CN109032824A - Database method of calibration, device, computer equipment and storage medium - Google Patents
Database method of calibration, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109032824A CN109032824A CN201810551893.7A CN201810551893A CN109032824A CN 109032824 A CN109032824 A CN 109032824A CN 201810551893 A CN201810551893 A CN 201810551893A CN 109032824 A CN109032824 A CN 109032824A
- Authority
- CN
- China
- Prior art keywords
- verification
- database
- data
- information
- check results
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Abstract
This application involves a kind of database method of calibration, device, computer equipment and storage mediums.The described method includes: obtaining verification request;Verification request carries Database Identification;It is requested in response to verification, obtain verification configuration file and verification task is created according to verification configuration file;Target database corresponding with Database Identification is searched based on verification task;Obtain data on line corresponding with target database, and achievement data corresponding with data on line;Verification task is executed based on data on line and achievement data, obtains check results;When check results are deposited when abnormal, according to check results generation warning information.Early warning can be carried out extremely to database using this method.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of database method of calibration, device, computer equipment
And storage medium.
Background technique
With the rapid development of office automation and e-commerce, enterprise increasingly payes attention to database.For storage weight
Want the database of data, it usually needs monitored in real time to the operating condition of database.Such as it is corresponding to database
System log carries out alarm keyword screening, so as to monitor Database error in time, to remind data base administrator
The Database error occurred is handled.Traditional approach is monitored to the mistake having occurred and that, and can not be to can
The database of Database error can be caused to carry out early warning extremely, data base administrator needs to expend more time to having already appeared
Database error verified and repaired.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of data that can carry out extremely early warning to database
Library method of calibration, device, computer equipment and storage medium.
A kind of database method of calibration, which comprises obtain verification request;The verification request carries database
Mark;It is requested in response to the verification, obtain verification configuration file and verification task is created according to the verification configuration file;Base
Target database corresponding with the Database Identification is searched in the verification task;It obtains corresponding with the target database
Data on line, and achievement data corresponding with data on the line;It is held based on data on the line and the achievement data
The row verification task, obtains check results;When the check results are deposited when abnormal, according to check results generation early warning
Information.
The acquisition verifies configuration file and is created according to the verification configuration file and verified in one of the embodiments,
Task, comprising: obtain verification configuration file and white list corresponding with the Database Identification;The white list includes filtering
Element;According to the corresponding checksum filter device of filtering Element generation;According to the verification configuration file and the checksum filter
Device creates verification task.
In one of the embodiments, described when the check results are deposited when abnormal, according to check results life
After warning information, further includes: determine the Exception Type of the check results;Search whether exist and the Exception Type pair
The rebuilt component answered;When there is rebuilt component corresponding with the Exception Type, call the rebuilt component found according to institute
Check results are stated, the target database is repaired;When rebuilt component corresponding with the Exception Type is not present, really
Fixed user account corresponding with the Database Identification, and the warning information is sent to the user account.
It is described in one of the embodiments, to execute the verification times based on data on the line and the achievement data
Business, obtains check results, comprising: and it is based on the verification task, extracts the information to be verified for including in data on the line, and
The target information for including in the achievement data;Compare whether the information to be verified matches with the target information;When described
When information to be verified and the target information mismatch, it is abnormal to determine that check results exist;When the information to be verified with it is described
When target information matches, determine that check results are normal.
In one of the embodiments, before acquisition verification, further includes: obtain the deployment request that terminal uploads;
The deployment request carries database application work order;It requests in response to the deployment, is mentioned from the database application work order
Take out Database Properties information;Based on the data library application work order create database instance, and with the database instance
Corresponding initial data base;The initial data base is disposed according to the Database Properties information, obtains target data
Library.
Include verification frequency in the Database Properties information in one of the embodiments,;The method also includes: root
Deployment subtask is generated according to the verification frequency;Obtain script file corresponding with the deployment subtask;According to the verification
Frequency calls the script file to generate verification request every preset duration.
A kind of database calibration equipment, described device include: acquisition module, for obtaining verification request;The verification is asked
It asks and carries Database Identification;Creation module obtains verification configuration file and according to described for requesting in response to the verification
It verifies configuration file and creates verification task;Searching module, for being searched and the Database Identification pair based on the verification task
The target database answered;Obtain data on line corresponding with the target database, and finger corresponding with data on the line
Mark data;Correction verification module is verified for executing the verification task based on data on the line and the achievement data
As a result;When the check results are deposited when abnormal, according to check results generation warning information.
In one of the embodiments, the creation module be also used to obtain preset verification configuration file and with it is described
The corresponding white list of Database Identification;The white list includes filtering element;It is verified accordingly according to the filtering Element generation
Filter;Verification task is created according to the verification configuration file and the checksum filter device.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes above-mentioned each database method of calibration as described in the examples when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above-mentioned each database method of calibration as described in the examples is realized when row.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request
The verification configuration file first constructed, and verification task is created according to verification configuration file.It can be found based on verification task and school
The entrained corresponding target database of Database Identification of request is tested, data and and line on the line by obtaining target database
The corresponding achievement data of upper data, executes created verification task, to obtain check results.Exist in check results abnormal
When, warning information is generated to warn data base administrator to perform corresponding processing.By having not occurred Database error
When, a variety of check items that may result in Database error corresponding to target database in advance verify, so as to
In time early warning is carried out to database extremely, reduces the risk of Database error generation.
Detailed description of the invention
Fig. 1 is the application scenario diagram of database method of calibration in one embodiment;
Fig. 2 is the flow diagram of database method of calibration in one embodiment;
Fig. 3 is the flow diagram of database method of calibration in another embodiment;
Fig. 4 is the structural block diagram of database calibration equipment in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
Database method of calibration provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal
102 are communicated by network with O&M server 104.O&M server 104 can carry out network with multiple storage servers 106
Communication.Terminal 102 can also be communicated by network with multiple storage servers 106.Wherein, terminal 102 can be, but not limited to
It is various personal computers, laptop, smart phone, tablet computer and portable wearable device, O&M server 104
It can be realized with the server cluster of the either multiple server compositions of independent server with storage server 106.O&M
Server 104 can obtain the verification request of the upload of terminal 102, and in response to verification request verification configuration file, and according to
It verifies configuration file and creates verification task.O&M server 104 can be searched in storage server 106 and number based on verification task
Corresponding target database is identified according to library, and obtains data on line corresponding with target database, and corresponding with data on line
Achievement data.O&M server 104 can execute verification task based on data on line and achievement data, obtain check results.
When check results are deposited when abnormal, O&M server 104 can generate warning information according to check results, and can also be by warning information
It is sent to terminal 102.
In one embodiment, as shown in Fig. 2, providing a kind of database method of calibration, it is applied in Fig. 1 in this way
O&M server 104 for be illustrated, comprising the following steps:
Step 202, verification request is obtained;Verification request carries Database Identification.
Verification request refers to the request for carrying out database verification to the database disposed on O&M server.Verification is asked
The request that can be terminal upload is asked, the request that can also be generated with O&M server.Database Identification refers to for by a number
The mark of other databases is distinguished over according to library.Database Identification can be by the one or more of them structure such as letter, number, punctuation mark
At.For example, Database Identification can be IP (the Internet Protocol of database name, database subordinate server
Address, internet protocol address) address or port numbers.
In one embodiment, for O&M server after receiving verification request for the first time, verification request carries verification
Frequency, then the verification can be requested to store into local data base by O&M server.O&M server can be according to verification frequency, often
Verification request is obtained from local data base every preset duration, and further database verification is executed according to verification request
Step.
Step 204, it requests in response to verification, obtain verification configuration file and is appointed according to verification configuration file creation verification
Business.
Verification configuration file refers to O&M server for the set of the configuration item of the database of being carried out verification.Verification configuration
It may include multiple check items in file, each check item can represent a verification rule.Check item can following table 1 citing, verification
The associated multiple check items of rule can be used as a verification group.It can be according to all or part for including in verification configuration file
Configuration item creates verification task.Such as appoint only on the basis of the corresponding multiple verifications of check item creation in metadata verification group
Business.
Table 1
Wherein, metadata refers to the information for describing data attribute, for supporting as indicated storage location, history number
According to, functions such as resource lookup, file record.High Availabitity switching refers to when detecting that primary server breaks down, and will lead automatically
Server switches to high-availability cluster.High-availability cluster refers to one group of computer node, for mentioning as a whole to user
For one group of Internet resources.
Step 206, target database corresponding with Database Identification is searched based on verification task.
Target database, which refers to, to be deployed in storage server, the database verified.It can launching process tune
Device is spent, distributes corresponding process for verification task, target database corresponding with Database Identification is searched by operation process.
In one embodiment, storage server includes primary server and from server;It searches and counts based on verification task
Corresponding target database is identified according to library, comprising: determines database instance mark corresponding with Database Identification;Acquisition and data
The corresponding object instance table of library instance identification;According to the primary server mark for including in object instance table and from server identification;
Corresponding primary server is determined according to primary server mark respectively, is determined according to from server identification accordingly from server.It is main
Server refers to for storage server affiliated under database normal operating condition.User can lead to after database authorization
The database on terminal access primary server is crossed, and the data in database are increased, deletes, change, inquiring.From service
Device refers to the storage server for being backed up to the data in database on primary server.On identified primary server and
The database disposed from server is target database.
Step 208, data on line corresponding with target database, and achievement data corresponding with data on line are obtained.
Data refer to target database related related data in the process of running on line.Data can be target on line
Storing data in database is also possible to the attribute data of target database itself, can also be access target database
The corresponding user data of user, it is without being limited thereto.Achievement data refers to needed for, progress check item judgement corresponding with data on line
Data.
For example, when data are the storing data in target database on line, achievement data can be and storing data phase
Corresponding metadata.Metadata refers to the information for describing data attribute, for supporting as indicated storage location, history number
According to, functions such as resource lookup, file record.When data are the attribute data of target database itself on line, achievement data can be
For the corresponding pre-set attribute data of attribute institute of the attribute data.Attribute data includes but is not limited to host information, master
From number of servers etc..When data are user's corresponding user data of access target database on line, achievement data can be pre-
First it is directed to the user account and password of the user setting.
Step 210, verification task is executed based on data on line and achievement data, obtains check results.
Check results refer to by executing the obtained result of verification task for target database.Check results can be
Normally, be also possible to there are database exception.Such as when the remarks of database table on line or database column whether there is messy code
When, or when in metadata displaying target database need turn-on data to back up, and the practical not turn-on data library of target database
When backup, it is abnormal can to determine that check results exist.
In one embodiment, verification task is executed based on data on line and achievement data, obtains check results, wrapped
It includes: based on verification task, the target information extracted the information to be verified for including in data on line and include in achievement data;
Whether information more to be verified matches with target information;When information to be verified and target information mismatch, check results are determined
There are exceptions;When information to be verified is matched with target information, determine that check results are normal.
Corresponding verification subtask can be generated for each check item, multiple verification subtasks constitute verification task.To school
Information is tested to refer to for the information verified in data on each check item, line.Target information refers to for each school
The information testing item, being verified for treating verification data in achievement data.Such as check item, whether host information
Consistent in configuration management database, information to be verified refers on line host information corresponding to target database in data,
Target information refers to preset host information in configuration management database.It is by comparing the host information in data on line
It is no whether to be matched with preset host information, which is verified.
When information to be verified and target information mismatch, illustrates that information to be verified is incorrect or imperfect, then determine school
It tests result and there is exception, further warning step can be performed.When information to be verified is matched with target information, illustrate current
Data then determine that check results are normal there is no exception on line.Can also detect target database occur data update or
When being accessed by new user, the step of obtaining verification request is returned, target database is verified again.By to target data
Library provides lasting verification service, can find exception existing for target database in time, ensure the stabilization of target database
Property.
Step 212, when check results are deposited when abnormal, according to check results generation warning information.
Warning information refers to that there may be abnormal information for warning target database to users such as database administrator.
Check results directly can be converted into text information as warning information, text mould corresponding with check results can also be obtained
Plate splices check results and the text template of acquisition, generates warning information.Such as check results include number on line
Host information and preset host information in mismatch, then check results exist abnormal.It can be directly by " data on line
In host information and preset host information mismatch " be used as warning information, text template can also be obtained " in XX
The check item XXX of XX point, target database XXX exist abnormal, please handle in time ", by check results and other relevant informations with
Text template is spliced, and generates more complete warning information, database administrator is more understood quickly
The database is abnormal.
In one embodiment, when check results deposit when abnormal, according to check results generate warning information after, also wrap
It includes: determining the Exception Type of check results;Search whether there is rebuilt component corresponding with Exception Type;When presence and exception class
When the corresponding rebuilt component of type, calls the rebuilt component found according to check results, target database is repaired;When not
When in the presence of rebuilt component corresponding with Exception Type, user account corresponding with Database Identification is determined, and warning information is sent out
It send to user account.
Rebuilt component refers to the component for handling associated databases exception, is the code of the repeatable calling of encapsulation.Than
As said, when the exception for detecting check results is to be not turned on data backup in data on line, then data backup component can be called,
Data backup is carried out to target database.For another example, when detecting that the remarks of database table or database column whether there is on line
When messy code, then data acquisition components can be called, correct remarks be acquired from historical data, and correct remarks are restored to mesh
It marks in database table or the database column in database.When rebuilt component corresponding with Exception Type is not present, illustrate data
Library needs manpower intervention to be repaired extremely.User account corresponding with Database Identification can be the account of database administrator
Number, user account include but is not limited to cell-phone number, mailbox etc. other can be used for communicate account.Warning information is sent to user
Account, so that database administrator can in time be handled database extremely.
In one embodiment, verification request also carries verification grade.Higher grade, and the explanation target database is heavier
It wants.After finding user account corresponding with Database Identification, further includes: determine message informing corresponding with verification grade
Mode;Message informing mode includes at least one of short massage notice, mail notification, system information notice, according to identified
Check results are sent to user account by message informing mode.Such as the first estate is only led to by system information mode
Know, the second grade is notified by system information and mail, and the tertiary gradient passes through three short message, mail, system information modes
It is notified.Can also customized grouping be carried out to sending object, warning information corresponding to the verification grade of inferior grade is only sent
Partial data library manager is given, warning information corresponding to high-grade verification grade can be transmitted to more people.Pass through logarithm
It is verified according to library and carries out grade classification, even more serious database can be pushed to data base administrator much sooner extremely
Etc. being handled.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request
The verification configuration file first constructed, and verification task is created according to verification configuration file.It can be found based on verification task and school
The entrained corresponding target database of Database Identification of request is tested, data and and line on the line by obtaining target database
The corresponding achievement data of upper data, executes created verification task, to obtain check results.Exist in check results abnormal
When, warning information is generated to warn data base administrator to perform corresponding processing.By having not occurred Database error
When, a variety of check items that may result in Database error corresponding to target database in advance verify, so as to
In time early warning is carried out to database extremely, reduces the risk of Database error generation.
In one embodiment, it obtains verification configuration file and verification task is created according to verification configuration file, comprising: obtain
Take verification configuration file and white list corresponding with Database Identification;White list includes filtering element;It is raw according to filtering element
At corresponding checksum filter device;Verification task is created according to verification configuration file and checksum filter device.
White list refers to the list that the check item excluded is constituted.Such as when carrying out school to host information
When testing, there is abnormity early warning, but the host information has no idea to solve in a short time extremely, then data of every progress
Library verification just needs to generate a warning information, wastes the resource of O&M server.Therefore data base administrator is receiving
After the warning information of the check item, which can be added and be updated to white list, carry out database next time
When verification, just verification and early warning are not carried out to the check item.Filtering element refers to each check item for needing to be filtered.Verification
Filter refers to according to filtering element to the component for needing the data for carrying out condition judgement to be screened out.Checksum filter device can high-ranking officers
It tests selected check item in configuration file to be screened out, appoint so that not will create syndrome corresponding with the check item screened out
Business.By creating verification task according to verification configuration file and white list corresponding with Database Identification, verification can be appointed
Business is neatly managed, and is avoided repeating unnecessary verification task, has been saved the checking time of O&M server, thus
Improve the efficiency of database verification.
In one embodiment, it can also be arranged in preset time and the check item is filtered, i.e., within a preset time
Verification early warning is not carried out to the check item, when being more than then to continue the time to carry out verification early warning to the check item.
In one embodiment, corresponding verification log can be formed for the verification of each database, it can also be according to verification
Log generates verification dynamic result interface in real time.It is each according to Information locatings such as example grouping, IP, port, principal and subordinate's servers
Then target database is that dimension identifies check results from each check item or verification group.Early warning keyword and verification can be constructed
As a result mapping relations.Check results can be divided into normal and abnormal, and abnormal can be divided into a variety of grades and include but unlimited
In ignoring the one or more of them such as grade, alert level, menace level.Different check results can correspond to the mark of different colours
Know, by by the mark of different colours show verify dynamic result interface on, can allow database administrator more easily
It finds the target database to go wrong and that the database that can more quickly determine appearance is abnormal and database is abnormal is tight
Weight degree, so that database administrator carries out priority processing to more serious database is influenced extremely.
In one embodiment, before obtaining verification, further includes: obtain the deployment request that terminal uploads;Deployment request
Carry database application work order;It is requested in response to deployment, extracts Database Properties information from database application work order;Base
Database instance, and initial data base corresponding with database instance are created in database application work order;According to database category
Property information disposes initial data base, obtains target database.
Deployment request refers to the request for Request For Disposition database that terminal uploads.Such as deployment request can be
The request that terminal 102 in Fig. 1 uploads.Database application work order refers to the electronic documents for carrying database application relevant information.
Database application relevant information includes but is not limited to database applicant information, applied business information, Database Properties information etc.
One or more of them.Wherein, applicant's information includes but is not limited to that the corresponding user identifier of application developer and application are opened
Corresponding user identifier of hair personnel leading body at a higher level etc..Application message includes but is not limited to applied business mark and applied business grade
Deng.Database Properties information includes but is not limited to database volume, database version, database verification frequency etc..Database is real
Example (instance) refers to a series of process and the memory block distributed for these processes in operating system.Primary data
Database that library refers to initialization, not also being configured and use.Database is to come tissue, storage and management according to data structure
Warehouse of the foundation of data on computer memory device.Multiple initial data bases can be created under each database instance.O&M
Server can create database instance in storage server, i.e., distributing one piece of memory block from storage server, then existing
Initial data base and further database deploying step are created on the memory of distribution.
In one embodiment, WorkForm System can be deployed in terminal, WorkForm System can provide database application interface, number
Apply for that on interface may include input frame according to library, including but not limited to text box, choice box and combobox etc..Application developer can
The Database Properties information in institute's request for data library is inputted into WorkForm System by database application interface.On database application interface
It also may include database application control.When terminal detects the clicking operation for acting on database application control, illustrate to apply
Developer has inputted completion, and terminal can generate database according to the Database Properties information that user inputs by WorkForm System
Apply for work order, and shows application developer to confirm database application work order.When database application work order confirms nothing
Accidentally when, terminal can according to database application work order generate for database deployment request, and will deployment request be sent to fortune
Tie up server.By directly extracting Database Properties information from database application work order, avoid existing during artificially disposing
Omission demand the problem of, improve the accuracy of database deployment, avoid and the feelings constantly modified are configured to database
Condition.And by the deployment of the database of automation, reduce the manual operation workload of data base administrator, so as to contract
Short data library deployment cycle improves the efficiency of database deployment.
In one embodiment, O&M server can be communicated with multiple terminals by network, and O&M server can connect
Receive the deployment request that multiple terminals upload.Therefore, O&M server can store received multiple deployment requests to message queue,
And multiple deployment requests can be handled according to the time sequencing for receiving deployment request.Completing a deployment request institute
Corresponding database deployment task and then next deployment request is obtained from message queue.
In one embodiment, initial data base is disposed according to Database Properties information, obtains target data
After library, further includes: when detecting that target database deployment is completed, creation is corresponding with target database to authorize account;It will
Authorization account is sent to terminal, so that terminal passes through authorization account access target database.By authorizing account to award user
Power will need the data for storing or backing up to store to the target database so that user may have access to and use target database.
In one embodiment, the first total quantity of statistics available total deployment subtask and the successful portion of task execution
Affix one's name to the second total quantity of subtask.When the first total quantity is equal to the second total quantity, illustrate that the target database has disposed completion.
When being more than preset duration, the second total quantity illustrates that there may be deployment subtasks to execute failure still less than the first total quantity
Situation then can be transmitted system and notify to data base administrator to handle, and correct the portion that abnormal conditions complete database in time
Administration.
In one embodiment, authorization account refers to the IP address of terminal.When detecting that target database deployment is completed,
The access authority of settable target database, and grant column list is written into IP address of terminal.When the access for receiving terminal transmission
When request, the IP address and Database Identification that access request carries are extracted, grant column list corresponding with Database Identification is obtained, it will
Extracted IP address is matched with the IP address in grant column list.When successful match, illustrate that the terminal has been authorized to visit
It asks the database, then passes through the access request.
In one embodiment, verification frequency is included in Database Properties information;Method further include: raw according to verification frequency
At deployment subtask;Obtain script file corresponding with deployment subtask;According to verification frequency, script is called every preset duration
File generated verification request.By calling script file to execute deployment subtask, the decoupling of database deployment is realized, total is made
It according to library verification and other database manipulations, such as DB Backup, can independently carry out, improve the effect of database verification
Rate.
In one embodiment, as shown in figure 3, providing a kind of database method of calibration, it is applied in Fig. 1 in this way
O&M server 104 for be illustrated, comprising the following steps:
Step 302, verification request is obtained;Verification request carries Database Identification.
Step 304, it is requested in response to verification, obtains verification configuration file and white list corresponding with Database Identification;
White list includes filtering element.
Step 306, according to the filtering corresponding checksum filter device of Element generation.
Step 308, verification task is created according to verification configuration file and checksum filter device.
Step 310, target database corresponding with Database Identification is searched based on verification task.
Step 312, data on line corresponding with target database, and achievement data corresponding with data on line are obtained.
Step 314, verification task is executed based on data on line and achievement data, obtains check results.
When the step of check results are normal, return to acquisition verification request.When check results deposit when abnormal, execute step
316。
Step 316, when check results are deposited when abnormal, according to check results generation warning information.
Step 318, the Exception Type of check results is determined.
Step 320, search whether there is rebuilt component corresponding with Exception Type.
Step 322, when there is rebuilt component corresponding with Exception Type, call the rebuilt component found according to verification
As a result, being repaired to target database.
Step 324, when rebuilt component corresponding with Exception Type is not present, user corresponding with Database Identification is determined
Account.
Step 326, warning information is sent to user account.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request
The verification configuration file first constructed, by according to verification configuration file and white list corresponding with Database Identification creation verification
Task can neatly manage verification task, avoid repeating unnecessary verification task, saved O&M service
The checking time of device, to improve the efficiency of database verification.It can be found and be verified entrained by request based on verification task
The corresponding target database of Database Identification, data and corresponding with data on line on the line by obtaining target database
Achievement data executes created verification task, to obtain check results.When check results are normal, obtained by returning
The step of verification request, to provide target database lasting verification service, the stability of target database is ensured.?
Check results are deposited when abnormal, and the database that will be automatically repaired by rebuilt component is repaired extremely, it is impossible to
The abnormal warning information that generates enough being automatically repaired reduces data base administration to warn data base administrator to perform corresponding processing
The workload of personnel.By when having not occurred Database error, it is corresponding to target database in advance it is a variety of may
Cause the check item of Database error to be verified, so as to carry out early warning extremely to database in time, reduces database
The risk that mistake occurs.
It should be understood that although each step in the flow chart of Fig. 2 and 3 is successively shown according to the instruction of arrow,
It is these steps is not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 2 and 3 at least
A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps
Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to
Secondary progress, but in turn or can replace at least part of the sub-step or stage of other steps or other steps
Ground executes.
In one embodiment, as shown in figure 4, providing a kind of database calibration equipment 400, comprising: obtain module
402, for obtaining verification request;Verification request carries Database Identification;Creation module 404, for being requested in response to verification,
It obtains verification configuration file and verification task is created according to verification configuration file;Searching module 406, for being looked into based on verification task
Look for target database corresponding with Database Identification;Obtain data on corresponding with target database line, and with data on line
Corresponding achievement data;Correction verification module 408 is verified for executing verification task based on data on line and achievement data
As a result;When check results are deposited when abnormal, according to check results generation warning information.
In one embodiment, creation module 404 be also used to obtain preset verification configuration file and with database mark
Know corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;Matched according to verification
Set file and checksum filter device creation verification task.
In one embodiment, correction verification module 408 is also used to deposit when abnormal when check results, determines the different of check results
Normal type;Search whether there is rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type,
It calls the rebuilt component found according to check results, target database is repaired;When there is no corresponding with Exception Type
Rebuilt component when, determine corresponding with Database Identification user account, and warning information is sent to user account.
In one embodiment, correction verification module 408 is also used to based on verification task, extract include in data on line to school
Test the target information for including in information and achievement data;Whether information more to be verified matches with target information;When to be verified
When information and target information mismatch, it is abnormal to determine that check results exist;When information to be verified is matched with target information, determine
Check results are normal.
In one embodiment, which further includes deployment module, for obtaining the deployment request of terminal upload;Deployment is asked
It asks and carries database application work order;It is requested in response to deployment, extracts Database Properties information from database application work order;
Database instance, and initial data base corresponding with database instance are created based on database application work order;According to database
Attribute information disposes initial data base, obtains target database.
In one embodiment, verification frequency is included in Database Properties information;Module 402 is obtained to be also used to according to verification
Frequency generates deployment subtask;Obtain script file corresponding with deployment subtask;According to verification frequency, every preset duration tune
Verification request is generated with script file.
Specific about database calibration equipment limits the restriction that may refer to above for database method of calibration,
This is repeated no more.Modules in above-mentioned database calibration equipment can come fully or partially through software, hardware and combinations thereof
It realizes.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software
Form is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 5.The server can be the O&M server 104 in Fig. 1.The computer equipment includes passing through system
Processor, memory, network interface and the database of bus connection.Wherein, the processor of the computer equipment is based on providing
Calculation and control ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.The non-volatile memories
Media storage has operating system, computer program and database.The built-in storage is the operation system in non-volatile memory medium
The operation of system and computer program provides environment.The database of the computer equipment is for storing the data such as verification configuration file.
The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program is held by processor
To realize a kind of database method of calibration when row.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
Computer program, the processor perform the steps of acquisition verification request when executing computer program;Verification request carries number
It is identified according to library;It is requested in response to verification, obtain verification configuration file and verification task is created according to verification configuration file;Based on school
It tests task and searches target database corresponding with Database Identification;Obtain data on line corresponding with target database, Yi Jiyu
The corresponding achievement data of data on line;Verification task is executed based on data on line and achievement data, obtains check results;Work as school
It tests result to deposit when abnormal, generates warning information according to check results.
In one embodiment, when processor executes computer program, the volume realized obtains verification configuration file and root
According to verification configuration file creation verification task the step of, comprising the following steps: obtain verification configuration file and with database mark
Know corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;Matched according to verification
Set file and checksum filter device creation verification task.
In one embodiment, it when processor executes computer program, is deposited when abnormal in the check results of working as realized,
It is further comprising the steps of: to determine the Exception Type of check results after the step of generating warning information according to check results;It searches
With the presence or absence of rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type, calling is found
Rebuilt component according to check results, target database is repaired;When there is no rebuilt components corresponding with Exception Type
When, determine user account corresponding with Database Identification, and warning information is sent to user account.
In one embodiment, processor execute computer program when, realized based on data on line and index number
According to the step of executing verification task, obtaining check results, comprising the following steps: be based on verification task, extract and wrapped in data on line
The target information for including in the information to be verified and achievement data contained;Whether information more to be verified matches with target information;
When information to be verified and target information mismatch, it is abnormal to determine that check results exist;When information to be verified and target information
Timing determines that check results are normal.
In one embodiment, when processor executes computer program, before the step of acquisition realized verifies, also
The following steps are included: obtaining the deployment request that terminal uploads;Deployment request carries database application work order;It is asked in response to deployment
It asks, extracts Database Properties information from database application work order;Database instance is created based on database application work order, with
And initial data base corresponding with database instance;Initial data base is disposed according to Database Properties information, obtains mesh
Mark database.
In one embodiment, verification frequency is included in Database Properties information;Processor is gone back when executing computer program
It performs the steps of and deployment subtask is generated according to verification frequency;Obtain script file corresponding with deployment subtask;According to school
Frequency is tested, calls script file to generate verification request every preset duration.
It in one embodiment, can also be for the corresponding verification frequency of each check item setting, to being easy to appear problem
Check item higher verification frequency is set, and relatively slowly or to be not likely to the check item to go wrong setting lower to variation
Execution frequency, such as verification disk active volume.Since correction verification module is to continue working, by the way that different execution is arranged
Frequency can reduce the quantity of synchronization verification subtask, to more targetedly verify to database.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program performs the steps of acquisition verification request when being executed by processor;Verification request carries Database Identification;In response to
Verification request obtains verification configuration file and creates verification task according to verification configuration file;It searches and counts based on verification task
Corresponding target database is identified according to library;Data on line corresponding with target database are obtained, and corresponding with data on line
Achievement data;Verification task is executed based on data on line and achievement data, obtains check results;When check results have exception
When, warning information is generated according to check results.
In one embodiment, when computer program is executed by processor, the volume realized obtains verification configuration file simultaneously
The step of according to verification configuration file creation verification task, comprising the following steps: obtain verification configuration file and and database
Identify corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;According to verification
Configuration file and checksum filter device create verification task.
In one embodiment, it when computer program is executed by processor, is being realized when check results have exception
When, it is further comprising the steps of: to determine the Exception Type of check results after the step of check results generation warning information;
Search whether there is rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type, calling is looked into
The rebuilt component found repairs target database according to check results;When there is no reparations corresponding with Exception Type
When component, user account corresponding with Database Identification is determined, and warning information is sent to user account.
In one embodiment, when computer program is executed by processor, realized based on data on line and index
The step of data execute verification task, obtain check results, comprising the following steps: be based on verification task, extract on line in data
The target information for including in the information to be verified and achievement data for including;Information more to be verified and target information whether
Match;When information to be verified and target information mismatch, it is abnormal to determine that check results exist;When information to be verified and target information
When matching, determine that check results are normal.
In one embodiment, when computer program is executed by processor, before the step of acquisition realized verifies,
It is further comprising the steps of: to obtain the deployment request that terminal uploads;Deployment request carries database application work order;In response to deployment
Request, extracts Database Properties information from database application work order;Database instance is created based on database application work order,
And initial data base corresponding with database instance;Initial data base is disposed according to Database Properties information, is obtained
Target database.
In one embodiment, verification frequency is included in Database Properties information;When computer program is executed by processor
It also performs the steps of and deployment subtask is generated according to verification frequency;Obtain script file corresponding with deployment subtask;According to
Frequency is verified, calls script file to generate verification request every preset duration.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of database method of calibration, which comprises
Obtain verification request;The verification request carries Database Identification;
It is requested in response to the verification, obtain verification configuration file and verification task is created according to the verification configuration file;
Target database corresponding with the Database Identification is searched based on the verification task;
Obtain data on line corresponding with the target database, and achievement data corresponding with data on the line;
The verification task is executed based on data on the line and the achievement data, obtains check results;
When the check results are deposited when abnormal, according to check results generation warning information.
2. the method according to claim 1, wherein the acquisition verifies configuration file and is matched according to the verification
Set document creation verification task, comprising:
Obtain verification configuration file and white list corresponding with the Database Identification;The white list includes filtering element;
According to the corresponding checksum filter device of filtering Element generation;
Verification task is created according to the verification configuration file and the checksum filter device.
3. the method according to claim 1, wherein it is described when the check results deposit when abnormal, according to
The check results generate after warning information, further includes:
Determine the Exception Type of the check results;
Search whether there is rebuilt component corresponding with the Exception Type;
When there is rebuilt component corresponding with the Exception Type, the rebuilt component found is called to be tied according to the verification
Fruit repairs the target database;
When rebuilt component corresponding with the Exception Type is not present, user's account corresponding with the Database Identification is determined
Number, and the warning information is sent to the user account.
4. the method according to claim 1, wherein described based on data and the achievement data on the line
The verification task is executed, check results are obtained, comprising:
Based on the verification task, extracts the information to be verified for including in data on the line and wrapped in the achievement data
The target information contained;
Compare whether the information to be verified matches with the target information;
When the information to be verified and the target information mismatch, it is abnormal to determine that check results exist;
When the information to be verified is matched with the target information, determine that check results are normal.
5. method as claimed in any of claims 1 to 4, which is characterized in that before acquisition verification, also wrap
It includes:
Obtain the deployment request that terminal uploads;The deployment request carries database application work order;
It is requested in response to the deployment, extracts Database Properties information from the database application work order;
Application work order in library creates database instance, and primary data corresponding with the database instance based on the data
Library;
The initial data base is disposed according to the Database Properties information, obtains target database.
6. according to the method described in claim 5, it is characterized in that, including verification frequency in the Database Properties information;Institute
State method further include:
Deployment subtask is generated according to the verification frequency;
Obtain script file corresponding with the deployment subtask;
According to the verification frequency, the script file is called to generate verification request every preset duration.
7. a kind of database calibration equipment, which is characterized in that described device includes:
Module is obtained, for obtaining verification request;The verification request carries Database Identification;
Creation module, for requesting in response to the verification, obtaining verification configuration file and being created according to the verification configuration file
It is for school building to test task;
Searching module, for searching target database corresponding with the Database Identification based on the verification task;Obtain with
Data on the corresponding line of the target database, and achievement data corresponding with data on the line;
Correction verification module obtains verification knot for executing the verification task based on data on the line and the achievement data
Fruit;When the check results are deposited when abnormal, according to check results generation warning information.
8. device according to claim 7, which is characterized in that the creation module is also used to obtain preset verification configuration
File and white list corresponding with the Database Identification;The white list includes filtering element;According to the filtering element
Generate corresponding checksum filter device;Verification task is created according to the verification configuration file and the checksum filter device.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810551893.7A CN109032824B (en) | 2018-05-31 | 2018-05-31 | Database verification method, database verification device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810551893.7A CN109032824B (en) | 2018-05-31 | 2018-05-31 | Database verification method, database verification device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109032824A true CN109032824A (en) | 2018-12-18 |
CN109032824B CN109032824B (en) | 2023-05-16 |
Family
ID=64612041
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810551893.7A Active CN109032824B (en) | 2018-05-31 | 2018-05-31 | Database verification method, database verification device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109032824B (en) |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871294A (en) * | 2019-01-31 | 2019-06-11 | 北京百度网讯科技有限公司 | Method and apparatus for verifying data, processing request |
CN109919914A (en) * | 2019-02-15 | 2019-06-21 | 广州视源电子科技股份有限公司 | Method of calibration, device, computer equipment and the storage medium of configuration file |
CN110008204A (en) * | 2019-03-12 | 2019-07-12 | 平安信托有限责任公司 | Detection method, device, computer equipment and the storage medium of the quality of data |
CN110134929A (en) * | 2019-04-17 | 2019-08-16 | 深圳壹账通智能科技有限公司 | Document verification method, apparatus, computer equipment and storage medium |
CN110472114A (en) * | 2019-07-03 | 2019-11-19 | 平安科技(深圳)有限公司 | Abnormal data method for early warning, device, computer equipment and storage medium |
CN110489391A (en) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | A kind of data processing method and relevant device |
CN110502531A (en) * | 2019-07-05 | 2019-11-26 | 招联消费金融有限公司 | Report data method of calibration, device, computer equipment and storage medium |
CN110532023A (en) * | 2019-08-21 | 2019-12-03 | 北京达佳互联信息技术有限公司 | Information processing method and device for Data Detection |
CN110716939A (en) * | 2019-10-16 | 2020-01-21 | 深圳市网心科技有限公司 | Data management method, electronic device, system and medium |
CN110764942A (en) * | 2019-09-17 | 2020-02-07 | 平安银行股份有限公司 | Multi-type data checking method, device, computer system and readable storage medium |
CN110874311A (en) * | 2019-10-11 | 2020-03-10 | 网联清算有限公司 | Database detection method and device, computer equipment and storage medium |
CN110888776A (en) * | 2019-11-13 | 2020-03-17 | 网联清算有限公司 | Database health state detection method, device and equipment |
CN111241082A (en) * | 2020-01-13 | 2020-06-05 | 贝壳技术有限公司 | Data correction method and device |
CN111382976A (en) * | 2020-03-18 | 2020-07-07 | 江苏苏宁物流有限公司 | Early warning data processing method and device, computer equipment and storage medium |
CN111666340A (en) * | 2020-05-27 | 2020-09-15 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN112152841A (en) * | 2020-09-03 | 2020-12-29 | 锐捷网络股份有限公司 | Verification method, verification device, switch, equipment and storage medium |
CN112257402A (en) * | 2020-12-22 | 2021-01-22 | 畅捷通信息技术股份有限公司 | Method, device and storage medium for verifying data of electronic data sheet |
CN112328619A (en) * | 2020-09-24 | 2021-02-05 | 杭州小电科技股份有限公司 | Data quality monitoring method, device, system, electronic device and storage medium |
CN112464103A (en) * | 2019-09-06 | 2021-03-09 | 北京达佳互联信息技术有限公司 | Service processing method, device, server and storage medium |
CN113515489A (en) * | 2021-03-12 | 2021-10-19 | 中电建电力检修工程有限公司 | Method and system for checking direction observation result |
CN113704243A (en) * | 2020-05-20 | 2021-11-26 | 富泰华工业(深圳)有限公司 | Data analysis method, data analysis device, computer device, and storage medium |
CN115905172A (en) * | 2022-11-28 | 2023-04-04 | 维克多精密工业(深圳)有限公司 | Method for constructing database of complete set of dies |
CN116109382A (en) * | 2023-01-13 | 2023-05-12 | 上海峰沄网络科技有限公司 | Data verification method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699759A (en) * | 2015-02-10 | 2015-06-10 | 上海新炬网络信息技术有限公司 | Method for maintaining automatic operation of database |
CN107517131A (en) * | 2017-08-31 | 2017-12-26 | 四川长虹电器股份有限公司 | A kind of analysis and early warning method based on log collection |
-
2018
- 2018-05-31 CN CN201810551893.7A patent/CN109032824B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104699759A (en) * | 2015-02-10 | 2015-06-10 | 上海新炬网络信息技术有限公司 | Method for maintaining automatic operation of database |
CN107517131A (en) * | 2017-08-31 | 2017-12-26 | 四川长虹电器股份有限公司 | A kind of analysis and early warning method based on log collection |
Cited By (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109871294A (en) * | 2019-01-31 | 2019-06-11 | 北京百度网讯科技有限公司 | Method and apparatus for verifying data, processing request |
CN109871294B (en) * | 2019-01-31 | 2023-08-01 | 北京百度网讯科技有限公司 | Method and device for checking data and processing request |
CN109919914A (en) * | 2019-02-15 | 2019-06-21 | 广州视源电子科技股份有限公司 | Method of calibration, device, computer equipment and the storage medium of configuration file |
CN109919914B (en) * | 2019-02-15 | 2021-04-13 | 广州视源电子科技股份有限公司 | Configuration file checking method and device, computer equipment and storage medium |
CN110008204A (en) * | 2019-03-12 | 2019-07-12 | 平安信托有限责任公司 | Detection method, device, computer equipment and the storage medium of the quality of data |
CN110134929A (en) * | 2019-04-17 | 2019-08-16 | 深圳壹账通智能科技有限公司 | Document verification method, apparatus, computer equipment and storage medium |
CN110472114A (en) * | 2019-07-03 | 2019-11-19 | 平安科技(深圳)有限公司 | Abnormal data method for early warning, device, computer equipment and storage medium |
CN110472114B (en) * | 2019-07-03 | 2024-01-26 | 平安科技(深圳)有限公司 | Abnormal data early warning method and device, computer equipment and storage medium |
CN110502531A (en) * | 2019-07-05 | 2019-11-26 | 招联消费金融有限公司 | Report data method of calibration, device, computer equipment and storage medium |
CN110489391A (en) * | 2019-07-25 | 2019-11-22 | 深圳壹账通智能科技有限公司 | A kind of data processing method and relevant device |
CN110489391B (en) * | 2019-07-25 | 2022-06-28 | 深圳壹账通智能科技有限公司 | Data processing method and related equipment |
CN110532023A (en) * | 2019-08-21 | 2019-12-03 | 北京达佳互联信息技术有限公司 | Information processing method and device for Data Detection |
CN112464103A (en) * | 2019-09-06 | 2021-03-09 | 北京达佳互联信息技术有限公司 | Service processing method, device, server and storage medium |
CN110764942B (en) * | 2019-09-17 | 2023-08-18 | 平安银行股份有限公司 | Multi-kind data verification method, device, computer system and readable storage medium |
CN110764942A (en) * | 2019-09-17 | 2020-02-07 | 平安银行股份有限公司 | Multi-type data checking method, device, computer system and readable storage medium |
CN110874311A (en) * | 2019-10-11 | 2020-03-10 | 网联清算有限公司 | Database detection method and device, computer equipment and storage medium |
CN110716939A (en) * | 2019-10-16 | 2020-01-21 | 深圳市网心科技有限公司 | Data management method, electronic device, system and medium |
CN110888776A (en) * | 2019-11-13 | 2020-03-17 | 网联清算有限公司 | Database health state detection method, device and equipment |
CN111241082A (en) * | 2020-01-13 | 2020-06-05 | 贝壳技术有限公司 | Data correction method and device |
CN111382976A (en) * | 2020-03-18 | 2020-07-07 | 江苏苏宁物流有限公司 | Early warning data processing method and device, computer equipment and storage medium |
CN111382976B (en) * | 2020-03-18 | 2022-08-19 | 江苏苏宁物流有限公司 | Early warning data processing method and device, computer equipment and storage medium |
CN113704243A (en) * | 2020-05-20 | 2021-11-26 | 富泰华工业(深圳)有限公司 | Data analysis method, data analysis device, computer device, and storage medium |
CN111666340B (en) * | 2020-05-27 | 2023-10-27 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN111666340A (en) * | 2020-05-27 | 2020-09-15 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN112152841A (en) * | 2020-09-03 | 2020-12-29 | 锐捷网络股份有限公司 | Verification method, verification device, switch, equipment and storage medium |
CN112152841B (en) * | 2020-09-03 | 2023-06-20 | 锐捷网络股份有限公司 | Verification method, verification device, switch, equipment and storage medium |
CN112328619A (en) * | 2020-09-24 | 2021-02-05 | 杭州小电科技股份有限公司 | Data quality monitoring method, device, system, electronic device and storage medium |
CN112257402A (en) * | 2020-12-22 | 2021-01-22 | 畅捷通信息技术股份有限公司 | Method, device and storage medium for verifying data of electronic data sheet |
CN113515489A (en) * | 2021-03-12 | 2021-10-19 | 中电建电力检修工程有限公司 | Method and system for checking direction observation result |
CN115905172B (en) * | 2022-11-28 | 2023-08-04 | 维克多精密工业(深圳)有限公司 | Method for constructing complete die database |
CN115905172A (en) * | 2022-11-28 | 2023-04-04 | 维克多精密工业(深圳)有限公司 | Method for constructing database of complete set of dies |
CN116109382A (en) * | 2023-01-13 | 2023-05-12 | 上海峰沄网络科技有限公司 | Data verification method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109032824B (en) | 2023-05-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109032824A (en) | Database method of calibration, device, computer equipment and storage medium | |
CN108153670B (en) | Interface testing method and device and electronic equipment | |
CN108804618B (en) | Database configuration method, device, computer equipment and storage medium | |
CN108959385B (en) | Database deployment method, device, computer equipment and storage medium | |
CA3141329A1 (en) | Request link tracking method and service request processing method | |
US11093617B2 (en) | Automated vulnerability grouping | |
CN110555041A (en) | Data processing method, data processing device, computer equipment and storage medium | |
US10338910B2 (en) | Multi-tenant upgrading | |
CN112631686A (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN112288400A (en) | Multi-system data interaction method and device, computer equipment and storage medium | |
CN113778442A (en) | System menu generating method, device, equipment and storage medium | |
US9513997B2 (en) | Test data management | |
CN109542764B (en) | Webpage automatic testing method and device, computer equipment and storage medium | |
US9323634B2 (en) | Generating a configuration file based upon an application registry | |
CN114238085A (en) | Interface testing method and device, computer equipment and storage medium | |
CN114528201A (en) | Abnormal code positioning method, device, equipment and medium | |
US9665732B2 (en) | Secure Download from internet marketplace | |
CN112559352A (en) | Interface test method, device, equipment and storage medium | |
US20230092076A1 (en) | Data recovery validation test | |
US10951600B2 (en) | Domain authentication | |
CN115658794A (en) | Data query method and device, computer equipment and storage medium | |
CN115757172A (en) | Test execution method and device, storage medium and computer equipment | |
JP6382705B2 (en) | Virtual device test apparatus, virtual device test method, and virtual device test program | |
CN110297625B (en) | Application processing method and device | |
CN112862452A (en) | Method and device for executing work order equivalence, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |