CN109032824A - Database method of calibration, device, computer equipment and storage medium - Google Patents

Database method of calibration, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109032824A
CN109032824A CN201810551893.7A CN201810551893A CN109032824A CN 109032824 A CN109032824 A CN 109032824A CN 201810551893 A CN201810551893 A CN 201810551893A CN 109032824 A CN109032824 A CN 109032824A
Authority
CN
China
Prior art keywords
verification
database
data
information
check results
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810551893.7A
Other languages
Chinese (zh)
Other versions
CN109032824B (en
Inventor
茹作军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kang Keyi Information Technology (shenzhen) Co Ltd
Original Assignee
Kang Keyi Information Technology (shenzhen) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kang Keyi Information Technology (shenzhen) Co Ltd filed Critical Kang Keyi Information Technology (shenzhen) Co Ltd
Priority to CN201810551893.7A priority Critical patent/CN109032824B/en
Publication of CN109032824A publication Critical patent/CN109032824A/en
Application granted granted Critical
Publication of CN109032824B publication Critical patent/CN109032824B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

This application involves a kind of database method of calibration, device, computer equipment and storage mediums.The described method includes: obtaining verification request;Verification request carries Database Identification;It is requested in response to verification, obtain verification configuration file and verification task is created according to verification configuration file;Target database corresponding with Database Identification is searched based on verification task;Obtain data on line corresponding with target database, and achievement data corresponding with data on line;Verification task is executed based on data on line and achievement data, obtains check results;When check results are deposited when abnormal, according to check results generation warning information.Early warning can be carried out extremely to database using this method.

Description

Database method of calibration, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of database method of calibration, device, computer equipment And storage medium.
Background technique
With the rapid development of office automation and e-commerce, enterprise increasingly payes attention to database.For storage weight Want the database of data, it usually needs monitored in real time to the operating condition of database.Such as it is corresponding to database System log carries out alarm keyword screening, so as to monitor Database error in time, to remind data base administrator The Database error occurred is handled.Traditional approach is monitored to the mistake having occurred and that, and can not be to can The database of Database error can be caused to carry out early warning extremely, data base administrator needs to expend more time to having already appeared Database error verified and repaired.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of data that can carry out extremely early warning to database Library method of calibration, device, computer equipment and storage medium.
A kind of database method of calibration, which comprises obtain verification request;The verification request carries database Mark;It is requested in response to the verification, obtain verification configuration file and verification task is created according to the verification configuration file;Base Target database corresponding with the Database Identification is searched in the verification task;It obtains corresponding with the target database Data on line, and achievement data corresponding with data on the line;It is held based on data on the line and the achievement data The row verification task, obtains check results;When the check results are deposited when abnormal, according to check results generation early warning Information.
The acquisition verifies configuration file and is created according to the verification configuration file and verified in one of the embodiments, Task, comprising: obtain verification configuration file and white list corresponding with the Database Identification;The white list includes filtering Element;According to the corresponding checksum filter device of filtering Element generation;According to the verification configuration file and the checksum filter Device creates verification task.
In one of the embodiments, described when the check results are deposited when abnormal, according to check results life After warning information, further includes: determine the Exception Type of the check results;Search whether exist and the Exception Type pair The rebuilt component answered;When there is rebuilt component corresponding with the Exception Type, call the rebuilt component found according to institute Check results are stated, the target database is repaired;When rebuilt component corresponding with the Exception Type is not present, really Fixed user account corresponding with the Database Identification, and the warning information is sent to the user account.
It is described in one of the embodiments, to execute the verification times based on data on the line and the achievement data Business, obtains check results, comprising: and it is based on the verification task, extracts the information to be verified for including in data on the line, and The target information for including in the achievement data;Compare whether the information to be verified matches with the target information;When described When information to be verified and the target information mismatch, it is abnormal to determine that check results exist;When the information to be verified with it is described When target information matches, determine that check results are normal.
In one of the embodiments, before acquisition verification, further includes: obtain the deployment request that terminal uploads; The deployment request carries database application work order;It requests in response to the deployment, is mentioned from the database application work order Take out Database Properties information;Based on the data library application work order create database instance, and with the database instance Corresponding initial data base;The initial data base is disposed according to the Database Properties information, obtains target data Library.
Include verification frequency in the Database Properties information in one of the embodiments,;The method also includes: root Deployment subtask is generated according to the verification frequency;Obtain script file corresponding with the deployment subtask;According to the verification Frequency calls the script file to generate verification request every preset duration.
A kind of database calibration equipment, described device include: acquisition module, for obtaining verification request;The verification is asked It asks and carries Database Identification;Creation module obtains verification configuration file and according to described for requesting in response to the verification It verifies configuration file and creates verification task;Searching module, for being searched and the Database Identification pair based on the verification task The target database answered;Obtain data on line corresponding with the target database, and finger corresponding with data on the line Mark data;Correction verification module is verified for executing the verification task based on data on the line and the achievement data As a result;When the check results are deposited when abnormal, according to check results generation warning information.
In one of the embodiments, the creation module be also used to obtain preset verification configuration file and with it is described The corresponding white list of Database Identification;The white list includes filtering element;It is verified accordingly according to the filtering Element generation Filter;Verification task is created according to the verification configuration file and the checksum filter device.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes above-mentioned each database method of calibration as described in the examples when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of above-mentioned each database method of calibration as described in the examples is realized when row.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request The verification configuration file first constructed, and verification task is created according to verification configuration file.It can be found based on verification task and school The entrained corresponding target database of Database Identification of request is tested, data and and line on the line by obtaining target database The corresponding achievement data of upper data, executes created verification task, to obtain check results.Exist in check results abnormal When, warning information is generated to warn data base administrator to perform corresponding processing.By having not occurred Database error When, a variety of check items that may result in Database error corresponding to target database in advance verify, so as to In time early warning is carried out to database extremely, reduces the risk of Database error generation.
Detailed description of the invention
Fig. 1 is the application scenario diagram of database method of calibration in one embodiment;
Fig. 2 is the flow diagram of database method of calibration in one embodiment;
Fig. 3 is the flow diagram of database method of calibration in another embodiment;
Fig. 4 is the structural block diagram of database calibration equipment in one embodiment;
Fig. 5 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Database method of calibration provided by the present application, can be applied in application environment as shown in Figure 1.Wherein, terminal 102 are communicated by network with O&M server 104.O&M server 104 can carry out network with multiple storage servers 106 Communication.Terminal 102 can also be communicated by network with multiple storage servers 106.Wherein, terminal 102 can be, but not limited to It is various personal computers, laptop, smart phone, tablet computer and portable wearable device, O&M server 104 It can be realized with the server cluster of the either multiple server compositions of independent server with storage server 106.O&M Server 104 can obtain the verification request of the upload of terminal 102, and in response to verification request verification configuration file, and according to It verifies configuration file and creates verification task.O&M server 104 can be searched in storage server 106 and number based on verification task Corresponding target database is identified according to library, and obtains data on line corresponding with target database, and corresponding with data on line Achievement data.O&M server 104 can execute verification task based on data on line and achievement data, obtain check results. When check results are deposited when abnormal, O&M server 104 can generate warning information according to check results, and can also be by warning information It is sent to terminal 102.
In one embodiment, as shown in Fig. 2, providing a kind of database method of calibration, it is applied in Fig. 1 in this way O&M server 104 for be illustrated, comprising the following steps:
Step 202, verification request is obtained;Verification request carries Database Identification.
Verification request refers to the request for carrying out database verification to the database disposed on O&M server.Verification is asked The request that can be terminal upload is asked, the request that can also be generated with O&M server.Database Identification refers to for by a number The mark of other databases is distinguished over according to library.Database Identification can be by the one or more of them structure such as letter, number, punctuation mark At.For example, Database Identification can be IP (the Internet Protocol of database name, database subordinate server Address, internet protocol address) address or port numbers.
In one embodiment, for O&M server after receiving verification request for the first time, verification request carries verification Frequency, then the verification can be requested to store into local data base by O&M server.O&M server can be according to verification frequency, often Verification request is obtained from local data base every preset duration, and further database verification is executed according to verification request Step.
Step 204, it requests in response to verification, obtain verification configuration file and is appointed according to verification configuration file creation verification Business.
Verification configuration file refers to O&M server for the set of the configuration item of the database of being carried out verification.Verification configuration It may include multiple check items in file, each check item can represent a verification rule.Check item can following table 1 citing, verification The associated multiple check items of rule can be used as a verification group.It can be according to all or part for including in verification configuration file Configuration item creates verification task.Such as appoint only on the basis of the corresponding multiple verifications of check item creation in metadata verification group Business.
Table 1
Wherein, metadata refers to the information for describing data attribute, for supporting as indicated storage location, history number According to, functions such as resource lookup, file record.High Availabitity switching refers to when detecting that primary server breaks down, and will lead automatically Server switches to high-availability cluster.High-availability cluster refers to one group of computer node, for mentioning as a whole to user For one group of Internet resources.
Step 206, target database corresponding with Database Identification is searched based on verification task.
Target database, which refers to, to be deployed in storage server, the database verified.It can launching process tune Device is spent, distributes corresponding process for verification task, target database corresponding with Database Identification is searched by operation process.
In one embodiment, storage server includes primary server and from server;It searches and counts based on verification task Corresponding target database is identified according to library, comprising: determines database instance mark corresponding with Database Identification;Acquisition and data The corresponding object instance table of library instance identification;According to the primary server mark for including in object instance table and from server identification; Corresponding primary server is determined according to primary server mark respectively, is determined according to from server identification accordingly from server.It is main Server refers to for storage server affiliated under database normal operating condition.User can lead to after database authorization The database on terminal access primary server is crossed, and the data in database are increased, deletes, change, inquiring.From service Device refers to the storage server for being backed up to the data in database on primary server.On identified primary server and The database disposed from server is target database.
Step 208, data on line corresponding with target database, and achievement data corresponding with data on line are obtained.
Data refer to target database related related data in the process of running on line.Data can be target on line Storing data in database is also possible to the attribute data of target database itself, can also be access target database The corresponding user data of user, it is without being limited thereto.Achievement data refers to needed for, progress check item judgement corresponding with data on line Data.
For example, when data are the storing data in target database on line, achievement data can be and storing data phase Corresponding metadata.Metadata refers to the information for describing data attribute, for supporting as indicated storage location, history number According to, functions such as resource lookup, file record.When data are the attribute data of target database itself on line, achievement data can be For the corresponding pre-set attribute data of attribute institute of the attribute data.Attribute data includes but is not limited to host information, master From number of servers etc..When data are user's corresponding user data of access target database on line, achievement data can be pre- First it is directed to the user account and password of the user setting.
Step 210, verification task is executed based on data on line and achievement data, obtains check results.
Check results refer to by executing the obtained result of verification task for target database.Check results can be Normally, be also possible to there are database exception.Such as when the remarks of database table on line or database column whether there is messy code When, or when in metadata displaying target database need turn-on data to back up, and the practical not turn-on data library of target database When backup, it is abnormal can to determine that check results exist.
In one embodiment, verification task is executed based on data on line and achievement data, obtains check results, wrapped It includes: based on verification task, the target information extracted the information to be verified for including in data on line and include in achievement data; Whether information more to be verified matches with target information;When information to be verified and target information mismatch, check results are determined There are exceptions;When information to be verified is matched with target information, determine that check results are normal.
Corresponding verification subtask can be generated for each check item, multiple verification subtasks constitute verification task.To school Information is tested to refer to for the information verified in data on each check item, line.Target information refers to for each school The information testing item, being verified for treating verification data in achievement data.Such as check item, whether host information Consistent in configuration management database, information to be verified refers on line host information corresponding to target database in data, Target information refers to preset host information in configuration management database.It is by comparing the host information in data on line It is no whether to be matched with preset host information, which is verified.
When information to be verified and target information mismatch, illustrates that information to be verified is incorrect or imperfect, then determine school It tests result and there is exception, further warning step can be performed.When information to be verified is matched with target information, illustrate current Data then determine that check results are normal there is no exception on line.Can also detect target database occur data update or When being accessed by new user, the step of obtaining verification request is returned, target database is verified again.By to target data Library provides lasting verification service, can find exception existing for target database in time, ensure the stabilization of target database Property.
Step 212, when check results are deposited when abnormal, according to check results generation warning information.
Warning information refers to that there may be abnormal information for warning target database to users such as database administrator. Check results directly can be converted into text information as warning information, text mould corresponding with check results can also be obtained Plate splices check results and the text template of acquisition, generates warning information.Such as check results include number on line Host information and preset host information in mismatch, then check results exist abnormal.It can be directly by " data on line In host information and preset host information mismatch " be used as warning information, text template can also be obtained " in XX The check item XXX of XX point, target database XXX exist abnormal, please handle in time ", by check results and other relevant informations with Text template is spliced, and generates more complete warning information, database administrator is more understood quickly The database is abnormal.
In one embodiment, when check results deposit when abnormal, according to check results generate warning information after, also wrap It includes: determining the Exception Type of check results;Search whether there is rebuilt component corresponding with Exception Type;When presence and exception class When the corresponding rebuilt component of type, calls the rebuilt component found according to check results, target database is repaired;When not When in the presence of rebuilt component corresponding with Exception Type, user account corresponding with Database Identification is determined, and warning information is sent out It send to user account.
Rebuilt component refers to the component for handling associated databases exception, is the code of the repeatable calling of encapsulation.Than As said, when the exception for detecting check results is to be not turned on data backup in data on line, then data backup component can be called, Data backup is carried out to target database.For another example, when detecting that the remarks of database table or database column whether there is on line When messy code, then data acquisition components can be called, correct remarks be acquired from historical data, and correct remarks are restored to mesh It marks in database table or the database column in database.When rebuilt component corresponding with Exception Type is not present, illustrate data Library needs manpower intervention to be repaired extremely.User account corresponding with Database Identification can be the account of database administrator Number, user account include but is not limited to cell-phone number, mailbox etc. other can be used for communicate account.Warning information is sent to user Account, so that database administrator can in time be handled database extremely.
In one embodiment, verification request also carries verification grade.Higher grade, and the explanation target database is heavier It wants.After finding user account corresponding with Database Identification, further includes: determine message informing corresponding with verification grade Mode;Message informing mode includes at least one of short massage notice, mail notification, system information notice, according to identified Check results are sent to user account by message informing mode.Such as the first estate is only led to by system information mode Know, the second grade is notified by system information and mail, and the tertiary gradient passes through three short message, mail, system information modes It is notified.Can also customized grouping be carried out to sending object, warning information corresponding to the verification grade of inferior grade is only sent Partial data library manager is given, warning information corresponding to high-grade verification grade can be transmitted to more people.Pass through logarithm It is verified according to library and carries out grade classification, even more serious database can be pushed to data base administrator much sooner extremely Etc. being handled.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request The verification configuration file first constructed, and verification task is created according to verification configuration file.It can be found based on verification task and school The entrained corresponding target database of Database Identification of request is tested, data and and line on the line by obtaining target database The corresponding achievement data of upper data, executes created verification task, to obtain check results.Exist in check results abnormal When, warning information is generated to warn data base administrator to perform corresponding processing.By having not occurred Database error When, a variety of check items that may result in Database error corresponding to target database in advance verify, so as to In time early warning is carried out to database extremely, reduces the risk of Database error generation.
In one embodiment, it obtains verification configuration file and verification task is created according to verification configuration file, comprising: obtain Take verification configuration file and white list corresponding with Database Identification;White list includes filtering element;It is raw according to filtering element At corresponding checksum filter device;Verification task is created according to verification configuration file and checksum filter device.
White list refers to the list that the check item excluded is constituted.Such as when carrying out school to host information When testing, there is abnormity early warning, but the host information has no idea to solve in a short time extremely, then data of every progress Library verification just needs to generate a warning information, wastes the resource of O&M server.Therefore data base administrator is receiving After the warning information of the check item, which can be added and be updated to white list, carry out database next time When verification, just verification and early warning are not carried out to the check item.Filtering element refers to each check item for needing to be filtered.Verification Filter refers to according to filtering element to the component for needing the data for carrying out condition judgement to be screened out.Checksum filter device can high-ranking officers It tests selected check item in configuration file to be screened out, appoint so that not will create syndrome corresponding with the check item screened out Business.By creating verification task according to verification configuration file and white list corresponding with Database Identification, verification can be appointed Business is neatly managed, and is avoided repeating unnecessary verification task, has been saved the checking time of O&M server, thus Improve the efficiency of database verification.
In one embodiment, it can also be arranged in preset time and the check item is filtered, i.e., within a preset time Verification early warning is not carried out to the check item, when being more than then to continue the time to carry out verification early warning to the check item.
In one embodiment, corresponding verification log can be formed for the verification of each database, it can also be according to verification Log generates verification dynamic result interface in real time.It is each according to Information locatings such as example grouping, IP, port, principal and subordinate's servers Then target database is that dimension identifies check results from each check item or verification group.Early warning keyword and verification can be constructed As a result mapping relations.Check results can be divided into normal and abnormal, and abnormal can be divided into a variety of grades and include but unlimited In ignoring the one or more of them such as grade, alert level, menace level.Different check results can correspond to the mark of different colours Know, by by the mark of different colours show verify dynamic result interface on, can allow database administrator more easily It finds the target database to go wrong and that the database that can more quickly determine appearance is abnormal and database is abnormal is tight Weight degree, so that database administrator carries out priority processing to more serious database is influenced extremely.
In one embodiment, before obtaining verification, further includes: obtain the deployment request that terminal uploads;Deployment request Carry database application work order;It is requested in response to deployment, extracts Database Properties information from database application work order;Base Database instance, and initial data base corresponding with database instance are created in database application work order;According to database category Property information disposes initial data base, obtains target database.
Deployment request refers to the request for Request For Disposition database that terminal uploads.Such as deployment request can be The request that terminal 102 in Fig. 1 uploads.Database application work order refers to the electronic documents for carrying database application relevant information. Database application relevant information includes but is not limited to database applicant information, applied business information, Database Properties information etc. One or more of them.Wherein, applicant's information includes but is not limited to that the corresponding user identifier of application developer and application are opened Corresponding user identifier of hair personnel leading body at a higher level etc..Application message includes but is not limited to applied business mark and applied business grade Deng.Database Properties information includes but is not limited to database volume, database version, database verification frequency etc..Database is real Example (instance) refers to a series of process and the memory block distributed for these processes in operating system.Primary data Database that library refers to initialization, not also being configured and use.Database is to come tissue, storage and management according to data structure Warehouse of the foundation of data on computer memory device.Multiple initial data bases can be created under each database instance.O&M Server can create database instance in storage server, i.e., distributing one piece of memory block from storage server, then existing Initial data base and further database deploying step are created on the memory of distribution.
In one embodiment, WorkForm System can be deployed in terminal, WorkForm System can provide database application interface, number Apply for that on interface may include input frame according to library, including but not limited to text box, choice box and combobox etc..Application developer can The Database Properties information in institute's request for data library is inputted into WorkForm System by database application interface.On database application interface It also may include database application control.When terminal detects the clicking operation for acting on database application control, illustrate to apply Developer has inputted completion, and terminal can generate database according to the Database Properties information that user inputs by WorkForm System Apply for work order, and shows application developer to confirm database application work order.When database application work order confirms nothing Accidentally when, terminal can according to database application work order generate for database deployment request, and will deployment request be sent to fortune Tie up server.By directly extracting Database Properties information from database application work order, avoid existing during artificially disposing Omission demand the problem of, improve the accuracy of database deployment, avoid and the feelings constantly modified are configured to database Condition.And by the deployment of the database of automation, reduce the manual operation workload of data base administrator, so as to contract Short data library deployment cycle improves the efficiency of database deployment.
In one embodiment, O&M server can be communicated with multiple terminals by network, and O&M server can connect Receive the deployment request that multiple terminals upload.Therefore, O&M server can store received multiple deployment requests to message queue, And multiple deployment requests can be handled according to the time sequencing for receiving deployment request.Completing a deployment request institute Corresponding database deployment task and then next deployment request is obtained from message queue.
In one embodiment, initial data base is disposed according to Database Properties information, obtains target data After library, further includes: when detecting that target database deployment is completed, creation is corresponding with target database to authorize account;It will Authorization account is sent to terminal, so that terminal passes through authorization account access target database.By authorizing account to award user Power will need the data for storing or backing up to store to the target database so that user may have access to and use target database.
In one embodiment, the first total quantity of statistics available total deployment subtask and the successful portion of task execution Affix one's name to the second total quantity of subtask.When the first total quantity is equal to the second total quantity, illustrate that the target database has disposed completion. When being more than preset duration, the second total quantity illustrates that there may be deployment subtasks to execute failure still less than the first total quantity Situation then can be transmitted system and notify to data base administrator to handle, and correct the portion that abnormal conditions complete database in time Administration.
In one embodiment, authorization account refers to the IP address of terminal.When detecting that target database deployment is completed, The access authority of settable target database, and grant column list is written into IP address of terminal.When the access for receiving terminal transmission When request, the IP address and Database Identification that access request carries are extracted, grant column list corresponding with Database Identification is obtained, it will Extracted IP address is matched with the IP address in grant column list.When successful match, illustrate that the terminal has been authorized to visit It asks the database, then passes through the access request.
In one embodiment, verification frequency is included in Database Properties information;Method further include: raw according to verification frequency At deployment subtask;Obtain script file corresponding with deployment subtask;According to verification frequency, script is called every preset duration File generated verification request.By calling script file to execute deployment subtask, the decoupling of database deployment is realized, total is made It according to library verification and other database manipulations, such as DB Backup, can independently carry out, improve the effect of database verification Rate.
In one embodiment, as shown in figure 3, providing a kind of database method of calibration, it is applied in Fig. 1 in this way O&M server 104 for be illustrated, comprising the following steps:
Step 302, verification request is obtained;Verification request carries Database Identification.
Step 304, it is requested in response to verification, obtains verification configuration file and white list corresponding with Database Identification; White list includes filtering element.
Step 306, according to the filtering corresponding checksum filter device of Element generation.
Step 308, verification task is created according to verification configuration file and checksum filter device.
Step 310, target database corresponding with Database Identification is searched based on verification task.
Step 312, data on line corresponding with target database, and achievement data corresponding with data on line are obtained.
Step 314, verification task is executed based on data on line and achievement data, obtains check results.
When the step of check results are normal, return to acquisition verification request.When check results deposit when abnormal, execute step 316。
Step 316, when check results are deposited when abnormal, according to check results generation warning information.
Step 318, the Exception Type of check results is determined.
Step 320, search whether there is rebuilt component corresponding with Exception Type.
Step 322, when there is rebuilt component corresponding with Exception Type, call the rebuilt component found according to verification As a result, being repaired to target database.
Step 324, when rebuilt component corresponding with Exception Type is not present, user corresponding with Database Identification is determined Account.
Step 326, warning information is sent to user account.
In above-mentioned database method of calibration, O&M server is pre- according to verification request after obtaining verification request The verification configuration file first constructed, by according to verification configuration file and white list corresponding with Database Identification creation verification Task can neatly manage verification task, avoid repeating unnecessary verification task, saved O&M service The checking time of device, to improve the efficiency of database verification.It can be found and be verified entrained by request based on verification task The corresponding target database of Database Identification, data and corresponding with data on line on the line by obtaining target database Achievement data executes created verification task, to obtain check results.When check results are normal, obtained by returning The step of verification request, to provide target database lasting verification service, the stability of target database is ensured.? Check results are deposited when abnormal, and the database that will be automatically repaired by rebuilt component is repaired extremely, it is impossible to The abnormal warning information that generates enough being automatically repaired reduces data base administration to warn data base administrator to perform corresponding processing The workload of personnel.By when having not occurred Database error, it is corresponding to target database in advance it is a variety of may Cause the check item of Database error to be verified, so as to carry out early warning extremely to database in time, reduces database The risk that mistake occurs.
It should be understood that although each step in the flow chart of Fig. 2 and 3 is successively shown according to the instruction of arrow, It is these steps is not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 2 and 3 at least A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to Secondary progress, but in turn or can replace at least part of the sub-step or stage of other steps or other steps Ground executes.
In one embodiment, as shown in figure 4, providing a kind of database calibration equipment 400, comprising: obtain module 402, for obtaining verification request;Verification request carries Database Identification;Creation module 404, for being requested in response to verification, It obtains verification configuration file and verification task is created according to verification configuration file;Searching module 406, for being looked into based on verification task Look for target database corresponding with Database Identification;Obtain data on corresponding with target database line, and with data on line Corresponding achievement data;Correction verification module 408 is verified for executing verification task based on data on line and achievement data As a result;When check results are deposited when abnormal, according to check results generation warning information.
In one embodiment, creation module 404 be also used to obtain preset verification configuration file and with database mark Know corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;Matched according to verification Set file and checksum filter device creation verification task.
In one embodiment, correction verification module 408 is also used to deposit when abnormal when check results, determines the different of check results Normal type;Search whether there is rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type, It calls the rebuilt component found according to check results, target database is repaired;When there is no corresponding with Exception Type Rebuilt component when, determine corresponding with Database Identification user account, and warning information is sent to user account.
In one embodiment, correction verification module 408 is also used to based on verification task, extract include in data on line to school Test the target information for including in information and achievement data;Whether information more to be verified matches with target information;When to be verified When information and target information mismatch, it is abnormal to determine that check results exist;When information to be verified is matched with target information, determine Check results are normal.
In one embodiment, which further includes deployment module, for obtaining the deployment request of terminal upload;Deployment is asked It asks and carries database application work order;It is requested in response to deployment, extracts Database Properties information from database application work order; Database instance, and initial data base corresponding with database instance are created based on database application work order;According to database Attribute information disposes initial data base, obtains target database.
In one embodiment, verification frequency is included in Database Properties information;Module 402 is obtained to be also used to according to verification Frequency generates deployment subtask;Obtain script file corresponding with deployment subtask;According to verification frequency, every preset duration tune Verification request is generated with script file.
Specific about database calibration equipment limits the restriction that may refer to above for database method of calibration, This is repeated no more.Modules in above-mentioned database calibration equipment can come fully or partially through software, hardware and combinations thereof It realizes.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software Form is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 5.The server can be the O&M server 104 in Fig. 1.The computer equipment includes passing through system Processor, memory, network interface and the database of bus connection.Wherein, the processor of the computer equipment is based on providing Calculation and control ability.The memory of the computer equipment includes non-volatile memory medium, built-in storage.The non-volatile memories Media storage has operating system, computer program and database.The built-in storage is the operation system in non-volatile memory medium The operation of system and computer program provides environment.The database of the computer equipment is for storing the data such as verification configuration file. The network interface of the computer equipment is used to communicate with external terminal by network connection.The computer program is held by processor To realize a kind of database method of calibration when row.
It will be understood by those skilled in the art that structure shown in Fig. 5, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of acquisition verification request when executing computer program;Verification request carries number It is identified according to library;It is requested in response to verification, obtain verification configuration file and verification task is created according to verification configuration file;Based on school It tests task and searches target database corresponding with Database Identification;Obtain data on line corresponding with target database, Yi Jiyu The corresponding achievement data of data on line;Verification task is executed based on data on line and achievement data, obtains check results;Work as school It tests result to deposit when abnormal, generates warning information according to check results.
In one embodiment, when processor executes computer program, the volume realized obtains verification configuration file and root According to verification configuration file creation verification task the step of, comprising the following steps: obtain verification configuration file and with database mark Know corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;Matched according to verification Set file and checksum filter device creation verification task.
In one embodiment, it when processor executes computer program, is deposited when abnormal in the check results of working as realized, It is further comprising the steps of: to determine the Exception Type of check results after the step of generating warning information according to check results;It searches With the presence or absence of rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type, calling is found Rebuilt component according to check results, target database is repaired;When there is no rebuilt components corresponding with Exception Type When, determine user account corresponding with Database Identification, and warning information is sent to user account.
In one embodiment, processor execute computer program when, realized based on data on line and index number According to the step of executing verification task, obtaining check results, comprising the following steps: be based on verification task, extract and wrapped in data on line The target information for including in the information to be verified and achievement data contained;Whether information more to be verified matches with target information; When information to be verified and target information mismatch, it is abnormal to determine that check results exist;When information to be verified and target information Timing determines that check results are normal.
In one embodiment, when processor executes computer program, before the step of acquisition realized verifies, also The following steps are included: obtaining the deployment request that terminal uploads;Deployment request carries database application work order;It is asked in response to deployment It asks, extracts Database Properties information from database application work order;Database instance is created based on database application work order, with And initial data base corresponding with database instance;Initial data base is disposed according to Database Properties information, obtains mesh Mark database.
In one embodiment, verification frequency is included in Database Properties information;Processor is gone back when executing computer program It performs the steps of and deployment subtask is generated according to verification frequency;Obtain script file corresponding with deployment subtask;According to school Frequency is tested, calls script file to generate verification request every preset duration.
It in one embodiment, can also be for the corresponding verification frequency of each check item setting, to being easy to appear problem Check item higher verification frequency is set, and relatively slowly or to be not likely to the check item to go wrong setting lower to variation Execution frequency, such as verification disk active volume.Since correction verification module is to continue working, by the way that different execution is arranged Frequency can reduce the quantity of synchronization verification subtask, to more targetedly verify to database.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of acquisition verification request when being executed by processor;Verification request carries Database Identification;In response to Verification request obtains verification configuration file and creates verification task according to verification configuration file;It searches and counts based on verification task Corresponding target database is identified according to library;Data on line corresponding with target database are obtained, and corresponding with data on line Achievement data;Verification task is executed based on data on line and achievement data, obtains check results;When check results have exception When, warning information is generated according to check results.
In one embodiment, when computer program is executed by processor, the volume realized obtains verification configuration file simultaneously The step of according to verification configuration file creation verification task, comprising the following steps: obtain verification configuration file and and database Identify corresponding white list;White list includes filtering element;According to the filtering corresponding checksum filter device of Element generation;According to verification Configuration file and checksum filter device create verification task.
In one embodiment, it when computer program is executed by processor, is being realized when check results have exception When, it is further comprising the steps of: to determine the Exception Type of check results after the step of check results generation warning information; Search whether there is rebuilt component corresponding with Exception Type;When there is rebuilt component corresponding with Exception Type, calling is looked into The rebuilt component found repairs target database according to check results;When there is no reparations corresponding with Exception Type When component, user account corresponding with Database Identification is determined, and warning information is sent to user account.
In one embodiment, when computer program is executed by processor, realized based on data on line and index The step of data execute verification task, obtain check results, comprising the following steps: be based on verification task, extract on line in data The target information for including in the information to be verified and achievement data for including;Information more to be verified and target information whether Match;When information to be verified and target information mismatch, it is abnormal to determine that check results exist;When information to be verified and target information When matching, determine that check results are normal.
In one embodiment, when computer program is executed by processor, before the step of acquisition realized verifies, It is further comprising the steps of: to obtain the deployment request that terminal uploads;Deployment request carries database application work order;In response to deployment Request, extracts Database Properties information from database application work order;Database instance is created based on database application work order, And initial data base corresponding with database instance;Initial data base is disposed according to Database Properties information, is obtained Target database.
In one embodiment, verification frequency is included in Database Properties information;When computer program is executed by processor It also performs the steps of and deployment subtask is generated according to verification frequency;Obtain script file corresponding with deployment subtask;According to Frequency is verified, calls script file to generate verification request every preset duration.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of database method of calibration, which comprises
Obtain verification request;The verification request carries Database Identification;
It is requested in response to the verification, obtain verification configuration file and verification task is created according to the verification configuration file;
Target database corresponding with the Database Identification is searched based on the verification task;
Obtain data on line corresponding with the target database, and achievement data corresponding with data on the line;
The verification task is executed based on data on the line and the achievement data, obtains check results;
When the check results are deposited when abnormal, according to check results generation warning information.
2. the method according to claim 1, wherein the acquisition verifies configuration file and is matched according to the verification Set document creation verification task, comprising:
Obtain verification configuration file and white list corresponding with the Database Identification;The white list includes filtering element;
According to the corresponding checksum filter device of filtering Element generation;
Verification task is created according to the verification configuration file and the checksum filter device.
3. the method according to claim 1, wherein it is described when the check results deposit when abnormal, according to The check results generate after warning information, further includes:
Determine the Exception Type of the check results;
Search whether there is rebuilt component corresponding with the Exception Type;
When there is rebuilt component corresponding with the Exception Type, the rebuilt component found is called to be tied according to the verification Fruit repairs the target database;
When rebuilt component corresponding with the Exception Type is not present, user's account corresponding with the Database Identification is determined Number, and the warning information is sent to the user account.
4. the method according to claim 1, wherein described based on data and the achievement data on the line The verification task is executed, check results are obtained, comprising:
Based on the verification task, extracts the information to be verified for including in data on the line and wrapped in the achievement data The target information contained;
Compare whether the information to be verified matches with the target information;
When the information to be verified and the target information mismatch, it is abnormal to determine that check results exist;
When the information to be verified is matched with the target information, determine that check results are normal.
5. method as claimed in any of claims 1 to 4, which is characterized in that before acquisition verification, also wrap It includes:
Obtain the deployment request that terminal uploads;The deployment request carries database application work order;
It is requested in response to the deployment, extracts Database Properties information from the database application work order;
Application work order in library creates database instance, and primary data corresponding with the database instance based on the data Library;
The initial data base is disposed according to the Database Properties information, obtains target database.
6. according to the method described in claim 5, it is characterized in that, including verification frequency in the Database Properties information;Institute State method further include:
Deployment subtask is generated according to the verification frequency;
Obtain script file corresponding with the deployment subtask;
According to the verification frequency, the script file is called to generate verification request every preset duration.
7. a kind of database calibration equipment, which is characterized in that described device includes:
Module is obtained, for obtaining verification request;The verification request carries Database Identification;
Creation module, for requesting in response to the verification, obtaining verification configuration file and being created according to the verification configuration file It is for school building to test task;
Searching module, for searching target database corresponding with the Database Identification based on the verification task;Obtain with Data on the corresponding line of the target database, and achievement data corresponding with data on the line;
Correction verification module obtains verification knot for executing the verification task based on data on the line and the achievement data Fruit;When the check results are deposited when abnormal, according to check results generation warning information.
8. device according to claim 7, which is characterized in that the creation module is also used to obtain preset verification configuration File and white list corresponding with the Database Identification;The white list includes filtering element;According to the filtering element Generate corresponding checksum filter device;Verification task is created according to the verification configuration file and the checksum filter device.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
CN201810551893.7A 2018-05-31 2018-05-31 Database verification method, database verification device, computer equipment and storage medium Active CN109032824B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810551893.7A CN109032824B (en) 2018-05-31 2018-05-31 Database verification method, database verification device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810551893.7A CN109032824B (en) 2018-05-31 2018-05-31 Database verification method, database verification device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109032824A true CN109032824A (en) 2018-12-18
CN109032824B CN109032824B (en) 2023-05-16

Family

ID=64612041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810551893.7A Active CN109032824B (en) 2018-05-31 2018-05-31 Database verification method, database verification device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109032824B (en)

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871294A (en) * 2019-01-31 2019-06-11 北京百度网讯科技有限公司 Method and apparatus for verifying data, processing request
CN109919914A (en) * 2019-02-15 2019-06-21 广州视源电子科技股份有限公司 Method of calibration, device, computer equipment and the storage medium of configuration file
CN110008204A (en) * 2019-03-12 2019-07-12 平安信托有限责任公司 Detection method, device, computer equipment and the storage medium of the quality of data
CN110134929A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Document verification method, apparatus, computer equipment and storage medium
CN110472114A (en) * 2019-07-03 2019-11-19 平安科技(深圳)有限公司 Abnormal data method for early warning, device, computer equipment and storage medium
CN110489391A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of data processing method and relevant device
CN110502531A (en) * 2019-07-05 2019-11-26 招联消费金融有限公司 Report data method of calibration, device, computer equipment and storage medium
CN110532023A (en) * 2019-08-21 2019-12-03 北京达佳互联信息技术有限公司 Information processing method and device for Data Detection
CN110716939A (en) * 2019-10-16 2020-01-21 深圳市网心科技有限公司 Data management method, electronic device, system and medium
CN110764942A (en) * 2019-09-17 2020-02-07 平安银行股份有限公司 Multi-type data checking method, device, computer system and readable storage medium
CN110874311A (en) * 2019-10-11 2020-03-10 网联清算有限公司 Database detection method and device, computer equipment and storage medium
CN110888776A (en) * 2019-11-13 2020-03-17 网联清算有限公司 Database health state detection method, device and equipment
CN111241082A (en) * 2020-01-13 2020-06-05 贝壳技术有限公司 Data correction method and device
CN111382976A (en) * 2020-03-18 2020-07-07 江苏苏宁物流有限公司 Early warning data processing method and device, computer equipment and storage medium
CN111666340A (en) * 2020-05-27 2020-09-15 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN112152841A (en) * 2020-09-03 2020-12-29 锐捷网络股份有限公司 Verification method, verification device, switch, equipment and storage medium
CN112257402A (en) * 2020-12-22 2021-01-22 畅捷通信息技术股份有限公司 Method, device and storage medium for verifying data of electronic data sheet
CN112328619A (en) * 2020-09-24 2021-02-05 杭州小电科技股份有限公司 Data quality monitoring method, device, system, electronic device and storage medium
CN112464103A (en) * 2019-09-06 2021-03-09 北京达佳互联信息技术有限公司 Service processing method, device, server and storage medium
CN113515489A (en) * 2021-03-12 2021-10-19 中电建电力检修工程有限公司 Method and system for checking direction observation result
CN113704243A (en) * 2020-05-20 2021-11-26 富泰华工业(深圳)有限公司 Data analysis method, data analysis device, computer device, and storage medium
CN115905172A (en) * 2022-11-28 2023-04-04 维克多精密工业(深圳)有限公司 Method for constructing database of complete set of dies
CN116109382A (en) * 2023-01-13 2023-05-12 上海峰沄网络科技有限公司 Data verification method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699759A (en) * 2015-02-10 2015-06-10 上海新炬网络信息技术有限公司 Method for maintaining automatic operation of database
CN107517131A (en) * 2017-08-31 2017-12-26 四川长虹电器股份有限公司 A kind of analysis and early warning method based on log collection

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104699759A (en) * 2015-02-10 2015-06-10 上海新炬网络信息技术有限公司 Method for maintaining automatic operation of database
CN107517131A (en) * 2017-08-31 2017-12-26 四川长虹电器股份有限公司 A kind of analysis and early warning method based on log collection

Cited By (32)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109871294A (en) * 2019-01-31 2019-06-11 北京百度网讯科技有限公司 Method and apparatus for verifying data, processing request
CN109871294B (en) * 2019-01-31 2023-08-01 北京百度网讯科技有限公司 Method and device for checking data and processing request
CN109919914A (en) * 2019-02-15 2019-06-21 广州视源电子科技股份有限公司 Method of calibration, device, computer equipment and the storage medium of configuration file
CN109919914B (en) * 2019-02-15 2021-04-13 广州视源电子科技股份有限公司 Configuration file checking method and device, computer equipment and storage medium
CN110008204A (en) * 2019-03-12 2019-07-12 平安信托有限责任公司 Detection method, device, computer equipment and the storage medium of the quality of data
CN110134929A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Document verification method, apparatus, computer equipment and storage medium
CN110472114A (en) * 2019-07-03 2019-11-19 平安科技(深圳)有限公司 Abnormal data method for early warning, device, computer equipment and storage medium
CN110472114B (en) * 2019-07-03 2024-01-26 平安科技(深圳)有限公司 Abnormal data early warning method and device, computer equipment and storage medium
CN110502531A (en) * 2019-07-05 2019-11-26 招联消费金融有限公司 Report data method of calibration, device, computer equipment and storage medium
CN110489391A (en) * 2019-07-25 2019-11-22 深圳壹账通智能科技有限公司 A kind of data processing method and relevant device
CN110489391B (en) * 2019-07-25 2022-06-28 深圳壹账通智能科技有限公司 Data processing method and related equipment
CN110532023A (en) * 2019-08-21 2019-12-03 北京达佳互联信息技术有限公司 Information processing method and device for Data Detection
CN112464103A (en) * 2019-09-06 2021-03-09 北京达佳互联信息技术有限公司 Service processing method, device, server and storage medium
CN110764942B (en) * 2019-09-17 2023-08-18 平安银行股份有限公司 Multi-kind data verification method, device, computer system and readable storage medium
CN110764942A (en) * 2019-09-17 2020-02-07 平安银行股份有限公司 Multi-type data checking method, device, computer system and readable storage medium
CN110874311A (en) * 2019-10-11 2020-03-10 网联清算有限公司 Database detection method and device, computer equipment and storage medium
CN110716939A (en) * 2019-10-16 2020-01-21 深圳市网心科技有限公司 Data management method, electronic device, system and medium
CN110888776A (en) * 2019-11-13 2020-03-17 网联清算有限公司 Database health state detection method, device and equipment
CN111241082A (en) * 2020-01-13 2020-06-05 贝壳技术有限公司 Data correction method and device
CN111382976A (en) * 2020-03-18 2020-07-07 江苏苏宁物流有限公司 Early warning data processing method and device, computer equipment and storage medium
CN111382976B (en) * 2020-03-18 2022-08-19 江苏苏宁物流有限公司 Early warning data processing method and device, computer equipment and storage medium
CN113704243A (en) * 2020-05-20 2021-11-26 富泰华工业(深圳)有限公司 Data analysis method, data analysis device, computer device, and storage medium
CN111666340B (en) * 2020-05-27 2023-10-27 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN111666340A (en) * 2020-05-27 2020-09-15 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN112152841A (en) * 2020-09-03 2020-12-29 锐捷网络股份有限公司 Verification method, verification device, switch, equipment and storage medium
CN112152841B (en) * 2020-09-03 2023-06-20 锐捷网络股份有限公司 Verification method, verification device, switch, equipment and storage medium
CN112328619A (en) * 2020-09-24 2021-02-05 杭州小电科技股份有限公司 Data quality monitoring method, device, system, electronic device and storage medium
CN112257402A (en) * 2020-12-22 2021-01-22 畅捷通信息技术股份有限公司 Method, device and storage medium for verifying data of electronic data sheet
CN113515489A (en) * 2021-03-12 2021-10-19 中电建电力检修工程有限公司 Method and system for checking direction observation result
CN115905172B (en) * 2022-11-28 2023-08-04 维克多精密工业(深圳)有限公司 Method for constructing complete die database
CN115905172A (en) * 2022-11-28 2023-04-04 维克多精密工业(深圳)有限公司 Method for constructing database of complete set of dies
CN116109382A (en) * 2023-01-13 2023-05-12 上海峰沄网络科技有限公司 Data verification method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN109032824B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN109032824A (en) Database method of calibration, device, computer equipment and storage medium
CN108153670B (en) Interface testing method and device and electronic equipment
CN108804618B (en) Database configuration method, device, computer equipment and storage medium
CN108959385B (en) Database deployment method, device, computer equipment and storage medium
CA3141329A1 (en) Request link tracking method and service request processing method
US11093617B2 (en) Automated vulnerability grouping
CN110555041A (en) Data processing method, data processing device, computer equipment and storage medium
US10338910B2 (en) Multi-tenant upgrading
CN112631686A (en) Data processing method, data processing device, computer equipment and storage medium
CN112288400A (en) Multi-system data interaction method and device, computer equipment and storage medium
CN113778442A (en) System menu generating method, device, equipment and storage medium
US9513997B2 (en) Test data management
CN109542764B (en) Webpage automatic testing method and device, computer equipment and storage medium
US9323634B2 (en) Generating a configuration file based upon an application registry
CN114238085A (en) Interface testing method and device, computer equipment and storage medium
CN114528201A (en) Abnormal code positioning method, device, equipment and medium
US9665732B2 (en) Secure Download from internet marketplace
CN112559352A (en) Interface test method, device, equipment and storage medium
US20230092076A1 (en) Data recovery validation test
US10951600B2 (en) Domain authentication
CN115658794A (en) Data query method and device, computer equipment and storage medium
CN115757172A (en) Test execution method and device, storage medium and computer equipment
JP6382705B2 (en) Virtual device test apparatus, virtual device test method, and virtual device test program
CN110297625B (en) Application processing method and device
CN112862452A (en) Method and device for executing work order equivalence, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant