【DM版本】:DM8 Database Server 64 V8 0x7000c
03134283890-20220723-165593-10045
【操作系统】:kylinV10
【CPU】:x86_64
【问题描述】*:使用python执行建表sql,未报错,但随机缺少字段
以下是其中一张缺少字段表的建表语句:
alert_id bigint PRIMARY KEY IDENTITY(1,1),
msp_uuid varchar(64) DEFAULT 'DEFAULT',
tenant_uuid varchar(64) DEFAULT 'DEFAULT',
device_id varchar(255) NOT NULL,
rule_id varchar(128) NULL DEFAULT NULL,
detection_time bigint NULL DEFAULT NULL,
level int NOT NULL,
log_data text NULL DEFAULT NULL,
handle_time bigint NULL DEFAULT NULL,
handled int DEFAULT 0 NOT NULL,
uploaded int DEFAULT 0 NOT NULL,
process_name varchar(128) NULL DEFAULT NULL,
pid varchar(64) NULL DEFAULT NULL,
clf_user varchar(128) NULL DEFAULT NULL,
rule_name varchar(255) NULL DEFAULT NULL,
detection_type int NULL DEFAULT NULL,
attack_signs text NULL DEFAULT NULL,
tactic varchar(128) NULL DEFAULT NULL,
tech_id varchar(128) NULL DEFAULT NULL,
tech_name varchar(128) NULL DEFAULT NULL,
tip text NULL DEFAULT NULL,
attack_num int DEFAULT 0 NOT NULL,
send_mail int DEFAULT 0 NOT NULL,
attacker_ip varchar(128) NULL DEFAULT NULL,
white_filter int DEFAULT 0 NOT NULL,
merge_flag varchar(255) NULL DEFAULT NULL,
white_id int NULL DEFAULT NULL,
create_time bigint NULL DEFAULT NULL,
create_by varchar(64) NULL DEFAULT NULL,
update_time bigint NULL DEFAULT NULL,
update_by varchar(64) NULL DEFAULT NULL,
threaten_clue varchar(760) NULL DEFAULT NULL,
protocol varchar(64) NULL DEFAULT NULL,
burst_success int NULL DEFAULT NULL,
first_attack_time bigint NULL DEFAULT NULL,
file_sha1 varchar(64) NULL DEFAULT NULL,
file_uuid varchar(64) NULL DEFAULT NULL,
subprocess_name varchar(256) NULL DEFAULT NULL,
login_area varchar(256) NULL DEFAULT NULL,
execute_user varchar(100) NULL DEFAULT NULL,
process_params varchar(800) NULL DEFAULT NULL,
old_status int DEFAULT 0 NOT NULL,
score int DEFAULT 0 NOT NULL
);
CREATE INDEX IF NOT EXISTS alert_tb_idx ON tbl_alert (device_id, tenant_uuid);
CREATE INDEX IF NOT EXISTS tbl_alert_detection_time_idx ON tbl_alert (detection_time);
CREATE INDEX IF NOT EXISTS ix_tbl_alert_threaten_clue ON tbl_alert (threaten_clue);