CN117667980A - Enterprise knowledge base control method, equipment and medium - Google Patents
Enterprise knowledge base control method, equipment and medium Download PDFInfo
- Publication number
- CN117667980A CN117667980A CN202311680033.0A CN202311680033A CN117667980A CN 117667980 A CN117667980 A CN 117667980A CN 202311680033 A CN202311680033 A CN 202311680033A CN 117667980 A CN117667980 A CN 117667980A
- Authority
- CN
- China
- Prior art keywords
- target
- query
- knowledge base
- source
- inquiry
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 60
- 238000013507 mapping Methods 0.000 claims abstract description 40
- 238000012545 processing Methods 0.000 claims description 14
- 238000003860 storage Methods 0.000 claims description 12
- 230000005012 migration Effects 0.000 claims description 8
- 238000013508 migration Methods 0.000 claims description 8
- 238000011161 development Methods 0.000 abstract description 5
- 238000013523 data management Methods 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 11
- 230000008569 process Effects 0.000 description 10
- 238000013500 data storage Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 7
- 238000013461 design Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 238000007726 management method Methods 0.000 description 5
- 230000009286 beneficial effect Effects 0.000 description 4
- 229920001971 elastomer Polymers 0.000 description 4
- 239000000806 elastomer Substances 0.000 description 4
- 230000000694 effects Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 239000002360 explosive Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/242—Query formulation
- G06F16/2433—Query languages
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2455—Query execution
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The application discloses a method, equipment and medium for controlling an enterprise knowledge base, wherein the method comprises the following steps: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into a target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface. The authority control query system based on the elastic search can easily construct various complex elastic search query sentences by a user, improves user experience, realizes an access control list function of the elastic search, can enable developers to perform imperceptible authority control, greatly improves query and development efficiency while ensuring data safety, and meets data management requirements in different scenes.
Description
Technical Field
The present application relates to the field of data storage, and in particular, to a method, an apparatus, and a medium for controlling an enterprise knowledge base.
Background
In recent years, in the present digital age, big data technology and search engine technology have become an integral part of various industries. Particularly in the field of enterprise-level application, how to efficiently store and process mass data and ensure the security of the data and the control of access rights are important directions of current technical development.
Over the past few decades, the technological development of the industry has undergone multiple stages. Initially, data storage and searching relied primarily on relational databases and traditional search engine technology. However, with the explosive growth of data and the diversification of user demands, such conventional techniques have failed to meet the demands of modern applications.
The main drawbacks of the prior art include: the inefficiency of data storage, slow search speed, and insufficient processing power for complex data types. These defects may lead to inefficiency in data processing for the enterprise, inability to quickly respond to market demands, and even possible leakage of sensitive data, which poses a threat to the security and reputation of the enterprise.
The causes of these technical drawbacks mainly include: traditional relational databases are inefficient in processing unstructured data and complex queries, and traditional search engine techniques cannot handle massive data and high concurrent access, while lacking the processing capability for complex data types.
Disclosure of Invention
In order to solve the above problems, the present application provides an enterprise knowledge base control method, device and medium, wherein the method includes:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
In one example, the source database includes a source user table, a source relationship table, a source role table, a source authority table and a source service table; the mapping the source data of the source database to the target knowledge base specifically comprises: determining a mapping relation between the source database and the target knowledge base; the mapping relation comprises the following steps: a first mapping relationship from the source user table to the target user table, a second mapping relationship from the source relationship table to the target relationship table, a third mapping relationship from the source role table to the target role table, and a fourth mapping relationship from the source authority table and the source service table to the target service table; and based on the mapping relation, the source data is migrated and mapped into the target knowledge base.
In one example, the querying through the default authority query interface, the query control system and the elastic search query interface specifically includes: inquiring the default authority of a user through the default authority inquiry interface; invoking a query control system, and converting the initial query condition according to the query format of the elastic search to obtain a target query condition; and inquiring through an elastic search inquiry interface based on the default authority and the target inquiry condition.
In one example, before the querying the default authority of the user through the default authority querying interface, the method further includes: writing a default authority query interface; the method further comprises the steps of: and acquiring role information of the user from the target relation table through the default authority query interface, and constructing corresponding initial query conditions according to the role information.
In one example, before the invoking the query control system converts the initial query condition according to the query format of the elastic search to obtain the target query condition, the method further includes: instantiating the ESQueryProducer class object and acquiring a query builder; an initial query condition is set using the query builder object, the initial query condition including at least one of a matching field, a query keyword.
In one example, after the setting of the initial query condition using the query builder object, the method further comprises: and processing the initial query condition to obtain an intermediate query condition, wherein the processing mode comprises at least one of paging setting and sorting.
In one example, the querying through the default authority query interface, the query control system and the elastic search query interface specifically includes: a Java query interface of the elastic search is used for sending a query request; and inquiring based on the inquiry request to obtain an inquiry result.
In one example, the mapping the source data migration to the target knowledge base based on the mapping relationship specifically includes: the source data migration is mapped into the target knowledge base by writing a data migration script or using an ETL tool.
The application also provides an enterprise knowledge base control device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The present application also provides a non-volatile computer storage medium storing computer-executable instructions configured to: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The method provided by the application has the following beneficial effects: the authority control query system based on the elastic search can easily construct various complex elastic search query sentences by a user, improves user experience, and realizes a user-friendly query sentence construction process through a simple factory design mode and a reflection technology. Meanwhile, the access control list function of the elastic search is realized, so that developers can perform line authority control without perception, the query and development efficiency is greatly improved while the data security is ensured compared with the traditional database, and the data management requirements under different scenes are met.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 is a diagram of a database table relationship of a conventional design according to an embodiment of the present application;
FIG. 2 is a flow chart of an enterprise knowledge base control method according to an embodiment of the present application;
FIG. 3 is a diagram of a target knowledge base table relationship according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a mapping relationship in an embodiment of the present application;
FIG. 5 is a schematic diagram of a data storage and query process of an enterprise knowledge base according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an enterprise knowledge base control apparatus according to an embodiment of the present application.
Detailed Description
For the purposes, technical solutions and advantages of the present application, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and corresponding drawings. It will be apparent that the described embodiments are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are within the scope of the present disclosure.
The following describes in detail the technical solutions provided by the embodiments of the present application with reference to the accompanying drawings.
Fig. 1 shows an enterprise knowledge base system table design of a relational database in the prior art, wherein the enterprise knowledge base system table design comprises a user table, a relational table, a role table, a permission table and a business table, the user table is associated with the role table through the relational table, then corresponding permission data is found through the association of the role table and the permission table, and in the process of actually inquiring the data, different tables are required to be inquired for many times to find the permission data conforming to the user, so that the permission management becomes complex and the response of the rear end is slower.
Fig. 2 is a flow chart of an enterprise knowledge base control method according to one or more embodiments of the present disclosure. The method can be applied to enterprise knowledge bases in different business fields, such as the Internet financial business field, the electric business field, the instant messaging business field, the game business field, the public business field and the like. The process may be performed by a computing device in the corresponding domain (e.g., a wind control server or intelligent mobile terminal corresponding to the payment service, etc.), and certain input parameters or intermediate results in the process allow for manual intervention adjustments to help improve accuracy.
The implementation of the analysis method according to the embodiment of the present application may be a terminal device or a server, which is not particularly limited in this application. For ease of understanding and description, the following embodiments are described in detail with reference to a server.
It should be noted that the server may be a single device, or may be a system composed of a plurality of devices, that is, a distributed server, which is not specifically limited in this application.
As shown in fig. 2 and 5, an embodiment of the present application provides an enterprise knowledge base control method, which includes:
s101: mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table.
First, it is necessary to map the source data contained in the source database (the source database herein refers to the conventional database in fig. 5) into the target database constructed in the present application. As shown in fig. 3, the target database herein relates to four tables of a target user table, a target role table, a target relationship table and a target service table, wherein the target user table contains user information, the target role table contains role information, the target relationship table contains the relationship between users and roles, and the target service table contains a permission role list of the current data line.
In one embodiment, the source database includes a source user table, a source relation table, a source role table, a source authority table and a source service table, and when mapping source data of the source database into the target knowledge base, a mapping relation between the source database and the target knowledge base needs to be determined. As shown in fig. 4, the mapping relationship includes: the method comprises the steps of a first mapping relation from a source user table to a target user table, a second mapping relation from a source relation table to a target relation table, a third mapping relation from a source role table to a target role table, and a fourth mapping relation from a source authority table to a source service table. After determining the mapping relationship, the source data may be migration mapped into the target knowledge base based on the mapping relationship.
Further, it is also desirable to migrate the mapped data from the source database to the elastiscearch search engine, either by writing a data migration script or using an ETL tool.
S102: and setting authority data of the target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base.
When the target knowledge is released, knowledge authority data of the target knowledge are set according to data in an authority database, and a storage interface is called to store the knowledge and the authority into the target knowledge base.
S103: the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
In one embodiment, when data is queried, a query interface is called first, a default authority of a user is queried through the default authority query interface, then a query control system is called, initial query conditions are converted according to a query format of an elastomer search to obtain target query conditions, and then query is performed through the query interface of the elastomer search based on the default authority and the target query conditions.
Further, before converting the initial query condition, a default permission query interface is required to be written, so as to dynamically construct the initial query condition according to the user role information. Before the query is executed, role information of the user can be acquired in the relation table, and corresponding initial query conditions are constructed according to the role information.
Specifically, when a query control system is invoked, an ESQueryProducer class object is first instantiated.
Then, the creatESQueryBuilder method of the esquerybuilder class is called to acquire the query builder object, and the type of the query builder to be used can be specified through the setting parameter of the ESQuaryMode class. For example, the creatESQueryBuilder (esquarymode. Must) method may be invoked to retrieve a matching query builder. The query builder object is then used to set relevant query conditions, such as setting fields to match, keywords of the query, etc. The query object may be further processed as desired, such as by paging, sorting, etc. And calling a getProduct method of the query builder object to build all query conditions of query setting, calling a public method of a role of a query user in the getboost query method, and adding the default authority of the user into the query conditions to obtain a final query object. Finally, the query object is used to perform the actual search operation, for example, a Java query API using an elastomer search sends a query request and obtains results.
The query control system in the application uses a development method of factory design mode plus reflection, which comprises the following 4 parts:
1. four query pattern building tool classes: four query patterns, corresponding to the elastiscearch, respectively, include Bool query, term query, range query, wildcard query. Each query pattern building tool class provides a simple and easy-to-use interface for a user to build a corresponding query statement.
2. Querying a schema definition file: the file contains the parameter definitions, constraints, and example code for each query pattern. The user can learn how to build the tool class using each query pattern by reading the file.
3. Building a factory class: the method adopts a simple factory design mode, converts a query object constructed by a user into a query sentence object of an elastic search through a reflection technology according to a query mode input by the user, dynamically generates a corresponding query mode construction tool instance, and returns the query sentence object to the user.
4. And (3) final assembly: after each wanted mode object is obtained through the factory class, parameters are set in the object, then query sentences are uniformly generated by using the assembly class, and a user can easily construct complex query sentences without knowing the query grammar of the elastic search.
The method and the system provide a high-efficiency and flexible data storage and search solution, and ensure the safety and stability of the system at the same time, so as to solve the problems of performance bottleneck and insufficient flexibility of the traditional data storage and search system when processing large-scale data and complex permission systems.
The present invention successfully addresses the above-described technical problems by using an elastic search as a data storage and search engine, and a rights management method in combination with a role driver. The distributed nature of the elastomer search allows the system to handle large-scale data, while its search function can provide efficient data searching. The role-driven authority management method enables the authority management of the system to be more flexible and efficient, and flexible row-level authority setting and distribution can be carried out according to different role requirements.
In addition, by using roles to manage the data authority, individual authority setting for each user can be avoided, so that the efficiency and accuracy of authority management are greatly improved.
In summary, the invention provides a comprehensive and efficient data storage and search solution, which solves the problems of performance bottleneck and insufficient flexibility of the traditional data storage and search system when processing large-scale data and complex authority systems.
As shown in fig. 6, the embodiment of the present application further provides an enterprise knowledge base control device, including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
The embodiments also provide a non-volatile computer storage medium storing computer executable instructions configured to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table; setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base; the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
All embodiments in the application are described in a progressive manner, and identical and similar parts of all embodiments are mutually referred, so that each embodiment mainly describes differences from other embodiments. In particular, for the apparatus and medium embodiments, the description is relatively simple, as it is substantially similar to the method embodiments, with reference to the section of the method embodiments being relevant.
The devices and media provided in the embodiments of the present application are in one-to-one correspondence with the methods, so that the devices and media also have similar beneficial technical effects as the corresponding methods, and since the beneficial technical effects of the methods have been described in detail above, the beneficial technical effects of the devices and media are not described in detail herein.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
Claims (10)
1. A method for controlling an enterprise knowledge base, comprising:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
2. The method of claim 1, wherein the source database comprises a source user table, a source relationship table, a source role table, a source authority table and a source service table;
the mapping the source data of the source database to the target knowledge base specifically comprises:
determining a mapping relation between the source database and the target knowledge base;
the mapping relation comprises the following steps: a first mapping relationship from the source user table to the target user table, a second mapping relationship from the source relationship table to the target relationship table, a third mapping relationship from the source role table to the target role table, and a fourth mapping relationship from the source authority table and the source service table to the target service table;
and based on the mapping relation, the source data is migrated and mapped into the target knowledge base.
3. The method according to claim 1, wherein the querying through a default authority query interface, a query control system and an elastic search query interface specifically comprises:
inquiring the default authority of a user through the default authority inquiry interface;
invoking a query control system, and converting the initial query condition according to the query format of the elastic search to obtain a target query condition;
and inquiring through an elastic search inquiry interface based on the default authority and the target inquiry condition.
4. A method according to claim 3, wherein prior to querying the user's default rights via the default rights querying interface, the method further comprises: writing a default authority query interface;
the method further comprises the steps of:
and acquiring role information of the user from the target relation table through the default authority query interface, and constructing corresponding initial query conditions according to the role information.
5. The method of claim 4, wherein the invoking the query control system translates the initial query terms in an elastic search query format to obtain the target query terms, the method further comprising:
instantiating the ESQueryProducer class object and acquiring a query builder;
an initial query condition is set using the query builder object, the initial query condition including at least one of a matching field, a query keyword.
6. The method of claim 5, wherein after setting initial query conditions using the query builder object, the method further comprises:
and processing the initial query condition to obtain an intermediate query condition, wherein the processing mode comprises at least one of paging setting and sorting.
7. The method according to claim 1, wherein the querying through a default authority query interface, a query control system and an elastic search query interface specifically comprises:
a Java query interface of the elastic search is used for sending a query request;
and inquiring based on the inquiry request to obtain an inquiry result.
8. The method according to claim 2, wherein the migration mapping the source data into the target knowledge base based on the mapping relation specifically comprises:
the source data migration is mapped into the target knowledge base by writing a data migration script or using an ETL tool.
9. An enterprise knowledge base control apparatus, comprising:
at least one processor; and a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
10. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
mapping source data of a source database into a target knowledge base; the target knowledge base comprises a target user table, a target color table, a target relation table and a target service table;
setting authority data of target knowledge when the target knowledge is released, and storing service data and authorities into the target knowledge base;
the inquiry is carried out through a default authority inquiry interface, an inquiry control system and an elastic search inquiry interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311680033.0A CN117667980A (en) | 2023-12-07 | 2023-12-07 | Enterprise knowledge base control method, equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311680033.0A CN117667980A (en) | 2023-12-07 | 2023-12-07 | Enterprise knowledge base control method, equipment and medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117667980A true CN117667980A (en) | 2024-03-08 |
Family
ID=90084282
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311680033.0A Pending CN117667980A (en) | 2023-12-07 | 2023-12-07 | Enterprise knowledge base control method, equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117667980A (en) |
-
2023
- 2023-12-07 CN CN202311680033.0A patent/CN117667980A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109857755B (en) | Rule checking method and device | |
US7836063B2 (en) | Customizable data translation method and system | |
US20210326471A1 (en) | Methods and apparatuses for chaining service data | |
US20160171978A1 (en) | Voice recognition system and construction method thereof | |
US20180307736A1 (en) | Efficient Snapshot Generation of Data Tables | |
CN110019111B (en) | Data processing method, data processing device, storage medium and processor | |
CN110895544A (en) | Interface data processing method, device, system and storage medium | |
CN108415909A (en) | A kind of system and method accessing disparate databases | |
US9971794B2 (en) | Converting data objects from multi- to single-source database environment | |
CN109977317B (en) | Data query method and device | |
CN115599764A (en) | Method, device and medium for migrating table data | |
CN113849523B (en) | A data query method, device and medium | |
CN112860802B (en) | Database operation statement processing method and device and electronic equipment | |
US20220269552A1 (en) | Resolving data location for queries in a multi-system instance landscape | |
US9009731B2 (en) | Conversion of lightweight object to a heavyweight object | |
CN111125216B (en) | Method and device for importing data into Phoenix | |
CN117667980A (en) | Enterprise knowledge base control method, equipment and medium | |
CN117539981A (en) | Method, equipment and medium for constructing theme data set | |
US12001458B2 (en) | Multi-cloud object store access | |
US10114864B1 (en) | List element query support and processing | |
JP2022155454A (en) | Routing sql statement to elastic compute node using workload class | |
US8799301B2 (en) | Avoiding duplicate and equivalent data objects in service registries | |
CN114625410A (en) | Request message processing method, device and equipment | |
US20240378039A1 (en) | Intelligent data processing system with multi-interface frontend and backend | |
US20230031198A1 (en) | Dynamically tuning a computing device's performance for a containerized application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |