluation index such as funnel for calculating includes conversion ratio.
Then, the level description of funnel is defined.Level description includes: level quantity, hierarchical identification, level path,
And the page info that each level includes.Three layers are set by funnel in the present embodiment, the mark of each level is respectively as follows: first layer
For " homepage ", the second layer is " intention page ", and third layer is " order ".The level path of funnel is " homepage-intention page-order ".
Level based on aforementioned definitions defines the page info that each level of funnel includes.The head of commonly used program application
Page only one, for open application program after first page.User can be entered by the module in application program homepage
To multiple next stage pages, eventually enters into target pages or enter object module.In application program use process, it is also possible to go out
After current family enters the next stage page by the module in application program homepage, back to homepage or the feelings of application program are exited
Condition.For the access track to the page to be analyzed in application program of identity user, being analysed to page configuration is each layer of funnel
The page of grade, convenient for being analyzed by funnel.Therefore, the page (i.e. " homepage ") that first layer includes can be set to answer to open
With first page after program;It is analysis indexes concern from " homepage " that the page (i.e. " intention page ") that the second layer includes, which is arranged,
The page of entrance;It is target pages that the page (i.e. " order ") that third layer includes, which is arranged,.When it is implemented, funnel can also be arranged
The attachment condition of each layer page, such as the additional conditions of setting " homepage ", such as 1.1 versions, for the application to indicated release
Program carries out analysis indexes calculating.
When it is implemented, each page can be identified using Page Name pagename.Adopted when configuration file configuration
Page iden-tity is consistent with the unique identification of each page of the application program in journal file.
When application is web application, such as Website page, if analysis object is Website page, analyzing object identity is
The URL (uniform resource locator) of webpage;If reference is application program for mobile terminal, if analysis object module, object
It is identified as the unique identification of module.
Finally, generating funnel configuration file according to funnel description and level description.
When it is implemented, the backstage of graphic user interface pre-establishes each of each configuration item and application program running log
The corresponding relationship of field and matching operation rule, when the configuration for completing funnel parameters by the graphic user interface
Later, the backstage of graphic user interface is according to the funnel description and level description life configured by the graphic user interface
At the configuration file of funnel.Specifically: by the parameters of the funnel configured according to graphic user interface, it is mapped to the word of log
Section forms the judgment formula for being directed to log, such as version number is mapped to app_version field, forms such as " app_
Formula as version.equals (' 1.1 ') ".The structure of funnel configuration file are as follows: funnel description, level description, level
Defined formula, wherein level defined formula is generated according to the page info in the description of the level of configuration.When it is implemented, level
Defined formula can be generated only according to the analysis object identity (such as page iden-tity) in the page info in the description of the level of configuration,
Can also according in page info analysis object identity and additional conditions generate.Then, funnel configuration file is written and is distributed
Formula file system HDFS.
Step 210, the access log of application to be analyzed is obtained.
Obtain the specific embodiment of the access log of application to be analyzed referring to the corresponding steps of embodiment one, herein no longer
It repeats.
In the funnel configuration file for presetting application to be analyzed and after getting the access log of application to be analyzed, it is based on
The funnel configuration file of the preset application matches every access log, is determined for compliance with the visit of the funnel configuration file
Ask the log index table of log, comprising: the level in the funnel configuration file based on the preset application to be analyzed defines public
Formula matches every access log, is determined for compliance with the access log of the funnel configuration file;According to the access of successful match
Log mark, log sessions mark, session step and funnel description, the description of funnel level of log generate log index
Table.
Step 220, the level defined formula matching in the funnel configuration file based on the preset application to be analyzed is every
Access log described in item is determined for compliance with the access log of the funnel configuration file.
When it is implemented, configuring to be analyzed answer by graphic user interface first before carrying out application traffic analysis
Funnel configuration file.The funnel configuration file includes the pre-generated formula that log matches are carried out based on the page.Institute
Funnel configuration file is stated according to the parameters based on page configuration, further includes according to preset log matches condition, configuration
What the corresponding relationship of each field and parameters of parameters and preset access log generated is used to carry out log
The formula matched.
Then, the funnel configuration file based on the preset application, every access log progress to acquisition
Match, is determined for compliance with the access log of funnel configuration file.When it is implemented, can be to access log described in every, in conjunction with default
The application funnel configuration file in level defined formula, using JexlContext comparator go matching access log,
Obtain the journal file for meeting level defined formula in funnel configuration file.
Step 230, according to the log mark of the access log of successful match, log sessions mark, session step and described
Funnel description, the description of funnel level generate log index table.
For the access log of successful match, the relevant information and funnel configuration file relevant parameter letter of access log are extracted
Breath generates log index table.For example, extracting log sessions mark, log mark, session step and associated funnel configuration file
Parameter log mark, log sessions mark, session step and the funnel description, funnel level description generate log index
Table.The format of each index can be in log index table are as follows: log id, funnel description, and the description of funnel level, log sessions id,
Session step, User ID.Wherein, log id is for identifying a unique log;Step is described for matching access road to be analyzed
Diameter;Log ID and User ID are used to calculate the index of conversion ratio.When it is implemented, can be increased according to the difference of flow analysis index
Add deduct the list item of few log index table.
Step 240, access path to be analyzed is decomposed, obtains path list to be matched.
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
When product personnel or maintenance personnel need to analyze some access path or conversion ratio, the clicking rate of the page etc. of application
When index, access path to be analyzed can be inputted.When it is implemented, decomposed to access path to be analyzed, obtain to
It include: using the division mode based on prefix with path list, the access path being analysed to resolves into multiple subpath compositions
Path list.Successively intercept preceding 1 to the N (path node of the N equal to the access path to be analyzed in the path to be visited
Number) a path node, form N number of new path, N number of new path forms path list to be matched.With to be analyzed
Access path be " A-B-C " for, intercept respectively: A, A-B, A-B-C obtain 3 new paths, and by A, A-B, A-B-C group
At path list to be matched.
Later, the path list obtained after being decomposed based on access path to be analyzed, to true according to the log index table
Fixed actual access path is matched, comprising: is carried out according to the vertical sequence of session step to the log index table
Sequence;By in the log index table after sequence every index funnel hierarchical identification composition actual access path, with based on to
All paths in path list that the access path of analysis obtains after decomposing are matched respectively;Wherein, described to be analyzed
Access path is made of at least one funnel hierarchical identification.
Step 250, the log index table is ranked up according to session step vertical sequence.
The log is indexed according to the session step vertical sequence of the access log indexed in log index table
Table is ranked up.
Step 260, by the actual access road of the funnel hierarchical identification composition of every index in the log index table after sequence
Diameter is matched respectively with based on all paths in the path list obtained after access path decomposition to be analyzed.
The sequence of the access log of log index table index after sequence represents the reality that user accesses the page of application
Access path.When it is implemented, access analysis object queue can be generated according to the access log for indexing table index after sequence
(such as: page queue), it is further with the funnel hierarchical identification being arranged in the corresponding funnel configuration file of analysis object (such as: the page)
Indicate the page queue generated, so that it may obtain actual access path.Finally, by obtained actual access path and path list
In each path matched.For example, the funnel in the access log of first table item index of log index table after sequence
Funnel hierarchical identification is A in level description, the funnel in the access log of second table item index of log index table after sequence
Funnel hierarchical identification is B in level description, then available actual access path is A-B.
Then, obtained actual access path is matched respectively with all paths in obtained path list.With
For the result that abovementioned steps obtain, all path A, A-B, A-B-C in actual access path A-B and path list are distinguished
It is matched.
Step 270, the flow analysis index of the application to be analyzed is calculated according to matching result.
After each path in obtained actual access path and path list is matched, successful match is determined
The number of path (path for including in actual access path) and successful match (includes path i.e. in actual access path
Number) etc..Then, the data obtained according to matching, calculate preset flow analysis index, such as page conversion ratio, clicking rate
Deng.The example of abovementioned steps is connected, the path of successful match includes: A, A-B, each successful match 1 time in this step.Then, root
The flow analysis index of the application to be analyzed is calculated according to matching result.
The step of flow analysis index that the application to be analyzed is calculated according to matching result, comprising: according to matching
The corresponding analysis object identity of node in path and/or each path in successful path list calculates the flow point of application
Analyse index.The flow analysis index of application can be with are as follows: conversion ratio, clicking rate.
Flow analysis index is main are as follows: the Pv of each step, UV, session number etc..Pv is the number accessed, can be passed through
Statistical log ID is calculated, and UV is calculated by counting user ID, and session number is calculated by counting session id, generally
By the comparison of the UV between different step, conversion ratio of the user in funnel is calculated, which can be used to measure use
The efficiency of the depth at family or some module;Two tested simultaneously by the conversion ratio variation or AB that monitor the same funnel
Conversion ratio between a funnel compares, the optimization of Lai Jinhang business.
Previous example is connected, is 2 according to the Pv of the step corresponding with path node A of the available application of matching result.
In order to make it easy to understand, the present embodiment carries out the flow analysis method of application by taking the session of a user as an example
Explanation.When it is implemented, of abovementioned steps is carried out to the access log of each session of all users using same method
After matching, the matching result of each session of each user is integrated, so that it may the various flow analysis indexs being applied.
Application traffic analysis method disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on
The funnel configuration file of the preset application to be allocated matches every access log, is determined for compliance with the funnel configuration text
The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to
The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result
Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file
Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed
Object analysis object identity having the same solves and shows rate or click based on frequent path excavation calculating in the prior art
Rate, the problem of macroscopic analysis can not being carried out to the same type page or module.By to similar type analysis object (such as page, module)
Identical analysis object identity is set, polymerization analysis can be carried out to the data of same type, obtain macroscopic analysis result.
Meanwhile the application is by configuration file, can according to business demand flexible configuration analysis object to be analyzed (such as:
The page), flexible configuration pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
Embodiment three
Correspondingly, a kind of application traffic analysis device disclosed in the present application, as shown in figure 3, described device includes:
Access log obtains module 300, for obtaining the access log of application to be analyzed;
Log index table determining module 310, for the funnel configuration file matching based on the preset application to be analyzed
The access log obtains every access log that module 300 obtains, and is determined for compliance with the access of the funnel configuration file
The log index table of log;
Route matching module 320, the path list for being obtained after being decomposed based on access path to be analyzed, to according to institute
The actual access path that log index table determines is stated to be matched;
Flow analysis module 330, for calculating described to be analyzed answer according to the matching result of the route matching module 320
Flow analysis index;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration
File includes the pre-generated formula that log matches are carried out based on analysis object identity;Same type in the application to be analyzed
Analyze object analysis object identity having the same.
Application traffic analysis device disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on
The funnel configuration file of the preset application to be analyzed matches every access log, is determined for compliance with the funnel configuration text
The log index table of the access log of part;The path list obtained after being decomposed based on access path to be analyzed, to according to
The actual access path that log index table determines is matched;The flow analysis of the application to be analyzed is calculated according to matching result
Index;Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file
Including the pre-generated formula for carrying out log matches based on analysis object identity;The page of same type in the application to be analyzed
Analysis object identity having the same solves and shows rate or clicking rate, nothing based on frequent path excavation calculating in the prior art
The problem of method carries out macroscopic analysis to the same type page or module.It is identical by the way that similar type analysis object (such as: the page) is arranged
Analysis object identity, can to the data of similar type analysis object carry out polymerization analysis, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed, flexible configuration
Pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
Example IV
Based on embodiment three, a kind of application traffic analysis device disclosed in another embodiment of the application, as shown in figure 4, institute
State device further include:
Funnel configuration file generation module 340, for obtaining the leakage of the application to be analyzed configured by graphic user interface
Bucket description, the description of funnel level, wherein the funnel level description includes at least: the institute that funnel hierarchical identification, each level include
State the analysis object identity and matching condition of application to be analyzed;According to the analysis object identity and matching condition, preset point
The mapping relations of object identity and each field of access log are analysed, level defined formula is generated;By funnel description, funnel level
Description and level defined formula are integrated into the funnel configuration file of the application to be analyzed.
Optionally, the log index table determining module 310 further comprises:
Log matches unit 3101, it is fixed for the level in the funnel configuration file based on the preset application to be analyzed
Adopted formula matches every access log, is determined for compliance with the access log of the funnel configuration file;
Log index table generation unit 3102, for log mark, the log sessions according to the access log of successful match
Mark, session step and funnel description, the description of funnel level generate log index table.
Optionally, the route matching module 320 includes:
Sequencing unit 3201, for being ranked up according to the vertical sequence of session step to the log index table;
Route matching unit 3202, for index every in the log index table after the sequencing unit 3201 sequence
The actual access path of funnel hierarchical identification composition, with decomposed based on access path to be analyzed after in obtained path list
All paths are matched respectively;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
The flow analysis module 330 is specifically used for: according to path in the path list of successful match and/or each described
The corresponding analysis object identity of the node in path calculates the flow analysis index of application.
Optionally, the application traffic analysis device further include:
Path list generation module 350 to be analyzed, for using the division mode based on prefix, the access road being analysed to
Diameter resolves into the path list of multiple subpath compositions.
Application traffic analysis device disclosed in the embodiment of the present application, by the access log for obtaining application to be analyzed;It is based on
The funnel configuration file of the preset application matches every access log, is determined for compliance with the visit of the funnel configuration file
Ask the log index table of log;The path list obtained after being decomposed based on access path to be analyzed, to according to the log rope
Draw the actual access path that table determines to be matched;The flow analysis index of the application to be analyzed is calculated according to matching result;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file includes
The pre-generated formula that log matches are carried out based on analysis object identity;The page of same type has in the application to be analyzed
Identical analysis object identity solves and shows rate or clicking rate based on frequent path excavation calculating in the prior art, can not be right
The problem of same type page or module carry out macroscopic analysis.By the way that identical analysis object mark is arranged to similar type analysis object
Know, polymerization analysis can be carried out to the data of similar type analysis object, obtain macroscopic analysis result.
Meanwhile the application passes through configuration file, it can be according to the business demand flexible configuration page to be analyzed, flexible configuration
Pathdepth to be analyzed, flexible configuration application flow indicator, practicability is stronger.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.For Installation practice
For, since it is basically similar to the method embodiment, so being described relatively simple, referring to the portion of embodiment of the method in place of correlation
It defends oneself bright.
A kind of application traffic analysis method, apparatus provided by the present application is described in detail above, it is used herein
The principle and implementation of this application are described for specific case, and the above embodiments are only used to help understand
The present processes and its core concept;At the same time, for those skilled in the art is having according to the thought of the application
There will be changes in body embodiment and application range, in conclusion the content of the present specification should not be construed as to the application
Limitation.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It realizes by means of software and necessary general hardware platform, naturally it is also possible to pass through hardware realization.Based on such reason
Solution, substantially the part that contributes to existing technology can embody above-mentioned technical proposal in the form of software products in other words
Come, which may be stored in a computer readable storage medium, such as ROM/RAM, magnetic disk, CD, including
Some instructions are used so that a computer equipment (can be personal computer, server or the network equipment etc.) executes respectively
Method described in certain parts of a embodiment or embodiment.
Claims (12)
1. a kind of application traffic analysis method characterized by comprising
Obtain the access log of application to be analyzed;
Funnel configuration file based on the preset application to be analyzed matches every access log, is determined for compliance with the leakage
The log index table of the access log of bucket configuration file;
The path list obtained after being decomposed based on access path to be analyzed, the practical visit to being determined according to the log index table
Diameter of asking the way is matched;
The flow analysis index of the application to be analyzed is calculated according to matching result;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file
Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed
Object analysis object identity having the same.
2. the method as described in claim 1, which is characterized in that the stream for calculating the application to be analyzed according to matching result
The step of measuring analysis indexes, comprising:
It is calculated according to the corresponding analysis object identity of the node in path and/or each path in the path list of successful match
The flow analysis index of application.
3. the method as described in claim 1, which is characterized in that the step of the access log for obtaining application to be analyzed it
Before, further includes:
Obtain the funnel description of the application to be analyzed configured by graphic user interface, funnel level describes, wherein the funnel
Level description includes at least: the analysis object identity for the application to be analyzed that funnel hierarchical identification, each level include and matching
Condition;
It is closed according to the mapping of the analysis object identity and matching condition, preset analysis object identity and each field of access log
System generates level defined formula;
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration text of the application to be analyzed
Part;
Wherein, the funnel description is for defining evaluation index.
4. method as claimed in claim 3, which is characterized in that the funnel configuration based on the preset application to be analyzed
File matches every access log, is determined for compliance with the step of the log index table of the access log of the funnel configuration file
Suddenly, comprising:
Level defined formula in funnel configuration file based on the preset application to be analyzed matches every access day
Will is determined for compliance with the access log of the funnel configuration file;
According to the log mark of the access log of successful match, log sessions mark, session step and funnel description, funnel
Level description generates log index table.
5. method as claimed in claim 4, which is characterized in that the path column obtained after being decomposed based on access path to be analyzed
Table, the step of matching to the actual access path determined according to the log index table, comprising:
The log index table is ranked up according to session step vertical sequence;
By in the log index table after sequence every index funnel hierarchical identification composition actual access path, with based on to point
All paths in path list that the access path of analysis obtains after decomposing are matched respectively;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
6. the method as described in claim 1, which is characterized in that the path column obtained after being decomposed based on access path to be analyzed
Table, before the step of being matched according to the determining actual access path of the log index table, further includes:
Using the division mode based on prefix, the access path being analysed to resolves into the path list of multiple subpath compositions.
7. a kind of application traffic analysis device characterized by comprising
Access log obtains module, for obtaining the access log of application to be analyzed;
Log index table determining module matches the access for the funnel configuration file based on the preset application to be analyzed
Every access log that log acquisition module obtains, is determined for compliance with the log rope of the access log of the funnel configuration file
Draw table;
Route matching module, the path list for being obtained after being decomposed based on access path to be analyzed, to according to the log
The actual access path that concordance list determines is matched;
Flow analysis module, for calculating the flow point of the application to be analyzed according to the matching result of the route matching module
Analyse index;
Wherein, the access log includes the analysis object identity of the application to be analyzed of access;The funnel configuration file
Including the pre-generated formula for carrying out log matches based on analysis object identity;The analysis of same type in the application to be analyzed
Object analysis object identity having the same.
8. device as claimed in claim 7, which is characterized in that the flow analysis module is specifically used for: according to successful match
Path list in path and/or each path node it is corresponding analysis object identity calculate application flow analysis refer to
Mark.
9. device as claimed in claim 7, which is characterized in that further include: funnel configuration file generation module is used for:
Obtain the funnel description of the application to be analyzed configured by graphic user interface, funnel level describes, wherein the funnel
Level description includes at least: the analysis object identity for the application to be analyzed that funnel hierarchical identification, each level include and matching
Condition;
It is closed according to the mapping of the analysis object identity and matching condition, preset analysis object identity and each field of access log
System generates level defined formula;
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration text of the application to be analyzed
Part;
Wherein, the funnel description is for defining evaluation index.
10. device as claimed in claim 9, which is characterized in that the log index table determining module further comprises:
Log matches unit, for the level defined formula in the funnel configuration file based on the preset application to be analyzed
With access log described in every, it is determined for compliance with the access log of the funnel configuration file;
Log index table generation unit, for log mark, the log sessions mark, session according to the access log of successful match
Step and funnel description, the description of funnel level generate log index table.
11. device as claimed in claim 10, which is characterized in that the route matching module includes:
Sequencing unit, for being ranked up according to the vertical sequence of session step to the log index table;
Route matching unit, the funnel hierarchical identification for every index in the log index table after the sequencing unit sorts
The actual access path of composition is distinguished with based on all paths in the path list obtained after access path decomposition to be analyzed
It is matched;
Wherein, the access path to be analyzed is made of at least one funnel hierarchical identification.
12. device as claimed in claim 7, which is characterized in that further include:
Path list generation module to be analyzed, for using the division mode based on prefix, the access path being analysed to is decomposed
The path list formed at multiple subpaths.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610597004.1A CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610597004.1A CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106294559A CN106294559A (en) | 2017-01-04 |
CN106294559B true CN106294559B (en) | 2019-09-17 |
Family
ID=57652664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610597004.1A Active CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106294559B (en) |
Families Citing this family (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145230A (en) * | 2017-06-15 | 2019-01-04 | 百度在线网络技术(北京)有限公司 | Information output method and device |
CN107563621A (en) * | 2017-08-22 | 2018-01-09 | 北京金堤科技有限公司 | A kind of website user's wastage analysis method and device |
CN107580215A (en) * | 2017-09-25 | 2018-01-12 | 深圳市九洲电器有限公司 | Set top box component quality feedback method and system |
CN110019072B (en) * | 2017-11-21 | 2021-05-25 | 北京京东尚科信息技术有限公司 | AB experiment method and system based on real-time data |
CN107943679B (en) * | 2017-11-24 | 2021-02-26 | 阿里巴巴(中国)有限公司 | Path funnel generation method and device and server |
CN110119337B (en) * | 2019-04-16 | 2023-03-10 | 深圳市轱辘车联数据技术有限公司 | Data analysis method and device and server |
CN110278150B (en) * | 2019-06-02 | 2020-05-19 | 北京航空航天大学 | Inter-domain aggregation path analysis method based on edge node request information characteristics |
CN112148957B (en) * | 2019-06-26 | 2024-07-30 | 北京百度网讯科技有限公司 | Webpage access data analysis method, device, equipment and readable storage medium |
CN110675194A (en) * | 2019-09-29 | 2020-01-10 | 北京思维造物信息科技股份有限公司 | Funnel analysis method, device, equipment and readable medium |
CN110941608B (en) * | 2019-09-29 | 2023-01-20 | 北京思维造物信息科技股份有限公司 | Method, device and equipment for generating buried point analysis and funnel analysis report |
CN111523921B (en) * | 2019-12-31 | 2023-10-20 | 支付宝实验室(新加坡)有限公司 | Funnel analysis method, analysis device, electronic device, and readable storage medium |
CN112612987A (en) * | 2020-12-25 | 2021-04-06 | 广州凡科互联网科技股份有限公司 | Method for calculating upstream and downstream flow of page access |
CN113176980B (en) * | 2021-05-25 | 2023-09-12 | 医声医事(北京)科技有限公司 | Dynamic construction method and system of flow hopper |
CN113486241B (en) * | 2021-07-08 | 2024-10-15 | 中国建设银行股份有限公司 | Business preference analysis method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544298A (en) * | 2013-10-30 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Log analysis method and analysis device for component |
CN105357054A (en) * | 2015-11-26 | 2016-02-24 | 上海晶赞科技发展有限公司 | Website traffic analysis method and apparatus, and electronic equipment |
CN105550250A (en) * | 2015-12-09 | 2016-05-04 | 百度在线网络技术(北京)有限公司 | Access log processing method and apparatus |
CN105791247A (en) * | 2014-12-25 | 2016-07-20 | 中国移动通信集团公司 | Unified traffic payment business implementation method and associated equipment and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9075718B2 (en) * | 2013-03-14 | 2015-07-07 | Vmware, Inc. | Dynamic field extraction of log data |
-
2016
- 2016-07-26 CN CN201610597004.1A patent/CN106294559B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544298A (en) * | 2013-10-30 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Log analysis method and analysis device for component |
CN105791247A (en) * | 2014-12-25 | 2016-07-20 | 中国移动通信集团公司 | Unified traffic payment business implementation method and associated equipment and system |
CN105357054A (en) * | 2015-11-26 | 2016-02-24 | 上海晶赞科技发展有限公司 | Website traffic analysis method and apparatus, and electronic equipment |
CN105550250A (en) * | 2015-12-09 | 2016-05-04 | 百度在线网络技术(北京)有限公司 | Access log processing method and apparatus |
Also Published As
Publication number | Publication date |
---|---|
CN106294559A (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106294559B (en) | A kind of application traffic analysis method and device | |
CN105183870B (en) | A kind of urban function region detection method and system using microblogging location information | |
Roosen et al. | Environmentally lean production: the development and incorporation of an environmental impact index into value stream mapping | |
Anderson et al. | The crowd is the territory: Assessing quality in peer-produced spatial data during disasters | |
CN108023768A (en) | Network event chain establishment method and network event chain establish system | |
CN117829291B (en) | Whole-process consultation knowledge integrated management system and method | |
CN110460608A (en) | A kind of Situation Awareness method and system comprising association analysis | |
Sun et al. | Socialwave: visual analysis of spatio-temporal diffusion of information on social media | |
Ross et al. | Household visitation during the COVID-19 pandemic | |
Hegeman et al. | Survey of graph analysis applications | |
Wang et al. | Data acquisition model for online learning activity in distance English teaching based on xAPI | |
Ceolin et al. | Capturing the ineffable: Collecting, analysing, and automating web document quality assessments | |
Madlberger et al. | Predictions based on Twitter—A critical view on the research process | |
Mangold et al. | How do filtering choices impact the structures of audience networks? A simulation study using data from 26 countries | |
Pesare et al. | Engagement in social learning: Detecting engagement in online communities of practice | |
CN108710574A (en) | Ui testing method and apparatus | |
Ahmed et al. | A systematic literature review on challenges in service oriented software engineering | |
Haqbeen et al. | Insights from a large-scale discussion on COVID-19 in collective intelligence | |
CN110493044A (en) | A kind of method and system of quantifiable Situation Awareness | |
CN110493217A (en) | A kind of distributed Situation Awareness method and system | |
Sui et al. | Intension analysis of user news sharing in social media | |
Oliveira et al. | 25 Years of Requirements Engineering in Brazil: A Systematic Mapping. | |
CN109857753A (en) | User data verification method, device, electronic equipment and storage medium | |
Barbero et al. | Multi-Modal Embeddings for Isolating Cross-Platform Coordinated Information Campaigns on Social Media | |
CN109101406A (en) | The generation method and device of response type page thermodynamic chart a little are buried based on front end |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |