CN116302211A - Configuration method and device of policy executor, computer equipment and storage medium - Google Patents

Configuration method and device of policy executor, computer equipment and storage medium Download PDF

Info

Publication number
CN116302211A
CN116302211A CN202310577150.8A CN202310577150A CN116302211A CN 116302211 A CN116302211 A CN 116302211A CN 202310577150 A CN202310577150 A CN 202310577150A CN 116302211 A CN116302211 A CN 116302211A
Authority
CN
China
Prior art keywords
execution
policy
target
executor
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310577150.8A
Other languages
Chinese (zh)
Other versions
CN116302211B (en
Inventor
黄煜祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Meiyun Zhishu Technology Co ltd
Original Assignee
Meiyun Zhishu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Meiyun Zhishu Technology Co ltd filed Critical Meiyun Zhishu Technology Co ltd
Priority to CN202310577150.8A priority Critical patent/CN116302211B/en
Publication of CN116302211A publication Critical patent/CN116302211A/en
Application granted granted Critical
Publication of CN116302211B publication Critical patent/CN116302211B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a configuration method and device of a strategy executor, computer equipment and a storage medium. Providing a configuration page for a target policy executor; under the condition that a policy identification configuration operation is received through a configuration page, determining a policy identification of a target policy executor; in the event that a policy step configuration operation is received via the configuration page, a set of execution steps that need to be pre-packaged in the target policy executor is determined. The target policy executor is used for processing the data table to be processed to obtain a target data table. The configuration page of the strategy executor is convenient for a user to complete configuration of the target strategy executor, free configuration of the dynamic table generation strategy is realized, and the requirement on the professional level of maintenance personnel is reduced.

Description

Configuration method and device of policy executor, computer equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and apparatus for configuring a policy executor, a computer device, and a storage medium.
Background
Under the condition of diversified service systems, according to different business characteristics and customization requirements, the service system has structural requirements with larger difference.
In the related technology, the service demand side respectively realizes the related processing operation of the dynamic data table according to different service demands, and in a special scene, professional maintenance personnel are required to enter a database layer to realize the maintenance of data and related operations. However, there is a certain requirement in the related art for the level of expertise of maintenance personnel, and this approach is to be improved.
Disclosure of Invention
The present disclosure aims to solve, at least to some extent, one of the technical problems in the related art. To this end, the present disclosure proposes a method, an apparatus, a computer device, and a storage medium for configuring a policy executor.
The present disclosure provides a method for configuring a policy executor, the method comprising:
providing a configuration page for a target policy executor;
under the condition that a policy identification configuration operation is received through the configuration page, determining a policy identification of the target policy executor;
under the condition that a strategy step configuration operation is received through the configuration page, determining an execution step set which needs to be pre-packaged in the target strategy executor; the execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first executing step corresponds to the step of entering the reference; the target policy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, the data table to be processed is determined according to the data table parameters sent by the parameter entering and terminal in the step; and in the second execution step, the data table to be processed is processed to obtain the target data table.
Optionally, in the case that the policy step configuration operation is received through the configuration page, determining the execution step set that needs to be pre-packaged in the target policy executor includes:
the configuration page responds to the precondition configuration operation, the precondition of the execution step in the execution step set is determined, and the precondition judgment logic of the execution step is generated; before the target policy executor starts to run the execution step, the pre-judgment logic is used for judging whether a preset execution condition of the execution step is met or not, and whether the execution step is run or not is determined according to a judgment result.
Responding to step entry configuration operation through the configuration page, and determining step entry of an execution step in the execution step set; the step entry comprises a data table name, a column identifier of a data column and a data type corresponding to the data column.
Optionally, the configuration page has a step isolation configuration control therein, and the method further includes:
for any execution step, responding to the selection operation of a step isolation configuration control, and determining that any execution step is an isolation step; and if the operation of any execution step is abnormal, any operation of jumping, retrying and continuing to operate the subsequent strategy step is performed according to the step isolation mode corresponding to the any execution step.
Optionally, the method further comprises:
determining the trigger type of the target policy executor by the configuration page in response to trigger type configuration operation; the trigger type comprises timing trigger or real-time trigger;
and responding to the time expression configuration operation through the configuration page, and determining the trigger time of the target strategy executor.
Optionally, after the target policy executor completes execution, the method further includes:
responding to the checking operation of the execution result of the target strategy executor, and displaying an audit detail display page; the audit detail display page is provided with the execution step set, the step parameter entering, the step parameter exiting, the step execution starting time and the step execution ending time.
Optionally, after the target policy executor completes configuration, the method further includes:
and caching the target strategy executor into a strategy executor pool so as to search and determine a corresponding strategy executor in the strategy executor pool according to the strategy identifier sent by the terminal.
Optionally, the executing of the second executing step further includes:
under the condition of maintaining a data table structure, determining metadata information of the data table according to the data table parameters; the metadata information is transmitted into a statement combination tool with a default structure to carry out statement assembly, and a first execution statement is obtained; determining the database type of a target data source according to the target source identifier sent by the terminal; the first execution statement is transmitted to an extended structure statement combination tool corresponding to the database type, and structural statement authority checking is executed to obtain a target execution statement for processing the data table to be processed; or alternatively
Under the condition of aggregation query, determining parameters for query required by the aggregation query according to the data table parameters; the parameters for query are transmitted into a default query statement combination tool to carry out statement assembly, and a second execution statement is obtained; determining the database type of a target data source according to the target source identifier sent by the terminal; and transmitting the second execution statement to an extended query statement combination tool corresponding to the database type to obtain a target execution statement for processing the data table to be processed.
The present disclosure provides a configuration apparatus of a policy executor, the apparatus comprising:
the configuration page providing module is used for providing a configuration page aiming at the target policy executor;
the policy identification determining module is used for determining the policy identification of the target policy executor under the condition that the policy identification configuration operation is received through the configuration page;
the step set determining module is used for determining an execution step set which needs to be pre-packaged in the target policy executor under the condition that policy step configuration operation is received through the configuration page; the execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first executing step corresponds to the step of entering the reference; the target policy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, the data table to be processed is determined according to the data table parameters sent by the parameter entering and terminal in the step; and in the second execution step, the data table to be processed is processed to obtain the target data table.
The present disclosure provides a computer device comprising: a memory, and one or more processors communicatively coupled to the memory; the memory has stored therein instructions executable by the one or more processors to cause the one or more processors to implement the steps of the method of any of the embodiments described above.
The present disclosure provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method of any of the above embodiments.
The present disclosure provides a computer program product comprising instructions therein, which when executed by a processor of a computer device, enable the computer device to perform the steps of the method of any one of the embodiments described above.
In the present disclosure, a configuration page for a target policy executor is provided; under the condition that a policy identification configuration operation is received through a configuration page, determining a policy identification of a target policy executor; in the event that a policy step configuration operation is received via the configuration page, a set of execution steps that need to be pre-packaged in the target policy executor is determined. The target policy executor is used for processing the data table to be processed to obtain a target data table. The configuration page of the strategy executor is convenient for a user to complete configuration of the target strategy executor, free configuration of the dynamic table generation strategy is realized, and the requirement on the professional level of maintenance personnel is reduced.
Drawings
Fig. 1a is an application scenario schematic diagram of a configuration method of a policy executor provided in an embodiment of the present disclosure;
FIG. 1b is a schematic diagram of a management center provided in an embodiment of the present disclosure;
FIG. 1c is an initial prototype diagram of a policy list provided by an embodiment of the present disclosure;
fig. 1d is a schematic flow chart of a configuration method of a policy executor according to an embodiment of the present disclosure;
FIG. 1e is an initial prototype diagram of the strategy step details provided by the embodiments of the present specification;
FIG. 1f is a prototype diagram of configuration policy step details provided by embodiments of the present disclosure;
FIG. 1g is a prototype diagram of the completion of a detailed configuration of policy steps provided by an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of determining step entry provided in the embodiment of the present disclosure;
FIG. 3 is a schematic flow chart of determining a trigger time of a target policy actuator according to an embodiment of the present disclosure;
FIG. 4 is a prototype graph of an audit list of execution provided by an embodiment of the present description;
FIG. 5 is a prototype graph of audit detail provided by an embodiment of the present description;
FIG. 6a is a class diagram of a structural statement combination tool provided by an embodiment of the present disclosure;
FIG. 6b is a class diagram of a query statement combination tool provided by an embodiment of the present specification;
FIG. 7 is a prototype diagram of a policy list containing executable policies provided by an embodiment of the present specification;
FIG. 8 is a schematic diagram of policy executor configuration logic provided by an embodiment of the present disclosure;
FIG. 9 is a schematic diagram of a role relationship provided by embodiments of the present disclosure;
FIG. 10 is a schematic diagram of a configuration device of a policy enforcer provided in an embodiment of the present disclosure;
fig. 11 is an internal configuration diagram of a computer device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative and intended to explain the present invention and should not be construed as limiting the invention.
In the related technology, a service demand party respectively realizes related processing operation of a dynamic data table according to different service demands, and maintenance personnel are required to enter a database layer under a special scene to realize maintenance of data and related operation. The developer of the service demand side designates the structure of the data table in the initial setting, if the structure of the data table is required to be supplemented after the initialization, the developer of a higher level needs to spend additional workload to carry out secondary change on the structure of the data table and maintain the data logic matched with the secondary change.
However, the same operation is repeatedly performed a plurality of times based on the related art, resulting in low project delivery efficiency and low maintenance efficiency of maintenance personnel. In the face of complex business scenes, more developers are needed, and the technical level of the developers is high.
Based on this, the embodiment of the present specification provides a method for configuring a policy executor. Providing a configuration page for a target policy executor; under the condition that a policy identification configuration operation is received through a configuration page, determining a policy identification of a target policy executor; in the event that a policy step configuration operation is received via the configuration page, a set of execution steps that need to be pre-packaged in the target policy executor is determined. The target policy executor is used for processing the data table to be processed to obtain a target data table. The configuration page of the strategy executor can facilitate the user to complete the configuration of the target strategy executor, realize the free configuration of the dynamic table generation strategy, reduce the requirement on the professional level of maintenance personnel, and further uniformly manage the execution condition of the target strategy executor.
The configuration method of the policy executor provided in the embodiment of the present disclosure may be applied to the application scenario of fig. 1a, and the server 120 may be configured to determine, according to the policy identifier, a target policy executor to be executed in the policy executor pool, and process a data table to be processed through the target policy executor, to obtain the target data table. The terminal 110 may provide a configuration page for the target policy executor, and determine a policy identifier of the target policy executor when a policy identifier configuration operation is received through the configuration page; in the event that a policy step configuration operation is received via the configuration page, a set of execution steps that need to be pre-packaged in the target policy executor is determined. The terminal 110 is connected to the server 120 through a network.
Wherein the terminal 110 may be an electronic device having network access capabilities. Specifically, for example, terminal 110 may be a desktop computer, tablet computer, notebook computer, smart phone, digital assistant, smart wearable device, shopping guide terminal, television, smart speaker, microphone, and the like. Wherein, intelligent wearable equipment includes but is not limited to intelligent bracelet, intelligent wrist-watch, intelligent glasses, intelligent helmet, intelligent necklace etc.. The server 120 may be an electronic device with some arithmetic processing capability. Which may have a network communication module, a processor, memory, and the like. The server 120 may be a distributed server, and may be a system having a plurality of processors, memories, network communication modules, etc. operating in conjunction. Alternatively, the server 120 may be a server cluster formed for several servers. Alternatively, with the development of science and technology, the server 120 may be a new technical means capable of implementing the corresponding functions of the embodiment of the specification. For example, a new form of "server" based on quantum computing implementation may be possible.
For example, referring to fig. 1b, a management center may implement policy management and audit management, the policy management may implement step configuration and import and export functions of a policy template, and the audit management may implement viewing of audit details. Referring to FIG. 1c, a policy management page may be displayed by clicking on the policy list button 134 and an execution audit page may be displayed by clicking on the execution audit button 136. The policy management page includes an import button 138 and an export button 140, and the import button 138 can load the edited policy configuration information into a device that does not include the policy executor, thereby saving the time of the user. Configuration information of the policy executor contained in the current device can be exported through the export button 140, and the export file can directly store the configuration information of the policy executor through the import function. By clicking the query button 142, a lookup of the policy executor may be performed based on at least one of the entered policy code, policy name, and selected trigger type
Referring to fig. 1d, the method for configuring a policy executor may include the following steps:
s110, providing a configuration page aiming at the target policy executor.
S120, determining the strategy identification of the target strategy executor under the condition that the strategy identification configuration operation is received through the configuration page.
The policy identifier may be used to characterize a target policy executor, where each policy executor corresponds to a policy identifier and the policy identifier corresponding to each policy executor is different, and the policy identifier may be a policy code, and the policy code may be generated when performing policy configuration. Illustratively, the policy identification of the purchase order statistics policy may be C202212010001, the policy identification of the market quotation calculation policy may be C202212010002, and the policy identification of the purchase requisition dynamic table policy may be C202212010003.
Specifically, referring to FIG. 1c, the configuration page of the policy enforcer may be jumped to by clicking the add button 102 of FIG. 1 c. Referring to fig. 1e, a policy name corresponding to a target policy executor may be input in the text input box 104 corresponding to the policy name in fig. 1e, a policy code corresponding to the target policy executor may be input in the text input box 106 corresponding to the policy code in fig. 1e, and the policy code corresponding to the target policy executor may be a policy identifier corresponding to the target policy executor. In the case that the policy identification configuration operation is received through the configuration page, it may be determined that the policy identification of the target policy executor is the policy code corresponding to the target policy executor input in the text input box 106 corresponding to the policy code in fig. 1 e.
Illustratively, a purchase order statistics policy may be entered in the text entry box 104 corresponding to the policy name, and C202212010001 may be entered in the text entry box 106 corresponding to the policy code. In the case that a policy identification configuration operation is received through the configuration page, determining that the policy identification of the target policy executor corresponding to the purchase order statistics policy is C202212010001.
S130, under the condition that policy step configuration operation is received through a configuration page, determining an execution step set which needs to be pre-packaged in a target policy executor.
The execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first execution step corresponds to the step of entering the ginseng; the target strategy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, a data table to be processed is determined according to the data table parameters sent by the step entry and the terminal; in the second execution step, the data table to be processed is processed to obtain a target data table. The step entry comprises a data table name, a column identifier of a data column and a data type corresponding to the data column. The data table parameters comprise a policy identifier, a target source identifier of a target data source, a data table name, a column name of a data column, and a data type corresponding to the data column. The data type corresponding to the data column may be used to define the data type of the data entered into the column, such as the data type corresponding to the data column including, but not limited to, an int (integer) type, a big (integer of any length) type.
Specifically, referring to FIG. 1e, the add step button 112 of FIG. 1e may be clicked, and referring to FIG. 1f, a policy step configuration page 114 may be displayed by clicking the add step button 112 of FIG. 1 e. The name of the first execution step is input into the text input box 116 corresponding to the step name in the policy step configuration page 114, after the policy step configuration page 114 may perform configuration of the first execution step and then click the save button 108 in fig. 1f, the configuration information of the first execution step may be cached, and the name of the first execution step may be loaded and displayed on the policy step display page 118. Then clicking the new step button 112 in fig. 1f again may display a new policy step configuration page 114, inputting the name of the second execution step in the text input box 116 corresponding to the step name in the policy step configuration page 114, performing configuration of the second execution step in the policy step configuration page 114, and clicking the save button 108 in fig. 1f, where the configuration information of the second execution step may be cached, where the name of the second execution step may be loaded and displayed on the policy step display page 118. The sequence of the execution steps can be determined according to the sequence of the newly added steps, i.e. the execution time of the first execution step is earlier than the execution time of the second execution step.
It should be noted that, according to the purpose that the target policy executor needs to be executed, the execution steps included in the target policy executor and the purpose that each execution step can reach can be reasonably planned. The execution step set may include not only the first execution step and the second execution step, but also N (N > 2) execution steps. The particular sequence of steps in the target policy executor to perform the aggregate query and maintain the dynamic table structure may be determined based on the set of execution steps.
For example, referring to FIG. 1g, in the event that a policy step configuration operation is received via a configuration page, a set of execution steps for a purchase order statistics policy may be determined. The policy step display page 118 may learn that the purchase order statistics policy includes four execution steps of statistics table generation, raw order data pull, statistics data generation, and results query. The execution time of the statistical table generation step is earlier than the execution time of the original order data pulling step, which is earlier than the execution time of the statistical data generation step, which is earlier than the execution time of the result query step.
In a first execution step included in the target policy executor, the data table to be processed may be determined according to the step entry. And then in a second execution step included in the target policy executor, a target statement combination tool suitable for the data table parameters can be called in the policy executor pool according to the data table parameters, a target execution statement for pulling data required by the data table to be processed can be generated through the target statement combination tool, statement execution operation can be performed in a target data source according to the target execution statement, and a statement execution result can be obtained. And processing the data table to be processed according to the statement execution result in the result processor, so as to obtain the target data table.
In the configuration method of the policy executor, the target policy executor is used for processing the data table to be processed to obtain the target data table. Providing a configuration page for a target policy executor; under the condition that a policy identification configuration operation is received through a configuration page, determining a policy identification of a target policy executor; in the event that a policy step configuration operation is received via the configuration page, a set of execution steps that need to be pre-packaged in the target policy executor is determined. The configuration page of the policy executor can facilitate the user to complete configuration and management of the target policy executor, realize free configuration of the dynamic table generation policy, and save the information of the configuration page to the configuration database.
In some embodiments, referring to fig. 2, in the case that a policy step configuration operation is received through a configuration page, determining a set of execution steps that need to be pre-packaged in a target policy executor may include the steps of:
s210, responding to the precondition configuration operation through the configuration page, determining the precondition of the execution step in the execution step set, and generating a precondition judgment logic of the execution step.
Before the target strategy executor starts to run the execution step, the pre-set judgment logic is used for judging whether the preset execution condition of the execution step is met, and whether the execution step is run is determined according to the judgment result. The preset execution condition may be one condition or a plurality of conditions, and the preset execution condition may be set according to the specific situation of the policy step. Such as whether a data table name exists, whether data in the data table exists, etc.
Specifically, referring to fig. 1f, a precondition for a currently executed step may be input in the precondition text input box 122 in fig. 1f, a precondition for an executed step in the set of executed steps may be determined by a configuration page in response to a precondition configuration operation, and a precondition determination logic for the executed step may be generated. The pre-judging logic can judge whether the preset executing condition of the current strategy step is met, if the preset executing condition is met, the current strategy step can be continuously executed, and if the preset executing condition is not met, the current strategy step is not required to be executed. Illustratively, the pre-condition text input box 122 in fig. 1f may be a pre-condition of the statistics generation execution step, and the content within the pre-condition text input box 122 may be whether the data table t_order_calculation exists.
S220, responding to the step entry configuration operation through the configuration page, and determining to execute the step entry of the execution step in the step set.
The step entry comprises a data table name, a column identifier of a data column and a data type corresponding to the data column.
Specifically, referring to fig. 1f, a step entry of a currently executed step may be input in the step entry text input box 124 in fig. 1f, and the step entry of the executed step in the executed step set may be determined by the configuration page in response to the step entry configuration operation. Illustratively, the step entry text input box 124 in fig. 1f may be a step entry of the statistics generation execution step, and the content in the text input box 124 may be a data type bin corresponding to a data table name of t_order_calculation, a data column name of id, and a data column id.
In the configuration method of the policy executor, the configuration page responds to the configuration operation of the preconditions, the preconditions of the execution steps in the execution step set are determined, the preconditions of the execution steps are generated, and the configuration page responds to the configuration operation of the step entry, so that the step entry of the execution steps in the execution step set is determined. The pre-logic is used for judging the pre-conditions, so that whether the execution conditions of the strategy steps are met or not can be determined, and the consumption of computing resources can be reduced.
In some embodiments, having a step isolation configuration control in a configuration page may include: for any execution step, determining that any execution step is an isolation step in response to a selection operation of the step isolation configuration control.
If any execution step is abnormal in operation, any operation in the follow-up strategy steps is performed according to the step isolation mode corresponding to any execution step, and the jump, retry and continuous operation are performed.
Specifically, referring to FIG. 1f, a selection operation of the step isolation configuration control 126 in FIG. 1f can set whether the currently executing step requires step isolation. If the step isolation configuration control 126 is in the checked state, the currently executed step may be determined to be an isolated step in response to a selection operation of the step isolation configuration control. If the step isolation configuration control 126 is in an unchecked state, it may be determined that the isolation step is not required for the currently executed step. The statement execution exception exists in the execution statement corresponding to the current execution step, the execution of the target execution statement corresponding to the current execution step can be canceled, then the execution statement with the exception is jumped out, and then the transaction mode corresponding to the current execution step can be determined. In response to the selection operation of the step isolation configuration control, the step isolation configuration control 126 changes to the checked state, and then the transaction mode corresponding to the current policy step is the step isolation mode, and any operation of skipping, retrying, and continuing to execute the subsequent policy step is performed according to the configuration policy corresponding to the step isolation mode of the current policy step. If the configuration policy corresponding to the step isolation mode of the current policy step is a retry operation, the number of retries required when the current step is an isolation step may be set by the text input box 128 corresponding to the number of retries in fig. 1 f.
Illustratively, the step isolation configuration control 126 in the statistics table generation in fig. 1f is in a checking state, and the text input box 128 corresponding to the number of retries in the statistics table generation may be 3, which may be understood that if there is a statement execution abnormality in the execution statement corresponding to the statistics table generation step, the execution of the target execution statement corresponding to the current statistics table generation step may be cancelled first, then the execution statement having the abnormality may be jumped out, then the statistics table generation step may be re-executed, and if the statistics table generation step executes the abnormality again, the above operation may be executed again. If the number of times of repeated execution reaches three and the execution result is abnormal, an abnormal result can be displayed, and if the number of times of repeated execution does not reach three and the execution result is not abnormal, the subsequent steps can be continuously executed.
In the configuration method of the policy executor, for any execution step, in response to a selection operation of the step isolation configuration control, any execution step is determined to be an isolation step. By setting the step isolation mode, it is possible to specify an operation in which the policy step is to be performed in a transaction-independent manner. By setting the step isolation mode, the step can be independent, and if the step is abnormal, the step can be performed without affecting the execution of other strategy steps.
In some embodiments, referring to fig. 3, the method for configuring a policy enforcer may include the steps of:
s310, determining the trigger type of the target policy executor by responding to the trigger type configuration operation through the configuration page.
S320, determining the trigger time of the target policy executor by responding to the time expression configuration operation through the configuration page.
Wherein the trigger type comprises a timing trigger or a real-time trigger. The time expression configuration operation may complete the configuration of the time by a regular expression.
Specifically, referring to fig. 1e, setting of the trigger type of the target policy executor is performed through the pull-down selection box 130 corresponding to the trigger type in fig. 1 e. If the drop-down selection box 130 corresponding to the trigger type is selected to be real-time, the trigger type of the target policy executor can be determined to be real-time trigger by configuring the page to respond to the trigger type configuration operation, and if the drop-down selection box 130 corresponding to the trigger type is selected to be timing, the trigger type of the target policy executor can be determined to be timing trigger by configuring the page to respond to the trigger type configuration operation. When the trigger type of the target policy executor is timing trigger, the time setting of the timing trigger can be performed through the text input box 132 corresponding to the time expression in fig. 1e, and the trigger time of the target policy executor with the trigger type being timing trigger can be determined through the configuration page responding to the time expression configuration operation.
For example, referring still to fig. 1e, the drop-down selection box 130 corresponding to the trigger type in fig. 1e may be selected as real-time, and the trigger type of the purchase order statistics policy may be determined as a timed trigger. The text entry box 132 corresponding to the temporal expression in fig. 1e may be 00 10? Content 0.10 in text entry box 132 corresponding to the temporal expression? The expressed meaning is that the trigger time of the policy executor corresponding to the purchase order statistics policy is 10:00.
In the configuration method of the policy executor, the trigger type of the target policy executor is determined by the configuration page responding to the trigger type configuration operation, and the trigger time of the target policy executor is determined by the configuration page responding to the time expression configuration operation. The use of the target policy executor can be flexibly performed by determining the trigger type and the trigger time of the target policy executor.
In some embodiments, after the target policy enforcer completes execution, it may include: and responding to the checking operation of the execution result of the target strategy executor, and displaying an audit detail display page.
The audit detail display page is provided with an execution step set, a step parameter entering step, a step parameter exiting step, a step execution starting time and a step execution ending time. The step out parameter may be the result of performing the step in parameter of the current step and the pre-condition of the current step.
Specifically, the steps included in the target policy executor need to call the entry parameters in the execution process, the target policy executor generates an execution statement in the execution process, and the statement execution result can be obtained according to the execution statement. Therefore, the entry parameters, the statement execution results and the policy step execution conditions used by each policy step in the execution process of the target policy executor can be determined and recorded. After the target policy executor completes execution, the execution result can be checked through a visual page for executing audit. The visualization page executing the audit may display basic information of the target policy executor, such as policy code, policy name, trigger type of the policy, time when the policy starts executing, time when the policy ends executing, and executing status of the policy. Illustratively, the purchase order statistics policy, market quotation calculation policy have been completed. Referring to fig. 4, the basic information of the purchase order statistics policy is shown in fig. 4, the policy name of the purchase order statistics policy is C202212010001, the trigger type of the purchase order statistics policy is timing, the starting time of the purchase order statistics policy is 2022-11-01:00:00, the ending time of the purchase order statistics policy is 2022-11-01:10:03:08, and the execution status of the purchase order statistics policy is successful. In fig. 4, basic information of a policy name of a purchase application dynamic table policy is displayed, the policy code of the purchase application dynamic table policy is C202212010003, the trigger type of the purchase application dynamic table policy is real-time, the starting execution time of the purchase application dynamic table policy is 2022-11-04 21:42:56, the ending execution time of the purchase application dynamic table policy is 2022-11-04 21:43:58, and the execution state of the purchase order statistics policy is failure.
By clicking on the details under the operation column in fig. 4, the execution result of the target policy executor can be checked, and the operation of responding to the clicking on the details can be skipped to the audit detail display page. The detailed information of the target strategy executor can be displayed in an audit detail display page, and the audit detail display page is provided with an execution step set, a step parameter entering, a step parameter exiting, a step execution starting time and a step execution ending time. It should be noted that, the audit detail presentation page may further include an execution result of the executing step, a trigger type of the target policy executor, and an execution state of the target policy executor. The step execution result may include both success and failure. The trigger types of the target policy executor may include both a timing trigger and a real-time trigger. The execution state of the target policy executor may include success and failure.
Illustratively, the target policy executor may be a purchase order statistics policy, and by clicking on the detail 410 in FIG. 4, may jump to an audit detail presentation page corresponding to the purchase order statistics policy. Referring to fig. 5, fig. 5 is an audit detail display page corresponding to a purchase order statistics policy, where the audit detail display page corresponding to the purchase order statistics policy has a trigger type 560, and the trigger type 560 of the purchase order statistics policy may be a timing. The audit detail presentation page has an execution status 570 therein, and the executed status 570 of the purchase order statistics policy may be successful. The audit detail presentation page has an executing step set 510, and the executing step set 510 of the purchase order statistics policy includes: 1. generating a statistical table, 2, pulling original order data, 3, generating statistical data and 4, inquiring results. The audit detail presentation page has a step entry 520 therein. The audit detail presentation page has a step out of the parameters 530. The audit detail presentation page has a step execution start time 540 therein, and the step execution start time 540 for the generation of the statistics may be 2022-11-01 10:00:02. The audit detail presentation page has a step execution end time 550 therein, and the step execution end time 550 for the statistics generation may be 2022-11-01 10:01:11. The audit detail presentation page has a step result 580 therein, and the step result 580 generated by the statistics table may be successful.
In the configuration method of the policy executor, the audit detail display page is displayed in response to the checking operation of the execution result of the target policy executor. By storing the execution record of the target strategy executor as audit information, the user can check the audit information conveniently, and the user can know the information of each parameter, execution result and the like of the target strategy executor more conveniently and rapidly when checking the audit information in the later period.
In some embodiments, after the target policy enforcer completes the configuration, it may include: caching the target strategy executor into a strategy executor pool so as to search and determine the corresponding strategy executor in the strategy executor pool according to the strategy identifier sent by the terminal.
The policy executor pool may include a policy executor stored in advance, and may also include a policy executor configured according to a service requirement.
Specifically, after receiving the execution request, the target policy executor loads configuration information of the target policy executor into the cache. If the target policy executor is already stored in the policy executor pool, the configuration information of the target policy executor in the policy executor pool can be emptied, then the target policy executor is executed again, the configuration information of the target policy executor is reloaded into the cache, and the target policy executor is cached in the policy executor pool. Searching in the policy executor pool according to the policy identifier sent by the terminal, and if a policy executor consistent with the policy identifier sent by the terminal exists, determining the policy executor corresponding to the policy identifier sent by the terminal.
In the configuration method of the policy executor, the target policy executor is cached in the policy executor pool, so that the corresponding policy executor is searched and determined in the policy executor pool according to the policy identifier sent by the terminal. By reading the policy executor from the cache, time may be saved in determining a policy executor consistent with the policy identification sent by the terminal.
In some embodiments, the performing of the second performing step may include: under the condition of maintaining the data table structure, determining metadata information of the data table according to the data table parameters; the metadata information is transmitted into a sentence combination tool with a default structure to carry out sentence assembly, so that a first execution sentence is obtained; determining the database type of a target data source according to a target source identifier sent by a terminal; and transmitting the first execution statement to an extended structure statement combination tool corresponding to the database type, and executing structure statement authority check to obtain a target execution statement for processing the data table to be processed.
Wherein, maintaining the dynamic table structure can be maintaining the dynamic table through metadata information. Referring to fig. 6a, the sentence combination tool is a parent class, and the sentence combination tool includes two subclasses of a structural sentence combination tool and a query sentence combination tool. The structural statement combination tool is a parent class, and can comprise four subclasses of a default structural statement combination tool, a MySQL structural statement combination tool, an MSSql structural statement combination tool and an Oracle structural statement combination tool. The MySQL structural statement combination tool, the MSSql structural statement combination tool and the Oracle structural statement combination tool are expansion structural statement combination tools. Structural parameters are used in the structural statement combination tool, wherein the structural parameters are used as member variables of the structural statement combination tool. Structural parameter details and query conditions are used in the structural parameters, wherein the structural parameter details and the query conditions serve as member variables of the structural parameters. The default structure statement combination tool may include database construction statements common to databases. The extended structure sentence combination tool can comprise database construction sentences corresponding to various types of databases, and each type of database corresponds to one extended structure sentence combination tool. Metadata information, also called intermediate data and relay data, is mainly information describing data attributes and is used for supporting functions such as indicating storage locations, historical data, resource searching, file recording and the like. Metadata information may include the name of the data table, the list of fields (including but not limited to field name, data type, data length and precision, field order, must fill identification and primary key identification), and the structure of the index list. The authority check can set parameters required by the authority check according to actual conditions. For example, the creation of a data table structure may perform a permission check on the data table names. Note that the sentence combination tool may also be referred to as a sentence builder. The structural statement combination tool may be referred to as a structural statement constructor and the query statement combination tool may be referred to as a query statement constructor.
Specifically, under the condition of maintaining the dynamic table structure, metadata information of the dynamic table is determined according to data table parameters, after the metadata information is received, whether preset execution conditions are met or not is judged according to a pre-judgment logic, and if the preset execution conditions are not met, the current strategy can be directly ended. If the preset execution condition is met, the metadata information can be transmitted into a statement combination tool with a default structure to carry out statement assembly, and a first execution statement is obtained. The database type of the target data source may then be determined based on the target source identification sent by the terminal. And transmitting the first execution statement to an extended structure statement combination tool corresponding to the database type of the target data source, performing authority verification on the database layer on the structure statement, and if the authority verification is passed, obtaining a target execution statement for processing the data table to be processed. If the permission verification is not passed, prompting of permission abnormality is carried out.
In the configuration method of the policy executor, under the condition of maintaining the data table structure, the metadata information of the data table is determined according to the data table parameters; the metadata information is transmitted into a sentence combination tool with a default structure to carry out sentence assembly, so that a first execution sentence is obtained; determining the database type of a target data source according to a target source identifier sent by a terminal; and transmitting the first execution statement to an extended structure statement combination tool corresponding to the database type, and executing structure statement authority check to obtain a target execution statement for processing the data table to be processed. The complex maintenance work such as dynamic generation, supplement, index management and the like which are common in encapsulation abstracts the business system from specific maintenance logic such as the structure of a data table.
In some embodiments, the performing of the second performing step may include: under the condition of aggregation query, determining parameters for query required by the aggregation query according to the parameters of the data table; the parameters for query are transmitted into a default query statement combination tool to carry out statement assembly, and a second execution statement is obtained; determining the database type of a target data source according to a target source identifier sent by a terminal; and transmitting the second execution statement to an extended query statement combination tool corresponding to the database type to obtain a target execution statement for processing the data table to be processed.
Wherein, the aggregate query may be a lookup of the required data by the query parameters. Referring to fig. 6b, the sentence combination tool is a parent class, and the sentence combination tool includes two subclasses of a structural sentence combination tool and a query sentence combination tool. The query statement combination tool is a parent class, and the query statement combination tool can comprise four subclasses of a default query statement combination tool, a MySQL query statement combination tool, an MSSql query statement combination tool and an Oracle query statement combination tool. MySQL query statement combination tool, MSSql query statement combination tool, oracle query statement combination tool are extended query statement combination tools. Query parameters are used in the query statement combination tool, wherein the query parameters are member variables of the query statement combination tool. Query conditions are used in the query parameters, wherein the query conditions are member variables of the query parameters. The default query statement combination tool may include database query statements that are common in databases. The extended query sentence combination tool can comprise database query sentences corresponding to various types of databases, and each type of database corresponds to one extended query sentence combination tool. The parameters for query may include column names of data columns, query and table-connecting conditions (which need to specify operators including but not limited to =, | =, >, > =, <, < =), aggregation function declarations (including but not limited to sum, avg), grouping and ordering conditions.
Specifically, in the case of aggregation query, determining parameters for query required by the aggregation query according to the parameters of the data table, after receiving the parameters for query, firstly judging whether preset execution conditions are met according to the pre-judging logic, and if the preset execution conditions are met, transmitting the parameters for query into a default query statement combination tool for statement assembly to obtain a second execution statement. The database type of the target data source may then be determined based on the target source identification sent by the terminal. And transmitting the second execution statement to an extended structure statement combination tool corresponding to the database type of the target data source, so that the target execution statement for processing the data table to be processed can be obtained.
In the configuration method of the policy executor, under the condition of aggregation query, parameters for query required by the aggregation query are determined according to the parameters of the data table; the parameters for query are transmitted into a default query statement combination tool to carry out statement assembly, and a second execution statement is obtained; determining the database type of a target data source according to a target source identifier sent by a terminal; and transmitting the second execution statement to an extended query statement combination tool corresponding to the database type to obtain a target execution statement for processing the data table to be processed. By providing the aggregation query function, the complexity of service call and codes can be reduced, and the service party can realize the upper-layer service.
Under the condition that the configuration operation of the strategy step is received through the configuration page, the configuration information of the strategy step can be stored, and the configuration information of the strategy step can be checked through the strategy list visualization page after being stored. Referring to fig. 7, the basic information of the purchase order statistics policy is shown in fig. 7, the policy code of the purchase order statistics policy is C202212010001, the trigger type of the purchase order statistics policy is timing, the number of steps of the purchase order statistics policy is 4, and the status of the purchase order statistics policy is enabled. The state of the purchase order statistics policy is enabled, the editing function under the operation bar can jump to a configuration page of the purchase order statistics policy, information in the configuration page can be modified and stored, then the purchase order statistics policy can be executed according to the modified configuration information, and the execution of the purchase order statistics policy can be stopped through the disabling function under the operation bar. Fig. 7 shows basic information of a policy name of a purchase application dynamic table policy, wherein the policy code of the purchase application dynamic table policy is C202212010003, the trigger type of the purchase application dynamic table policy is real-time, the number of steps of the purchase application dynamic table policy is 3, and the state of the purchase application dynamic table policy is forbidden. The state of the purchase application dynamic table strategy is forbidden, the configuration page of the purchase order statistics strategy can be jumped to through the checking function under the operation bar, the configuration information of the purchase order statistics strategy can be checked through the jumped configuration page, the change of the configuration information can not be realized under the current state, and the purchase order statistics strategy can be deleted from the strategy executor pool through the deleting function under the operation bar.
Referring to fig. 8, fig. 8 is a logic diagram of configuration of a policy enforcer. After the configuration of the policy executor is started, the configuration information of the policy executor can be loaded into a cache, the setting of the cache is read to judge whether the policy executor executes at a fixed time, if the policy executor executes at a fixed time, the fixed time task can be loaded at the fixed time, or the fixed time task can be always polled until the fixed time reaches the fixed time, and the policy executor is submitted to a policy task scheduling manager after the fixed time reaches the fixed time, and the policy task scheduling manager can execute the policy executor according to the configured fixed time. If the policy executor is not executed at regular time, the policy executor can be considered to be executed in real time, the configuration information of the policy executor can be extracted at the entrance of the terminal according to the policy identifier, and the policy executor can be directly executed after the data table parameters sent by the terminal are assembled.
The capabilities of the terminal portal, the policy executor and the management center are clear and bordered. The strategy executor is used as a core and bears the capabilities of dynamic table generation, aggregation query and strategy execution, the inside of the strategy executor is encapsulated processing logic, and the strategy executor opens an interface towards a terminal and a management center. And the policy executor executes the specific policy steps of dynamic table creation, data cleaning, data query and the like in a chained mode according to the policy configuration. The terminal portal may interact with external systems, components, modules, and may invoke policy executors. In the management center, management work of the contents such as policy maintenance, audit execution, template management and the like can be completed. Referring to fig. 9, the terminal portal sends a real-time request to the policy executor, the policy executor executes the command of the request, the policy executor generates a dynamic list or aggregates the query dynamic list or maintains the dynamic list structure according to the command of the request, the policy executor ends executing the command, and generates an execution record, the execution record is stored in the audit information center, and the management center can view the audit information. The step maintenance performed by the management center changes the strategy configuration, the strategy executor reads the strategy configuration, if the strategy configuration is changed, the corresponding method logic in the strategy executor is correspondingly changed, the strategy executor can read the changed strategy configuration, and then the strategy executor can be executed according to the changed strategy configuration information. The management center can trigger the strategy executor by setting the timing or in real time, and the strategy executor can execute according to the mode set by the management center.
Referring to fig. 10, a configuration apparatus 1000 of a policy actuator is provided in an embodiment of the present disclosure, the configuration apparatus 1000 of a policy actuator includes: a configuration page providing module 1010, a policy identification determining module 1020, and a step set determining module 1030.
A configuration page providing module 1010, configured to provide a configuration page for a target policy executor;
a policy identifier determining module 1020, configured to determine a policy identifier of the target policy executor when a policy identifier configuration operation is received through the configuration page;
a step set determining module 1030, configured to determine, when a policy step configuration operation is received through the configuration page, a set of execution steps that needs to be pre-packaged in the target policy executor; the execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first executing step corresponds to the step of entering the reference; the target policy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, the data table to be processed is determined according to the data table parameters sent by the parameter entering and terminal in the step; and in the second execution step, the data table to be processed is processed to obtain the target data table.
For a specific description of the configuration apparatus 1000 of the policy actuator, reference may be made to the description of the configuration method of the policy actuator hereinabove, and the detailed description thereof will be omitted.
In some embodiments, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 11. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a method of configuring a policy enforcer. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 11 is merely a block diagram of a portion of the structure associated with the aspects disclosed herein and is not limiting of the computer device to which the aspects disclosed herein apply, and in particular, the computer device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In some embodiments, a computer device is provided, comprising a memory in which a computer program is stored, and a processor which, when executing the computer program, carries out the method steps of the above embodiments.
The present description embodiment provides a computer-readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method of any of the above embodiments.
An embodiment of the present specification provides a computer program product comprising instructions which, when executed by a processor of a computer device, enable the computer device to perform the steps of the method of any one of the embodiments described above.
It should be noted that the logic and/or steps represented in the flowcharts or otherwise described herein, for example, may be considered as a ordered listing of executable instructions for implementing logical functions, and may be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium may even be paper or other suitable medium upon which the program is printed, as the program may be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner, if necessary, and then stored in a computer memory.

Claims (10)

1. A method for configuring a policy enforcer, the method comprising:
providing a configuration page for a target policy executor;
under the condition that a policy identification configuration operation is received through the configuration page, determining a policy identification of the target policy executor;
under the condition that a strategy step configuration operation is received through the configuration page, determining an execution step set which needs to be pre-packaged in the target strategy executor; the execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first executing step corresponds to the step of entering the reference; the target policy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, the data table to be processed is determined according to the data table parameters sent by the parameter entering and terminal in the step; and in the second execution step, the data table to be processed is processed to obtain the target data table.
2. The method of claim 1, wherein the determining a set of execution steps that need to be pre-packaged in the target policy executor if a policy step configuration operation is received through the configuration page comprises:
The configuration page responds to the precondition configuration operation, the precondition of the execution step in the execution step set is determined, and the precondition judgment logic of the execution step is generated; before the target strategy executor starts to run the execution step, judging whether preset execution conditions of the execution step are met or not through the pre-judging logic, and determining whether to run the execution step according to a judgment result;
responding to step entry configuration operation through the configuration page, and determining step entry of an execution step in the execution step set; the step entry comprises a data table name, a column identifier of a data column and a data type corresponding to the data column.
3. The method of claim 1 or 2, wherein the configuration page has a step isolation configuration control therein, the method further comprising:
for any execution step, responding to the selection operation of a step isolation configuration control, and determining that any execution step is an isolation step; and if the operation of any execution step is abnormal, any operation of jumping, retrying and continuing to operate the subsequent strategy step is performed according to the step isolation mode corresponding to the any execution step.
4. The method according to claim 1, wherein the method further comprises:
determining the trigger type of the target policy executor by the configuration page in response to trigger type configuration operation; the trigger type comprises timing trigger or real-time trigger;
and responding to the time expression configuration operation through the configuration page, and determining the trigger time of the target strategy executor.
5. The method of claim 1, wherein after the target policy enforcer completes execution, the method further comprises:
responding to the checking operation of the execution result of the target strategy executor, and displaying an audit detail display page; the audit detail display page is provided with the execution step set, the step parameter entering, the step parameter exiting, the step execution starting time and the step execution ending time.
6. The method of claim 1, wherein after the target policy enforcer completes configuration, the method further comprises:
and caching the target strategy executor into a strategy executor pool so as to search and determine a corresponding strategy executor in the strategy executor pool according to the strategy identifier sent by the terminal.
7. The method of claim 1, wherein the performing of the second performing step further comprises:
under the condition of maintaining a data table structure, determining metadata information of the data table according to the data table parameters; the metadata information is transmitted into a statement combination tool with a default structure to carry out statement assembly, and a first execution statement is obtained; determining the database type of a target data source according to the target source identifier sent by the terminal; the first execution statement is transmitted to an extended structure statement combination tool corresponding to the database type, and structural statement authority checking is executed to obtain a target execution statement for processing the data table to be processed; or alternatively
Under the condition of aggregation query, determining parameters for query required by the aggregation query according to the data table parameters; the parameters for query are transmitted into a default query statement combination tool to carry out statement assembly, and a second execution statement is obtained; determining the database type of a target data source according to the target source identifier sent by the terminal; and transmitting the second execution statement to an extended query statement combination tool corresponding to the database type to obtain a target execution statement for processing the data table to be processed.
8. A configuration device of a policy executor, the device comprising:
the configuration page providing module is used for providing a configuration page aiming at the target policy executor;
the policy identification determining module is used for determining the policy identification of the target policy executor under the condition that the policy identification configuration operation is received through the configuration page;
the step set determining module is used for determining an execution step set which needs to be pre-packaged in the target policy executor under the condition that policy step configuration operation is received through the configuration page; the execution step set comprises a first execution step and a second execution step, wherein the execution time of the first execution step is earlier than the execution time of the second execution step; the first executing step corresponds to the step of entering the reference; the target policy executor is used for processing the data table to be processed to obtain a target data table; in the first execution step, the data table to be processed is determined according to the data table parameters sent by the parameter entering and terminal in the step; and in the second execution step, the data table to be processed is processed to obtain the target data table.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 7 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any one of claims 1 to 7.
CN202310577150.8A 2023-05-22 2023-05-22 Configuration method and device of policy executor, computer equipment and storage medium Active CN116302211B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310577150.8A CN116302211B (en) 2023-05-22 2023-05-22 Configuration method and device of policy executor, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310577150.8A CN116302211B (en) 2023-05-22 2023-05-22 Configuration method and device of policy executor, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116302211A true CN116302211A (en) 2023-06-23
CN116302211B CN116302211B (en) 2023-11-21

Family

ID=86834482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310577150.8A Active CN116302211B (en) 2023-05-22 2023-05-22 Configuration method and device of policy executor, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116302211B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556482A (en) * 2003-12-31 2004-12-22 中兴通讯股份有限公司 Data processing method for realizing data base multitable inguiry
US20070016558A1 (en) * 2005-07-14 2007-01-18 International Business Machines Corporation Method and apparatus for dynamically associating different query execution strategies with selective portions of a database table
CN101196926A (en) * 2007-12-29 2008-06-11 中国建设银行股份有限公司 Database access platform and access method thereof
CN108399196A (en) * 2018-01-30 2018-08-14 福建星瑞格软件有限公司 The sql automatic execution methods and system of database sql sentence Auto-Generation Tools
US20210390096A1 (en) * 2020-06-10 2021-12-16 Lyngo Analytics Inc. Method and system for data conversations
CN114416075A (en) * 2022-01-26 2022-04-29 京东方科技集团股份有限公司 Service processing method and device
CN115062051A (en) * 2022-06-08 2022-09-16 广州鲁邦通智能科技有限公司 Universal assembly cross-database language query method and system
CN115146815A (en) * 2021-03-31 2022-10-04 腾讯科技(深圳)有限公司 Service processing method, device, computer and readable storage medium
CN115480843A (en) * 2022-10-17 2022-12-16 中国电信股份有限公司 Service processing method and device, electronic equipment and nonvolatile storage medium
CN115794112A (en) * 2022-11-18 2023-03-14 北京安天网络安全技术有限公司 Strategy generation method and device and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556482A (en) * 2003-12-31 2004-12-22 中兴通讯股份有限公司 Data processing method for realizing data base multitable inguiry
US20070016558A1 (en) * 2005-07-14 2007-01-18 International Business Machines Corporation Method and apparatus for dynamically associating different query execution strategies with selective portions of a database table
CN101196926A (en) * 2007-12-29 2008-06-11 中国建设银行股份有限公司 Database access platform and access method thereof
CN108399196A (en) * 2018-01-30 2018-08-14 福建星瑞格软件有限公司 The sql automatic execution methods and system of database sql sentence Auto-Generation Tools
US20210390096A1 (en) * 2020-06-10 2021-12-16 Lyngo Analytics Inc. Method and system for data conversations
CN115146815A (en) * 2021-03-31 2022-10-04 腾讯科技(深圳)有限公司 Service processing method, device, computer and readable storage medium
CN114416075A (en) * 2022-01-26 2022-04-29 京东方科技集团股份有限公司 Service processing method and device
CN115062051A (en) * 2022-06-08 2022-09-16 广州鲁邦通智能科技有限公司 Universal assembly cross-database language query method and system
CN115480843A (en) * 2022-10-17 2022-12-16 中国电信股份有限公司 Service processing method and device, electronic equipment and nonvolatile storage medium
CN115794112A (en) * 2022-11-18 2023-03-14 北京安天网络安全技术有限公司 Strategy generation method and device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
高峰;王国复;喻雯;冯明农;罗琦;: "基于策略配置的气象数据库业务监视系统", 计算机工程, vol. 36, no. 16, pages 249 - 250 *

Also Published As

Publication number Publication date
CN116302211B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
CN103380423B (en) For the system and method for private cloud computing
US20210208854A1 (en) System and method for enhancing component based development models with auto-wiring
US9245256B2 (en) Assigning and managing reviews of a computing file
CN112800370B (en) Processing method and device of business document, computer equipment and storage medium
CN109814856A (en) Data entry method, device, terminal and computer readable storage medium
CN109902255B (en) Page mixed browsing record generation method, device, equipment and storage medium
CN102142014B (en) System and method for export and import of metadata located in metadata registries
CN100437478C (en) System and method for interactive wireless applications
US10275234B2 (en) Selective bypass of code flows in software program
CN111984239A (en) Page configuration method, device, server and storage medium
CN111784318A (en) Data processing method and device, electronic equipment and storage medium
CN114003473A (en) Page operation behavior backtracking method and device and electronic equipment
WO2014100713A1 (en) Simplified product configuration using table-based rules, rule conflict resolution through voting, efficient model compilation, rule assignments and templating
CN113849492B (en) System for providing standardized data quality check for multi-scene service
US8402433B2 (en) Method and system for performing automated transactions using a server-side script-engine
CN116302211B (en) Configuration method and device of policy executor, computer equipment and storage medium
CN111240998A (en) Test case processing method and device
US20220179839A1 (en) Data processing system and cache update control method
CN115827051A (en) Software integration management system, method and server
CN115422202A (en) Service model generation method, service data query method, device and equipment
CN116521686B (en) Dynamic data table processing method, device, computer equipment and storage medium
Lehner et al. A pattern catalog for augmenting Digital Twin models with behavior
CN114707961A (en) Pending task execution method, device, equipment, medium and program product based on approval flow configuration
CN113296912A (en) Task processing method, device and system, storage medium and electronic equipment
CN113064987A (en) Data processing method, apparatus, electronic device, medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant