You are viewing a plain text version of this content. The canonical link for it is here.
Posted to user@drill.apache.org by "Mehran.D [BR-PD]" <m_...@behinrahkar.com> on 2019/05/04 13:35:02 UTC

Serious performance problem in ctas json to parquet writing

Dears.

I have some jsons to be converted to parquet files.
After versin 1.13 I have a very serious issue in this writing. A sample of 100000 record json document takes 5 minutes to finish.
I'v included the plan.


Overview<http://10.233.50.111:8047/profiles/23329968-0346-e658-b1c9-92fd7dc60d2a#operator-overview>
Operator ID

Type

Avg Setup Time

Max Setup Time

Avg Process Time

Max Process Time

Min Wait Time

Avg Wait Time

Max Wait Time

% Fragment Time

% Query Time

Rows

Avg Peak Memory

Max Peak Memory

00-xx-00

SCREEN

0.000s

0.000s

1.262s

2.510s

0.004s

0.075s

0.145s

0.82%

0.82%

111,491

10MB

20MB

00-xx-01

PROJECT

0.002s

0.002s

0.001s

0.001s

0.000s

0.000s

0.000s

0.00%

0.00%

1

-

-

00-xx-02

PARQUET_WRITER

0.293s

0.293s

50.750s

50.750s

0.000s

0.000s

0.000s

16.44%

16.44%

111,490

-

-

00-xx-03

PROJECT_ALLOW_DUP

0.032s

0.032s

2m0s

2m0s

0.000s

0.000s

0.000s

39.01%

39.01%

111,490

13MB

13MB

00-xx-04

PROJECT

16.092s

16.092s

2m15s

2m15s

0.000s

0.000s

0.000s

43.73%

43.73%

111,490

13MB

13MB




I do not know what the mothods  'PROJECT_ALLOW_DUP' and 'PROJECT' does.
Please tell me what has changed from 1.13 up to now.
I have similar problem in 1.16 release.


and

Best Regards,

      [LOGO1]
Mehran Dashti
Product Leader
09125902452


RE: Serious performance problem in ctas json to parquet writing

Posted by "Mehran.D [BR-PD]" <m_...@behinrahkar.com>.
I’ve added the palan for both versions

Although number of row may be different but pan is correct.;

Please tell me what Project and Project_allow_dup steps do that have this massive ingestion time.





Plan for 1.13



Operator ID        Type      Avg Setup Time Max Setup Time               Avg Process Time             Max Process Time           Min Wait Time            Avg Wait Time   Max Wait Time  % Fragment Time             % Query Time    Rows     Avg Peak Memory                Max Peak Memory

00-xx-00               SCREEN 0.000s   0.000s   0.160s   0.319s   0.000s   0.006s   0.011s   33.19%  33.19%  23,838   4MB       8MB

00-xx-01               PROJECT              0.000s   0.000s   0.000s   0.000s   0.000s   0.000s   0.000s   0.00%    0.00%    1              -                -

00-xx-02               PARQUET_WRITER          0.001s   0.001s   0.469s   0.469s   0.000s   0.000s   0.000s   48.81%  48.81%                23,837   -              -

00-xx-03               PROJECT_ALLOW_DUP 0.001s   0.001s   0.002s   0.002s   0.000s   0.000s   0.000s   0.19%    0.19%                23,837   9MB       9MB

00-xx-04               PROJECT              0.009s   0.009s   0.171s   0.171s   0.000s   0.000s   0.000s   17.81%  17.81%  23,837   11MB                11MB



Paln for 1.13


  Screen : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 22815.0, cumulative cost = {116356.5 rows, 1.47179565E7 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768366
00-01      Project(Fragment=[$0], Number of records written=[$1]) : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 22815.0, cumulative cost = {114075.0 rows, 1.4715675E7 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768365
00-02        Writer : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 22815.0, cumulative cost = {91260.0 rows, 1.4670045E7 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768364
00-03          ProjectAllowDup(id=[$0], src_port=[$1], dst_port=[$2], dst_ip=[$3], src_ip=[$4], secondary_event_type=[$5], secondary_event_source=[$6], hash=[$7], receiver_msisdn=[$8], calling_number=[$9], subscriber_id=[$10], bolton_type=[$11], source_tid=[$12], a_number_balance_after=[$13], called_number=[$14], b_number_balance_after=[$15], secondary_device_id=[$16], namespace=[$17], secondary_event_severity=[$18], secondary_rept_dev_ip_addr=[$19], reference_id=[$20], transaction_id=[$21], price_base=[$22], deposit=[$23], module=[$24], vul_result_id=[$25], dest_service_name=[$26], vul_id=[$27], reason=[$28], device_id=[$29], sub_module=[$30], user_name=[$31], virus_name=[$32], custom_str12=[$33], custom_str13=[$34], custom_str10=[$35], custom_str11=[$36], custom_str16=[$37], custom_str17=[$38], custom_str14=[$39], custom_str15=[$40], custom_str4=[$41], custom_str5=[$42], custom_str2=[$43], custom_str3=[$44], custom_str8=[$45], custom_str9=[$46], custom_str6=[$47], custom_str7=[$48], custom_int8=[$49], custom_int9=[$50], custom_int6=[$51], custom_int7=[$52], custom_dateand_time2=[$53], custom_dateand_time3=[$54], custom_int10=[$55], custom_dateand_time1=[$56], custom_str20=[$57], custom_int1=[$58], custom_str18=[$59], custom_str19=[$60], custom_int4=[$61], custom_int5=[$62], custom_int2=[$63], custom_int3=[$64], custom_str1=[$65], custom_dateand_time4=[$66], custom_dateand_time5=[$67], cp_username=[$68], min_value=[$69], circle_name=[$70], cp_account_name=[$71], average60=[$72], serial=[$73], max_value=[$74], average15=[$75], internal_error_code=[$76], bank_id=[$77], a_number_balance_before=[$78], transfer_type=[$79], state=[$80], correlation_id=[$81], auth_code=[$82], retry_attempt=[$83], peak_value=[$84], request=[$85], is_credit=[$86], ability_id=[$87], response=[$88], process_name=[$89], recv_month=[$90], recv_day=[$91], recv_year=[$92], reporting_ip=[$93], raw_event_msg=[$94], event_type_id=[$95], severity=[$96], recv_time=[$97], device_time=[$98], record_time=[$99], recv_hour=[$100], recv_minute=[$101], impact=[$102], risk=[$103], collector_id=[$104], event_source_id=[$105], protocol_id=[$106]) : rowType = RecordType(BIGINT id, INTEGER src_port, INTEGER dst_port, BIGINT dst_ip, BIGINT src_ip, INTEGER secondary_event_type, INTEGER secondary_event_source, VARCHAR(65535) hash, BIGINT receiver_msisdn, VARCHAR(65535) calling_number, BIGINT subscriber_id, VARCHAR(65535) bolton_type, BIGINT source_tid, BIGINT a_number_balance_after, VARCHAR(65535) called_number, BIGINT b_number_balance_after, INTEGER secondary_device_id, VARCHAR(65535) namespace, INTEGER secondary_event_severity, BIGINT secondary_rept_dev_ip_addr, BIGINT reference_id, BIGINT transaction_id, BIGINT price_base, BIGINT deposit, VARCHAR(65535) module, VARCHAR(65535) vul_result_id, INTEGER dest_service_name, VARCHAR(65535) vul_id, VARCHAR(65535) reason, INTEGER device_id, VARCHAR(65535) sub_module, VARCHAR(65535) user_name, VARCHAR(65535) virus_name, VARCHAR(65535) custom_str12, VARCHAR(65535) custom_str13, VARCHAR(65535) custom_str10, VARCHAR(65535) custom_str11, VARCHAR(65535) custom_str16, VARCHAR(65535) custom_str17, VARCHAR(65535) custom_str14, VARCHAR(65535) custom_str15, VARCHAR(65535) custom_str4, VARCHAR(65535) custom_str5, VARCHAR(65535) custom_str2, VARCHAR(65535) custom_str3, VARCHAR(65535) custom_str8, VARCHAR(65535) custom_str9, VARCHAR(65535) custom_str6, VARCHAR(65535) custom_str7, BIGINT custom_int8, BIGINT custom_int9, BIGINT custom_int6, BIGINT custom_int7, ANY custom_dateand_time2, ANY custom_dateand_time3, BIGINT custom_int10, ANY custom_dateand_time1, VARCHAR(65535) custom_str20, BIGINT custom_int1, VARCHAR(65535) custom_str18, VARCHAR(65535) custom_str19, BIGINT custom_int4, BIGINT custom_int5, BIGINT custom_int2, BIGINT custom_int3, VARCHAR(65535) custom_str1, ANY custom_dateand_time4, ANY custom_dateand_time5, VARCHAR(65535) cp_username, DOUBLE min_value, VARCHAR(65535) circle_name, VARCHAR(65535) cp_account_name, DOUBLE average60, VARCHAR(65535) serial, DOUBLE max_value, DOUBLE average15, VARCHAR(65535) internal_error_code, INTEGER bank_id, BIGINT a_number_balance_before, VARCHAR(65535) transfer_type, VARCHAR(65535) state, VARCHAR(65535) correlation_id, VARCHAR(65535) auth_code, INTEGER retry_attempt, DOUBLE peak_value, VARCHAR(65535) request, VARCHAR(65535) is_credit, VARCHAR(65535) ability_id, VARCHAR(65535) response, VARCHAR(65535) process_name, INTEGER recv_month, INTEGER recv_day, INTEGER recv_year, BIGINT reporting_ip, VARCHAR(65535) raw_event_msg, INTEGER event_type_id, INTEGER severity, ANY recv_time, ANY device_time, ANY record_time, INTEGER recv_hour, INTEGER recv_minute, INTEGER impact, INTEGER risk, INTEGER collector_id, INTEGER event_source_id, INTEGER protocol_id): rowcount = 22815.0, cumulative cost = {68445.0 rows, 1.464723E7 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768363
00-04            Project(id=[CAST($0):BIGINT], src_port=[CAST($1):INTEGER], dst_port=[CAST($2):INTEGER], dst_ip=[CAST($3):BIGINT], src_ip=[CAST($4):BIGINT], secondary_event_type=[CAST($5):INTEGER], secondary_event_source=[CAST($6):INTEGER], hash=[CAST($7):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], receiver_msisdn=[CAST($8):BIGINT], calling_number=[CAST($9):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], subscriber_id=[CAST($10):BIGINT], bolton_type=[CAST($11):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], source_tid=[CAST($12):BIGINT], a_number_balance_after=[CAST($13):BIGINT], called_number=[CAST($14):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], b_number_balance_after=[CAST($15):BIGINT], secondary_device_id=[CAST($16):INTEGER], namespace=[CAST($17):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], secondary_event_severity=[CAST($18):INTEGER], secondary_rept_dev_ip_addr=[CAST($19):BIGINT], reference_id=[CAST($20):BIGINT], transaction_id=[CAST($21):BIGINT], price_base=[CAST($22):BIGINT], deposit=[CAST($23):BIGINT], module=[CAST($24):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vul_result_id=[CAST($25):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_service_name=[CAST($26):INTEGER], vul_id=[CAST($27):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], reason=[CAST($28):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], device_id=[CAST($29):INTEGER], sub_module=[CAST($30):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], user_name=[CAST($31):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virus_name=[CAST($32):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str12=[CAST($33):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str13=[CAST($34):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str10=[CAST($35):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str11=[CAST($36):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str16=[CAST($37):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str17=[CAST($38):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str14=[CAST($39):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str15=[CAST($40):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str4=[CAST($41):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str5=[CAST($42):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str2=[CAST($43):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str3=[CAST($44):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str8=[CAST($45):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str9=[CAST($46):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str6=[CAST($47):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str7=[CAST($48):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int8=[CAST($49):BIGINT], custom_int9=[CAST($50):BIGINT], custom_int6=[CAST($51):BIGINT], custom_int7=[CAST($52):BIGINT], custom_dateand_time2=[TO_TIMESTAMP($53, 'YYYY-MM-dd HH:mm:ss')], custom_dateand_time3=[TO_TIMESTAMP($54, 'YYYY-MM-dd HH:mm:ss')], custom_int10=[CAST($55):BIGINT], custom_dateand_time1=[TO_TIMESTAMP($56, 'YYYY-MM-dd HH:mm:ss')], custom_str20=[CAST($57):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int1=[CAST($58):BIGINT], custom_str18=[CAST($59):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str19=[CAST($60):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int4=[CAST($61):BIGINT], custom_int5=[CAST($62):BIGINT], custom_int2=[CAST($63):BIGINT], custom_int3=[CAST($64):BIGINT], custom_str1=[CAST($65):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_dateand_time4=[TO_TIMESTAMP($66, 'YYYY-MM-dd HH:mm:ss')], custom_dateand_time5=[TO_TIMESTAMP($67, 'YYYY-MM-dd HH:mm:ss')], cp_username=[CAST($68):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], min_value=[CAST($69):DOUBLE], circle_name=[CAST($70):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], cp_account_name=[CAST($71):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], average60=[CAST($72):DOUBLE], serial=[CAST($73):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], max_value=[CAST($74):DOUBLE], average15=[CAST($75):DOUBLE], internal_error_code=[CAST($76):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], bank_id=[CAST($77):INTEGER], a_number_balance_before=[CAST($78):BIGINT], transfer_type=[CAST($79):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], state=[CAST($80):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], correlation_id=[CAST($81):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], auth_code=[CAST($82):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], retry_attempt=[CAST($83):INTEGER], peak_value=[CAST($84):DOUBLE], request=[CAST($85):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], is_credit=[CAST($86):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], ability_id=[CAST($87):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], response=[CAST($88):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], process_name=[CAST($89):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_month=[CAST($90):INTEGER], recv_day=[CAST($91):INTEGER], recv_year=[CAST($92):INTEGER], reporting_ip=[CAST($93):BIGINT], raw_event_msg=[CAST($94):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_type_id=[CAST($95):INTEGER], severity=[CAST($96):INTEGER], recv_time=[TO_TIMESTAMP($97, 'YYYY-MM-dd HH:mm:ss')], device_time=[TO_TIMESTAMP($98, 'YYYY-MM-dd HH:mm:ss')], record_time=[TO_TIMESTAMP($99, 'YYYY-MM-dd HH:mm:ss')], recv_hour=[CAST($100):INTEGER], recv_minute=[CAST($101):INTEGER], impact=[CAST($102):INTEGER], risk=[CAST($103):INTEGER], collector_id=[CAST($104):INTEGER], event_source_id=[CAST($105):INTEGER], protocol_id=[CAST($106):INTEGER]) : rowType = RecordType(BIGINT id, INTEGER src_port, INTEGER dst_port, BIGINT dst_ip, BIGINT src_ip, INTEGER secondary_event_type, INTEGER secondary_event_source, VARCHAR(65535) hash, BIGINT receiver_msisdn, VARCHAR(65535) calling_number, BIGINT subscriber_id, VARCHAR(65535) bolton_type, BIGINT source_tid, BIGINT a_number_balance_after, VARCHAR(65535) called_number, BIGINT b_number_balance_after, INTEGER secondary_device_id, VARCHAR(65535) namespace, INTEGER secondary_event_severity, BIGINT secondary_rept_dev_ip_addr, BIGINT reference_id, BIGINT transaction_id, BIGINT price_base, BIGINT deposit, VARCHAR(65535) module, VARCHAR(65535) vul_result_id, INTEGER dest_service_name, VARCHAR(65535) vul_id, VARCHAR(65535) reason, INTEGER device_id, VARCHAR(65535) sub_module, VARCHAR(65535) user_name, VARCHAR(65535) virus_name, VARCHAR(65535) custom_str12, VARCHAR(65535) custom_str13, VARCHAR(65535) custom_str10, VARCHAR(65535) custom_str11, VARCHAR(65535) custom_str16, VARCHAR(65535) custom_str17, VARCHAR(65535) custom_str14, VARCHAR(65535) custom_str15, VARCHAR(65535) custom_str4, VARCHAR(65535) custom_str5, VARCHAR(65535) custom_str2, VARCHAR(65535) custom_str3, VARCHAR(65535) custom_str8, VARCHAR(65535) custom_str9, VARCHAR(65535) custom_str6, VARCHAR(65535) custom_str7, BIGINT custom_int8, BIGINT custom_int9, BIGINT custom_int6, BIGINT custom_int7, ANY custom_dateand_time2, ANY custom_dateand_time3, BIGINT custom_int10, ANY custom_dateand_time1, VARCHAR(65535) custom_str20, BIGINT custom_int1, VARCHAR(65535) custom_str18, VARCHAR(65535) custom_str19, BIGINT custom_int4, BIGINT custom_int5, BIGINT custom_int2, BIGINT custom_int3, VARCHAR(65535) custom_str1, ANY custom_dateand_time4, ANY custom_dateand_time5, VARCHAR(65535) cp_username, DOUBLE min_value, VARCHAR(65535) circle_name, VARCHAR(65535) cp_account_name, DOUBLE average60, VARCHAR(65535) serial, DOUBLE max_value, DOUBLE average15, VARCHAR(65535) internal_error_code, INTEGER bank_id, BIGINT a_number_balance_before, VARCHAR(65535) transfer_type, VARCHAR(65535) state, VARCHAR(65535) correlation_id, VARCHAR(65535) auth_code, INTEGER retry_attempt, DOUBLE peak_value, VARCHAR(65535) request, VARCHAR(65535) is_credit, VARCHAR(65535) ability_id, VARCHAR(65535) response, VARCHAR(65535) process_name, INTEGER recv_month, INTEGER recv_day, INTEGER recv_year, BIGINT reporting_ip, VARCHAR(65535) raw_event_msg, INTEGER event_type_id, INTEGER severity, ANY recv_time, ANY device_time, ANY record_time, INTEGER recv_hour, INTEGER recv_minute, INTEGER impact, INTEGER risk, INTEGER collector_id, INTEGER event_source_id, INTEGER protocol_id): rowcount = 22815.0, cumulative cost = {45630.0 rows, 1.2206025E7 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768362
00-05              Scan(groupscan=[EasyGroupScan [selectionRoot=file:/data/json/02-2019-05-08-16-29-37.json, numFiles=1, columns=[`0`, `6000092`, `6000093`, `6000082`, `6000081`, `6500078`, `6500079`, `6500070`, `6500090`, `6500091`, `6500088`, `6500089`, `6500094`, `6500095`, `6500092`, `6500093`, `6500082`, `6500083`, `6500080`, `6500081`, `6500086`, `6500087`, `6500084`, `6500085`, `6500043`, `6500062`, `6500060`, `6500061`, `6500051`, `6500048`, `6500049`, `6000666`, `6000704`, `6500394`, `6500395`, `6500392`, `6500393`, `6500398`, `6500399`, `6500396`, `6500397`, `6500386`, `6500387`, `6500384`, `6500385`, `6500390`, `6500391`, `6500388`, `6500389`, `6500410`, `6500411`, `6500408`, `6500409`, `6500414`, `6500415`, `6500412`, `6500413`, `6500402`, `6500403`, `6500400`, `6500401`, `6500406`, `6500407`, `6500404`, `6500405`, `6500383`, `6500416`, `6500417`, `6500106`, `6500107`, `6500104`, `6500105`, `6500110`, `6500111`, `6500108`, `6500109`, `6500098`, `6500099`, `6500096`, `6500097`, `6500102`, `6500103`, `6500100`, `6500101`, `6500114`, `6500115`, `6500112`, `6500113`, `6500116`, `6000281`, `6000034`, `6000032`, `6000033`, `6000008`, `6000012`, `6000000`, `6000001`, `6000006`, `6000005`, `6000024`, `6000031`, `6500013`, `6500003`, `6500004`, `6000075`, `6000079`, `6000091`], files=[file:/data/json/02-2019-05-08-16-29-37.json]]]) : rowType = RecordType(ANY 0, ANY 6000092, ANY 6000093, ANY 6000082, ANY 6000081, ANY 6500078, ANY 6500079, ANY 6500070, ANY 6500090, ANY 6500091, ANY 6500088, ANY 6500089, ANY 6500094, ANY 6500095, ANY 6500092, ANY 6500093, ANY 6500082, ANY 6500083, ANY 6500080, ANY 6500081, ANY 6500086, ANY 6500087, ANY 6500084, ANY 6500085, ANY 6500043, ANY 6500062, ANY 6500060, ANY 6500061, ANY 6500051, ANY 6500048, ANY 6500049, ANY 6000666, ANY 6000704, ANY 6500394, ANY 6500395, ANY 6500392, ANY 6500393, ANY 6500398, ANY 6500399, ANY 6500396, ANY 6500397, ANY 6500386, ANY 6500387, ANY 6500384, ANY 6500385, ANY 6500390, ANY 6500391, ANY 6500388, ANY 6500389, ANY 6500410, ANY 6500411, ANY 6500408, ANY 6500409, ANY 6500414, ANY 6500415, ANY 6500412, ANY 6500413, ANY 6500402, ANY 6500403, ANY 6500400, ANY 6500401, ANY 6500406, ANY 6500407, ANY 6500404, ANY 6500405, ANY 6500383, ANY 6500416, ANY 6500417, ANY 6500106, ANY 6500107, ANY 6500104, ANY 6500105, ANY 6500110, ANY 6500111, ANY 6500108, ANY 6500109, ANY 6500098, ANY 6500099, ANY 6500096, ANY 6500097, ANY 6500102, ANY 6500103, ANY 6500100, ANY 6500101, ANY 6500114, ANY 6500115, ANY 6500112, ANY 6500113, ANY 6500116, ANY 6000281, ANY 6000034, ANY 6000032, ANY 6000033, ANY 6000008, ANY 6000012, ANY 6000000, ANY 6000001, ANY 6000006, ANY 6000005, ANY 6000024, ANY 6000031, ANY 6500013, ANY 6500003, ANY 6500004, ANY 6000075, ANY 6000079, ANY 6000091): rowcount = 22815.0, cumulative cost = {22815.0 rows, 2441205.0 cpu, 0.0 io, 0.0 network, 0.0 memory}, id = 31768361





Plan for 1.16
00-00    Screen : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 56980.0, cumulative cost = {290598.0 rows, 1.44449998E8 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689215
00-01      Project(Fragment=[$0], Number of records written=[$1]) : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 56980.0, cumulative cost = {284900.0 rows, 1.444443E8 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689214
00-02        Writer : rowType = RecordType(VARCHAR(255) Fragment, BIGINT Number of records written): rowcount = 56980.0, cumulative cost = {227920.0 rows, 1.4433034E8 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689213
00-03          ProjectAllowDup(id=[$0], os_version=[$1], os_type=[$2], target_domain=[$3], domain=[$4], fqdn_name=[$5], vpn_tunnel_name=[$6], server_name=[$7], prev_src_ip_port=[$8], prev_src_ip_addr=[$9], host_virt_ip_addr=[$10], start_time=[$11], type=[$12], virt_context=[$13], original_called_party_number=[$14], calling_party_number=[$15], pa_fw_action=[$16], fw_rule=[$17], call_duration=[$18], date_time_disconnect=[$19], date_time_connect=[$20], final_called_party_number=[$21], tot_flows=[$22], wireless_sig_name=[$23], nep_m_a_c_addr=[$24], dest_fw_zone=[$25], src_fw_zone=[$26], src_name=[$27], target_host_m_a_c_addr=[$28], host_location=[$29], src_dest_t_c_p_flags=[$30], dev_port=[$31], host_v_l_a_n=[$32], nep_dev_name=[$33], out_intf_util=[$34], wlan_radio_id=[$35], wlan_channel_id=[$36], aruba_wlan_black_reson_cod=[$37], aruba_w_l_a_n_frame_type=[$38], min_value=[$39], cp_username=[$40], cp_account_name=[$41], circle_name=[$42], intf_name=[$43], serial=[$44], dest_intf_name=[$45], average60=[$46], dest_snmp_intf_index=[$47], average15=[$48], src_snmp_intf_index=[$49], max_value=[$50], nep_dev_port=[$51], bank_id=[$52], nep_dev_ip_addr=[$53], internal_error_code=[$54], src_a_s_num=[$55], transfer_type=[$56], tcp_flags=[$57], a_number_balance_before=[$58], icmp_code=[$59], correlation_id=[$60], icmp_type=[$61], state=[$62], src_intf_name=[$63], retry_attempt=[$64], fun_name=[$65], auth_code=[$66], msg=[$67], dest_a_s_num=[$68], ip_conn_id=[$69], in_intf_util=[$70], request=[$71], peak_value=[$72], tot_pkts=[$73], ability_id=[$74], recv_pkts=[$75], is_credit=[$76], sent_pkts=[$77], duration_m_sec=[$78], tot_bytes=[$79], response=[$80], recv_bytes=[$81], sent_bytes=[$82], amount=[$83], collector_id=[$84], group_name=[$85], secondary_event_source=[$86], secondary_event_type=[$87], config_name=[$88], event_source_id=[$89], api_user=[$90], error_no=[$91], comp_event_name=[$92], msisdn=[$93], dir_name=[$94], config_value=[$95], deviation=[$96], end_time=[$97], file_size=[$98], hash=[$99], calling_number=[$100], receiver_msisdn=[$101], protocol_id=[$102], bolton_type=[$103], host_m_a_c_addr=[$104], subscriber_id=[$105], dest_m_a_c_addr=[$106], a_number_balance_after=[$107], src_m_a_c_addr=[$108], source_tid=[$109], pre_n_a_t_dest_ip_port=[$110], b_number_balance_after=[$111], post_n_a_t_src_ip_port=[$112], called_number=[$113], dst_port=[$114], namespace=[$115], oid=[$116], src_port=[$117], secondary_device_id=[$118], err_reason=[$119], dest_name=[$120], custom_str30=[$121], secondary_rept_dev_ip_addr=[$122], dst_ip=[$123], custom_str29=[$124], secondary_event_severity=[$125], usr_msg=[$126], src_ip=[$127], custom_str28=[$128], transaction_id=[$129], op_name=[$130], dev_event_type_grp=[$131], custom_str27=[$132], reference_id=[$133], host_name=[$134], custom_str34=[$135], deposit=[$136], error_string=[$137], host_ip_addr=[$138], custom_str33=[$139], price_base=[$140], service_name=[$141], pre_n_a_t_dest_ip_addr=[$142], custom_str32=[$143], module=[$144], post_n_a_t_src_ip_addr=[$145], custom_str31=[$146], member_name=[$147], custom_str22=[$148], notif_id=[$149], provider=[$150], custom_str21=[$151], custom_dateand_time5=[$152], path=[$153], custom_dateand_time4=[$154], sub_class_name=[$155], access_group=[$156], custom_str26=[$157], custom_str25=[$158], app_probe_type=[$159], custom_str24=[$160], modifying_user=[$161], custom_str23=[$162], client_name=[$163], recv_month=[$164], session_name=[$165], recv_year=[$166], active=[$167], recv_day=[$168], operation_type=[$169], config_path=[$170], protocolName=[$171], locationPath=[$172], zone=[$173], custom_str36=[$174], begin_time=[$175], custom_str35=[$176], vul_result_id=[$177], vul_id=[$178], dest_service_name=[$179], reason=[$180], vuln_report_status=[$181], custom_str13=[$182], custom_str12=[$183], sub_module=[$184], custom_str11=[$185], app_port=[$186], device_id=[$187], custom_str10=[$188], custom_str17=[$189], custom_str16=[$190], custom_str15=[$191], custom_str14=[$192], custom_str5=[$193], to_state=[$194], custom_str4=[$195], rept_dev_name=[$196], from_state=[$197], app_server_version=[$198], custom_str3=[$199], session_no=[$200], relay_dev_name=[$201], app_client_version=[$202], custom_str2=[$203], class_name=[$204], reporting_ip=[$205], threat_category=[$206], custom_str9=[$207], win_event_id=[$208], event_category=[$209], threat_level=[$210], custom_str8=[$211], recv_minute=[$212], client_dev_name=[$213], custom_str7=[$214], custom_str6=[$215], raw_event_msg=[$216], impact=[$217], msg_hash=[$218], custom_int9=[$219], ips_ev_t_r=[$220], proc_id=[$221], custom_int8=[$222], ips_ev_r_r=[$223], proc_path=[$224], custom_int7=[$225], severity=[$226], custom_int6=[$227], virtual_router_no=[$228], event_type_id=[$229], aventail_status_code=[$230], custom_dateand_time3=[$231], slot_no=[$232], relay_dev_ip_addr=[$233], custom_dateand_time2=[$234], recv_time=[$235], fsm_index=[$236], custom_dateand_time1=[$237], device_time=[$238], risk=[$239], custom_int10=[$240], profile_name=[$241], event_action=[$242], custom_int1=[$243], modified_support_type=[$244], custom_str20=[$245], statement=[$246], custom_str19=[$247], src_domain=[$248], ip_reservation_name=[$249], custom_str18=[$250], dest_domain=[$251], record_time=[$252], option_name=[$253], custom_int5=[$254], wlan_contr_host_name=[$255], direction=[$256], exclution_range=[$257], recv_hour=[$258], custom_int4=[$259], info_u_r_l=[$260], original_duration=[$261], barracuda_reason=[$262], custom_int3=[$263], remedy_action=[$264], modified_duration=[$265], custom_int2=[$266], event_desc=[$267], s_value=[$268], l_d_a_p_display_name=[$269], event_name=[$270], event_time=[$271], agent_id=[$272], change_type=[$273], ip_scope_name=[$274], count=[$275], event_severity_cat=[$276], gpo_name=[$277], events_per_sec=[$278], access_mask=[$279], old_s_value=[$280], event_parsed_ok=[$281], custom_str1=[$282], instance_name=[$283], win_logon_caller_user=[$284], wlan_ssid=[$285], vuln_vendor=[$286], vuln_conseq=[$287], vuln_bug_traq_i_d=[$288], mem_total_m_b=[$289], feature=[$290], license_server=[$291], db_data_file_size_k_b=[$292], script=[$293], new_status=[$294], vmw_event_msg=[$295], vmw_event_cat=[$296], managed_entity=[$297], virdb_ver=[$298], total_disk_m_b=[$299], os_obj_action=[$300], phy_mach_name=[$301], new_vm_name=[$302], orig_vm_name=[$303], dest_vm_name=[$304], vm_template=[$305], orig_phy_mach_name=[$306], src_phy_mach_name=[$307], app_group_name=[$308], src_vm_name=[$309], vm_name=[$310], task=[$311], alarm=[$312], uuid=[$313], datacenter=[$314], orig_status=[$315], principal=[$316], role=[$317], folder=[$318], orig_resource_pool=[$319], resource_pool=[$320], drs_behavior=[$321], vm_guest_id=[$322], cluster_name=[$323], datastore=[$324], dest_resource_pool=[$325], new_resource_pool=[$326], db_sys_priv=[$327], db_obj_priv=[$328], db_priv_used=[$329], db_obj_name=[$330], smtp_fail_code=[$331], mail_action=[$332], policy_name=[$333], hw_failed_fan_count=[$334], num_user=[$335], non_heap_commit_k_b=[$336], non_heap_used_k_b=[$337], heap_max_k_b=[$338], heap_util=[$339], live_threads_max=[$340], live_threads=[$341], non_heap_util=[$342], non_heap_max_k_b=[$343], virus_quarant_status=[$344], virus_action=[$345], virus_type=[$346], virus_name=[$347], heap_commit_k_b=[$348], heap_used_k_b=[$349], hw_fan_status=[$350], scan_end=[$351], scan_begin=[$352], scan_profile=[$353], scan_id=[$354], db_ret_code=[$355], db_name=[$356], src_app=[$357], attack_name=[$358], vuln_type=[$359], vuln_name=[$360], vuln_id=[$361], loaded_classes=[$362], app_transport_proto=[$363], vuln_score_thresh=[$364], hw_disk_serial=[$365], vuln_score=[$366], vuln_c_v_e_id=[$367], http_status_code=[$368], uri_query=[$369], uri_stem=[$370], http_method=[$371], ftp_status_code=[$372], ftp_method=[$373], http_win32_status=[$374], http_sub_status_code=[$375], app_version=[$376], disk_util=[$377], app_name=[$378], logoff_time=[$379], free_disk_m_b=[$380], logon_time=[$381], http_referrer=[$382], http_user_agent=[$383], srv_inst_name=[$384], http_version=[$385], receiver_mail_addr=[$386], sw_proc_name=[$387], sender_mail_addr=[$388], sys_up_time=[$389], cpu_util=[$390], http_content_type=[$391], disk_name=[$392], spam_score=[$393], mem_util=[$394], vendor=[$395], web_category=[$396], mail_subject=[$397], win_srvc_name=[$398], win_kerb_fail_code=[$399], win_logon_fail_code=[$400], disk_usage=[$401], win_i_a_s_fail_code=[$402], http_content_len=[$403], src_terminal=[$404], command=[$405], cisco_a_c_s_fail_code=[$406], sys_temp=[$407], fw_action=[$408], target_user=[$409], user_name=[$410], win_logon_id=[$411], win_logon_type=[$412], target_user_grp=[$413], os_obj_name=[$414], user_grp=[$415], os_obj_type=[$416], process_name=[$417], file_name=[$418], os_obj_access_type=[$419], os_obj_handle_i_d=[$420], computer=[$421]) : rowType = RecordType(BIGINT id, VARCHAR(65535) os_version, VARCHAR(65535) os_type, VARCHAR(65535) target_domain, VARCHAR(65535) domain, VARCHAR(65535) fqdn_name, VARCHAR(65535) vpn_tunnel_name, VARCHAR(65535) server_name, INTEGER prev_src_ip_port, BIGINT prev_src_ip_addr, BIGINT host_virt_ip_addr, VARCHAR(65535) start_time, VARCHAR(65535) type, VARCHAR(65535) virt_context, VARCHAR(65535) original_called_party_number, VARCHAR(65535) calling_party_number, VARCHAR(65535) pa_fw_action, VARCHAR(65535) fw_rule, INTEGER call_duration, ANY date_time_disconnect, ANY date_time_connect, VARCHAR(65535) final_called_party_number, INTEGER tot_flows, VARCHAR(65535) wireless_sig_name, VARCHAR(65535) nep_m_a_c_addr, VARCHAR(65535) dest_fw_zone, VARCHAR(65535) src_fw_zone, VARCHAR(65535) src_name, VARCHAR(65535) target_host_m_a_c_addr, VARCHAR(65535) host_location, INTEGER src_dest_t_c_p_flags, VARCHAR(65535) dev_port, INTEGER host_v_l_a_n, VARCHAR(65535) nep_dev_name, DOUBLE out_intf_util, INTEGER wlan_radio_id, INTEGER wlan_channel_id, INTEGER aruba_wlan_black_reson_cod, INTEGER aruba_w_l_a_n_frame_type, DOUBLE min_value, VARCHAR(65535) cp_username, VARCHAR(65535) cp_account_name, VARCHAR(65535) circle_name, VARCHAR(65535) intf_name, VARCHAR(65535) serial, VARCHAR(65535) dest_intf_name, DOUBLE average60, INTEGER dest_snmp_intf_index, DOUBLE average15, INTEGER src_snmp_intf_index, DOUBLE max_value, VARCHAR(65535) nep_dev_port, INTEGER bank_id, BIGINT nep_dev_ip_addr, VARCHAR(65535) internal_error_code, INTEGER src_a_s_num, VARCHAR(65535) transfer_type, INTEGER tcp_flags, BIGINT a_number_balance_before, INTEGER icmp_code, VARCHAR(65535) correlation_id, INTEGER icmp_type, VARCHAR(65535) state, VARCHAR(65535) src_intf_name, INTEGER retry_attempt, VARCHAR(65535) fun_name, VARCHAR(65535) auth_code, VARCHAR(65535) msg, INTEGER dest_a_s_num, VARCHAR(65535) ip_conn_id, DOUBLE in_intf_util, VARCHAR(65535) request, DOUBLE peak_value, INTEGER tot_pkts, VARCHAR(65535) ability_id, INTEGER recv_pkts, VARCHAR(65535) is_credit, INTEGER sent_pkts, INTEGER duration_m_sec, INTEGER tot_bytes, VARCHAR(65535) response, INTEGER recv_bytes, INTEGER sent_bytes, BIGINT amount, INTEGER collector_id, VARCHAR(65535) group_name, INTEGER secondary_event_source, INTEGER secondary_event_type, VARCHAR(65535) config_name, INTEGER event_source_id, VARCHAR(65535) api_user, INTEGER error_no, VARCHAR(65535) comp_event_name, BIGINT msisdn, VARCHAR(65535) dir_name, VARCHAR(65535) config_value, INTEGER deviation, ANY end_time, INTEGER file_size, VARCHAR(65535) hash, VARCHAR(65535) calling_number, BIGINT receiver_msisdn, INTEGER protocol_id, VARCHAR(65535) bolton_type, VARCHAR(65535) host_m_a_c_addr, BIGINT subscriber_id, VARCHAR(65535) dest_m_a_c_addr, BIGINT a_number_balance_after, VARCHAR(65535) src_m_a_c_addr, BIGINT source_tid, INTEGER pre_n_a_t_dest_ip_port, BIGINT b_number_balance_after, INTEGER post_n_a_t_src_ip_port, VARCHAR(65535) called_number, INTEGER dst_port, VARCHAR(65535) namespace, VARCHAR(65535) oid, INTEGER src_port, INTEGER secondary_device_id, VARCHAR(65535) err_reason, VARCHAR(65535) dest_name, VARCHAR(65535) custom_str30, BIGINT secondary_rept_dev_ip_addr, BIGINT dst_ip, VARCHAR(65535) custom_str29, INTEGER secondary_event_severity, VARCHAR(65535) usr_msg, BIGINT src_ip, VARCHAR(65535) custom_str28, BIGINT transaction_id, VARCHAR(65535) op_name, VARCHAR(65535) dev_event_type_grp, VARCHAR(65535) custom_str27, BIGINT reference_id, VARCHAR(65535) host_name, VARCHAR(65535) custom_str34, BIGINT deposit, VARCHAR(65535) error_string, BIGINT host_ip_addr, VARCHAR(65535) custom_str33, BIGINT price_base, VARCHAR(65535) service_name, BIGINT pre_n_a_t_dest_ip_addr, VARCHAR(65535) custom_str32, VARCHAR(65535) module, BIGINT post_n_a_t_src_ip_addr, VARCHAR(65535) custom_str31, VARCHAR(65535) member_name, VARCHAR(65535) custom_str22, INTEGER notif_id, VARCHAR(65535) provider, VARCHAR(65535) custom_str21, ANY custom_dateand_time5, VARCHAR(65535) path, ANY custom_dateand_time4, VARCHAR(65535) sub_class_name, VARCHAR(65535) access_group, VARCHAR(65535) custom_str26, VARCHAR(65535) custom_str25, VARCHAR(65535) app_probe_type, VARCHAR(65535) custom_str24, VARCHAR(65535) modifying_user, VARCHAR(65535) custom_str23, VARCHAR(65535) client_name, INTEGER recv_month, VARCHAR(65535) session_name, INTEGER recv_year, VARCHAR(65535) active, INTEGER recv_day, VARCHAR(65535) operation_type, VARCHAR(65535) config_path, VARCHAR(65535) protocolName, VARCHAR(65535) locationPath, VARCHAR(65535) zone, VARCHAR(65535) custom_str36, ANY begin_time, VARCHAR(65535) custom_str35, VARCHAR(65535) vul_result_id, VARCHAR(65535) vul_id, INTEGER dest_service_name, VARCHAR(65535) reason, VARCHAR(65535) vuln_report_status, VARCHAR(65535) custom_str13, VARCHAR(65535) custom_str12, VARCHAR(65535) sub_module, VARCHAR(65535) custom_str11, VARCHAR(65535) app_port, INTEGER device_id, VARCHAR(65535) custom_str10, VARCHAR(65535) custom_str17, VARCHAR(65535) custom_str16, VARCHAR(65535) custom_str15, VARCHAR(65535) custom_str14, VARCHAR(65535) custom_str5, VARCHAR(65535) to_state, VARCHAR(65535) custom_str4, VARCHAR(65535) rept_dev_name, VARCHAR(65535) from_state, VARCHAR(65535) app_server_version, VARCHAR(65535) custom_str3, INTEGER session_no, VARCHAR(65535) relay_dev_name, VARCHAR(65535) app_client_version, VARCHAR(65535) custom_str2, VARCHAR(65535) class_name, BIGINT reporting_ip, VARCHAR(65535) threat_category, VARCHAR(65535) custom_str9, INTEGER win_event_id, INTEGER event_category, VARCHAR(65535) threat_level, VARCHAR(65535) custom_str8, INTEGER recv_minute, VARCHAR(65535) client_dev_name, VARCHAR(65535) custom_str7, VARCHAR(65535) custom_str6, VARCHAR(65535) raw_event_msg, INTEGER impact, VARCHAR(65535) msg_hash, BIGINT custom_int9, INTEGER ips_ev_t_r, VARCHAR(65535) proc_id, BIGINT custom_int8, INTEGER ips_ev_r_r, VARCHAR(65535) proc_path, BIGINT custom_int7, INTEGER severity, BIGINT custom_int6, INTEGER virtual_router_no, INTEGER event_type_id, VARCHAR(65535) aventail_status_code, ANY custom_dateand_time3, INTEGER slot_no, BIGINT relay_dev_ip_addr, ANY custom_dateand_time2, ANY recv_time, INTEGER fsm_index, ANY custom_dateand_time1, ANY device_time, INTEGER risk, BIGINT custom_int10, VARCHAR(65535) profile_name, INTEGER event_action, BIGINT custom_int1, VARCHAR(65535) modified_support_type, VARCHAR(65535) custom_str20, VARCHAR(65535) statement, VARCHAR(65535) custom_str19, VARCHAR(65535) src_domain, VARCHAR(65535) ip_reservation_name, VARCHAR(65535) custom_str18, VARCHAR(65535) dest_domain, ANY record_time, VARCHAR(65535) option_name, BIGINT custom_int5, VARCHAR(65535) wlan_contr_host_name, VARCHAR(65535) direction, VARCHAR(65535) exclution_range, INTEGER recv_hour, BIGINT custom_int4, VARCHAR(65535) info_u_r_l, INTEGER original_duration, INTEGER barracuda_reason, BIGINT custom_int3, VARCHAR(65535) remedy_action, INTEGER modified_duration, BIGINT custom_int2, VARCHAR(65535) event_desc, VARCHAR(65535) s_value, VARCHAR(65535) l_d_a_p_display_name, VARCHAR(65535) event_name, ANY event_time, VARCHAR(65535) agent_id, VARCHAR(65535) change_type, VARCHAR(65535) ip_scope_name, INTEGER count, VARCHAR(65535) event_severity_cat, VARCHAR(65535) gpo_name, DOUBLE events_per_sec, VARCHAR(65535) access_mask, VARCHAR(65535) old_s_value, INTEGER event_parsed_ok, VARCHAR(65535) custom_str1, VARCHAR(65535) instance_name, VARCHAR(65535) win_logon_caller_user, VARCHAR(65535) wlan_ssid, VARCHAR(65535) vuln_vendor, VARCHAR(65535) vuln_conseq, VARCHAR(65535) vuln_bug_traq_i_d, INTEGER mem_total_m_b, VARCHAR(65535) feature, VARCHAR(65535) license_server, INTEGER db_data_file_size_k_b, VARCHAR(65535) script, VARCHAR(65535) new_status, VARCHAR(65535) vmw_event_msg, VARCHAR(65535) vmw_event_cat, VARCHAR(65535) managed_entity, VARCHAR(65535) virdb_ver, INTEGER total_disk_m_b, VARCHAR(65535) os_obj_action, VARCHAR(65535) phy_mach_name, VARCHAR(65535) new_vm_name, VARCHAR(65535) orig_vm_name, VARCHAR(65535) dest_vm_name, VARCHAR(65535) vm_template, VARCHAR(65535) orig_phy_mach_name, VARCHAR(65535) src_phy_mach_name, VARCHAR(65535) app_group_name, VARCHAR(65535) src_vm_name, VARCHAR(65535) vm_name, VARCHAR(65535) task, VARCHAR(65535) alarm, VARCHAR(65535) uuid, VARCHAR(65535) datacenter, VARCHAR(65535) orig_status, VARCHAR(65535) principal, VARCHAR(65535) role, VARCHAR(65535) folder, VARCHAR(65535) orig_resource_pool, VARCHAR(65535) resource_pool, VARCHAR(65535) drs_behavior, VARCHAR(65535) vm_guest_id, VARCHAR(65535) cluster_name, VARCHAR(65535) datastore, VARCHAR(65535) dest_resource_pool, VARCHAR(65535) new_resource_pool, VARCHAR(65535) db_sys_priv, VARCHAR(65535) db_obj_priv, VARCHAR(65535) db_priv_used, VARCHAR(65535) db_obj_name, INTEGER smtp_fail_code, VARCHAR(65535) mail_action, VARCHAR(65535) policy_name, INTEGER hw_failed_fan_count, INTEGER num_user, BIGINT non_heap_commit_k_b, BIGINT non_heap_used_k_b, BIGINT heap_max_k_b, DOUBLE heap_util, INTEGER live_threads_max, INTEGER live_threads, DOUBLE non_heap_util, BIGINT non_heap_max_k_b, VARCHAR(65535) virus_quarant_status, VARCHAR(65535) virus_action, VARCHAR(65535) virus_type, VARCHAR(65535) virus_name, BIGINT heap_commit_k_b, BIGINT heap_used_k_b, INTEGER hw_fan_status, ANY scan_end, ANY scan_begin, VARCHAR(65535) scan_profile, INTEGER scan_id, INTEGER db_ret_code, VARCHAR(65535) db_name, VARCHAR(65535) src_app, VARCHAR(65535) attack_name, VARCHAR(65535) vuln_type, VARCHAR(65535) vuln_name, INTEGER vuln_id, INTEGER loaded_classes, VARCHAR(65535) app_transport_proto, INTEGER vuln_score_thresh, VARCHAR(65535) hw_disk_serial, INTEGER vuln_score, VARCHAR(65535) vuln_c_v_e_id, VARCHAR(65535) http_status_code, VARCHAR(65535) uri_query, VARCHAR(65535) uri_stem, VARCHAR(65535) http_method, VARCHAR(65535) ftp_status_code, VARCHAR(65535) ftp_method, VARCHAR(65535) http_win32_status, VARCHAR(65535) http_sub_status_code, VARCHAR(65535) app_version, DOUBLE disk_util, VARCHAR(65535) app_name, ANY logoff_time, INTEGER free_disk_m_b, ANY logon_time, VARCHAR(65535) http_referrer, VARCHAR(65535) http_user_agent, VARCHAR(65535) srv_inst_name, VARCHAR(65535) http_version, VARCHAR(65535) receiver_mail_addr, VARCHAR(65535) sw_proc_name, VARCHAR(65535) sender_mail_addr, INTEGER sys_up_time, INTEGER cpu_util, VARCHAR(65535) http_content_type, VARCHAR(65535) disk_name, INTEGER spam_score, INTEGER mem_util, VARCHAR(65535) vendor, VARCHAR(65535) web_category, VARCHAR(65535) mail_subject, VARCHAR(65535) win_srvc_name, VARCHAR(65535) win_kerb_fail_code, BIGINT win_logon_fail_code, BIGINT disk_usage, VARCHAR(65535) win_i_a_s_fail_code, INTEGER http_content_len, VARCHAR(65535) src_terminal, VARCHAR(65535) command, VARCHAR(65535) cisco_a_c_s_fail_code, INTEGER sys_temp, VARCHAR(65535) fw_action, VARCHAR(65535) target_user, VARCHAR(65535) user_name, VARCHAR(65535) win_logon_id, INTEGER win_logon_type, VARCHAR(65535) target_user_grp, VARCHAR(65535) os_obj_name, VARCHAR(65535) user_grp, VARCHAR(65535) os_obj_type, VARCHAR(65535) process_name, VARCHAR(65535) file_name, VARCHAR(65535) os_obj_access_type, VARCHAR(65535) os_obj_handle_i_d, VARCHAR(65535) computer): rowcount = 56980.0, cumulative cost = {170940.0 rows, 1.4427336E8 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689212
00-04            Project(id=[CAST($0):BIGINT], os_version=[CAST($1):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], os_type=[CAST($2):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], target_domain=[CAST($3):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], domain=[CAST($4):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], fqdn_name=[CAST($5):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vpn_tunnel_name=[CAST($6):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], server_name=[CAST($7):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], prev_src_ip_port=[CAST($8):INTEGER], prev_src_ip_addr=[CAST($9):BIGINT], host_virt_ip_addr=[CAST($10):BIGINT], start_time=[CAST($11):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], type=[CAST($12):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virt_context=[CAST($13):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], original_called_party_number=[CAST($14):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], calling_party_number=[CAST($15):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], pa_fw_action=[CAST($16):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], fw_rule=[CAST($17):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], call_duration=[CAST($18):INTEGER], date_time_disconnect=[TO_TIMESTAMP($19, 'YYYY-MM-dd HH:mm:ss')], date_time_connect=[TO_TIMESTAMP($20, 'YYYY-MM-dd HH:mm:ss')], final_called_party_number=[CAST($21):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], tot_flows=[CAST($22):INTEGER], wireless_sig_name=[CAST($23):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], nep_m_a_c_addr=[CAST($24):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_fw_zone=[CAST($25):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_fw_zone=[CAST($26):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_name=[CAST($27):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], target_host_m_a_c_addr=[CAST($28):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], host_location=[CAST($29):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_dest_t_c_p_flags=[CAST($30):INTEGER], dev_port=[CAST($31):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], host_v_l_a_n=[CAST($32):INTEGER], nep_dev_name=[CAST($33):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], out_intf_util=[CAST($34):DOUBLE], wlan_radio_id=[CAST($35):INTEGER], wlan_channel_id=[CAST($36):INTEGER], aruba_wlan_black_reson_cod=[CAST($37):INTEGER], aruba_w_l_a_n_frame_type=[CAST($38):INTEGER], min_value=[CAST($39):DOUBLE], cp_username=[CAST($40):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], cp_account_name=[CAST($41):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], circle_name=[CAST($42):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], intf_name=[CAST($43):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], serial=[CAST($44):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_intf_name=[CAST($45):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], average60=[CAST($46):DOUBLE], dest_snmp_intf_index=[CAST($47):INTEGER], average15=[CAST($48):DOUBLE], src_snmp_intf_index=[CAST($49):INTEGER], max_value=[CAST($50):DOUBLE], nep_dev_port=[CAST($51):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], bank_id=[CAST($52):INTEGER], nep_dev_ip_addr=[CAST($53):BIGINT], internal_error_code=[CAST($54):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_a_s_num=[CAST($55):INTEGER], transfer_type=[CAST($56):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], tcp_flags=[CAST($57):INTEGER], a_number_balance_before=[CAST($58):BIGINT], icmp_code=[CAST($59):INTEGER], correlation_id=[CAST($60):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], icmp_type=[CAST($61):INTEGER], state=[CAST($62):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_intf_name=[CAST($63):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], retry_attempt=[CAST($64):INTEGER], fun_name=[CAST($65):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], auth_code=[CAST($66):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], msg=[CAST($67):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_a_s_num=[CAST($68):INTEGER], ip_conn_id=[CAST($69):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], in_intf_util=[CAST($70):DOUBLE], request=[CAST($71):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], peak_value=[CAST($72):DOUBLE], tot_pkts=[CAST($73):INTEGER], ability_id=[CAST($74):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_pkts=[CAST($75):INTEGER], is_credit=[CAST($76):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sent_pkts=[CAST($77):INTEGER], duration_m_sec=[CAST($78):INTEGER], tot_bytes=[CAST($79):INTEGER], response=[CAST($80):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_bytes=[CAST($81):INTEGER], sent_bytes=[CAST($82):INTEGER], amount=[CAST($83):BIGINT], collector_id=[CAST($84):INTEGER], group_name=[CAST($85):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], secondary_event_source=[CAST($86):INTEGER], secondary_event_type=[CAST($87):INTEGER], config_name=[CAST($88):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_source_id=[CAST($89):INTEGER], api_user=[CAST($90):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], error_no=[CAST($91):INTEGER], comp_event_name=[CAST($92):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], msisdn=[CAST($93):BIGINT], dir_name=[CAST($94):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], config_value=[CAST($95):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], deviation=[CAST($96):INTEGER], end_time=[TO_TIMESTAMP($97, 'YYYY-MM-dd HH:mm:ss')], file_size=[CAST($98):INTEGER], hash=[CAST($99):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], calling_number=[CAST($100):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], receiver_msisdn=[CAST($101):BIGINT], protocol_id=[CAST($102):INTEGER], bolton_type=[CAST($103):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], host_m_a_c_addr=[CAST($104):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], subscriber_id=[CAST($105):BIGINT], dest_m_a_c_addr=[CAST($106):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], a_number_balance_after=[CAST($107):BIGINT], src_m_a_c_addr=[CAST($108):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], source_tid=[CAST($109):BIGINT], pre_n_a_t_dest_ip_port=[CAST($110):INTEGER], b_number_balance_after=[CAST($111):BIGINT], post_n_a_t_src_ip_port=[CAST($112):INTEGER], called_number=[CAST($113):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dst_port=[CAST($114):INTEGER], namespace=[CAST($115):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], oid=[CAST($116):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_port=[CAST($117):INTEGER], secondary_device_id=[CAST($118):INTEGER], err_reason=[CAST($119):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_name=[CAST($120):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str30=[CAST($121):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], secondary_rept_dev_ip_addr=[CAST($122):BIGINT], dst_ip=[CAST($123):BIGINT], custom_str29=[CAST($124):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], secondary_event_severity=[CAST($125):INTEGER], usr_msg=[CAST($126):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_ip=[CAST($127):BIGINT], custom_str28=[CAST($128):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], transaction_id=[CAST($129):BIGINT], op_name=[CAST($130):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dev_event_type_grp=[CAST($131):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str27=[CAST($132):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], reference_id=[CAST($133):BIGINT], host_name=[CAST($134):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str34=[CAST($135):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], deposit=[CAST($136):BIGINT], error_string=[CAST($137):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], host_ip_addr=[CAST($138):BIGINT], custom_str33=[CAST($139):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], price_base=[CAST($140):BIGINT], service_name=[CAST($141):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], pre_n_a_t_dest_ip_addr=[CAST($142):BIGINT], custom_str32=[CAST($143):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], module=[CAST($144):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], post_n_a_t_src_ip_addr=[CAST($145):BIGINT], custom_str31=[CAST($146):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], member_name=[CAST($147):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str22=[CAST($148):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], notif_id=[CAST($149):INTEGER], provider=[CAST($150):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str21=[CAST($151):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_dateand_time5=[TO_TIMESTAMP($152, 'YYYY-MM-dd HH:mm:ss')], path=[CAST($153):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_dateand_time4=[TO_TIMESTAMP($154, 'YYYY-MM-dd HH:mm:ss')], sub_class_name=[CAST($155):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], access_group=[CAST($156):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str26=[CAST($157):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str25=[CAST($158):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_probe_type=[CAST($159):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str24=[CAST($160):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], modifying_user=[CAST($161):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str23=[CAST($162):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], client_name=[CAST($163):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_month=[CAST($164):INTEGER], session_name=[CAST($165):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_year=[CAST($166):INTEGER], active=[CAST($167):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_day=[CAST($168):INTEGER], operation_type=[CAST($169):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], config_path=[CAST($170):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], protocolName=[CAST($171):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], locationPath=[CAST($172):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], zone=[CAST($173):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str36=[CAST($174):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], begin_time=[TO_TIMESTAMP($175, 'YYYY-MM-dd HH:mm:ss')], custom_str35=[CAST($176):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vul_result_id=[CAST($177):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vul_id=[CAST($178):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_service_name=[CAST($179):INTEGER], reason=[CAST($180):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_report_status=[CAST($181):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str13=[CAST($182):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str12=[CAST($183):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sub_module=[CAST($184):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str11=[CAST($185):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_port=[CAST($186):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], device_id=[CAST($187):INTEGER], custom_str10=[CAST($188):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str17=[CAST($189):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str16=[CAST($190):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str15=[CAST($191):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str14=[CAST($192):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str5=[CAST($193):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], to_state=[CAST($194):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str4=[CAST($195):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], rept_dev_name=[CAST($196):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], from_state=[CAST($197):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_server_version=[CAST($198):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str3=[CAST($199):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], session_no=[CAST($200):INTEGER], relay_dev_name=[CAST($201):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_client_version=[CAST($202):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str2=[CAST($203):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], class_name=[CAST($204):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], reporting_ip=[CAST($205):BIGINT], threat_category=[CAST($206):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str9=[CAST($207):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_event_id=[CAST($208):INTEGER], event_category=[CAST($209):INTEGER], threat_level=[CAST($210):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str8=[CAST($211):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_minute=[CAST($212):INTEGER], client_dev_name=[CAST($213):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str7=[CAST($214):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str6=[CAST($215):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], raw_event_msg=[CAST($216):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], impact=[CAST($217):INTEGER], msg_hash=[CAST($218):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int9=[CAST($219):BIGINT], ips_ev_t_r=[CAST($220):INTEGER], proc_id=[CAST($221):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int8=[CAST($222):BIGINT], ips_ev_r_r=[CAST($223):INTEGER], proc_path=[CAST($224):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int7=[CAST($225):BIGINT], severity=[CAST($226):INTEGER], custom_int6=[CAST($227):BIGINT], virtual_router_no=[CAST($228):INTEGER], event_type_id=[CAST($229):INTEGER], aventail_status_code=[CAST($230):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_dateand_time3=[TO_TIMESTAMP($231, 'YYYY-MM-dd HH:mm:ss')], slot_no=[CAST($232):INTEGER], relay_dev_ip_addr=[CAST($233):BIGINT], custom_dateand_time2=[TO_TIMESTAMP($234, 'YYYY-MM-dd HH:mm:ss')], recv_time=[TO_TIMESTAMP($235, 'YYYY-MM-dd HH:mm:ss')], fsm_index=[CAST($236):INTEGER], custom_dateand_time1=[TO_TIMESTAMP($237, 'YYYY-MM-dd HH:mm:ss')], device_time=[TO_TIMESTAMP($238, 'YYYY-MM-dd HH:mm:ss')], risk=[CAST($239):INTEGER], custom_int10=[CAST($240):BIGINT], profile_name=[CAST($241):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_action=[CAST($242):INTEGER], custom_int1=[CAST($243):BIGINT], modified_support_type=[CAST($244):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str20=[CAST($245):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], statement=[CAST($246):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str19=[CAST($247):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_domain=[CAST($248):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], ip_reservation_name=[CAST($249):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_str18=[CAST($250):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_domain=[CAST($251):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], record_time=[TO_TIMESTAMP($252, 'YYYY-MM-dd HH:mm:ss')], option_name=[CAST($253):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], custom_int5=[CAST($254):BIGINT], wlan_contr_host_name=[CAST($255):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], direction=[CAST($256):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], exclution_range=[CAST($257):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], recv_hour=[CAST($258):INTEGER], custom_int4=[CAST($259):BIGINT], info_u_r_l=[CAST($260):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], original_duration=[CAST($261):INTEGER], barracuda_reason=[CAST($262):INTEGER], custom_int3=[CAST($263):BIGINT], remedy_action=[CAST($264):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], modified_duration=[CAST($265):INTEGER], custom_int2=[CAST($266):BIGINT], event_desc=[CAST($267):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], s_value=[CAST($268):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], l_d_a_p_display_name=[CAST($269):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_name=[CAST($270):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_time=[TO_TIMESTAMP($271, 'YYYY-MM-dd HH:mm:ss')], agent_id=[CAST($272):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], change_type=[CAST($273):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], ip_scope_name=[CAST($274):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], count=[CAST($275):INTEGER], event_severity_cat=[CAST($276):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], gpo_name=[CAST($277):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], events_per_sec=[CAST($278):DOUBLE], access_mask=[CAST($279):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], old_s_value=[CAST($280):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], event_parsed_ok=[CAST($281):INTEGER], custom_str1=[CAST($282):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], instance_name=[CAST($283):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_logon_caller_user=[CAST($284):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], wlan_ssid=[CAST($285):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_vendor=[CAST($286):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_conseq=[CAST($287):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_bug_traq_i_d=[CAST($288):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], mem_total_m_b=[CAST($289):INTEGER], feature=[CAST($290):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], license_server=[CAST($291):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], db_data_file_size_k_b=[CAST($292):INTEGER], script=[CAST($293):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], new_status=[CAST($294):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vmw_event_msg=[CAST($295):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vmw_event_cat=[CAST($296):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], managed_entity=[CAST($297):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virdb_ver=[CAST($298):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], total_disk_m_b=[CAST($299):INTEGER], os_obj_action=[CAST($300):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], phy_mach_name=[CAST($301):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], new_vm_name=[CAST($302):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], orig_vm_name=[CAST($303):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_vm_name=[CAST($304):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vm_template=[CAST($305):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], orig_phy_mach_name=[CAST($306):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_phy_mach_name=[CAST($307):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_group_name=[CAST($308):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_vm_name=[CAST($309):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vm_name=[CAST($310):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], task=[CAST($311):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], alarm=[CAST($312):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], uuid=[CAST($313):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], datacenter=[CAST($314):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], orig_status=[CAST($315):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], principal=[CAST($316):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], role=[CAST($317):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], folder=[CAST($318):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], orig_resource_pool=[CAST($319):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], resource_pool=[CAST($320):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], drs_behavior=[CAST($321):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vm_guest_id=[CAST($322):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], cluster_name=[CAST($323):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], datastore=[CAST($324):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], dest_resource_pool=[CAST($325):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], new_resource_pool=[CAST($326):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], db_sys_priv=[CAST($327):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], db_obj_priv=[CAST($328):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], db_priv_used=[CAST($329):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], db_obj_name=[CAST($330):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], smtp_fail_code=[CAST($331):INTEGER], mail_action=[CAST($332):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], policy_name=[CAST($333):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], hw_failed_fan_count=[CAST($334):INTEGER], num_user=[CAST($335):INTEGER], non_heap_commit_k_b=[CAST($336):BIGINT], non_heap_used_k_b=[CAST($337):BIGINT], heap_max_k_b=[CAST($338):BIGINT], heap_util=[CAST($339):DOUBLE], live_threads_max=[CAST($340):INTEGER], live_threads=[CAST($341):INTEGER], non_heap_util=[CAST($342):DOUBLE], non_heap_max_k_b=[CAST($343):BIGINT], virus_quarant_status=[CAST($344):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virus_action=[CAST($345):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virus_type=[CAST($346):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], virus_name=[CAST($347):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], heap_commit_k_b=[CAST($348):BIGINT], heap_used_k_b=[CAST($349):BIGINT], hw_fan_status=[CAST($350):INTEGER], scan_end=[TO_TIMESTAMP($351, 'YYYY-MM-dd HH:mm:ss')], scan_begin=[TO_TIMESTAMP($352, 'YYYY-MM-dd HH:mm:ss')], scan_profile=[CAST($353):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], scan_id=[CAST($354):INTEGER], db_ret_code=[CAST($355):INTEGER], db_name=[CAST($356):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], src_app=[CAST($357):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], attack_name=[CAST($358):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_type=[CAST($359):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_name=[CAST($360):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_id=[CAST($361):INTEGER], loaded_classes=[CAST($362):INTEGER], app_transport_proto=[CAST($363):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_score_thresh=[CAST($364):INTEGER], hw_disk_serial=[CAST($365):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], vuln_score=[CAST($366):INTEGER], vuln_c_v_e_id=[CAST($367):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_status_code=[CAST($368):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], uri_query=[CAST($369):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], uri_stem=[CAST($370):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_method=[CAST($371):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], ftp_status_code=[CAST($372):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], ftp_method=[CAST($373):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_win32_status=[CAST($374):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_sub_status_code=[CAST($375):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], app_version=[CAST($376):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], disk_util=[CAST($377):DOUBLE], app_name=[CAST($378):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], logoff_time=[TO_TIMESTAMP($379, 'YYYY-MM-dd HH:mm:ss')], free_disk_m_b=[CAST($380):INTEGER], logon_time=[TO_TIMESTAMP($381, 'YYYY-MM-dd HH:mm:ss')], http_referrer=[CAST($382):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_user_agent=[CAST($383):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], srv_inst_name=[CAST($384):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_version=[CAST($385):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], receiver_mail_addr=[CAST($386):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sw_proc_name=[CAST($387):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sender_mail_addr=[CAST($388):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sys_up_time=[CAST($389):INTEGER], cpu_util=[CAST($390):INTEGER], http_content_type=[CAST($391):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], disk_name=[CAST($392):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], spam_score=[CAST($393):INTEGER], mem_util=[CAST($394):INTEGER], vendor=[CAST($395):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], web_category=[CAST($396):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], mail_subject=[CAST($397):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_srvc_name=[CAST($398):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_kerb_fail_code=[CAST($399):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_logon_fail_code=[CAST($400):BIGINT], disk_usage=[CAST($401):BIGINT], win_i_a_s_fail_code=[CAST($402):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], http_content_len=[CAST($403):INTEGER], src_terminal=[CAST($404):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], command=[CAST($405):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], cisco_a_c_s_fail_code=[CAST($406):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], sys_temp=[CAST($407):INTEGER], fw_action=[CAST($408):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], target_user=[CAST($409):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], user_name=[CAST($410):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_logon_id=[CAST($411):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], win_logon_type=[CAST($412):INTEGER], target_user_grp=[CAST($413):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], os_obj_name=[CAST($414):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], user_grp=[CAST($415):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], os_obj_type=[CAST($416):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], process_name=[CAST($417):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], file_name=[CAST($418):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], os_obj_access_type=[CAST($419):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], os_obj_handle_i_d=[CAST($420):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"], computer=[CAST($421):VARCHAR(65535) CHARACTER SET "UTF-16LE" COLLATE "UTF-16LE$en_US$primary"]) : rowType = RecordType(BIGINT id, VARCHAR(65535) os_version, VARCHAR(65535) os_type, VARCHAR(65535) target_domain, VARCHAR(65535) domain, VARCHAR(65535) fqdn_name, VARCHAR(65535) vpn_tunnel_name, VARCHAR(65535) server_name, INTEGER prev_src_ip_port, BIGINT prev_src_ip_addr, BIGINT host_virt_ip_addr, VARCHAR(65535) start_time, VARCHAR(65535) type, VARCHAR(65535) virt_context, VARCHAR(65535) original_called_party_number, VARCHAR(65535) calling_party_number, VARCHAR(65535) pa_fw_action, VARCHAR(65535) fw_rule, INTEGER call_duration, ANY date_time_disconnect, ANY date_time_connect, VARCHAR(65535) final_called_party_number, INTEGER tot_flows, VARCHAR(65535) wireless_sig_name, VARCHAR(65535) nep_m_a_c_addr, VARCHAR(65535) dest_fw_zone, VARCHAR(65535) src_fw_zone, VARCHAR(65535) src_name, VARCHAR(65535) target_host_m_a_c_addr, VARCHAR(65535) host_location, INTEGER src_dest_t_c_p_flags, VARCHAR(65535) dev_port, INTEGER host_v_l_a_n, VARCHAR(65535) nep_dev_name, DOUBLE out_intf_util, INTEGER wlan_radio_id, INTEGER wlan_channel_id, INTEGER aruba_wlan_black_reson_cod, INTEGER aruba_w_l_a_n_frame_type, DOUBLE min_value, VARCHAR(65535) cp_username, VARCHAR(65535) cp_account_name, VARCHAR(65535) circle_name, VARCHAR(65535) intf_name, VARCHAR(65535) serial, VARCHAR(65535) dest_intf_name, DOUBLE average60, INTEGER dest_snmp_intf_index, DOUBLE average15, INTEGER src_snmp_intf_index, DOUBLE max_value, VARCHAR(65535) nep_dev_port, INTEGER bank_id, BIGINT nep_dev_ip_addr, VARCHAR(65535) internal_error_code, INTEGER src_a_s_num, VARCHAR(65535) transfer_type, INTEGER tcp_flags, BIGINT a_number_balance_before, INTEGER icmp_code, VARCHAR(65535) correlation_id, INTEGER icmp_type, VARCHAR(65535) state, VARCHAR(65535) src_intf_name, INTEGER retry_attempt, VARCHAR(65535) fun_name, VARCHAR(65535) auth_code, VARCHAR(65535) msg, INTEGER dest_a_s_num, VARCHAR(65535) ip_conn_id, DOUBLE in_intf_util, VARCHAR(65535) request, DOUBLE peak_value, INTEGER tot_pkts, VARCHAR(65535) ability_id, INTEGER recv_pkts, VARCHAR(65535) is_credit, INTEGER sent_pkts, INTEGER duration_m_sec, INTEGER tot_bytes, VARCHAR(65535) response, INTEGER recv_bytes, INTEGER sent_bytes, BIGINT amount, INTEGER collector_id, VARCHAR(65535) group_name, INTEGER secondary_event_source, INTEGER secondary_event_type, VARCHAR(65535) config_name, INTEGER event_source_id, VARCHAR(65535) api_user, INTEGER error_no, VARCHAR(65535) comp_event_name, BIGINT msisdn, VARCHAR(65535) dir_name, VARCHAR(65535) config_value, INTEGER deviation, ANY end_time, INTEGER file_size, VARCHAR(65535) hash, VARCHAR(65535) calling_number, BIGINT receiver_msisdn, INTEGER protocol_id, VARCHAR(65535) bolton_type, VARCHAR(65535) host_m_a_c_addr, BIGINT subscriber_id, VARCHAR(65535) dest_m_a_c_addr, BIGINT a_number_balance_after, VARCHAR(65535) src_m_a_c_addr, BIGINT source_tid, INTEGER pre_n_a_t_dest_ip_port, BIGINT b_number_balance_after, INTEGER post_n_a_t_src_ip_port, VARCHAR(65535) called_number, INTEGER dst_port, VARCHAR(65535) namespace, VARCHAR(65535) oid, INTEGER src_port, INTEGER secondary_device_id, VARCHAR(65535) err_reason, VARCHAR(65535) dest_name, VARCHAR(65535) custom_str30, BIGINT secondary_rept_dev_ip_addr, BIGINT dst_ip, VARCHAR(65535) custom_str29, INTEGER secondary_event_severity, VARCHAR(65535) usr_msg, BIGINT src_ip, VARCHAR(65535) custom_str28, BIGINT transaction_id, VARCHAR(65535) op_name, VARCHAR(65535) dev_event_type_grp, VARCHAR(65535) custom_str27, BIGINT reference_id, VARCHAR(65535) host_name, VARCHAR(65535) custom_str34, BIGINT deposit, VARCHAR(65535) error_string, BIGINT host_ip_addr, VARCHAR(65535) custom_str33, BIGINT price_base, VARCHAR(65535) service_name, BIGINT pre_n_a_t_dest_ip_addr, VARCHAR(65535) custom_str32, VARCHAR(65535) module, BIGINT post_n_a_t_src_ip_addr, VARCHAR(65535) custom_str31, VARCHAR(65535) member_name, VARCHAR(65535) custom_str22, INTEGER notif_id, VARCHAR(65535) provider, VARCHAR(65535) custom_str21, ANY custom_dateand_time5, VARCHAR(65535) path, ANY custom_dateand_time4, VARCHAR(65535) sub_class_name, VARCHAR(65535) access_group, VARCHAR(65535) custom_str26, VARCHAR(65535) custom_str25, VARCHAR(65535) app_probe_type, VARCHAR(65535) custom_str24, VARCHAR(65535) modifying_user, VARCHAR(65535) custom_str23, VARCHAR(65535) client_name, INTEGER recv_month, VARCHAR(65535) session_name, INTEGER recv_year, VARCHAR(65535) active, INTEGER recv_day, VARCHAR(65535) operation_type, VARCHAR(65535) config_path, VARCHAR(65535) protocolName, VARCHAR(65535) locationPath, VARCHAR(65535) zone, VARCHAR(65535) custom_str36, ANY begin_time, VARCHAR(65535) custom_str35, VARCHAR(65535) vul_result_id, VARCHAR(65535) vul_id, INTEGER dest_service_name, VARCHAR(65535) reason, VARCHAR(65535) vuln_report_status, VARCHAR(65535) custom_str13, VARCHAR(65535) custom_str12, VARCHAR(65535) sub_module, VARCHAR(65535) custom_str11, VARCHAR(65535) app_port, INTEGER device_id, VARCHAR(65535) custom_str10, VARCHAR(65535) custom_str17, VARCHAR(65535) custom_str16, VARCHAR(65535) custom_str15, VARCHAR(65535) custom_str14, VARCHAR(65535) custom_str5, VARCHAR(65535) to_state, VARCHAR(65535) custom_str4, VARCHAR(65535) rept_dev_name, VARCHAR(65535) from_state, VARCHAR(65535) app_server_version, VARCHAR(65535) custom_str3, INTEGER session_no, VARCHAR(65535) relay_dev_name, VARCHAR(65535) app_client_version, VARCHAR(65535) custom_str2, VARCHAR(65535) class_name, BIGINT reporting_ip, VARCHAR(65535) threat_category, VARCHAR(65535) custom_str9, INTEGER win_event_id, INTEGER event_category, VARCHAR(65535) threat_level, VARCHAR(65535) custom_str8, INTEGER recv_minute, VARCHAR(65535) client_dev_name, VARCHAR(65535) custom_str7, VARCHAR(65535) custom_str6, VARCHAR(65535) raw_event_msg, INTEGER impact, VARCHAR(65535) msg_hash, BIGINT custom_int9, INTEGER ips_ev_t_r, VARCHAR(65535) proc_id, BIGINT custom_int8, INTEGER ips_ev_r_r, VARCHAR(65535) proc_path, BIGINT custom_int7, INTEGER severity, BIGINT custom_int6, INTEGER virtual_router_no, INTEGER event_type_id, VARCHAR(65535) aventail_status_code, ANY custom_dateand_time3, INTEGER slot_no, BIGINT relay_dev_ip_addr, ANY custom_dateand_time2, ANY recv_time, INTEGER fsm_index, ANY custom_dateand_time1, ANY device_time, INTEGER risk, BIGINT custom_int10, VARCHAR(65535) profile_name, INTEGER event_action, BIGINT custom_int1, VARCHAR(65535) modified_support_type, VARCHAR(65535) custom_str20, VARCHAR(65535) statement, VARCHAR(65535) custom_str19, VARCHAR(65535) src_domain, VARCHAR(65535) ip_reservation_name, VARCHAR(65535) custom_str18, VARCHAR(65535) dest_domain, ANY record_time, VARCHAR(65535) option_name, BIGINT custom_int5, VARCHAR(65535) wlan_contr_host_name, VARCHAR(65535) direction, VARCHAR(65535) exclution_range, INTEGER recv_hour, BIGINT custom_int4, VARCHAR(65535) info_u_r_l, INTEGER original_duration, INTEGER barracuda_reason, BIGINT custom_int3, VARCHAR(65535) remedy_action, INTEGER modified_duration, BIGINT custom_int2, VARCHAR(65535) event_desc, VARCHAR(65535) s_value, VARCHAR(65535) l_d_a_p_display_name, VARCHAR(65535) event_name, ANY event_time, VARCHAR(65535) agent_id, VARCHAR(65535) change_type, VARCHAR(65535) ip_scope_name, INTEGER count, VARCHAR(65535) event_severity_cat, VARCHAR(65535) gpo_name, DOUBLE events_per_sec, VARCHAR(65535) access_mask, VARCHAR(65535) old_s_value, INTEGER event_parsed_ok, VARCHAR(65535) custom_str1, VARCHAR(65535) instance_name, VARCHAR(65535) win_logon_caller_user, VARCHAR(65535) wlan_ssid, VARCHAR(65535) vuln_vendor, VARCHAR(65535) vuln_conseq, VARCHAR(65535) vuln_bug_traq_i_d, INTEGER mem_total_m_b, VARCHAR(65535) feature, VARCHAR(65535) license_server, INTEGER db_data_file_size_k_b, VARCHAR(65535) script, VARCHAR(65535) new_status, VARCHAR(65535) vmw_event_msg, VARCHAR(65535) vmw_event_cat, VARCHAR(65535) managed_entity, VARCHAR(65535) virdb_ver, INTEGER total_disk_m_b, VARCHAR(65535) os_obj_action, VARCHAR(65535) phy_mach_name, VARCHAR(65535) new_vm_name, VARCHAR(65535) orig_vm_name, VARCHAR(65535) dest_vm_name, VARCHAR(65535) vm_template, VARCHAR(65535) orig_phy_mach_name, VARCHAR(65535) src_phy_mach_name, VARCHAR(65535) app_group_name, VARCHAR(65535) src_vm_name, VARCHAR(65535) vm_name, VARCHAR(65535) task, VARCHAR(65535) alarm, VARCHAR(65535) uuid, VARCHAR(65535) datacenter, VARCHAR(65535) orig_status, VARCHAR(65535) principal, VARCHAR(65535) role, VARCHAR(65535) folder, VARCHAR(65535) orig_resource_pool, VARCHAR(65535) resource_pool, VARCHAR(65535) drs_behavior, VARCHAR(65535) vm_guest_id, VARCHAR(65535) cluster_name, VARCHAR(65535) datastore, VARCHAR(65535) dest_resource_pool, VARCHAR(65535) new_resource_pool, VARCHAR(65535) db_sys_priv, VARCHAR(65535) db_obj_priv, VARCHAR(65535) db_priv_used, VARCHAR(65535) db_obj_name, INTEGER smtp_fail_code, VARCHAR(65535) mail_action, VARCHAR(65535) policy_name, INTEGER hw_failed_fan_count, INTEGER num_user, BIGINT non_heap_commit_k_b, BIGINT non_heap_used_k_b, BIGINT heap_max_k_b, DOUBLE heap_util, INTEGER live_threads_max, INTEGER live_threads, DOUBLE non_heap_util, BIGINT non_heap_max_k_b, VARCHAR(65535) virus_quarant_status, VARCHAR(65535) virus_action, VARCHAR(65535) virus_type, VARCHAR(65535) virus_name, BIGINT heap_commit_k_b, BIGINT heap_used_k_b, INTEGER hw_fan_status, ANY scan_end, ANY scan_begin, VARCHAR(65535) scan_profile, INTEGER scan_id, INTEGER db_ret_code, VARCHAR(65535) db_name, VARCHAR(65535) src_app, VARCHAR(65535) attack_name, VARCHAR(65535) vuln_type, VARCHAR(65535) vuln_name, INTEGER vuln_id, INTEGER loaded_classes, VARCHAR(65535) app_transport_proto, INTEGER vuln_score_thresh, VARCHAR(65535) hw_disk_serial, INTEGER vuln_score, VARCHAR(65535) vuln_c_v_e_id, VARCHAR(65535) http_status_code, VARCHAR(65535) uri_query, VARCHAR(65535) uri_stem, VARCHAR(65535) http_method, VARCHAR(65535) ftp_status_code, VARCHAR(65535) ftp_method, VARCHAR(65535) http_win32_status, VARCHAR(65535) http_sub_status_code, VARCHAR(65535) app_version, DOUBLE disk_util, VARCHAR(65535) app_name, ANY logoff_time, INTEGER free_disk_m_b, ANY logon_time, VARCHAR(65535) http_referrer, VARCHAR(65535) http_user_agent, VARCHAR(65535) srv_inst_name, VARCHAR(65535) http_version, VARCHAR(65535) receiver_mail_addr, VARCHAR(65535) sw_proc_name, VARCHAR(65535) sender_mail_addr, INTEGER sys_up_time, INTEGER cpu_util, VARCHAR(65535) http_content_type, VARCHAR(65535) disk_name, INTEGER spam_score, INTEGER mem_util, VARCHAR(65535) vendor, VARCHAR(65535) web_category, VARCHAR(65535) mail_subject, VARCHAR(65535) win_srvc_name, VARCHAR(65535) win_kerb_fail_code, BIGINT win_logon_fail_code, BIGINT disk_usage, VARCHAR(65535) win_i_a_s_fail_code, INTEGER http_content_len, VARCHAR(65535) src_terminal, VARCHAR(65535) command, VARCHAR(65535) cisco_a_c_s_fail_code, INTEGER sys_temp, VARCHAR(65535) fw_action, VARCHAR(65535) target_user, VARCHAR(65535) user_name, VARCHAR(65535) win_logon_id, INTEGER win_logon_type, VARCHAR(65535) target_user_grp, VARCHAR(65535) os_obj_name, VARCHAR(65535) user_grp, VARCHAR(65535) os_obj_type, VARCHAR(65535) process_name, VARCHAR(65535) file_name, VARCHAR(65535) os_obj_access_type, VARCHAR(65535) os_obj_handle_i_d, VARCHAR(65535) computer): rowcount = 56980.0, cumulative cost = {113960.0 rows, 1.202278E8 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689211
00-05              Scan(table=[[dfs, root, /json/02-2019-05-05-02-51-29.json]], groupscan=[EasyGroupScan [selectionRoot=file:/data/json/02-2019-05-05-02-51-29.json, numFiles=1, columns=[`0`, `6000279`, `6000278`, `6000277`, `6000276`, `6000234`, `6000233`, `6000243`, `6000242`, `6000241`, `6000240`, `6000247`, `6000244`, `6000219`, `6000211`, `6000210`, `6000209`, `6000208`, `6000215`, `6000214`, `6000213`, `6000212`, `6000166`, `6000187`, `6000186`, `6000185`, `6000184`, `6000179`, `6000137`, `6000136`, `6000142`, `6000131`, `6000130`, `6000129`, `6000128`, `6000135`, `6000134`, `6000133`, `6000132`, `6500107`, `6500106`, `6500105`, `6500104`, `6000105`, `6500111`, `6000104`, `6500110`, `6000111`, `6500109`, `6000110`, `6500108`, `6000109`, `6500099`, `6000108`, `6500098`, `6000099`, `6500097`, `6000098`, `6500096`, `6000097`, `6500103`, `6000096`, `6500102`, `6000103`, `6500101`, `6000992`, `6500100`, `6000998`, `6000100`, `6000120`, `6000127`, `6500115`, `6500114`, `6000115`, `6500113`, `6000114`, `6500112`, `6000113`, `6000119`, `6000118`, `6500116`, `6000117`, `6000116`, `6500075`, `6000075`, `6500072`, `6500079`, `6500078`, `6000969`, `6000079`, `6500077`, `6000975`, `6000077`, `6500076`, `6000974`, `6000973`, `6500065`, `6500064`, `6500071`, `6500070`, `6500091`, `6500090`, `6000091`, `6500089`, `6000090`, `6500088`, `6000089`, `6500095`, `6000088`, `6500094`, `6000095`, `6500093`, `6000094`, `6500092`, `6000093`, `6500083`, `6000990`, `6000092`, `6500082`, `6000989`, `6000083`, `6500427`, `6500081`, `6000082`, `6500426`, `6500080`, `6000979`, `6000081`, `6500425`, `6500087`, `6000978`, `6000080`, `6500424`, `6500086`, `6000087`, `6500431`, `6500085`, `6000976`, `6000086`, `6500430`, `6500084`, `6000983`, `6000085`, `6500429`, `6500043`, `6000084`, `6500428`, `6500042`, `6500419`, `6000980`, `6500041`, `6500418`, `6500417`, `6500040`, `6500416`, `6500047`, `6500046`, `6500423`, `6500422`, `6000045`, `6500421`, `6500035`, `6500420`, `6500034`, `6000034`, `6500033`, `6000033`, `6500032`, `6000032`, `6500039`, `6500038`, `6500037`, `6500036`, `6500059`, `6500433`, `6500063`, `6500432`, `6500062`, `6500061`, `6500060`, `6500051`, `6000957`, `6500395`, `6500394`, `6500049`, `6500393`, `6000049`, `6500048`, `6500392`, `6500399`, `6500398`, `6500397`, `6500396`, `6500387`, `6500010`, `6500386`, `6000010`, `6500009`, `6000907`, `6500385`, `6500008`, `6000009`, `6000906`, `6500384`, `6500015`, `6000008`, `6000905`, `6500391`, `6500014`, `6000015`, `6000904`, `6500390`, `6500013`, `6500012`, `6500389`, `6500388`, `6000012`, `6500003`, `6500002`, `6500411`, `6000003`, `6500001`, `6500410`, `6000002`, `6500000`, `6500409`, `6000001`, `6500408`, `6500007`, `6000000`, `6000897`, `6500415`, `6500006`, `6000007`, `6500414`, `6000006`, `6500005`, `6500413`, `6000005`, `6500004`, `6500412`, `6500027`, `6000004`, `6500403`, `6500026`, `6500402`, `6500025`, `6500401`, `6000514`, `6500024`, `6500400`, `6000513`, `6000024`, `6500031`, `6500407`, `6000512`, `6000921`, `6500030`, `6000031`, `6500406`, `6000030`, `6500029`, `6000920`, `6500405`, `6000029`, `6500028`, `6500404`, `6000028`, `6500019`, `6500018`, `6000019`, `6000018`, `6000017`, `6500016`, `6500023`, `6000016`, `6000023`, `6500022`, `6000022`, `6500021`, `6500020`, `6000020`, `6500383`, `6000869`, `6000880`, `6000510`, `6000846`, `6000845`, `6000844`, `6000467`, `6000419`, `6000418`, `6000827`, `6000417`, `6000416`, `6000422`, `6000421`, `6000420`, `6000440`, `6000445`, `6000437`, `6000395`, `6000394`, `6000393`, `6000392`, `6000399`, `6000398`, `6000396`, `6000793`, `6000391`, `6000390`, `6000411`, `6000410`, `6000409`, `6000408`, `6000415`, `6000414`, `6000413`, `6000412`, `6000403`, `6000402`, `6000401`, `6000400`, `6000407`, `6000406`, `6000405`, `6000404`, `6000739`, `6000738`, `6000737`, `6000736`, `6000742`, `6000741`, `6000740`, `6000353`, `6000370`, `6000715`, `6000714`, `6000713`, `6000712`, `6000719`, `6000718`, `6000717`, `6000716`, `6000707`, `6000706`, `6000705`, `6000704`, `6000711`, `6000710`, `6000333`, `6000731`, `6000730`, `6000729`, `6000728`, `6000735`, `6000734`, `6000733`, `6000732`, `6000723`, `6000722`, `6000721`, `6000720`, `6000727`, `6000726`, `6000349`, `6000725`, `6000724`, `6000683`, `6000682`, `6000681`, `6000680`, `6000687`, `6000686`, `6000685`, `6000684`, `6000675`, `6000297`, `6000674`, `6000673`, `6000296`, `6000672`, `6000679`, `6000678`, `6000677`, `6000676`, `6000699`, `6000290`, `6000698`, `6000289`, `6000288`, `6000696`, `6000295`, `6000703`, `6000294`, `6000702`, `6000701`, `6000700`, `6000315`, `6000689`, `6000688`, `6000318`, `6000695`, `6000694`, `6000317`, `6000693`, `6000692`, `6000304`, `6000258`, `6000667`, `6000666`, `6000671`, `6000670`, `6000669`, `6000283`, `6000668`, `6000282`, `6000281`, `6000280`, `6000285`, `6000284`, `6000274`], files=[file:/data/json/02-2019-05-05-02-51-29.json], schema=null]]) : rowType = RecordType(ANY 0, ANY 6000279, ANY 6000278, ANY 6000277, ANY 6000276, ANY 6000234, ANY 6000233, ANY 6000243, ANY 6000242, ANY 6000241, ANY 6000240, ANY 6000247, ANY 6000244, ANY 6000219, ANY 6000211, ANY 6000210, ANY 6000209, ANY 6000208, ANY 6000215, ANY 6000214, ANY 6000213, ANY 6000212, ANY 6000166, ANY 6000187, ANY 6000186, ANY 6000185, ANY 6000184, ANY 6000179, ANY 6000137, ANY 6000136, ANY 6000142, ANY 6000131, ANY 6000130, ANY 6000129, ANY 6000128, ANY 6000135, ANY 6000134, ANY 6000133, ANY 6000132, ANY 6500107, ANY 6500106, ANY 6500105, ANY 6500104, ANY 6000105, ANY 6500111, ANY 6000104, ANY 6500110, ANY 6000111, ANY 6500109, ANY 6000110, ANY 6500108, ANY 6000109, ANY 6500099, ANY 6000108, ANY 6500098, ANY 6000099, ANY 6500097, ANY 6000098, ANY 6500096, ANY 6000097, ANY 6500103, ANY 6000096, ANY 6500102, ANY 6000103, ANY 6500101, ANY 6000992, ANY 6500100, ANY 6000998, ANY 6000100, ANY 6000120, ANY 6000127, ANY 6500115, ANY 6500114, ANY 6000115, ANY 6500113, ANY 6000114, ANY 6500112, ANY 6000113, ANY 6000119, ANY 6000118, ANY 6500116, ANY 6000117, ANY 6000116, ANY 6500075, ANY 6000075, ANY 6500072, ANY 6500079, ANY 6500078, ANY 6000969, ANY 6000079, ANY 6500077, ANY 6000975, ANY 6000077, ANY 6500076, ANY 6000974, ANY 6000973, ANY 6500065, ANY 6500064, ANY 6500071, ANY 6500070, ANY 6500091, ANY 6500090, ANY 6000091, ANY 6500089, ANY 6000090, ANY 6500088, ANY 6000089, ANY 6500095, ANY 6000088, ANY 6500094, ANY 6000095, ANY 6500093, ANY 6000094, ANY 6500092, ANY 6000093, ANY 6500083, ANY 6000990, ANY 6000092, ANY 6500082, ANY 6000989, ANY 6000083, ANY 6500427, ANY 6500081, ANY 6000082, ANY 6500426, ANY 6500080, ANY 6000979, ANY 6000081, ANY 6500425, ANY 6500087, ANY 6000978, ANY 6000080, ANY 6500424, ANY 6500086, ANY 6000087, ANY 6500431, ANY 6500085, ANY 6000976, ANY 6000086, ANY 6500430, ANY 6500084, ANY 6000983, ANY 6000085, ANY 6500429, ANY 6500043, ANY 6000084, ANY 6500428, ANY 6500042, ANY 6500419, ANY 6000980, ANY 6500041, ANY 6500418, ANY 6500417, ANY 6500040, ANY 6500416, ANY 6500047, ANY 6500046, ANY 6500423, ANY 6500422, ANY 6000045, ANY 6500421, ANY 6500035, ANY 6500420, ANY 6500034, ANY 6000034, ANY 6500033, ANY 6000033, ANY 6500032, ANY 6000032, ANY 6500039, ANY 6500038, ANY 6500037, ANY 6500036, ANY 6500059, ANY 6500433, ANY 6500063, ANY 6500432, ANY 6500062, ANY 6500061, ANY 6500060, ANY 6500051, ANY 6000957, ANY 6500395, ANY 6500394, ANY 6500049, ANY 6500393, ANY 6000049, ANY 6500048, ANY 6500392, ANY 6500399, ANY 6500398, ANY 6500397, ANY 6500396, ANY 6500387, ANY 6500010, ANY 6500386, ANY 6000010, ANY 6500009, ANY 6000907, ANY 6500385, ANY 6500008, ANY 6000009, ANY 6000906, ANY 6500384, ANY 6500015, ANY 6000008, ANY 6000905, ANY 6500391, ANY 6500014, ANY 6000015, ANY 6000904, ANY 6500390, ANY 6500013, ANY 6500012, ANY 6500389, ANY 6500388, ANY 6000012, ANY 6500003, ANY 6500002, ANY 6500411, ANY 6000003, ANY 6500001, ANY 6500410, ANY 6000002, ANY 6500000, ANY 6500409, ANY 6000001, ANY 6500408, ANY 6500007, ANY 6000000, ANY 6000897, ANY 6500415, ANY 6500006, ANY 6000007, ANY 6500414, ANY 6000006, ANY 6500005, ANY 6500413, ANY 6000005, ANY 6500004, ANY 6500412, ANY 6500027, ANY 6000004, ANY 6500403, ANY 6500026, ANY 6500402, ANY 6500025, ANY 6500401, ANY 6000514, ANY 6500024, ANY 6500400, ANY 6000513, ANY 6000024, ANY 6500031, ANY 6500407, ANY 6000512, ANY 6000921, ANY 6500030, ANY 6000031, ANY 6500406, ANY 6000030, ANY 6500029, ANY 6000920, ANY 6500405, ANY 6000029, ANY 6500028, ANY 6500404, ANY 6000028, ANY 6500019, ANY 6500018, ANY 6000019, ANY 6000018, ANY 6000017, ANY 6500016, ANY 6500023, ANY 6000016, ANY 6000023, ANY 6500022, ANY 6000022, ANY 6500021, ANY 6500020, ANY 6000020, ANY 6500383, ANY 6000869, ANY 6000880, ANY 6000510, ANY 6000846, ANY 6000845, ANY 6000844, ANY 6000467, ANY 6000419, ANY 6000418, ANY 6000827, ANY 6000417, ANY 6000416, ANY 6000422, ANY 6000421, ANY 6000420, ANY 6000440, ANY 6000445, ANY 6000437, ANY 6000395, ANY 6000394, ANY 6000393, ANY 6000392, ANY 6000399, ANY 6000398, ANY 6000396, ANY 6000793, ANY 6000391, ANY 6000390, ANY 6000411, ANY 6000410, ANY 6000409, ANY 6000408, ANY 6000415, ANY 6000414, ANY 6000413, ANY 6000412, ANY 6000403, ANY 6000402, ANY 6000401, ANY 6000400, ANY 6000407, ANY 6000406, ANY 6000405, ANY 6000404, ANY 6000739, ANY 6000738, ANY 6000737, ANY 6000736, ANY 6000742, ANY 6000741, ANY 6000740, ANY 6000353, ANY 6000370, ANY 6000715, ANY 6000714, ANY 6000713, ANY 6000712, ANY 6000719, ANY 6000718, ANY 6000717, ANY 6000716, ANY 6000707, ANY 6000706, ANY 6000705, ANY 6000704, ANY 6000711, ANY 6000710, ANY 6000333, ANY 6000731, ANY 6000730, ANY 6000729, ANY 6000728, ANY 6000735, ANY 6000734, ANY 6000733, ANY 6000732, ANY 6000723, ANY 6000722, ANY 6000721, ANY 6000720, ANY 6000727, ANY 6000726, ANY 6000349, ANY 6000725, ANY 6000724, ANY 6000683, ANY 6000682, ANY 6000681, ANY 6000680, ANY 6000687, ANY 6000686, ANY 6000685, ANY 6000684, ANY 6000675, ANY 6000297, ANY 6000674, ANY 6000673, ANY 6000296, ANY 6000672, ANY 6000679, ANY 6000678, ANY 6000677, ANY 6000676, ANY 6000699, ANY 6000290, ANY 6000698, ANY 6000289, ANY 6000288, ANY 6000696, ANY 6000295, ANY 6000703, ANY 6000294, ANY 6000702, ANY 6000701, ANY 6000700, ANY 6000315, ANY 6000689, ANY 6000688, ANY 6000318, ANY 6000695, ANY 6000694, ANY 6000317, ANY 6000693, ANY 6000692, ANY 6000304, ANY 6000258, ANY 6000667, ANY 6000666, ANY 6000671, ANY 6000670, ANY 6000669, ANY 6000283, ANY 6000668, ANY 6000282, ANY 6000281, ANY 6000280, ANY 6000285, ANY 6000284, ANY 6000274): rowcount = 56980.0, cumulative cost = {56980.0 rows, 2.404556E7 cpu, 5.8347857E7 io, 0.0 network, 0.0 memory}, id = 689210





Plan for 1.16.


Operator ID

Type

Avg Setup Time

Max Setup Time

Avg Process Time

Max Process Time

Min Wait Time

Avg Wait Time

Max Wait Time

% Fragment Time

% Query Time

Rows

Avg Peak Memory

Max Peak Memory

00-xx-00

SCREEN

0.000s

0.000s

0.518s

1.035s

0.000s

0.046s

0.091s

0.55%

0.55%

61,757

6MB

11MB

00-xx-01

PROJECT

0.000s

0.000s

0.000s

0.000s

0.000s

0.000s

0.000s

0.00%

0.00%

1

-

-

00-xx-02

PARQUET_WRITER

0.005s

0.005s

31.653s

31.653s

0.000s

0.000s

0.000s

16.91%

16.91%

61,756

-

-

00-xx-03

PROJECT_ALLOW_DUP

0.008s

0.008s

1m11s

1m11s

0.000s

0.000s

0.000s

38.16%

38.16%

61,756

13MB

13MB

00-xx-04

PROJECT

10.522s

10.522s

1m23s

1m23s

0.000s

0.000s

0.000s

44.38%

44.38%

61,756

13MB

13MB






-----Original Message-----
From: Kunal Khatua [mailto:kunal@apache.org]
Sent: Tuesday, May 7, 2019 7:47 AM
To: user@drill.apache.org
Subject: Re: Serious performance problem in ctas json to parquet writing



Hi Mehran



What does the full plan look like?You seem to be missing the SCAN operator. Can you post the plans for 1.13 as well? It isn't clear from the table if there is indeed a problem, since you've not shared the query that created this plan.



Also, there have been changes gone in, such as batch sizing, but I'm not sure if the writer would be affected by it.



~ Kunal







On 5/4/2019 6:59:19 AM, Mehran.D [BR-PD] <m_...@behinrahkar.com>> wrote:

Dears.



I have some jsons to be converted to parquet files.

After versin 1.13 I have a very serious issue in this writing. A sample of 100000 record json document takes 5 minutes to finish.

I’v included the plan.





Overview [http://10.233.50.111:8047/profiles/23329968-0346-e658-b1c9-92fd7dc60d2a#operator-overview]

Operator ID

Type

Avg Setup Time

Max Setup Time

Avg Process Time

Max Process Time

Min Wait Time

Avg Wait Time

Max Wait Time

% Fragment Time

% Query Time

Rows

Avg Peak Memory

Max Peak Memory

00-xx-00

SCREEN

0.000s

0.000s

1.262s

2.510s

0.004s

0.075s

0.145s

0.82%

0.82%

111,491

10MB

20MB

00-xx-01

PROJECT

0.002s

0.002s

0.001s

0.001s

0.000s

0.000s

0.000s

0.00%

0.00%

1

-

-

00-xx-02

PARQUET_WRITER

0.293s

0.293s

50.750s

50.750s

0.000s

0.000s

0.000s

16.44%

16.44%

111,490

-

-

00-xx-03

PROJECT_ALLOW_DUP

0.032s

0.032s

2m0s

2m0s

0.000s

0.000s

0.000s

39.01%

39.01%

111,490

13MB

13MB

00-xx-04

PROJECT

16.092s

16.092s

2m15s

2m15s

0.000s

0.000s

0.000s

43.73%

43.73%

111,490

13MB

13MB







I do not know what the mothods  ‘PROJECT_ALLOW_DUP’ and ‘PROJECT’ does.

Please tell me what has changed from 1.13 up to now.

I have similar problem in 1.16 release.





and



Best Regards,



      [LOGO1]

Mehran Dashti

Product Leader

09125902452



Re: Serious performance problem in ctas json to parquet writing

Posted by Kunal Khatua <ku...@apache.org>.
Hi Mehran

What does the full plan look like?You seem to be missing the SCAN operator. Can you post the plans for 1.13 as well? It isn't clear from the table if there is indeed a problem, since you've not shared the query that created this plan.

Also, there have been changes gone in, such as batch sizing, but I'm not sure if the writer would be affected by it.

~ Kunal



On 5/4/2019 6:59:19 AM, Mehran.D [BR-PD] <m_...@behinrahkar.com> wrote:
Dears.
 
I have some jsons to be converted to parquet files.
After versin 1.13 I have a very serious issue in this writing. A sample of 100000 record json document takes 5 minutes to finish.
I’v included the plan.
 
 
Overview [http://10.233.50.111:8047/profiles/23329968-0346-e658-b1c9-92fd7dc60d2a#operator-overview]
Operator ID
Type
Avg Setup Time
Max Setup Time
Avg Process Time
Max Process Time
Min Wait Time
Avg Wait Time
Max Wait Time
% Fragment Time
% Query Time
Rows
Avg Peak Memory
Max Peak Memory
00-xx-00
SCREEN
0.000s
0.000s
1.262s
2.510s
0.004s
0.075s
0.145s
0.82%
0.82%
111,491
10MB
20MB
00-xx-01
PROJECT
0.002s
0.002s
0.001s
0.001s
0.000s
0.000s
0.000s
0.00%
0.00%
1
-
-
00-xx-02
PARQUET_WRITER
0.293s
0.293s
50.750s
50.750s
0.000s
0.000s
0.000s
16.44%
16.44%
111,490
-
-
00-xx-03
PROJECT_ALLOW_DUP
0.032s
0.032s
2m0s
2m0s
0.000s
0.000s
0.000s
39.01%
39.01%
111,490
13MB
13MB
00-xx-04
PROJECT
16.092s
16.092s
2m15s
2m15s
0.000s
0.000s
0.000s
43.73%
43.73%
111,490
13MB
13MB
 
 
 
I do not know what the mothods  ‘PROJECT_ALLOW_DUP’ and ‘PROJECT’ does.
Please tell me what has changed from 1.13 up to now.
I have similar problem in 1.16 release.
 
 
and
 
Best Regards,
 
      [LOGO1]
Mehran Dashti
Product Leader
09125902452