CN109101370A - The date storage method of principal and subordinate's bi-directional synchronization - Google Patents
The date storage method of principal and subordinate's bi-directional synchronization Download PDFInfo
- Publication number
- CN109101370A CN109101370A CN201811003460.4A CN201811003460A CN109101370A CN 109101370 A CN109101370 A CN 109101370A CN 201811003460 A CN201811003460 A CN 201811003460A CN 109101370 A CN109101370 A CN 109101370A
- Authority
- CN
- China
- Prior art keywords
- node
- virtual
- drbd
- host node
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1456—Hardware arrangements for backup
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/16—Error detection or correction of the data by redundancy in hardware
- G06F11/20—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
- G06F11/2053—Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
- G06F11/2094—Redundant storage or storage space
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a kind of date storage methods of principal and subordinate's bi-directional synchronization, are related to technical field of data processing, comprising: DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and creating DRBD virtual disk;Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage service node is host node or from node, and is main DRBD virtual disk and from DRBD virtual disk according to the role of node role definition DRBD virtual disk;Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, virtual ip address is kept to be always positioned at the host node of survival, will be automatically host node from node definition when host node is inaccessible.The invention is intended to provide a kind of date storage method that can reduce implementation cost and reduce to principal and subordinate's bi-directional synchronization of extraneous communication environment requirement.
Description
Technical field
The present invention relates to technical field of data processing, in particular to a kind of date storage method of principal and subordinate's bi-directional synchronization.
Background technique
With becoming increasingly popular for network service, it is often necessary to store some common data (such as business datum) simultaneously
On the server of multiple computer rooms.For example, in order to provide identical service to user in all parts of the country, respectively in Beijing, Guangzhou
Three computer rooms are provided with Tibet, required service can be accessed by any computer room node in user, under normal circumstances user
Access nearest computer room node.At this moment, Beijing, the data stored in the regional computer room in Guangzhou and three, Tibet are all the same.
In addition, sometimes for prevent because in a computer room server hang due to lead to service disruption the case where generation, also can simultaneously portion
Multiple computer rooms for being stored with identical data are affixed one's name to, it can be provided after a computer room is hung by other computer room for user
By service.
The generation of the case where to prevent the server in a computer room from hanging and leading to service disruption, at present mainly using active and standby
Administrative skill is managed, and active and standby management is a kind of technology for guaranteeing equipment dependability, it may ensure that main equipment operates normally
When, it backups processing from equipment to data.When main equipment breaks down, business can be switched in time from equipment by system, be protected
The continual progress of card business.
The existing data backup across computer room is normally based on hardware device realization, general that separate storage is used to realize
The Reliability comparotive of image copying based on block device, this mode is secure, but needs special image copying equipment, and
And be to replicate the data of entire physical hard disk, a large amount of data duplication needs to have network bandwidth higher requirement, therefore valence
Lattice are costly, and higher to dependences such as external environment such as network broadbands, therefore, need at present it is a kind of it is at low cost, to net
The date storage method of the lower principal and subordinate's bi-directional synchronization across computer room of network broadband degree of dependence.
Summary of the invention
The invention is intended to provide it is a kind of can reduce implementation cost and reduce it is two-way to the principal and subordinate of extraneous communication environment requirement
Synchronous date storage method.
In order to solve the above technical problems, base case provided by the invention is as follows:
The date storage method of principal and subordinate's bi-directional synchronization, comprising the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and it is virtual to create DRBD
Disk;
Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage clothes
Node of being engaged in is host node or from node, and according to the role of node role definition DRBD virtual disk be main DRBD virtual disk and from
DRBD virtual disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, protects
The host node that virtual ip address is always positioned at survival is held, will be automatically host node from node definition when host node is inaccessible;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will
It transmits with the presence or absence of the information of abnormal conditions to central processing unit;
Central processing unit processing step: when receiving the information there are abnormal conditions, judge currently stored server
Role executes S21 and S22 if currently stored server is host node;If currently stored server is from node,
Execute S22;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted.
In technical solution of the present invention, by the way that DRBD software is installed and configured to each storage server, exist to obtain DRBD
The service of system layer is mainly packaged the physical disk equipment of bottom, fictionalizes DRBD virtual disk and visits for file system
It asks, and stores the data backup to main DRBD virtual disk extremely from DRBD virtual disk, so the DRBD of a storage server
Data in virtual disk can be mirrored in network in the DRBD virtual disk of an other storage server, also be achieved that network
Between different node datas backup, changing traditional data can only be in the mode of local disk mirror back-up.Again to each storage
Service node installation and configuration Keepalived software, and selecting a storage service vertex ticks is host node, remaining is deposited
Storing up service node is to distribute virtual ip address from node for host node, manages virtual ip address by Keepalived software, protects
It holds virtual ip address and is always positioned at host node, will be automatically host node, host node from node definition when host node is inaccessible
With the switching from node identities, host node and the bi-directional synchronization storage from data between node are realized, thus application server
The data stored in storage server can be accessed by the virtual ip address.
It has the beneficial effect that
1, the scheme serviced by DRBD combination Keepalived, can be realized the standby of the different internodal datas across computer room
Part, ensured effective storage of data, compared with the existing technology in based on hardware device realize data backup for, this programme
It is the data that may have access in storage server by virtual ip address, is not required to add special image copying equipment, also be not required to
The data of entire physical hard disk are replicated, are reduced costs and the requirement to network broadband, and pass through Keepalived
The switching for realizing identity between main and subordinate node, allows virtual ip address be bundled on the host node of survival always, has ensured data master
It is stored from bi-directional synchronization, whole process is transparent for application system, so not needing to do application system any switching
Or transformation, reduce the complexity of application system realization;In the same time, only one node executes read-write operation, in addition
Node is in cold standby state, reduces the cost of equipment investment, saves communication cost, reduces the requirement to communication environment.
2, it is monitored by abnormal conditions to determine whether there is the behavior for stealing data, is realized to storage in the server
The protection of data first judges the role of currently stored server when having abnormal conditions or invader, if host node, then will
The identity of the host node is transferred to other from node, thus the only data encryption to storing in the storage server, new main section
Point will not encrypt data from node with other, not interfere with other from node, application server can be normal through void
Quasi- IP accesses data, to ensure that the normal operation of other storage servers;When for from node, then directly to currently from section
Point is encrypted, and does not interfere with host node with other from node, to also ensure the normal storage and access of data;
No matter currently stored server is host node or from node, will be encrypted, and encryption is avoided illegal to upset data
Personnel steal data, and emergency defense module is to steal the illegal of data to alert invader or relevant staff is reminded to have
Behavior, to avoid the further expansion of loss.
Further, the DRBD virtual disk foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
File system is for managing the file being stored in DRBD virtual disk, when needing to read and write data, file system pair
DRBD virtual disk after encapsulation is written and read, without direct read/write disk partition, thus when operator needs to as host node
Storage server in DRBD virtual disk be written data when, can synchronously write data into virtual as the DRBD from node
In disk, by being packaged to disk partition, DRBD virtual disk can be allowed to realize more functions.
Further, the virtual IP address management process specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by the election contest mechanism of Keepalived service to determine host node and from node, and to host node and from section
Point is marked.
It between Keepalived High Availabitity pair is communicated by VRRP, VRRP is determined by election contest protocol
Host node and from node, the priority of host node is higher than from node, and therefore, host node can preferentially obtain all money when work
Source is then waited for from node.
Further, the specific steps of the virtual IP address management process are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and is switched from node
Identity be host node.
When being serviced using Keepalived, host node can be sent to always from node VRRP broadcast packet, be told from node
It also lives, at this time from node will not rifle account for the position of host node, when host node is unavailable, i.e., monitor from node less than main section
When the broadcast packet that point is sent, just will start related service adapter tube resource, virtual ip address drift to it is a certain from node, and should be from
The status transformation of node is host node, to guarantee the continuity and high degree of availability of business.
Further, after the virtual IP address management process further include:
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address
Obtain corresponding data.
Due to having used Keepalived management virtual ip address to be always positioned at the host node of survival, as host node
When storage server breaks down, host node is automatically become from node, so application server is by virtual IP address to storage service
Device accesses, and can centainly obtain data, avoid the case where storage server breaks down and can not obtain data.
Detailed description of the invention
Fig. 1 is the flow chart of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention;
Fig. 2 is the topological diagram of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention;
Fig. 3 is the flow chart of the heartbeat detection of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention.
Specific embodiment
It is further described below by specific embodiment:
Embodiment one
As depicted in figs. 1 and 2, the date storage method of principal and subordinate's bi-directional synchronization of the present invention, comprising the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and it is virtual to create DRBD
Disk;
Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage clothes
Node of being engaged in is host node or from node, and according to the role of node role definition DRBD virtual disk be main DRBD virtual disk and from
DRBD virtual disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, protects
The host node that virtual ip address is always positioned at survival is held, will be automatically host node from node definition when host node is inaccessible;
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address
Obtain corresponding data;
Integrated information acquisition step: acquisition security door peripheral information in real time, and peripheral information is sent to central processing unit;
Peripheral information may include the information etc. of video information, audio-frequency information, vibration information and glass breaking;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will
It transmits with the presence or absence of the information of abnormal conditions to central processing unit;Abnormal conditions include that data are not downloaded according to correct path,
Data are just represented to be stolen;
Central processing unit processing step: when receiving there are the information of abnormal conditions or judge to deposit according to peripheral information
In intrusion behavior, judge the role of currently stored server, if currently stored server be host node, execute S21,
S22 and S23;If currently stored server is from node, S22 and S23 are executed;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted;
S23: to the holding chamber enhancing emergency defensive measure of the storage server;For example, the computer room of storage storage server
Interior to be equipped with alarm, starting alarm sounds an alarm to remind staff to have illegal invasion person to want to steal data;Either
It sends on the mobile terminal that short message is used to staff;Have in either computer room and be equipped with camera, opens camera to room
It takes pictures, and the image of shooting is uploaded to cloud and is saved;
Button triggers step: providing for each node to be restored normal button, when button is triggered, to the number of encryption
According to being decrypted, and virtual IP address is drifted to original host node, and restore host node and the identity from node.
In the present embodiment, DRBD virtual disk foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
File system is for managing the file being stored in DRBD virtual disk, when needing to read and write data, file system pair
DRBD virtual disk after encapsulation is written and read, without direct read/write disk partition, thus when operator needs to as host node
Storage server in DRBD virtual disk be written data when, can synchronously write data into virtual as the DRBD from node
In disk, by being packaged to disk partition, DRBD virtual disk can be allowed to realize more functions, such as by after encapsulation
Customized program is written in disk partition, and DRBD virtual disk can be allowed to realize intercept information or obtain the function of operator message.
Virtual IP address management process specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by the election contest mechanism of Keepalived service to determine host node and from node, and to host node and from section
Point is marked.
It between Keepalived High Availabitity pair is communicated by VRRP, VRRP is determined by election contest protocol
Host node and from node, the priority of host node is higher than from node, and therefore, host node can preferentially obtain all money when work
Source is then waited for from node, reduces the cost of equipment investment.
As shown in Figure 1, the specific steps of virtual IP address management process are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and is switched from node
Identity be host node.
As shown in figure 3, the specific steps of heartbeat detection are as follows:
Role's detecting step: the role of detection storage service node is, when for host node, executes S11;When for from node
When, then execute S12;
S11: the state of detection host node DRBD virtual disk if normal, that is, when display UpToDate character, represents master
The DRBD virtual disk of node is in synchronous normal condition with from node, then enters and detect to the state of virtual IP address, when aobvious
When the binding state exception of the virtual IP address shown, then virtual IP address is bound to the host node again, when the binding shape of the virtual IP address of display
When state is normal, then enters and the host node carry dotted state is detected, when mount point exception, utilize Mount mount point weight
New carry file system, in linux system, generally by Mount come carry;When mount point is normal, heartbeat detection terminates;
S12: detecting from the state of node DRBD virtual disk, if normal, that is, when display UpToDate character, represent from
The DRBD virtual disk of node is in synchronous normal condition with host node, then enters distal end role and check, because using
When Keepalived is serviced, host node can be sent to always from node VRRP broadcast packet, tell that it also lives from node, distal end angle
Color inspection namely monitor whether can receive host node transmission broadcast packet, when from node listen to host node send it is wide
When broadcasting packet, illustrate that host node also lives, does not need to switch the identity from node;It is wide less than what host node was sent when being monitored from node
When broadcasting packet, just will start related service adapter tube resource, virtual ip address drift to it is a certain from node, and by the identity from node
It is changed into host node, Mount mount point carry file system then is carried out to new host node again, and carry out carry dotted state
It is detected with virtual IP address state, when carry dotted state and normal virtual IP address state, terminates this heartbeat detection, when main section
When point breaks down, the continuity and high degree of availability of business ensure that from the conversion of the identity of node.
The scheme serviced by DRBD combination Keepalived, can be realized the standby of the different internodal datas across computer room
Part, ensured effective storage of data, compared with the existing technology in based on hardware device realize data backup for, this programme
It is the data that may have access in storage server by virtual ip address, is not required to add special image copying equipment, also be not required to
The data of entire physical hard disk are replicated, are reduced costs and the requirement to network broadband, and is real by Keepalived
The switching for having showed identity between main and subordinate node, allows virtual ip address be bundled on the host node of survival always, has ensured data principal and subordinate
Bi-directional synchronization storage, whole process is transparent for application system, thus do not need to do application system any switching or
Transformation reduces the complexity of application system realization;In the same time, only one node executes read-write operation, section in addition
Point is in cold standby state, reduces the cost of equipment investment, saves communication cost, reduces the requirement to communication environment.
It is monitored by integrated information acquisition and abnormal conditions to determine whether having illegal invasion person or whether stealing number
According to behavior, realize and the duplicate protection of storage data in the server first judged when having abnormal conditions or invader
The identity of the host node is then transferred to other from node if host node by the role of currently stored server, thus only to this
The data encryption stored in storage server, new host node will not encrypt data from node with other, will not influence
To other from node, application server can access data normal through virtual IP address, to ensure that other storage servers just
Often operating;When for from node, then directly to being currently encrypted from node, do not interfere with host node and other from section
Point, to also ensure the normal storage and access of data;No matter currently stored server is host node or from node, will
It is encrypted, encryption is to avoid unauthorized person from stealing data, emergency defense module is to alert invader to upset data
Or relevant staff is reminded to have the illegal act for stealing data, to avoid the further expansion of loss.
The setting for restoring proper button is in order to which when abnormal conditions release, staff can be by restoring proper button
The data of encryption are decrypted in triggering, and data can be restored normally, and when recovery proper button is triggered, will be virtual
IP drifts to original host node, and restores the identity of host node, to ensure the efficient storage of data.
Embodiment two
The difference between this embodiment and the first embodiment lies in further comprising the steps of:
Sampling of data step: each Backup Data stored from node of sampling;
Verification of data step: the data that each Backup Data sampled from node is stored with host node one by one are subjected to core
It is right, and to each from vertex ticks checked result;For example, checked result can take the mode of hundred-mark system to show, according to backup number
Percentage is determined according to the similarity degree of the data stored with host node, it is assumed that Backup Data and the data that host node stores are complete
It is overlapped, then checked result is absolutely, it is assumed that Backup Data can be overlapped with the data only half that host node stores, then checked
It as a result is 50 percent;
Node screening step: it is filtered out according to checked result standard compliant from node;For example, checked result is percent
90 or more comply with standard;
Performance judgment step: judge the standard compliant performance from node, and carried out according to the superiority and inferiority of performance to from node
Priority ranking;Performance can be judged from many aspects, for example, the memory capacity of storage server, processor processing speed,
Handling capacity etc.;
Virtual IP address drifts about step: virtual IP address drifting to the slave node of highest priority, and save based on switching from node
Point.
It is destroyed because being possible to from the Backup Data of node, when host node is without failure, will be incited somebody to action
The data that each Backup Data sampled from node is stored with host node one by one are checked, first is that in order to detect from node standby
The accuracy of data;Second is that it is high from node in order to filter out accuracy, it gets ready for host node drift.The slave node of switching
Highest priority, it is best also just to represent the storage server performance from node, host node only one, and can be with from node
Have multiple, when host node is unavailable, chooses the slave node of highest priority as new host node, so as to improve data
The accuracy and high degree of availability of storage.
What has been described above is only an embodiment of the present invention, and the common sense such as well known specific structure and characteristic are not made herein in scheme
Excessive description.It, without departing from the structure of the invention, can be with it should be pointed out that for those skilled in the art
Several modifications and improvements are made, these also should be considered as protection scope of the present invention, these all will not influence what the present invention was implemented
Effect and patent practicability.The scope of protection required by this application should be based on the content of the claims, in specification
The records such as specific embodiment can be used for explaining the content of claim.
Claims (5)
1. the date storage method of principal and subordinate's bi-directional synchronization, which comprises the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and DRBD virtual disk is created;
Node role's definition step: to each storage service node installation and configuration Keepalived service, storage service section is marked
Point is host node or from node, and is main DRBD virtual disk and from DRBD void according to the role of node role definition DRBD virtual disk
Quasi- disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, keeps empty
Quasi- IP address is always positioned at the host node of survival, will be automatically host node from node definition when host node is inaccessible;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will be whether
There are the information of abnormal conditions to transmit to central processing unit;
Central processing unit processing step: when receiving the information there are abnormal conditions, judging the role of currently stored server,
If currently stored server is host node, S21 and S22 are executed;If currently stored server is from node, execute
S22;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted.
2. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the DRBD virtual disk
Foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
3. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the node role is fixed
Adopted step specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by Keepalived service election contest mechanism to determine host node and from node, and to host node and from node into
Line flag.
4. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the virtual IP address management
The specific steps of step are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and switches the body from node
Part is host node.
5. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the virtual IP address management
After step further include:
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address and obtains
Corresponding data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811003460.4A CN109101370A (en) | 2018-08-30 | 2018-08-30 | The date storage method of principal and subordinate's bi-directional synchronization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811003460.4A CN109101370A (en) | 2018-08-30 | 2018-08-30 | The date storage method of principal and subordinate's bi-directional synchronization |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109101370A true CN109101370A (en) | 2018-12-28 |
Family
ID=64864389
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811003460.4A Pending CN109101370A (en) | 2018-08-30 | 2018-08-30 | The date storage method of principal and subordinate's bi-directional synchronization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109101370A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110177048A (en) * | 2019-05-28 | 2019-08-27 | 银联商务股份有限公司 | A kind of high availability implementation method and device of virtual private cloud system |
CN110737526A (en) * | 2019-10-22 | 2020-01-31 | 上海思询信息科技有限公司 | method and device for managing timed tasks under Redis-based distributed cluster |
CN111427608A (en) * | 2020-03-20 | 2020-07-17 | 重庆富民银行股份有限公司 | Gray scale publishing method for bank core system |
CN112019601A (en) * | 2020-08-07 | 2020-12-01 | 烽火通信科技股份有限公司 | Two-node implementation method and system based on distributed storage Ceph |
CN112882771A (en) * | 2021-03-22 | 2021-06-01 | 建信融通有限责任公司 | Server switching method and device of application system, storage medium and electronic equipment |
CN113805925A (en) * | 2021-09-27 | 2021-12-17 | 济南浪潮数据技术有限公司 | Online upgrading method, device, equipment and medium for distributed cluster management software |
WO2023273468A1 (en) * | 2021-06-29 | 2023-01-05 | 华为技术有限公司 | Communication method, apparatus and system |
CN116431397A (en) * | 2023-06-13 | 2023-07-14 | 北京中实信息技术有限公司 | Main and auxiliary node switching system of server |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094102A (en) * | 2007-07-18 | 2007-12-26 | 杭州华三通信技术有限公司 | Main and standby switching method and route standby system for route device |
CN101483555A (en) * | 2009-02-12 | 2009-07-15 | 浙江工商大学 | Method for redundant backup implemented by dual ForCES control piece |
WO2014139415A1 (en) * | 2013-03-11 | 2014-09-18 | 成都百威讯科技有限责任公司 | Smart door/window anti-intrusion apparatus and system and smart access control system |
-
2018
- 2018-08-30 CN CN201811003460.4A patent/CN109101370A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101094102A (en) * | 2007-07-18 | 2007-12-26 | 杭州华三通信技术有限公司 | Main and standby switching method and route standby system for route device |
CN101483555A (en) * | 2009-02-12 | 2009-07-15 | 浙江工商大学 | Method for redundant backup implemented by dual ForCES control piece |
WO2014139415A1 (en) * | 2013-03-11 | 2014-09-18 | 成都百威讯科技有限责任公司 | Smart door/window anti-intrusion apparatus and system and smart access control system |
Non-Patent Citations (2)
Title |
---|
徐鲲: "基于DRBD双控制器磁盘阵列系统控制与管理", 《中国优秀硕士学位论文全文数据库信息科技辑》 * |
秦玉春: "基于分布式文件系统的开源云存储的技术研究", 《南钢科技与管理》 * |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110177048A (en) * | 2019-05-28 | 2019-08-27 | 银联商务股份有限公司 | A kind of high availability implementation method and device of virtual private cloud system |
CN110177048B (en) * | 2019-05-28 | 2022-03-25 | 银联商务股份有限公司 | High-availability implementation method and device of virtual private cloud system |
CN110737526A (en) * | 2019-10-22 | 2020-01-31 | 上海思询信息科技有限公司 | method and device for managing timed tasks under Redis-based distributed cluster |
CN111427608A (en) * | 2020-03-20 | 2020-07-17 | 重庆富民银行股份有限公司 | Gray scale publishing method for bank core system |
CN112019601A (en) * | 2020-08-07 | 2020-12-01 | 烽火通信科技股份有限公司 | Two-node implementation method and system based on distributed storage Ceph |
CN112019601B (en) * | 2020-08-07 | 2022-08-02 | 烽火通信科技股份有限公司 | Two-node implementation method and system based on distributed storage Ceph |
CN112882771A (en) * | 2021-03-22 | 2021-06-01 | 建信融通有限责任公司 | Server switching method and device of application system, storage medium and electronic equipment |
WO2023273468A1 (en) * | 2021-06-29 | 2023-01-05 | 华为技术有限公司 | Communication method, apparatus and system |
CN113805925A (en) * | 2021-09-27 | 2021-12-17 | 济南浪潮数据技术有限公司 | Online upgrading method, device, equipment and medium for distributed cluster management software |
CN116431397A (en) * | 2023-06-13 | 2023-07-14 | 北京中实信息技术有限公司 | Main and auxiliary node switching system of server |
CN116431397B (en) * | 2023-06-13 | 2023-09-01 | 北京中实信息技术有限公司 | Main and auxiliary node switching system of server |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109101370A (en) | The date storage method of principal and subordinate's bi-directional synchronization | |
CN109271280A (en) | Storage failure is switched fast processing method | |
CN109101200A (en) | A kind of disk storage system that across a network real time bidirectional is synchronous | |
CN104885076B (en) | The system and method for distributed storage | |
US9917854B2 (en) | Security detection | |
CN103930879B (en) | Projection storage gateway | |
US9916113B2 (en) | System and method for mirroring data | |
CN103748548B (en) | Equipment and method for activating gateway of remote service provider | |
CN104503965B (en) | The elastomeric High Availabitities of PostgreSQL and implementation of load balancing | |
US9501374B2 (en) | Disaster recovery appliance | |
CN104935654B (en) | Caching method, write-in point client in a kind of server cluster system and read client | |
CN103677967B (en) | A kind of remote date transmission system of data base and method for scheduling task | |
CN103765406A (en) | Methods and apparatus for remotely updating executing processes | |
JP2004532442A (en) | Failover processing in a storage system | |
CN107046575B (en) | A kind of high density storage method for cloud storage system | |
CN108076090A (en) | Data processing method and storage management system | |
CN108600284B (en) | Ceph-based virtual machine high-availability implementation method and system | |
CN115150419B (en) | Configuration and access method and system for hybrid cloud object storage | |
CN105893176B (en) | A kind of management method and device of network store system | |
CN105550230B (en) | The method for detecting and device of distributed memory system node failure | |
US10346260B1 (en) | Replication based security | |
CN113330426B (en) | Method, device and system for backing up data | |
CN104636086B (en) | A kind of HA storage devices, the method for managing HA states | |
CN114301763B (en) | Distributed cluster fault processing method and system, electronic equipment and storage medium | |
CN109240616A (en) | Store the construction method of equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181228 |