CN109710453A - A kind of continuous data store method - Google Patents
A kind of continuous data store method Download PDFInfo
- Publication number
- CN109710453A CN109710453A CN201711012695.5A CN201711012695A CN109710453A CN 109710453 A CN109710453 A CN 109710453A CN 201711012695 A CN201711012695 A CN 201711012695A CN 109710453 A CN109710453 A CN 109710453A
- Authority
- CN
- China
- Prior art keywords
- data
- continuous
- store method
- cdp
- data store
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a kind of continuous data store methods, specifically comprise the following steps: S1: CDP data protection APP program is installed in user client;S2: client landing program, CDP data protection APP program are automatically synchronous with data to needing host to be protected to do a data scanning;S3: by the monitoring module built in CDP data protection APP program, monitoring module can be with continuous acquisition or tracking data variation, and generates IO log space, by the independent storage of the IO log space of generation into other memory spaces outside main storage space;It realizes that the fine granularity of IO rank is backed up in realtime in S4:S3, and generates the disaster tolerance data independently of creation data, and can be realized the data rewind of historical time point, can both carry out service take-over, also can solve mathematical logic mistake;S5: showing by way of by disaster tolerance data carry, and user can carry out the data carry of any point-in-time according to actual scene, restores oneself desired historical data.
Description
Technical field
The invention belongs to Data Protection Technologies fields, more specifically more particularly to a kind of continuous data store method.
Background technique
With computer technology, the development of multimedia technology and network technology and IT application in enterprises degree are higher and higher,
Demand of the people to data is in explosive growth, makes data storage protection technology that revolutionary variation occur.This variation master
Show that three aspects are the extension for sharply expanding the followed by data ready time of memory capacity first, data must assure that
Daily 24 hours, seven days a week, 365 days every year be in ready state;Finally, the structure of data storage is different.
In the epoch of globalization e-commerce, data should be towards global, and the access of data should only be pacified
The management of full mechanism, without should be by the constraint of regional space.And for an enterprise, the safety of data is extremely
Important, once important data are destroyed or lose, great influence will be caused to the daily production of enterprise, be even difficult to
The loss made up.According to the latest survey of company, for enterprise, restores data and at least need a couple of days, and consume a large amount of
Fund.It is to be in state of paralysis on entire enterprise practical and in recovery process.In today, up to the paralysis foot of a couple of days
To cause any a company to go bankrupt.In order to reduce because data corruption and caused by massive losses, many data backup memories
Technology and storage management technique come into being, and the end host of data backup memory technology and storage management derived from the age calculates mould
Formula, at that time since data concentrate on host, manageable mass memory unit --- tape library is indispensable at that time sets
It is standby.It is universal due to the most widely used client server mode of the development of PC, especially the nineties after the eighties, this
When network on file server and database server be often place in the data set of key, and one is also accumulated from client
Quantitative data, the distribution of data cause the complication of data storage management.
Analysis data the reason of being destroyed, mainly there is the following aspects: 1, natural calamity, as floods, fire, lightning stroke,
Earthquake etc. causes the destruction of computer system, and storing data is caused to be destroyed or lose completely;2, system manager and maintenance people
The maloperation of member;3, computer equipment failure, data caused by infecting including the aging of storage medium, defective virus are broken
It is bad;4, how the intrusion of " hacker " and sabotaging from intranet, reduce the loss of data at the same time, just at needing
One of solve the problems, such as.
Summary of the invention
The purpose of the present invention is to solve disadvantages existing in the prior art, and a kind of continuous data preservation side proposed
Method.
To achieve the above object, the invention provides the following technical scheme: a kind of continuous data store method, specifically include as
Lower step:
S1: CDP data protection APP program is installed in user client;
S2: after installing CDP data protection APP program, client landing program, CDP data protection APP program is automatically right
Host to be protected is needed to do a data scanning synchronous with data;
S3: by the monitoring module built in CDP data protection APP program, monitoring module detects that file generates in host
When variation, find the change location of data, and differential data is transmitted on server, monitoring module can with continuous acquisition or
Data variation is tracked, and generates IO log space, by the independent storage of the IO log space of generation to its outside main storage space
In his memory space;
It realizes that the fine granularity of IO rank is backed up in realtime in S4:S3, and generates the disaster tolerance data independently of creation data,
And can be realized the data rewind of historical time point, service take-over can be both carried out, also can solve mathematical logic mistake;
S5: showing by way of by disaster tolerance data carry, and the data of carry are readable writeable, and user can basis
Actual scene carries out the data carry of any point-in-time, restores oneself desired historical data.
Preferably, other memory spaces outside the main storage space include disk and CD.
Preferably, stickup position sensor and RFID label tag are fixed on the disk and CD.
Preferably, the monitoring module includes timing detection module and file operation detection module.
Preferably, the timing detection module protects instance data situation of change for periodically detecting, when data produce
When changing, IO log is generated in time, and save to IO daily record data.
Preferably, the file operation detection module is used to monitor the operation of file, starts when file is modified new
Version generates task, generates the latest edition of host data in time.
Preferably, the disaster tolerance data support the rehearsal of Redundancy Machine any point-in-time, can verify the number of current point in time
According to whether correctly, whether can carry out disaster-containing pipe.
Preferably, the IO daily record data storage uses the LAN-FREE network architecture.
Technical effect and advantage of the invention: a kind of continuous data store method of the present invention, real-time monitoring produce business fortune
Row state, if chance failure occurs, system can carry out service take-over in first time, ensure production business continuous service;This
External system utilizes disk level CDP technology, realizes that the fine granularity of IO rank is backed up in realtime, can be real according to business scenario needs
The data of existing history any point-in-time restore and business rehearsal, can effectively be directed to virus attack, artificially accidentally the data such as affected are patrolled
Mistake is collected, ensures that data are authentic and valid in all directions, and the business of any point-in-time is supported to drill, is not influencing production business fortune
In the case where row, a set of and duplicate simulated environment of production business can be simulated, for verifying the complete of historical data
Property.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with specific embodiment, to this
Invention is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Embodiment 1
A kind of continuous data store method provided by the invention, specifically comprises the following steps:
S1: CDP data protection APP program is installed in user client;
S2: after installing CDP data protection APP program, client landing program, CDP data protection APP program is automatically right
Host to be protected is needed to do a data scanning synchronous with data;
S3: by the monitoring module built in CDP data protection APP program, monitoring module detects that file generates in host
When variation, the change location of data is found, and differential data is transmitted on server, monitoring module can be with continuous acquisition data
Variation, and IO log space is generated, the independent storage of the IO log space of generation is empty to other storages outside main storage space
Between in;
It realizes that the fine granularity of IO rank is backed up in realtime in S4:S3, and generates the disaster tolerance data independently of creation data,
And can be realized the data rewind of historical time point, service take-over can be both carried out, also can solve mathematical logic mistake;
S5: showing by way of by disaster tolerance data carry, and the data of carry are readable writeable, and user can basis
Actual scene carries out the data carry of any point-in-time, restores oneself desired historical data.
Specifically, other memory spaces outside the main storage space include disk and CD.
Specifically, fixed on the disk and CD paste position sensor and RFID label tag.
Specifically, the monitoring module includes timing detection module and file operation detection module.
Specifically, the timing detection module protects instance data situation of change for periodically detecting, when data produce
When changing, IO log is generated in time, and save to IO daily record data.
Specifically, the file operation detection module is used to monitor the operation of file, start when file is modified new
Version generates task, generates the latest edition of host data in time.
Specifically, the disaster tolerance data support the rehearsal of Redundancy Machine any point-in-time, the number of current point in time can be verified
According to whether correctly, whether can carry out disaster-containing pipe.
Specifically, the IO daily record data storage uses the LAN-FREE network architecture.
In summary: a kind of continuous data store method of the present invention, real-time monitoring produces business operating status, if anticipating
Outer failure, system can carry out service take-over in first time, ensure production business continuous service;This external system utilizes disk level
CDP technology realizes that the fine granularity of IO rank is backed up in realtime, and can realize history any point-in-time according to business scenario needs
Data restore and business rehearsal, can effectively be directed to virus attack, the artificially accidentally mathematical logics mistake such as affected, ensure in all directions
Data are authentic and valid, and the business of any point-in-time is supported to drill, can be with mould in the case where not influencing to produce service operation
The a set of and duplicate simulated environment of production business is drawn up, for verifying the integrality of historical data.
In the present invention unless specifically defined or limited otherwise, term " installation ", " connected ", " connection ", " fixation " etc.
Term shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can be machine
Tool connection, is also possible to be electrically connected;It can be directly connected, two members can also be can be indirectly connected through an intermediary
Connection inside part.For the ordinary skill in the art, above-mentioned term can be understood in this hair as the case may be
Concrete meaning in bright.
Finally, it should be noted that the foregoing is only a preferred embodiment of the present invention, it is not intended to restrict the invention,
Although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art, still may be used
To modify the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features,
All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should be included in of the invention
Within protection scope.
Claims (8)
1. a kind of continuous data store method, it is characterised in that: specifically comprise the following steps:
S1: CDP data protection APP program is installed in user client;
S2: after installing CDP data protection APP program, client landing program, CDP data protection APP program is automatically to needs
It is synchronous with data that the host of protection does a data scanning;
S3: by the monitoring module built in CDP data protection APP program, monitoring module detects that file generates variation in host
When, the change location of data is found, and differential data is transmitted on server, monitoring module can be with continuous acquisition or tracking
Data variation, and generate IO log space deposits the independent storage of the IO log space of generation to other outside main storage space
It stores up in space;
It realizes that the fine granularity of IO rank is backed up in realtime in S4:S3, and generates the disaster tolerance data independently of creation data, and
It can be realized the data rewind of historical time point, can both carry out service take-over, also can solve mathematical logic mistake;
S5: showing by way of by disaster tolerance data carry, and the data of carry are readable writeable, and user can be according to reality
Scene carries out the data carry of any point-in-time, restores oneself desired historical data.
2. a kind of continuous data store method according to claim 1, it is characterised in that: its outside the main storage space
His memory space includes disk and CD.
3. a kind of continuous data store method according to claim 2, it is characterised in that: fixed on the disk and CD
Paste position sensor and RFID label tag.
4. a kind of continuous data store method according to claim 1, it is characterised in that: the monitoring module includes timing
Detection module and file operation detection module.
5. a kind of continuous data store method according to claim 4, it is characterised in that: the timing detection module is used for
Periodically detection protection instance data situation of change generates IO log, and to IO log number when data generate variation in time
According to being saved.
6. a kind of continuous data store method according to claim 4, it is characterised in that: the file operation detection module
For monitoring the operation of file, starts new version when file is modified and generate task, generate the newest of host data in time
Version.
7. a kind of continuous data store method according to claim 1, it is characterised in that: the disaster tolerance data support disaster tolerance
The rehearsal of machine any point-in-time, whether the data that can verify current point in time are correct, whether can carry out disaster-containing pipe.
8. a kind of continuous data store method according to claim 1, it is characterised in that: the IO daily record data storage is adopted
With the LAN-FREE network architecture.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711012695.5A CN109710453A (en) | 2017-10-26 | 2017-10-26 | A kind of continuous data store method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711012695.5A CN109710453A (en) | 2017-10-26 | 2017-10-26 | A kind of continuous data store method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109710453A true CN109710453A (en) | 2019-05-03 |
Family
ID=66252591
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711012695.5A Pending CN109710453A (en) | 2017-10-26 | 2017-10-26 | A kind of continuous data store method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109710453A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674502A (en) * | 2019-09-19 | 2020-01-10 | 华为技术有限公司 | Data detection method and device |
CN112463455A (en) * | 2020-12-08 | 2021-03-09 | 深信服科技股份有限公司 | Disaster tolerance drilling method, device, equipment and readable storage medium |
CN116301668A (en) * | 2023-05-25 | 2023-06-23 | 北京致趣科技有限公司 | CDP-based data storage system and method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101751474A (en) * | 2010-01-19 | 2010-06-23 | 山东高效能服务器和存储研究院 | Continuous data protection method based on centralized storage |
CN105354113A (en) * | 2015-11-27 | 2016-02-24 | 上海爱数信息技术股份有限公司 | Server, and system and method for managing server |
CN105389230A (en) * | 2015-10-21 | 2016-03-09 | 上海爱数信息技术股份有限公司 | Continuous data protection system and method combining with snapshot technology |
CN105550062A (en) * | 2015-12-03 | 2016-05-04 | 上海爱数信息技术股份有限公司 | Continuous data protection and time point browse recovery based data backflow method |
CN107229537A (en) * | 2017-05-31 | 2017-10-03 | 广州鼎甲计算机科技有限公司 | A kind of database real time backup method |
-
2017
- 2017-10-26 CN CN201711012695.5A patent/CN109710453A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101751474A (en) * | 2010-01-19 | 2010-06-23 | 山东高效能服务器和存储研究院 | Continuous data protection method based on centralized storage |
CN105389230A (en) * | 2015-10-21 | 2016-03-09 | 上海爱数信息技术股份有限公司 | Continuous data protection system and method combining with snapshot technology |
CN105354113A (en) * | 2015-11-27 | 2016-02-24 | 上海爱数信息技术股份有限公司 | Server, and system and method for managing server |
CN105550062A (en) * | 2015-12-03 | 2016-05-04 | 上海爱数信息技术股份有限公司 | Continuous data protection and time point browse recovery based data backflow method |
CN107229537A (en) * | 2017-05-31 | 2017-10-03 | 广州鼎甲计算机科技有限公司 | A kind of database real time backup method |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110674502A (en) * | 2019-09-19 | 2020-01-10 | 华为技术有限公司 | Data detection method and device |
CN112463455A (en) * | 2020-12-08 | 2021-03-09 | 深信服科技股份有限公司 | Disaster tolerance drilling method, device, equipment and readable storage medium |
CN112463455B (en) * | 2020-12-08 | 2024-02-23 | 深信服科技股份有限公司 | Disaster recovery exercise method, device, equipment and readable storage medium |
CN116301668A (en) * | 2023-05-25 | 2023-06-23 | 北京致趣科技有限公司 | CDP-based data storage system and method |
CN116301668B (en) * | 2023-05-25 | 2023-08-04 | 北京致趣科技有限公司 | CDP-based data storage system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8359491B1 (en) | Disaster recovery rehearsal using copy on write | |
CN1902595B (en) | Coordinated storage management operations in replication environment | |
US9588858B2 (en) | Periodic data replication | |
CN100426247C (en) | Data recovery method | |
CN104572357A (en) | Backup and recovery method for HDFS (Hadoop distributed filesystem) | |
CN102436376A (en) | Model checking for distributed application validation | |
CN109710453A (en) | A kind of continuous data store method | |
US10976942B2 (en) | Versioning a configuration of data storage equipment | |
CN103136070B (en) | A kind of method and apparatus of data disaster tolerance process | |
CN103037203A (en) | Method and device for index recovery based on block storage | |
US11288378B2 (en) | Embedded data protection and forensics for physically unsecure remote terminal unit (RTU) | |
CN102902615A (en) | Failure alarm method and system for Lustre parallel file system | |
US6973486B2 (en) | Alternate server system | |
US7600148B1 (en) | High-availability data center | |
US11379289B2 (en) | Encryption detection | |
CN111158955B (en) | High-availability system based on volume replication and multi-server data synchronization method | |
US20200242265A1 (en) | Detecting abnormal data access patterns | |
CN107066355A (en) | The backup server system and its building method of a kind of High Availabitity | |
US8478954B2 (en) | Prioritizing subgroups in a consistency group | |
Harper et al. | IT application downtime, executive visibility and disaster tolerant computing | |
CN102831036A (en) | Continuous data protection method based on disk partition | |
CN113884976A (en) | Cloud platform based intelligent electric meter data protection method and system | |
Al-Hashem et al. | Towards Data Availability Solutions During Disaster | |
US9497266B2 (en) | Disk mirroring for personal storage | |
US11237921B2 (en) | Protecting storage backup configuration |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190503 |
|
WD01 | Invention patent application deemed withdrawn after publication |