CN109101370A - The date storage method of principal and subordinate's bi-directional synchronization - Google Patents

The date storage method of principal and subordinate's bi-directional synchronization Download PDF

Info

Publication number
CN109101370A
CN109101370A CN201811003460.4A CN201811003460A CN109101370A CN 109101370 A CN109101370 A CN 109101370A CN 201811003460 A CN201811003460 A CN 201811003460A CN 109101370 A CN109101370 A CN 109101370A
Authority
CN
China
Prior art keywords
node
virtual
drbd
host node
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811003460.4A
Other languages
Chinese (zh)
Inventor
李丙洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Fumin Bank Co Ltd
Original Assignee
Chongqing Fumin Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Fumin Bank Co Ltd filed Critical Chongqing Fumin Bank Co Ltd
Priority to CN201811003460.4A priority Critical patent/CN109101370A/en
Publication of CN109101370A publication Critical patent/CN109101370A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1456Hardware arrangements for backup
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/16Error detection or correction of the data by redundancy in hardware
    • G06F11/20Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
    • G06F11/2053Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements where persistent mass storage functionality or persistent mass storage control functionality is redundant
    • G06F11/2094Redundant storage or storage space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Databases & Information Systems (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of date storage methods of principal and subordinate's bi-directional synchronization, are related to technical field of data processing, comprising: DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and creating DRBD virtual disk;Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage service node is host node or from node, and is main DRBD virtual disk and from DRBD virtual disk according to the role of node role definition DRBD virtual disk;Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, virtual ip address is kept to be always positioned at the host node of survival, will be automatically host node from node definition when host node is inaccessible.The invention is intended to provide a kind of date storage method that can reduce implementation cost and reduce to principal and subordinate's bi-directional synchronization of extraneous communication environment requirement.

Description

The date storage method of principal and subordinate's bi-directional synchronization
Technical field
The present invention relates to technical field of data processing, in particular to a kind of date storage method of principal and subordinate's bi-directional synchronization.
Background technique
With becoming increasingly popular for network service, it is often necessary to store some common data (such as business datum) simultaneously On the server of multiple computer rooms.For example, in order to provide identical service to user in all parts of the country, respectively in Beijing, Guangzhou Three computer rooms are provided with Tibet, required service can be accessed by any computer room node in user, under normal circumstances user Access nearest computer room node.At this moment, Beijing, the data stored in the regional computer room in Guangzhou and three, Tibet are all the same. In addition, sometimes for prevent because in a computer room server hang due to lead to service disruption the case where generation, also can simultaneously portion Multiple computer rooms for being stored with identical data are affixed one's name to, it can be provided after a computer room is hung by other computer room for user By service.
The generation of the case where to prevent the server in a computer room from hanging and leading to service disruption, at present mainly using active and standby Administrative skill is managed, and active and standby management is a kind of technology for guaranteeing equipment dependability, it may ensure that main equipment operates normally When, it backups processing from equipment to data.When main equipment breaks down, business can be switched in time from equipment by system, be protected The continual progress of card business.
The existing data backup across computer room is normally based on hardware device realization, general that separate storage is used to realize The Reliability comparotive of image copying based on block device, this mode is secure, but needs special image copying equipment, and And be to replicate the data of entire physical hard disk, a large amount of data duplication needs to have network bandwidth higher requirement, therefore valence Lattice are costly, and higher to dependences such as external environment such as network broadbands, therefore, need at present it is a kind of it is at low cost, to net The date storage method of the lower principal and subordinate's bi-directional synchronization across computer room of network broadband degree of dependence.
Summary of the invention
The invention is intended to provide it is a kind of can reduce implementation cost and reduce it is two-way to the principal and subordinate of extraneous communication environment requirement Synchronous date storage method.
In order to solve the above technical problems, base case provided by the invention is as follows:
The date storage method of principal and subordinate's bi-directional synchronization, comprising the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and it is virtual to create DRBD Disk;
Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage clothes Node of being engaged in is host node or from node, and according to the role of node role definition DRBD virtual disk be main DRBD virtual disk and from DRBD virtual disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, protects The host node that virtual ip address is always positioned at survival is held, will be automatically host node from node definition when host node is inaccessible;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will It transmits with the presence or absence of the information of abnormal conditions to central processing unit;
Central processing unit processing step: when receiving the information there are abnormal conditions, judge currently stored server Role executes S21 and S22 if currently stored server is host node;If currently stored server is from node, Execute S22;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted.
In technical solution of the present invention, by the way that DRBD software is installed and configured to each storage server, exist to obtain DRBD The service of system layer is mainly packaged the physical disk equipment of bottom, fictionalizes DRBD virtual disk and visits for file system It asks, and stores the data backup to main DRBD virtual disk extremely from DRBD virtual disk, so the DRBD of a storage server Data in virtual disk can be mirrored in network in the DRBD virtual disk of an other storage server, also be achieved that network Between different node datas backup, changing traditional data can only be in the mode of local disk mirror back-up.Again to each storage Service node installation and configuration Keepalived software, and selecting a storage service vertex ticks is host node, remaining is deposited Storing up service node is to distribute virtual ip address from node for host node, manages virtual ip address by Keepalived software, protects It holds virtual ip address and is always positioned at host node, will be automatically host node, host node from node definition when host node is inaccessible With the switching from node identities, host node and the bi-directional synchronization storage from data between node are realized, thus application server The data stored in storage server can be accessed by the virtual ip address.
It has the beneficial effect that
1, the scheme serviced by DRBD combination Keepalived, can be realized the standby of the different internodal datas across computer room Part, ensured effective storage of data, compared with the existing technology in based on hardware device realize data backup for, this programme It is the data that may have access in storage server by virtual ip address, is not required to add special image copying equipment, also be not required to The data of entire physical hard disk are replicated, are reduced costs and the requirement to network broadband, and pass through Keepalived The switching for realizing identity between main and subordinate node, allows virtual ip address be bundled on the host node of survival always, has ensured data master It is stored from bi-directional synchronization, whole process is transparent for application system, so not needing to do application system any switching Or transformation, reduce the complexity of application system realization;In the same time, only one node executes read-write operation, in addition Node is in cold standby state, reduces the cost of equipment investment, saves communication cost, reduces the requirement to communication environment.
2, it is monitored by abnormal conditions to determine whether there is the behavior for stealing data, is realized to storage in the server The protection of data first judges the role of currently stored server when having abnormal conditions or invader, if host node, then will The identity of the host node is transferred to other from node, thus the only data encryption to storing in the storage server, new main section Point will not encrypt data from node with other, not interfere with other from node, application server can be normal through void Quasi- IP accesses data, to ensure that the normal operation of other storage servers;When for from node, then directly to currently from section Point is encrypted, and does not interfere with host node with other from node, to also ensure the normal storage and access of data; No matter currently stored server is host node or from node, will be encrypted, and encryption is avoided illegal to upset data Personnel steal data, and emergency defense module is to steal the illegal of data to alert invader or relevant staff is reminded to have Behavior, to avoid the further expansion of loss.
Further, the DRBD virtual disk foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
File system is for managing the file being stored in DRBD virtual disk, when needing to read and write data, file system pair DRBD virtual disk after encapsulation is written and read, without direct read/write disk partition, thus when operator needs to as host node Storage server in DRBD virtual disk be written data when, can synchronously write data into virtual as the DRBD from node In disk, by being packaged to disk partition, DRBD virtual disk can be allowed to realize more functions.
Further, the virtual IP address management process specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by the election contest mechanism of Keepalived service to determine host node and from node, and to host node and from section Point is marked.
It between Keepalived High Availabitity pair is communicated by VRRP, VRRP is determined by election contest protocol Host node and from node, the priority of host node is higher than from node, and therefore, host node can preferentially obtain all money when work Source is then waited for from node.
Further, the specific steps of the virtual IP address management process are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and is switched from node Identity be host node.
When being serviced using Keepalived, host node can be sent to always from node VRRP broadcast packet, be told from node It also lives, at this time from node will not rifle account for the position of host node, when host node is unavailable, i.e., monitor from node less than main section When the broadcast packet that point is sent, just will start related service adapter tube resource, virtual ip address drift to it is a certain from node, and should be from The status transformation of node is host node, to guarantee the continuity and high degree of availability of business.
Further, after the virtual IP address management process further include:
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address Obtain corresponding data.
Due to having used Keepalived management virtual ip address to be always positioned at the host node of survival, as host node When storage server breaks down, host node is automatically become from node, so application server is by virtual IP address to storage service Device accesses, and can centainly obtain data, avoid the case where storage server breaks down and can not obtain data.
Detailed description of the invention
Fig. 1 is the flow chart of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention;
Fig. 2 is the topological diagram of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention;
Fig. 3 is the flow chart of the heartbeat detection of the date storage method embodiment of principal and subordinate's bi-directional synchronization of the present invention.
Specific embodiment
It is further described below by specific embodiment:
Embodiment one
As depicted in figs. 1 and 2, the date storage method of principal and subordinate's bi-directional synchronization of the present invention, comprising the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and it is virtual to create DRBD Disk;
Node role's definition step: to each storage service node installation and configuration Keepalived service, label storage clothes Node of being engaged in is host node or from node, and according to the role of node role definition DRBD virtual disk be main DRBD virtual disk and from DRBD virtual disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, protects The host node that virtual ip address is always positioned at survival is held, will be automatically host node from node definition when host node is inaccessible;
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address Obtain corresponding data;
Integrated information acquisition step: acquisition security door peripheral information in real time, and peripheral information is sent to central processing unit; Peripheral information may include the information etc. of video information, audio-frequency information, vibration information and glass breaking;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will It transmits with the presence or absence of the information of abnormal conditions to central processing unit;Abnormal conditions include that data are not downloaded according to correct path, Data are just represented to be stolen;
Central processing unit processing step: when receiving there are the information of abnormal conditions or judge to deposit according to peripheral information In intrusion behavior, judge the role of currently stored server, if currently stored server be host node, execute S21, S22 and S23;If currently stored server is from node, S22 and S23 are executed;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted;
S23: to the holding chamber enhancing emergency defensive measure of the storage server;For example, the computer room of storage storage server Interior to be equipped with alarm, starting alarm sounds an alarm to remind staff to have illegal invasion person to want to steal data;Either It sends on the mobile terminal that short message is used to staff;Have in either computer room and be equipped with camera, opens camera to room It takes pictures, and the image of shooting is uploaded to cloud and is saved;
Button triggers step: providing for each node to be restored normal button, when button is triggered, to the number of encryption According to being decrypted, and virtual IP address is drifted to original host node, and restore host node and the identity from node.
In the present embodiment, DRBD virtual disk foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
File system is for managing the file being stored in DRBD virtual disk, when needing to read and write data, file system pair DRBD virtual disk after encapsulation is written and read, without direct read/write disk partition, thus when operator needs to as host node Storage server in DRBD virtual disk be written data when, can synchronously write data into virtual as the DRBD from node In disk, by being packaged to disk partition, DRBD virtual disk can be allowed to realize more functions, such as by after encapsulation Customized program is written in disk partition, and DRBD virtual disk can be allowed to realize intercept information or obtain the function of operator message.
Virtual IP address management process specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by the election contest mechanism of Keepalived service to determine host node and from node, and to host node and from section Point is marked.
It between Keepalived High Availabitity pair is communicated by VRRP, VRRP is determined by election contest protocol Host node and from node, the priority of host node is higher than from node, and therefore, host node can preferentially obtain all money when work Source is then waited for from node, reduces the cost of equipment investment.
As shown in Figure 1, the specific steps of virtual IP address management process are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and is switched from node Identity be host node.
As shown in figure 3, the specific steps of heartbeat detection are as follows:
Role's detecting step: the role of detection storage service node is, when for host node, executes S11;When for from node When, then execute S12;
S11: the state of detection host node DRBD virtual disk if normal, that is, when display UpToDate character, represents master The DRBD virtual disk of node is in synchronous normal condition with from node, then enters and detect to the state of virtual IP address, when aobvious When the binding state exception of the virtual IP address shown, then virtual IP address is bound to the host node again, when the binding shape of the virtual IP address of display When state is normal, then enters and the host node carry dotted state is detected, when mount point exception, utilize Mount mount point weight New carry file system, in linux system, generally by Mount come carry;When mount point is normal, heartbeat detection terminates;
S12: detecting from the state of node DRBD virtual disk, if normal, that is, when display UpToDate character, represent from The DRBD virtual disk of node is in synchronous normal condition with host node, then enters distal end role and check, because using When Keepalived is serviced, host node can be sent to always from node VRRP broadcast packet, tell that it also lives from node, distal end angle Color inspection namely monitor whether can receive host node transmission broadcast packet, when from node listen to host node send it is wide When broadcasting packet, illustrate that host node also lives, does not need to switch the identity from node;It is wide less than what host node was sent when being monitored from node When broadcasting packet, just will start related service adapter tube resource, virtual ip address drift to it is a certain from node, and by the identity from node It is changed into host node, Mount mount point carry file system then is carried out to new host node again, and carry out carry dotted state It is detected with virtual IP address state, when carry dotted state and normal virtual IP address state, terminates this heartbeat detection, when main section When point breaks down, the continuity and high degree of availability of business ensure that from the conversion of the identity of node.
The scheme serviced by DRBD combination Keepalived, can be realized the standby of the different internodal datas across computer room Part, ensured effective storage of data, compared with the existing technology in based on hardware device realize data backup for, this programme It is the data that may have access in storage server by virtual ip address, is not required to add special image copying equipment, also be not required to The data of entire physical hard disk are replicated, are reduced costs and the requirement to network broadband, and is real by Keepalived The switching for having showed identity between main and subordinate node, allows virtual ip address be bundled on the host node of survival always, has ensured data principal and subordinate Bi-directional synchronization storage, whole process is transparent for application system, thus do not need to do application system any switching or Transformation reduces the complexity of application system realization;In the same time, only one node executes read-write operation, section in addition Point is in cold standby state, reduces the cost of equipment investment, saves communication cost, reduces the requirement to communication environment.
It is monitored by integrated information acquisition and abnormal conditions to determine whether having illegal invasion person or whether stealing number According to behavior, realize and the duplicate protection of storage data in the server first judged when having abnormal conditions or invader The identity of the host node is then transferred to other from node if host node by the role of currently stored server, thus only to this The data encryption stored in storage server, new host node will not encrypt data from node with other, will not influence To other from node, application server can access data normal through virtual IP address, to ensure that other storage servers just Often operating;When for from node, then directly to being currently encrypted from node, do not interfere with host node and other from section Point, to also ensure the normal storage and access of data;No matter currently stored server is host node or from node, will It is encrypted, encryption is to avoid unauthorized person from stealing data, emergency defense module is to alert invader to upset data Or relevant staff is reminded to have the illegal act for stealing data, to avoid the further expansion of loss.
The setting for restoring proper button is in order to which when abnormal conditions release, staff can be by restoring proper button The data of encryption are decrypted in triggering, and data can be restored normally, and when recovery proper button is triggered, will be virtual IP drifts to original host node, and restores the identity of host node, to ensure the efficient storage of data.
Embodiment two
The difference between this embodiment and the first embodiment lies in further comprising the steps of:
Sampling of data step: each Backup Data stored from node of sampling;
Verification of data step: the data that each Backup Data sampled from node is stored with host node one by one are subjected to core It is right, and to each from vertex ticks checked result;For example, checked result can take the mode of hundred-mark system to show, according to backup number Percentage is determined according to the similarity degree of the data stored with host node, it is assumed that Backup Data and the data that host node stores are complete It is overlapped, then checked result is absolutely, it is assumed that Backup Data can be overlapped with the data only half that host node stores, then checked It as a result is 50 percent;
Node screening step: it is filtered out according to checked result standard compliant from node;For example, checked result is percent 90 or more comply with standard;
Performance judgment step: judge the standard compliant performance from node, and carried out according to the superiority and inferiority of performance to from node Priority ranking;Performance can be judged from many aspects, for example, the memory capacity of storage server, processor processing speed, Handling capacity etc.;
Virtual IP address drifts about step: virtual IP address drifting to the slave node of highest priority, and save based on switching from node Point.
It is destroyed because being possible to from the Backup Data of node, when host node is without failure, will be incited somebody to action The data that each Backup Data sampled from node is stored with host node one by one are checked, first is that in order to detect from node standby The accuracy of data;Second is that it is high from node in order to filter out accuracy, it gets ready for host node drift.The slave node of switching Highest priority, it is best also just to represent the storage server performance from node, host node only one, and can be with from node Have multiple, when host node is unavailable, chooses the slave node of highest priority as new host node, so as to improve data The accuracy and high degree of availability of storage.
What has been described above is only an embodiment of the present invention, and the common sense such as well known specific structure and characteristic are not made herein in scheme Excessive description.It, without departing from the structure of the invention, can be with it should be pointed out that for those skilled in the art Several modifications and improvements are made, these also should be considered as protection scope of the present invention, these all will not influence what the present invention was implemented Effect and patent practicability.The scope of protection required by this application should be based on the content of the claims, in specification The records such as specific embodiment can be used for explaining the content of claim.

Claims (5)

1. the date storage method of principal and subordinate's bi-directional synchronization, which comprises the following steps:
DRBD virtual disk foundation step: to each storage service node installation and configuration DRBD service, and DRBD virtual disk is created;
Node role's definition step: to each storage service node installation and configuration Keepalived service, storage service section is marked Point is host node or from node, and is main DRBD virtual disk and from DRBD void according to the role of node role definition DRBD virtual disk Quasi- disk;
Data synchronizing step: it will store to the data backup of main DRBD virtual disk to from DRBD virtual disk;
Virtual IP address management process: distributing virtual ip address for host node, manages virtual ip address by Keepalived, keeps empty Quasi- IP address is always positioned at the host node of survival, will be automatically host node from node definition when host node is inaccessible;
Abnormal conditions monitor step: monitoring the data of each storage service node storage with the presence or absence of abnormal conditions, and will be whether There are the information of abnormal conditions to transmit to central processing unit;
Central processing unit processing step: when receiving the information there are abnormal conditions, judging the role of currently stored server, If currently stored server is host node, S21 and S22 are executed;If currently stored server is from node, execute S22;
S21: virtual IP address is drifted to from node, and will be switched to host node from node;
S22: the data stored in the storage server are encrypted.
2. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the DRBD virtual disk Foundation step specifically includes:
S1: to each storage service node installation and configuration DRBD service;
S2: subregion is carried out to physical disk, and disk partition is initialized;
S3: the disk partition of initialization is packaged;
S4: DRBD virtual disk is created to the disk partition after encapsulation;
S5: file system is created to each DRBD virtual disk.
3. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the node role is fixed Adopted step specifically includes:
S6: to each storage service node installation and configuration Keepalived service;
S7: by Keepalived service election contest mechanism to determine host node and from node, and to host node and from node into Line flag.
4. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the virtual IP address management The specific steps of step are as follows:
S8: virtual ip address is distributed for host node;
S9: heartbeat detection is carried out to each storage service node, judges whether host node survives;
S10: when finding that host node is not survived, virtual ip address is drifted to from node automatically, and switches the body from node Part is host node.
5. the date storage method of principal and subordinate's bi-directional synchronization according to claim 1, which is characterized in that the virtual IP address management After step further include:
Storing data obtaining step: application server accesses the DRBD virtual disk in storage server by virtual ip address and obtains Corresponding data.
CN201811003460.4A 2018-08-30 2018-08-30 The date storage method of principal and subordinate's bi-directional synchronization Pending CN109101370A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811003460.4A CN109101370A (en) 2018-08-30 2018-08-30 The date storage method of principal and subordinate's bi-directional synchronization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811003460.4A CN109101370A (en) 2018-08-30 2018-08-30 The date storage method of principal and subordinate's bi-directional synchronization

Publications (1)

Publication Number Publication Date
CN109101370A true CN109101370A (en) 2018-12-28

Family

ID=64864389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811003460.4A Pending CN109101370A (en) 2018-08-30 2018-08-30 The date storage method of principal and subordinate's bi-directional synchronization

Country Status (1)

Country Link
CN (1) CN109101370A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177048A (en) * 2019-05-28 2019-08-27 银联商务股份有限公司 A kind of high availability implementation method and device of virtual private cloud system
CN110737526A (en) * 2019-10-22 2020-01-31 上海思询信息科技有限公司 method and device for managing timed tasks under Redis-based distributed cluster
CN111427608A (en) * 2020-03-20 2020-07-17 重庆富民银行股份有限公司 Gray scale publishing method for bank core system
CN112019601A (en) * 2020-08-07 2020-12-01 烽火通信科技股份有限公司 Two-node implementation method and system based on distributed storage Ceph
CN112882771A (en) * 2021-03-22 2021-06-01 建信融通有限责任公司 Server switching method and device of application system, storage medium and electronic equipment
CN113805925A (en) * 2021-09-27 2021-12-17 济南浪潮数据技术有限公司 Online upgrading method, device, equipment and medium for distributed cluster management software
WO2023273468A1 (en) * 2021-06-29 2023-01-05 华为技术有限公司 Communication method, apparatus and system
CN116431397A (en) * 2023-06-13 2023-07-14 北京中实信息技术有限公司 Main and auxiliary node switching system of server

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094102A (en) * 2007-07-18 2007-12-26 杭州华三通信技术有限公司 Main and standby switching method and route standby system for route device
CN101483555A (en) * 2009-02-12 2009-07-15 浙江工商大学 Method for redundant backup implemented by dual ForCES control piece
WO2014139415A1 (en) * 2013-03-11 2014-09-18 成都百威讯科技有限责任公司 Smart door/window anti-intrusion apparatus and system and smart access control system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094102A (en) * 2007-07-18 2007-12-26 杭州华三通信技术有限公司 Main and standby switching method and route standby system for route device
CN101483555A (en) * 2009-02-12 2009-07-15 浙江工商大学 Method for redundant backup implemented by dual ForCES control piece
WO2014139415A1 (en) * 2013-03-11 2014-09-18 成都百威讯科技有限责任公司 Smart door/window anti-intrusion apparatus and system and smart access control system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
徐鲲: "基于DRBD双控制器磁盘阵列系统控制与管理", 《中国优秀硕士学位论文全文数据库信息科技辑》 *
秦玉春: "基于分布式文件系统的开源云存储的技术研究", 《南钢科技与管理》 *

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110177048A (en) * 2019-05-28 2019-08-27 银联商务股份有限公司 A kind of high availability implementation method and device of virtual private cloud system
CN110177048B (en) * 2019-05-28 2022-03-25 银联商务股份有限公司 High-availability implementation method and device of virtual private cloud system
CN110737526A (en) * 2019-10-22 2020-01-31 上海思询信息科技有限公司 method and device for managing timed tasks under Redis-based distributed cluster
CN111427608A (en) * 2020-03-20 2020-07-17 重庆富民银行股份有限公司 Gray scale publishing method for bank core system
CN112019601A (en) * 2020-08-07 2020-12-01 烽火通信科技股份有限公司 Two-node implementation method and system based on distributed storage Ceph
CN112019601B (en) * 2020-08-07 2022-08-02 烽火通信科技股份有限公司 Two-node implementation method and system based on distributed storage Ceph
CN112882771A (en) * 2021-03-22 2021-06-01 建信融通有限责任公司 Server switching method and device of application system, storage medium and electronic equipment
WO2023273468A1 (en) * 2021-06-29 2023-01-05 华为技术有限公司 Communication method, apparatus and system
CN113805925A (en) * 2021-09-27 2021-12-17 济南浪潮数据技术有限公司 Online upgrading method, device, equipment and medium for distributed cluster management software
CN116431397A (en) * 2023-06-13 2023-07-14 北京中实信息技术有限公司 Main and auxiliary node switching system of server
CN116431397B (en) * 2023-06-13 2023-09-01 北京中实信息技术有限公司 Main and auxiliary node switching system of server

Similar Documents

Publication Publication Date Title
CN109101370A (en) The date storage method of principal and subordinate's bi-directional synchronization
CN109271280A (en) Storage failure is switched fast processing method
CN109101200A (en) A kind of disk storage system that across a network real time bidirectional is synchronous
CN104885076B (en) The system and method for distributed storage
US9917854B2 (en) Security detection
CN103930879B (en) Projection storage gateway
US9916113B2 (en) System and method for mirroring data
CN103748548B (en) Equipment and method for activating gateway of remote service provider
CN104503965B (en) The elastomeric High Availabitities of PostgreSQL and implementation of load balancing
US9501374B2 (en) Disaster recovery appliance
CN104935654B (en) Caching method, write-in point client in a kind of server cluster system and read client
CN103677967B (en) A kind of remote date transmission system of data base and method for scheduling task
CN103765406A (en) Methods and apparatus for remotely updating executing processes
JP2004532442A (en) Failover processing in a storage system
CN107046575B (en) A kind of high density storage method for cloud storage system
CN108076090A (en) Data processing method and storage management system
CN108600284B (en) Ceph-based virtual machine high-availability implementation method and system
CN115150419B (en) Configuration and access method and system for hybrid cloud object storage
CN105893176B (en) A kind of management method and device of network store system
CN105550230B (en) The method for detecting and device of distributed memory system node failure
US10346260B1 (en) Replication based security
CN113330426B (en) Method, device and system for backing up data
CN104636086B (en) A kind of HA storage devices, the method for managing HA states
CN114301763B (en) Distributed cluster fault processing method and system, electronic equipment and storage medium
CN109240616A (en) Store the construction method of equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20181228