CN101206596A - Method for restoration of system operation - Google Patents

Method for restoration of system operation Download PDF

Info

Publication number
CN101206596A
CN101206596A CNA2006101701150A CN200610170115A CN101206596A CN 101206596 A CN101206596 A CN 101206596A CN A2006101701150 A CNA2006101701150 A CN A2006101701150A CN 200610170115 A CN200610170115 A CN 200610170115A CN 101206596 A CN101206596 A CN 101206596A
Authority
CN
China
Prior art keywords
mentioned
time point
configuration file
aforesaid operations
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2006101701150A
Other languages
Chinese (zh)
Inventor
唐川
赵巍
陈玄同
刘文涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inventec Corp
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to CNA2006101701150A priority Critical patent/CN101206596A/en
Publication of CN101206596A publication Critical patent/CN101206596A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention provides a method of recovering system operation, a computer system can be recovered to the state of the prior operating instruction through backing up configuration files of the computer system and storing time points and operation content of each operating instruction executed by the computer system, thereby improving the reliability and stability of the computer system.

Description

The method of restoration of system operation
Technical field
The present invention relates to a kind of data recovery method, particularly relate to a kind of method of restoration of system operation.
Background technology
Arriving along with the information age, many enterprises are by storing LAN (Storage AreaNetwork, SAN) system or network connect storage (Network Attached Storage, NAS) system solves the problem of important data management and storage, adopt the network structure of forming by storage facilities and store LAN system, manage by server connection LAN and to storing LAN system, when data wreck, store LAN system relevant remedial measures can be provided, and data are returned to prerupture state, improve the reliability (Reliability) and stability (Stability) of computer system thus.And network connects the mode of stocking system by network connections, is provided at the access of carrying out file between different computer systems and the storage facilities of sharing, and improves the access efficiency of file thus.
In the process of using SAN and NAS, often need to carry out the certain operations instruction, and these operational orders can relate to the present configuration surroundings of revising server, in the process of implementing these operational orders, do not have any protection and back-up, so the result beyond can expecting unavoidably, for example: (one) misoperation, carried out certain operational order mistakenly; (2) computer system is unusual, perhaps causes certain configuration file to be damaged owing to the influence of other operational order or deleted.So computer system should be set with the data recovery point, just the damage or the deleted configuration file of computer system can be restored, but the above-mentioned method of release control can't be restored executed operational order each time.
Summary of the invention
In view of above problem, fundamental purpose of the present invention is, a kind of method of restoration of system operation is provided, time point and content of operation that configuration file and storage computation machine system by backup computer systems carries out each operational order, make computer system to reset into to carry out the state of previous operational order, cause configuration file to be damaged when solving the operational order of execution error thus or deleted and cause the problem that computer system is unusual.
Method according to restoration of system operation provided by the present invention includes following steps: at first, computer system receives operational order, and judges whether to revise first configuration file; When needs are revised first configuration file, the first first unmodified configuration file of backup of computer system then, then, the instruction of computer system executable operations, and revise first configuration file and produce second configuration file; According to the content of second configuration file, in journal file, set up the time point of executable operations instruction and the information of content of operation.
After computer system is confirmed to carry out reposition routine, decide the recovery time point according to computer system management person's operation; Then, computer system is according to the content of journal file, with the recovery time point is benchmark, carry out contrary operation successively corresponding to operational order from final time point to recovery time point, at last, computer system has been set up the time point of executable operations instruction and the information of content of operation according to the operational order that carries out contrary operation in the deletion journal file.
Method by this restoration of system operation, make computer system have maintainability more, when carrying out the operational order of mistake, computer system can be reset into the state of carrying out previous operational order by journal file, and because journal file has been stored time point and content of operation when computer system is carried out any one operational order, therefore, adopt the whole mode that resets into last point of safes to compare many easily with windows operating system, in addition, mutual backup by a plurality of configuration files, when a certain configuration file generation problem, can carry out restoring action according to remaining configuration file, so can not cause the unusual of computer system, and make the computer system can continuous service, and then improve the reliability and stability of computer system.
Below, in conjunction with specific embodiments and accompanying drawing, the present invention is described in further detail.
Description of drawings
Fig. 1 is the process flow diagram of embodiments of the invention.
Embodiment
Fig. 1 is the process flow diagram of embodiments of the invention.As shown in Figure 1, the method for the restoration of system operation of embodiments of the invention includes following steps:
At first, in operating process to computer system, most operational order mainly can be divided into three types: increase operational order, deletion action instruction and retouching operation instruction, and in fact when working procedure, according to the action of each operational order, mainly dividing into increases operational order and deletion action instruction.Wherein, the retouching operation instruction can be considered as carrying out earlier deletion action and instruct, increases operational order.
When computer system receives operational order, judge whether to revise first configuration file (step 100) earlier, owing to be not the content that all operational orders all can change configuration file, so computer system for example can and then judge whether to revise first configuration file according to the type that receives operational order or attribute in step 100.Wherein, first configuration file adopts extensibility indicating language (XML) file layout.
When the computer system judgement need not to revise first configuration file, then directly executable operations instruction (step 101).
When the computer system judgement needs to revise first configuration file, then back up the first unmodified configuration file (step 102) earlier, and the backup actions of first configuration file for example can directly copy to the first unmodified configuration file in the catalogue folder originally in the predetermined catalogue folder as backup, when configuration file damages, first configuration file in the catalogue folder that then can this is predetermined copies in the catalogue folder of script, and restores the state of computer system.
Then, the instruction of computer system executable operations, and revise first configuration file, and produce second configuration file (step 103).Wherein, second configuration file adopts extensibility indicating language (XML) file layout.
At this moment, computing machine is set up the time point of executable operations instruction and the information (step 104) of content of operation according to the content of second configuration file in journal file.Wherein, journal file adopts extensibility indicating language (XML) file layout.
Computer system judges whether to carry out reposition routine (step 105).Wherein, the judgment mode of computer system for example can judge whether to start reposition routine, but not only be defined in this form by checking the execution that whether is triggered of predefined programmed instruction.There is no when carrying out reposition routine if computer system is judged, then get back to step 100.In addition, every execution single job instruction, corresponding and set up the time point of an executable operations instruction and the information of content of operation in the journal file.
After step 105, when computer system confirms will carry out reposition routine the time, according to computer system management person's operation, decision recovery time point (step 106).Wherein, the deciding means of recovery time point for example can be listed the content information of corresponding journal file by the selecting type window interface, for computer system management person selection operation, but not only is defined in this form.
Computer system is benchmark according to the content of journal file with the recovery time point that determines in the step 106, carries out the contrary operation (step 107) of respective operations instruction successively to recovery time point from the final time point of journal file.Wherein, the meaning of contrary operation is meant carries out reverse operating with the origin operation instruction, for example, originally for increasing operational order, carry out just becoming the deletion action instruction behind the contrary operation, in like manner, originally for the deletion action instruction, carry out just becoming the increase operational order behind the contrary operation.
After step 107, computer system is according to the operational order that carries out contrary operation, the time point of executable operations instruction and the information (step 108) of content of operation have been set up in the deletion journal file, this mainly is to repeat same operational motion when restoring for fear of next time, therefore need be corresponding node data deletion of having restored in the log file contents.
Below, the example application of lifting Email (E-mail) event notice function in the SAN system describes:
At first, just begun in computer system, not have the data of e-mail address, so email configuration file mail.conf and Email journal file mailRecord.conf are blank, thus the theing contents are as follows of email configuration file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
</MAIL>
Theing contents are as follows of Email journal file:
<?xml?version=”1.0”?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
</MAILRECORD>
At very first time point T1 (for example, in the time of 8:00AM), the computer system management person need increase the data of two e-mail addresses, therefore at first configuration file is originally done a backup, according to the operational order of computer system management person execution, it is as follows to produce new configuration file then:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
<Mail?Address=″XX@YY.ZZ″name=″XX″/>
<Mail?Address=″X1@YY.ZZ″name=″X1″/>
</MAIL>
When new configuration file produced, computer system was amended as follows synchronously to journal file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
<Operation?Time=”2006-11-14-08-00-00”>
<Add?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X1@YY.ZZ″name=″X1″/>
</Operation>
</MAILRECORD>
Can find that from above-mentioned journal file the executable operations time that the computer system management person increases by two e-mail address data is " 2006-11-14-08-00-00 ", the content that increases the e-mail address data is respectively " XX@YY.ZZ " and X1@YY.ZZ.
Then, (for example, in the time of 9:00AM), the computer system management person is that this e-mail data of XX is made amendment to name, and the name of this e-mail data is revised as X0 at the second time point T2.Wherein, because the retouching operation instruction is finished by deletion action instruction and increase operational order, so no longer deletion and increase action are described at this, configuration file new after revising is as follows:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
<Mail?Address=″X0@YY.ZZ″name=″X0″/>
<Mail?Address=″X1@YY.ZZ″name=″X1″/>
</MAIL>
When new configuration file produced, computer system was amended as follows synchronously to journal file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
<OperationTime=”2006-11-14-08-00-00”>
<Add?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X1@YY.ZZ″name=″X1″/>
</Operation>
<Operation?Time=”2006-11-14-09-00-00”>
<Delete?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X0@YY.ZZ″name=″X0″/>
</Operation>
</MAILRECORD>
Can be found that by above-mentioned journal file the executable operations time that the computer system management person increases by two e-mail address data is " 2006-11-14-08-00-00 ", the content that increases the e-mail address data is respectively " XX@YY.ZZ " and X1@YY.ZZ.When the executable operations time is " 2006-11-14-09-00-00 ", the address date that deletes an e-mail " XX@YY.ZZ ", and increase e-mail address data " X0@YY.ZZ ".
If computer system management person this moment finds performed retouching operation instruction and is mistake, and the configuration file of wanting to make computer system resets into the state of very first time point T1, he can select the second time point T2 and carry out reposition routine so, reposition routine is according to the content of journal file, begin forward individual operational order to be carried out contrary operation from last node of the time point that will reset into, up to getting back to the time point that needs recovery, in other words, from log file contents<OperationTime=" 2006-11-14-09-00-00 " this node begins all nodes are carried out contrary operation, promptly delete node Address=" X0@YY.ZZ " name=" X0 " and node Address=" XX@YY.ZZ " name=" XX " that increases in the former configuration file in the present configuration file, so, configuration file after the recovery will become the state of very first time point T1, in addition, when carrying out reposition routine according to journal file, when restoring, repeat same operational motion for fear of next time, need delete the node data in the corresponding log file contents, as follows:
<Operation?Time=”2006-11-14-09-00-00”>
<Delete?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X0@YY.ZZ″name=″X0″/>
</Operation>
In sum, the method of restoration of system operation of the present invention, when the computer system management person has found to carry out wrong operational order, computer system can be reset into the state of carrying out previous operational order by journal file, in addition, back up mutually by a plurality of configuration files, when a certain configuration file generation problem, can carry out recovery operation according to remaining configuration file, so can not cause the unusual of computer system, and make the computer system can continuous service, and then improve the reliability and stability of computer system.

Claims (5)

1. the method for a restoration of system operation is characterized in that, includes following steps:
Receive operational order, and judge whether to revise first configuration file;
When needs are revised above-mentioned first configuration file, unmodified above-mentioned first configuration file of backup earlier;
Execution aforesaid operations instruction, and revise above-mentioned first configuration file and produce second configuration file;
According to the content of above-mentioned second configuration file, in journal file, set up the time point of execution aforesaid operations instruction and the information of content of operation;
Confirm to carry out reposition routine, and decision recovery time point; And
According to the content of above-mentioned journal file, be benchmark with above-mentioned recovery time point, carry out the contrary operation of corresponding aforesaid operations instruction successively from final time point to above-mentioned recovery time point.
2. the method for restoration of system operation as claimed in claim 1 is characterized in that, above-mentioned configuration file and above-mentioned journal file adopt extensibility indicating language file layout.
3. the method for restoration of system operation as claimed in claim 1 is characterized in that, includes one of them that increases operational order, deletion action instruction and retouching operation instruction in the aforesaid operations instruction.
4. the method for restoration of system operation as claimed in claim 1 is characterized in that, the instruction of aforesaid operations of every execution is corresponding and set up the time point of once carrying out the aforesaid operations instruction and the information of content of operation in above-mentioned journal file.
5. the method for restoration of system operation as claimed in claim 1, it is characterized in that, after the step of the contrary operation that carries out corresponding aforesaid operations instruction from final time point to above-mentioned recovery time point successively, also include according to the aforesaid operations instruction of carrying out above-mentioned contrary operation, delete the step of the above-mentioned information of the above-mentioned time point of the execution aforesaid operations instruction of having set up in the above-mentioned journal file and aforesaid operations content.
CNA2006101701150A 2006-12-22 2006-12-22 Method for restoration of system operation Pending CN101206596A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2006101701150A CN101206596A (en) 2006-12-22 2006-12-22 Method for restoration of system operation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2006101701150A CN101206596A (en) 2006-12-22 2006-12-22 Method for restoration of system operation

Publications (1)

Publication Number Publication Date
CN101206596A true CN101206596A (en) 2008-06-25

Family

ID=39566827

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2006101701150A Pending CN101206596A (en) 2006-12-22 2006-12-22 Method for restoration of system operation

Country Status (1)

Country Link
CN (1) CN101206596A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117235A (en) * 2011-03-28 2011-07-06 浪潮(北京)电子信息产业有限公司 Management method and management system for configuration information in cloud computation operation system
CN102713863A (en) * 2009-10-05 2012-10-03 国际商业机器公司 Automatic correction of application based on runtime behavior
WO2014060934A2 (en) * 2012-10-16 2014-04-24 International Business Machines Corporation Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
US9104626B2 (en) 2012-10-16 2015-08-11 International Business Machines Corporation Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture
US9280406B2 (en) 2009-10-05 2016-03-08 International Business Machines Corporation Automatic correction of application based on runtime behavior
US9405704B2 (en) 2012-10-16 2016-08-02 International Business Machines Corporation Establishing a point-in-time copy relationship between source logical addresses and target logical addresses
CN107241370A (en) * 2016-03-29 2017-10-10 西门子公司 The rollback method and system of resource operation under IaaS cloud environment
CN109298973A (en) * 2018-09-28 2019-02-01 联想(北京)有限公司 A kind of information recovering method and electronic equipment

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102713863A (en) * 2009-10-05 2012-10-03 国际商业机器公司 Automatic correction of application based on runtime behavior
US9886372B2 (en) 2009-10-05 2018-02-06 International Business Machines Corporation Automatic correction of application based on runtime behavior
US9280406B2 (en) 2009-10-05 2016-03-08 International Business Machines Corporation Automatic correction of application based on runtime behavior
CN102117235A (en) * 2011-03-28 2011-07-06 浪潮(北京)电子信息产业有限公司 Management method and management system for configuration information in cloud computation operation system
CN102117235B (en) * 2011-03-28 2012-12-19 浪潮(北京)电子信息产业有限公司 Management method and management system for configuration information in cloud computation operation system
US9135121B2 (en) 2012-10-16 2015-09-15 International Business Machines Corporation Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
US9104626B2 (en) 2012-10-16 2015-08-11 International Business Machines Corporation Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture
US9116852B2 (en) 2012-10-16 2015-08-25 International Business Machines Corporation Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture
GB2521326A (en) * 2012-10-16 2015-06-17 Ibm Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
GB2521326B (en) * 2012-10-16 2015-11-04 Ibm Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
WO2014060934A3 (en) * 2012-10-16 2014-07-10 International Business Machines Corporation Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
US9405704B2 (en) 2012-10-16 2016-08-02 International Business Machines Corporation Establishing a point-in-time copy relationship between source logical addresses and target logical addresses
US9740634B2 (en) 2012-10-16 2017-08-22 International Business Machines Corporation Establishing a point-in-time copy relationship between source logical addresses and target logical addresses
US9747198B2 (en) 2012-10-16 2017-08-29 International Business Machines Corporation Processing a point-in-time copy establish command to copy data
US9836231B2 (en) 2012-10-16 2017-12-05 International Business Machines Corporation Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
WO2014060934A2 (en) * 2012-10-16 2014-04-24 International Business Machines Corporation Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses
CN107241370A (en) * 2016-03-29 2017-10-10 西门子公司 The rollback method and system of resource operation under IaaS cloud environment
CN109298973A (en) * 2018-09-28 2019-02-01 联想(北京)有限公司 A kind of information recovering method and electronic equipment

Similar Documents

Publication Publication Date Title
CN101206596A (en) Method for restoration of system operation
JP5646639B2 (en) Backup using metadata virtual hard drive and differential virtual hard drive
JP5075736B2 (en) System failure recovery method and system for virtual server
TWI608419B (en) Method for pre-testing software compatibility and system thereof
US9235606B1 (en) Simplified database/log backup and restore
US8250202B2 (en) Distributed notification and action mechanism for mirroring-related events
EP2092432B1 (en) Message forwarding backup manager in a distributed server system
CN106951559B (en) Data recovery method in distributed file system and electronic equipment
CN107870829B (en) Distributed data recovery method, server, related equipment and system
US20100198791A1 (en) System, method, and computer program product for allowing access to backup data
WO2018098972A1 (en) Log recovery method, storage device and storage node
CN105335251A (en) Fault recovery method and system
CN104166605A (en) Data backup method and system based on incremental data files
CN110597661A (en) Virtual machine backup method and device
CN112800019A (en) Data backup method and system based on Hadoop distributed file system
EP2372552B1 (en) Automated relocation of in-use multi-site protected data storage
US10387262B1 (en) Federated restore of single instance databases and availability group database replicas
JP5154843B2 (en) Cluster system, computer, and failure recovery method
CN106997305B (en) Transaction processing method and device
CN111090491B (en) Virtual machine task state recovery method and device and electronic equipment
CN114356650A (en) Data backup method, device, equipment, system and storage medium
JP5465401B2 (en) File management method, apparatus and program
CN106020975A (en) Data operation method, device and system
JP5466740B2 (en) System failure recovery method and system for virtual server
US9659025B1 (en) Automation of RSG management for backup and recovery

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication