CN103793294A - Realtime backup method for business-critical data - Google Patents

Realtime backup method for business-critical data Download PDF

Info

Publication number
CN103793294A
CN103793294A CN201210432792.0A CN201210432792A CN103793294A CN 103793294 A CN103793294 A CN 103793294A CN 201210432792 A CN201210432792 A CN 201210432792A CN 103793294 A CN103793294 A CN 103793294A
Authority
CN
China
Prior art keywords
file
critical data
write operation
business critical
file destination
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201210432792.0A
Other languages
Chinese (zh)
Inventor
顾胜溢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHANGHAI OUPENG SOFTWARE Co Ltd
Original Assignee
SHANGHAI OUPENG SOFTWARE Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANGHAI OUPENG SOFTWARE Co Ltd filed Critical SHANGHAI OUPENG SOFTWARE Co Ltd
Priority to CN201210432792.0A priority Critical patent/CN103793294A/en
Publication of CN103793294A publication Critical patent/CN103793294A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a realtime backup method for business-critical data. The method includes the following steps: 1), creating a file list of the business-critical data; 2), detecting each file write-in operation of a file system in real time; 3), comparing a target file of the file write-in operation with the file list of the business-critical data; if the target file is matched with the file list, executing the file write-in operation, and creating a backup file for the target file of the file write-in operation after the file write-in operation is completed. By the method, a realtime copy can be created for the business-critical data according to the file write-in operation. The realtime backup method has the advantages of high reliability, low resource consumption, high practicability and simplicity and convenience in operation.

Description

The real time backup method of business critical data
Technical field
The present invention relates to field of data storage, be specifically related to a kind of real time backup method of business critical data.
Background technology
Prior art field of data storage all by timed backup, lacks the method for backing up in realtime for the backup of file.And for the business critical data of high reliability request, may need to relate to each business critical data copy of modification, the backup scenario of prior art cannot realize the backup for business critical data.
Summary of the invention
The technical problem to be solved in the present invention be to provide one can for business critical data according to file write operation set up real-time copy, the real time backup method of the business critical data that reliability is high, low in resources consumption, practicality is good, simple to operation.
For solving the problems of the technologies described above, the technical solution used in the present invention is:
A real time backup method for business critical data, implementation step is as follows:
1) set up business critical data listed files;
2) detect in real time each file write operation of file system;
3) file destination of file write operation and business critical data listed files are compared, if coupling, first execute file write operation is then that the file destination of file write operation is set up backup file after file write operation.
Further improvement as technique scheme of the present invention:
The cryptographic hash that described business critical data listed files comprises each business critical data file; The detailed step in described step 3), file destination and business critical data listed files being compared is as follows:
3.1) obtain the file destination of file write operation;
3.2) obtain the cryptographic hash of file destination;
3.3) cryptographic hash of each the business critical data file in the cryptographic hash of file destination and described business critical data listed files is compared, if there is identical cryptographic hash in business critical data listed files, judge that comparative result is as coupling, otherwise judge that comparative result is as not mating.
Described cryptographic hash specifically refers to the md5 file verification code of business critical data file.
In described step 3), the detailed operation steps of execute file write operation is as follows:
3.4) judge the file destination size of file write operation, if file destination size is less than preset value, redirect execution step 3.5), otherwise redirect execution step 3.6);
3.5) execute file write operation, and file destination is read and entered in internal memory;
3.6) execute file write operation.
In described step 3), for the file destination of file write operation, to set up the detailed step of backup file as follows: detect in internal memory whether have file destination, if there is file destination in internal memory, the file destination in internal memory is write in disk and sets up backup file, if there is not file destination file destination in internal memory, directly set up backup file by dma operation.
the present invention has following advantage
The present invention is by detecting in real time each file write operation of file system, the file destination of file write operation and business critical data listed files are compared, if coupling, first execute file write operation, then after file write operation, the file destination for file write operation is set up backup file, can for business critical data according to file write operation set up real-time copy, have advantages of that reliability is high, low in resources consumption, practicality is good, simple to operation.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, to the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described below, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, do not paying under the prerequisite of creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the basic procedure schematic diagram of the embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing, the preferred embodiments of the present invention are described in detail, thereby so that advantages and features of the invention can be easier to be it will be appreciated by those skilled in the art that, protection scope of the present invention are made to more explicit defining.
As shown in Figure 1, the implementation step of the real time backup method of embodiment of the present invention business critical data is as follows:
1) set up business critical data listed files;
2) detect in real time each file write operation of file system;
3) file destination of file write operation and business critical data listed files are compared, if coupling, first execute file write operation is then that the file destination of file write operation is set up backup file after file write operation.
In the present embodiment, the cryptographic hash that business critical data listed files comprises each business critical data file; The detailed step in step 3), file destination and business critical data listed files being compared is as follows:
3.1) obtain the file destination of file write operation;
3.2) obtain the cryptographic hash of file destination;
3.3) cryptographic hash of each the business critical data file in the cryptographic hash of file destination and business critical data listed files is compared, if there is identical cryptographic hash in business critical data listed files, judge that comparative result is as coupling, otherwise judge that comparative result is as not mating.In the present embodiment, adopt the manner of comparison of cryptographic hash relatively directly to adopt the mode of file path comparison, because cryptographic hash is that fixed length and length are shorter, therefore the speed of comparison procedure is faster, and relative efficiency is better, can more save system resource.In the present embodiment, cryptographic hash specifically refers to the md5 file verification code of business critical data file, and the formation efficiency of md5 file verification code is high.
In the present embodiment, in step 3), the detailed operation steps of execute file write operation is as follows:
3.4) judge the file destination size of file write operation, if file destination size is less than preset value, redirect execution step 3.5), otherwise redirect execution step 3.6);
3.5) execute file write operation, and file destination is read and entered in internal memory;
3.6) execute file write operation.
In the present embodiment, in step 3), for the file destination of file write operation, to set up the detailed step of backup file as follows: detect in internal memory whether have file destination, if there is file destination in internal memory, the file destination in internal memory is write in disk and sets up backup file, if there is not file destination file destination in internal memory, directly set up backup file by dma operation.
The foregoing is only the preferred embodiment of the present invention, protection scope of the present invention is not limited in above-mentioned embodiment, and every technical scheme that belongs to the principle of the invention all belongs to protection scope of the present invention.For a person skilled in the art, some improvements and modifications of carrying out under the prerequisite that does not depart from principle of the present invention, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (5)

1. a real time backup method for business critical data, is characterized in that implementation step is as follows:
1) set up business critical data listed files;
2) detect in real time each file write operation of file system;
3) file destination of file write operation and business critical data listed files are compared, if coupling, first execute file write operation is then that the file destination of file write operation is set up backup file after file write operation.
2. the real time backup method of business critical data according to claim 1, is characterized in that, the cryptographic hash that described business critical data listed files comprises each business critical data file; The detailed step in described step 3), file destination and business critical data listed files being compared is as follows:
3.1) obtain the file destination of file write operation;
3.2) obtain the cryptographic hash of file destination;
3.3) cryptographic hash of each the business critical data file in the cryptographic hash of file destination and described business critical data listed files is compared, if there is identical cryptographic hash in business critical data listed files, judge that comparative result is as coupling, otherwise judge that comparative result is as not mating.
3. the real time backup method of business critical data according to claim 2, is characterized in that: described cryptographic hash specifically refers to the md5 file verification code of business critical data file.
4. the real time backup method of business critical data according to claim 1, is characterized in that, in described step 3), the detailed operation steps of execute file write operation is as follows:
3.4) judge the file destination size of file write operation, if file destination size is less than preset value, redirect execution step 3.5), otherwise redirect execution step 3.6);
3.5) execute file write operation, and file destination is read and entered in internal memory;
3.6) execute file write operation.
5. the real time backup method of business critical data according to claim 4, it is characterized in that, in described step 3), for the file destination of file write operation, to set up the detailed step of backup file as follows: detect in internal memory whether have file destination, if there is file destination in internal memory, the file destination in internal memory is write in disk and sets up backup file, if there is not file destination file destination in internal memory, directly set up backup file by dma operation.
CN201210432792.0A 2012-11-03 2012-11-03 Realtime backup method for business-critical data Pending CN103793294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210432792.0A CN103793294A (en) 2012-11-03 2012-11-03 Realtime backup method for business-critical data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210432792.0A CN103793294A (en) 2012-11-03 2012-11-03 Realtime backup method for business-critical data

Publications (1)

Publication Number Publication Date
CN103793294A true CN103793294A (en) 2014-05-14

Family

ID=50669002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210432792.0A Pending CN103793294A (en) 2012-11-03 2012-11-03 Realtime backup method for business-critical data

Country Status (1)

Country Link
CN (1) CN103793294A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320587A (en) * 2014-06-24 2016-02-10 鸿合科技有限公司 High temperature early warning method and device for processor of large intelligent electronic screen
CN105320576A (en) * 2014-05-30 2016-02-10 中国电信股份有限公司 Device and method for database backup

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105320576A (en) * 2014-05-30 2016-02-10 中国电信股份有限公司 Device and method for database backup
CN105320587A (en) * 2014-06-24 2016-02-10 鸿合科技有限公司 High temperature early warning method and device for processor of large intelligent electronic screen

Similar Documents

Publication Publication Date Title
US8990164B1 (en) Systems and methods for performing incremental backups
US8996828B2 (en) Systems and methods for migrating data
CN102629258B (en) Repeating data deleting method and device
CN102945278B (en) A kind of method and apparatus of data-base recording redo log
US8260752B1 (en) Systems and methods for change tracking with multiple backup jobs
US10191670B2 (en) Method and device of data protection, storage equipment
CN103164523A (en) Inspection method, device and system of data consistency inspection
EP2972878B1 (en) Mechanism for facilitating dynamic and efficient management of instruction atomicity violations in software programs at computing systems
CN104346194A (en) Method, device and electronic equipment for starting file loading
CN103593226A (en) Method for improving IO performance of disc of virtual machine
CN102207897A (en) Incremental backup method
CN105824846A (en) Data migration method and device
CN104965835B (en) A kind of file read/write method and device of distributed file system
CN103019891A (en) Method and system for restoring deleted file
CN104731593A (en) Information processing method and electronic equipment
CN107402848A (en) A kind of implementation method of snapshot data uniformity
CN103559224A (en) Method and device for hashing metadata objects
CN104376088A (en) Distributed synchronization method of cloud database and database system
CN103793294A (en) Realtime backup method for business-critical data
CN105095102A (en) Automatic expansion method and device for snapshot volume
CN103235746B (en) Server all-in-one automatic recovery method
CN102523112B (en) Information processing method and equipment
CN103793667A (en) Server shutdown method
US9710188B2 (en) Managing backup relationships in a data storage system
CN103488549B (en) Roll-back processing system and roll-back processing method for multi-mirror-image data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140514