CN112231300A - Function analysis method and device and electronic equipment - Google Patents

Function analysis method and device and electronic equipment Download PDF

Info

Publication number
CN112231300A
CN112231300A CN202011130719.9A CN202011130719A CN112231300A CN 112231300 A CN112231300 A CN 112231300A CN 202011130719 A CN202011130719 A CN 202011130719A CN 112231300 A CN112231300 A CN 112231300A
Authority
CN
China
Prior art keywords
function
write
blacklist
database
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011130719.9A
Other languages
Chinese (zh)
Other versions
CN112231300B (en
Inventor
李楠
韩慧敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingbase Information Technologies Co Ltd
Original Assignee
Beijing Kingbase Information Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingbase Information Technologies Co Ltd filed Critical Beijing Kingbase Information Technologies Co Ltd
Priority to CN202011130719.9A priority Critical patent/CN112231300B/en
Priority claimed from CN202011130719.9A external-priority patent/CN112231300B/en
Publication of CN112231300A publication Critical patent/CN112231300A/en
Application granted granted Critical
Publication of CN112231300B publication Critical patent/CN112231300B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/235Update request formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The disclosure provides a function analysis method, a function analysis device and electronic equipment, which relate to the technical field of databases and comprise the following steps: when the program is started, acquiring a function and checking a blacklist; wherein the functions include user-defined functions and system functions of the database system; the blacklist is used for recording a writing database function in the function; if the write-in database function recorded in the blacklist is empty, determining a first write-in database function from the system function according to the read-write attribute; if the write-in database function is recorded in the blacklist, executing a user defined function based on the blacklist, and determining a second write-in database function in the user defined function according to an execution result; adding the first write database function and the second write database function to a blacklist. The method and the device can obviously simplify the working difficulty of configuring the black and white list.

Description

Function analysis method and device and electronic equipment
Technical Field
The present disclosure relates to the field of database technologies, and in particular, to a method and an apparatus for analyzing a function, and an electronic device.
Background
Read-write separation means that the host server processes transactional add, modify, and delete operations, and the standby server processes SELECT query operations.
In the process of processing functions, the existing read-write separation scheme usually needs a user to separately configure a black-and-white list of the functions to identify the read-write type of the functions, so that the functions of a database (which can be called as read functions) are read and distributed to a standby server, the functions of the database (which can be called as write functions) are written in and sent to a host server, and the overall processing capacity of a cluster is improved. Such a scheme of separately configuring black and white lists of functions is very cumbersome for users, and especially when the application is complicated and a large number of functions are used, configuring black and white lists becomes difficult and error-prone.
Disclosure of Invention
In order to solve the technical problem or at least partially solve the technical problem, the present disclosure provides a method and an apparatus for analyzing a function, and an electronic device.
The present disclosure provides a method of analyzing a function, the method comprising: when the program is started, acquiring a function and checking a blacklist; wherein the functions include user-defined functions and system functions of a database system; the blacklist is used for recording a written database function in the functions; if the write-in database function recorded in the blacklist is empty, determining a first write-in database function from the system function according to the read-write attribute; if the blacklist records a writing database function, executing the user defined function based on the blacklist, and determining a second writing database function in the user defined function according to an execution result; adding the first write database function and the second write database function to the blacklist.
Further, the determining a first write database function from the system function according to the read-write attribute includes: inquiring a system function with read-write attribute as an unstable variable attribute value from a pre-established database table; wherein the database table is used for storing the system function; and determining the system function obtained by the query as a first writing database function.
Further, the executing the user-defined function based on the blacklist and determining a second writing database function in the user-defined function according to an execution result includes: analyzing a function name from the user-defined function, and judging whether the function name is recorded in the blacklist or not; if not, sending the user-defined function to a standby server for execution; receiving an execution result of the standby server on the user-defined function; and when the execution result is an execution error, determining the user-defined function as a second writing database function.
Further, the method further comprises: sending the write-in database function recorded in the blacklist to a host server for execution; and receiving the execution result of the user-defined function by the host server.
Further, the default read-write attribute of the user-defined function is an unstable variable attribute value.
Further, the method further comprises: and configuring the user-defined function as a third writing database function according to a user instruction.
Further, the method further comprises: storing the blacklist in a predefined container; wherein the container is to store a non-repeating write database function.
The present disclosure also provides an apparatus for analyzing a function, the apparatus comprising: the checking module is used for acquiring the function and checking the blacklist; wherein the functions include user-defined functions and system functions of a database system; the blacklist is used for recording a written database function in the functions; a first determining module, configured to determine, if the write database function recorded in the blacklist is empty, a first write database function from the system function according to the read-write attribute; a second determining module, configured to execute the user-defined function based on the blacklist if a write-in database function is recorded in the blacklist, and determine a second write-in database function in the user-defined function according to an execution result; and the blacklist adding module is used for adding the first writing database function and the second writing database function into the blacklist.
The present disclosure also provides an electronic device comprising a processor and a storage; the storage means has stored thereon a computer program which, when executed by the processor, performs the above-described method.
The present disclosure also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above-described method.
Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages:
according to the method and the device for analyzing the function and the electronic equipment, after the program is started, the function is obtained and whether a blacklist is empty is checked; if the write-in database function recorded in the blacklist is empty, determining a first write-in database function from the system function; if the blacklist is not empty, executing a user defined function based on the blacklist, and determining a second writing database function in the user defined function according to an execution result; and finally, adding the first writing database function and the second writing database function into the blacklist. The method does not need the black and white list of the function configured by the user, but automatically separates the function written in the database from the system function and the user defined function, and can obviously simplify the working difficulty of configuring the black and white list and reduce the influence caused by the workload and configuration errors of the user.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present disclosure, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a flow chart of a method for analyzing a function according to an embodiment of the present disclosure;
FIG. 2 is a block diagram of an apparatus for analyzing functions according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
In order that the above objects, features and advantages of the present disclosure may be more clearly understood, aspects of the present disclosure will be further described below. It should be noted that the embodiments and features of the embodiments of the present disclosure may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present disclosure, but the present disclosure may be practiced in other ways than those described herein; it is to be understood that the embodiments disclosed in the specification are only a few embodiments of the present disclosure, and not all embodiments.
In consideration of the fact that the existing mode for configuring the black and white list of the function is very complicated and easy to make mistakes, the embodiment of the disclosure provides a function analysis method and device and electronic equipment. For ease of understanding, the embodiments of the present disclosure are described in detail below.
The first embodiment is as follows:
the present embodiment provides a method for analyzing a function, and referring to fig. 1, the method may include the following steps:
step S102, after the program is started, acquiring a function and checking a blacklist; wherein the function comprises a system function and a user-defined function; the blacklist is used to record the write database function among the functions.
In some possible implementations, the program may be a driver added in the host server, a designed Proxy (Proxy) program, or the like. The functions can comprise self-contained system functions when the database system is initialized and user-defined functions which are pre-established by users to meet actual requirements; meanwhile, according to whether the operation type of the function is a read operation or a write operation, the function may be divided into a write database function (i.e., a write function) and a read database function (i.e., a read function); among other things, writing to database functions such as update functions, modify database state functions, and unstable functions. To facilitate accurately separating the read function and the write function, the present embodiment may add the write function to the blacklist. The checking of the black list can be understood as checking whether the write function recorded in the black list is empty, and then performing the subsequent steps based on the checking result.
And step S104, if the written database function recorded in the blacklist is empty, determining a first written database function from the system function according to the read-write attribute.
The system function comprises a read function and a write function, wherein the write function can be determined for an unstable variable attribute value (expressed as 'v') through a set read-write attribute (resolver); thus, the system function whose read-write attribute is an unstable variable attribute value is determined as the first write database function.
And step S106, if the write-in database function is recorded in the blacklist, executing the user-defined function based on the blacklist, and determining a second write-in database function in the user-defined function according to an execution result.
If write functions are recorded in the blacklist, the recorded write functions at least comprise write functions in system functions and possibly write functions in user-defined functions, for example, the blacklist is configured while the user-defined functions are created. However, for the user-defined function that is not configured by the user, the operation type is uncertain as the read function or the write function, and the user-defined function is not recorded in the blacklist; in this case, in order to reduce the complexity of identification of the operation type, a function that is not recorded in the blacklist may be directly used as the read function.
And in the process of executing the user-defined function based on the blacklist, sending the function recorded in the blacklist to a host server for execution, wherein the function recorded in the blacklist is a write function in the system function and the user-defined function. And sending the functions which are not recorded in the blacklist to the standby server for execution, wherein the functions which are not recorded in the blacklist are regarded as read functions. It is understood that the user-defined function considered as the read function may actually be a write function, and an execution result sent to the standby server for execution will be an error, so that the user-defined function can be determined as the write function, that is, the second write database function, based on the execution result with the error.
Step S108, adding the first writing database function and the second writing database function into a blacklist. The blacklist is a record file of a first writing database function in the system function and a second writing database function in the user defined function; the present embodiment may store the blacklist in a predefined container; the container is used for storing non-repetitive writing database functions, such as HashSet with global static state, and the time complexity of the HashSet increasing, deleting, checking and containing method is set to be O (1), so that the efficiency is high. Therefore, the write functions in the system function and the user defined function are added into the blacklist, and the separation of the read function and the write function is accurately realized.
According to the function analysis method provided by the embodiment of the disclosure, under the condition that the write function recorded by the blacklist is checked to be empty, a first write-in database function is determined from the system function; under the condition that the write function recorded by the blacklist is not checked to be empty, executing a user defined function based on the blacklist, and determining a second write database function in the user defined function according to an execution result; and finally, adding the first writing database function and the second writing database function into the blacklist. The method utilizes the read-write attribute to automatically separate the write function from the system function and utilizes the execution result to automatically separate the write function from the user defined function, does not need a black and white list of the function configured by the user, can obviously simplify the working difficulty of configuring the black and white list, and reduces the influence caused by the workload and configuration error of the user.
In order to better understand the analysis method of the function, the above steps of the method are described next.
When there are many functions, such as a large number of functions including updateXXX1, …, updateXXX100, selectXXX1, …, selectXXX100, etc., it is very troublesome to configure the black and white list of the functions by connecting parameters BlackList, so that the write function in the functions can be determined by the analysis method of the functions.
In one embodiment, both system functions and user-defined functions are stored in a system table (e.g., sys _ proc). The information recorded by the system table includes a field resolver representing the read-write attribute of the function, and the field has multiple value-taking situations, wherein when the field value is taken as 'v', that is, when the field value is taken as 'v', the field value represents the attribute value of the unstable variable, and correspondingly represents that the function is the write function. When the read-write attribute of the system function and the user-defined function is set to be 'v', the system function and the user-defined function are determined to be write functions. And when the user does not set the read-write attribute of the user-defined function, the default read-write attribute of the user-defined function is an unstable variable attribute value.
In the process of determining the first write database function from the system function, if the provlatile ═ v' function is directly searched from the system table, the write function including the system function and the user-defined function will be found, resulting in an inaccurate search result of the first write database function. Based on this, the present embodiment provides a specific implementation manner for determining the first write database function, including: inquiring a system function with read-write attribute as an unstable variable attribute value (provolaile ═ v') from a pre-established database table; and determining the system function obtained by the query as a first writing database function. The first write database function may then be added to the blacklist.
The present embodiment may establish a database table for storing only system functions in advance through a migration tool, a management tool, or other means. Since the database table only contains the system function, the first written database function determined from the database table is more accurate.
After the first write database function in the database table is added to the blacklist, the database table may be deleted. At this time, the write database function is recorded in the blacklist, so that a connection can be established with the user end, and a second write database function in the user-defined function is determined, which may specifically refer to the following steps (1) - (4):
(1) and analyzing the function name from the user-defined function, and judging whether the function name is recorded in a blacklist or not.
Parsing out function names from SQL (Structured Query Language) user-defined functions, such as function name updateXXX 1; judging whether the function name is recorded in a blacklist or not; if not, the following step (2) is performed.
(2) Sending the user defined function to a standby server for execution;
such as for the first time the user-defined function is executed, it is not recorded in the blacklist, and the user-defined function is sent to the standby server for execution.
(3) Receiving an execution result of the standby server on the user-defined function;
if the user-defined function is actually a write function, after sending it to the standby server, the standby server will fail to execute, and return a result of the execution error, such as the following message: ERROR, cannot execute UPDATE in a read-only transaction.
If the user-defined function is a read function, the user-defined function is sent to the standby server, and then the standby server directly executes the read function successfully and returns the execution success to the application layer.
(4) And when the execution result is an execution error, determining the user-defined function as a second writing database function.
After receiving an execution error result returned by the standby server, determining the user-defined function with the execution error as a second write database function; specifically, the function name of the user-defined function with the execution error may be resolved, and the resolved function name may be added to the blacklist.
After that, the user-defined function which fails to execute can be forwarded to the host server to execute, and the host server returns the execution result of the function to the application layer whether the execution result is successful or not.
In one embodiment, the method further comprises sending the write database function recorded in the blacklist to the host server for execution; and receiving the execution result of the user-defined function by the host server.
The write database function recorded in the blacklist may be the user-defined function recorded in the blacklist determined by the step (1) above, indicating that the user-defined function has been determined to be a write function, and may be directly sent to the host server for execution. Such as: since the updateXXX1 function has been determined as a write function and added to the blacklist through the above steps (1) - (4) during the first execution of the updateXXX1 function, it can be directly transmitted to the host server for execution when the updateXXX1 function is executed the second time.
In addition, the method for analyzing a function provided in this embodiment may further include: and configuring the user-defined function as a third writing database function according to the user instruction.
Specifically, when there are fewer user-defined functions, such as functions including updateXXX1, …, updateXXX3, selectXXX, etc. The black list is now configured with reference to the following user instructions: BlackList ═ updateXXX 1; the updateXXX2, updateXXX1 function, updateXXX2 function in the blacklist are all third write database functions.
Based on the configuration result of the blacklist, after a user starts a program, the write function in the blacklist is read first and stored in the container HashSet. The black list is not empty at this time, so the write function in the system function is not read. The user-defined function (e.g., updateXXX1) is executed directly, and this function updateXXX1 is included in the blacklist and sent directly to the host server. When executing a user-defined function (e.g., updateXXX3), the function updateXXX3, which is actually a write function, is not included in the blacklist, and thus is sent to the standby server for execution, determined as a write function according to the execution result, and added to the blacklist. In this embodiment, a write function (updateXXX3) that the user fails to configure may be added to the blacklist to reduce the impact of configuration errors.
In summary, for a scenario with many functions, the above embodiment can automatically determine a write function in the function and add the write function to a blacklist in the driver layer, and specifically includes: determining a write function in the system function using the read-write attribute, and determining a write function in the user-defined function using the execution result. The read function and the write function can be accurately distributed without configuring a black and white list by a user, so that the user can use the write function more conveniently and intelligently, the workload of the user is obviously reduced, the write function which is not configured by the user can be written into the black list, and the influence caused by configuration errors is reduced.
Example two:
referring to fig. 2, the present embodiment provides a function analysis apparatus, including:
the checking module 202 is used for checking the blacklist after the program is started; the blacklist is used for recording and writing in a database function;
a first determining module 204, configured to determine, if the write database function recorded in the blacklist is empty, a first write database function from a pre-established database table; the database table is used for storing system functions of the database system;
a second determining module 206, configured to execute the user-defined function based on the blacklist if the write-in database function is recorded in the blacklist, and determine a second write-in database function in the user-defined function according to an execution result;
and a blacklisting module 208 configured to add the first write database function and the second write database function to a blacklist.
According to the function analysis device provided by the embodiment of the disclosure, under the condition that the write function recorded by the blacklist is checked to be empty, a first write-in database function is determined from the system function; under the condition that the write function recorded by the blacklist is not checked to be empty, executing a user defined function based on the blacklist, and determining a second write database function in the user defined function according to an execution result; and finally, adding the first writing database function and the second writing database function into the blacklist. The method utilizes the attribute to automatically separate the write function from the system function and utilizes the execution result to automatically separate the write function from the user defined function, does not need the user to configure the black and white list of the function, can obviously simplify the working difficulty of configuring the black and white list and reduce the influence caused by the workload and configuration error of the user.
The device provided in this embodiment has the same implementation principle and technical effect as those of the foregoing embodiments, and for the sake of brief description, reference may be made to the corresponding contents in the foregoing embodiments for parts of this embodiment that are not mentioned.
Based on the foregoing embodiments, the present embodiment provides an electronic device, as shown in fig. 3, including a processor 302 and a storage device 304; the storage means 304 have stored thereon a computer program which, when executed by the processor 302, performs the above-described method.
Further, the present embodiment also provides a computer-readable storage medium, on which a computer program is stored, and the computer program is executed by a processor to perform the steps of the above method.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The foregoing are merely exemplary embodiments of the present disclosure, which enable those skilled in the art to understand or practice the present disclosure. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the disclosure. Thus, the present disclosure is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of analyzing a function, the method comprising:
when the program is started, acquiring a function and checking a blacklist; wherein the functions include user-defined functions and system functions of a database system; the blacklist is used for recording a written database function in the functions;
if the write-in database function recorded in the blacklist is empty, determining a first write-in database function from the system function according to the read-write attribute;
if the blacklist records a writing database function, executing the user defined function based on the blacklist, and determining a second writing database function in the user defined function according to an execution result;
adding the first write database function and the second write database function to the blacklist.
2. The method of claim 1, wherein determining a first write database function from the system functions based on the read and write attributes comprises:
inquiring a system function with read-write attribute as an unstable variable attribute value from a pre-established database table; wherein the database table is used for storing the system function;
and determining the system function obtained by the query as a first writing database function.
3. The method of claim 1, wherein the executing the user-defined function based on the blacklist and determining a second write database function among the user-defined functions according to the execution result comprises:
analyzing a function name from the user-defined function, and judging whether the function name is recorded in the blacklist or not;
if not, sending the user-defined function to a standby server for execution;
receiving an execution result of the standby server on the user-defined function;
and when the execution result is an execution error, determining the user-defined function as a second writing database function.
4. The method of claim 1, further comprising:
sending the write-in database function recorded in the blacklist to a host server for execution;
and receiving the execution result of the user-defined function by the host server.
5. The method of claim 1, wherein the default read-write attribute of the user-defined function is an unstable variable attribute value.
6. The method of claim 1, further comprising:
and configuring the user-defined function as a third writing database function according to a user instruction.
7. The method of claim 1, further comprising:
storing the blacklist in a predefined container; wherein the container is to store a non-repeating write database function.
8. An apparatus for analyzing a function, the apparatus comprising:
the checking module is used for acquiring the function and checking the blacklist; wherein the functions include user-defined functions and system functions of a database system; the blacklist is used for recording a written database function in the functions;
a first determining module, configured to determine, if the write database function recorded in the blacklist is empty, a first write database function from the system function according to the read-write attribute;
a second determining module, configured to execute the user-defined function based on the blacklist if a write-in database function is recorded in the blacklist, and determine a second write-in database function in the user-defined function according to an execution result;
and the blacklist adding module is used for adding the first writing database function and the second writing database function into the blacklist.
9. An electronic device comprising a processor and a memory device;
the storage device has stored thereon a computer program which, when executed by the processor, performs the method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of the claims 1 to 7.
CN202011130719.9A 2020-10-21 Function analysis method and device and electronic equipment Active CN112231300B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011130719.9A CN112231300B (en) 2020-10-21 Function analysis method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011130719.9A CN112231300B (en) 2020-10-21 Function analysis method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112231300A true CN112231300A (en) 2021-01-15
CN112231300B CN112231300B (en) 2024-07-05

Family

ID=

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070239656A1 (en) * 2006-04-06 2007-10-11 Santosuosso John M Removal of Database Query Function Calls
US20080059440A1 (en) * 2006-08-31 2008-03-06 Barsness Eric L Method and system for managing operation of a user-defined function on a partitioned database
US20090112792A1 (en) * 2007-10-25 2009-04-30 Eric Lawrence Barsness Generating Statistics for Optimizing Database Queries Containing User-Defined Functions
CN103793432A (en) * 2012-11-01 2014-05-14 深圳中兴网信科技有限公司 Method and device for splitting database reading and writing
CN104391873A (en) * 2014-10-29 2015-03-04 上海达梦数据库有限公司 Database operation separation method and database operation separation system
CN105243163A (en) * 2015-11-05 2016-01-13 国家电网公司 Archiving integration system and method of historical data
US20160217174A1 (en) * 2015-01-27 2016-07-28 Kabushiki Kaisha Toshiba Database system
US20170017692A1 (en) * 2015-07-13 2017-01-19 Paypal, Inc. Read/write split database query routing
CN107346258A (en) * 2017-07-06 2017-11-14 北京微影时代科技有限公司 A kind of reading and writing data separation method and device
US20190129985A1 (en) * 2017-10-26 2019-05-02 Sap Se Deploying changes to key patterns in multi-tenancy database systems
CN109920468A (en) * 2019-02-27 2019-06-21 苏州浪潮智能科技有限公司 A kind of method and system of SSD performance stable state verifying
US10346260B1 (en) * 2015-09-30 2019-07-09 EMC IP Holding Company LLC Replication based security
CN110196859A (en) * 2019-06-10 2019-09-03 天津神舟通用数据技术有限公司 Data base read-write based on JDBC distributor separates cluster real-time consistency method
CN111061801A (en) * 2019-12-25 2020-04-24 天津南大通用数据技术股份有限公司 Transaction type database read-write separation implementation method

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070239656A1 (en) * 2006-04-06 2007-10-11 Santosuosso John M Removal of Database Query Function Calls
US20080059440A1 (en) * 2006-08-31 2008-03-06 Barsness Eric L Method and system for managing operation of a user-defined function on a partitioned database
US20090112792A1 (en) * 2007-10-25 2009-04-30 Eric Lawrence Barsness Generating Statistics for Optimizing Database Queries Containing User-Defined Functions
CN103793432A (en) * 2012-11-01 2014-05-14 深圳中兴网信科技有限公司 Method and device for splitting database reading and writing
CN104391873A (en) * 2014-10-29 2015-03-04 上海达梦数据库有限公司 Database operation separation method and database operation separation system
US20160217174A1 (en) * 2015-01-27 2016-07-28 Kabushiki Kaisha Toshiba Database system
US20170017692A1 (en) * 2015-07-13 2017-01-19 Paypal, Inc. Read/write split database query routing
US10346260B1 (en) * 2015-09-30 2019-07-09 EMC IP Holding Company LLC Replication based security
CN105243163A (en) * 2015-11-05 2016-01-13 国家电网公司 Archiving integration system and method of historical data
CN107346258A (en) * 2017-07-06 2017-11-14 北京微影时代科技有限公司 A kind of reading and writing data separation method and device
US20190129985A1 (en) * 2017-10-26 2019-05-02 Sap Se Deploying changes to key patterns in multi-tenancy database systems
CN109920468A (en) * 2019-02-27 2019-06-21 苏州浪潮智能科技有限公司 A kind of method and system of SSD performance stable state verifying
CN110196859A (en) * 2019-06-10 2019-09-03 天津神舟通用数据技术有限公司 Data base read-write based on JDBC distributor separates cluster real-time consistency method
CN111061801A (en) * 2019-12-25 2020-04-24 天津南大通用数据技术股份有限公司 Transaction type database read-write separation implementation method

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
徐清德;: "Oracle读写分离系统在采油厂数据中心中的应用研究", 信息系统工程, no. 11, 20 November 2015 (2015-11-20) *
王良等: "PostgreSQL存储过程移植方法", 计算机应用, vol. 30, no. 1, 30 June 2010 (2010-06-30), pages 220 - 224 *
陈迪: "云计算环境下内存数据库的应用与优化", 中国优秀硕士学问论文全文数据库, 15 September 2018 (2018-09-15) *

Similar Documents

Publication Publication Date Title
RU2427896C2 (en) Annotation of documents in jointly operating applications by data in separated information systems
US6925462B2 (en) Database management system, and query method and query execution program in the database management system
US7526469B2 (en) Method and system of database management with shared area
CN111259067B (en) Method, device and equipment for realizing DAO interface based on Spring
CN109189759B (en) Data reading method, data query method, device and equipment in KV storage system
US20060112083A1 (en) Object relation information management program, method, and apparatus
CN116821437A (en) Data processing method, device, electronic equipment and storage medium
CN114297204A (en) Data storage and retrieval method and device for heterogeneous data source
CN112835638A (en) Configuration information management method and device based on embedded application program
CN110688201B (en) Log management method and related equipment
CN112231300B (en) Function analysis method and device and electronic equipment
CN112231300A (en) Function analysis method and device and electronic equipment
CN116414935A (en) Method for distributed Search space vector data based on Elastic Search
JPH10312396A (en) Data base system and computer-readable record medium where data base retrieval program is recorded
CN114816247A (en) Logic data acquisition method and device
CN111241070B (en) Data migration device, method, system and storage medium of cross-CPU architecture
JP2002342403A (en) Device/method for detecting false path and its program
CN114330278A (en) Method and equipment for judging consistency of returned data
EP3436972A1 (en) Multiform persistence abstraction
CN112632211A (en) Semantic information processing method and equipment for mobile robot
CN108694219B (en) Data processing method and device
US7685107B2 (en) Apparatus, system, and method for scanning a partitioned data set
CN115599976B (en) User grouping method, device, electronic equipment and storage medium
CN113190264B (en) JPA-based automatic data version generation and application device and method
EP4350506A1 (en) Information processing program, information processing method and information processing device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant