Because both of them are used, informatica is easy to manage in the future, especially for data correction. when data is supplemented in the later stage, the data stream is clear at a glance.SQL is efficient, but it is inconvenient to maintain it later. It takes a long time to find a data stream ..ETL tools are easier to manage and maintain, especially complicated cleaning processes.
data from the total data source into the database tables in each subsidiary, at this time the subsidiaries in the development of the report only need to connect their own database tables, so that the control of data rights, but also better the data of the subsidiaries in the various subsidiaries of the database table.three,Project Construction Plan:1Kettle Introduction to the tools usedKettle is a foreign open source
1, Ali Open source software: datax
Datax is a heterogeneous data source offline Synchronization tool that is dedicated to achieving stable and efficient data synchronization between heterogeneous data sources including relational databases (MySQL, Oracle, etc.), HDFS, Hive, ODPS, HBase, FTP, and more. (Excerpt from Wikipedia)
2. Apache Open source software: Sqoop
Sqoop (pronunciation: skup) is an open source tool that is used primarily in Hadoop (Hive) and traditional databases (MySQL, PostgreSQ
. Hold down the SHIFT key and drag the "table input" icon from "Convert 1" to "table output" to establish a connection. Notice that the arrow is in the opposite direction. 3. Double-click "Table Input" to configure the relevant content Figure 4: Configuring the relevant content in table input Figure 5: Test result diagram Figure 6: Configure the SQL statement to query the specified table. And you can see the records in the table by "preview" Note: You can see the records in the table, which
These years, almost all work with ETL, have been exposed to a variety of ETL tools. These tools are now organized to share with you.
An ETL Tool
Foreign
1. DataStage
Reviews: The most professional ETL
file Contents① Select file type② to set separators between fieldsThe ③ field has enclosing characters, some words need to fill in with the enclosing character, such as the default is double quotation marks; No words can be removedWhether the ④ contains a file header, as contained, the first few lines are⑤ file format, Unix or Windows?⑥ sets the file character set. Otherwise, there will be garbled occurrences.7. Set the fields to be read. According to the order of the text, from left to right, i
The kettle of ETL tools extracts data from one database into another database:
1. Open the ETL folder, double-click Spoon.bat start Kettle
2. Resource pool selection, Connaught no choice to cancel
3. Select Close
4. Create a new transformation
5. Configure the required database
6. The data table that needs to be extracted, with the table input
considerServices sets the preferred instance, the standby instance. Once a single point of failure occurs for the preferred instance, services automatically failover to the standby instance.If the current RAC database is defined with 3 nodes Srv1,srv2,srv3There are two different service sales.2gotrade.com and settlement.2gotrade.com running in the current databaseThe Sales department establishes the connection through the Sales.2gotrade.com service name, and the Settlement department establishe
First, the purposeMerge tables on different servers onto another server. For example, merge table B on server 1 on table A and server 2 to table C on server 3Requirements: Table A needs to be cropped (removing unnecessary fields), table B needs to add some fieldsIi. Methods of Use(1) Create a new Table C (field that conforms to the actual system design) in the database on server 3(2) Create a new table input, connect to server 1, select the table you want to use by getting the SQL statement, or
Tags: sha feature ima Oracle ROCE-O technology share OSS settingsThe value mapping here is a bit like the Oracle's CAS when feature, such as a field a value of 1, but I now want to make the a=1 of a male, that is, 1 mapping into a male, this is the value mapping, then how to operate, in fact, Kettle has a "value mapping" component The following is a brief introduction to how to use;First enter the value mapping in the search box to the left of the program, find the value mapping component, and t
ETL is responsible for the distribution, heterogeneous data sources such as relational data, flat data files, such as the extraction of the temporary middle tier after the cleaning, transformation, integration, and finally loaded into the data warehouse or data mart, to become the basis of online analytical processing, data mining.
If the frequency of data conversion or not high requirements can be manually implemented
on your computer for your own use, or put them on a Web page, blog, corporate intranet, or how social bookmarking services are shared with others. The limit of use only depends on your imagination! Anything you do with Firefox, IMacros can execute it automatically. ***
The free version supports Firefox, Chrome, and Internet Explorer.
The billing version supports Adobe Flash, Adobe Flex, Silverlight, and Java applets through screen and image recognition technology.
Free version without cont
[color= "#02368d"]Linux Popular download tools recommendedTurn from:Http://doc.zoomquiet.org/data/20060730210451/index.html graphical interface Download toolLinux provides a lot of download tools like FlashGet, network ants, etc. in Windows. KgetKget is KDE's default breakpoint continuation tool, usually without installation. Its simple interface, easy to operate
Now the most popular post processing is PS preset action, a key to complete convenient and quick. Many special screen effects, as long as the corresponding preset action files found on the network, anyone can easily pull out beautiful tones. But what most people don't realize is that the principle isn't that hard, and I'll start with the most common curve tools to explain how to create
How to Learn 15 popular PHP development tools in 2015
In this article, the subject will provide you with a list of the best PHP development tools for free on the Internet. This list contains tools that are useful to beginners, as well as high-end tools required by p
Two popular PHP encryption and decryption tools ZendGuard and iconCube, zendiconcube. Two popular PHP encryption and decryption tools ZendGuard and iconCube, zendiconcube is currently popular in the market for the above-mentioned encryption and authorization software for PHP
PHP is a server-side scripting language, typically used for web development, but can also be used for other common functions. It is one of the most commonly used languages, and there are currently about 2.4 million web sites that are implemented in PHP language. There are a lot of free PHP development tools on the Web, and these tools are very useful and helpful for PHP programmers .
There are a lot of basi
PHP is the ideal choice for creating dynamic and novel Web applications. Needless to say, in the Web development World,PHP is one of the most popular languages. Some of the most useful PHP Open source tools have really saved a lot of development tasks. Heavy php development People and reduce their development burden. These PHP open source tools improve their work
QQ group 668524118, Welcome to join the exchange.
Overview: C + + is popular worldwide and is essential for application and system development. This article summed up the recent years by C + + programmers welcomed the 11 IDE, well received by Java Programmers 10 Java IDE Popular with C + + Programmers welcome 11 IDE
Decades later, C and C + + as the main advanced programming language, is still
As the cornerstone of the open-source development field, "All vulnerabilities are superficial" has become a well-known principle or even creed. As a well-known Linus law, when discussing the security advantages of open-source models, open code can improve the efficiency of Project vulnerability detection, which is also widely accepted by IT professionals.
Malware analysis, penetration testing, and Computer Forensics-GitHub hosts a series of compelling security
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.