CN111949214B - Disk misoperation method, system, equipment and medium for preventing HANA cluster - Google Patents

Disk misoperation method, system, equipment and medium for preventing HANA cluster Download PDF

Info

Publication number
CN111949214B
CN111949214B CN202010788660.6A CN202010788660A CN111949214B CN 111949214 B CN111949214 B CN 111949214B CN 202010788660 A CN202010788660 A CN 202010788660A CN 111949214 B CN111949214 B CN 111949214B
Authority
CN
China
Prior art keywords
key
volume
working node
node
lun
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010788660.6A
Other languages
Chinese (zh)
Other versions
CN111949214A (en
Inventor
刘兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Inspur Intelligent Technology Co Ltd
Original Assignee
Suzhou Inspur Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Inspur Intelligent Technology Co Ltd filed Critical Suzhou Inspur Intelligent Technology Co Ltd
Priority to CN202010788660.6A priority Critical patent/CN111949214B/en
Publication of CN111949214A publication Critical patent/CN111949214A/en
Application granted granted Critical
Publication of CN111949214B publication Critical patent/CN111949214B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • G06F3/0619Improving the reliability of storage systems in relation to data integrity, e.g. data losses, bit errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0662Virtualisation aspects
    • G06F3/0665Virtualisation aspects at area level, e.g. provisioning of virtual or logical volumes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/067Distributed or networked storage systems, e.g. storage area networks [SAN], network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0668Interfaces specially adapted for storage systems adopting a particular infrastructure
    • G06F3/0671In-line storage system
    • G06F3/0683Plurality of storage devices
    • G06F3/0689Disk arrays, e.g. RAID, JBOD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0663Performing the actions predefined by failover planning, e.g. switching to standby network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure

Abstract

The invention discloses a disk misoperation method for preventing an HANA cluster, which comprises the following steps: generating a key corresponding to each working node, and respectively writing the key into an LUN header file corresponding to the volume under each working node; responding to the operation request of the working node to the volume, converting the operation request into an operation command and adding a key corresponding to the working node into the operation command; sending the operation command added with the key to a bottom storage and comparing the key; and in response to that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, not operating the volume to be operated and reporting an error. The invention also discloses a system, a computer device and a readable storage medium. The scheme provided by the invention can not only realize the method for preventing the data disks under other nodes from being operated by mistake, effectively solve the problem of artificial misoperation of the disks, but also ensure the disaster tolerance of the HANA cluster.

Description

Disk misoperation method, system, equipment and medium for preventing HANA cluster
Technical Field
The invention relates to the field of an HANA cluster, in particular to a method, a system, equipment and a storage medium for preventing disk misoperation of the HANA cluster.
Background
The multiple servers are used for constructing the HANA cluster, so that the requirement for a larger memory can be met, and the disaster tolerance of the nodes of the HANA cluster can be realized. However, in order to implement disaster recovery of HANA cluster nodes, all nodes need to have access to all shared disk volume groups. As shown in fig. 1, the HANA cluster shown in the figure includes 3+1 nodes (3 working nodes and one standby node), each working node has a respective data and log volume, and when any one of the working nodes (here, host2) generates an abnormal state, host4 (standby node) can manage the corresponding data and log volumes of any failed node. After the failed node is repaired, the shared disk volume of all other nodes also needs to be accessed. For the HANA cluster, all cluster nodes need to be able to access all shared volumes, but in normal operation of the HANA cluster, each cluster node only performs data operations on its respective data and log volumes, and does not need to perform operations on the data volumes and log volumes of other clusters. All nodes of the HANA cluster can operate data and log volumes of other nodes, and with the increase of the number of nodes of the HANA cluster, the difficulty of technicians in the actual operation and maintenance process is higher, so that the data of a data disk can be lost due to misoperation.
Disclosure of Invention
In view of the above, in order to overcome at least one aspect of the above problems, an embodiment of the present invention provides a method for preventing a disk misoperation in a HANA cluster, including the following steps:
generating a key corresponding to each working node, and respectively writing the key into an LUN (logical unit number) header file corresponding to a volume under each working node;
responding to the working node receiving an operation request for the volume, converting the operation request into an operation command and adding a key corresponding to the working node into the operation command;
sending the operation command added with the key to a bottom storage and comparing the key;
and in response to that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, not operating the volume to be operated and reporting an error.
In some embodiments, further comprising:
and responding to the fact that the key in the operation command is the same as the key in the LUN head file corresponding to the volume to be operated, and carrying out corresponding operation on the volume to be operated according to the operation command.
In some embodiments, further comprising:
and respectively sending the key corresponding to each working node and the identification code of the volume to all other nodes to obtain the mapping relation of the identification codes of each working node, the key and the volume.
In some embodiments, further comprising:
generating a key corresponding to the standby node in response to the detection that the working node fails;
and determining a key corresponding to the failed working node and an identification code of the volume according to the mapping relation, and replacing the key in the LUN header file corresponding to the volume under the failed working node with the key corresponding to the spare node by using the key corresponding to the spare node and the key corresponding to the failed working node.
In some embodiments, replacing a key in the LUN header file corresponding to the volume in the failed working node with a key corresponding to the spare node and a key corresponding to the failed working node, further includes:
deleting the key in the LUN header file corresponding to the volume under the working node with the fault by using the key corresponding to the working node with the fault;
and writing the key corresponding to the standby node into the LUN header file corresponding to the volume under the working node with the fault.
In some embodiments, further comprising:
and sending the key corresponding to the standby node and the identification code of the volume to other non-failed working nodes so as to update the mapping relation.
In some embodiments, in response to detecting that the working node fails, generating a key corresponding to a standby node, further includes:
and switching the process service on the failed working node to the standby node.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a disk misoperation prevention system for HANA clustering, comprising:
the generating module is configured to generate a key corresponding to each working node and write the key into an LUN header file corresponding to a volume under each working node;
the adding module is configured to respond to the fact that the working node receives an operation request for the volume, convert the operation request into an operation command and add a key corresponding to the working node into the operation command;
the sending module is configured to send the operation command added with the key to a bottom storage and compare the key;
and the comparison module is configured to respond that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, and does not operate the volume to be operated and reports an error.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer apparatus, including:
at least one processor; and
a memory storing a computer program operable on the processor, wherein the processor executes any of the above-described methods for preventing a disk malfunction in a HANA cluster when executing the program.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a computer-readable storage medium storing a computer program which, when executed by a processor, performs the steps of any of the above-described methods for preventing a disk malfunction of a HANA cluster.
The invention has one of the following beneficial technical effects: the scheme provided by the invention can not only realize the method for preventing the data disks under other nodes from being operated by mistake, effectively solve the problem of artificial misoperation of the disks, but also ensure the disaster tolerance of the HANA cluster.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other embodiments can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a structure of a HANA cluster;
FIG. 2 is a flowchart illustrating a method for preventing disk misoperation in a HANA cluster according to an embodiment of the present invention;
fig. 3 is a mapping relationship diagram before a node fails according to an embodiment of the present invention;
fig. 4 is a mapping relationship diagram after a node fails according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mailbox-based remote control system according to an embodiment of the present invention;
FIG. 6 is a schematic structural diagram of a computer device provided in an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the following embodiments of the present invention are described in further detail with reference to the accompanying drawings.
It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are used for distinguishing two entities with the same name but different names or different parameters, and it should be noted that "first" and "second" are only used for convenience of expression and should not be construed as a limitation to the embodiments of the present invention, and no description is given in the following embodiments.
According to an aspect of the present invention, an embodiment of the present invention provides a disk misoperation prevention method for HANA cluster, as shown in fig. 2, which may include the steps of:
s1, generating a key corresponding to each working node, and writing the key into the LUN header file corresponding to the volume under each working node;
s2, responding to the operation request of the working node to the volume, converting the operation request into an operation command and adding the key corresponding to the working node into the operation command;
s3, sending the operation command added with the key to a bottom storage and comparing the key;
s4, in response to the fact that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, the volume to be operated is not operated and an error is reported.
The scheme provided by the invention can not only realize the method for preventing the data disks under other nodes from being operated by mistake, effectively solve the problem of artificial misoperation of the disks, but also ensure the disaster tolerance of the HANA cluster.
In some embodiments, in step S1, a Key corresponding to each working node is generated, and the Key is written into the LUN header file corresponding to the volume under each working node, specifically, an SCSI command may be initiated by the SCSI controller on each node to generate a random Key using a random function, the SCSI controller records and retains the Key and sends the Key to the storage controller in the bottom layer storage, and the storage controller writes the Key into the LUN header file corresponding to the volume under each working node.
For example, taking 3+1 HANA cluster nodes as an example, as shown in fig. 3, the HANA cluster nodes host1 to host3 are working nodes, and the nodes host1 to host3 of the HANA cluster generate keys 1, 2, and 3, respectively, and use the generated keys to lock the volumes used by the keys, respectively.
In some embodiments, the method further comprises:
and respectively sending the key corresponding to each working node and the identification code of the volume to all other nodes to obtain the mapping relation of the identification codes of each working node, the key and the volume.
Specifically, the generated keys (key1, key2, key3) are distributed to all HANA cluster nodes (host 1-4, wherein host4 is a standby node), and the node names, the identification codes of the volumes and the mapping relations between the keys are recorded.
In some embodiments, the method further comprises:
and responding to the fact that the key in the operation command is the same as the key in the LUN head file corresponding to the volume to be operated, and carrying out corresponding operation on the volume to be operated according to the operation command.
Specifically, when the operating system of the node receives an I/O request for operating a volume, the request may be converted into an SCSI operating command through the SCSI controller, and a key is attached to the SCSI command and then issued to the storage controller in the underlying storage, and then the storage controller is used to verify whether the key carried in the SCSI command is consistent with the key in the LUN header file corresponding to the volume to be operated. If the two volumes are consistent, the volume can be operated, if the two volumes are inconsistent, the volume can not be operated and an error is reported,
it should be noted that all volumes of the cluster node are in a locked state, and although each node has a key of another node, when a volume is to be operated, only the key of the node is used, so that when a user needs to operate the volume, such as mkvg, mkfs, dd, and the like, if the volume to be operated selected by the user is not the volume corresponding to the node, the user cannot operate the volume, and misoperation of the volumes of other nodes is prevented.
In some embodiments, the method further comprises:
generating a key corresponding to the standby node in response to the detection that the working node fails;
and determining a key corresponding to the failed working node and an identification code of the volume according to the mapping relation, and replacing the key in the LUN header file corresponding to the volume under the failed working node with the key corresponding to the spare node by using the key corresponding to the spare node and the key corresponding to the failed working node.
In some embodiments, replacing a key in the LUN header file corresponding to the volume in the failed working node with a key corresponding to the spare node and a key corresponding to the failed working node, further includes:
deleting a key in an LUN header file corresponding to a volume under the working node with the fault by using the key corresponding to the working node with the fault;
and writing the key corresponding to the standby node into the LUN header file corresponding to the volume under the working node with the fault.
In some embodiments, further comprising:
and sending the key corresponding to the standby node and the identification code of the volume to other working nodes which do not have faults so as to update the mapping relation.
In some embodiments, in response to detecting that the working node fails, generating a key corresponding to a standby node, further includes:
and switching the process service on the failed working node to the standby node.
Specifically, as shown in fig. 4, when a working node of the cluster fails, for example, host2 fails and cannot be accessed, host4 unlocks disk2 locked by host2 using key2 corresponding to host2 according to the mapping table shown in fig. 3. After the Host4 is unlocked, a new key (key4) is generated again, the disk2 is locked by using the key4 according to the same locking flow, and the key4 is redistributed to all HANA cluster nodes to generate a new mapping relation. And the HANA cluster related process service can be switched to host4, so that the HANA cluster disaster tolerance switching is realized.
According to the scheme provided by the invention, the volume is locked, so that when a user needs to operate the volume, if the volumes under other nodes are operated by mistake, the volumes can be directly reported by mistake without being operated by corresponding keys. And the key generated by each node can be shared by all other nodes, so that after the working node fails, the standby node can unlock the volume under the failed working node according to the shared key and ensure cluster disaster tolerance.
Based on the same inventive concept, according to another aspect of the present invention, an embodiment of the present invention further provides a disk misoperation prevention system 400 for HANA clustering, as shown in fig. 5, comprising:
a generating module 401, where the generating module 401 is configured to generate a key corresponding to each working node, and write the key into an LUN header file corresponding to a volume under each working node;
an adding module 402, wherein the adding module 402 is configured to respond to the working node receiving an operation request for a volume, convert the operation request into an operation command, and add a key corresponding to the working node into the operation command;
a sending module 403, where the sending module 403 is configured to send the operation command with the key added to a bottom storage and compare the key;
a comparison module 404, where the comparison module 404 is configured to not operate the to-be-operated volume and report an error in response to that a key in the operation command is different from a key in the LUN header corresponding to the to-be-operated volume.
In some embodiments, the system 400 further comprises a first response module configured to:
and responding to the fact that the key in the operation command is the same as the key in the LUN head file corresponding to the volume to be operated, and performing corresponding operation on the volume to be operated according to the operation command.
In some embodiments, system 400 further comprises a sharing module configured to:
and respectively sending the key corresponding to each working node and the identification code of the volume to all other nodes to obtain the mapping relation of the identification codes of each working node, the key and the volume.
In some embodiments, the sharing module is further configured to:
generating a key corresponding to the standby node in response to the detection that the working node fails;
and determining a key corresponding to the failed working node and an identification code of the volume according to the mapping relation, and replacing the key in the LUN header file corresponding to the volume under the failed working node with the key corresponding to the spare node by using the key corresponding to the spare node and the key corresponding to the failed working node.
In some embodiments, the sharing module is further configured to:
deleting the key in the LUN header file corresponding to the volume under the working node with the fault by using the key corresponding to the working node with the fault;
and writing the key corresponding to the standby node into the LUN header file corresponding to the volume under the working node with the fault.
In some embodiments, the sharing module is further configured to:
and sending the key corresponding to the standby node and the identification code of the volume to other non-failed working nodes so as to update the mapping relation.
In some embodiments, the sharing module is further configured to: and switching the process service on the failed working node to the standby node.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 6, an embodiment of the present invention further provides a computer apparatus 501, comprising:
at least one processor 520; and
the memory 510 and the memory 510 store a computer program 511 that can be executed on the processor, and the processor 520 executes the program to perform any of the above-described steps of the method for preventing a disk malfunction in a HANA cluster.
Based on the same inventive concept, according to another aspect of the present invention, as shown in fig. 7, an embodiment of the present invention further provides a computer-readable storage medium 601, where the computer-readable storage medium 601 stores computer program instructions 610, and the computer program instructions 610, when executed by a processor, perform the steps of any of the above methods for preventing disk misoperation of a HANA cluster.
Finally, it should be noted that, as those skilled in the art can understand, all or part of the processes in the methods of the embodiments described above can be implemented by instructing relevant hardware through a computer program, and the program may be stored in a computer readable storage medium, and when executed, may include the processes of the embodiments of the methods described above.
Further, it should be understood that the computer-readable storage medium herein (e.g., memory) can be either volatile memory or nonvolatile memory, or can include both volatile and nonvolatile memory.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the disclosure herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as software or hardware depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosed embodiments of the present invention.
The foregoing are exemplary embodiments of the present disclosure, but it should be noted that various changes and modifications could be made herein without departing from the scope of the present disclosure as defined by the appended claims. The functions, steps and/or actions of the method claims in accordance with the disclosed embodiments described herein need not be performed in any particular order. Furthermore, although elements of the disclosed embodiments of the invention may be described or claimed in the singular, the plural is contemplated unless limitation to the singular is explicitly stated.
It should be understood that, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly supports the exception. It should also be understood that "and/or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.
The numbers of the embodiments disclosed in the embodiments of the present invention are merely for description, and do not represent the merits of the embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, and the program may be stored in a computer-readable storage medium, where the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk.
Those of ordinary skill in the art will understand that: the discussion of any embodiment above is meant only to be exemplary, and is not intended to intimate that the scope of the disclosure, including the claims, is limited to these examples; within the idea of an embodiment of the invention, also technical features in the above embodiment or in different embodiments may be combined and there are many other variations of the different aspects of the embodiments of the invention as described above, which are not provided in detail for the sake of brevity. Therefore, any omissions, modifications, substitutions, improvements, and the like that may be made without departing from the spirit and principles of the embodiments of the present invention are intended to be included within the scope of the embodiments of the present invention.

Claims (10)

1. A disk misoperation preventing method for an HANA cluster is characterized by comprising the following steps:
generating a key corresponding to each working node, and respectively writing the key into an LUN header file corresponding to the volume under each working node;
responding to the operation request of the working node to the volume, converting the operation request into an operation command and adding a key corresponding to the working node into the operation command;
sending the operation command added with the key to a bottom storage and comparing the key;
and in response to that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, not operating the volume to be operated and reporting an error.
2. The method of claim 1, further comprising:
and responding to the fact that the key in the operation command is the same as the key in the LUN head file corresponding to the volume to be operated, and carrying out corresponding operation on the volume to be operated according to the operation command.
3. The method of claim 1, further comprising:
and respectively sending the key corresponding to each working node and the identification code of the volume to all other nodes to obtain the mapping relation of the identification codes of each working node, the key and the volume.
4. The method of claim 3, further comprising:
generating a key corresponding to the standby node in response to the detection that the working node fails;
and determining a key corresponding to the failed working node and an identification code of the volume according to the mapping relation, and replacing the key in the LUN header file corresponding to the volume under the failed working node with the key corresponding to the spare node by using the key corresponding to the spare node and the key corresponding to the failed working node.
5. The method of claim 4, wherein replacing a key in the LUN header file corresponding to the volume under the failed working node with a key corresponding to the backup node and a key corresponding to the failed working node, further comprises:
deleting the key in the LUN header file corresponding to the volume under the working node with the fault by using the key corresponding to the working node with the fault;
and writing the key corresponding to the standby node into the LUN header file corresponding to the volume under the working node with the fault.
6. The method of claim 4, further comprising:
and sending the key corresponding to the standby node and the identification code of the volume to other working nodes which do not have faults so as to update the mapping relation.
7. The method of claim 4, wherein generating a key corresponding to a backup node in response to detecting the working node fails further comprises:
and switching the process service on the failed working node to the standby node.
8. A disk misoperation system for preventing HANA clustering, comprising:
the generating module is configured to generate a key corresponding to each working node and write the key into an LUN header file corresponding to a volume under each working node;
the adding module is configured to respond to the fact that the working node receives an operation request for the volume, convert the operation request into an operation command and add a key corresponding to the working node into the operation command;
the sending module is configured to send the operation command added with the key to a bottom storage and compare the key;
and the comparison module is configured to respond that the key in the operation command is different from the key in the LUN header file corresponding to the volume to be operated, and not operate the volume to be operated and report an error.
9. A computer device, comprising:
at least one processor; and
memory storing a computer program operable on the processor, characterized in that the processor, when executing the program, performs the steps of the method according to any of claims 1-7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method according to any one of claims 1 to 7.
CN202010788660.6A 2020-08-07 2020-08-07 Disk misoperation method, system, equipment and medium for preventing HANA cluster Active CN111949214B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010788660.6A CN111949214B (en) 2020-08-07 2020-08-07 Disk misoperation method, system, equipment and medium for preventing HANA cluster

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010788660.6A CN111949214B (en) 2020-08-07 2020-08-07 Disk misoperation method, system, equipment and medium for preventing HANA cluster

Publications (2)

Publication Number Publication Date
CN111949214A CN111949214A (en) 2020-11-17
CN111949214B true CN111949214B (en) 2022-07-26

Family

ID=73331762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010788660.6A Active CN111949214B (en) 2020-08-07 2020-08-07 Disk misoperation method, system, equipment and medium for preventing HANA cluster

Country Status (1)

Country Link
CN (1) CN111949214B (en)

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7613947B1 (en) * 2006-11-30 2009-11-03 Netapp, Inc. System and method for storage takeover
CN109639794B (en) * 2018-12-10 2021-07-13 杭州数梦工场科技有限公司 State cluster recovery method, device, equipment and readable storage medium
CN110213230B (en) * 2019-04-26 2020-01-31 特斯联(北京)科技有限公司 network security verification method and device for distributed communication

Also Published As

Publication number Publication date
CN111949214A (en) 2020-11-17

Similar Documents

Publication Publication Date Title
US8433947B2 (en) Computer program, method, and apparatus for controlling data allocation
US9541978B2 (en) Redundancies for reconstruction in mass data storage systems
US6266785B1 (en) File system filter driver apparatus and method
US7133964B2 (en) Raid assimilation method and apparatus
US8572431B2 (en) Disaster recovery framework
JP4371724B2 (en) Storage system and storage device system
CN113515499B (en) Database service method and system
US8707098B2 (en) Recovery procedure for a data storage system
US7702757B2 (en) Method, apparatus and program storage device for providing control to a networked storage architecture
CN110569149B (en) Method for triggering Oracle disaster recovery automatic emergency switching based on fault detection
KR100825720B1 (en) File management method in file system and metadata server for the same
US6366965B1 (en) System for updating an identity of a device in response to determining that a neighbor device has an identity different from one stored therein
JPH05307445A (en) Method and device for deciding states of a pair of mirrored data storage units in data processing system
KR20060052773A (en) System and method of relational configuration mirroring
US5996087A (en) Program product for serializating actions of independent process groups
US8423776B2 (en) Storage systems and data storage method
CN111949214B (en) Disk misoperation method, system, equipment and medium for preventing HANA cluster
US6754753B2 (en) Atomic ownership change operation for input/output (I/O) bridge device in clustered computer system
CN112732492A (en) Extraction backup method and system based on cloud database
US20060155718A1 (en) Multiple copy track stage recovery in a data storage system
US20190354433A1 (en) Parity log with by-pass
US10809940B1 (en) Multilevel resiliency
Pâris et al. Self-adaptive disk arrays
CN117667526A (en) Data distributed storage fault database switching method and system
CN117851132B (en) Data recovery optimization method for distributed object storage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant