CN101206596A - Method for restoration of system operation - Google Patents
Method for restoration of system operation Download PDFInfo
- Publication number
- CN101206596A CN101206596A CNA2006101701150A CN200610170115A CN101206596A CN 101206596 A CN101206596 A CN 101206596A CN A2006101701150 A CNA2006101701150 A CN A2006101701150A CN 200610170115 A CN200610170115 A CN 200610170115A CN 101206596 A CN101206596 A CN 101206596A
- Authority
- CN
- China
- Prior art keywords
- mentioned
- time point
- configuration file
- aforesaid operations
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Abstract
The invention provides a method of recovering system operation, a computer system can be recovered to the state of the prior operating instruction through backing up configuration files of the computer system and storing time points and operation content of each operating instruction executed by the computer system, thereby improving the reliability and stability of the computer system.
Description
Technical field
The present invention relates to a kind of data recovery method, particularly relate to a kind of method of restoration of system operation.
Background technology
Arriving along with the information age, many enterprises are by storing LAN (Storage AreaNetwork, SAN) system or network connect storage (Network Attached Storage, NAS) system solves the problem of important data management and storage, adopt the network structure of forming by storage facilities and store LAN system, manage by server connection LAN and to storing LAN system, when data wreck, store LAN system relevant remedial measures can be provided, and data are returned to prerupture state, improve the reliability (Reliability) and stability (Stability) of computer system thus.And network connects the mode of stocking system by network connections, is provided at the access of carrying out file between different computer systems and the storage facilities of sharing, and improves the access efficiency of file thus.
In the process of using SAN and NAS, often need to carry out the certain operations instruction, and these operational orders can relate to the present configuration surroundings of revising server, in the process of implementing these operational orders, do not have any protection and back-up, so the result beyond can expecting unavoidably, for example: (one) misoperation, carried out certain operational order mistakenly; (2) computer system is unusual, perhaps causes certain configuration file to be damaged owing to the influence of other operational order or deleted.So computer system should be set with the data recovery point, just the damage or the deleted configuration file of computer system can be restored, but the above-mentioned method of release control can't be restored executed operational order each time.
Summary of the invention
In view of above problem, fundamental purpose of the present invention is, a kind of method of restoration of system operation is provided, time point and content of operation that configuration file and storage computation machine system by backup computer systems carries out each operational order, make computer system to reset into to carry out the state of previous operational order, cause configuration file to be damaged when solving the operational order of execution error thus or deleted and cause the problem that computer system is unusual.
Method according to restoration of system operation provided by the present invention includes following steps: at first, computer system receives operational order, and judges whether to revise first configuration file; When needs are revised first configuration file, the first first unmodified configuration file of backup of computer system then, then, the instruction of computer system executable operations, and revise first configuration file and produce second configuration file; According to the content of second configuration file, in journal file, set up the time point of executable operations instruction and the information of content of operation.
After computer system is confirmed to carry out reposition routine, decide the recovery time point according to computer system management person's operation; Then, computer system is according to the content of journal file, with the recovery time point is benchmark, carry out contrary operation successively corresponding to operational order from final time point to recovery time point, at last, computer system has been set up the time point of executable operations instruction and the information of content of operation according to the operational order that carries out contrary operation in the deletion journal file.
Method by this restoration of system operation, make computer system have maintainability more, when carrying out the operational order of mistake, computer system can be reset into the state of carrying out previous operational order by journal file, and because journal file has been stored time point and content of operation when computer system is carried out any one operational order, therefore, adopt the whole mode that resets into last point of safes to compare many easily with windows operating system, in addition, mutual backup by a plurality of configuration files, when a certain configuration file generation problem, can carry out restoring action according to remaining configuration file, so can not cause the unusual of computer system, and make the computer system can continuous service, and then improve the reliability and stability of computer system.
Below, in conjunction with specific embodiments and accompanying drawing, the present invention is described in further detail.
Description of drawings
Fig. 1 is the process flow diagram of embodiments of the invention.
Embodiment
Fig. 1 is the process flow diagram of embodiments of the invention.As shown in Figure 1, the method for the restoration of system operation of embodiments of the invention includes following steps:
At first, in operating process to computer system, most operational order mainly can be divided into three types: increase operational order, deletion action instruction and retouching operation instruction, and in fact when working procedure, according to the action of each operational order, mainly dividing into increases operational order and deletion action instruction.Wherein, the retouching operation instruction can be considered as carrying out earlier deletion action and instruct, increases operational order.
When computer system receives operational order, judge whether to revise first configuration file (step 100) earlier, owing to be not the content that all operational orders all can change configuration file, so computer system for example can and then judge whether to revise first configuration file according to the type that receives operational order or attribute in step 100.Wherein, first configuration file adopts extensibility indicating language (XML) file layout.
When the computer system judgement need not to revise first configuration file, then directly executable operations instruction (step 101).
When the computer system judgement needs to revise first configuration file, then back up the first unmodified configuration file (step 102) earlier, and the backup actions of first configuration file for example can directly copy to the first unmodified configuration file in the catalogue folder originally in the predetermined catalogue folder as backup, when configuration file damages, first configuration file in the catalogue folder that then can this is predetermined copies in the catalogue folder of script, and restores the state of computer system.
Then, the instruction of computer system executable operations, and revise first configuration file, and produce second configuration file (step 103).Wherein, second configuration file adopts extensibility indicating language (XML) file layout.
At this moment, computing machine is set up the time point of executable operations instruction and the information (step 104) of content of operation according to the content of second configuration file in journal file.Wherein, journal file adopts extensibility indicating language (XML) file layout.
Computer system judges whether to carry out reposition routine (step 105).Wherein, the judgment mode of computer system for example can judge whether to start reposition routine, but not only be defined in this form by checking the execution that whether is triggered of predefined programmed instruction.There is no when carrying out reposition routine if computer system is judged, then get back to step 100.In addition, every execution single job instruction, corresponding and set up the time point of an executable operations instruction and the information of content of operation in the journal file.
After step 105, when computer system confirms will carry out reposition routine the time, according to computer system management person's operation, decision recovery time point (step 106).Wherein, the deciding means of recovery time point for example can be listed the content information of corresponding journal file by the selecting type window interface, for computer system management person selection operation, but not only is defined in this form.
Computer system is benchmark according to the content of journal file with the recovery time point that determines in the step 106, carries out the contrary operation (step 107) of respective operations instruction successively to recovery time point from the final time point of journal file.Wherein, the meaning of contrary operation is meant carries out reverse operating with the origin operation instruction, for example, originally for increasing operational order, carry out just becoming the deletion action instruction behind the contrary operation, in like manner, originally for the deletion action instruction, carry out just becoming the increase operational order behind the contrary operation.
After step 107, computer system is according to the operational order that carries out contrary operation, the time point of executable operations instruction and the information (step 108) of content of operation have been set up in the deletion journal file, this mainly is to repeat same operational motion when restoring for fear of next time, therefore need be corresponding node data deletion of having restored in the log file contents.
Below, the example application of lifting Email (E-mail) event notice function in the SAN system describes:
At first, just begun in computer system, not have the data of e-mail address, so email configuration file mail.conf and Email journal file mailRecord.conf are blank, thus the theing contents are as follows of email configuration file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
</MAIL>
Theing contents are as follows of Email journal file:
<?xml?version=”1.0”?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
</MAILRECORD>
At very first time point T1 (for example, in the time of 8:00AM), the computer system management person need increase the data of two e-mail addresses, therefore at first configuration file is originally done a backup, according to the operational order of computer system management person execution, it is as follows to produce new configuration file then:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
<Mail?Address=″XX@YY.ZZ″name=″XX″/>
<Mail?Address=″X1@YY.ZZ″name=″X1″/>
</MAIL>
When new configuration file produced, computer system was amended as follows synchronously to journal file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
<Operation?Time=”2006-11-14-08-00-00”>
<Add?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X1@YY.ZZ″name=″X1″/>
</Operation>
</MAILRECORD>
Can find that from above-mentioned journal file the executable operations time that the computer system management person increases by two e-mail address data is " 2006-11-14-08-00-00 ", the content that increases the e-mail address data is respectively " XX@YY.ZZ " and X1@YY.ZZ.
Then, (for example, in the time of 9:00AM), the computer system management person is that this e-mail data of XX is made amendment to name, and the name of this e-mail data is revised as X0 at the second time point T2.Wherein, because the retouching operation instruction is finished by deletion action instruction and increase operational order, so no longer deletion and increase action are described at this, configuration file new after revising is as follows:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mail.conf?xml?file-->
<MAIL>
<Mail?Address=″X0@YY.ZZ″name=″X0″/>
<Mail?Address=″X1@YY.ZZ″name=″X1″/>
</MAIL>
When new configuration file produced, computer system was amended as follows synchronously to journal file:
<?xml?version=″1.0″?>
<!DOCTYPE?textfile>
<!--mailRecord.conf?xml?file-->
<MAILRECORD>
<OperationTime=”2006-11-14-08-00-00”>
<Add?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X1@YY.ZZ″name=″X1″/>
</Operation>
<Operation?Time=”2006-11-14-09-00-00”>
<Delete?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X0@YY.ZZ″name=″X0″/>
</Operation>
</MAILRECORD>
Can be found that by above-mentioned journal file the executable operations time that the computer system management person increases by two e-mail address data is " 2006-11-14-08-00-00 ", the content that increases the e-mail address data is respectively " XX@YY.ZZ " and X1@YY.ZZ.When the executable operations time is " 2006-11-14-09-00-00 ", the address date that deletes an e-mail " XX@YY.ZZ ", and increase e-mail address data " X0@YY.ZZ ".
If computer system management person this moment finds performed retouching operation instruction and is mistake, and the configuration file of wanting to make computer system resets into the state of very first time point T1, he can select the second time point T2 and carry out reposition routine so, reposition routine is according to the content of journal file, begin forward individual operational order to be carried out contrary operation from last node of the time point that will reset into, up to getting back to the time point that needs recovery, in other words, from log file contents<OperationTime=" 2006-11-14-09-00-00 " this node begins all nodes are carried out contrary operation, promptly delete node Address=" X0@YY.ZZ " name=" X0 " and node Address=" XX@YY.ZZ " name=" XX " that increases in the former configuration file in the present configuration file, so, configuration file after the recovery will become the state of very first time point T1, in addition, when carrying out reposition routine according to journal file, when restoring, repeat same operational motion for fear of next time, need delete the node data in the corresponding log file contents, as follows:
<Operation?Time=”2006-11-14-09-00-00”>
<Delete?Address=″XX@YY.ZZ″name=″XX″/>
<Add?Address=″X0@YY.ZZ″name=″X0″/>
</Operation>
In sum, the method of restoration of system operation of the present invention, when the computer system management person has found to carry out wrong operational order, computer system can be reset into the state of carrying out previous operational order by journal file, in addition, back up mutually by a plurality of configuration files, when a certain configuration file generation problem, can carry out recovery operation according to remaining configuration file, so can not cause the unusual of computer system, and make the computer system can continuous service, and then improve the reliability and stability of computer system.
Claims (5)
1. the method for a restoration of system operation is characterized in that, includes following steps:
Receive operational order, and judge whether to revise first configuration file;
When needs are revised above-mentioned first configuration file, unmodified above-mentioned first configuration file of backup earlier;
Execution aforesaid operations instruction, and revise above-mentioned first configuration file and produce second configuration file;
According to the content of above-mentioned second configuration file, in journal file, set up the time point of execution aforesaid operations instruction and the information of content of operation;
Confirm to carry out reposition routine, and decision recovery time point; And
According to the content of above-mentioned journal file, be benchmark with above-mentioned recovery time point, carry out the contrary operation of corresponding aforesaid operations instruction successively from final time point to above-mentioned recovery time point.
2. the method for restoration of system operation as claimed in claim 1 is characterized in that, above-mentioned configuration file and above-mentioned journal file adopt extensibility indicating language file layout.
3. the method for restoration of system operation as claimed in claim 1 is characterized in that, includes one of them that increases operational order, deletion action instruction and retouching operation instruction in the aforesaid operations instruction.
4. the method for restoration of system operation as claimed in claim 1 is characterized in that, the instruction of aforesaid operations of every execution is corresponding and set up the time point of once carrying out the aforesaid operations instruction and the information of content of operation in above-mentioned journal file.
5. the method for restoration of system operation as claimed in claim 1, it is characterized in that, after the step of the contrary operation that carries out corresponding aforesaid operations instruction from final time point to above-mentioned recovery time point successively, also include according to the aforesaid operations instruction of carrying out above-mentioned contrary operation, delete the step of the above-mentioned information of the above-mentioned time point of the execution aforesaid operations instruction of having set up in the above-mentioned journal file and aforesaid operations content.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101701150A CN101206596A (en) | 2006-12-22 | 2006-12-22 | Method for restoration of system operation |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006101701150A CN101206596A (en) | 2006-12-22 | 2006-12-22 | Method for restoration of system operation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101206596A true CN101206596A (en) | 2008-06-25 |
Family
ID=39566827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006101701150A Pending CN101206596A (en) | 2006-12-22 | 2006-12-22 | Method for restoration of system operation |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101206596A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102117235A (en) * | 2011-03-28 | 2011-07-06 | 浪潮(北京)电子信息产业有限公司 | Management method and management system for configuration information in cloud computation operation system |
CN102713863A (en) * | 2009-10-05 | 2012-10-03 | 国际商业机器公司 | Automatic correction of application based on runtime behavior |
WO2014060934A2 (en) * | 2012-10-16 | 2014-04-24 | International Business Machines Corporation | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
US9104626B2 (en) | 2012-10-16 | 2015-08-11 | International Business Machines Corporation | Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture |
US9280406B2 (en) | 2009-10-05 | 2016-03-08 | International Business Machines Corporation | Automatic correction of application based on runtime behavior |
US9405704B2 (en) | 2012-10-16 | 2016-08-02 | International Business Machines Corporation | Establishing a point-in-time copy relationship between source logical addresses and target logical addresses |
CN107241370A (en) * | 2016-03-29 | 2017-10-10 | 西门子公司 | The rollback method and system of resource operation under IaaS cloud environment |
CN109298973A (en) * | 2018-09-28 | 2019-02-01 | 联想(北京)有限公司 | A kind of information recovering method and electronic equipment |
-
2006
- 2006-12-22 CN CNA2006101701150A patent/CN101206596A/en active Pending
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102713863A (en) * | 2009-10-05 | 2012-10-03 | 国际商业机器公司 | Automatic correction of application based on runtime behavior |
US9886372B2 (en) | 2009-10-05 | 2018-02-06 | International Business Machines Corporation | Automatic correction of application based on runtime behavior |
US9280406B2 (en) | 2009-10-05 | 2016-03-08 | International Business Machines Corporation | Automatic correction of application based on runtime behavior |
CN102117235A (en) * | 2011-03-28 | 2011-07-06 | 浪潮(北京)电子信息产业有限公司 | Management method and management system for configuration information in cloud computation operation system |
CN102117235B (en) * | 2011-03-28 | 2012-12-19 | 浪潮(北京)电子信息产业有限公司 | Management method and management system for configuration information in cloud computation operation system |
US9135121B2 (en) | 2012-10-16 | 2015-09-15 | International Business Machines Corporation | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
US9104626B2 (en) | 2012-10-16 | 2015-08-11 | International Business Machines Corporation | Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture |
US9116852B2 (en) | 2012-10-16 | 2015-08-25 | International Business Machines Corporation | Processing a copy command directed to a first storage architecture for data that is stored in a second storage architecture |
GB2521326A (en) * | 2012-10-16 | 2015-06-17 | Ibm | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
GB2521326B (en) * | 2012-10-16 | 2015-11-04 | Ibm | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
WO2014060934A3 (en) * | 2012-10-16 | 2014-07-10 | International Business Machines Corporation | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
US9405704B2 (en) | 2012-10-16 | 2016-08-02 | International Business Machines Corporation | Establishing a point-in-time copy relationship between source logical addresses and target logical addresses |
US9740634B2 (en) | 2012-10-16 | 2017-08-22 | International Business Machines Corporation | Establishing a point-in-time copy relationship between source logical addresses and target logical addresses |
US9747198B2 (en) | 2012-10-16 | 2017-08-29 | International Business Machines Corporation | Processing a point-in-time copy establish command to copy data |
US9836231B2 (en) | 2012-10-16 | 2017-12-05 | International Business Machines Corporation | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
WO2014060934A2 (en) * | 2012-10-16 | 2014-04-24 | International Business Machines Corporation | Managing updates and copying data in a point-in-time copy relationship expressed as source logical addresses and target logical addresses |
CN107241370A (en) * | 2016-03-29 | 2017-10-10 | 西门子公司 | The rollback method and system of resource operation under IaaS cloud environment |
CN109298973A (en) * | 2018-09-28 | 2019-02-01 | 联想(北京)有限公司 | A kind of information recovering method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101206596A (en) | Method for restoration of system operation | |
JP5646639B2 (en) | Backup using metadata virtual hard drive and differential virtual hard drive | |
JP5075736B2 (en) | System failure recovery method and system for virtual server | |
TWI608419B (en) | Method for pre-testing software compatibility and system thereof | |
US9235606B1 (en) | Simplified database/log backup and restore | |
US8250202B2 (en) | Distributed notification and action mechanism for mirroring-related events | |
EP2092432B1 (en) | Message forwarding backup manager in a distributed server system | |
CN106951559B (en) | Data recovery method in distributed file system and electronic equipment | |
CN107870829B (en) | Distributed data recovery method, server, related equipment and system | |
US20100198791A1 (en) | System, method, and computer program product for allowing access to backup data | |
WO2018098972A1 (en) | Log recovery method, storage device and storage node | |
CN105335251A (en) | Fault recovery method and system | |
CN104166605A (en) | Data backup method and system based on incremental data files | |
CN110597661A (en) | Virtual machine backup method and device | |
CN112800019A (en) | Data backup method and system based on Hadoop distributed file system | |
EP2372552B1 (en) | Automated relocation of in-use multi-site protected data storage | |
US10387262B1 (en) | Federated restore of single instance databases and availability group database replicas | |
JP5154843B2 (en) | Cluster system, computer, and failure recovery method | |
CN106997305B (en) | Transaction processing method and device | |
CN111090491B (en) | Virtual machine task state recovery method and device and electronic equipment | |
CN114356650A (en) | Data backup method, device, equipment, system and storage medium | |
JP5465401B2 (en) | File management method, apparatus and program | |
CN106020975A (en) | Data operation method, device and system | |
JP5466740B2 (en) | System failure recovery method and system for virtual server | |
US9659025B1 (en) | Automation of RSG management for backup and recovery |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |