CN108647248A - WORM state monitors transfer method and device - Google Patents

WORM state monitors transfer method and device Download PDF

Info

Publication number
CN108647248A
CN108647248A CN201810340072.9A CN201810340072A CN108647248A CN 108647248 A CN108647248 A CN 108647248A CN 201810340072 A CN201810340072 A CN 201810340072A CN 108647248 A CN108647248 A CN 108647248A
Authority
CN
China
Prior art keywords
worm
meta data
file
data server
metadata
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810340072.9A
Other languages
Chinese (zh)
Other versions
CN108647248B (en
Inventor
魏东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Technologies Co Ltd Chengdu Branch
Original Assignee
New H3C Technologies Co Ltd Chengdu Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Technologies Co Ltd Chengdu Branch filed Critical New H3C Technologies Co Ltd Chengdu Branch
Priority to CN201810340072.9A priority Critical patent/CN108647248B/en
Publication of CN108647248A publication Critical patent/CN108647248A/en
Application granted granted Critical
Publication of CN108647248B publication Critical patent/CN108647248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2035Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant without idle spare hardware
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/202Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where processing functionality is redundant
    • G06F11/2023Failover techniques
    • G06F11/203Failover techniques using migration

Abstract

A kind of WORM state monitoring transfer method of the application offer and device, by in the distributed system architecture of multi-activity meta data server, when the first MDS devices detect its manage first file needs switch to managed by other meta data servers when, the second meta data server is chosen for first file, and notify the metadata of second the first file of meta data server take over, it is monitored with the WORM state to the first file.In this way, realizing under multi-activity meta data server scene, when managing the meta data server switching of file, the monitoring of WORM state can also be shifted therewith so that WORM functions can be realized on multi-activity meta data server framework.

Description

WORM state monitors transfer method and device
Technical field
This application involves technical field of distributed memory, in particular to a kind of WORM state monitor transfer method and Device.
Background technology
In document storage system, the metadata (Metadata) of file has recorded the attribute of file, as file stores position It sets, size, storage time etc., file search, file record, storage location record, access mandate can be carried out by metadata Equal work.In a distributed system, often pass through meta data server (English:Metadata Server, referred to as:MDS) to file Metadata be managed, and externally provide file system service.
Currently, there are two types of the frameworks reused by MDS.One kind is a main prepare more framework, which is by 1 MDS as main MDS It is responsible for the management of file system, other metadata are only enabled in main metadata services exception as spare;Another kind is Multi-activity MDS patterns, the pattern are that multiple MDS are worked at the same time, and different MDS manage the metadata of different files.
In the storage system in the fields such as such as financial instrument, politics and law, telecommunications, medical information, to the safety of data file Property have higher requirements, the prior art often repeatedly read by write-once (English:Write Once Read Many, referred to as: WORM) function protects data.WORM functions are protected to file according to the WORM information carried in the metadata Shield, prevents file to be read or change.But the WORM functions of the prior art are only supported on the MDS frameworks of a main prepare more in fact It is existing, it does not support still to realize on multi-activity MDS frameworks.
Invention content
In view of this, this application provides a kind of WORM state monitoring transfer method and device, solve multiple activity MDS The problem of can not achieve WORM functions on framework.
In a first aspect, the application provides a kind of WORM state monitoring transfer method, it is applied in distributed memory system First MDS, the first MDS are configured with WORM listed files, and the WORM listed files needs to carry out WORM shapes for recording The metadata of the file of state monitoring;The method includes:
When the first file that needs will be carried out WORM state monitoring by the first MDS is switched to by removing the first MDS Except other MDS when being monitored, be that first file determines at least one monitoring described first in other described MDS 2nd MDS of file WORM state;
The first WORM is sent to the 2nd MDS and adds message, and the 2nd MDS is made to add message according to the WORM, The metadata of first file is obtained, and the WORM information carried according to the metadata of first file is to first text Part carries out WORM state monitoring;
The record of the metadata of first file is deleted from the WORM listed files of the first MDS.
Second aspect, the application provide a kind of WORM state monitoring transfer device, are applied in distributed memory system First MDS, the first MDS are configured with WORM listed files, and the WORM listed files needs to carry out WORM shapes for recording The metadata of the file of state monitoring;Described device includes:
Selecting module, for when need by by the first MDS carry out WORM state monitoring the first file switch to by It is that first file determines at least one in other described MDS when other MDS in addition to the first MDS are monitored 2nd MDS of a monitoring the first file WORM state;
Notification module adds message for sending the first WORM to the 2nd MDS, makes the 2nd MDS according to WORM adds message, obtains the metadata of first file, and believe according to the WORM that the metadata of first file carries Breath carries out WORM state monitoring to first file;
Removing module, the metadata for deleting from the WORM listed files of the first MDS first file Record.
The third aspect, the disclosure provide a kind of MDS, including processor and and machine readable storage medium, the machine can It reads storage medium and is stored with the machine-executable instruction that can be executed by the processor, it is executable that processor executes the machine Instruction is to realize that the WORM state that the disclosure provides monitors transfer method.
In terms of existing technologies, the application has the advantages that:
WORM state monitoring transfer method and device provided by the present application, in the distributed system architecture of multi-activity MDS, When the first MDS detect its manage first file need switch in addition to the first MDS when being managed by other MDS, be First file chooses the 2nd MDS, and notifies the metadata of the 2nd the first file of MDS take overs, with the WORM to the first file State is monitored.In this way, realize under multi-activity MDS scenes, when managing the MDS switchings of file, the monitoring of WORM state It can also shift therewith so that WORM functions can be realized on multi-activity MDS frameworks.
Description of the drawings
It, below will be to needed in the embodiment attached in order to illustrate more clearly of the technical solution of the embodiment of the present application Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the schematic diagram of a main prepare more MDS frameworks;
Fig. 2 is the schematic diagram of multi-activity MDS frameworks;
Fig. 3 is one of the flow diagram that WORM state provided by the embodiments of the present application monitors transfer method;
Fig. 4 is the two of the flow diagram that WORM state provided by the embodiments of the present application monitors transfer method;
Fig. 5 is the flow diagram that metadata provided by the embodiments of the present application adds the stage;
Fig. 6 is the flow diagram of WORM listed files traversal stages provided by the embodiments of the present application;
Fig. 7 is the flow diagram that metadata provided by the embodiments of the present application deletes the stage;
Fig. 8 is the hardware architecture diagram of MDS provided by the embodiments of the present application;
Fig. 9 is one of the schematic diagram that WORM state provided by the embodiments of the present application monitors transfer device;
Figure 10 is the two of the schematic diagram that WORM state provided by the embodiments of the present application monitors transfer device.
Icon:100- memory nodes;110-OSD;200-MDS;210-WORM condition monitoring transfer devices;211- selects mould Block;212- notification modules;213- removing modules;214- receiving modules;215- add modules;216- monitoring modules;220- machines Readable storage medium storing program for executing;230- processors;240- system bus.
Specific implementation mode
To keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, technical solutions in the embodiments of the present application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is implemented The component of example can be arranged and be designed with a variety of different configurations.
Therefore, below the detailed description of the embodiments herein to providing in the accompanying drawings be not intended to limit it is claimed Scope of the present application, but be merely representative of the selected embodiment of the application.Based on the embodiment in the application, this field is common The every other embodiment that technical staff is obtained without creative efforts belongs to the model of the application protection It encloses.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
In the description of the present application, it should be noted that term " first ", " second ", " third " etc. are only used for distinguishing and retouch It states, is not understood to indicate or imply relative importance.
In the description of the present application, it is also necessary to which explanation is unless specifically defined or limited otherwise, term " setting ", " installation ", " connected ", " connection " shall be understood in a broad sense, for example, it may be fixedly connected, may be a detachable connection or one Connect to body;It can be mechanical connection, can also be electrical connection;It can be directly connected, it can also be indirect by intermediary It is connected, can is the connection inside two elements.For the ordinary skill in the art, on being understood with concrete condition State the concrete meaning of term in this application.
At some using in the distributed system of object storage, each memory node may include multiple object storage devices (English:Object-based Storage Device, referred to as:OSD), after file is divided into multiple data fragmentations, it is stored in In the OSD of different data node.
Under the MDS frameworks of a main prepare more, Fig. 1 is please referred to, the metadata of All Files is mainly managed by 1 MDS200, The work such as file search, file record, storage location record, access mandate are carried out, and file system is externally provided.For example, literary Part A, file B, file C are each divided into multiple fragments and are stored in the OSD110 of different memory nodes 100, and uniformly by MDS-A Manage the metadata of these files.
In framework shown in Fig. 1, MDS-A can safeguard one WORM listed files of configuration, be recorded in the WORM listed files Need to carry out the file (hereinafter referred to as WORM files) of WORM state monitoring.MDS-A can periodically traverse the WORM listed files, Obtain the metadata of WORM files.According in the WORM information (e.g., protection period duration etc.) and metadata carried in metadata Other parameters (such as file creation time), MDS-A judge that the WORM state of WORM files, WORM state include unprotected shape State, guard mode, additional state or expired state.
Then, MDS-A judges whether WORM files can be modified or deleted further according to WORM state.Wherein, it is in not The WORM files of guard mode can be deleted and change, and the WORM files of guard mode cannot be deleted and change, additional shape The WORM files of state, which can only add, to be write and cannot be deleted, and sentencing the WORM files of expired state can be deleted, but cannot It is changed.
Under multi-activity MDS patterns, Fig. 2 is please referred to, is carried out there are multiple MDS200 while to file in distributed system Management, each MDS200 are responsible for the metadata management of a part of file.Wherein, the MDS for managing the metadata of some file is claimed For the authoritative MDS (Authoritative MDS, abbreviation Auth-MDS) of this file.For example, in scene shown in Fig. 2, file The metadata D of D is managed by MDS-D, then MDS-D is the authoritative MDS of file D, and the metadata E of file E is managed by MDS-E, then MDS-E is the authoritative MDS of file E.
Through inventor the study found that in the MDS frameworks of a main prepare more shown in Fig. 1, due to only having 1 MDS200 to provide clothes Business, there is no the MDS200 switchings of management metadata, that is, when using WORM functions, also only 1 MDS200 is according to its WORM Listed files carries out the monitoring of WORM state.So can relatively easily realize WORM work(in the MDS frameworks of a main prepare more Energy.
And in multi-activity MDS frameworks shown in Fig. 2, the metadata of file is managed simultaneously there are multiple MDS200, According to the operating status of each MDS200 or some specific scene requirements, the authoritative MDS that may manage some metadata can be more Switch in a MDS200.And after authoritative MDS switches, since the WORM listed files of MDS200 does not change, newly Authoritative MDS cannot start the WORM state of the file to being newly included in management in time and be monitored, lead to the text for being newly included in management Part WORM state no longer changes, and influences the safety of WORM files.
Therefore in the present embodiment, propose that a kind of shown WORM states in multi-activity MDS frameworks of Fig. 2 that are applied to monitor transfer Method, the WORM functions of alloing are realized in multi-activity MDS frameworks, are explained in detail scheme provided in this embodiment below It states.
In the present embodiment, in some cases, the authoritative MDS of metadata may change, for example, some MDS is negative It carries overweight, needs to be managed a part of metadata and turn to be managed by other MDS, i.e., switch the authoritative MDS of a part of metadata For other MDS.In this case, to ensure that the WORM state monitoring of WORM files can also continue to be smoothed out, the present embodiment One kind is provided, WORM state monitors transfer method, each step of this method is described in detail below.
Step S310, when the first file that needs will be carried out WORM state monitoring by the first MDS is switched to by removing the first MDS Except other MDS when being monitored, determine the first file WORM state of at least one monitoring in other MDS for the first file The 2nd MDS.
In the present embodiment, the first MDS and the 2nd MDS and it is not specific to some MDS, the first file is also not specific to some text Part, when some MDS needs the file managed to be given to other MDS management, which is used as the first MDS, the MDS to need The file for being given to other MDS management is used as the first file, other MDS for taking over the MDS roll-off files are used as the 2nd MDS. First file is either one or more.
For example, referring once again to Fig. 2, authoritative MDSs of the MDS-B as file B is needing to switch to file B by other When MDS is managed, then MDS-B is as the first MDS, and file B is as the first file.If MDS-B is new for MDS-C is determined as file B Authoritative MDS, then MDS-C is as the 2nd MDS.
In the present embodiment, the first file shape can be a variety of to the condition of other MDS management by the first MDS of triggering.
For example, in one embodiment, when the metadata that the first MDS is currently managed reaches certain threshold value, can recognize For the heavier loads of the first MDS, the first file of the part managed is needed to turn to be managed by other MDS.First MDS at this time The operation load variation parameter of each MDS in other MDS can be obtained respectively, and operation load variation parameter is for characterizing MDS's Run load condition.Then compare the operation load variation parameter of the first MDS and each MDS.According to comparison result, from other The 2nd MDS is determined in MDS.
In another embodiment, it may be needed manually by the first MDS according to the needs of some concrete scenes, administrator It manages some first file and reassigns new authoritative MDS and first file is managed.At this point, the first MDS can be received Selection operation instruction input by user, selection operation instruction include the mark for the MDS that user selects, according to the mark of MDS, really Fixed 2nd MDS.
Step S320 sends the first WORM to the 2nd MDS and adds message, so that the 2nd MDS is added message according to WORM, obtain The metadata of first file, and WORM state prison is carried out according to the first file of WORM information pair that the metadata of the first file carries Control.
Wherein, the first WORM adds message and carries the metadata of the first file, and the metadata of the first file is for making the Two MDS add the metadata that the first file is obtained in message by the first WORM that receives, and by the metadata of the first file It records to the WORM files of the 2nd MDS and arranges.
Step S330 deletes the record of the metadata of the first file from the WORM listed files of the first MDS.
In this way, realizing under multi-activity MDS scenes, when managing the MDS switchings of file, the monitoring of WORM state can also It shifts therewith so that WORM functions can be realized on multi-activity MDS frameworks.
Optionally, in an embodiment of the present embodiment, the first MDS in step s 320, by the member of the first file Data as the first WORM addition message be sent to the 2nd MDS, make the 2nd MDS by the metadata record of the first file to this second The WORM listed files of MDS.Simultaneously in step S330, the first MDS is by the first file recorded in its WORM listed files Metadata is deleted.
In this way, the first MDS is directly sent to the 2nd MDS using the first file as the first WORM additions message, make the 2nd MDS After the metadata for receiving the first file, the monitoring to the first file WORM state can be immediately begun to.
Optionally, in the another embodiment of the present embodiment, in step S310, the first MDS is in other MDS After first file determines the step of two MDS of the first file WORM state of at least one monitoring, by first file Metadata is sent to second meta data server, and to have been sent out in the WORM listed files of first meta data server Give the default mark of metadata addition of first file of second meta data server.
Then, in step s 320, the first MDS is periodically locking WORM listed files and is traversing WORM listed files The metadata of middle record corresponds to second if detecting the metadata of the first file with default mark to first file MDS sends the first WORM and adds message, and the first WORM additions message includes the mark of the metadata of the first file, and the first WORM adds Add message for making the 2nd MDS when receiving the first WORM and adding message, according to the mark of the metadata of first file, By the metadata record of the first file to the WORM listed files of the 2nd MDS.
That is, the first file is not handled WORM listed files itself when sending metadata, only to WORM The metadata of the first file sent in listed files is marked, then in periodically traversal WORM lists at unification Manage the metadata of the first file of tape label.So, it is therefore prevented that WORM listed files can alleviate by frequent locking and de-locking One MDS's bears with operation.
Then, in step S330, the first MDS is receiving the 2nd MDS adding according to the first WORM addition message feedbacks When adding success notification, the record of the metadata of the first file is deleted from the WORM listed files of the first MDS.
In this way, the first MDS is in the WORM files for determining the 2nd MDS by the metadata of the first file and being added to the 2nd MDS The monitoring to the first file WORM state is released after list again so that the reliability higher of WORM state monitoring.
Optionally, in the present embodiment, the first MDS can also take over the metadata of other MDS management, please refer to Fig. 4, WORM processing methods can also include step S410 and step S430.
Step S410, the first MDS receive the 2nd WORM that the 3rd MDS is sent and add message, the 2nd WORM add message by 3rd MDS is sent out needing the second file for carrying out WORM state monitoring by the 3rd MDS switching to the when of being monitored by the first MDS It send.
Similarly, in the present embodiment, the 3rd MDS and it being not specific to some MDS, the second file is also not specific to some file, When some MDS needs the file managed to be given to the first MDS management, which is used as the 3rd MDS, MDS needs to be given to The file of first MDS management is used as the second file.Second file is either one or more.
Step S420 adds message according to the 2nd WORM, obtains the metadata of the second file and records to the first MDS's WORM listed files.
In the present embodiment, the first MDS can receive the 3rd MDS transmission the second file metadata after, by second text The metadata record of part to the first MDS WORM listed files.
Step S430 supervises the WORM state of the metadata in the first MDS range of managements according to WORM listed files Control.
After the metadata of the second file is added to WORM listed files, in the mistake of periodically traversal WORM listed files The monitoring of WORM state can also be carried out in journey to the WORM files for being newly included in the first MDS management.
In the present embodiment, when switching without authoritative MDS, each MDS can safeguard respective WORM listed files, The metadata of the file in need for carrying out WORM state monitoring is recorded in WORM listed files.MDS can timing traversal WORM files List judges the WORM state of respective file according to the metadata recorded in WORM listed files, and according to WORM state to text Part is protected.
Optionally, in order to reduce the data volume recorded in WORM listed files, raising traverses efficiency, in the present embodiment, The metadata record for the file that only WORM state can may be changed is to WORM listed files.
For example, when each MDS can have the new file for needing to carry out WORM state monitoring to be added in detecting caching, MDS judges whether this document is the WORM files for needing to carry out WORM state monitoring, if so, obtaining the new WORM that caching is added The metadata of file, and by this it is new be added caching WORM files metadata record to the MDS WORM listed files.Its In, it includes creating new file or file in disk being loaded into caching to have the case where new file is added in caching.WORM texts The information recorded in part list is the address pointer of metadata in the buffer.
In order to make those skilled in the art more fully understand technical solution provided by the embodiments of the present application, with reference to one kind Concrete application scene illustrates technical solution provided by the embodiments of the present application.
In the present embodiment, the first MDS carry out WORM state monitoring the step of may include metadata addition the stage and WORM listed files traversal stages.
Fig. 5 is please referred to, may include step S511 to step S513 in the metadata addition stage.
Step S511, the first MDS detected new document creation, existing file is loaded from disk to caching or receive the When the 2nd WORM addition message that three MDS are sent, S512 is entered step.
Step S512 is created and is filled new metadata structure body.
In the present embodiment, when the first MDS detects new document creation, the metadata of this document can be obtained.When One MDS is detected loaded from disk before persistence file to caching when, while before can obtaining persistence this document Metadata.First MDS can also directly receive the metadata that the 3rd MDS sends the second file.
First MDS creates new metadata structure body in the buffer, and fills the metadata structure according to metadata is obtained Body.Subsequently into step S513.
Step S513, judges whether the metadata needs that WORM listed files is added.
If the corresponding file of the metadata needs to carry out WORM state monitoring, need metadata WORM files are added List enters step S514.
Step S514, locking protection WORM listed files.
In the present embodiment, to prevent other processes from modifying simultaneously to WORM listed files, elder generation is needed in the first MDS WORM listed files chains are protected.
Step S515 records the address pointer of the metadata to WORM listed files.
Step S516 unlocks WORM listed files.
Based on above-mentioned design, the first MDS metadata in itself compass of competency be managed under normal conditions and connect Manage the metadata for the file for needing to carry out WORM state monitoring being added in special circumstances for the metadata of other MDS WORM listed files.
Fig. 6 is please referred to, the metadata of the first file is first sent to by the 2nd MDS with the first MDS, then in traversal WORM texts May include step in WORM listed files traversal stages for the premise for sending the first WORM addition message when part list S611 to step S620.
Step S611, locking protection WORM listed files.
Whether step S612, detection WORM listed files are empty.
If not empty, then S613 is entered step.
If it is empty, then S621 is entered step, this traversal is terminated.
Step S613 detects whether to have traversed WORM listed files.
If having traversed WORM listed files, S621 is entered step, terminates this traversal.
If not traversed WORM listed files, S614 is entered step.
Step S614, it is the metadata detected to extract one not yet from WORM listed files, whether judges the metadata With default mark.
If the metadata, with default mark, which is to need to turn the member by other MDS the first files managed Data enter step S615.
If the metadata enters step S617 without default mark.
Step S615 corresponds to the 2nd MDS to first file and sends the first WORM addition message, the 2nd MDS is made to receive When adding message to the first WORM, by the metadata record of the first file to the WORM listed files of the 2nd MDS.Subsequently into Step S615.
Step S616 enters when receiving addition success notifications of the 2nd MDS according to the first WORM addition message feedbacks Step S620.
Step S617 judges whether corresponding file WORM state becomes according to WORM information is carried in the metadata Change.
In the present embodiment, the variation of WORM state includes that unprotected state is switched to guard mode, additional state switching It is switched to expired state to guard mode or guard mode.
If WORM state does not change, step S613 is reentered.
If WORM state is changed, S618 is entered step.
Step S618, is arranged new WORM state, and according to new WORM state to the access rights of corresponding file into Row control.Subsequently into step S619.
Step S619 judges whether to need to remove the metadata from WORM listed files.
In the present embodiment, if the WORM state of file is expired state, the WORM state of this document will not again can be after It is continuous to change, therefore this document need not be continued to monitor, so in this step, if detecting, the WORM state of file is expired When, then the metadata of this document is removed from WORM listed files.
If need not remove the metadata from WORM listed files, step S613 is reentered.
If desired the metadata is removed from WORM listed files, then enters step S620.
The element is removed from WORM listed files, then reenters step S612 by step S620.
Step S621 unlocks WORM listed files, terminates traversal.
In addition, the first MDS can also include that metadata deletes the stage to the monitoring of WORM state, Fig. 7, metadata are please referred to The deletion stage may include step S711 to step S715.
Step S711 enters step S712 when the file in detecting that file is deleted or cached is removed.
In the present embodiment, when the file of the first MDS management is deleted, deleted file is not needing to carry out WORM Condition monitoring, then triggering enter step S712.When the file in the first MDS cachings because long-time is not used, deposited to disk by shifting When, the WORM state of file can not will temporarily change, then triggering enters step S712.
Step S712, checks whether the corresponding metadata of this document needs to delete from WORM listed files.
In the present embodiment, if needing to carry out the file of WORM state monitoring, WORM listed files before when this document It is middle to record the address pointer for having this document metadata, then enter step S713.
Step S713, locking protection WORM listed files.
Step S714 deletes the corresponding metadata of this document from WORM listed files.
Step S715 unlocks WORM listed files.
WORM state provided in this embodiment monitors transfer method, in the authoritative MDS switchings of metadata, extremely by MDS Modern information exchange, is that the monitoring of WORM state is also shifted therewith, so so that WORM functions are in multi-activity MDS frameworks It may be implemented.
Fig. 8 is please referred to, Fig. 8 is a kind of hardware architecture diagram for MDS200 that the embodiment of the present disclosure provides.It is described MDS200 includes WORM state monitoring transfer device 210, memory 220 and processor 230.
Fig. 8 is please referred to, Fig. 8 is a kind of hardware architecture diagram for MDS200 that disclosure example provides.The MDS200 can Including processor 230, it is stored with the machine readable storage medium 220 of machine-executable instruction.Processor 230 is deposited with machine readable Storage media 220 can be communicated via system bus 240.Also, by read and execute in machine readable storage medium 220 with WORM The corresponding machine-executable instruction of condition monitoring logic, processor 230 can perform above-described WORM state monitoring method.
Fig. 9 is please referred to, the present embodiment also provides a kind of WORM state monitoring transfer device applied to MDS200 shown in Fig. 2 210, it functionally divides, WORM state monitoring transfer device 210 may include selecting module 211, notification module 212 and delete Module 213.
Selecting module 211, the first file for that will carry out WORM state monitoring by the first MDS when needs are switched to by removing When other MDS except first MDS are monitored, the first file of at least one monitoring is determined for the first file in other MDS 2nd MDS of WORM state.
In the present embodiment, selecting module 211 can be used for executing step S310 shown in Fig. 3, the tool about selecting module 211 Body description can join the description to step S310.
Specifically, selecting module 211 is specifically used for, and obtains each metadata clothes in other described meta data servers respectively The operation load variation parameter of business device, the operation load variation parameter are used to characterize the operation load shape of meta data server State;Compare the operation load variation parameter of first meta data server and each meta data server;According to comparing As a result, determining second meta data server from other described meta data servers;
Alternatively,
Selection operation instruction input by user is received, the selection operation instruction includes the metadata that the user selects The mark of server;According to the mark of the meta data server, second meta data server is determined.
Notification module 212 adds message for sending the first WORM to the 2nd MDS, the 2nd MDS is made to be disappeared according to WORM additions Breath obtains the metadata of the first file, and is carried out according to the first file of WORM information pair that the metadata of the first file carries WORM state monitors.
In the present embodiment, notification module 212 can be used for executing step S220 shown in Fig. 3, the tool about notification module 212 Body description can join the description to step S220.
Removing module 213, the record of the metadata for deleting the first file from the WORM listed files of the first MDS.
In the present embodiment, removing module 213 can be used for executing step S330 shown in Fig. 3, the tool about removing module 213 Body description can join the description to step S330.
A basic step, Figure 10 is please referred to, WORM state monitoring transfer device 210 can also include receiving module 214, add Add module 215 and monitoring module 216.
Receiving module 214, for receives the 3rd MDS transmission the 2nd WORM addition message, the 2nd WORM addition message by 3rd MDS is sent out needing the second file for carrying out WORM state monitoring by the 3rd MDS switching to the when of being monitored by the first MDS It send.
In the present embodiment, receiving module 214 can be used for executing step S410 shown in Fig. 4, the tool about receiving module 214 Body description can join the description to step S410.
Add module 215, for adding message according to the 2nd WORM, obtaining the metadata of the second file and recording to first The WORM listed files of MDS.
In the present embodiment, add module 215 can be used for executing step S420 shown in Fig. 4, the tool about add module 215 Body description can join the description to step S420.
Monitoring module 216 is used for according to WORM listed files, to the WORM shapes of the metadata in the first MDS range of managements State is monitored.
In the present embodiment, monitoring module 216 can be used for executing step S430 shown in Fig. 4, the tool about monitoring module 216 Body description can join the description to step S430.
In conclusion WORM state monitoring transfer method provided by the present application and device, in multi-activity meta data server Distributed system architecture in, when the first MDS devices detect its manage first file needs switch to by other Metadata Services When device manages, the second meta data server is chosen for first file, and notifies second the first text of meta data server take over The metadata of part is monitored with the WORM state to the first file.In this way, realizing multi-activity meta data server scene Under, when managing the meta data server switching of file, the monitoring of WORM state can also be shifted therewith so that WORM functions can To be realized on multi-activity meta data server framework.
In embodiment provided herein, it should be understood that disclosed device and method, it can also be by other Mode realize.The apparatus embodiments described above are merely exemplary, for example, the flow chart and block diagram in attached drawing are shown According to the device, the architectural framework in the cards of method and computer program product, function of multiple embodiments of the application And operation.In this regard, each box in flowchart or block diagram can represent one of a module, section or code Point, a part for the module, section or code includes one or more for implementing the specified logical function executable Instruction.It should also be noted that at some as in the realization method replaced, the function of being marked in box can also be attached to be different from The sequence marked in figure occurs.For example, two continuous boxes can essentially be basically executed in parallel, they also may be used sometimes To execute in the opposite order, this is depended on the functions involved.It is also noted that each of block diagram and or flow chart The combination of box in box and block diagram and or flow chart, function or the dedicated of action are based on as defined in execution The system of hardware is realized, or can be realized using a combination of dedicated hardware and computer instructions.
In addition, each function module in each embodiment of the application can integrate to form an independent portion Point, can also be modules individualism, can also two or more modules be integrated to form an independent part.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a machine readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words to existing There is the part for the part or the technical solution that technology contributes that can be expressed in the form of software products, the computer Software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be personal meter Calculation machine, server or network equipment etc.) execute each embodiment the method for the application all or part of step.And it is preceding The storage medium stated includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), magnetic disc or CD.For example, Fig. 2 Shown in MDS200 may include processor and and machine readable storage medium, the machine readable storage medium is stored with can The machine-executable instruction executed by the processor, the processor execute the machine-executable instruction to realize the application The WORM state of offer monitors transfer method.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also include other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
The above, the only specific implementation mode of the application, but the protection domain of the application is not limited thereto, it is any Those familiar with the art can easily think of the change or the replacement in the technical scope that the application discloses, and should all contain It covers within the protection domain of the application.Therefore, the protection domain of the application should be subject to the protection scope in claims.

Claims (10)

1. a kind of WORM state monitors transfer method, which is characterized in that the first metadata being applied in distributed memory system Server, first meta data server be configured with WORM listed files, the WORM listed files for record need into The metadata of the file of row WORM state monitoring;The method includes:
When needing to switch to the first file for carrying out WORM state monitoring by first meta data server by removing described the It is described in other described meta data servers when other meta data servers except meta-data server are monitored First file determines the second meta data server of at least one monitoring the first file WORM state;
The first WORM is sent to second meta data server and adds message, makes second meta data server according to WORM adds message, obtains the metadata of first file, and believe according to the WORM that the metadata of first file carries Breath carries out WORM state monitoring to first file;
The record of the metadata of first file is deleted from the WORM listed files of first meta data server.
2. according to the method described in claim 1, it is characterized in that, the first WORM additions message carries first text The metadata of part;
The metadata of first file adds for making second meta data server pass through the first WORM received Add the metadata that first file is obtained in message, and by the metadata record of first file to second metadata The WORM listed files of server.
3. according to the method described in claim 1, it is characterized in that, described is described in other described meta data servers After one file determines the second meta data server of at least one monitoring the first file WORM state, the method is also wrapped It includes:
The metadata of first file is sent to second meta data server;
It is had been issued in WORM listed files for first meta data server described in second meta data server The default mark of metadata addition of first file;
It is described to send the step of the first WORM adds message to second meta data server, including:
It periodically locks the WORM listed files and traverses the metadata recorded in the WORM listed files;
When detecting the metadata of first file with the default mark, binary number is corresponded to first file The first WORM is sent according to server and adds message, and the first WORM additions message includes the mark of the metadata of first file To know, the first WORM addition message is used to make second meta data server when receiving the first WORM additions message, According to the mark of the metadata of first file, by the metadata record of first file to second meta data server WORM listed files.
4. according to the method described in claim 3, it is characterized in that, the WORM files from first meta data server The record of the metadata of first file is deleted in list, including:
Second meta data server is received according to the first WORM addition feedbacks of the first WORM addition message feedbacks to be disappeared Breath;
When the first WORM addition feedback messages are that the first WORM is added successfully, from the WORM of first meta data server The record of the metadata of first file is deleted in listed files.
5. according to the method described in claim 1, it is characterized in that, the method further includes:
The 2nd WORM addition message that the first meta data server reception third meta data server is sent, described second WORM adds message and by the third meta data server is needing that WORM state will be carried out by the third meta data server Second file of monitoring switches to the when of being monitored by first meta data server and sends;
Message is added according to the 2nd WORM, obtain the metadata of second file and is recorded to first metadata clothes The WORM listed files of business device;
According to the WORM listed files, to the WORM state of the metadata in the first meta data server range of management into Row monitoring.
6. according to the method described in claim 5, it is characterized in that, the method further includes:
When detect have in caching it is new need the file for carrying out condition monitoring to be added when, obtain the new WORM files that caching is added Metadata;
The WORM files of metadata record to first meta data server of the new WORM files that caching is added are arranged Table.
7. according to the method described in claim 1, it is characterized in that, described is described in other described meta data servers One file determines at least one the second meta data server for managing first file, including:
The operation load variation parameter of each meta data server in other described meta data servers, the operation are obtained respectively Load variation parameter is used to characterize the operation load condition of meta data server;
Compare the operation load variation parameter of first meta data server and each meta data server;
According to comparison result, second meta data server is determined from other described meta data servers;
Alternatively,
Selection operation instruction input by user is received, the selection operation instruction includes the Metadata Service that the user selects The mark of device;
According to the mark of the meta data server, second meta data server is determined.
8. a kind of WORM state monitors transfer device, which is characterized in that the first metadata being applied in distributed memory system Server, first meta data server be configured with WORM listed files, the WORM listed files for record need into The metadata of the file of row WORM state monitoring;Described device includes:
Selecting module, the first file for that will carry out WORM state monitoring by first meta data server when needs switch To when being monitored by other meta data servers in addition to first meta data server, taken in other described metadata It is the second meta data server that first file determines at least one monitoring the first file WORM state in business device;
Notification module adds message for sending the first WORM to second meta data server, makes second metadata Server adds message according to the WORM, obtains the metadata of first file, and according to first number of first file WORM state monitoring is carried out to first file according to the WORM information of carrying;
Removing module, first number for deleting first file from the WORM listed files of first meta data server According to record.
9. device according to claim 8, which is characterized in that described device further includes:
Receiving module, the 2nd WORM for receiving the transmission of third meta data server add message, the 2nd WORM additions Message by the third meta data server is being needed that the of WORM state monitoring will be carried out by the third meta data server Two files switch to the when of being monitored by first meta data server and send;
Add module, for adding message according to the 2nd WORM, obtaining the metadata of second file and recording to institute State the WORM listed files of the first meta data server;
Monitoring module is used for according to the WORM listed files, to first number in the first meta data server range of management According to WORM state be monitored.
10. device according to claim 8, which is characterized in that the selecting module is specifically used for,
The operation load variation parameter of each meta data server in other described meta data servers, the operation are obtained respectively Load variation parameter is used to characterize the operation load condition of meta data server;
Compare the operation load variation parameter of first meta data server and each meta data server;
According to comparison result, second meta data server is determined from other described meta data servers;
Alternatively,
Selection operation instruction input by user is received, the selection operation instruction includes the Metadata Service that the user selects The mark of device;
According to the mark of the meta data server, second meta data server is determined.
CN201810340072.9A 2018-04-16 2018-04-16 WORM state monitoring transfer method and device Active CN108647248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810340072.9A CN108647248B (en) 2018-04-16 2018-04-16 WORM state monitoring transfer method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810340072.9A CN108647248B (en) 2018-04-16 2018-04-16 WORM state monitoring transfer method and device

Publications (2)

Publication Number Publication Date
CN108647248A true CN108647248A (en) 2018-10-12
CN108647248B CN108647248B (en) 2021-03-09

Family

ID=63746545

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810340072.9A Active CN108647248B (en) 2018-04-16 2018-04-16 WORM state monitoring transfer method and device

Country Status (1)

Country Link
CN (1) CN108647248B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101059807A (en) * 2007-01-26 2007-10-24 华中科技大学 Method and system for promoting metadata service reliability
CN101697168A (en) * 2009-10-22 2010-04-21 中国科学技术大学 Method and system for dynamically managing metadata of distributed file system
US20110153769A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Apparatus and method for accessing a metadata
CN104461380A (en) * 2014-11-17 2015-03-25 华为技术有限公司 Data storage method and device
US20150261753A1 (en) * 2014-03-13 2015-09-17 Verance Corporation Metadata acquisition using embedded codes
CN105740048A (en) * 2016-01-26 2016-07-06 华为技术有限公司 Image management method, device and system
CN106502576A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Migration strategy method of adjustment, capacity change suggesting method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101059807A (en) * 2007-01-26 2007-10-24 华中科技大学 Method and system for promoting metadata service reliability
CN101697168A (en) * 2009-10-22 2010-04-21 中国科学技术大学 Method and system for dynamically managing metadata of distributed file system
US20110153769A1 (en) * 2009-12-18 2011-06-23 Electronics And Telecommunications Research Institute Apparatus and method for accessing a metadata
US20150261753A1 (en) * 2014-03-13 2015-09-17 Verance Corporation Metadata acquisition using embedded codes
CN104461380A (en) * 2014-11-17 2015-03-25 华为技术有限公司 Data storage method and device
CN106502576A (en) * 2015-09-06 2017-03-15 中兴通讯股份有限公司 Migration strategy method of adjustment, capacity change suggesting method and device
CN105740048A (en) * 2016-01-26 2016-07-06 华为技术有限公司 Image management method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
熊振华: "基于OPENSTACK云存储技术的研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Also Published As

Publication number Publication date
CN108647248B (en) 2021-03-09

Similar Documents

Publication Publication Date Title
CN103119550B (en) Store the digital content with time-varying characteristics
CN104537076A (en) File reading and writing method and device
JP4670968B2 (en) Information management program and information management system
CN102902762B (en) A kind of methods, devices and systems of deleting duplicated data
CN110888837B (en) Object storage small file merging method and device
US20140358868A1 (en) Life cycle management of metadata
CN106446159A (en) Method for storing files, first virtual machine and name node
JP2012221055A (en) Library system, management apparatus, library apparatus, management method and management program
CN106547805A (en) The method and apparatus of optimization database index
CN103503388B (en) A kind of distributed queue's message read method and equipment, system
CN105404537B (en) A kind of discharging method and device of application program
CN114138181A (en) Method, device, equipment and readable medium for placing, grouping and selecting owners in binding pool
CN108984102B (en) Method, system and computer program product for managing a storage system
CN108647248A (en) WORM state monitors transfer method and device
CN112000971A (en) File permission recording method, system and related device
CN111813346A (en) Method, system, device and medium for establishing Ceph distributed storage based on cloud platform
JP2010146308A (en) Information processor
CN109669623B (en) File management method, file management device, electronic equipment and storage medium
JP5970886B2 (en) Information processing apparatus and information processing program
CN114564458A (en) Method, device, equipment and storage medium for data synchronization between clusters
JP2007109160A (en) Cooperation method between document management system and access right management server
CN105095171A (en) File unlocking control method and apparatus
JP2013196561A (en) Update device, update method, and update program
CN111078430A (en) Message notification processing method, device and storage medium
CN106326425B (en) Data classification treating method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant