CN110677469B - Security disaster recovery system and disaster recovery implementation method - Google Patents

Security disaster recovery system and disaster recovery implementation method Download PDF

Info

Publication number
CN110677469B
CN110677469B CN201910901317.5A CN201910901317A CN110677469B CN 110677469 B CN110677469 B CN 110677469B CN 201910901317 A CN201910901317 A CN 201910901317A CN 110677469 B CN110677469 B CN 110677469B
Authority
CN
China
Prior art keywords
disaster recovery
resource
security
mirror image
recovery system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910901317.5A
Other languages
Chinese (zh)
Other versions
CN110677469A (en
Inventor
陈军
徐炎
王泊
赵洋明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Stock Exchange Technology Co ltd
Original Assignee
Shanghai Stock Exchange Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Stock Exchange Technology Co ltd filed Critical Shanghai Stock Exchange Technology Co ltd
Priority to CN201910901317.5A priority Critical patent/CN110677469B/en
Publication of CN110677469A publication Critical patent/CN110677469A/en
Application granted granted Critical
Publication of CN110677469B publication Critical patent/CN110677469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes

Abstract

The invention discloses a security disaster recovery system, which comprises: the cloud storage is configured to store data in a cloud end; the mirror image system is configured to create a mirror image according to the requirements of a user; the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template; the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary; also discloses a corresponding disaster recovery implementation method; under the condition that a disaster occurs in the production center, the disaster backup center can be quickly started to take over the service system through disaster backup switching.

Description

Security disaster recovery system and disaster recovery implementation method
Technical Field
The invention relates to the technical field of security cloud, in particular to a security disaster recovery system and an implementation method thereof.
Background
Market trading scale of the securities industry is rapidly increased, and the rapid development of business requires a highly reliable and available technical system to be adapted to the market trading scale. Securities companies often employ component level backups of the core system to improve the reliability and availability of the system operation. However, in recent two years, a plurality of security companies interrupt transactions for half an hour or even 1 hour due to system failure, so that a large amount of customer disputes and economic compensation with higher quota are directly generated, and the market reputation of enterprises is badly influenced. If the security company encounters large-scale disasters such as fire, power failure, flood, earthquake and the like, and the infrastructure, the IT system, the business data and key personnel are destroyed under the condition of no security disaster recovery system, the security company lacks an effective means to ensure the continuous operation of company business, client resources are rapidly lost, and enterprises face operational crisis.
Thus, the importance of the security disaster preparation system to the security company is self evident. However, in the majority of current security disaster recovery system construction schemes, a security company is required to invest a large amount of hardware cost and human resources, the finally received benefits cannot reach expectations, security disaster recovery system resources are generally idle and wasted, meanwhile, the security disaster recovery system has insufficient maintenance attention, finally, when switching is needed, the initially established RTO and RPO requirements cannot be realized at all, and the security disaster recovery system construction is greatly discounted. Therefore, how to construct a security disaster recovery system with low cost, high efficiency, excellent maintainability and expandability is an urgent need for security companies.
Disclosure of Invention
In view of the existing defects, the invention provides a security disaster recovery system and an implementation method thereof, which can rapidly start a disaster recovery center to take over a business system through disaster recovery switching under the condition that a disaster occurs in a production center.
In order to achieve the above purpose, the embodiment of the invention adopts the following technical scheme:
a security disaster recovery system, comprising:
the cloud storage is configured to store data at a cloud end;
the mirror image system is configured to create a mirror image according to the requirements of a user;
the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template;
the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template;
and the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary.
According to an aspect of the present invention, the disaster recovery module further includes a data disk snapshot for data recovery or replication of a disk, and the cloud storage includes a plurality of SSD disks.
According to one aspect of the invention, the images include a public image and a custom image, wherein the custom image is obtained by:
a user creates a self-defined mirror image according to an ECS example;
selecting a mirror image shared by other users;
and importing the image file of the offline environment into the cluster of the ECS to generate a custom image.
In accordance with an aspect of the invention, the disaster recovery module further comprises an IP configuration of the ECS.
In accordance with one aspect of the invention, the security disaster recovery system is configured to: under daily conditions, the security disaster recovery system runs in a small fire, namely an initial resource state, and checks whether the function of the business system is normal.
According to one aspect of the invention, the resource package is configured such that no add-drop operations are possible for resources within the resource package.
In accordance with one aspect of the invention, the resource package is configured to perform a production operation, producing resources of the resource package.
According to one aspect of the invention, the security disaster recovery system automatically executes disaster recovery switching operation or manually executes disaster recovery switching operation by technicians in the case of a production center failure or disaster recovery drilling is required.
According to one aspect of the invention, the security disaster recovery backup system can execute resource expansion operation during disaster recovery switching operation.
The method for realizing the disaster recovery of the security disaster recovery backup system comprises the following steps:
creating a disaster recovery template;
submitting a template order;
generating a resource package after the audit is passed;
performing disaster recovery and backup switching operation to switch to a security disaster recovery and backup system if necessary;
resource pack production resources of the security disaster recovery system.
According to one aspect of the invention, the security disaster recovery system disaster recovery implementation method comprises the following steps: and executing resource capacity expansion operation.
The implementation of the invention has the advantages that: the invention discloses a security disaster recovery system, which comprises: the cloud storage is configured to store data at a cloud end; the mirror image system is configured to create a mirror image according to the requirements of a user; the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template; the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary; a user creates a disaster recovery resource template, and selects whether to select a user-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to define a virtual machine IP address; the resource application process can be referred to when other resources are created; after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created; the user only needs to use the template to submit the order, and after the order is approved by a customer manager, a resource package is formed at the user side; each resource packet is provided with a 'production' button, the resources of the resource packet are produced immediately after clicking, and meanwhile, the resource charging is started; aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of a single resource is consistent with the current virtual area resource; under daily conditions, the security disaster recovery system operates in a small fire (initial resource) state, and the main purpose is to check whether the operation of the service system is normal; if a production center fails or disaster recovery drilling is needed, under the leadership authorization of the securities company, technicians of the securities company can independently execute disaster recovery switching operation or automatically execute the disaster recovery switching operation; in consideration of the fact that the resource condition of the small fire state cannot meet the access of a large number of users of a similar production system, the resource expansion operation can be executed by another technical team while the disaster recovery switching operation is performed.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of a security disaster recovery system according to a first embodiment of the present invention;
FIG. 2 is a schematic view of a security disaster recovery system according to a second embodiment of the present invention;
FIG. 3 is a flow chart of the security disaster recovery system according to the present invention;
FIG. 4 is a flowchart illustrating the capacity expansion operation according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
Example one
As shown in fig. 1 and 2, a security disaster recovery system includes:
the cloud storage 1 is configured to store data in a cloud end;
the cloud storage comprises a plurality of disks which can be selectively configured by a user; in practical application, the cloud storage adopts the SSD disk, and compared with a common high-cloud disk, the SSD disk has stronger IO performance and is beneficial to improving the read-write performance of a database.
The mirror image system 2 is configured to create a mirror image according to the requirements of users;
the mirror image system comprises creation of mirror images, and specifically comprises:
the image is a template of an ECS instance runtime environment, and the template includes specific operating system information and sometimes additionally some pre-installed applications.
The image file is equivalent to a replica file, which contains all data in one or more disks, and for the cloud server ECS, the disks may be a single system disk or a combination of a system disk and a data disk. You can create a new ECS instance using the mirror or replace the system disk of the ECS instance. In this embodiment, a system image may be provided, the authorization for which is at the discretion of the customer.
The embodiment provides flexible and various mirror image types, and facilitates the client to obtain mirror image resources. One is a public mirror provided by the cloud platform; the other type is a user-defined mirror image which can be created according to the existing physical machine server, virtual machine or cloud host of a client, and the mirror image has high flexibility and can meet the personalized requirements of the client.
The customized mirror image can be implemented in the following modes:
a custom image is created from an existing ECS instance.
Select other users to share the image to you.
The image file of the offline environment can be imported into the cluster of the ECS to generate a custom image.
The disaster recovery module 3 is configured to generate a disaster recovery resource template by combining the mirror image configuration basic resource;
the basic resources comprise mirror images, cloud disks and the like; the method can also comprise the following steps: the disk snapshot is a data copy of a certain disk at a certain time point and is used for data recovery or replication of the disk; the IP of the ECS is created either as an automatically assigned IP address or as a manually configured IP address.
The disaster generation backup resource template specifically may include:
1. creating a self-defined mirror image and a disk snapshot;
in the preparation period, a client creates ECS resources and performs information configuration and software installation in the ECS according to the requirement of the client. And then creating a custom mirror image according to the ECS example.
And creating the data disk snapshot according to the self requirement.
2. Creating a disaster recovery resource template;
a user creates a disaster recovery resource template, and selects whether to select a user-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to self-define a virtual machine IP address; the resource application process may be consulted when creating other resources. And after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created.
In practical application, a user can create a plurality of disaster recovery resource templates, and the disaster recovery resource templates can be created from the beginning or can be copied and slightly modified. The user can add or delete resources in the template.
The resource package 4 is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template;
the generation of the resource packet is performed by the following method:
and the user can submit the order by using the disaster recovery resource template, and a resource package is formed at the user side after the order is approved by a customer manager.
In practical application, when a resource package is clicked, the details of the resources contained in the package can be checked, but the resources cannot be subjected to the operation of increasing, deleting and modifying.
In practical application, each resource packet is provided with a 'production' button, resources of the resource packet are produced immediately after clicking, and meanwhile, resource charging is started. Aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of the single resource is consistent with the current virtual area resource.
And the switching module 5 is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary.
Under daily conditions, the security disaster recovery system operates in a small-fire (initial resource) state, and the main purpose is to check whether the operation of the business system is normal.
If a production center fails or disaster recovery drilling is needed, under the leadership authorization of the securities company, technicians of the securities company can independently execute disaster recovery switching operation.
Taking a constant UF2.0 system as an example, when a switching operation needs to be triggered, a technician can change the online transaction, the access configuration of the mobile terminal site, and the access configuration of the business hall to the AR by a technical means (an automated script or other schemes), and point the configurations to the JAR of the disaster recovery center, so as to ensure that a user can quickly re-access the business system.
As shown in fig. 3, the security disaster recovery system of this embodiment works as follows:
A) starting;
B) creating a disaster recovery template;
C) completing template creation by applying/adding/deleting resources;
D) submitting a template order;
E) the client manager approves;
if the examination and approval pass, executing F, and if the examination and approval do not pass, returning to execute C;
F) generating a resource package;
G) producing resources;
if the resources cannot be produced, returning to execute C, and if the resources cannot be produced, executing H;
H) disaster recovery drilling or disaster recovery execution;
I) and (6) ending.
The security disaster recovery system of this embodiment includes: the cloud storage is configured to store data at a cloud end; the mirror image system is configured to create a mirror image according to the requirements of a user; the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template; the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary; a user creates a disaster recovery resource template, and selects whether to select a self-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to self-define a virtual machine IP address; the resource application process can be referred to when other resources are created; after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created; the user only needs to use the template to submit the order, and after the order is approved by a customer manager, a resource package is formed at the user side; each resource packet is provided with a 'production' button, the resources of the resource packet are produced immediately after clicking, and simultaneously, the resource charging is started; aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of a single resource is consistent with the current virtual area resource; under daily conditions, the security disaster recovery system operates in a small fire (initial resource) state, and the main purpose is to check whether the operation of the service system is normal; if a production center fault occurs or disaster recovery drilling is needed, under the leadership authorization of the stock company, technicians of the stock company can independently execute disaster recovery switching operation or automatically execute the disaster recovery switching operation; in consideration of the situation that resources in a small fire state cannot meet the access of a large number of users of a similar production system, resource capacity expansion operation can be executed by another technical team while disaster recovery switching operation is performed.
Example two
As shown in fig. 2, 3 and 4, a security disaster preparation system includes:
the cloud storage 1 is configured to store data in a cloud end;
the cloud storage comprises a plurality of disks which can be selectively configured by a user; in practical application, the cloud storage adopts the SSD disk, and compared with a common high-cloud disk, the SSD disk has stronger IO performance and is beneficial to improving the read-write performance of the database.
The mirror image system 2 is configured to create a mirror image according to the requirements of users;
the mirror image system comprises creation of mirror images, and specifically comprises:
the image is a template of an ECS instance runtime environment, and the template includes specific operating system information and sometimes additionally some pre-installed applications.
The image file is equivalent to a replica file, which contains all data in one or more disks, and for the cloud server ECS, the disks may be a single system disk or a combination of a system disk and a data disk. You can create a new ECS instance using the mirror or replace the system disk of the ECS instance. In this embodiment, a system image may be provided, with authorization for the system image being resolved at the discretion of the customer.
The embodiment provides flexible and various mirror image types, and facilitates the client to obtain mirror image resources. One is a public mirror provided by the cloud platform; the other type is a user-defined mirror image which can be created according to the existing physical machine server, virtual machine or cloud host of a client, and the mirror image has high flexibility and can meet the personalized requirements of the client.
The customized mirror image can be implemented in the following modes:
a custom image is created from an existing ECS instance.
Select other users to share the image to you.
The image file of the offline environment can be imported into the cluster of the ECS to generate a custom image.
The disaster recovery module 3 is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template;
the basic resources comprise mirror images, cloud disks and the like; the method can also comprise the following steps: disk snapshot, which refers to data copy of a certain disk at a certain time point and is used for data recovery or replication of the disk; the IP of the ECS is created either as an automatically assigned IP address or as a manually configured IP address.
The disaster recovery resource generation template specifically may include:
1. creating a self-defined mirror image and a disk snapshot;
in the preparation period, a client creates ECS resources and performs information configuration and software installation in the ECS according to the requirements of the client. And creating a custom image according to the ECS example.
And creating the data disk snapshot according to the self requirement.
2. Creating a disaster recovery resource template;
a user creates a disaster recovery resource template, and selects whether to select a self-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to self-define an IP address of a virtual machine; the resource application process may be consulted when creating other resources. And after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created.
In practical application, a user can create a plurality of disaster recovery resource templates, and the disaster recovery resource templates can be created from the beginning or can be copied and slightly modified. The user can add or delete resources in the template.
The resource package 4 is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template;
the generation of the resource packet is performed by the following method:
and the user can submit the order by using the disaster recovery resource template, and a resource package is formed at the user side after the order is approved by a customer manager.
In practical application, when a resource package is clicked, the details of the resources contained in the package can be checked, but the resources cannot be subjected to the operation of adding, deleting and modifying.
In practical application, each resource packet is provided with a 'production' button, resources of the resource packet are produced immediately after clicking, and meanwhile, resource charging is started. Aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of the single resource is consistent with the current virtual area resource.
And the switching module 5 is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary.
Under daily conditions, the security disaster recovery system operates in a small fire (initial resource) state, and the main purpose is to check whether the operation of the service system is normal.
If a production center fails or disaster recovery drilling is needed, under the leadership authorization of the stock company, the stock company technicians can independently execute disaster recovery switching operation.
Taking a constant UF2.0 system as an example, when a switching operation needs to be triggered, a technician can change the online transaction, the access configuration of the mobile terminal site, and the access configuration of the business hall to the AR by a technical means (an automated script or other schemes), and point the configurations to the JAR of the disaster recovery center, so as to ensure that a user can quickly re-access the business system.
As shown in fig. 3, the working process of non-resource capacity expansion of the security disaster recovery system according to this embodiment is as follows:
A) starting;
B) creating a disaster recovery template;
C) completing template creation by applying/adding/deleting resources;
D) submitting a template order;
E) the client manager approves;
if the examination and approval pass, executing F, and if the examination and approval do not pass, returning to execute C;
F) generating a resource package;
G) producing resources;
if the resources cannot be produced, returning to execute C, and if the resources cannot be produced, executing H;
H) disaster recovery drilling or disaster recovery execution;
I) and (6) ending.
Meanwhile, in consideration of the situation that resources in a small fire state cannot meet the access of a large number of users of a similar production system, the resource capacity expansion operation can be executed by another technical team while the disaster recovery switching operation is carried out.
And the capacity expansion module 6 is configured to execute resource capacity expansion operation.
The resource capacity expansion operation comprises the following steps:
1. under the condition that a disaster occurs in the production center, the disaster recovery center can be quickly started to take over the service system through disaster recovery and backup switching; meanwhile, an AS (application server) middleware and an LS (local server) middleware image reserved at the initial stage of disaster recovery backup construction planning are quickly pulled up in an online capacity expansion mode, and after the AS and LS middleware images are approved by a certification cloud client manager, the middleware automatically starts service and registers to a corresponding atomic group, so that the requirement of quick expansion of service capacity is finally met, and the capacity expansion operation does not influence the state operation of the original disaster recovery backup small fire.
2. After the production center recovers the function, the newly-added cloud host can be closed and recovered to be the mirror image service, and the disaster recovery center becomes a low-cost standby center again.
3. Fast capacity expansion strategy (take a constant UF2.0 system as an example):
4. the system with the middleware deployed can be packaged into a mirror image of the ECS, the mirror image is stored in a mirror image library, when disaster recovery services need to be started, the ECS mirror image can be quickly pulled up and added into a service middleware cluster, and the computing power of the whole system is quickly improved.
5. In the expansion process, the original service is not influenced, and the capacity expansion and the upgrade are truly and smoothly carried out.
6. Taking XX security users AS an example, in a small-fire (initial scale) state, the number of AS (atomic AS middleware) is 9, the number of LS (logical AS middleware) is 11, BAR is 2, and JAR is 2, which can meet the basic business function requirements.
7. When disaster recovery switching is triggered, according to a specified capacity expansion scheme, the number of AS is expanded to 18, the number of LS is expanded to 16, BAR is 3, and JAR is 6, so that the maximum service performance requirement is met.
As shown in fig. 4, the resource expansion has the following specific operation example steps:
a1: starting;
a2: cloud host resource preparation (18 AS, 16 ls, 2 databases in this plan);
a3: testing the service function;
a4: closing part of the middleware server, packaging the middleware server into a mirror image for reservation, and keeping the nrs.xml configuration file on the LS unchanged;
if the version upgrading is found to be needed, executing steps B1-B4;
b1: upgrading an AS/LS version;
b2: pulling up the closed intermediate server from the mirror image, and keeping the IP address unchanged;
b3: upgrading the AS/LS middleware version to keep consistent with the production center;
b4: starting AS/LS middleware service, and then switching to A3;
a5: configuring a monitoring script, and filtering an AS middleware log which is not operated in an nrs.xml file and not displaying the AS middleware log;
a6: the monitoring page stops the monitoring service of the closed AS middleware;
a7: the security disaster recovery system keeps initial planning configuration, namely 11 LS, 9 AS and 2 database servers at this time, and keeps the running state;
a8: checking whether the service of the business system normally runs;
the preparation stage is carried out;
if yes, starting formal capacity expansion, and executing A9;
a9: starting expansion;
a10: recovering an AS middleware cloud host from the mirror image, and designating an IP address AS an original reserved middleware address (important);
a11: auditing the upper certificate technology;
a12: newly starting the AS middleware, automatically registering to a corresponding AS atomic group according to the nrs.xml file on the LS, and actively allocating a request to a new AS by the LS;
a13: waiting for 1 minute, completely opening the AS, and connecting to a database;
a14: deactivating the monitoring log filtering script;
a15: the monitoring page starts monitoring service of the closed AS middleware;
a16: checking whether the service flow is distributed to the newly added AS middleware or not;
if yes, go to step A17, otherwise go to C1;
c1: checking middleware and configuration;
a17: recovering an LS middleware cloud host from the mirror image, and designating an IP address as an original reserved middleware address (important);
a18: the LS cloud host automatically registers in the corresponding function atomic group according to the same function;
the above implementation process further includes the steps of:
d1: the monitoring page checks whether the services are all normally operated; if not, go to step C1; if yes, executing D2;
d2: and verifying the service function.
The security disaster recovery system of this embodiment includes: the cloud storage is configured to store data at a cloud end; the mirror image system is configured to create a mirror image according to the requirements of a user; the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template; the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary; a user creates a disaster recovery resource template, and selects whether to select a self-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to self-define a virtual machine IP address; the resource application process can be referred to when other resources are created; after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created; a user only needs to use a template to submit an order, and a resource package is formed at a user side after the order is approved by a customer manager; each resource packet is provided with a 'production' button, the resources of the resource packet are produced immediately after clicking, and meanwhile, the resource charging is started; aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of a single resource is consistent with the current virtual area resource; under daily conditions, the security disaster recovery system operates in a small fire (initial resource) state, and the main purpose is to check whether the operation of the service system is normal; if a production center fault occurs or disaster recovery drilling is needed, under the leadership authorization of the stock company, technicians of the stock company can independently execute disaster recovery switching operation or automatically execute the disaster recovery switching operation; in consideration of the situation that resources in a small fire state cannot meet the access of a large number of users of a similar production system, resource capacity expansion operation can be executed by another technical team while disaster recovery switching operation is performed. Under the condition that a disaster occurs in the production center, the disaster recovery center can be quickly started to take over the service system through disaster recovery and backup switching; meanwhile, an AS and LS middleware mirror image reserved at the initial stage of disaster recovery backup construction planning is quickly pulled up in an online capacity expansion mode, after approval by a certified cloud client manager, the middleware automatically starts service and registers to a corresponding atomic group, the requirement of quick expansion of service capacity is finally realized, and the operation of the capacity expansion operation does not influence the operation of the original disaster recovery backup small fire state; after the production center recovers the function, the newly-added cloud host can be closed and recovered to be the mirror service, and the disaster recovery center becomes a low-cost standby center again; the system with the middleware deployed is packaged into a mirror image of the ECS, the mirror image is stored in a mirror image library, when disaster recovery services need to be started, the ECS mirror image can be quickly pulled up and added into a service middleware cluster, and the computing power of the whole system is quickly improved; in the expansion process, the original service is not influenced, and the smooth expansion and the upgrade are really realized; the basic service function requirements can be met; when disaster recovery switching is triggered, capacity expansion is carried out according to a specified capacity expansion scheme, so that the maximum service performance requirement is met.
EXAMPLE III
As shown in fig. 3, a method for implementing disaster recovery based on the security disaster recovery system includes the following steps:
step S1: creating a disaster recovery template;
step S2: submitting a template order;
step S3: generating a resource package after the audit is passed;
step S4: performing disaster recovery and backup switching operation to switch to a security disaster recovery and backup system if necessary;
step S5: resource package production resource of the security disaster recovery system.
Step S6: and executing resource capacity expansion operation.
The specific implementation process can be as follows:
A) starting;
B) creating a disaster recovery template;
C) applying for/adding new resources/deleting resources to complete template creation;
D) submitting a template order;
E) the client manager approves;
if the examination and approval pass, executing F, and if the examination and approval do not pass, returning to execute C;
F) generating a resource package;
G) producing resources;
if the resources cannot be produced, returning to execute C, and if the resources cannot be produced, executing H;
H) disaster recovery drilling or disaster recovery execution;
I) and (6) ending.
Meanwhile, in consideration of the situation that resources in a small fire state cannot meet the access of a large number of users of a similar production system, the resource capacity expansion operation can be executed by another technical team while the disaster recovery switching operation is carried out.
The resource capacity expansion operation comprises:
a1: starting;
a2: cloud host resource preparation (18 AS, 16 ls and 2 databases in the current plan);
a3: testing a service function;
a4: closing part of the middleware server, packaging the middleware server into a mirror image for reservation, and keeping the nrs.xml configuration file on the LS unchanged;
if the version upgrading is found to be needed, executing steps B1-B4;
b1: upgrading an AS/LS version;
b2: pulling up the closed intermediate server from the mirror image, and keeping the IP address unchanged;
b3: upgrading the AS/LS middleware version to be consistent with the production center;
b4: starting the AS/LS middleware service, and then switching to A3;
a5: configuring a monitoring script, and filtering an AS middleware log which is not operated in an nrs.xml file and not displaying the AS middleware log;
a6: the monitoring page stops the monitoring service of the closed AS middleware;
a7: the security disaster recovery system keeps initial planning configuration, which is 11 LS, 9 AS and 2 database servers at this time, and keeps running state;
a8: checking whether the service of the business system normally runs;
the preparation stage is carried out;
if yes, starting formal capacity expansion, and executing A9;
a9: starting expansion;
a10: recovering an AS middleware cloud host from the mirror image, and designating an IP address AS an original reserved middleware address (important);
a11: auditing the upper certificate technology;
a12: newly starting the AS middleware, automatically registering to a corresponding AS atomic group according to the nrs.xml file on the LS, and actively allocating a request to a new AS by the LS;
a13: waiting for 1 minute, completely opening the AS, and connecting to a database;
a14: deactivating the monitoring log filtering script;
a15: the monitoring page starts monitoring service of the closed AS middleware;
a16: checking whether the service flow is distributed to the newly added AS middleware or not;
if yes, go to step A17, otherwise go to C1;
c1: checking middleware and configuration;
a17: recovering an LS middleware cloud host from the mirror image, and designating an IP address as an original reserved middleware address (important);
a18: the LS cloud host automatically registers in the corresponding function atomic group according to the same function;
the above implementation process further includes the steps of:
d1: the monitoring page checks whether the services all run normally or not; if not, go to step C1; if yes, executing D2;
d2: and verifying the service function.
1. Under the condition that a disaster occurs in the production center, the disaster recovery center can be quickly started to take over the service system through disaster recovery and backup switching; meanwhile, an AS (application server) middleware and an LS (local server) middleware image reserved at the initial stage of disaster recovery backup construction planning are quickly pulled up in an online capacity expansion mode, and after the AS and LS middleware images are approved by a certification cloud client manager, the middleware automatically starts service and registers to a corresponding atomic group, so that the requirement of quick expansion of service capacity is finally met, and the capacity expansion operation does not influence the state operation of the original disaster recovery backup small fire.
2. After the production center recovers the function, the newly-added cloud host can be closed and recovered to be the mirror service, and the disaster recovery center becomes a low-cost backup center again.
3. Fast capacity expansion strategy (taking a constant UF2.0 system as an example):
4. the system with the middleware deployed can be packaged into a mirror image of the ECS, the mirror image is stored in a mirror image library, when disaster recovery services need to be started, the ECS mirror image can be quickly pulled up and added into a service middleware cluster, and the computing power of the whole system is quickly improved.
5. In the expansion process, the original service is not influenced, and the smooth expansion and the upgrade are really realized.
6. Taking XX stock users AS an example, in a small-fire (initial scale) state, the number of AS (atomic AS middleware) is 9, the number of LS (logical AS middleware) is 11, the number of BAR is 2, and the number of JAR is 2, so that basic service function requirements can be met.
7. When disaster recovery switching is triggered, according to a specified expansion scheme, the number of AS is expanded to 18, the number of LS is expanded to 16, BAR is 3, and JAR is 6, so that the maximum service performance requirement is met.
In the embodiment, when a disaster occurs in the production center, the disaster recovery center can be quickly started to take over the service system through disaster recovery switching; meanwhile, an AS and LS middleware mirror image reserved in the early stage of disaster recovery backup construction planning is quickly pulled up in an online capacity expansion mode, after the mirror image is approved by a certification cloud client manager, the middleware automatically starts service and registers to a corresponding atomic group, the requirement of quick expansion of service capacity is finally met, and the capacity expansion operation does not influence the state operation of the original disaster recovery backup small fire; after the production center recovers the function, the newly-added cloud host can be closed and recovered to be the mirror image service, and the disaster recovery center becomes a low-cost standby center again; the system with the middleware deployed is packaged into a mirror image of the ECS, the mirror image is stored in a mirror image library, when disaster recovery services need to be started, the ECS mirror image can be quickly pulled up and added into a service middleware cluster, and the computing power of the whole system is quickly improved; in the expansion process, the original service is not influenced, and the smooth expansion and upgrading are really realized; the basic service function requirements can be met; when disaster recovery switching is triggered, capacity expansion is carried out according to a specified capacity expansion scheme, so that the maximum service performance requirement is met.
The implementation of the invention has the advantages that: the invention discloses a security disaster recovery system, which comprises: the cloud storage is configured to store data at a cloud end; the mirror image system is configured to create a mirror image according to the requirements of a user; the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template; the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary; a user creates a disaster recovery resource template, and selects whether to select a self-defined mirror image when creating an ECS according to the self requirement, whether to create a data disc according to a snapshot, whether to select an SSD disc, and whether to self-define a virtual machine IP address; the resource application process can be referred to when other resources are created; after all resources are created, clicking is completed, and the disaster recovery resource template is successfully created; the user only needs to use the template to submit the order, and after the order is approved by a customer manager, a resource package is formed at the user side; each resource packet is provided with a 'production' button, the resources of the resource packet are produced immediately after clicking, and meanwhile, the resource charging is started; aiming at the partial resources, the whole resources are provided with one-key starting, stopping, restarting and releasing functions; the management operation of a single resource is consistent with the current virtual area resource; under daily conditions, the security disaster recovery system operates in a small fire (initial resource) state, and the main purpose is to check whether the operation of the service system is normal; if a production center fails or disaster recovery drilling is needed, under the leadership authorization of the securities company, technicians of the securities company can independently execute disaster recovery switching operation or automatically execute the disaster recovery switching operation; in consideration of the situation that resources in a small fire state cannot meet the access of a large number of users of a similar production system, resource capacity expansion operation can be executed by another technical team while disaster recovery switching operation is performed. Under the condition that a disaster occurs in the production center, the disaster recovery center can be quickly started to take over the service system through disaster recovery and backup switching; meanwhile, an AS and LS middleware mirror image reserved in the early stage of disaster recovery backup construction planning is quickly pulled up in an online capacity expansion mode, after the mirror image is approved by a certification cloud client manager, the middleware automatically starts service and registers to a corresponding atomic group, the requirement of quick expansion of service capacity is finally met, and the capacity expansion operation does not influence the state operation of the original disaster recovery backup small fire; after the production center recovers the function, the newly-added cloud host can be closed and recovered to be the mirror service, and the disaster recovery center becomes a low-cost standby center again; the system with the deployed middleware is packaged into an ECS mirror image, the ECS mirror image is stored in a mirror image library, and when disaster recovery backup services need to be started, the ECS mirror image can be quickly pulled up and added into a service middleware cluster, so that the computing power of the whole system is quickly improved; in the expansion process, the original service is not influenced, and the smooth expansion and upgrading are really realized; the basic service function requirements can be met; when disaster recovery switching is triggered, capacity expansion is carried out according to a specified capacity expansion scheme, so that the maximum service performance requirement is met.
The above description is only an embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention disclosed herein are intended to be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A security disaster recovery system, comprising:
the cloud storage is configured to store data at a cloud end;
the mirror image system is configured to create a mirror image according to the requirements of a user;
the disaster recovery module is configured to combine the mirror image configuration basic resource to generate a disaster recovery resource template;
the resource package is configured to generate and store resources corresponding to the disaster backup resource template according to the disaster backup resource template; the resource package is configured to be capable of performing production operations to produce resources of the resource package;
and the switching module is configured to execute disaster recovery switching operation to switch to the security disaster recovery system when necessary.
2. The security disaster recovery system of claim 1, wherein the disaster recovery module further comprises a data disk snapshot for data recovery or replication of a disk, and the cloud storage comprises a plurality of SSD disks.
3. The security disaster recovery system of claim 1 wherein said images comprise a public image and a custom image, wherein the custom image is obtained by:
a user creates a self-defined mirror image according to an ECS example;
selecting a mirror image shared by other users;
and importing the image file of the offline environment into the cluster of the ECS to generate a self-defined image.
4. The security disaster recovery system as in claim 1, wherein said disaster recovery module further comprises an IP configuration of an ECS.
5. The security disaster recovery system of claim 1, wherein the security disaster recovery system is configured to: under daily conditions, the security disaster recovery system runs in an initial resource state of a small fire, and whether the function of the business system is normal or not is checked.
6. The security disaster recovery system as recited in claim 1 wherein the resource package is configured such that no add/delete operations are possible for resources within the resource package.
7. The security disaster recovery system according to claim 1, wherein the security disaster recovery system automatically performs disaster recovery switching operations or manually performs disaster recovery switching operations by technicians in case of a production center failure or a need for disaster recovery drilling.
8. The security disaster recovery system according to claim 7, wherein the security disaster recovery system is capable of performing resource expansion operation during disaster recovery switching operation.
9. The method for realizing the security disaster recovery system disaster recovery as set forth in any one of claims 1 to 8, wherein the method for realizing the security disaster recovery system disaster recovery comprises the following steps:
creating a disaster recovery template;
submitting a template order;
generating a resource package after the audit is passed;
performing disaster recovery and backup switching operation to switch to a security disaster recovery and backup system if necessary;
resource package production resource of the security disaster recovery system.
10. The method for implementing security disaster recovery and backup system according to claim 9, wherein the method for implementing security disaster recovery and backup system comprises: and executing resource capacity expansion operation.
CN201910901317.5A 2019-09-23 2019-09-23 Security disaster recovery system and disaster recovery implementation method Active CN110677469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910901317.5A CN110677469B (en) 2019-09-23 2019-09-23 Security disaster recovery system and disaster recovery implementation method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910901317.5A CN110677469B (en) 2019-09-23 2019-09-23 Security disaster recovery system and disaster recovery implementation method

Publications (2)

Publication Number Publication Date
CN110677469A CN110677469A (en) 2020-01-10
CN110677469B true CN110677469B (en) 2022-07-15

Family

ID=69078564

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910901317.5A Active CN110677469B (en) 2019-09-23 2019-09-23 Security disaster recovery system and disaster recovery implementation method

Country Status (1)

Country Link
CN (1) CN110677469B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114697198A (en) * 2022-04-18 2022-07-01 北京嗨学网教育科技股份有限公司 Cloud disaster backup server implementation method, cloud disaster backup server starting method and cloud disaster backup server starting device

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012789A (en) * 2009-09-07 2011-04-13 云端容灾有限公司 Centralized management type backup and disaster recovery system
EP2575045A1 (en) * 2011-09-30 2013-04-03 Accenture Global Services Limited Distributed computing backup and recovery system
CN103281208A (en) * 2013-03-27 2013-09-04 山东省计算中心 Data disaster backup service and integrated monitoring system
CN103838646A (en) * 2014-02-13 2014-06-04 中国科学院国家天文台 System and method for big data remote disaster recovery backup of ground application
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN106445746A (en) * 2016-10-12 2017-02-22 北京智网科技股份有限公司 Method and device for disaster recovery backup facing emergency replacement
CN106776121A (en) * 2016-11-23 2017-05-31 中国工商银行股份有限公司 A kind of data calamity is for device, system and method
CN108964986A (en) * 2018-06-15 2018-12-07 国网上海市电力公司 Cooperative office system application layer dual-active disaster recovery and backup systems
CN109491832A (en) * 2018-09-26 2019-03-19 华为技术有限公司 Data disaster tolerance method and website
CN109947591A (en) * 2017-12-20 2019-06-28 腾讯科技(深圳)有限公司 Database strange land disaster recovery and backup systems and its dispositions method, deployment device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102012789A (en) * 2009-09-07 2011-04-13 云端容灾有限公司 Centralized management type backup and disaster recovery system
EP2575045A1 (en) * 2011-09-30 2013-04-03 Accenture Global Services Limited Distributed computing backup and recovery system
CN103281208A (en) * 2013-03-27 2013-09-04 山东省计算中心 Data disaster backup service and integrated monitoring system
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN103838646A (en) * 2014-02-13 2014-06-04 中国科学院国家天文台 System and method for big data remote disaster recovery backup of ground application
CN106445746A (en) * 2016-10-12 2017-02-22 北京智网科技股份有限公司 Method and device for disaster recovery backup facing emergency replacement
CN106776121A (en) * 2016-11-23 2017-05-31 中国工商银行股份有限公司 A kind of data calamity is for device, system and method
CN109947591A (en) * 2017-12-20 2019-06-28 腾讯科技(深圳)有限公司 Database strange land disaster recovery and backup systems and its dispositions method, deployment device
CN108964986A (en) * 2018-06-15 2018-12-07 国网上海市电力公司 Cooperative office system application layer dual-active disaster recovery and backup systems
CN109491832A (en) * 2018-09-26 2019-03-19 华为技术有限公司 Data disaster tolerance method and website

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"证券业信息系统备份能力建设应用研究";王淼;《中国优秀硕士学位论文全文数据库 信息科技辑》;20130430;第1-8、25-30页 *

Also Published As

Publication number Publication date
CN110677469A (en) 2020-01-10

Similar Documents

Publication Publication Date Title
CN109901949B (en) Application disaster recovery system and method for double-activity data center
US10169173B2 (en) Preserving management services with distributed metadata through the disaster recovery life cycle
Hamilton On Designing and Deploying Internet-Scale Services.
US7020697B1 (en) Architectures for netcentric computing systems
US20210311858A1 (en) System and method for providing a test manager for use with a mainframe rehosting platform
US8560887B2 (en) Adding scalability and fault tolerance to generic finite state machine frameworks for use in automated incident management of cloud computing infrastructures
US9558459B2 (en) Dynamic selection of actions in an information technology environment
US8234633B2 (en) Incident simulation support environment and business objects associated with the incident
CN100461130C (en) Method for testing a software application
Nguyen et al. Availability modeling and analysis of a data center for disaster tolerance
CN106850260A (en) A kind of dispositions method and device of virtual resources management platform
US20090171730A1 (en) Non-disruptively changing scope of computer business applications based on detected changes in topology
US10956203B2 (en) Quality assurance for a context driven hybrid transaction processing system
CN112486466B (en) Method for realizing quick universal basic framework based on micro-service architecture
CN110063042A (en) A kind of response method and its terminal of database failure
Weikum Towards guaranteed quality and dependability of information services
CN110677469B (en) Security disaster recovery system and disaster recovery implementation method
US20090138101A1 (en) Method, System and Computer Program Product for Improving Information Technology Service Resiliency
Nugraha et al. Official document management for government service in Indonesia using smart contract
CN111737130B (en) Public cloud multi-tenant authentication service testing method, device, equipment and storage medium
CN112463248B (en) Method for mounting and dismounting cloud hard disk based on OpenStack cloud platform
CN114036560A (en) Charging pile subsidy data management method based on block chain
Somasekaram A component-based business continuity and disaster recovery framework
Adeshiyan et al. Using virtualization for high availability and disaster recovery
US9645851B1 (en) Automated application protection and reuse using an affinity module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant