Database code inspection device and method
A technology of an inspection device and an inspection method, applied in the field of network databases, can solve problems such as database bottlenecks, reduce database query efficiency, system application crashes, etc., and achieve the effects of reducing misjudgments and reducing failure risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
no. 1 example
[0056] Such as Figure 4 Shown, according to the first embodiment of the checking method of database code of the present invention, comprise the following steps:
[0057] Open the log of the database, pull the log file of the database and copy it to the backup file;
[0058] Index analysis is performed on the statements in the backup file, and the data tables with no index or unreasonable index settings in the database are obtained.
[0059] Optionally, the log of the opened database is a query log. Query log, used to record established client connections and executed statements. In the MySQL database, use the --log[=log file name] or -l[log file name] command to start querying the log. If there is no value for the log file name, the default log file name is host_name.log. After the query log is enabled for the MySQL database, users can view the SQL statements executed in the MySQL database in the log file.
[0060] Optionally, the log file of the database is pulled by exe...
no. 2 example
[0063] Such as Figure 5 Shown, according to the second embodiment of the checking method of database code of the present invention, comprise the following steps:
[0064] Open the log of the database, pull the log file of the database and copy it to the backup file;
[0065] Use preset rules to filter the statements in the backup file;
[0066] Index analysis is performed on the filtered statements in the backup file, and the data tables with no index or unreasonable index settings in the database are obtained.
[0067] Optionally, the pre-set rules include at least one of data tables that do not need to be checked, a check threshold of table data volume, a calling frequency threshold, or statements that do not need to be checked. For example, if you set the data table that does not need to be checked as a, delete all SQL statements that only call data table a from the backup file; Delete the SQL statement of the data table with less than 10,000 entries from the backup fil...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com