CN112800003A - Recommendation method for creating snapshot, snapshot creation method and device and electronic equipment - Google Patents

Recommendation method for creating snapshot, snapshot creation method and device and electronic equipment Download PDF

Info

Publication number
CN112800003A
CN112800003A CN202110077724.6A CN202110077724A CN112800003A CN 112800003 A CN112800003 A CN 112800003A CN 202110077724 A CN202110077724 A CN 202110077724A CN 112800003 A CN112800003 A CN 112800003A
Authority
CN
China
Prior art keywords
snapshot
log
cloud host
target cloud
creating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110077724.6A
Other languages
Chinese (zh)
Other versions
CN112800003B (en
Inventor
邱建行
吴小君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chinac Data Xiamen Network Co ltd
Original Assignee
Chinac Data Xiamen Network Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chinac Data Xiamen Network Co ltd filed Critical Chinac Data Xiamen Network Co ltd
Priority to CN202110077724.6A priority Critical patent/CN112800003B/en
Priority claimed from CN202110077724.6A external-priority patent/CN112800003B/en
Publication of CN112800003A publication Critical patent/CN112800003A/en
Application granted granted Critical
Publication of CN112800003B publication Critical patent/CN112800003B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/128Details of file system snapshots on the file-level, e.g. snapshot creation, administration, deletion
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of cloud computing, in particular to a recommendation method for creating a snapshot, a snapshot creation method, a snapshot creation device and electronic equipment, wherein the recommendation method comprises the steps of obtaining operation behavior data of a target cloud host and the utilization rate of hardware; analyzing the operation behavior data, and determining a behavior value of the target cloud host; determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate; and determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the size relationship between the user threshold and the system threshold. The user threshold value is determined from the operation angle of the target cloud host operated by the user and the self operation angle of the target cloud host, so that a more accurate user threshold value can be obtained; and comparing the user threshold with a system threshold on the basis of the user threshold to recommend the snapshot creation, so that the automatic recommendation of the snapshot creation can be realized, the recommendation reliability is ensured, and the problem of data loss can be effectively avoided.

Description

Recommendation method for creating snapshot, snapshot creation method and device and electronic equipment
Technical Field
The invention relates to the technical field of cloud computing, in particular to a recommendation method for creating a snapshot, a snapshot creating method, a snapshot creating device and electronic equipment.
Background
The cloud computing service refers to the unified management and scheduling of a large number of computing resources connected by a network, so that a computing resource pool is formed to serve users on demand. The user obtains required resources and services in an on-demand and easily-extensible mode through the network, and under the cloud era and under the condition that the timer is not generated, data stored in the cloud end of the user are all actively stored by the user. For the storage of cloud data, the user actively triggers the creation, storage and backup of the snapshot.
However, during the process of using the cloud product, a user does not know what time period the data should be backed up, and if some uncontrollable factors occur, the user data may be lost, which results in the economic benefit or data loss of the user.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method for creating a snapshot, a snapshot creating method, a snapshot creating apparatus, and an electronic device, so as to solve the problem of data loss.
According to a first aspect, an embodiment of the present invention provides a recommendation method for creating a snapshot, including:
acquiring operation behavior data and hardware utilization rate of a target cloud host;
analyzing the operation behavior data to determine a behavior value of the target cloud host;
determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate;
and determining whether recommendation for creating a snapshot needs to be performed on the target cloud host according to the size relationship between the user threshold and the system threshold.
According to the recommendation method for creating the snapshot, provided by the embodiment of the invention, the behavior value of the target cloud host and the hardware utilization rate are utilized to determine the user threshold, namely the user threshold is determined from the operation angle of the target cloud host operated by the user and the self operation angle of the target cloud host, so that a more accurate user threshold can be obtained; and comparing the user threshold with a system threshold on the basis of the user threshold to recommend the snapshot creation, so that the automatic recommendation of the snapshot creation can be realized, the recommendation reliability is ensured, and the problem of data loss can be effectively avoided.
With reference to the first aspect, in a first implementation manner of the first aspect, the analyzing the operation behavior data to determine a behavior value of the target cloud host includes:
screening log behaviors in the operation log, and determining the number of effective log behaviors;
performing text analysis on the log request in the operation log, and determining a request value of a preset log request;
and determining the behavior value of the target cloud host by using the number of the effective log behaviors and the request value of the log request.
According to the recommendation method for creating the snapshot, provided by the embodiment of the invention, the log behavior is screened to obtain the effective log behavior, so that the influence of the ineffective log behavior on the behavior value of the target cloud host is prevented; furthermore, text analysis is carried out on the log request, the request value of the preset log request is determined from the user request angle, effective log behaviors are combined with the request value of the preset log request, and the accuracy of the determined behavior value of the target cloud host can be guaranteed.
With reference to the first implementation manner of the first aspect, in a second implementation manner of the first aspect, the performing text analysis on the log request in the operation log to determine a request value of a preset log request includes:
performing word segmentation on log requests in the operation logs, and determining the number of the preset log requests;
and calculating the ratio of the number of the preset log requests to the number of all the log requests, and determining the request value of the preset log requests.
According to the recommendation method for creating the snapshot, the number of the preset log requests is determined in a word segmentation mode, the request value of the preset log requests is represented by the frequency value, and the calculation accuracy of the request value of the preset log requests is improved.
With reference to the second implementation manner of the first aspect, in a third implementation manner of the first aspect, the determining, by using the number of valid log actions and the requested value of the log request, a behavior value of the target cloud host includes:
calculating the ratio of the number of the effective log behaviors to the number of all log behaviors in the operation log, and determining the frequency of the effective log behaviors;
and performing numerical calculation on the frequency of the effective log behaviors and the request value of the preset log request, and determining the behavior value of the target cloud host.
According to the recommendation method for creating the snapshot, the frequency of the effective log behavior is combined with the request value of the preset log request to determine the behavior value of the target cloud host, the behavior value is calculated from two aspects, and the reliability of behavior value calculation is improved.
With reference to the first aspect, or any one of the first implementation manner to the third implementation manner of the first aspect, in a fourth implementation manner of the first aspect, the determining, according to a size relationship between the user threshold and a system threshold, whether a recommendation for creating a snapshot needs to be performed on the target cloud host includes:
determining whether the system threshold is greater than or equal to the user threshold;
when the system threshold is larger than or equal to the user threshold, pushing a recommendation message for creating a snapshot to the target cloud host.
According to the recommendation method for creating the snapshot, provided by the embodiment of the invention, under the condition that the system threshold is greater than or equal to the user threshold, the target cloud host is indicated to create the snapshot conditionally at the moment, and the recommendation message for creating the snapshot is sent to the target cloud host at the moment, so that the data can be backed up in time, and the data loss is prevented.
According to a second aspect, an embodiment of the present invention further provides a snapshot creating method, including:
receiving a recommendation message for creating a snapshot, where the recommendation message for creating a snapshot is pushed according to the first aspect of the present invention or the recommendation method for creating a snapshot described in any of the embodiments of the first aspect;
responding to the selection operation of the recommendation message;
and performing corresponding processing based on the selection operation.
According to the snapshot creating method provided by the embodiment of the invention, whether to create the snapshot is selected according to the recommendation message for creating the snapshot, so that the problem of data loss can be avoided on one hand, and the corresponding final processing can be ensured to be performed based on the user requirements on the other hand.
According to a third aspect, an embodiment of the present invention provides a recommendation apparatus for creating a snapshot, including:
the acquisition module is used for acquiring operation behavior data and hardware utilization rate of the target cloud host;
the analysis module is used for analyzing the operation behavior data and determining a behavior value of the target cloud host;
a determining module, configured to determine a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware usage rate;
and the recommending module is used for determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the magnitude relation between the user threshold and the system threshold.
According to the recommendation device for creating the snapshot, provided by the embodiment of the invention, the user threshold is determined by utilizing the behavior value of the target cloud host and the hardware utilization rate, namely the user threshold is determined from the self operation angle of the target cloud host operated by the user and the target cloud host, so that a more accurate user threshold can be obtained; and comparing the user threshold with a system threshold on the basis of the user threshold to recommend the snapshot creation, so that the automatic recommendation of the snapshot creation can be realized, the recommendation reliability is ensured, and the problem of data loss can be effectively avoided.
According to a fourth aspect, an embodiment of the present invention provides a snapshot creation apparatus, including:
a receiving module, configured to receive a recommendation message for creating a snapshot, where the recommendation message for creating a snapshot is pushed according to the first aspect of the present invention or the recommendation method for creating a snapshot described in any embodiment of the first aspect;
a selection module for responding to a selection operation of the recommendation message;
and the processing module is used for carrying out corresponding processing by the user based on the selection operation.
The snapshot creating device provided by the embodiment of the invention selects whether to create the snapshot according to the recommendation message for creating the snapshot, so that the problem of data loss can be avoided on one hand, and the corresponding processing finally performed can be ensured to be performed based on the user requirements on the other hand.
According to a fifth aspect, an embodiment of the present invention provides an electronic device, including: a memory and a processor, the memory and the processor are communicatively connected to each other, the memory stores computer instructions, and the processor executes the computer instructions to execute the recommendation method for creating a snapshot described in the first aspect or any one of the embodiments of the first aspect, or execute the snapshot creating apparatus described in the second aspect.
According to a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores computer instructions for causing a computer to execute the recommendation method for creating a snapshot described in the first aspect or any one of the implementation manners of the first aspect, or execute the snapshot creating apparatus described in the second aspect.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flow diagram of a recommendation method of creating a snapshot according to an embodiment of the present invention;
FIG. 2 is a flow diagram of a recommendation method of creating a snapshot according to an embodiment of the present invention;
FIG. 3 is a flow diagram of a recommendation method of creating a snapshot according to an embodiment of the present invention;
FIG. 4 is a flow diagram of a snapshot creation method according to an embodiment of the present invention;
FIG. 5 is a block diagram of a recommender that creates snapshots according to an embodiment of the invention;
fig. 6 is a block diagram of the configuration of a snapshot creation apparatus according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, embodiments of the present invention provide a recommendation method for creating a snapshot, so as to reduce a situation that data is not backed up under some special abnormal conditions and data is lost when a user uses a target cloud host, and solve a scenario of data abnormality, so that recommendation for generating a snapshot on a cloud host is provided, and the user can relatively better select data security of the user.
The cloud host is subjected to user threshold analysis, the cloud host user is recommended, whether a snapshot needs to be created or not is judged, and the function does not affect the user-defined snapshot backup.
For convenience of the following description, terms involved in the embodiments of the present invention are explained as follows:
snapshot: and backing up and recovering the online data. When the application failure or file damage occurs to the storage device, the data can be quickly recovered, and the state of an available time point is recovered;
threshold value: a critical value within a certain relationship;
cloud server: a large number of servers are virtualized into a plurality of virtual servers with distributable performance in a machine room through the virtualization technology, and the number of CPUs, the size of internal memories, the size of hard disks, bandwidth resources and IP resources required can be freely customized;
cloud host: a plurality of parts similar to independent hosts are simulated on the cluster host, and each host in the cluster is provided with a mirror image of the cloud host, so that the safety and stability of the virtual host are greatly improved.
In accordance with an embodiment of the present invention, there is provided a recommended method embodiment of creating a snapshot, it being noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer-executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
The embodiment provides a recommendation method for creating a snapshot, which can be used in electronic devices, such as computers, servers, and the like. In this embodiment, taking a server as an example, fig. 1 is a flowchart of a recommendation method for creating a snapshot according to an embodiment of the present invention, and as shown in fig. 1, the flowchart includes the following steps:
and S11, acquiring the operation behavior data and the hardware utilization rate of the target cloud host.
And under the condition that the target cloud host opens the virtual machine, recommending that a user opens an authorized acquisition port in advance, wherein authorization is mainly used for acquiring specified data of the user and reporting corresponding services for analyzing the operation behavior of the target cloud host. The designated data of the user refers to an operation behavior of the target cloud host, and may also generally refer to a request frequency of accessing an address between target clouds, such as an operation of reloading a system, backing up data, creating a snapshot, and the like, or a behavior of accessing a site by the user.
The server acquires the designated data of the target cloud host through the acquisition port to obtain operation behavior data during the target cloud, and the operation behavior data is used for subsequent user threshold analysis.
The hardware utilization rate may be sent to the server by the target cloud host, or may be directly obtained from the target cloud host by the server, and the like. For example, the target cloud host may directly obtain the hardware utilization rate of the target cloud host, such as CPU utilization rate, disk utilization rate, and the like, by using the instruction code. The following determination of the user threshold value is specifically performed by using which hardware usage rate or hardware usage rates, and corresponding setting may be performed according to actual conditions, which is not limited herein.
And S12, analyzing the operation behavior data and determining the behavior value of the target cloud host.
After the server acquires the operation behavior data of the target cloud host, analyzing and processing the operation behavior data, for example, analyzing effective operation data in the operation behavior data, and taking the effective operation data as a behavior value of the target cloud host; or, the probability that the target cloud host executes some preset operations in the operation behavior data may be analyzed and used as the behavior value of the target cloud host, where the preset operations may be some operations occupying a larger memory capacity, or operations related to data storage, and the like.
Details about this step will be described later.
And S13, determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate.
The server calculates the hardware usage rate obtained in the step S11 and the behavior value of the target cloud host determined in the step S12, for example, an average value of the two is determined as a user threshold of the target cloud host; or analyzing the statistical values of the two and determining the result as the user threshold value of the target cloud host. The specific calculation method is not limited at all, and may be set according to actual conditions.
Of course, the user threshold may be averaged over a time frame if desired depending on the circumstances, and so on.
And S14, determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the size relationship between the user threshold and the system threshold.
The system threshold value can be self-defined, and can also be self-adaptively adjusted according to the running condition of the target cloud host. For example, a large amount of user data analysis and hard disk capacity analysis can be performed on the target cloud host, and the average value is obtained. The system threshold is determined in what manner, and may be set according to actual conditions, which is not limited herein.
After determining the system threshold in S13, the server may compare the system threshold with the user threshold, and determine whether to recommend creating a snapshot for the target cloud host based on the comparison result; or averaging the user threshold values determined continuously for multiple times, and comparing the average value with a system threshold value to determine whether recommendation for creating a snapshot needs to be performed on the target cloud host.
According to the recommendation method for creating the snapshot, the behavior value of the target cloud host and the hardware utilization rate are utilized to determine the user threshold, that is, the user threshold is determined from the operation angle of the target cloud host operated by the user and the self operation angle of the target cloud host, so that a more accurate user threshold can be obtained; and comparing the user threshold with a system threshold on the basis of the user threshold to recommend the snapshot creation, so that the automatic recommendation of the snapshot creation can be realized, the recommendation reliability is ensured, and the problem of data loss can be effectively avoided.
In this embodiment, a recommendation method for creating a snapshot is provided, which may be used in electronic devices, such as computers, servers, and the like, fig. 2 is a flowchart of a recommendation method for creating a snapshot according to an embodiment of the present invention, and as shown in fig. 2, the flowchart includes the following steps:
and S21, acquiring the operation behavior data and the hardware utilization rate of the target cloud host.
Please refer to S11 in fig. 1, which is not described herein again.
And S22, analyzing the operation behavior data and determining the behavior value of the target cloud host.
The operation behavior data is an operation log, and the server can form the operation log by using the behavior data reported by the target cloud host. Specifically, the above S22 may include the following steps:
s221, the log behaviors in the operation log are screened, and the number of the effective log behaviors is determined.
The log behavior generated by the target cloud host is recorded in the operation log, the log behavior is screened according to a preset screening rule, and some log behaviors which have no influence on the target cloud host are removed to obtain the number of effective log behaviors.
For example, the server performs statistical analysis on log behaviors in the operation logs, counts all operation logs of the target cloud host for a certain time, filters out some log behaviors which have no influence on the current target cloud host, and counts the number of effective log behaviors of the target cloud host.
S222, performing text analysis on the log request in the operation log, and determining the request value of the preset log request.
The server performs text analysis on the log request in the operation log of the target cloud host, specifically, Chinese word segmentation software or a text analysis tool can be used, the tool can be used for analyzing a behavior with a high occurrence frequency when a current user requests, namely, presetting a request value of the log request, and the request value can be represented by frequency.
In some optional implementations of this embodiment, the step S222 may include the following steps:
(1) and performing word segmentation on the log requests in the operation log, and determining the number of the preset log requests.
The server performs word segmentation processing on the log requests in the operation log, wherein the log requests can be recorded as { T0, T1, T2, … …, Tn }, and the number of the preset log requests is determined based on the recorded log requests.
(2) And calculating the ratio of the number of the preset log requests to the number of all log requests, and determining the request value of the preset log requests.
And the server calculates the ratio of the number of the preset log requests to the number of all the log requests to obtain the request value of the preset log requests.
The method has the advantages that the number of the preset log requests is determined in a word segmentation mode, the frequency value is used for representing the request value of the preset log requests, and the calculation accuracy of the request value of the preset log requests is improved.
And S223, determining the behavior value of the target cloud host by using the number of the effective log behaviors and the request value of the log request.
The server can determine the frequency of the effective log behaviors by using the number of the effective log behaviors and the total number of all the log behaviors, and then obtain the behavior value of the target cloud host by combining the requested value of the log request. For example, an average of the frequency of the effective log behavior and the request value of the log request may be calculated, and the average may be determined as the behavior value of the target cloud host; it is also possible to calculate a statistical value of the frequency of the effective log behavior and the requested value of the log request, determine the statistical value as a behavior value of the target cloud host, and the like.
In other optional embodiments of this embodiment, the step S223 may include the following steps:
(1) and calculating the ratio of the number of the effective log behaviors to the number of all log behaviors in the operation log, and determining the frequency of the effective log behaviors.
For example, P1 represents the number of valid log activities for a target cloud host within a certain time, and P2 represents the sum of all logs for the target cloud host within a certain time, then the frequency N of valid log activities may be represented as P1/P2.
(2) And carrying out numerical calculation on the frequency of the effective log behaviors and the request value of the preset log request, and determining the behavior value of the target cloud host.
The server can calculate the sum of the frequency of the effective log behaviors and the request value of a preset log request, and determine the behavior value of the target cloud host; or calculating a weighted sum of the frequency of the effective log behavior and the request value of the preset log request, determining the behavior value of the target cloud host, and the like.
The frequency of the effective log behavior is combined with the request value of the preset log request to determine the behavior value of the target cloud host, and the behavior value is calculated from two aspects, so that the reliability of behavior value calculation is improved.
And S23, determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate.
Please refer to S13 in fig. 1, which is not described herein again.
And S24, determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the size relationship between the user threshold and the system threshold.
Please refer to S14 in fig. 1, which is not described herein again.
According to the recommendation method for creating the snapshot, the log behavior is screened to obtain the effective log behavior, and the influence of the ineffective log behavior on the behavior value of the target cloud host is prevented; furthermore, text analysis is carried out on the log request, the request value of the preset log request is determined from the user request angle, effective log behaviors are combined with the request value of the preset log request, and the accuracy of the determined behavior value of the target cloud host can be guaranteed.
In this embodiment, a recommendation method for creating a snapshot is provided, which may be used in electronic devices, such as computers, servers, and the like, fig. 3 is a flowchart of a recommendation method for creating a snapshot according to an embodiment of the present invention, as shown in fig. 3, where the flowchart includes the following steps:
and S31, acquiring the operation behavior data and the hardware utilization rate of the target cloud host.
Please refer to S21 in fig. 2 for details, which are not described herein.
And S32, analyzing the operation behavior data and determining the behavior value of the target cloud host.
Please refer to S22 in fig. 2 for details, which are not described herein.
And S33, determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate.
Please refer to S23 in fig. 2 for details, which are not described herein.
And S34, determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the size relationship between the user threshold and the system threshold.
Specifically, the above S34 may include the following steps:
and S341, judging whether the system threshold is greater than or equal to the user threshold.
After the server calculates the user threshold of the target cloud host in S33, the server compares the user threshold with the system threshold to determine whether the system of the current target cloud host can perform snapshot creation conditionally. When the system threshold is greater than or equal to the user threshold, indicating that the target cloud host is capable of creating a snapshot at this time, executing S342; otherwise, S31 is executed.
And S342, pushing a recommendation message for creating the snapshot to the target cloud host.
And when the server determines that the recommendation for creating the snapshot needs to be carried out on the target cloud host, the server pushes a recommendation message for creating the snapshot to the target cloud host.
In the recommendation method for creating a snapshot provided by this embodiment, when the system threshold is greater than or equal to the user threshold, it indicates that the target cloud host creates the snapshot conditionally at this time, and then a recommendation message for creating the snapshot is sent to the target cloud host, so that data can be backed up in time, and data loss is prevented.
In accordance with an embodiment of the present invention, there is provided a snapshot recommendation method embodiment, it is noted that the steps illustrated in the flowchart of the figure may be performed in a computer system such as a set of computer executable instructions, and that while a logical order is illustrated in the flowchart, in some cases the steps illustrated or described may be performed in an order different than here.
In this embodiment, a snapshot recommendation method is provided, which may be used in an electronic device, such as a computer, a client (e.g., a cloud host), and the like, fig. 4 is a flowchart of a recommendation method for creating a snapshot according to an embodiment of the present invention, and as shown in fig. 4, the flowchart includes the following steps:
s41, receiving a recommendation message for creating the snapshot.
The recommendation message for creating the snapshot is pushed according to the first aspect of the present invention or the recommendation method for creating the snapshot described in any implementation manner of the first aspect.
According to the recommendation method for creating snapshots provided in the above embodiments, the server side recommends the client side to create snapshots by sending a snapshot creation recommendation message to the client side when snapshots can be created. Accordingly, the client can receive the recommendation message sent by the server.
S42, responding to the selection operation of the recommendation message.
When the client receives the recommendation message for creating the snapshot, a selection interface can be displayed so that a user can select whether to create the snapshot on the interface; of course, the client may also use other manners to remind the user that the snapshot may be created at this time, and the like, and the specific implementation manner thereof is not limited at all, and the corresponding setting may be specifically performed according to the actual situation. For the client, the user only needs to respond to the selection operation of the recommendation message.
S43, corresponding processing is performed based on the selection operation.
After responding to the selection operation of the user on the recommendation message, the client performs corresponding processing based on the selection result of the selection operation. For example, when the user selects to create a snapshot, the client performs the process of creating the snapshot; when the user chooses not to create the snapshot, the client can continue to execute the current operation, and also can default to not perform reminding of recommendation information whether to create the snapshot or not within a period of time, and the like.
According to the snapshot creating method provided by the embodiment, whether to create the snapshot is selected according to the recommendation message for creating the snapshot, so that on one hand, the problem of data loss can be avoided, and on the other hand, the corresponding processing which is finally performed is ensured to be performed based on the user requirements.
The present embodiment further provides a recommendation device for creating a snapshot, or a snapshot creating device, which is used to implement the foregoing embodiments and preferred embodiments, and the description already made is omitted for brevity. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
The present embodiment provides a recommendation apparatus for creating a snapshot, as shown in fig. 5, including:
the obtaining module 51 is configured to obtain operation behavior data and a hardware utilization rate of the target cloud host;
the analysis module 52 is configured to analyze the operation behavior data and determine a behavior value of the target cloud host;
a determining module 53, configured to determine a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware usage rate;
and the recommending module 54 is configured to determine whether recommendation for creating a snapshot needs to be performed on the target cloud host according to a size relationship between the user threshold and the system threshold.
The recommendation device for creating a snapshot provided by this embodiment determines the user threshold value by using the behavior value of the target cloud host and the hardware utilization rate, that is, determines the user threshold value from the self-operation angle of the target cloud host operated by the user and the target cloud host, so as to obtain a more accurate user threshold value; and comparing the user threshold with a system threshold on the basis of the user threshold to recommend the snapshot creation, so that the automatic recommendation of the snapshot creation can be realized, the recommendation reliability is ensured, and the problem of data loss can be effectively avoided.
The present embodiment provides a snapshot creating apparatus, as shown in fig. 6, including:
a receiving module 61, configured to receive a recommendation message for creating a snapshot, where the recommendation message for creating a snapshot is pushed according to the first aspect of the present invention or the recommendation method for creating a snapshot described in any embodiment of the first aspect;
a selection module 62, configured to respond to a selection operation on the recommendation message;
and the processing module 63 is used for carrying out corresponding processing by the user based on the selection operation.
The snapshot creating apparatus provided in this embodiment selects whether to create a snapshot according to the recommendation message for creating a snapshot, so that on one hand, the problem of data loss can be avoided, and on the other hand, it can be ensured that corresponding processing to be finally performed is performed based on user requirements.
The recommendation device for creating snapshot and the snapshot creating device in this embodiment are presented in the form of functional units, where the units refer to ASIC circuits, a processor and a memory executing one or more software or fixed programs, and/or other devices capable of providing the above functions.
Further functional descriptions of the modules are the same as those of the corresponding embodiments, and are not repeated herein.
An embodiment of the present invention further provides an electronic device, which has the recommendation apparatus for creating a snapshot shown in fig. 5 or the snapshot creation apparatus shown in fig. 6.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an alternative embodiment of the present invention, and as shown in fig. 7, the electronic device may include: at least one processor 71, such as a CPU (Central Processing Unit), at least one communication interface 73, memory 74, at least one communication bus 72. Wherein a communication bus 72 is used to enable the connection communication between these components. The communication interface 73 may include a Display (Display) and a Keyboard (Keyboard), and the optional communication interface 73 may also include a standard wired interface and a standard wireless interface. The Memory 74 may be a high-speed RAM Memory (volatile Random Access Memory) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The memory 74 may alternatively be at least one memory device located remotely from the processor 71. Wherein the processor 71 may be in connection with the apparatus described in fig. 5 or fig. 6, an application program is stored in the memory 74, and the processor 71 calls the program code stored in the memory 74 for performing any of the above-mentioned method steps.
The communication bus 72 may be a Peripheral Component Interconnect (PCI) bus or an Extended Industry Standard Architecture (EISA) bus. The communication bus 72 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 7, but this is not intended to represent only one bus or type of bus.
The memory 74 may include a volatile memory (RAM), such as a random-access memory (RAM); the memory may also include a non-volatile memory (english: non-volatile memory), such as a flash memory (english: flash memory), a hard disk (english: hard disk drive, abbreviated: HDD) or a solid-state drive (english: SSD); the memory 74 may also comprise a combination of memories of the kind described above.
The processor 71 may be a Central Processing Unit (CPU), a Network Processor (NP), or a combination of CPU and NP.
The processor 71 may further include a hardware chip. The hardware chip may be an application-specific integrated circuit (ASIC), a Programmable Logic Device (PLD), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a field-programmable gate array (FPGA), a General Array Logic (GAL), or any combination thereof.
Optionally, the memory 74 is also used for storing program instructions. Processor 71 may call program instructions to implement the recommended method of creating a snapshot as shown in the embodiments of fig. 1 to 3 of the present application, or the snapshot creating method shown in the embodiment of fig. 4.
The embodiment of the invention also provides a non-transitory computer storage medium, wherein the computer storage medium stores computer executable instructions, and the computer executable instructions can execute the recommendation method for creating the snapshot or the snapshot creation method in any method embodiment. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. A recommendation method for creating a snapshot, comprising:
acquiring operation behavior data and hardware utilization rate of a target cloud host;
analyzing the operation behavior data to determine a behavior value of the target cloud host;
determining a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware utilization rate;
and determining whether recommendation for creating a snapshot needs to be performed on the target cloud host according to the size relationship between the user threshold and the system threshold.
2. The recommendation method according to claim 1, wherein the operation behavior data is an operation log, and the analyzing the operation behavior data to determine the behavior value of the target cloud host comprises:
screening log behaviors in the operation log, and determining the number of effective log behaviors;
performing text analysis on the log request in the operation log, and determining a request value of a preset log request;
and determining the behavior value of the target cloud host by using the number of the effective log behaviors and the request value of the log request.
3. The recommendation method according to claim 2, wherein the performing text analysis on the log request in the operation log to determine the request value of the preset log request comprises:
performing word segmentation on log requests in the operation logs, and determining the number of the preset log requests;
and calculating the ratio of the number of the preset log requests to the number of all the log requests, and determining the request value of the preset log requests.
4. The recommendation method according to claim 3, wherein the determining the behavior value of the target cloud host by using the number of valid log behaviors and the requested value of the log request comprises:
calculating the ratio of the number of the effective log behaviors to the number of all log behaviors in the operation log, and determining the frequency of the effective log behaviors;
and performing numerical calculation on the frequency of the effective log behaviors and the request value of the preset log request, and determining the behavior value of the target cloud host.
5. The recommendation method according to any one of claims 1 to 4, wherein the determining whether the recommendation for creating the snapshot needs to be made to the target cloud host according to the magnitude relationship between the user threshold and the system threshold comprises:
determining whether the system threshold is greater than or equal to the user threshold;
when the system threshold is larger than or equal to the user threshold, pushing a recommendation message for creating a snapshot to the target cloud host.
6. A snapshot creation method, comprising:
receiving a recommendation message for creating a snapshot, wherein the recommendation message for creating the snapshot is pushed according to the recommendation method for creating the snapshot in any one of claims 1-5;
responding to the selection operation of the recommendation message;
and performing corresponding processing based on the selection operation.
7. A recommendation device for creating a snapshot, comprising:
the acquisition module is used for acquiring operation behavior data and hardware utilization rate of the target cloud host;
the analysis module is used for analyzing the operation behavior data and determining a behavior value of the target cloud host;
a determining module, configured to determine a user threshold of the target cloud host based on the behavior value of the target cloud host and the hardware usage rate;
and the recommending module is used for determining whether recommendation for creating a snapshot needs to be carried out on the target cloud host according to the magnitude relation between the user threshold and the system threshold.
8. A snapshot creation apparatus, comprising:
a receiving module, configured to receive a recommendation message for creating a snapshot, where the recommendation message for creating a snapshot is pushed according to the first aspect of the present invention or the recommendation method for creating a snapshot described in any embodiment of the first aspect;
a selection module for responding to a selection operation of the recommendation message;
and the processing module is used for carrying out corresponding processing by the user based on the selection operation.
9. An electronic device, comprising:
a memory and a processor, the memory and the processor being communicatively connected to each other, the memory having stored therein computer instructions, and the processor executing the computer instructions to perform the recommendation method for creating a snapshot according to any one of claims 1 to 5, or to perform the snapshot creation method according to claim 6.
10. A computer-readable storage medium storing computer instructions for causing a computer to execute the recommendation method for creating a snapshot of any one of claims 1-5 or to execute the snapshot creation method of claim 6.
CN202110077724.6A 2021-01-20 Recommendation method for creating snapshot, snapshot creation method, device and electronic equipment Active CN112800003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110077724.6A CN112800003B (en) 2021-01-20 Recommendation method for creating snapshot, snapshot creation method, device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110077724.6A CN112800003B (en) 2021-01-20 Recommendation method for creating snapshot, snapshot creation method, device and electronic equipment

Publications (2)

Publication Number Publication Date
CN112800003A true CN112800003A (en) 2021-05-14
CN112800003B CN112800003B (en) 2024-07-09

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115098760A (en) * 2022-06-29 2022-09-23 北京达佳互联信息技术有限公司 Data processing method and device, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150370639A1 (en) * 2014-06-24 2015-12-24 International Business Machines Corporation Back up and recovery in virtual machine environments
CN105955876A (en) * 2016-05-13 2016-09-21 腾讯科技(深圳)有限公司 Data monitoring processing method and apparatus
CN107341095A (en) * 2017-06-27 2017-11-10 北京优特捷信息技术有限公司 A kind of method and device of intellectual analysis daily record data
CN108351946A (en) * 2015-11-20 2018-07-31 赛门铁克公司 System and method for anonymization journal entries
CN108509501A (en) * 2018-02-28 2018-09-07 努比亚技术有限公司 A kind of inquiry processing method, server and computer readable storage medium
CN109753384A (en) * 2019-01-14 2019-05-14 广东电网有限责任公司信息中心 Snap backup method, device, computer equipment and the storage medium of cloud host
CN110413488A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 Server utilization rate method for early warning and device
CN111209267A (en) * 2019-12-23 2020-05-29 中国建设银行股份有限公司 Information providing method, system, device and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150370639A1 (en) * 2014-06-24 2015-12-24 International Business Machines Corporation Back up and recovery in virtual machine environments
CN108351946A (en) * 2015-11-20 2018-07-31 赛门铁克公司 System and method for anonymization journal entries
CN105955876A (en) * 2016-05-13 2016-09-21 腾讯科技(深圳)有限公司 Data monitoring processing method and apparatus
CN107341095A (en) * 2017-06-27 2017-11-10 北京优特捷信息技术有限公司 A kind of method and device of intellectual analysis daily record data
CN108509501A (en) * 2018-02-28 2018-09-07 努比亚技术有限公司 A kind of inquiry processing method, server and computer readable storage medium
CN109753384A (en) * 2019-01-14 2019-05-14 广东电网有限责任公司信息中心 Snap backup method, device, computer equipment and the storage medium of cloud host
CN110413488A (en) * 2019-07-31 2019-11-05 中国工商银行股份有限公司 Server utilization rate method for early warning and device
CN111209267A (en) * 2019-12-23 2020-05-29 中国建设银行股份有限公司 Information providing method, system, device and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115098760A (en) * 2022-06-29 2022-09-23 北京达佳互联信息技术有限公司 Data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US11695842B2 (en) Managing operation of instances
US9384114B2 (en) Group server performance correction via actions to server subset
EP3646568B1 (en) Determining an optimal timeout value to minimize downtime for nodes in a network-accessible server set
US10452511B2 (en) Server health checking
US20110071811A1 (en) Using event correlation and simulation in authorization decisions
WO2019140739A1 (en) Method for determining return visits to client, and electronic apparatus and computer-readable storage medium
US9785507B2 (en) Restoration of consistent regions within a streaming environment
CN108920103B (en) Server management method and device, computer equipment and storage medium
CN111538585B (en) Js-based server process scheduling method, system and device
CN110362435B (en) PCIE fault positioning method, device, equipment and medium for Purley platform server
US10754753B1 (en) Performance of virtual machine instances using machine recognition of screenshot images
CN113626882A (en) Method, device and medium for generating equipment identifier
CN112667467A (en) Cluster self-adaptive current limiting method and device, computer equipment and storage medium
US11929869B2 (en) Scalable and real-time anomaly detection
CN111737055A (en) Service processing method, device, equipment and computer readable storage medium
CN112800003B (en) Recommendation method for creating snapshot, snapshot creation method, device and electronic equipment
CN112800003A (en) Recommendation method for creating snapshot, snapshot creation method and device and electronic equipment
KR102464688B1 (en) Method and apparatus for detrmining event level of monitoring result
US20230088318A1 (en) Remotely healing crashed processes
US11763039B2 (en) Automatically determining storage system data breaches using machine learning techniques
US11265212B2 (en) Selectively throttling implementation of configuration changes in an enterprise
CN113656378A (en) Server management method, device and medium
CN114116276A (en) BMC hang-up self-recovery method, system, terminal and storage medium
US20230004476A1 (en) Application failure tracking features
CN116719621B (en) Data write-back method, device, equipment and medium for mass tasks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant