前言
本文介绍一个提取 SQL 指纹的方法,就是将 SQL 语句的条件转换为 ?可用于脱敏和 SQL 聚类分析的场景。
1. 工具安装
这里用到的工具,就是 pt 工具集中的 pt-fingerprint 含在 Percona Toolkit 中,安装方法可参考 Percona Toolkit Install 这篇文章的 1.1 小节。
2. 实验案例
测试一个简单的 SQL:
pt-fingerprint --query "select a, b, c from users where id = 500"
输出:
select a, b, c from users where id = ?
复杂的长 SQL 建议使用文件的方式,否则会出现一些预期之外的问题,另外 SQL 中不能包含 # – 这些注释符号。
pt-fingerprint select.sql
3. Python 组合分析
代码中的 command_bin_path 就是 pt-fingerprint 的路径,可使用 which 命令查看,
# -*- encoding: utf-8 -*-
import os
import uuid
import time
import hashlib
import subprocess
# which pt-fingerprint
command_bin_path = "/usr/local/bin/pt-fingerprint"
def get_sql_hash(sql_query: str):
sql_info = ' '.join(sql_query.split())
sql_hash = hashlib.md5(sql_info.encode()).hexdigest()
return sql_hash
def exec_dos_command(command):
"""
Execute system commands.
"""
process = subprocess.Popen(command, shell=True, stdout=subprocess.PIPE,
stderr=subprocess.STDOUT)
content = process.stdout.read()
process.communicate()
if process.returncode != 0:
print('Program Error: {0}'.format(command))
print(content)
sys.exit(0)
else:
return content.decode()
def get_sql_fingerprint(sql_text):
"""
输出 SQL 语句,返回指纹化的 SQL 语句和 SQL HASH
"""
timestamp_ns = time.time_ns()
uuid_str = str(uuid.uuid4())[:16]
file_name = f"{timestamp_ns}_{uuid_str}" + '.sql'
with open(file_name, 'w') as w1:
w1.write(sql_text)
dos_command = command_bin_path + ' ' + file_name
content = exec_dos_command(dos_command)
sql_hash = get_sql_hash(content)
os.remove(file_name)
return content, sql_hash
sql1 = "select * from tb_user where id = 10;"
sql2 = "select * from tb_user where id = 11;"
sql3 = "select * from tb_user where id = 13;"
sql4 = "select * from tb_user where id = 14;"
sql5 = "select * from tb_user where id = 1576;"
sql6 = "select * from tb_user where id = 19;"
print(get_sql_fingerprint(sql1))
print(get_sql_fingerprint(sql2))
print(get_sql_fingerprint(sql3))
print(get_sql_fingerprint(sql4))
print(get_sql_fingerprint(sql5))
print(get_sql_fingerprint(sql6))
输出:
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
('select * from tb_user where id = ?;\n', 'ea72157cdf3e46c55792f49d01d1ce19')
提供了将 sql 转换为指纹和 sql hash 的函数,大家可以将此定制到自己的代码和功能中。