CN105159995A - Method and device for carrying out effectiveness verification on database backup data - Google Patents

Method and device for carrying out effectiveness verification on database backup data Download PDF

Info

Publication number
CN105159995A
CN105159995A CN201510561066.2A CN201510561066A CN105159995A CN 105159995 A CN105159995 A CN 105159995A CN 201510561066 A CN201510561066 A CN 201510561066A CN 105159995 A CN105159995 A CN 105159995A
Authority
CN
China
Prior art keywords
application container
data
carried out
validation verification
database back
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510561066.2A
Other languages
Chinese (zh)
Inventor
张鑫
李建磊
吕倩华
李征
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Beijing Electronic Information Industry Co Ltd
Original Assignee
Inspur Beijing Electronic Information Industry Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Beijing Electronic Information Industry Co Ltd filed Critical Inspur Beijing Electronic Information Industry Co Ltd
Priority to CN201510561066.2A priority Critical patent/CN105159995A/en
Publication of CN105159995A publication Critical patent/CN105159995A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The invention discloses a method for carrying out effectiveness verification on database backup data, and is used for a single-node system. The method comprises the following steps: creating an application container which is independent of the system and has the same core with the system in the single-node system; configuring a database software installation environment for the application container; and installing corresponding software in the application container, and carrying out the effectiveness verification on database backup data in the independent environment. The method and the device for carrying out the effectiveness verification on the database backup data greatly improve node use efficiency and provide more use choices for different users and environments. Meanwhile, the amount of required nodes is reduced, the purchase cost of initial hardware is reduced, and the use ratio of system resources is improved.

Description

A kind of method and device database back-up data being carried out to validation verification
Technical field
The present invention relates to DB Backup technical field, particularly relate to a kind of method and the device that database back-up data are carried out to validation verification.
Background technology
Langchao Tiansuo's K1 system is China's 863 Program key special subjects " popularization of high-end fault-tolerant computer Developing Application " project achievement.The crucial applied host machine Langchao Tiansuo K1 system of China's First official listing on the 22nd, indicate that China becomes the 3rd, the whole world after America and Japan and grasps the country of host technology of new generation, and be expected to change the difficult situation of China at long-term dependence on import of core realm mainframe such as finance, telecommunications.But what adopt due to Langchao Tiansuo K1 is unique unix system and take hardware node as the structural design of smallest partition unit, therefore provide a kind of and the method that database back-up data in single node system carries out validation verification is necessary.
Summary of the invention
The object of this invention is to provide a kind of method and the device that database back-up data are carried out to validation verification, object is to carry out validation verification to Backup Data in single node system.
For solving the problems of the technologies described above, the invention provides a kind of method of database back-up data being carried out to validation verification, in single node system, comprising:
Create in single node system independent of system but there is the application container with described system same kernel;
For described application container configuration data library software installation environment;
In described application container, corresponding software is installed, in independently environment, validation verification is carried out to the data of DB Backup.
Alternatively, also comprise:
Described application container is closed after checking terminates.
Alternatively, creating independent of system but also comprising before there is the application container with described system same kernel:
Whether detection system is provided with container mounting software bag; If not, then container mounting software bag is installed.
Alternatively, creating independent of system but also comprising before there is the application container with described system same kernel:
Shutdown system fire wall.
Alternatively, describedly to comprise for described application container configuration data library software installation environment:
Utilize yum source configuration data library software installation environment.
Present invention also offers a kind of device database back-up data being carried out to validation verification, in single node system, comprising:
Creation module, for creating independent of system but having the application container with described system same kernel in single node system;
Configuration module, for being described application container configuration data library software installation environment;
Installation module, for installing corresponding software in described application container, carries out validation verification to the data of DB Backup in independently environment.
Alternatively, also comprise:
Closing module, for closing described application container after checking terminates.
Alternatively, described configuration module is used for comprising for described application container configuration data library software installation environment:
Described configuration module is specifically for utilizing yum source configuration data library software installation environment.
Method and device database back-up data being carried out to validation verification provided by the present invention, adopts application container technology, fictionalizes a kernel in single node system, creates out one independent of system but the environment had with system same kernel.For application container configuration data library software installation environment; And corresponding software is installed, overlap at this and independently recovery checking is carried out to database back-up data in environment.Method and device database back-up data being carried out to validation verification provided by the present invention, substantially increases the service efficiency of node, for different user, varying environment provide and more use selection.Present invention also reduces the quantity of required node simultaneously, decrease the purchase cost of initial stage hardware, improve the utilization factor of system resource.
Accompanying drawing explanation
Fig. 1 is process flow diagram database back-up data being carried out to a kind of embodiment of the method for validation verification provided by the present invention;
Fig. 2 is process flow diagram database back-up data being carried out to the another kind of embodiment of the method for validation verification provided by the present invention;
Fig. 3 is process flow diagram database back-up data being carried out to another embodiment of the method for validation verification provided by the present invention;
Fig. 4 is structured flowchart database back-up data being carried out to a kind of embodiment of the device of validation verification provided by the present invention.
Embodiment
In order to make those skilled in the art person understand the present invention program better, below in conjunction with the drawings and specific embodiments, the present invention is described in further detail.Obviously, described embodiment is only the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
As described in Figure 1, the method comprises process flow diagram database back-up data being carried out to a kind of embodiment of the method for validation verification provided by the present invention:
Step S101: create in single node system independent of system but there is the application container with described system same kernel;
Step S102: be described application container configuration data library software installation environment;
Step S103: install corresponding software in described application container, carries out validation verification to the data of DB Backup in independently environment.
Method of database back-up data being carried out to validation verification provided by the present invention, adopts application container technology, fictionalizes a kernel in single node system, creates out one independent of system but the environment had with system same kernel.For application container configuration data library software installation environment; And corresponding software is installed, overlap at this and independently recovery checking is carried out to database back-up data in environment.Method of database back-up data being carried out to validation verification provided by the present invention, substantially increases the service efficiency of node, for different user, varying environment provide and more use selection.Present invention also reduces the quantity of required node simultaneously, decrease the purchase cost of initial stage hardware, improve the utilization factor of system resource.
As described in Figure 2, compared with a upper embodiment, add step S104 in the present embodiment, the method comprises process flow diagram database back-up data being carried out to the another kind of embodiment of the method for validation verification provided by the present invention:
Step S201: create in single node system independent of system but there is the application container with described system same kernel;
Step S102: be described application container configuration data library software installation environment;
Step S103: install corresponding software in described application container, carries out validation verification to the data of DB Backup in independently environment;
Step S104: close described application container after checking terminates.
What the present embodiment provided can close application container to the method that database back-up data carries out validation verification after checking terminates.Like this, to the resource of system, application container, except hard disk resources, takies that to be close to be 0, can not affect the stable operation of production system.
As described in Figure 3, the method comprises process flow diagram database back-up data being carried out to another embodiment of the method for validation verification provided by the present invention:
Step S201: whether detection system is provided with container mounting software bag; If not, then container software bag is installed;
Step S202: shutdown system selinux and fire wall;
Step S203: create application container;
Step S204: utilize operating system to configure yum source;
Step S205: start application container;
Step S206: utilize yum source configuration data library software installation environment;
Step S207: installation data library software;
Step S208: validation verification is carried out to the data of DB Backup.
In the process of checking Backup Data validity, need the backup file of native system or other system database to import in application container, to verify that whether Backup Data is effective.
The present invention mainly with tide Domestic made Small machine TSK1 for carrier, use application container technology, a virtual kernel in single node K-UNIX system, and the installation environment of Install and configure related application, corresponding software is installed in application container, creating out one independent of system has the environment had with system same kernel, overlaps independently to carry out to the file of database database software backup recoverys in environment and verify at this.
As shown in Figure 4, this device comprises structured flowchart database back-up data being carried out to a kind of embodiment of the device of validation verification provided by the present invention:
Creation module 100, for creating independent of system but having the application container with described system same kernel in single node system;
Configuration module 200, for being described application container configuration data library software installation environment;
Installation module 300, for installing corresponding software in described application container, carries out validation verification to the data of DB Backup in independently environment.
Device database back-up data being carried out to validation verification provided by the present invention, adopts application container technology, fictionalizes a kernel in single node system, creates out one independent of system but the environment had with system same kernel.For application container configuration data library software installation environment; And corresponding software is installed, overlap at this and independently recovery checking is carried out to database back-up data in environment.Device database back-up data being carried out to validation verification provided by the present invention, substantially increases the service efficiency of node, for different user, varying environment provide and more use selection.Present invention also reduces the quantity of required node simultaneously, decrease the purchase cost of initial stage hardware, improve the utilization factor of system resource.
Provided by the present invention to carry out the device of validation verification to database back-up data corresponding with said method, do not repeat them here.
The present invention mainly with tide TSK1 minicomputer for carrier, for use single node or the user without idle node, carry out different machine Backup Data and recover checking.In this specific embodiment, it can realize especially by installing the minicomputer node of K-UNIX system and K-UNIX system image or CD.
Wherein, the minicomputer node installing K-UNIX system can be specially the basic environment recovering verification msg validity, and application container needs to create in this context;
K-UNIX system image or CD can be specially original system and install application container support package, and configuration yum source is that application container installs the use of application support environment.
Visible, method and device database back-up data being carried out to validation verification provided by the present invention, adopts application container technology, substantially increases the service efficiency of node, for different user, varying environment provide and more use selection.Also reduce the quantity of required Langchao Tiansuo K1 node simultaneously, decrease initial stage hardware purchase cost.In addition, in the present invention, application container can be provided with multiple, can carry out dynamic resource distribution, improve the utilization factor of system resource.
In this instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is the difference with other embodiment, between each embodiment same or similar part mutually see.
To the above-mentioned explanation of the disclosed embodiments, professional and technical personnel in the field are realized or uses the present invention.To be apparent for those skilled in the art to the multiple amendment of these embodiments, General Principle as defined herein can without departing from the spirit or scope of the present invention, realize in other embodiments.Therefore, the present invention can not be restricted to these embodiments shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty.

Claims (8)

1. database back-up data is carried out to a method for validation verification, in single node system, it is characterized in that, comprising:
Create in single node system independent of system but there is the application container with described system same kernel;
For described application container configuration data library software installation environment;
In described application container, corresponding software is installed, in independently environment, validation verification is carried out to the data of DB Backup.
2. method of database back-up data being carried out to validation verification as claimed in claim 1, is characterized in that, also comprise:
Described application container is closed after checking terminates.
3. method of database back-up data being carried out to validation verification as claimed in claim 2, is characterized in that, is creating independent of system but is also comprising before having the application container with described system same kernel:
Whether detection system is provided with container mounting software bag; If not, then container mounting software bag is installed.
4. method of database back-up data being carried out to validation verification as claimed in claim 2, is characterized in that, is creating independent of system but is also comprising before having the application container with described system same kernel:
Shutdown system fire wall.
5. as claimed in claim 1 method of database back-up data being carried out to validation verification, is characterized in that, describedly comprises for described application container configuration data library software installation environment:
Utilize yum source configuration data library software installation environment.
6. database back-up data is carried out to a device for validation verification, in single node system, it is characterized in that, comprising:
Creation module, for creating independent of system but having the application container with described system same kernel in single node system;
Configuration module, for being described application container configuration data library software installation environment;
Installation module, for installing corresponding software in described application container, carries out validation verification to the data of DB Backup in independently environment.
7. device database back-up data being carried out to validation verification as claimed in claim 6, is characterized in that, also comprise:
Closing module, for closing described application container after checking terminates.
8. method of database back-up data being carried out to validation verification as claimed in claim 6, is characterized in that, described configuration module is used for comprising for described application container configuration data library software installation environment:
Described configuration module is specifically for utilizing yum source configuration data library software installation environment.
CN201510561066.2A 2015-09-06 2015-09-06 Method and device for carrying out effectiveness verification on database backup data Pending CN105159995A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510561066.2A CN105159995A (en) 2015-09-06 2015-09-06 Method and device for carrying out effectiveness verification on database backup data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510561066.2A CN105159995A (en) 2015-09-06 2015-09-06 Method and device for carrying out effectiveness verification on database backup data

Publications (1)

Publication Number Publication Date
CN105159995A true CN105159995A (en) 2015-12-16

Family

ID=54800851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510561066.2A Pending CN105159995A (en) 2015-09-06 2015-09-06 Method and device for carrying out effectiveness verification on database backup data

Country Status (1)

Country Link
CN (1) CN105159995A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713030A (en) * 2016-12-21 2017-05-24 无锡江南计算技术研究所 Software source management method based on safety management and control and software function management system
CN109726051A (en) * 2018-12-29 2019-05-07 上海上讯信息技术股份有限公司 A kind of database back-up data validity automatic verification method
CN110659161A (en) * 2019-09-11 2020-01-07 上海爱数信息技术股份有限公司 Backup data validity verification method and system based on Docker
CN110727547A (en) * 2019-09-11 2020-01-24 上海爱数信息技术股份有限公司 System and method for protecting Docker application container

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156676A (en) * 2014-08-04 2014-11-19 浪潮(北京)电子信息产业有限公司 Method and device for protecting disc data
CN104834569A (en) * 2015-05-11 2015-08-12 北京京东尚科信息技术有限公司 Cluster resource scheduling method and cluster resource scheduling system based on application types
CN104850449A (en) * 2015-05-05 2015-08-19 华为技术有限公司 Method and apparatus for implementing system architecture

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104156676A (en) * 2014-08-04 2014-11-19 浪潮(北京)电子信息产业有限公司 Method and device for protecting disc data
CN104850449A (en) * 2015-05-05 2015-08-19 华为技术有限公司 Method and apparatus for implementing system architecture
CN104834569A (en) * 2015-05-11 2015-08-12 北京京东尚科信息技术有限公司 Cluster resource scheduling method and cluster resource scheduling system based on application types

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ACHILLEX12345: ""linux的Docker上如何安装MySQL"", 《HTTP://WWW.LINUXIDC.COM/LINUX/2015-07/120543.HTM》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106713030A (en) * 2016-12-21 2017-05-24 无锡江南计算技术研究所 Software source management method based on safety management and control and software function management system
CN109726051A (en) * 2018-12-29 2019-05-07 上海上讯信息技术股份有限公司 A kind of database back-up data validity automatic verification method
CN110659161A (en) * 2019-09-11 2020-01-07 上海爱数信息技术股份有限公司 Backup data validity verification method and system based on Docker
CN110727547A (en) * 2019-09-11 2020-01-24 上海爱数信息技术股份有限公司 System and method for protecting Docker application container
CN110659161B (en) * 2019-09-11 2023-10-13 上海爱数信息技术股份有限公司 Backup data validity verification method and system based on Docker

Similar Documents

Publication Publication Date Title
CN102999369B (en) The method and device of virtual machine upgrading
CN101840346B (en) Method and system for deploying cloud host computer
RU2646329C2 (en) Generation and caching of software code
CN105159995A (en) Method and device for carrying out effectiveness verification on database backup data
CN103036678B (en) A kind of method and system of Symbian signature application authorization
CN106610839B (en) Method for issuing upgrade package, lightweight upgrade method, device and system
CN103605570A (en) Automatic application deployment method and system based on virtual machine template
CN107273126B (en) Application development method and device
CN106325953A (en) Weblogic cluster one-key automatic deployment method
CN103377079B (en) Terminal and application running gear and method, the method running application program
CN103150441B (en) A kind of verification platform of software and hardware cooperating simulation and construction method thereof
CN103345406A (en) System and method for achieving cloud virtual mobile terminal of intelligent mobile terminal
CN103019764B (en) The detection method of Andriod resource bag installability and system
CN104301338A (en) Cloud platform based automatic deploying method for application system
CN103744708A (en) Method of fixing disk device names in Linux operating system
CN103412822A (en) Operation method of non-volatile RAM, data operation method and relevant device
CN109976803B (en) File generation method and device
CN104301442A (en) Method for achieving client of access object storage cluster based on fuse
WO2018032653A1 (en) Function implementing method and apparatus for java card application
US20060101410A1 (en) Abstracted managed code execution
CN102156650B (en) Method and device capable of implementing automatic analysis of patch
US8424107B2 (en) Selectively exposing base class libraries based on application execution context
CN110209983A (en) A kind of dispositions method and device of webpage web project
CN106254162A (en) Network Linux system in cluster calculates node operating system restoration methods
US7743377B2 (en) Cooperative threading in a managed code execution environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20151216