CN112015590B - Multi-level disaster recovery method and device and electronic equipment - Google Patents

Multi-level disaster recovery method and device and electronic equipment Download PDF

Info

Publication number
CN112015590B
CN112015590B CN202010682556.9A CN202010682556A CN112015590B CN 112015590 B CN112015590 B CN 112015590B CN 202010682556 A CN202010682556 A CN 202010682556A CN 112015590 B CN112015590 B CN 112015590B
Authority
CN
China
Prior art keywords
data
disaster recovery
party data
service system
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010682556.9A
Other languages
Chinese (zh)
Other versions
CN112015590A (en
Inventor
汪正阳
张潮华
郑彦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qiyu Information Technology Co Ltd
Original Assignee
Beijing Qiyu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qiyu Information Technology Co Ltd filed Critical Beijing Qiyu Information Technology Co Ltd
Priority to CN202010682556.9A priority Critical patent/CN112015590B/en
Publication of CN112015590A publication Critical patent/CN112015590A/en
Application granted granted Critical
Publication of CN112015590B publication Critical patent/CN112015590B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Alarm Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a multi-level disaster recovery method, a device and electronic equipment, wherein the method comprises the following steps: setting a multi-level disaster recovery operation strategy for the data service system, and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy; monitoring whether the third party data is abnormal; if the third party data is abnormal, judging the abnormal type of the third party data; and switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data. According to the invention, the multistage disaster recovery operation strategy is set for the data service system, when the abnormality of the third-party data is monitored, the operation strategy of the data service system is switched to the disaster recovery operation strategy of the corresponding grade according to the abnormality type of the third-party data, so that the normal operation of the data service system is ensured and the system stability is improved when the third-party data is abnormal.

Description

Multi-level disaster recovery method and device and electronic equipment
Technical Field
The present invention relates to the field of database technologies, and in particular, to a method and apparatus for multi-level disaster recovery, an electronic device, and a computer readable medium.
Background
With the development of digital economies, third party data is being adopted by more and more businesses. The third party data refers to data collected from other platforms or websites by professional data collection companies. The method can reflect rich crowd attributes and behavior attributes, and can enlarge business audience groups, improve positioning accuracy and discover new audiences through third-party data.
For example, in the financial industry, to optimize the wind control rules, to reduce bad account loss, more and more financial institutions may use third party data. However, the third party data is also a double-edged sword, on one hand, the accuracy of wind control is improved, and on the other hand, the stability of the third party data can bring some hidden trouble to a wind control strategy. Therefore, a disaster recovery policy for third party data is needed to cope with anomalies in third party data.
Disclosure of Invention
The invention aims to solve the technical problem of data service system faults or sudden disasters caused by third party data anomalies.
In order to solve the technical problem, a first aspect of the present invention provides a multi-level disaster recovery method for disaster recovery of a data service system, where the data service system uses third party data in real time under a normal working condition, the method includes:
setting a multi-level disaster recovery operation strategy for the data service system, and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy;
monitoring whether the third party data is abnormal;
if the third party data is abnormal, judging the abnormal type of the third party data;
and switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data.
According to a preferred embodiment of the present invention, the setting a multi-level disaster recovery operation policy includes:
and setting a first-stage disaster recovery strategy for the situation that the third party data is completely interrupted.
According to a preferred embodiment of the present invention, if the anomaly type is complete interruption of third party data, the data traffic of the current data service system is completely switched to the first-level disaster recovery strategy.
According to a preferred embodiment of the present invention, the setting a multi-level disaster recovery operation policy includes:
and setting a second-level disaster recovery strategy for the condition that the third party data quality is reduced.
According to a preferred embodiment of the present invention, if the anomaly type is a third party data quality degradation, the data traffic of the current data service system for the normal operation policy is at least partially switched to the second level disaster recovery policy.
According to a preferred embodiment of the present invention, further comprising:
if the data flow of the current data service system for the normal operation strategy is at least partially switched to the second-level disaster recovery strategy, monitoring the effective rate of the third-party data in real time;
and according to the effective rate of the third party data, adjusting the data flow switched to the second-level disaster recovery strategy.
According to a preferred embodiment of the present invention, if the anomaly type is a third party data quality degradation, switching the data traffic of the current data service system for the normal operation policy to the second level disaster recovery policy at least partially includes:
if the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate, collecting new third party data;
and if the effective rate of the third party data is smaller than the first effective rate, switching the data flow of the current data service system for the normal operation strategy to the second-level disaster recovery strategy at least partially.
In order to solve the above technical problem, a second aspect of the present invention provides a multi-level disaster recovery device for disaster recovery of a data service system, where the data service system uses third party data in real time under normal working conditions, the device includes:
the setting module is used for setting a multi-level disaster recovery operation strategy for the data service system and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy;
the monitoring module is used for monitoring whether the third party data is abnormal or not;
the judging module is used for judging the abnormal type of the third party data if the third party data is abnormal;
and the switching module is used for switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data.
According to a preferred embodiment of the present invention, the setting module is specifically configured to: and setting a first-stage disaster recovery strategy for the situation that the third party data is completely interrupted.
According to a preferred embodiment of the present invention, if the anomaly type is a complete interruption of third party data, the switching module is configured to switch all data traffic of the current data service system to the first-level disaster recovery policy.
According to a preferred embodiment of the present invention, the setting module is specifically configured to: and setting a second-level disaster recovery strategy for the condition that the third party data quality is reduced.
According to a preferred embodiment of the present invention, if the anomaly type is a third party data quality degradation, the switching module is configured to at least partially switch the data traffic of the current data service system for the normal operation policy to the second-level disaster recovery policy.
According to a preferred embodiment of the present invention, further comprising:
the real-time monitoring module is used for monitoring the effective rate of the third party data in real time if the data flow of the current data service system for the normal operation strategy is at least partially switched to the second-level disaster recovery strategy;
and the adjusting module is used for adjusting the data flow switched to the second-level disaster recovery strategy according to the effective rate of the third-party data.
According to a preferred embodiment of the invention, the switching module comprises:
the acquisition module is used for acquiring new third party data if the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate;
and the sub-switching module is used for switching the data traffic of the current data service system for the normal operation strategy to the second-stage disaster recovery strategy at least partially if the effective rate of the third-party data is smaller than the first effective rate.
To solve the above technical problem, a third aspect of the present invention provides an electronic device, including:
a processor; and
a memory storing computer executable instructions that, when executed, cause the processor to perform the method described above.
In order to solve the above technical problem, a fourth aspect of the present invention proposes a computer-readable storage medium storing one or more programs that when executed by a processor, implement the above method.
The data service system of the invention uses the third party data in real time under the normal working condition, and the data service system is distributed in proportion to the current data flow so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy by setting the multi-level disaster recovery operation strategy for the data service system; when the third party data is monitored to be abnormal, the operation strategy of the data service system is switched to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data, so that the normal operation of the data service system is ensured and the system stability is improved when the third party data is abnormal.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects achieved more clear, specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted, however, that the drawings described below are merely illustrative of exemplary embodiments of the present invention and that other embodiments of the drawings may be derived from these drawings by those skilled in the art without undue effort.
FIG. 1 is a schematic flow chart of a multi-level disaster recovery method of the present invention;
FIG. 2 is a schematic diagram of the present invention for setting up a multi-level disaster recovery strategy;
FIG. 3 is a schematic diagram of a multi-level disaster recovery device according to the present invention;
FIG. 4 is a block diagram of an exemplary embodiment of an electronic device in accordance with the present invention;
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown, although the exemplary embodiments may be practiced in various specific ways. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, capabilities, effects, or other features described in a particular embodiment may be incorporated in one or more other embodiments in any suitable manner without departing from the spirit of the present invention.
In describing particular embodiments, specific details of construction, performance, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by those skilled in the art. It is not excluded, however, that one skilled in the art may implement the present invention in a particular situation in a solution that does not include the structures, properties, effects, or other characteristics described above.
The flow diagrams in the figures are merely exemplary flow illustrations and do not represent that all of the elements, operations, and steps in the flow diagrams must be included in the aspects of the present invention, nor that the steps must be performed in the order shown in the figures. For example, some operations/steps in the flowcharts may be decomposed, some operations/steps may be combined or partially combined, etc., and the order of execution shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus repeated descriptions of the same or similar elements, components or portions may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these terms. That is, these phrases are merely intended to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention. Furthermore, the term "and/or," "and/or" is meant to include all combinations of any one or more of the items listed.
The disaster backup is disaster backup, which means that a systematic data emergency mode is established in advance by utilizing scientific technical means and methods so as to cope with the occurrence of disasters. The content comprises data backup and system backup, business continuous planning, personnel architecture, communication guarantee, crisis customs, disaster recovery planning, business recovery planning, emergency response, third party cooperation and supply chain crisis management and the like.
The multi-level disaster recovery method provided by the invention is used for disaster recovery of the data service system, and the data service system uses the third party data in real time under the normal working condition. Referring to fig. 1, fig. 1 is a flowchart of a multi-level disaster recovery method provided by the present invention, and as shown in fig. 1, the method includes:
s1, setting a multi-level disaster recovery operation strategy for a data service system, and enabling the data service system to distribute current data traffic in proportion to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy;
wherein the current data flow is new user data entering the data service system. The multi-level disaster recovery operation strategy is used for coping with abnormal types of different third party data.
In one example, as in FIG. 2, a first level disaster recovery policy is set to cope with an exception type where third party data is completely interrupted (i.e., the data service system does not receive any third party data). Taking financial wind control service as an example, in a first-level disaster recovery strategy, setting a wind control strategy without any third party data, for example, setting a wind control strategy adopting first party data or second party data, wherein the first party data is enterprise internal owned data, is data collected by an enterprise directly from an audience (comprising clients, website visitors and social media attentors), and can be business data generated by users in an enterprise database or behavior data of some users collected through logs. The second party data is first party data that the business does not collect. The second party data is sometimes shared between trusted partners who, if beneficial to both parties' business, agree to share insight into the audience. For example, if a software company resells its products with an agent partner, the software company may share its first party data with the agent, which the agent partner will use as a second party data to lock and attract new customers.
In the invention, the wind control strategy without any third party data is the same as the wind control strategy in normal operation, and only the adopted data are different, so that when the third party number is interrupted, the wind control strategy without any third party data can be directly adopted, the time for re-analyzing and fitting the risk strategy rule is saved, and the risk loss is reduced.
In another example, as in fig. 2, a second level disaster recovery strategy is set to cope with the abnormal type of the third party data quality degradation. Taking financial wind control service as an example, the data quality degradation may be a degradation of the degree of distinction of data from risk or an inability of data to distinguish risk. Specifically, a wind control strategy containing multiparty data can be set. For example, a wind control policy is set that contains both first party data, second party data, and third party data. Thus, when the quality of the third party data is reduced, the wind control strategy can be continuously executed according to the second party data and the third party data.
S2, monitoring whether the third party data is abnormal or not;
in the invention, the abnormal third party data refers to the situation that the data service system has business risk due to the instability of the third party data. The method can be particularly that the third party data is completely interrupted, the quality of the third party data is reduced, and the like.
S3, if the third party data is abnormal, judging the abnormal type of the third party data;
the complete interruption of the third party data can be judged by monitoring whether the data service system can receive the third party data in real time. The quality degradation of the third party data can be judged according to whether the degree of distinction of the third party data on risks is degraded or not in the wind control strategy or the wind control model.
S4, switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data.
If the anomaly type is the complete interruption of the third party data, the data traffic of the current data service system is switched to the first-level disaster recovery strategy.
And if the abnormal type is that the third party data quality is reduced, switching the data flow of the current data service system for the normal operation strategy to the second-stage disaster recovery strategy at least partially so as to improve the data quality. In a specific mode, the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy according to the validity of the third-party data, wherein the validity of the third-party data refers to the capability of the third-party data to distinguish the user attribute, and the smaller the degree of the third-party data distinguishing the user is, the smaller the validity of the third-party data is. Taking financial wind control service as an example, the effective rate of the third party data can be measured according to the degree of distinguishing the risk users in the wind control strategy or the wind control model by the third party data.
Further, a first effective rate and a second effective rate may be set to perform switching from the data traffic of the normal operation policy to the second disaster recovery policy, where the first effective rate is less than the second effective rate. If the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate, the current third party data is lower in effective rate, the current third party data can be stopped, and new third party data can be collected for use. If the effective rate of the third party data is smaller than the first effective rate, the third party data cannot meet the service requirement, and the data flow of the current data service system for the normal operation strategy is at least partially switched to the second-level disaster recovery strategy.
In another embodiment, if the data traffic of the current data service system for the normal operation policy is at least partially switched to the second-level disaster recovery policy, the effective rate of the third-party data is monitored in real time; and according to the effective rate of the third party data, the data flow switched to the second-level disaster recovery strategy is adjusted in real time so as to improve the utilization rate of the third party data. For example, the effective rate of the third party data is greater than the preset effective rate, and the data flow switched to the second-level disaster recovery strategy is increased; or when the effective rate of the third party data is larger than the first preset rate and smaller than the second preset rate, the data flow switched to the second-level disaster recovery strategy is adjusted to be within a first preset range, such as a 40% duty ratio range of the whole data flow. When the effective rate of the third party data is greater than the second preset rate, the data flow switched to the second-level disaster recovery strategy is adjusted to be within a second preset range, such as a duty ratio range of 40% -70% of the whole data flow, and the like.
The data service system of the invention uses the third party data in real time under the normal working condition, and the data service system is distributed in proportion to the current data flow so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy by setting the multi-level disaster recovery operation strategy for the data service system; when the third party data is monitored to be abnormal, the operation strategy of the data service system is switched to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data, so that the normal operation of the data service system is ensured and the system stability is improved when the third party data is abnormal.
Fig. 3 is a schematic architecture diagram of a multi-level disaster recovery device according to the present invention, where the multi-level disaster recovery device is used for disaster recovery of a data service system, and the data service system uses third party data in real time under normal working conditions, as shown in fig. 3, and the device includes:
the setting module 31 is configured to set a multi-level disaster recovery operation policy for the data service system, and enable the data service system to allocate the current data traffic in proportion to operate the normal operation policy and the multi-level disaster recovery operation policy at the same time;
a monitoring module 32 for monitoring whether the third party data is abnormal;
a judging module 33, configured to judge an anomaly type of the third party data if the third party data has an anomaly;
and the switching module 34 is configured to switch the operation policy of the data service system to a disaster recovery operation policy of a corresponding level according to the abnormal type of the third party data.
In one embodiment, the setting module 31 is specifically configured to: and setting a first-stage disaster recovery strategy for the situation that the third party data is completely interrupted.
If the anomaly type is that the third party data is completely interrupted, the switching module 34 is configured to switch all data traffic of the current data service system to the first-level disaster recovery strategy.
In another embodiment, the setting module 31 is specifically configured to: and setting a second-level disaster recovery strategy for the condition that the third party data quality is reduced.
If the anomaly type is a third party data quality degradation, the switching module 34 is configured to at least partially switch the data traffic of the current data service system for the normal operation policy to the second-level disaster recovery policy.
Further, the device further comprises:
the real-time monitoring module 35 is configured to monitor, in real time, an effective rate of third party data if a data flow of a current data service system for a normal operation policy is at least partially switched to the second-level disaster recovery policy;
and the adjusting module 36 is configured to adjust the data flow switched to the second-level disaster recovery strategy according to the effective rate of the third-party data.
In one embodiment, the switching module 34 includes:
the acquisition module is used for acquiring new third party data if the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate;
and the sub-switching module is used for switching the data traffic of the current data service system for the normal operation strategy to the second-stage disaster recovery strategy at least partially if the effective rate of the third-party data is smaller than the first effective rate.
It will be appreciated by those skilled in the art that the modules in the embodiments of the apparatus described above may be distributed in an apparatus as described, or may be distributed in one or more apparatuses different from the embodiments described above with corresponding changes. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
The following describes an embodiment of an electronic device of the present invention, which may be regarded as a physical form of implementation for the above-described embodiment of the method and apparatus of the present invention. Details described in relation to the embodiments of the electronic device of the present invention should be considered as additions to the embodiments of the method or apparatus described above; for details not disclosed in the embodiments of the electronic device of the present invention, reference may be made to the above-described method or apparatus embodiments.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 400 of the exemplary embodiment is in the form of a general-purpose data processing device. The components of electronic device 400 may include, but are not limited to: at least one processing unit 410, at least one memory unit 420, a bus 430 connecting the different electronic device components (including memory unit 420 and processing unit 410), a display unit 440, and the like.
The storage unit 420 stores a computer readable program, which may be a source program or code of a read only program. The program may be executed by the processing unit 410 such that the processing unit 410 performs the steps of various embodiments of the present invention. For example, the processing unit 410 may perform the steps shown in fig. 1.
The memory unit 420 may include readable media in the form of volatile memory units, such as Random Access Memory (RAM) 4201 and/or cache memory 4202, and may further include Read Only Memory (ROM) 4203. The storage unit 420 may also include a program/utility 4204 having a set (at least one) of program modules 4205, such program modules 4205 including, but not limited to: an operating electronic device, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 430 may be a local bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or using any of a variety of bus architectures.
The electronic device 400 may also communicate with one or more external devices 300 (e.g., keyboard, display, network device, bluetooth device, etc.), such that a user can interact with the electronic device 400 via the external devices 400, and/or such that the electronic device 400 can communicate with one or more other data processing devices (e.g., routers, modems, etc.). Such communication may occur through an input/output (I/O) interface 450, and may also occur through a network adapter 460 to one or more networks, such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet. The network adapter 460 may communicate with other modules of the electronic device 400 via the bus 430. It should be appreciated that although not shown in fig. 4, other hardware and/or software modules may be used in electronic device 400, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID electronics, tape drives, data backup storage electronics, and the like.
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but not limited to, an electronic device, apparatus, or means of electronic, magnetic, optical, electromagnetic, infrared, or semiconductor, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. The computer program, when executed by one or more data processing devices, enables the computer readable medium to carry out the above-described method of the present invention, namely: setting a multi-level disaster recovery operation strategy for the data service system, and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy; monitoring whether the third party data is abnormal; if the third party data is abnormal, judging the abnormal type of the third party data; and switching the operation strategy of the data service system to the disaster recovery operation strategy of the corresponding level according to the abnormal type of the third party data.
From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, comprising several instructions to cause a data processing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the present invention.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution electronic device, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention may be implemented in a method, apparatus, electronic device, or computer readable medium that executes a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP).
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.

Claims (10)

1. A multi-level disaster recovery method for disaster recovery of a data service system, wherein the data service system uses third party data in real time under normal working conditions, the method comprising:
setting a multi-level disaster recovery operation strategy for the data service system, and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy; the multi-level disaster recovery operation strategy comprises the following steps: a second-level disaster recovery strategy for the case that the third party data quality is reduced;
monitoring whether the third party data is abnormal;
if the third party data is abnormal, judging the abnormal type of the third party data;
if the abnormal type is that the third party data quality is reduced, switching the data flow of the current data service system for the normal operation strategy to the second-level disaster recovery strategy at least partially; the effective rate of the third party data is monitored in real time; and according to the effective rate of the third party data, adjusting the data flow switched to the second-level disaster recovery strategy.
2. The method of claim 1, wherein setting a multi-level disaster recovery operation policy further comprises:
and setting a first-stage disaster recovery strategy for the situation that the third party data is completely interrupted.
3. The method of claim 2, wherein if the anomaly type is a complete interruption of third party data, switching all data traffic of a current data service system to the first level disaster recovery strategy.
4. The method of claim 1, wherein switching data traffic for a normal operation policy of a current data service system to the second level disaster recovery policy at least in part if the anomaly type is a third party data quality degradation comprises:
if the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate, collecting new third party data;
and if the effective rate of the third party data is smaller than the first effective rate, switching the data flow of the current data service system for the normal operation strategy to the second-level disaster recovery strategy at least partially.
5. A multi-level disaster recovery device for disaster recovery of a data service system, the data service system using third party data in real time under normal operating conditions, the device comprising:
the setting module is used for setting a multi-level disaster recovery operation strategy for the data service system and enabling the data service system to distribute the current data flow in proportion so as to simultaneously operate the normal operation strategy and the multi-level disaster recovery operation strategy; the multi-level disaster recovery operation strategy comprises the following steps: a second-level disaster recovery strategy for the case that the third party data quality is reduced;
the monitoring module is used for monitoring whether the third party data is abnormal or not;
the judging module is used for judging the abnormal type of the third party data if the third party data is abnormal;
and the switching module is used for switching the data flow of the normal operation strategy of the front data service system to the second-stage disaster recovery strategy at least partially if the abnormal type is the degradation of the third-party data quality, monitoring the effective rate of the third-party data in real time, and adjusting the data flow switched to the second-stage disaster recovery strategy according to the effective rate of the third-party data.
6. The apparatus of claim 5, wherein the setting module is further specifically configured to: and setting a first-stage disaster recovery strategy for the situation that the third party data is completely interrupted.
7. The apparatus of claim 6, wherein the switching module is configured to switch all data traffic of a current data service system to the first level disaster recovery policy if the anomaly type is a complete interruption of third party data.
8. The apparatus of claim 5, wherein the switching module comprises:
the acquisition module is used for acquiring new third party data if the effective rate of the third party data is larger than the first effective rate and smaller than the second effective rate;
and the sub-switching module is used for switching the data traffic of the current data service system for the normal operation strategy to the second-stage disaster recovery strategy at least partially if the effective rate of the third-party data is smaller than the first effective rate.
9. An electronic device, comprising:
a processor; and
a memory storing computer-executable instructions that, when executed, cause the processor to perform the method of any of claims 1-4.
10. A computer readable storage medium storing one or more programs, which when executed by a processor, implement the method of any of claims 1-4.
CN202010682556.9A 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment Active CN112015590B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010682556.9A CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010682556.9A CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112015590A CN112015590A (en) 2020-12-01
CN112015590B true CN112015590B (en) 2023-11-14

Family

ID=73498812

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010682556.9A Active CN112015590B (en) 2020-07-15 2020-07-15 Multi-level disaster recovery method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN112015590B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277376B (en) * 2022-09-29 2022-12-23 深圳华锐分布式技术股份有限公司 Disaster recovery switching method, device, equipment and medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8103906B1 (en) * 2010-10-01 2012-01-24 Massoud Alibakhsh System and method for providing total real-time redundancy for a plurality of client-server systems
CN103473112A (en) * 2013-09-03 2013-12-25 北京邮电大学 Disaster backup information system simulation method based on two places and three centers
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN104579765A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Disaster tolerance method and device for cluster system
CN106254166A (en) * 2016-09-30 2016-12-21 中国银联股份有限公司 A kind of cloud platform resource allocation method based on Disaster Preparation Center and system
CN109753385A (en) * 2019-01-14 2019-05-14 重庆邮电大学 A kind of restoration methods and system towards the monitoring of stream calculation system exception
CN109766198A (en) * 2018-12-28 2019-05-17 深圳前海微众银行股份有限公司 Stream Processing method, apparatus, equipment and computer readable storage medium
CN110362454A (en) * 2019-06-29 2019-10-22 北京淇瑀信息科技有限公司 A kind of alarm method, device and electronic equipment for supporting configurable decision engine
CN110609845A (en) * 2018-06-15 2019-12-24 网宿科技股份有限公司 Big data redundancy disaster recovery method, big data service system and query method

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8103906B1 (en) * 2010-10-01 2012-01-24 Massoud Alibakhsh System and method for providing total real-time redundancy for a plurality of client-server systems
CN104239164A (en) * 2013-06-19 2014-12-24 国家电网公司 Cloud storage based disaster recovery backup switching system
CN103473112A (en) * 2013-09-03 2013-12-25 北京邮电大学 Disaster backup information system simulation method based on two places and three centers
CN104579765A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Disaster tolerance method and device for cluster system
CN106254166A (en) * 2016-09-30 2016-12-21 中国银联股份有限公司 A kind of cloud platform resource allocation method based on Disaster Preparation Center and system
CN110609845A (en) * 2018-06-15 2019-12-24 网宿科技股份有限公司 Big data redundancy disaster recovery method, big data service system and query method
CN109766198A (en) * 2018-12-28 2019-05-17 深圳前海微众银行股份有限公司 Stream Processing method, apparatus, equipment and computer readable storage medium
CN109753385A (en) * 2019-01-14 2019-05-14 重庆邮电大学 A kind of restoration methods and system towards the monitoring of stream calculation system exception
CN110362454A (en) * 2019-06-29 2019-10-22 北京淇瑀信息科技有限公司 A kind of alarm method, device and electronic equipment for supporting configurable decision engine

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
信息网络分布式数据容灾应用研究;夏红燕;;电脑知识与技术(第12期);第36-39页 *
证券业信息系统备份能力建设应用研究;王淼;《中国优秀硕士学位论文全文数据库 信息科技辑》(第4期);I138-73 *

Also Published As

Publication number Publication date
CN112015590A (en) 2020-12-01

Similar Documents

Publication Publication Date Title
Gai et al. A novel secure big data cyber incident analytics framework for cloud-based cybersecurity insurance
JP6876036B2 (en) Systems and methods for providing cybersecurity analytics based on operational and information technology
AU2019201687B2 (en) Network device vulnerability prediction
CN113312341B (en) Data quality monitoring method, system and computer equipment
WO2020228063A1 (en) Method and device for developing service functions
US20140244343A1 (en) Metric management tool for determining organizational health
CN113268399B (en) Alarm processing method and device and electronic equipment
Montesino et al. Automation possibilities in information security management
Shirtz et al. Optimizing investment decisions in selecting information security remedies
Apriliana et al. Risk analysis of IT applications using FMEA and AHP SAW method with COBIT 5
CN112015590B (en) Multi-level disaster recovery method and device and electronic equipment
CN113760634A (en) Data processing method and device
Zeller et al. Is accumulation risk in cyber systematically underestimated?
CN117952423A (en) Industrial chain risk management system and method based on digital intelligence
JP5271761B2 (en) Troubleshooting method and apparatus
US10055277B1 (en) System, method, and computer program for performing health checks on a system including a plurality of heterogeneous system components
CN113806225B (en) Business abnormal node identification method and device and electronic equipment
Maurer et al. From disaster response planning to e-resilience: A literature review
CN113507392B (en) Network operation and maintenance method, device, electronic equipment, medium and program product
CN114756301A (en) Log processing method, device and system
CN115080363A (en) System capacity evaluation method and device based on service log
CN114880156A (en) Task flow processing method and device and electronic equipment
Lin et al. An analysis of using state of the art technologies to implement real-time continuous assurance
CN111275407A (en) Security requirement evaluation method, system, equipment and storage medium
US12112161B1 (en) Systems and methods for managing and tracking customizations

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant