CN112015590A - Multi-level disaster recovery method and device and electronic equipment - Google Patents

Multi-level disaster recovery method and device and electronic equipment Download PDF

Info

Publication number
CN112015590A
CN112015590A CN202010682556.9A CN202010682556A CN112015590A CN 112015590 A CN112015590 A CN 112015590A CN 202010682556 A CN202010682556 A CN 202010682556A CN 112015590 A CN112015590 A CN 112015590A
Authority
CN
China
Prior art keywords
data
disaster recovery
service system
party data
party
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010682556.9A
Other languages
Chinese (zh)
Other versions
CN112015590B (en
Inventor
汪正阳
张潮华
郑彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qilu Information Technology Co Ltd
Original Assignee
Beijing Qilu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qilu Information Technology Co Ltd filed Critical Beijing Qilu Information Technology Co Ltd
Priority to CN202010682556.9A priority Critical patent/CN112015590B/en
Publication of CN112015590A publication Critical patent/CN112015590A/en
Application granted granted Critical
Publication of CN112015590B publication Critical patent/CN112015590B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Alarm Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a multi-level disaster recovery method, a multi-level disaster recovery device and electronic equipment, wherein the method comprises the following steps: setting a multi-stage disaster recovery operation strategy for the data service system, and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster recovery operation strategy; monitoring whether the third-party data is abnormal or not; if the third-party data is abnormal, judging the abnormal type of the third-party data; and switching the operation strategy of the data service system to a disaster recovery operation strategy of a corresponding level according to the abnormal type of the third-party data. According to the data service system and the data service method, the multi-level disaster backup operation strategy is set for the data service system, when the third-party data is monitored to be abnormal, the operation strategy of the data service system is switched to the disaster backup operation strategy of the corresponding level according to the abnormal type of the third-party data, so that the normal operation of the data service system is ensured and the stability of the system is improved when the third-party data is abnormal.

Description

Multi-level disaster recovery method and device and electronic equipment
Technical Field
The invention relates to the technical field of databases, in particular to a multi-level disaster recovery method, a multi-level disaster recovery device, electronic equipment and a computer readable medium.
Background
As digital economies develop, third party data is being adopted by more and more businesses. The third-party data refers to data collected from other platforms or websites by professional data collection companies. The method can reflect rich crowd attributes and behavior attributes, and can expand service audience groups, improve positioning accuracy and discover new audiences through third party data.
For example, in the financial industry, more and more financial institutions use third party data in order to optimize wind control rules and reduce bad account losses. However, the third-party data is also a double-edged sword, on one hand, the accuracy of wind control is improved, and on the other hand, the stability of the third-party data can bring some hidden dangers to a wind control strategy. Therefore, a disaster recovery strategy for third-party data is needed to cope with the abnormality of the third-party data.
Disclosure of Invention
The invention aims to solve the technical problem of data service system failure or sudden disaster caused by third-party data abnormity.
In order to solve the above technical problem, a first aspect of the present invention provides a multi-level disaster recovery method for disaster recovery of a data service system, where the data service system uses third-party data in real time under normal working conditions, and the method includes:
setting a multi-stage disaster recovery operation strategy for the data service system, and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster recovery operation strategy;
monitoring whether the third-party data is abnormal or not;
if the third-party data is abnormal, judging the abnormal type of the third-party data;
and switching the operation strategy of the data service system to a disaster recovery operation strategy of a corresponding level according to the abnormal type of the third-party data.
According to a preferred embodiment of the present invention, the setting of the multi-stage disaster recovery operation policy includes:
and setting a first-level disaster recovery strategy for the situation that the third-party data is completely interrupted.
According to a preferred embodiment of the present invention, if the exception type is that the third-party data is completely interrupted, all data traffic of the current data service system is switched to the first-level disaster recovery policy.
According to a preferred embodiment of the present invention, the setting of the multi-stage disaster recovery operation policy includes:
and setting a second-level disaster recovery strategy for the condition that the quality of the third-party data is reduced.
According to a preferred embodiment of the present invention, if the abnormal type is a third-party data quality degradation, the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy.
According to a preferred embodiment of the present invention, further comprising:
if the data traffic of the current data service system for the normal operation strategy is at least partially switched to the second-level disaster recovery strategy, monitoring the effective rate of third-party data in real time;
and adjusting the data flow switched to the second-level disaster recovery strategy according to the effective rate of the third-party data.
According to a preferred embodiment of the present invention, if the abnormal type is a third-party data quality degradation, at least partially switching the data traffic of the current data service system for the normal operation policy to the second-level disaster recovery policy includes:
if the effective rate of the third-party data is greater than the first effective rate and less than the second effective rate, acquiring new third-party data;
and if the effective rate of the third-party data is less than the first effective rate, at least partially switching the data traffic of the current data service system for the normal operation strategy to the second-level disaster recovery strategy.
In order to solve the above technical problem, a second aspect of the present invention provides a multi-level disaster recovery device for disaster recovery of a data service system, where the data service system uses third-party data in real time under normal working conditions, and the device includes:
the data service system comprises a setting module, a data service module and a data processing module, wherein the setting module is used for setting a multi-stage disaster backup operation strategy for the data service system and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster backup operation strategy;
the monitoring module is used for monitoring whether the third-party data is abnormal or not;
the judging module is used for judging the abnormal type of the third-party data if the third-party data is abnormal;
and the switching module is used for switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third-party data.
According to a preferred embodiment of the present invention, the setting module is specifically configured to: and setting a first-level disaster recovery strategy for the situation that the third-party data is completely interrupted.
According to a preferred embodiment of the present invention, if the exception type is a complete interruption of the third-party data, the switching module is configured to switch all data traffic of the current data service system to the first-level disaster recovery policy.
According to a preferred embodiment of the present invention, the setting module is specifically configured to: and setting a second-level disaster recovery strategy for the condition that the quality of the third-party data is reduced.
According to a preferred embodiment of the present invention, if the abnormal type is a third-party data quality degradation, the switching module is configured to switch the data traffic of the current data service system, which is used for the normal operation policy, to the second-level disaster recovery policy at least partially.
According to a preferred embodiment of the present invention, further comprising:
the real-time monitoring module is used for monitoring the effective rate of the third-party data in real time if the data traffic of the current data service system for the normal operation strategy is at least partially switched to the second-stage disaster recovery strategy;
and the adjusting module is used for adjusting the data flow switched to the second-level disaster recovery strategy according to the effective rate of the third-party data.
According to a preferred embodiment of the present invention, the switching module comprises:
the acquisition module is used for acquiring new third-party data if the effective rate of the third-party data is greater than the first effective rate and less than the second effective rate;
and the sub-switching module is used for at least partially switching the data traffic of the current data service system for the normal operation strategy to the second-level disaster recovery strategy if the effective rate of the third-party data is less than the first effective rate.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, comprising:
a processor; and
a memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
In order to solve the above technical problem, a fourth aspect of the present invention proposes a computer-readable storage medium, wherein the computer-readable storage medium stores one or more programs that, when executed by a processor, implement the above method.
The data service system of the invention uses the third party data in real time under the normal working condition, sets a multi-stage disaster backup operation strategy for the data service system, and enables the data service system to allocate the current data flow in proportion to simultaneously operate the normal operation strategy and the multi-stage disaster backup operation strategy; when the third-party data is monitored to be abnormal, the operation strategy of the data service system is switched to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third-party data, so that the normal operation of the data service system is ensured and the stability of the system is improved when the third-party data is abnormal.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects obtained more clear, the following will describe in detail the embodiments of the present invention with reference to the accompanying drawings. It should be noted, however, that the drawings described below are only illustrations of exemplary embodiments of the invention, from which other embodiments can be derived by those skilled in the art without inventive step.
FIG. 1 is a schematic flow diagram of a multi-level disaster recovery method of the present invention;
fig. 2 is a schematic diagram of setting a multi-stage disaster recovery strategy according to the present invention;
fig. 3 is a schematic structural framework diagram of a multi-level disaster recovery device according to the present invention;
FIG. 4 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 5 is a schematic diagram of one embodiment of a computer-readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention may be embodied in many specific forms, and should not be construed as limited to the embodiments set forth herein. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, properties, effects or other characteristics described in a certain embodiment may be combined in any suitable manner in one or more other embodiments, while still complying with the technical idea of the invention.
In describing particular embodiments, specific details of structures, properties, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by one skilled in the art. However, it is not excluded that a person skilled in the art may implement the invention in a specific case without the above-described structures, performances, effects or other features.
The flow chart in the drawings is only an exemplary flow demonstration, and does not represent that all the contents, operations and steps in the flow chart are necessarily included in the scheme of the invention, nor does it represent that the execution is necessarily performed in the order shown in the drawings. For example, some operations/steps in the flowcharts may be divided, some operations/steps may be combined or partially combined, and the like, and the execution order shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The same reference numerals denote the same or similar elements, components, or parts throughout the drawings, and thus, a repetitive description thereof may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components, or sections, these elements, components, or sections should not be limited by these terms. That is, these phrases are used only to distinguish one from another. For example, a first device may also be referred to as a second device without departing from the spirit of the present invention. Furthermore, the term "and/or", "and/or" is intended to include all combinations of any one or more of the listed items.
The disaster recovery, namely disaster recovery, is characterized in that a systematic data emergency mode is established in advance by using scientific technical means and methods to deal with the occurrence of disasters. The content of the method comprises data backup and system backup, service continuous planning, personnel architecture, communication guarantee, crisis public relations, disaster recovery planning, disaster recovery plan, service recovery plan, emergency response, third-party cooperative organization and supply chain crisis management and the like.
The multi-level disaster recovery method provided by the invention is used for disaster recovery of the data service system, and the data service system uses third-party data in real time under the normal working condition. Referring to fig. 1, fig. 1 is a flowchart of a multi-level disaster recovery method provided in the present invention, and as shown in fig. 1, the method includes:
s1, setting a multi-stage disaster recovery operation strategy for the data service system, and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster recovery operation strategy;
wherein the current data traffic is new user data entering the data service system. The multi-stage disaster preparation operation strategy is used for dealing with different abnormal types of third-party data.
In one example, as shown in fig. 2, a first-level disaster recovery policy is set to cope with the exception type of the third-party data complete interruption (i.e., the data service system does not receive any third-party data). Taking financial wind control business as an example, in the first-level disaster recovery policy, a wind control policy without any third-party data is set, for example, a wind control policy using first-party data or second-party data is set, where the first-party data, that is, data owned by an enterprise, is data collected by the enterprise directly from audiences (including clients, website visitors, and social media concerns), may be business data generated by users in an enterprise database, and may also be behavior data of some users collected through logs. The second party data is the first party data that is not collected by the enterprise. Second party data is sometimes shared between trusted partners who, if both parties are in favor of the business, agree to share the audience's insight. For example, if a software company resells its product in collaboration with an agent partner, the software company may share its first party data with the agent, which the agent partner will use as second party data to lock and attract new customers.
In the invention, the wind control strategy without any third-party data is the same as the wind control strategy in normal operation, but the adopted data is different, so that when the third party number is interrupted, the wind control strategy without any third-party data can be directly adopted, the time for reanalyzing and fitting the risk strategy rule is saved, and the risk loss is reduced.
In another example, as shown in fig. 2, a second-level disaster recovery policy is set to cope with the abnormal type of the data quality degradation of the third party. Taking financial wind control business as an example, the data quality reduction may be reduction of the discrimination of the data to the risk or incapability of discriminating the risk. Specifically, a wind control strategy containing multi-party data can be set. For example, a wind control policy is set that includes first party data, second party data, and third party data. In this way, when the quality of the third-party data is reduced, the wind control strategy can be continuously executed according to the second-party data and the third-party data.
S2, monitoring whether the third-party data is abnormal or not;
in the invention, the third-party data abnormality refers to a situation that a data service system has business risks due to instability of third-party data. The data quality can be specifically completely interrupted by the third party data, or the data quality of the third party is reduced.
S3, if the third-party data is abnormal, judging the abnormal type of the third-party data;
the complete interruption of the third-party data can be judged by monitoring whether the data service system can receive the third-party data in real time. The quality reduction of the third-party data can be judged according to whether the discrimination degree of the third-party data on the risks in the wind control strategy or the wind control model is reduced.
And S4, switching the operation strategy of the data service system to a disaster recovery operation strategy of a corresponding level according to the abnormal type of the third-party data.
Illustratively, if the exception type is that the third-party data is completely interrupted, all data traffic of the current data service system is switched to the first-stage disaster recovery policy.
And if the abnormal type is the third-party data quality reduction, at least partially switching the data flow of the current data service system for the normal operation strategy to the second-level disaster recovery strategy so as to improve the data quality. In a specific manner, the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy according to the validity of the third-party data, where the validity of the third-party data refers to the capability of the third-party data to distinguish the user attribute, and the smaller the distinguishing degree of the third-party data to the user is, the smaller the validity of the third-party data is. Taking financial wind control business as an example, the effectiveness of the third party data can be measured according to the degree of discrimination of the third party data to the risk users in the wind control strategy or the wind control model.
Further, a first effective rate and a second effective rate may be set to perform switching of the data traffic of the normal operation policy to the second-level disaster recovery policy, where the first effective rate is smaller than the second effective rate. If the effective rate of the third-party data is greater than the first effective rate and less than the second effective rate, the effective rate of the current third-party data is lower, the current third-party data can be stopped, and new third-party data can be collected for use. And if the effective rate of the third-party data is less than the first effective rate, which indicates that the third-party data cannot meet the business requirement, at least partially switching the data traffic of the current data service system for the normal operation strategy to the second-level disaster recovery strategy.
In another specific embodiment, if the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy, the effective rate of the third-party data is monitored in real time; and adjusting the data flow switched to the second-level disaster recovery strategy in real time according to the effective rate of the third-party data so as to improve the utilization rate of the third-party data. For example, the effective rate of the third-party data is greater than the preset effective rate, and the data traffic switched to the second-level disaster recovery strategy is increased; or, when the effective rate of the third-party data is greater than the first preset efficiency and less than the second preset efficiency, adjusting the data traffic switched to the second-level disaster recovery policy to be within a first preset range, for example, within a ratio range of 40% of the whole data traffic. And when the effective rate of the third-party data is greater than a second preset efficiency, adjusting the data traffic switched to the second-level disaster recovery strategy to be within a second preset range, such as a proportion range of 40-70% of the whole data traffic, and the like.
The data service system of the invention uses the third party data in real time under the normal working condition, sets a multi-stage disaster backup operation strategy for the data service system, and enables the data service system to allocate the current data flow in proportion to simultaneously operate the normal operation strategy and the multi-stage disaster backup operation strategy; when the third-party data is monitored to be abnormal, the operation strategy of the data service system is switched to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third-party data, so that the normal operation of the data service system is ensured and the stability of the system is improved when the third-party data is abnormal.
Fig. 3 is a schematic structural diagram of a multi-tier disaster recovery device according to the present invention, where the multi-tier disaster recovery device is used for disaster recovery of a data service system, and the data service system uses third-party data in real time under a normal working condition, as shown in fig. 3, the device includes:
a setting module 31, configured to set a multi-stage disaster recovery operation policy for the data service system, and allocate, by the data service system, the current data traffic in proportion to simultaneously operate a normal operation policy and a multi-stage disaster recovery operation policy;
the monitoring module 32 is used for monitoring whether the third-party data is abnormal;
the judging module 33 is configured to judge an abnormal type of the third-party data if the third-party data is abnormal;
and a switching module 34, configured to switch the operation policy of the data service system to a disaster recovery operation policy of a corresponding level according to the abnormal type of the third-party data.
In a specific embodiment, the setting module 31 is specifically configured to: and setting a first-level disaster recovery strategy for the situation that the third-party data is completely interrupted.
If the abnormal type is that the third-party data is completely interrupted, the switching module 34 is configured to switch all data traffic of the current data service system to the first-level disaster recovery policy.
In another specific embodiment, the setting module 31 is specifically configured to: and setting a second-level disaster recovery strategy for the condition that the quality of the third-party data is reduced.
If the abnormal type is a third-party data quality degradation, the switching module 34 is configured to switch the data traffic of the current data service system for the normal operation policy to the second-level disaster recovery policy at least partially.
Further, the apparatus further comprises:
the real-time monitoring module 35 is configured to monitor the effective rate of the third-party data in real time if the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy;
and an adjusting module 36, configured to adjust a data traffic switched to the second-level disaster recovery policy according to the effective rate of the third-party data.
In a specific embodiment, the switching module 34 includes:
the acquisition module is used for acquiring new third-party data if the effective rate of the third-party data is greater than the first effective rate and less than the second effective rate;
and the sub-switching module is used for at least partially switching the data traffic of the current data service system for the normal operation strategy to the second-level disaster recovery strategy if the effective rate of the third-party data is less than the first effective rate.
Those skilled in the art will appreciate that the modules in the above-described embodiments of the apparatus may be distributed as described in the apparatus, and may be correspondingly modified and distributed in one or more apparatuses other than the above-described embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
In the following, embodiments of the electronic device of the present invention are described, which may be regarded as an implementation in physical form for the above-described embodiments of the method and apparatus of the present invention. Details described in the embodiments of the electronic device of the invention should be considered supplementary to the embodiments of the method or apparatus described above; for details which are not disclosed in embodiments of the electronic device of the invention, reference may be made to the above-described embodiments of the method or the apparatus.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 400 of the exemplary embodiment is represented in the form of a general-purpose data processing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting different electronic device components (including the memory unit 420 and the processing unit 410), a display unit 440, and the like.
The storage unit 420 stores a computer-readable program, which may be a code of a source program or a read-only program. The program may be executed by the processing unit 410 such that the processing unit 410 performs the steps of various embodiments of the present invention. For example, the processing unit 410 may perform the steps as shown in fig. 1.
The storage unit 420 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM)4201 and/or a cache memory unit 4202, and may further include a read only memory unit (ROM) 4203. The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: operating the electronic device, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 430 may be any bus representing one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 400 may also communicate with one or more external devices 300 (e.g., keyboard, display, network device, bluetooth device, etc.), enable a user to interact with the electronic device 400 via the external devices 400, and/or enable the electronic device 400 to communicate with one or more other data processing devices (e.g., router, modem, etc.). Such communication may occur via input/output (I/O) interfaces 450, and may also occur via a network adapter 460 with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network such as the Internet). The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in the electronic device 400, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, and data backup storage electronics, among others.
FIG. 5 is a schematic diagram of one computer-readable medium embodiment of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electronic device, apparatus, or device that is electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer-readable medium to implement the above-described method of the invention, namely: setting a multi-stage disaster recovery operation strategy for the data service system, and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster recovery operation strategy; monitoring whether the third-party data is abnormal or not; if the third-party data is abnormal, judging the abnormal type of the third-party data; and switching the operation strategy of the data service system to a disaster recovery operation strategy of a corresponding level according to the abnormal type of the third-party data.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments of the present invention described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present invention can be embodied in the form of a software product, which can be stored in a computer-readable storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to make a data processing device (which can be a personal computer, a server, or a network device, etc.) execute the above-mentioned method according to the present invention.
The computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including object oriented programming languages such as Java, C + + or the like and conventional procedural programming languages, such as "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
In summary, the present invention can be implemented as a method, an apparatus, an electronic device, or a computer-readable medium executing a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or a Digital Signal Processor (DSP).
While the foregoing embodiments have described the objects, aspects and advantages of the present invention in further detail, it should be understood that the present invention is not inherently related to any particular computer, virtual machine or electronic device, and various general-purpose machines may be used to implement the present invention. The invention is not to be considered as limited to the specific embodiments thereof, but is to be understood as being modified in all respects, all changes and equivalents that come within the spirit and scope of the invention.

Claims (10)

1. A multi-level disaster recovery method is used for disaster recovery of a data service system, wherein the data service system uses third-party data in real time under normal working conditions, and the method is characterized by comprising the following steps:
setting a multi-stage disaster recovery operation strategy for the data service system, and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster recovery operation strategy;
monitoring whether the third-party data is abnormal or not;
if the third-party data is abnormal, judging the abnormal type of the third-party data;
and switching the operation strategy of the data service system to a disaster recovery operation strategy of a corresponding level according to the abnormal type of the third-party data.
2. The method of claim 1, wherein setting the multi-level disaster recovery operation policy comprises:
and setting a first-level disaster recovery strategy for the situation that the third-party data is completely interrupted.
3. The method according to any one of claims 1-2, wherein if the exception type is a complete interruption of third-party data, all data traffic of a current data service system is switched to the first-level disaster recovery policy.
4. The method according to any one of claims 1-3, wherein setting a multi-level disaster recovery operation policy comprises:
and setting a second-level disaster recovery strategy for the condition that the quality of the third-party data is reduced.
5. The method according to any one of claims 1 to 4, wherein if the anomaly type is third-party data quality degradation, the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy.
6. The method according to any one of claims 1-5, further comprising:
if the data traffic of the current data service system for the normal operation strategy is at least partially switched to the second-level disaster recovery strategy, monitoring the effective rate of third-party data in real time;
and adjusting the data flow switched to the second-level disaster recovery strategy according to the effective rate of the third-party data.
7. The method according to any one of claims 1 to 6, wherein if the anomaly type is a third-party data quality degradation, at least partially switching the data traffic of the current data service system for the normal operation policy to the second-level disaster recovery policy comprises:
if the effective rate of the third-party data is greater than the first effective rate and less than the second effective rate, acquiring new third-party data;
and if the effective rate of the third-party data is less than the first effective rate, at least partially switching the data traffic of the current data service system for the normal operation strategy to the second-level disaster recovery strategy.
8. A multi-level disaster recovery device for disaster recovery of a data service system, wherein the data service system uses third-party data in real time under normal working conditions, the device comprising:
the data service system comprises a setting module, a data service module and a data processing module, wherein the setting module is used for setting a multi-stage disaster backup operation strategy for the data service system and enabling the data service system to allocate the current data flow in proportion to simultaneously operate a normal operation strategy and the multi-stage disaster backup operation strategy;
the monitoring module is used for monitoring whether the third-party data is abnormal or not;
the judging module is used for judging the abnormal type of the third-party data if the third-party data is abnormal;
and the switching module is used for switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third-party data.
9. An electronic device, comprising:
a processor; and
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-7.
10. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs which, when executed by a processor, implement the method of any of claims 1-7.
CN202010682556.9A 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment Active CN112015590B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010682556.9A CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010682556.9A CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112015590A true CN112015590A (en) 2020-12-01
CN112015590B CN112015590B (en) 2023-11-14

Family

ID=73498812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010682556.9A Active CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112015590B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277376A (en) * 2022-09-29 2022-11-01 深圳华锐分布式技术股份有限公司 Disaster recovery switching method, device, equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8103906B1 (en) * 2010-10-01 2012-01-24 Massoud Alibakhsh System and method for providing total real-time redundancy for a plurality of client-server systems
CN103473112A (en) * 2013-09-03 2013-12-25 北京邮电大学 Disaster backup information system simulation method based on two places and three centers
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN104579765A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Disaster tolerance method and device for cluster system
CN106254166A (en) * 2016-09-30 2016-12-21 中国银联股份有限公司 A kind of cloud platform resource allocation method based on Disaster Preparation Center and system
CN109753385A (en) * 2019-01-14 2019-05-14 重庆邮电大学 A kind of restoration methods and system towards the monitoring of stream calculation system exception
CN109766198A (en) * 2018-12-28 2019-05-17 深圳前海微众银行股份有限公司 Stream Processing method, apparatus, equipment and computer readable storage medium
CN110362454A (en) * 2019-06-29 2019-10-22 北京淇瑀信息科技有限公司 A kind of alarm method, device and electronic equipment for supporting configurable decision engine
CN110609845A (en) * 2018-06-15 2019-12-24 网宿科技股份有限公司 Big data redundancy disaster recovery method, big data service system and query method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8103906B1 (en) * 2010-10-01 2012-01-24 Massoud Alibakhsh System and method for providing total real-time redundancy for a plurality of client-server systems
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN103473112A (en) * 2013-09-03 2013-12-25 北京邮电大学 Disaster backup information system simulation method based on two places and three centers
CN104579765A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Disaster tolerance method and device for cluster system
CN106254166A (en) * 2016-09-30 2016-12-21 中国银联股份有限公司 A kind of cloud platform resource allocation method based on Disaster Preparation Center and system
CN110609845A (en) * 2018-06-15 2019-12-24 网宿科技股份有限公司 Big data redundancy disaster recovery method, big data service system and query method
CN109766198A (en) * 2018-12-28 2019-05-17 深圳前海微众银行股份有限公司 Stream Processing method, apparatus, equipment and computer readable storage medium
CN109753385A (en) * 2019-01-14 2019-05-14 重庆邮电大学 A kind of restoration methods and system towards the monitoring of stream calculation system exception
CN110362454A (en) * 2019-06-29 2019-10-22 北京淇瑀信息科技有限公司 A kind of alarm method, device and electronic equipment for supporting configurable decision engine

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
夏红燕;: "信息网络分布式数据容灾应用研究", 电脑知识与技术, no. 12, pages 36 - 39 *
王淼: "证券业信息系统备份能力建设应用研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》, no. 4, pages 138 - 73 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277376A (en) * 2022-09-29 2022-11-01 深圳华锐分布式技术股份有限公司 Disaster recovery switching method, device, equipment and medium

Also Published As

Publication number Publication date
CN112015590B (en) 2023-11-14

Similar Documents

Publication Publication Date Title
US7813947B2 (en) Systems and methods for optimizing business processes, complying with regulations, and identifying threat and vulnerabilty risks for an enterprise
US11030027B2 (en) System for technology anomaly detection, triage and response using solution data modeling
Sun et al. A dependability model to enhance security of cloud environment using system-level virtualization techniques
US20050065904A1 (en) Methods for optimizing business processes, complying with regulations, and identifying threat and vulnerabilty risks for an enterprise
WO2005036307A2 (en) System for optimizing a business process
JP2022118108A (en) Log auditing method, device, electronic apparatus, medium and computer program
CN113312341B (en) Data quality monitoring method, system and computer equipment
US20220405535A1 (en) Data log content assessment using machine learning
US20200372372A1 (en) Predicting the disaster recovery invocation response time
Montesino et al. Automation possibilities in information security management
US20180324062A1 (en) Incident management for complex information technology platforms
Apriliana et al. Risk analysis of IT applications using FMEA and AHP SAW method with COBIT 5
CN112015590B (en) Multi-level disaster recovery method and device and electronic equipment
CN111414490A (en) Method and device for determining lost connection restoration information, electronic equipment and storage medium
JP7305641B2 (en) Methods and systems for tracking application activity data from remote devices and generating corrective behavior data structures for remote devices
CN113806225B (en) Business abnormal node identification method and device and electronic equipment
CN111476533A (en) Internet management platform based on information interaction
CN114880156A (en) Task flow processing method and device and electronic equipment
CN112800006B (en) Log storage method and device for network equipment
CN115221892A (en) Work order data processing method and device, storage medium and electronic equipment
CN114756301A (en) Log processing method, device and system
CN114679295A (en) Firewall security configuration method and device
CN114827157A (en) Cluster task processing method, device and system, electronic equipment and readable medium
Lin et al. An analysis of using state of the art technologies to implement real-time continuous assurance
US20220019603A1 (en) Systems and methods for classifying data received from unknown entities

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant