CN116662303A - Application program change strategy generation method and device - Google Patents

Application program change strategy generation method and device Download PDF

Info

Publication number
CN116662303A
CN116662303A CN202310654768.XA CN202310654768A CN116662303A CN 116662303 A CN116662303 A CN 116662303A CN 202310654768 A CN202310654768 A CN 202310654768A CN 116662303 A CN116662303 A CN 116662303A
Authority
CN
China
Prior art keywords
data
application program
file
target
database
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310654768.XA
Other languages
Chinese (zh)
Inventor
郭华
陆斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310654768.XA priority Critical patent/CN116662303A/en
Publication of CN116662303A publication Critical patent/CN116662303A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/214Database migration support
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The disclosure provides a method, a device, equipment and a storage medium for generating an application program change strategy, which can be applied to the technical field of big data and the technical field of finance. The method comprises the following steps: acquiring target data, wherein the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a migrated database, and the second target application program represents an initial application program which is used for realizing the same function as the first target application program; processing target data by calling a first target application program to obtain a first data file; processing the target data by calling a second target application program to obtain a second data file; and performing file comparison operation on the first data file and the second data file, and generating an application program change strategy corresponding to the second target application program.

Description

Application program change strategy generation method and device
Technical Field
The present disclosure relates to the field of big data technology and the field of financial technology, and in particular, to a method, an apparatus, a device, a medium, and a program product for generating an application program change policy.
Background
The phenomenon that the electronic information system changes database products happens sometimes, and aiming at the phenomenon that the electronic information system changes database products, except for migrating data objects and business data in an original database to a new database, under the goal that the electronic information system keeps business functions unaffected, the system program is usually required to be adapted and modified according to the characteristics of the new database product, and the integrity and the correctness of the system program after the adaptation and modification are verified. However, in the related art, the integrity and the correctness of the system program are verified, and the verification efficiency and the accuracy are low.
Therefore, how to ensure the integrity and the correctness of the system program after the adaptation and transformation aiming at the characteristics of the new database products is a technical problem to be solved in the related technology when the electronic information system is used for database migration.
Disclosure of Invention
In view of the foregoing, the present disclosure provides an application modification policy generation method, apparatus, device, medium, and program product.
According to a first aspect of the present disclosure, there is provided an application change policy generation method, including:
acquiring target data, wherein the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a migrated database, and the second target application program represents an initial application program for realizing the same function as the first target application program;
Processing the target data by calling the first target application program to obtain a first data file;
processing the target data by calling the second target application program to obtain a second data file;
and performing file comparison operation on the first data file and the second data file to generate an application program change strategy corresponding to the second target application program.
According to an embodiment of the present disclosure, the above application program change policy generating method further includes:
under the condition of performing first file comparison operation, copying and migrating service data in a first database to a second database and a backup database to obtain the service data in the second database and the backup database, wherein the first database represents a database before migration and the second database represents a database after migration; and
and under the condition of carrying out non-primary file comparison operation, carrying out repair operation on the data to be repaired, wherein the data state of the data in the first database and the data state in the second database are changed, by utilizing the service data in the backup database.
According to an embodiment of the present disclosure, in the case of performing a non-first file comparison operation, performing a repair operation on data to be repaired, in which a data state of the first database and the second database is changed, by using the service data in the backup database, includes:
When the data to be repaired exists in the first database or the data to be repaired exists in the second database, the data corresponding to the data to be repaired in the first database and the second database are emptied; and
copying data corresponding to the data to be repaired from the service data in the backup database to the first database and the second database.
According to an embodiment of the present disclosure, the processing the target data by calling the first target application program to obtain a first data file includes:
grouping the first target application programs according to preset rules to obtain a plurality of first application programs, wherein the first target application programs represent programs for processing the service data;
and processing the target data by calling at least one first application program to obtain the first data file, wherein the at least one first application program characterizes a program used for processing the target data in the first target application program, and the service data comprises the target data.
According to an embodiment of the present disclosure, the processing the target data by calling the second target application program to obtain a second data file includes:
Grouping the second target application programs according to the preset rules to obtain a plurality of second application programs, wherein the second target application programs represent programs for processing the service data;
and processing the target data by calling at least one second application program to obtain the second data file, wherein the at least one first application program characterizes a program used for processing the target data in the second target application program.
According to an embodiment of the present disclosure, the performing a file comparison operation on the first data file and the second data file, to generate an application program change policy corresponding to the second target application program, includes:
performing file comparison operation on the first data file and the second data file to obtain a file comparison report;
and generating the application program changing strategy corresponding to the second target application program according to the file comparison report.
According to an embodiment of the present disclosure, the performing a file comparison operation on the first data file and the second data file to obtain a file comparison report includes:
comparing the name of each first target file in the first data files with the name of each second target file in the second data files to obtain a first comparison result corresponding to each first target file;
Under the condition that the first comparison result represents that the second target file with the same name as the first target file exists in the second data file, consistency comparison is carried out on the first target file and the second target file, and a second comparison result is obtained;
and obtaining the file comparison report corresponding to the first data file and the second data file based on the first comparison results and the second comparison results.
According to an embodiment of the present disclosure, the above application program change policy generating method further includes:
under the condition that the second target application program is changed according to the application program changing strategy to obtain a new second target application program, performing file comparison operation on a new second data file obtained by calling the new second target application program and a new first data file obtained by calling the first target application program to obtain a new file comparison report;
and generating a new application program changing strategy corresponding to the new second target application program according to the new file comparison report.
A second aspect of the present disclosure provides an application modification policy generation apparatus, including: the device comprises an acquisition module, a first calling module, a second calling module and a comparison module. The system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring target data, the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a database after migration, and the second target application program represents an initial application program used for realizing the same function as the first target application program. And the first calling module is used for processing the target data by calling the first target application program to obtain a first data file. And the second calling module is used for processing the target data by calling the second target application program to obtain a second data file. And the comparison module is used for performing file comparison operation on the first data file and the second data file and generating an application program change strategy corresponding to the second target application program.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method described above.
A fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described method.
A fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above method.
According to the application program change strategy generation method, device, equipment, medium and program product, the first target application program is called to process target data, a first data file can be obtained, the second target application program is called to process target data, and a second data file can be obtained, wherein the second target application program is obtained by initially changing the first target application program according to the characteristics of the migrated database, and the first data file and the second data file are subjected to file comparison operation, so that the integrity and correctness of the second target application program can be verified, the missing part and the error part in the second target application program are changed according to the generated application program change strategy corresponding to the second target application program, and the integrity and correctness of the second target application program are improved.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be more apparent from the following description of embodiments of the disclosure with reference to the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario diagram of an application change policy generation method according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an application change policy generation method according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a flowchart of obtaining a document alignment report according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a structural schematic of an alignment tool according to an embodiment of the present disclosure;
FIG. 5 schematically illustrates a front end interface schematic of an alignment tool according to an embodiment of the disclosure;
FIG. 6 schematically illustrates a schematic diagram of a document alignment report according to an embodiment of the disclosure;
FIG. 7 schematically illustrates a block diagram of an application change policy generation device according to an embodiment of the present disclosure; and
fig. 8 schematically illustrates a block diagram of an electronic device adapted to implement an application change policy generation method according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where expressions like at least one of "A, B and C, etc. are used, the expressions should generally be interpreted in accordance with the meaning as commonly understood by those skilled in the art (e.g.," a system having at least one of A, B and C "shall include, but not be limited to, a system having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In the technical scheme of the disclosure, the related data (such as including but not limited to personal information of a user) are collected, stored, used, processed, transmitted, provided, disclosed, applied and the like, all conform to the regulations of related laws and regulations, necessary security measures are adopted, and the public welcome is not violated.
In the process of realizing the present disclosure, it is found that after the program for generating the system data file (such as various statistics report forms and upstream and downstream interaction files) according to the service data processing is adapted and modified, the integrity and correctness of the adapting and modifying of the program are generally verified by manually comparing the data files generated before and after the modification. For an electronic information system with a large number of data files, manually checking the number and the content of the files generated by a program after being adapted and modified, and easily checking partial data files when the number of the files is large; when the line record length of the data file is longer (more than 150 bits), the mouse is required to be manually dragged to display one line of data in the screen for checking and checking, so that the checking efficiency is lower; when the data file uses 'invisible characters' as line record line-feeding symbols, the record line-feeding symbols are modified by mistake (for example, the record line-feeding symbols are modified from 0D0A to 0D) when the program is adapted and modified, and the modification difference is difficult to find by manual verification, so that the accuracy of a verification result is not high. Therefore, how to ensure the integrity and the correctness of the system program after the adaptation and transformation aiming at the characteristics of the new database products is a technical problem to be solved in the related technology when the electronic information system is used for database migration.
To this end, an embodiment of the present disclosure provides an application modification policy generation method, including: acquiring target data, wherein the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a migrated database, and the second target application program represents an initial application program which is used for realizing the same function as the first target application program; processing target data by calling a first target application program to obtain a first data file; processing the target data by calling a second target application program to obtain a second data file; and performing file comparison operation on the first data file and the second data file, and generating an application program change strategy corresponding to the second target application program.
Fig. 1 schematically illustrates an application scenario diagram of an application change policy generation method according to an embodiment of the present disclosure.
As shown in fig. 1, an application scenario 100 according to this embodiment may include a first terminal device 101, a second terminal device 102, a third terminal device 103, a network 104, and a server 105. The network 104 is a medium used to provide a communication link between the first terminal device 101, the second terminal device 102, the third terminal device 103, and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 through the network 104 using at least one of the first terminal device 101, the second terminal device 102, the third terminal device 103, to receive or send messages, etc. Various communication client applications, such as a shopping class application, a web browser application, a search class application, an instant messaging tool, a mailbox client, social platform software, etc. (by way of example only) may be installed on the first terminal device 101, the second terminal device 102, and the third terminal device 103.
The first terminal device 101, the second terminal device 102, the third terminal device 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by the user using the first terminal device 101, the second terminal device 102, and the third terminal device 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
For example, the server 105 may obtain the target data, call the first target application program to process the target data to obtain a first data file, call the second target application program to process the target data to obtain a second data file, and finally perform a file comparison operation on the first data file and the second data file to generate an application program change policy corresponding to the second target application program.
It should be noted that, the application program change policy generating method provided by the embodiments of the present disclosure may be generally executed by the server 105. Accordingly, the application modification policy generation apparatus provided by the embodiments of the present disclosure may be generally provided in the server 105. The application change policy generation method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105. Accordingly, the application change policy generating apparatus provided by the embodiments of the present disclosure may also be provided in a server or a server cluster that is different from the server 105 and is capable of communicating with the first terminal device 101, the second terminal device 102, the third terminal device 103, and/or the server 105.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The application change policy generation method according to the embodiment of the present disclosure will be described in detail below with reference to fig. 2 to 6 based on the scenario described in fig. 1.
Fig. 2 schematically illustrates a flowchart of an application change policy generation method according to an embodiment of the present disclosure.
As shown in fig. 2, the method 200 includes operations S210 to S240.
In operation S210, target data is acquired.
According to the embodiment of the disclosure, the target data may represent data to be processed by the first target application program and the second target application program, where the second target application program is obtained by performing initial modification on the first target application program according to the characteristics of the migrated database, and the second target application program may represent an initial application program for implementing the same function as the first target application program.
Database migration refers to migrating an electronic information system from one database to another, in accordance with embodiments of the present disclosure. The service requirements before and after the migration of the electronic information system are unchanged, i.e. the same functions as before the migration of the electronic information system are still required to be realized. For example, for a database before migration, the electronic information system may generate ten reports, and for a database after migration, the electronic information system also needs to generate ten reports, where data displayed by each report is the same as data displayed by a report corresponding to the database before migration.
According to the embodiment of the disclosure, in the case that an application program in the electronic information system adapts to a certain database characteristic, the electronic information system can acquire data from the database and process the data, so that a corresponding function is realized. Therefore, after the electronic information system is changed from one database to another, the migrated database does not support the original application program in the electronic information system due to the change of the characteristics of the database, and the application program also needs to be correspondingly changed to be changed into the application program supported by the migrated database.
According to the embodiment of the disclosure, the first target application program may represent an application program matched with the characteristics of the database before migration, and the second target application program may represent an initial application program obtained by performing initial modification on the first target application program according to the characteristics of the database after migration, and because a missing program or an error program may exist in the second target application program obtained by performing initial modification, verification on the integrity and the correctness of the second target application program is required, that is, verification on whether the second target application program is completely matched with the characteristics of the database after migration.
According to the embodiment of the disclosure, the service requirements before and after the migration of the electronic information system are unchanged, that is, the system data files obtained by processing the service data in the database before and after the migration of the electronic information system are consistent, the same target data can be obtained from the service data in the database, and the integrity and the correctness of the first target application program can be verified.
In operation S220, the target data is processed by calling the first target application program to obtain a first data file.
According to the embodiment of the disclosure, the target data can be processed by calling an application program corresponding to the target data in the first target application program to obtain a first data file corresponding to the target data, wherein the first data file can represent a data file obtained for the target data before the migration of the electronic information system.
In operation S230, the target data is processed by calling the second target application program to obtain a second data file.
According to the embodiment of the disclosure, the target data can be processed by calling an application program corresponding to the target data in the second target application program to obtain a second data file corresponding to the target data, wherein the second data file can represent a data file obtained for the target data after the electronic information system is migrated.
According to the embodiment of the disclosure, in the case that the second target application program is matched with the characteristics of the database after migration, the functions that can be achieved by the first target application program and the second target application program are identical, that is, the data files obtained by processing the same target data are identical. Therefore, in order to verify the integrity and correctness of the adaptation modification of the second target application program, the first target application program and the second target application program can be respectively called to process the same target data, so as to obtain a first data file and a second data file.
According to an embodiment of the present disclosure, the first target application and the second target application need to be invoked according to the same input parameters, such that the first target application and the second target application are processing the same batch of target data. For example, the input parameters may include a date of a particular day, and the first target application and the second target application may be invoked to process target data at that date.
In operation S240, a file comparison operation is performed on the first data file and the second data file, and an application change policy corresponding to the second target application is generated.
According to the embodiment of the disclosure, the obtained first data file and the second data file are subjected to file comparison operation, so that an application program change strategy corresponding to the second target application program can be generated. Under the condition that the first data file is consistent with the second data file, the characteristic of the second target application program is matched with that of the migrated database, and the second target application program is not required to be changed; when the first data file is inconsistent with the second data file, it may indicate that there is a missing program or an error program in the second target application program, and then the second target application program needs to be changed according to the application program change policy.
According to the embodiment of the disclosure, the first data file can be obtained by calling the first target application program to process target data, the second data file can be obtained by calling the second target application program to process target data, wherein the second target application program is obtained by initially changing the first target application program according to the characteristics of the migrated database, and the first data file and the second data file are subjected to file comparison operation, so that the integrity and the correctness of the second target application program can be verified, and the missing program and the error program in the second target application program are changed according to the generated application program changing strategy corresponding to the second target application program, thereby improving the integrity and the correctness of the second target application program.
According to an embodiment of the present disclosure, the above application program change policy generating method further includes: under the condition of performing first file comparison operation, copying and migrating the business data in the first database to a second database and a backup database to obtain the business data in the second database and the backup database; and under the condition of carrying out non-primary file comparison operation, carrying out repair operation on the data to be repaired, wherein the data to be repaired is changed in the data states of the first database and the second database, by utilizing the service data in the backup database.
According to embodiments of the present disclosure, the first database may characterize the pre-migration database and the second database may characterize the post-migration database.
According to the embodiment of the disclosure, after the electronic information system is migrated to the second database, the first target application program needs to be initially changed according to the characteristics of the second database to obtain a second target application program. Before verifying the integrity and correctness of a part of the application program in the second target application program, that is, before performing the first file comparison operation, the business data in the first database needs to be copied and migrated to the second database and the backup database, and under the condition that the business data in the first database is copied and migrated to the second database and the backup database, the same target data can be obtained from the first database and the second database, and the integrity and correctness of the application program corresponding to the target data in the second target application program are verified.
According to the embodiment of the disclosure, when the application program corresponding to the target data in the second target application program has a missing program or an error program, the second target application program can be changed according to the generated application program changing policy, so as to obtain a new second target application program. And verifying the integrity and correctness of the obtained new second target application program, namely performing non-first file comparison operation. However, the data in the first database and the second database triggers the operation of the first target application program and the second target application program due to the previous file comparison operation, which may cause the data states in the first database and the second database to change (also referred to as data pollution or dirty data), and the data in the first database and the second database needs to be repaired, so that the data bases in the first database and the second database are kept consistent, and the next file comparison operation can be started.
According to the embodiment of the disclosure, in the case of verifying the integrity and correctness of the second target application program, the target data may be processed by calling the first target application program and the second target application program, but the state of the target data in the first database or the state of the target data in the second database may be changed. For example, the business requirements before and after the migration of the electronic information system may include generating an invoice report, and the application program may be invoked to process the data corresponding to the business requirements to generate a corresponding data file. Where the data file may characterize the generated invoice statement, which may indicate that this data has been invoiced, the status of the data in the database may be updated to invoiced. In the case of the above-described base, the application program is called again to process the data, and a data file is not reproduced but an empty file is generated, so that the file comparison operation cannot be performed. Therefore, in the case of performing the non-first file comparison operation, it is necessary to restore the data to be processed to the original state so that the data in the database before and after migration remain consistent.
According to embodiments of the present disclosure, the state of the business data in the backup database may remain as original. Therefore, under the condition of carrying out non-first file comparison operation, the service data in the backup database can be utilized to carry out repair operation on the data to be repaired, wherein the data state of the data in the first database and the data state in the second database are changed.
According to embodiments of the present disclosure, data may be replicated by DRS (Data Replication Service) data replication techniques, or may be achieved by exporting sql (Structured Query Language ) data files from a post-migration database, and playing back the sql data files from a pre-migration database.
According to the embodiment of the disclosure, the repair speed of the data to be repaired also affects the verification efficiency of the adaptation and transformation integrity and correctness of the second target application program, so that the service data in the backup database can be utilized to repair the data to be repaired, the data in the database before migration and the data in the database after migration can be quickly restored to be consistent in data basis, and the problem that the data in the database before migration and the data in the database after migration are polluted in the previous round of file comparison operation process can be solved, so that the data file is convenient to generate for the subsequent file comparison operation.
According to an embodiment of the present disclosure, in a case of performing a non-first file comparison operation, performing a repair operation on data to be repaired, in which a data state of data in a first database and a second database is changed, using service data in a backup database, including: under the condition that data to be repaired exist in the first database or data to be repaired exist in the second database, the data corresponding to the data to be repaired in the first database and the second database are emptied; copying data corresponding to the data to be repaired from the business data in the backup database to the first database and the second database.
According to the embodiment of the disclosure, in the case of performing the non-first file comparison operation, it is required to determine whether there is data with changed states, i.e., data to be repaired, in the first database and the second database. Under the condition that the data to be repaired does not exist in the first database and the second database, the data in the first database and the second database do not need to be repaired.
According to the embodiment of the disclosure, when the data to be repaired exists in the first database or the data to be repaired exists in the second database, the data corresponding to the data to be repaired in the first database and the second database can be firstly emptied, and the data corresponding to the data to be repaired is copied from the service data in the backup database to the first database and the second database.
According to the embodiment of the disclosure, under the condition of performing non-first file comparison operation, the service data in the backup database can be utilized to repair the data to be repaired, the data in the first database and the second database are changed, the data in the first database and the second database can be quickly restored to be consistent, and the problem that the data in the first database and the second database are polluted in the previous file comparison operation process can be solved.
According to an embodiment of the present disclosure, processing target data by calling a first target application program to obtain a first data file includes: grouping first target application programs according to preset rules to obtain a plurality of first application programs, wherein the first target application programs can represent programs for processing business data; and processing the target data by calling at least one first application program to obtain a first data file, wherein the at least one first application program can represent a program for processing the target data in the first target application program, and the service data can comprise the target data.
According to embodiments of the present disclosure, the preset rules may characterize data dependencies. The first target application programs can be grouped according to the data dependency relationship to obtain a plurality of first application programs, wherein each first application program has no dependency relationship and can be independently called. For example, business data manipulation is data dependent, and for an application, the business requirements that the application needs to implement may characterize writing acquired table data to a data file on a temporary directory and moving the data file from the temporary directory copy to a target directory. The application programs can be grouped according to the data dependency relationship to obtain an A program, a B program and a C program, wherein different programs have different functions, the A program can be used for acquiring the table data, the B program can be used for writing the table data into a data file and writing the data file into a temporary directory, and the C program can be used for copying and moving the data file from the temporary directory to a target directory.
According to the embodiment of the disclosure, the target data may be processed by calling at least one first application program to obtain a first data file, wherein the at least one first application program may represent a program for processing the target data in the first target application program. For example, the first target application may be grouped to obtain 20 first applications, and then at least one first application may include 2 first applications, and may further include 5, 10, 15, or 20 first applications.
According to the embodiment of the disclosure, the first target application programs are grouped to obtain the plurality of first application programs, so that the granularity of a single first application program can be supported to perform real-time file comparison operation, and after the data depended on at least one first application program to be called is acquired, the at least one first application program can be called to perform file comparison operation, and the file comparison operation is not required to be performed after all the data depended on the first target application program are acquired.
According to an embodiment of the present disclosure, processing target data by calling a second target application program to obtain a second data file includes: grouping the second target application programs according to a preset rule to obtain a plurality of second application programs, wherein the second target application programs can represent programs for processing business data; and processing the target data by calling at least one second application program to obtain a second data file, wherein the at least one first application program can characterize a program used for processing the target data in the second target application program.
According to the embodiment of the disclosure, the second target application programs can be grouped according to the same data dependency relationship to obtain a plurality of second application programs, wherein each second application program does not have the dependency relationship and can be independently called.
According to the embodiment of the disclosure, the target data may be processed by calling at least one second application program to obtain a second data file, wherein the at least one second application program may characterize a program for processing the target data in the second target application program. For example, the second target application programs may be grouped to obtain 20 second application programs, and then at least one second application program may include 2 second application programs, and may further include 5, 10, 15, or 20 second application programs.
According to the embodiment of the disclosure, the second target application programs are grouped to obtain the plurality of second application programs, so that the granularity of a single second application program can be supported to perform real-time file comparison operation, and after the data depended on at least one second application program to be called is acquired, the at least one second application program can be called to perform file comparison operation, and the file comparison operation is not required to be performed after all the data depended on the second target application program are acquired.
According to an embodiment of the present disclosure, performing a file comparison operation on a first data file and a second data file, generating an application program change policy corresponding to a second target application program, including: performing file comparison operation on the first data file and the second data file to obtain a file comparison report; and generating an application program change strategy corresponding to the second target application program according to the file comparison report.
According to the embodiment of the disclosure, the first data file and the second data file are compared, namely, the files in the first data file and the second data file are compared, so that a file comparison report can be generated. And generating an application program change strategy corresponding to the second target application program according to the file comparison report.
According to the embodiment of the disclosure, the first data file and the second data file are subjected to file comparison operation, so that an application program changing strategy corresponding to the second target application program can be generated, the second target application program can be changed according to the application program changing strategy, and the integrity and the correctness of the second target application program are improved.
FIG. 3 schematically illustrates a flowchart for obtaining a document alignment report according to an embodiment of the disclosure.
As shown in fig. 3, the method 300 includes operations S310 to S330.
In operation S310, the name of each first target file in the first data file is compared with the name of each second target file in the second data file, so as to obtain a first comparison result corresponding to each first target file.
According to the embodiment of the disclosure, for each first target file in the first data files, whether the first target file exists in the second data files or not, that is, whether the second target file with the same name as the first target file exists in the second data files or not can be checked according to file name granularity, and a first comparison result corresponding to the first target file can be obtained. For example, for a file of the first data file having the name a, the file of the second data file may be traversed to check whether the file of the second data file having the name a.
In operation S320, if the first comparison result indicates that the second target file with the same name as the first target file exists in the second data file, consistency comparison is performed on the first target file and the second target file, so as to obtain a second comparison result.
According to the embodiment of the disclosure, when the first comparison result indicates that a second target file with the same name as that of the first target file exists in the second data file, the first target file and the second target file which exist in the first database and the second database are subjected to consistency comparison, and respective MD5 values of the first target file and the second target file can be generated through an MD5 (Message-Digest Algorithm) encryption Algorithm, so that the second comparison result can be obtained.
According to embodiments of the present disclosure, a file consistency comparison may be invoked by an interface of a file comparison tool, such as a Beyond computer.
In operation S330, a file comparison report corresponding to the first data file and the second data file is obtained based on the plurality of first comparison results and the plurality of second comparison results.
According to the embodiment of the disclosure, the obtained plurality of first comparison results and the obtained plurality of second comparison results are written into the file comparison report, so that the file comparison report corresponding to the first data file and the second data file can be obtained.
According to an embodiment of the disclosure, in a case that the first comparison result indicates that a second target file which is the same as the first target file name does not exist in the second data file, the file name which does not exist in the second data file may be marked in the file comparison report, and the marked mark may be used to prompt that an adaptation omission (missing) program may exist in at least one second application program. Under the condition that the second comparison result indicates that the MD5 values of the first target file and the second target file are inconsistent, the same-name files with inconsistent MD5 value comparison can be marked in the file comparison report, and the marked mark can be used for prompting that at least one second application program possibly has an adaptation and transformation error program.
According to the embodiment of the disclosure, the file comparison report can be obtained by comparing the first data file and the second data file, so that the application program change strategy corresponding to the second target application program can be generated conveniently according to the file comparison report.
According to an embodiment of the present disclosure, the above application program change policy generating method further includes: under the condition that a second target application program is changed according to an application program changing strategy to obtain a new second target application program, performing file comparison operation on a new second data file obtained by calling the new second target application program and a new first data file obtained by calling the first target application program to obtain a new file comparison report; and generating a new application program change strategy corresponding to the new second target application program according to the new file comparison report.
According to an embodiment of the present disclosure, in the case where the second target application is changed according to the application change policy to obtain a new second target application, operations S210 to S240 described above may be re-executed to obtain a new application change policy corresponding to the new second target application, so as to re-change the new second target application according to the new application change policy.
According to an embodiment of the present disclosure, the above operations S210 to S240 may be repeatedly performed for a new second target application program obtained by each modification according to a new application program modification policy until the file comparison report for each second application program may represent that the new first data file and the new second data file are consistent, i.e., the second target application program matches the second database characteristics.
According to the embodiment of the disclosure, in the case that the second target application program is changed according to the application program changing policy to obtain the second target application program which is finally matched with the characteristics of the second database, the second target application program as a whole can be called as at least one second application program.
According to the embodiment of the disclosure, repeated file comparison operation can be supported for the new second target application program obtained through modification, so that the finally obtained second target application program is matched with the characteristics of the second database.
Fig. 4 schematically illustrates a structural schematic of an alignment tool according to an embodiment of the present disclosure.
As shown in fig. 4, the comparison tool 400 includes a front-end information collection interface 410 and a back-end processing module 420, wherein the back-end processing module 420 includes an acquisition sub-module 421, a file comparison sub-module 422, and a report downloading sub-module 423.
In accordance with embodiments of the present disclosure, the front-end information collection interface 410 may collect pre-change development environment information (server IP, port, user, password) for an electronic information system adaptation database, scheduling commands for a data file generator/batch job group, which may represent a plurality of first applications, a data file generation catalog.
The front-end information collection interface 410 may also collect post-electronic information system adaptation database changes development environment information (server IP, port, user, password), scheduling commands for data file generation programs/batch job groups, data file generation directories, where the batch job groups may represent a plurality of second applications, according to embodiments of the present disclosure.
According to the embodiment of the disclosure, before the electronic information system adaptation database is changed, the above operation S210 and operation S220 may be performed in the development environment before the modification to obtain a first data file; after the electronic information system adaptation database is changed, the above operation S210 and operation S230 may be performed in the modified development environment, so as to obtain a second data file.
The acquisition sub-module 421 in the back-end processing module 420 may be used to acquire the first data file and the second data file according to embodiments of the present disclosure. The comparison tool can be connected to a data file generation directory of the development environment of the electronic information system before and after modification through FTP (File Transfer Protocol ) to acquire a first data file and a second data file.
According to an embodiment of the present disclosure, the file comparison sub-module 422 in the back-end processing module 420 may perform the operations S310 to S330 described above, so as to obtain a file comparison report.
According to embodiments of the present disclosure, the report download submodule 423 in the back-end processing module 420 may be used to download the file alignment report.
Fig. 5 schematically illustrates a front end interface schematic of an alignment tool according to an embodiment of the present disclosure.
As shown in fig. 5, if the file comparison operation is not performed for the first time, in the case where there is data to be repaired (pollution data) in the first database or there is data to be repaired in the second database, yes may be clicked on for whether the pollution data repair is required, and the table name of the table list where the data to be repaired is located is input, so that the corresponding table data in the first database and the second database are emptied, and the original data of the relevant table is copied from the backup database into the first database and the second database.
According to the embodiment of the disclosure, the electronic information system can be adapted to the development environment information before the database is changed and modified (server IP, port, user and password), the scheduling command of the data file generation program/batch job group, the data file generation catalog and the electronic information system can be adapted to the development environment information after the database is changed and modified (server IP, port, user and password), the scheduling command of the data file generation program/batch job group, and the data file generation catalog is input according to the requirement.
According to the embodiment of the disclosure, a "create comparison task" on the front end interface of the comparison tool may be clicked, before the electronic information system adaptation database is changed and modified, a program scheduling command (a development environment before modification) may be generated in response to an input data file, and the operations S210 and S220 may be executed in the development environment before modification to obtain a first data file; after the electronic information system adapts to the database modification, a program scheduling command (modified development environment) can be generated in response to the input data file, and the above operation S210 and operation S230 can be performed in the modified development environment to obtain a second data file.
According to an embodiment of the present disclosure, the comparison tool is connected to a data file generation directory of a development environment of the electronic information system before and after modification through FTP, acquires a first data file and a second data file, and performs the above-described operations S310 to S320. For example, sequentially reading file names in the first data file, checking whether the corresponding file names exist in the second data file, and if not, marking the file names as 'not existing files with the same name' in the comparison report; if the same-name files exist, the MD5 function is called to respectively generate MD5 values for the files before and after the adaptation and the transformation, and whether the MD5 values of 2 files are consistent is compared; if the file comparison report is consistent, the file comparison report is marked as 'file comparison consistent', otherwise, the file comparison report is marked as 'file comparison inconsistent'.
According to the embodiment of the disclosure, the 'acquire comparison report' on the front end interface of the comparison tool can be clicked, and the comparison report generated by the comparison task is downloaded.
FIG. 6 schematically illustrates a schematic diagram of a document alignment report according to an embodiment of the disclosure.
As shown in FIG. 6, the file comparison report may include a first target file name in the first data file, a second target file name in the second data file, and a comparison result.
According to the embodiment of the disclosure, for a first target file with a first target file name of a. Bin, when a second target file with the same name as the a. Bin exists in a second data file and respective MD5 values of the two files are consistent, a comparison result in a file comparison report may indicate that the file comparison is consistent; for a first target file with the name of B.bin, a second target file with the same name as B.bin exists in a second data file, but when the MD5 values of the two files are inconsistent, the comparison result in the file comparison report can indicate that the file comparison is inconsistent; for the first target file with the name of C.bin, when the second target file with the same name as C.bin does not exist in the second data file, the comparison result in the file comparison report can indicate that the file with the same name does not exist.
Based on the application program change strategy generation method, the disclosure also provides an application program change strategy generation device. The device will be described in detail below in connection with fig. 7.
Fig. 7 schematically shows a block diagram of the configuration of the application change policy generation device according to the embodiment of the present disclosure.
As shown in fig. 7, the application modification policy generation apparatus 700 of this embodiment includes an acquisition module 710, a first call module 720, a second call module 730, and a comparison module 740.
The obtaining module 710 is configured to obtain target data, where the target data characterizes data to be processed by a first target application program and a second target application program, the second target application program is obtained by performing initial modification on the first target application program according to characteristics of the migrated database, and the second target application program characterizes an initial application program that is used to implement the same function as the first target application program. In an embodiment, the obtaining module 710 may be configured to perform the operation S210 described above, which is not described herein.
The first calling module 720 is configured to process the target data by calling the first target application program, so as to obtain a first data file. In an embodiment, the first invoking module 720 may be configured to perform the operation S220 described above, which is not described herein.
The second calling module 730 is configured to process the target data by calling the second target application program to obtain a second data file. In an embodiment, the second invoking module 730 may be configured to perform the operation S230 described above, which is not described herein.
The comparison module 740 is used for performing a file comparison operation on the first data file and the second data file, and generating an application program change policy corresponding to the second target application program. In an embodiment, the comparison module 740 may be used to perform the operation S240 described above, which is not described herein.
According to an embodiment of the present disclosure, the application modification policy generation apparatus 700 further includes a copy module and a repair module.
And the copying module is used for copying and migrating the business data in the first database to the second database and the backup database under the condition of performing the first file comparison operation to obtain the business data in the second database and the backup database, wherein the first database represents the database before migration and the second database represents the database after migration.
And the repair module is used for repairing the data to be repaired, the data states of which are changed, in the first database and the second database by utilizing the service data in the backup database under the condition of performing non-primary file comparison operation.
According to an embodiment of the present disclosure, a repair module includes a purge unit and a copy unit.
The clearing unit is used for clearing the data corresponding to the data to be repaired in the first database and the second database under the condition that the data to be repaired exists in the first database or the data to be repaired exists in the second database.
And the copying unit is used for copying the data corresponding to the data to be repaired from the service data in the backup database to the first database and the second database.
According to an embodiment of the present disclosure, the first call module 720 includes a first grouping unit and a first call unit.
The first grouping unit is used for grouping the first target application programs according to preset rules to obtain a plurality of first application programs, wherein the first target application programs represent programs for processing business data.
The first calling unit is used for processing the target data by calling at least one first application program to obtain a first data file, wherein the at least one first application program characterizes a program used for processing the target data in the first target application program, and the service data comprise the target data.
According to an embodiment of the present disclosure, the second call module 730 includes a second packet unit and a second call module.
And the second grouping module is used for grouping the second target application programs according to preset rules to obtain a plurality of second application programs, wherein the second target application programs represent programs for processing business data.
And the second calling module is used for processing the target data by calling at least one second application program to obtain a second data file, wherein the at least one first application program characterizes a program used for processing the target data in the second target application program.
According to an embodiment of the present disclosure, the alignment module 740 includes an alignment unit and a generation unit.
And the comparison unit is used for carrying out file comparison operation on the first data file and the second data file to obtain a file comparison report.
And the generating unit is used for generating an application program changing strategy corresponding to the second target application program according to the file comparison report.
According to an embodiment of the present disclosure, the alignment unit comprises a first alignment subunit, a second alignment subunit, and an acquisition subunit.
And the first comparison subunit is used for comparing the name of each first target file in the first data file with the name of each second target file in the second data file to obtain a first comparison result corresponding to each first target file.
And the second comparison subunit is used for carrying out consistency comparison on the first target file and the second target file under the condition that the first comparison result represents that the second target file with the same name as the first target file exists in the second data file, so as to obtain a second comparison result.
And the obtaining subunit is used for obtaining a file comparison report corresponding to the first data file and the second data file based on the plurality of first comparison results and the plurality of second comparison results.
According to an embodiment of the present disclosure, the application modification policy generation apparatus 700 further includes an obtaining module and a generating module.
The obtaining module is used for carrying out file comparison operation on a new second data file obtained by calling the new second target application program and a new first data file obtained by calling the first target application program under the condition that the second target application program is changed according to the application program changing strategy to obtain a new second target application program, so as to obtain a new file comparison report.
And the generating module is used for generating a new application program changing strategy corresponding to the new second target application program according to the new file comparison report.
According to an embodiment of the present disclosure, any of the acquisition module 710, the first calling module 720, the second calling module 730, and the comparison module 740 may be combined in one module to be implemented, or any of the modules may be split into a plurality of modules. Alternatively, at least some of the functionality of one or more of the modules may be combined with at least some of the functionality of other modules and implemented in one module. According to embodiments of the present disclosure, at least one of the acquisition module 710, the first invocation module 720, the second invocation module 730, and the comparison module 740 may be implemented, at least in part, as hardware circuitry, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or by hardware or firmware, such as any other reasonable manner of integrating or packaging the circuitry, or in any one of or a suitable combination of three of software, hardware, and firmware. Alternatively, at least one of the acquisition module 710, the first invocation module 720, the second invocation module 730, and the comparison module 740 may be at least partially implemented as a computer program module that, when executed, may perform the corresponding functions.
Fig. 8 schematically illustrates a block diagram of an electronic device adapted to implement an application change policy generation method according to an embodiment of the disclosure.
As shown in fig. 8, an electronic device 800 according to an embodiment of the present disclosure includes a processor 801 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. The processor 801 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 801 may also include on-board memory for caching purposes. The processor 801 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the disclosure.
In the RAM 803, various programs and data required for the operation of the electronic device 800 are stored. The processor 801, the ROM 802, and the RAM 803 are connected to each other by a bus 804. The processor 801 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 802 and/or the RAM 803. Note that the program may be stored in one or more memories other than the ROM 802 and the RAM 803. The processor 801 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the electronic device 800 may also include an input/output (I/O) interface 805, the input/output (I/O) interface 805 also being connected to the bus 804. The electronic device 800 may also include one or more of the following components connected to an input/output (I/O) interface 805: an input portion 806 including a keyboard, mouse, etc.; an output portion 807 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage section 808 including a hard disk or the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. The drive 810 is also connected to an input/output (I/O) interface 805 as needed. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as needed so that a computer program read out therefrom is mounted into the storage section 808 as needed.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 802 and/or RAM 803 and/or one or more memories other than ROM 802 and RAM 803 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the item recommendation method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 801. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed, and downloaded and installed in the form of a signal on a network medium, and/or from a removable medium 811 via a communication portion 809. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network via the communication section 809, and/or installed from the removable media 811. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 801. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (12)

1. An application change policy generation method, comprising:
acquiring target data, wherein the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a migrated database, and the second target application program represents an initial application program for realizing the same function as the first target application program;
Processing the target data by calling the first target application program to obtain a first data file;
processing the target data by calling the second target application program to obtain a second data file;
and performing file comparison operation on the first data file and the second data file, and generating an application program change strategy corresponding to the second target application program.
2. The method of claim 1, further comprising:
under the condition of performing first file comparison operation, copying and migrating service data in a first database to a second database and a backup database to obtain the service data in the second database and the backup database, wherein the first database represents a database before migration, and the second database represents a database after migration; and
and under the condition of carrying out non-primary file comparison operation, carrying out repair operation on the data to be repaired, wherein the data state of the data in the first database and the data in the second database are changed, by utilizing the service data in the backup database.
3. The method of claim 2, wherein the performing a repair operation on the data to be repaired with the changed data states in the first database and the second database by using the service data in the backup database in the case of performing a non-first file comparison operation includes:
Under the condition that the data to be repaired exists in the first database or the data to be repaired exists in the second database, the data corresponding to the data to be repaired in the first database and the second database are emptied; and
copying data corresponding to the data to be repaired from the service data in the backup database to the first database and the second database.
4. The method according to claim 1 or 2, wherein the processing the target data by calling the first target application program to obtain a first data file includes:
grouping the first target application programs according to a preset rule to obtain a plurality of first application programs, wherein the first target application programs represent programs for processing the service data;
and processing the target data by calling at least one first application program to obtain the first data file, wherein the at least one first application program characterizes a program used for processing the target data in the first target application program, and the service data comprises the target data.
5. The method of claim 4, wherein the processing the target data by invoking the second target application to obtain a second data file comprises:
grouping the second target application programs according to the preset rule to obtain a plurality of second application programs, wherein the second target application programs represent programs for processing the service data;
and processing the target data by calling at least one second application program to obtain the second data file, wherein the at least one first application program characterizes a program used for processing the target data in the second target application program.
6. The method of claim 1, wherein the performing a file comparison operation on the first data file and the second data file to generate an application change policy corresponding to the second target application includes:
performing file comparison operation on the first data file and the second data file to obtain a file comparison report;
and generating the application program change strategy corresponding to the second target application program according to the file comparison report.
7. The method of claim 6, wherein the performing a file comparison operation on the first data file and the second data file to obtain a file comparison report, includes:
comparing the name of each first target file in the first data file with the name of each second target file in the second data file to obtain a first comparison result corresponding to each first target file;
under the condition that the first comparison result characterizes that the second target file with the same name as the first target file exists in the second data file, consistency comparison is carried out on the first target file and the second target file, and a second comparison result is obtained;
and obtaining the file comparison report corresponding to the first data file and the second data file based on the first comparison results and the second comparison results.
8. The method of claim 1, further comprising:
under the condition that the second target application program is changed according to the application program changing strategy to obtain a new second target application program, performing file comparison operation on a new second data file obtained by calling the new second target application program and a new first data file obtained by calling the first target application program to obtain a new file comparison report;
And generating a new application program change strategy corresponding to the new second target application program according to the new file comparison report.
9. An application change policy generation apparatus comprising:
the system comprises an acquisition module, a storage module and a storage module, wherein the acquisition module is used for acquiring target data, the target data represents data required to be processed by a first target application program and a second target application program, the second target application program is obtained by carrying out initial change on the first target application program according to the characteristics of a migrated database, and the second target application program represents an initial application program used for realizing the same function as the first target application program;
the first calling module is used for processing the target data by calling the first target application program to obtain a first data file;
the second calling module is used for processing the target data by calling the second target application program to obtain a second data file;
and the comparison module is used for carrying out file comparison operation on the first data file and the second data file and generating an application program change strategy corresponding to the second target application program.
10. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-8.
11. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method according to any of claims 1-8.
12. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 8.
CN202310654768.XA 2023-06-05 2023-06-05 Application program change strategy generation method and device Pending CN116662303A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310654768.XA CN116662303A (en) 2023-06-05 2023-06-05 Application program change strategy generation method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310654768.XA CN116662303A (en) 2023-06-05 2023-06-05 Application program change strategy generation method and device

Publications (1)

Publication Number Publication Date
CN116662303A true CN116662303A (en) 2023-08-29

Family

ID=87718658

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310654768.XA Pending CN116662303A (en) 2023-06-05 2023-06-05 Application program change strategy generation method and device

Country Status (1)

Country Link
CN (1) CN116662303A (en)

Similar Documents

Publication Publication Date Title
US11163731B1 (en) Autobuild log anomaly detection methods and systems
US10025528B2 (en) Managing transformations of snapshots in a storage system
US9356966B2 (en) System and method to provide management of test data at various lifecycle stages
EP3488337B1 (en) Shared software libraries for computing devices
US20190057101A1 (en) Efficient deletion of archive records after expiration of a tenant-defined retention period
US8126859B2 (en) Updating a local version of a file based on a rule
US10083196B2 (en) Creating secure virtual databases storing masked data
US20080162509A1 (en) Methods for updating a tenant space in a mega-tenancy environment
US20070162894A1 (en) Method of and system for dynamic automated test case generation and execution
US11288395B2 (en) Metadata storage architecture and data aggregation
US11244025B2 (en) Systems and methods for updating data pipelines
US20190138433A1 (en) Evaluation of library test suites using mutation testing
US11416631B2 (en) Dynamic monitoring of movement of data
US11360966B2 (en) Information processing system and method of controlling information processing system
CN110795331A (en) Software testing method and device
US20230092076A1 (en) Data recovery validation test
CN116069725A (en) File migration method, device, apparatus, medium and program product
CN112148762A (en) Statistical method and device for real-time data stream
CN116662303A (en) Application program change strategy generation method and device
US20210073018A1 (en) Enhanced virtual machine image management system
JP2014063447A (en) Business document processing device, business document processing method and business document processing program
CN115421779A (en) Object storage method and device, electronic equipment and computer readable storage medium
KR20230091748A (en) Distributed workflow apparatus for executing and managing application tasks across multiple servers and method thereof
CN113946517A (en) Abnormal data determination method and device, electronic equipment and storage medium
US20200250068A1 (en) Investigation of performance bottlenecks occurring during execution of software applications

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination