本文来自 MongoDB 核心开发人员@kchodorow 的博文,是其关于 MongoDB 查询迷题的第一篇,通过几个例子介绍了在Array 中进行范围查询的一些查询规则和用法。 假如一个 Collection 中有下面一些数据: {"x": -5}{"x": 0}{"x": 5}{"x": 10}{"x": [0, 5]}{"x": [
本文来自 MongoDB 核心开发人员@kchodorow 的博文,是其关于 MongoDB 查询迷题的第一篇,通过几个例子介绍了在Array 中进行范围查询的一些查询规则和用法。
假如一个 Collection 中有下面一些数据:
{"x": -5} {"x": 0} {"x": 5} {"x": 10} {"x": [0, 5]} {"x": [-5, 10]} {"x": [-5, 5, 10]}
如果我们在这个 Collection 上执行下面的查询语句,会返回哪些数据呢?
db.foo.find({"x" : {"$gt" : -1, "$lt" : 6}})
结果如下:
{"x" : 0} {"x" : 5} {"x" : [0, 5]} {"x" : [-5, 10]} //这货也被查出来了!! {"x" : [-5, 5, 10]}
上面红色注释一条,其两个元素都满足大于-1小于6的条件,为什么还是被查出来了呢?让我们来看看 MongoDB 在 Array 上进行范围查询的原理吧。
MongoDB 在进行范围查询时,可以理解为是按各个条件进行对比的,对于上面有疑问的一行,其 Array 中的 -5 是小于 6 的,而 10 是大于 ?-1 的,所以系统会认为这一行同时满足这两个条件(因为系统内部不管是不是 Array 的同一个元素满足这两个条件)。
如果要在同一个元素上满足各个条件,那么我们可以使用 $elemMatch 算符,比如我们将上面的查询语句做一下修改,会得到下面的结果:
> db.foo.find({x: {$elemMatch: {$gt : -1, $lt : 6}}}) {"x" : [0, 5]} {"x" : [-5, 5, 10]}
上面红色有疑问的那一条数据已经没有了,但是等一下,还有两条数据也跟着没有了,这是什么原因呢?丢失的两条数据是下面这两条:
{"x": 0} {"x": 5}
可以看到,这两条的共同特点,是其 x 对应的 value 值并不是一个 Array。这就是为什么这两条会丢掉的原因,因为 $elemMatch 算符只会对 Array 进行筛选,如果值根本就不是一个 Array,会被直接视为不满足条件。
上面两个查询方法,条有条的原理,但是都没有得到预期的结果,那有没有什么方法可以得到预期的查询结果呢?答案是肯定的,这时候我们要结合 min() 和 max() 两个方法。
先说一下 min() 和 max() 两个方法,这两个方法作用于 MongoDB 查询的 cursor,它可以对 MongoDB 在查询中使用索引的方式进行指导,min(-1) 的意思是,MongoDB 在使用此索引的时候,只使用大于 -1 部分的索引,而 max(6) 的意思是,MongoDB 在使用此索引的时候,只使用小于 6 部分的索引。比如我们使用下面的方式,就能够成功过滤掉上面红色有疑问的一行数据了。
> db.foo.find({"x" : {"$gt" : -1, "$lt" : 6}}).min({"x" : -1}).max({"x" : 6}) {"x" : 0} {"x" : [ 0, 5 ]} {"x" : 5} {"x" : [ -5, 5, 10 ]}
Have Fun!
原文参考:www.kchodorow.com
42区 VPS
42qu.com 云主机 , 卖给创业的你 。 点击这里 , 查看详情

Warning: call_user_func_array() expects parameter 1 to be a valid callback, function 'embed_rssfooter' not found or invalid function name in /home/b55/htdocs/blog.nosqlfan.com/wp-includes/plugin.php on line 166


MySQLviewshavelimitations:1)Theydon'tsupportallSQLoperations,restrictingdatamanipulationthroughviewswithjoinsorsubqueries.2)Theycanimpactperformance,especiallywithcomplexqueriesorlargedatasets.3)Viewsdon'tstoredata,potentiallyleadingtooutdatedinforma

ProperusermanagementinMySQLiscrucialforenhancingsecurityandensuringefficientdatabaseoperation.1)UseCREATEUSERtoaddusers,specifyingconnectionsourcewith@'localhost'or@'%'.2)GrantspecificprivilegeswithGRANT,usingleastprivilegeprincipletominimizerisks.3)

MySQLdoesn'timposeahardlimitontriggers,butpracticalfactorsdeterminetheireffectiveuse:1)Serverconfigurationimpactstriggermanagement;2)Complextriggersincreasesystemload;3)Largertablesslowtriggerperformance;4)Highconcurrencycancausetriggercontention;5)M

Yes,it'ssafetostoreBLOBdatainMySQL,butconsiderthesefactors:1)StorageSpace:BLOBscanconsumesignificantspace,potentiallyincreasingcostsandslowingperformance.2)Performance:LargerrowsizesduetoBLOBsmayslowdownqueries.3)BackupandRecovery:Theseprocessescanbe

Adding MySQL users through the PHP web interface can use MySQLi extensions. The steps are as follows: 1. Connect to the MySQL database and use the MySQLi extension. 2. Create a user, use the CREATEUSER statement, and use the PASSWORD() function to encrypt the password. 3. Prevent SQL injection and use the mysqli_real_escape_string() function to process user input. 4. Assign permissions to new users and use the GRANT statement.

MySQL'sBLOBissuitableforstoringbinarydatawithinarelationaldatabase,whileNoSQLoptionslikeMongoDB,Redis,andCassandraofferflexible,scalablesolutionsforunstructureddata.BLOBissimplerbutcanslowdownperformancewithlargedata;NoSQLprovidesbetterscalabilityand

ToaddauserinMySQL,use:CREATEUSER'username'@'host'IDENTIFIEDBY'password';Here'showtodoitsecurely:1)Choosethehostcarefullytocontrolaccess.2)SetresourcelimitswithoptionslikeMAX_QUERIES_PER_HOUR.3)Usestrong,uniquepasswords.4)EnforceSSL/TLSconnectionswith

ToavoidcommonmistakeswithstringdatatypesinMySQL,understandstringtypenuances,choosetherighttype,andmanageencodingandcollationsettingseffectively.1)UseCHARforfixed-lengthstrings,VARCHARforvariable-length,andTEXT/BLOBforlargerdata.2)Setcorrectcharacters


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

SublimeText3 English version
Recommended: Win version, supports code prompts!

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Linux new version
SublimeText3 Linux latest version

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
