CN114564466A - Database management system and method for managing database - Google Patents

Database management system and method for managing database Download PDF

Info

Publication number
CN114564466A
CN114564466A CN202210250943.4A CN202210250943A CN114564466A CN 114564466 A CN114564466 A CN 114564466A CN 202210250943 A CN202210250943 A CN 202210250943A CN 114564466 A CN114564466 A CN 114564466A
Authority
CN
China
Prior art keywords
user
access
database
information
data object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210250943.4A
Other languages
Chinese (zh)
Inventor
张德毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Wittman Information Technology Co ltd
Original Assignee
Shanghai Wittman Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wittman Information Technology Co ltd filed Critical Shanghai Wittman Information Technology Co ltd
Priority to CN202210250943.4A priority Critical patent/CN114564466A/en
Publication of CN114564466A publication Critical patent/CN114564466A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
    • G06F3/04842Selection of displayed objects or displayed text elements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a database management system and a method for managing a database, which are characterized in that a remote access request is obtained, wherein the remote access request comprises an IP address and a user ID of an access terminal; determining user access information according to the access request, generating first user information, and setting user access authority information; according to the user access authority information, executing management operation of the database; a user enters a management page of the system, selects a data object in a data object list as a to-be-processed object, and the management page sends an HTTP request to a back-end server and transmits new data object resource allocation; the back-end server verifies whether the resources used by the user exceed the resource quota of the user, and changes the data object computing resource configuration. The efficient storage management of the database objects suitable for the user access is ensured by executing the setting of the user access limit based on the information of the user access database and executing the background object resource configuration on the database.

Description

Database management system and method for managing database
Technical Field
The invention belongs to the field of database management, and particularly relates to a database management system and a database management method for managing a database.
Background
Database management pertains to the scope of database maintenance. Broadly speaking, it is all database management activities after database design. Including database model creation, data loading, database system routine maintenance activities, and the like. In a narrow sense, activities are taken on the database during the operation of the database system. Such as data services, performance supervision, database reorganization, database reconstruction, database integrity and security control, database recovery, etc. Database management responsibilities are assumed by the database administrator (DBA). The aim of database management is to provide a database environment with good usability, safety, reliability and excellent performance for database users.
Under the background that enterprise business is continuously expanded and business data volume is gradually increased, higher requirements are provided for operation and maintenance management work of an enterprise database, and the performance of the database is optimized on the basis of ensuring continuous, efficient and stable operation of the database, so that the database can better serve production and development of enterprises and becomes an important subject faced by a database management department. In recent years, large enterprises represented by the united states and Tengchan deal with the current situation that the task of managing the enterprise database is increasingly heavy by establishing a data center and introducing a database cluster mode.
In the prior art, for the data volume of blowout, the traditional database generally considers the sub-tables and sub-databases, and the performance of the database is ensured by read-write separation, that is, a fast-growing service is supported by using a database cluster, so that the problems that the database architecture becomes complex, and the cost for managing and maintaining the database is fast increased are brought. Therefore, the present invention provides a database management system and method for managing a database, which aims to solve the technical defects.
Disclosure of Invention
The present invention is directed to a database management system and method for managing a database, and aims to solve the above technical problems that are not conducive to database management.
In order to achieve the above object, there is provided a database management system for managing a database, the system comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module acquires a remote access request, and the remote access request comprises an IP address and a user ID of an access terminal;
the generating module is used for determining user access information according to the access request and generating first user information;
the management module is used for setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database;
the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation;
the management page sends an HTTP request to a back-end server and transmits new data object resource allocation;
the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration.
Preferably, determining user access information according to the access request, and generating first user information includes:
judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
Preferably, the user access authority information includes authority level, authority use time and authority access frequency;
according to the first user information, setting user access authority information, including: setting an authority level according to the first user information, and selecting whether authority use time and/or authority access frequency are/is set according to the authority level;
if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle;
and if the permission use time reaches the preset time and/or the preset frequency, the permission recovery is triggered, and the user access is limited.
Preferably, the kubernets cluster changes the data object computing resource configuration, including:
modifying a storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
Furthermore, a database management method of managing a database is proposed, the method comprising:
acquiring a remote access request, wherein the remote access request comprises an IP address and a user ID of an access terminal;
determining user access information according to the access request, and generating first user information;
setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database;
the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation;
the management page sends an HTTP request to a back-end server and transmits new data object resource allocation;
the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration.
Preferably, determining user access information according to the access request, and generating first user information includes:
judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
Preferably, the user access authority information includes authority level, authority use time and authority access frequency;
setting user access authority information according to the first user information, wherein the user access authority information comprises the following steps: setting an authority level according to the first user information, and selecting whether to set authority use time and/or authority access frequency according to the authority level;
if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle;
and if the permission use time reaches the preset time and/or the preset frequency, triggering permission recovery and limiting the access of the user.
Preferably, the kubernets cluster changes the data object computing resource configuration, including:
modifying a storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
Furthermore, an electronic device is proposed, a protection memory storing instructions and a processor executing the instructions to implement the corresponding method steps.
Furthermore, a storage medium is proposed, which stores a program; which is loaded and executed by a processor to perform the respective method steps.
The database management system and the method for managing the database provided by the invention have the advantages that a remote access request is obtained, and the remote access request comprises an IP address and a user ID of an access terminal; determining user access information according to the access request, and generating first user information; setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database; the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation; the management page sends an HTTP request to a back-end server and transmits new data object resource allocation; the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration. The invention ensures the high-efficiency storage management of the database object suitable for the user access by executing the setting of the user access limit based on the information of the user access database and executing the object resource configuration of the background on the database.
Drawings
Fig. 1 is a schematic structural diagram of a database management system for managing a database according to an embodiment of the present invention.
Fig. 2 is a flowchart of a database management method for managing a database according to an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings of the specification, it being understood that the preferred embodiments described herein are merely for illustrating and explaining the present invention, and are not intended to limit the present invention, and that the embodiments and features of the embodiments in the present invention may be combined with each other without conflict.
Example one
Referring to fig. 1, fig. 1 is a schematic structural diagram of a database management system for managing a database according to the present invention, and in this embodiment, a database management system for managing a database is provided, the system including:
the obtaining module 10 obtains a remote access request, where the remote access request includes an IP address and a user ID of an access terminal.
Specifically, in this embodiment, a large amount of important and sensitive information, such as an identification number, is often stored in a large-scale enterprise database, and at the database level, there may be a possibility that some managers or developers steal data by logging in a service user. In this embodiment, a request for accessing the database is remotely issued at the user, and the remote access request includes the IP address of the access terminal and the user ID.
And the generating module 20 determines user access information according to the access request and generates first user information.
Preferably, determining user access information according to the access request, and generating first user information includes: judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
Specifically, in the embodiment, after receiving the user access request, it is determined whether the access IP address belongs to the restricted address, and if the access IP address is the application server address, the access is directly allowed; if the address is the restricted address, judging which type of user the login user belongs to according to the ID of the login user, wherein the user types are divided into service users, desensitized query users, non-desensitized query users and DML operable users, the default user of the system is empty of the table-accessible authority, and the user is opened through login application and used. Specifically, the first user information is generated by establishing a mapping relationship between the user ID and the user type according to the user ID and the user type.
The management module 30 is used for setting user access authority information according to the first user information; and executing the management operation of the database according to the user access authority information.
Preferably, the user access authority information includes authority level, authority use time and authority access frequency; according to the first user information, setting user access authority information, including: setting an authority level according to the first user information, and selecting whether to set authority use time and/or authority access frequency according to the authority level; if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle; and if the permission use time reaches the preset time and/or the preset frequency, triggering permission recovery and limiting the access of the user.
Specifically, in this embodiment, for example, different permission levels may be allocated to different user types, and the permission use time and the permission access frequency may be set correspondingly according to the different permission levels. For example, for a user with a high level of authority, the authority use time may be selected as the limit time of the L1 interval, and the authority access frequency may also be set to the highest level of access frequency; for the user with the middle authority level, the authority use time can be selected as the limit time of the L2 interval, and the authority access frequency can also be set as the access frequency of the middle level; of course, the access frequency of the authority may not be set, and the authority use time is set only according to the authority level. Once the corresponding authority is determined to be set, triggering a cycle detection control, and detecting whether the authority use time reaches a preset time and/or the authority access frequency reaches a preset frequency based on the cycle; and if the permission use time reaches the preset time and/or the preset frequency, the permission recovery is triggered, and the user access is limited.
The management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation; the management page sends an HTTP request to a back-end server and transmits new data object resource allocation; the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration.
Preferably, the kubernets cluster changes the data object computing resource configuration, including: modifying a storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
In addition, the management operation can also be recovered by executing data recovery on the data objects storing data in the database. The user executes backup operation of the data object on the management page, the management page generates an HTTP request for a back-end service, and transmits information of the data object as a parameter; the back-end service inquires information of a storage volume currently used by the data object from a Kubernetes cluster; the back-end service operates the Ceph storage cluster to backup the storage volume and writes backup information into a platform database; the back-end service returns the data object backup information to the management page. For the recovery of the data object, only the storage part of the corresponding data object in the database needs to be recovered to a specific time node. The recovery of data objects can be divided into the following steps: 1) a user selects a backup to restore in a management page, and the management page generates an HTTP request for a back-end service and transmits related parameters; 2) the back-end service inquires information of a storage volume used by the data object from the Kubernets cluster; 3) the backend service operates the Ceph storage cluster to restore the storage volume to a particular time node.
Furthermore, a database management method for managing a database is proposed, the method comprising the steps of:
s1, obtaining a remote access request, wherein the remote access request comprises an IP address and a user ID of an access terminal;
s2, determining user access information according to the access request and generating first user information;
s3, setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database;
the management operation comprises: a user enters a management page of the system, selects a data object from a data object list as a to-be-processed object, and fills in new data object resource allocation;
the management page sends an HTTP request to a back-end server and transmits new data object resource allocation;
the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the kubernets cluster makes changes to the data object computing resource configuration.
Preferably, determining user access information according to the access request, and generating first user information includes:
judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
Specifically, in the embodiment, after receiving the user access request, it is determined whether the access IP address belongs to the restricted address, and if the access IP address is the application server address, the access is directly allowed; if the address is the restricted address, judging which type of user the login user belongs to according to the ID of the login user, wherein the user types are divided into service users, desensitized query users, non-desensitized query users and DML operable users, the default user of the system is empty of the table-accessible authority, and the user is opened through login application and used. Specifically, the first user information is generated by establishing a mapping relation between the user ID and the user type according to the user ID and the user type.
Preferably, the user access authority information includes authority level, authority use time and authority access frequency;
setting user access authority information according to the first user information, wherein the user access authority information comprises the following steps: setting an authority level according to the first user information, and selecting whether to set authority use time and/or authority access frequency according to the authority level;
if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle;
and if the permission use time reaches the preset time and/or the preset frequency, the permission recovery is triggered, and the user access is limited.
Specifically, the present embodiment may assign different permission levels to different user types, and may set the permission use time and the permission access frequency according to the different permission levels. For example, for a user with a high level of authority, the authority use time may be selected as the limit time of the L1 interval, and the authority access frequency may also be set to the highest level of access frequency; of course, the access frequency of the authority may not be set, and the authority use time is set only according to the authority level. Once the corresponding authority is determined to be set, triggering a cycle detection control, and detecting whether the authority use time reaches a preset time and/or the authority access frequency reaches a preset frequency based on the cycle; and if the permission use time reaches the preset time and/or the preset frequency, the permission recovery is triggered, and the user access is limited.
Preferably, the kubernets cluster changes the data object computing resource configuration, including: modifying a storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
Furthermore, an electronic device, a protection memory and a processor are proposed, the memory storing instructions, the processor executing the instructions to implement the corresponding method steps.
Furthermore, a storage medium is proposed, which stores a program; which is loaded and executed by a processor to perform the respective method steps.
In the solution of the above embodiment of the present invention, the provided database management system and method for managing a database obtains a remote access request, where the remote access request includes an IP address and a user ID of an access terminal; determining user access information according to the access request, and generating first user information; setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database; the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation; the management page sends an HTTP request to a back-end server and transmits new data object resource allocation; the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration. The efficient storage management of the database objects suitable for the user access is ensured by executing the setting of the user access limit based on the information of the user access database and executing the object resource configuration of the background on the database.
It should be noted that the division of the modules of the above apparatus is only a logical division, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. And these modules may all be implemented in software invoked by a processing element. Or may be implemented entirely in hardware. And part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware.
In addition, the embodiment of the invention also provides a readable storage medium, wherein the readable storage medium stores computer execution instructions, and when a processor executes the computer execution instructions, the data display and rapid processing method applied to the power distribution room is realized.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements, and offset processing may occur to those skilled in the art, though not expressly stated herein. Such modifications, improvements, and offset processing are suggested in this specification and still fall within the spirit and scope of the exemplary embodiments of this specification.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or contexts, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of the present specification shall control if they are inconsistent or inconsistent with the statements and/or uses of the present specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present specification can be seen as consistent with the teachings of the present specification. Accordingly, the embodiments of the present description are not limited to only those explicitly described and depicted herein.

Claims (10)

1. A database management system for managing a database, the system comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module acquires a remote access request, and the remote access request comprises an IP address and a user ID of an access terminal;
the generating module is used for determining user access information according to the access request and generating first user information;
the management module is used for setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database;
the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation;
the management page sends an HTTP request to a back-end server and transmits new data object resource allocation;
the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration.
2. The database management system for managing a database according to claim 1, wherein determining user access information from the access request and generating first user information comprises:
judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
3. The database management system for managing a database according to claim 2, wherein the user access authority information includes information on authority level, authority use time, authority access frequency;
according to the first user information, setting user access authority information, including: setting an authority level according to the first user information, and selecting whether to set authority use time and/or authority access frequency according to the authority level;
if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle;
and if the permission use time reaches the preset time and/or the preset frequency, triggering permission recovery and limiting the access of the user.
4. The database management system for managing databases of claim 1, wherein said kubernets cluster makes changes to data object computing resource configurations, comprising:
modifying storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
5. A database management method of managing a database, the method comprising:
acquiring a remote access request, wherein the remote access request comprises an IP address and a user ID of an access terminal;
determining user access information according to the access request, and generating first user information;
setting user access authority information according to the first user information; according to the user access authority information, executing management operation of the database;
the management operation comprises: a user enters a management page of the system, selects a data object from the data object list as a to-be-processed object, and fills in new data object resource allocation;
the management page sends an HTTP request to a back-end server and transmits new data object resource allocation;
the back-end server verifies whether the resource used by the user exceeds the resource quota of the user, and transmits the new resource configuration to the Kubernetes cluster after the resource quota verification; the Kubernetes cluster makes changes to the data object computing resource configuration.
6. The database management method of managing a database according to claim 5, wherein determining user access information from the access request and generating first user information comprises:
judging whether the IP address accessing the access terminal belongs to a limited address or not; if the address is the restricted address, judging the user type according to the user ID, establishing a mapping relation between the user ID and the user type, and generating first user information.
7. The database management method of managing a database according to claim 6, wherein the user access authority information includes information on authority level, authority use time, authority access frequency;
according to the first user information, setting user access authority information, including: setting an authority level according to the first user information, and selecting whether to set authority use time and/or authority access frequency according to the authority level;
if the permission use time and/or the permission access frequency are/is selected to be set, triggering a cycle detection control, and detecting whether the permission use time reaches a preset time and/or whether the permission access frequency reaches a preset frequency based on the cycle;
and if the permission use time reaches the preset time and/or the preset frequency, triggering permission recovery and limiting the access of the user.
8. The database management method for managing a database according to claim 5, wherein said kubernets cluster performs a change of a data object computing resource configuration, comprising:
modifying a storage space of the data object computing resource; and if the size of the storage space is modified, generating a first trigger instruction to a background server, stretching the storage volume of the data object by the back-end server, and updating new data object information to a platform database.
9. An electronic device, a protection memory storing instructions and a processor executing the instructions to carry out the method steps according to any one of claims 5 to 8.
10. A storage medium storing a program; the program is loaded and executed by a processor to implement the method steps according to any of the preceding claims 5-8.
CN202210250943.4A 2022-03-15 2022-03-15 Database management system and method for managing database Pending CN114564466A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210250943.4A CN114564466A (en) 2022-03-15 2022-03-15 Database management system and method for managing database

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210250943.4A CN114564466A (en) 2022-03-15 2022-03-15 Database management system and method for managing database

Publications (1)

Publication Number Publication Date
CN114564466A true CN114564466A (en) 2022-05-31

Family

ID=81718946

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210250943.4A Pending CN114564466A (en) 2022-03-15 2022-03-15 Database management system and method for managing database

Country Status (1)

Country Link
CN (1) CN114564466A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766296A (en) * 2023-01-09 2023-03-07 广东中思拓大数据研究院有限公司 User account authority control method, device, server and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115766296A (en) * 2023-01-09 2023-03-07 广东中思拓大数据研究院有限公司 User account authority control method, device, server and storage medium

Similar Documents

Publication Publication Date Title
US10846137B2 (en) Dynamic adjustment of application resources in a distributed computing system
EP3221795B1 (en) Service addressing in distributed environment
US7856496B2 (en) Information gathering tool for systems administration
US7668831B2 (en) Assigning unique identification numbers to new user accounts and groups in a computing environment with multiple registries
CN111488241A (en) Method and system for realizing agent-free backup and recovery operation on container arrangement platform
GB2311391A (en) Restart and recovery of OMG compliant transaction systems
US20100169289A1 (en) Two Phase Commit With Grid Elements
US20060036579A1 (en) Apparatus, system, and method for associating resources using a time based algorithm
CN107656705B (en) Computer storage medium and data migration method, device and system
US7069270B1 (en) Automated method and mechanism for converting a single instance application to a multiple instance application
CN110063042A (en) A kind of response method and its terminal of database failure
CN114564466A (en) Database management system and method for managing database
CN113946276A (en) Disk management method and device in cluster and server
US8041690B2 (en) Storing information for dynamically enlisted resources in a transaction
CN113157411B (en) Celery-based reliable configurable task system and device
CN114817974A (en) Dynamic data desensitization method and system, and data security processing method and system
US6009414A (en) Computer system with checkpoint facility and accounting facility indicating charges payable for processes
CN106815318B (en) Clustering method and system for time sequence database
CN111399999B (en) Computer resource processing method, device, readable storage medium and computer equipment
US20220217097A1 (en) Method and system for allocating and managing cloud resources
EP3992827A1 (en) Management of access to data in a distributed database
CN107589970B (en) Plug-in calling method and device
US11262932B2 (en) Host-aware discovery and backup configuration for storage assets within a data protection environment
CN114116783A (en) Data table operation request processing method and device, server and storage medium
CN114816272A (en) Magnetic disk management system under Kubernetes environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination