CN115185744A - Validity verification method and device of backup data and computer equipment - Google Patents

Validity verification method and device of backup data and computer equipment Download PDF

Info

Publication number
CN115185744A
CN115185744A CN202210823403.0A CN202210823403A CN115185744A CN 115185744 A CN115185744 A CN 115185744A CN 202210823403 A CN202210823403 A CN 202210823403A CN 115185744 A CN115185744 A CN 115185744A
Authority
CN
China
Prior art keywords
verification
backup data
verified
date
environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210823403.0A
Other languages
Chinese (zh)
Inventor
吕利文
杨阳
吕斌
刘玄飞
詹子曦
严恺珺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guosen Securities Co ltd
Original Assignee
Guosen Securities Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guosen Securities Co ltd filed Critical Guosen Securities Co ltd
Priority to CN202210823403.0A priority Critical patent/CN115185744A/en
Publication of CN115185744A publication Critical patent/CN115185744A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore

Abstract

The embodiment of the invention relates to the technical field of data backup, and discloses a method for verifying the validity of backup data, which comprises the following steps: determining current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; and if so, performing data recovery verification on the current backup data to be verified through the target verification environment. Through the mode, the embodiment of the invention realizes the automatic and efficient verification of the validity of the backup data and improves the efficiency of the verification of the backup data.

Description

Validity verification method and device of backup data and computer equipment
Technical Field
The embodiment of the invention relates to the technical field of data backup, in particular to a method and a device for verifying the effectiveness of backup data, computer equipment and a computer-readable storage medium.
Background
Currently, data processing includes collection, storage, use, processing, transmission, provision, disclosure, and the like of data as indicated in national data security laws. The data security means that necessary measures are taken to ensure that data is in a state of effective protection and legal utilization, and the data security has the capability of ensuring a continuous security state. However, the conventional data backup scheme does not provide a data recovery verification means, so that cases that an enterprise fails to start backup data recovery are frequently found when data loss occurs, which also causes huge economic loss and adverse social influence to clients of various industries. Recently, financial science and technology development planning (2022-2025) issued by the central authorities proposes to establish a long-acting mechanism and safeguard measures for the full life cycle security management of healthy data, and applies technical means to strictly prevent privacy disclosure, data tampering and improper use, and legally protect the privacy of data subjects from being infringed. And establishing a historical data safety cleaning mechanism, timely deleting and destroying the user data exceeding the storage life by using professional technologies and tools, and regularly carrying out data recoverability verification to ensure that the data cannot be restored. Meanwhile, the ' standard of the backup capability of the information system of the securities futures management organization ' (JR/T0059-201 c) also mentions ' validity verification of data backup at least once every quarter ' in the data backup capability ', and the ' model of maturity of the data security capability of the information security technology ' (GB/T37988-2019) mentions ' implementation of redundancy management of stored data and protection of data availability by performing regular data backup and recovery ' in the data backup and recovery part. It can be seen that it is essential to build a backup data validity verification capability.
However, the validity verification of the existing backup data is mostly performed manually, and in the face of a large amount of backup data, automatic verification cannot be performed, and the efficiency of data verification is low.
Disclosure of Invention
In view of the foregoing problems, embodiments of the present invention provide a method, an apparatus, a computer device, and a computer-readable storage medium for verifying validity of backup data, which are used to solve the technical problem in the prior art that the verification efficiency of backup data is low.
According to an aspect of the embodiments of the present invention, there is provided a method for verifying validity of backup data, the method including:
determining current backup data to be verified according to the verification task arrangement time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
determining whether the capacity of the target verification environment meets the current backup data to be verified;
and if so, performing data recovery verification on the current backup data to be verified through the target verification environment.
In an optional manner, before determining the current backup data to be verified according to the verification task arrangement time wheel, the method further includes: acquiring a plurality of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task; and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
In an optional manner, after obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups, the method further includes: acquiring new backup data to be verified; adding the new backup data to be verified into a list corresponding to the backup data to be verified; and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
In an optional manner, the obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups includes: assigning a plurality of identifiers of the data to be verified to each of the date node groups, wherein each virtual date in the plurality of virtual date groups bears at least 1 verification task; the date node group constitutes a first time wheel and the virtual date group constitutes a second time wheel; and forming the verification task arrangement time wheel by the first time wheel and the second time wheel, so that after the first time wheel moves for a certain verification date, the verification date is transmitted to the second time wheel to obtain a verification plan list in a second preset verification period, wherein the verification plan list comprises at least one verification task for verifying data to be verified.
In an optional manner, the determining, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified includes: acquiring metadata information corresponding to the verification resource pool; and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified.
In an optional manner, after determining whether the capacity of the target verification environment satisfies the current backup data to be verified, the method further includes: determining a calling state of an environment host of the target verification environment; when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified; and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
In an alternative manner, the performing, when there is a call to the environment host, cleaning the environment host before the verification window period of the backup data to be currently verified includes: when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified; when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host; and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed.
According to another aspect of the embodiments of the present invention, there is provided an apparatus for verifying validity of backup data, including:
the first determining module is used for determining the current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
the second determining module is used for determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
a third determining module, configured to determine whether the capacity of the target verification environment meets the current backup data to be verified;
and the recovery verification module is used for performing data recovery verification on the current backup data to be verified through the target verification environment if the target verification environment is met.
According to another aspect of the embodiments of the present invention, there is provided a computer apparatus including: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation of the validity verification method of the backup data.
According to another aspect of the embodiments of the present invention, there is provided a computer-readable storage medium, in which at least one executable instruction is stored, and when the executable instruction runs on a computer device, the computer device is caused to execute the operation of the validity verification method for backup data.
According to the embodiment of the invention, the current backup data to be verified is determined by arranging the time wheels according to the verification task; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; if the target verification environment meets the requirement, the data recovery verification is carried out on the current backup data to be verified through the target verification environment, the verification period of the backup data can be automatically and reasonably arranged, and the recovery verification efficiency of the backup data can be effectively improved.
The foregoing description is only an overview of the technical solutions of the embodiments of the present invention, and the embodiments of the present invention can be implemented according to the content of the description in order to make the technical means of the embodiments of the present invention more clearly understood, and the detailed description of the present invention is provided below in order to make the foregoing and other objects, features, and advantages of the embodiments of the present invention more clearly understandable.
Drawings
The drawings are only for purposes of illustrating embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a schematic flowchart illustrating a method for verifying validity of backup data according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating that verification date arrangement is obtained based on a consistent hash algorithm in the validity verification method for backup data according to the embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a verification task arrangement time wheel in the validity verification method for backup data according to the embodiment of the present invention;
fig. 4 is a schematic diagram illustrating generation of a verification task plan in the validity verification method for backup data according to the embodiment of the present invention;
fig. 5 is a schematic diagram illustrating verification environment matching in a validity verification method for backup data according to an embodiment of the present invention;
fig. 6 is a schematic diagram illustrating a verification environment capacity in a validity verification method for backup data according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram illustrating an apparatus for verifying validity of backup data according to an embodiment of the present invention;
fig. 8 shows a schematic structural diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein.
Fig. 1 is a flowchart illustrating a method for verifying validity of backup data according to an embodiment of the present invention, where the method is executed by a computer device. The computer device may be a personal computer device, a terminal device, and the like, and the embodiment of the present invention is not particularly limited. As shown in fig. 1, the method comprises the steps of:
step 110: determining current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on all verification tasks in the verification plan.
In the embodiment of the invention, before the current backup data to be verified is determined according to the verification task configuration time wheel, a plurality of backup data to be verified are also obtained; based on a consistent hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task; and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
The following details are that based on a consistent hash algorithm, verification date arrangement is performed on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; and based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a specific process of a plurality of virtual date groups. FIG. 2 is a schematic diagram illustrating a process for obtaining the verification date arrangement based on the consistent hashing algorithm. When the verification plan is created, firstly, a plurality of backup data to be verified and a verification plan creation request are obtained, hash algorithm calculation is carried out according to the verification plan creation request, and the verification date of the backup data to be verified is determined. The consistent hash is adopted, the distribution from mass verification data to verification date can be balanced to achieve sufficient dispersion and fully show verification efficiency, the time complexity of the consistent hash table is O (1), the trunk of the hash table is an array, a certain element is searched in the array according to subscripts, one-time positioning can be achieved, and the verification task obtaining efficiency is improved better. Specifically, the backup id of each backup data to be verified is taken as a key, and the basic hash formula is verification date = hash (key)% N, where N is a first preset verification period. In one embodiment of the invention, N may be 90 days per quarter. Each verification date stores a value (metadata for backup data validity verification) associated with the key. Through a consistent hash algorithm, the verification date of each backup data to be verified in the first preset verification period can be obtained, so that the verification date corresponding to each backup data to be verified in each first preset verification period is determined. Therefore, the specific process of arranging the verification dates with the first preset verification period as the nodes for the plurality of backup data to be verified to obtain a plurality of date node groups is realized. After a plurality of date node groups are obtained, all the to-be-verified backup data in each date node group are determined in the same way and are arranged by taking a second preset verification period as the verification date of the node, so that a plurality of virtual date groups are obtained. The first preset verification period is quarterly, i.e. 90 days, and the second preset verification period is day. That is, after time arrangement is performed on each piece of backup data to be verified through the hash algorithm, a plurality of pieces of backup data to be verified corresponding to each quarter and a plurality of pieces of backup data to be verified each day in each quarter can be obtained.
And setting a group of backup data to be verified of each first preset verification period as a date node group, and setting a group of backup data to be verified corresponding to each second preset verification period as a virtual date group. A first time wheel is constructed by a plurality of date node groups, the data nodes are mapped in an annular area of the first time wheel, a second time wheel is constructed by a plurality of virtual date groups, and a corresponding backup data wheel to be verified is mapped in an annular area of the second time wheel, so that a verification task arrangement time wheel is formed, as shown in fig. 3. In an embodiment of the present invention, the first time round of the verification task assignment time round is a season round, and the second time round is a day round. Wherein, a plurality of date node groups (season rounds) and virtual date groups (day rounds) carry out date mapping information according to seasons; date nodes are architecturally organized in two-tier timeline wheels, with each date node on a season wheel being assigned multiple identities and maintaining a consistent hash space. In order to better realize balance, a plurality of virtual date-time groups are added between two date nodes, and each virtual date in the virtual date-time groups bears at least 1 verification task. And performing Hash operation on backup data needing to be verified in the virtual date-time group, and mapping the backup data on the annular area of the date wheel. Then, let the value move in the clockwise direction, the first date node encountered is its assigned verification date. When the season round moves a certain verification date, the date is transmitted to the day round, and the attribution task list of the day is taken down through the two-layer time round. The day round takes over the task queue and executes the tasks according to the sequence of' 8. And the started task combines the backup data validity verification flow to perform verification environment matching and capacity confirmation, and performs recovery verification after the confirmation is completed. By the method, the reliability and the availability of the balancing process are ensured, and the problem of unbalanced load in the quarterly backup data verification process is avoided. As shown in fig. 4, in the embodiment of the present invention, the verification task state and progress management module combines with the verification task configuration time wheel to perform timing verification on the backup data to be verified, so that the verification efficiency can be effectively improved. For the distribution process of verifying backup data, quarterly verification is required due to industry specifications. The balance between verified backup data and the number of daily verifications in the face of ever increasing backup data that needs to be verified. In this way, the verification plan can be more balanced, more distributed, and monotonous, since the number of days in the quarter is only 90 days, and the backup data to be verified in the quarter is tens of days.
In the embodiment of the invention, new backup data to be verified is obtained; adding the new backup data to be verified into a list corresponding to the backup data to be verified; and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
Step 120: and determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool.
The embodiment of the invention is provided with a verification resource pool in advance, wherein the verification resource pool is provided with a plurality of verification resources to match various backup data to be verified, so that the backup data is restored and verified through the matched verification environment.
As shown in fig. 5, in the embodiment of the present invention, metadata information corresponding to the verification resource pool is obtained; and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified. The verification environment decision comprises the steps of determining the OS type, the type of the backup data to be verified currently, the state of a verification host, verification capacity calculation, verification white list management and verification queue management. Thereby determining a matching target verification environment.
Step 130: and determining whether the capacity of the target verification environment meets the current backup data to be verified.
In the embodiment of the invention, after the matched target verification environment is determined, the state of the target verification environment is verified. Wherein a calling state of an environment host of the target verification environment is determined; when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified; and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
As shown in fig. 6, in the embodiment of the present invention, when there is a call to the environment host, performing cleanup on the environment host before a verification window period of the current backup data to be verified includes: when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified; when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host; and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed. And executing the task when the capacity of the verification data is smaller than the available capacity of the verification environment and the first preset threshold value is not touched. And when the capacity of the verification data is larger than the available capacity of the verification environment and touches a first preset threshold value, preferentially executing dynamic capacity cleaning service, waiting for the task to enter a queue, and automatically executing the task after the cleaning is finished. And when the capacity of the verification data is larger than the available capacity of the verification environment and the first preset threshold value is not touched, the task enters a queue to wait. Wherein, the first preset threshold may be an 80% capacity threshold.
Step 140: and if so, performing data recovery verification on the current backup data to be verified through the target verification environment.
And when the target verification environment is determined and the state of the target verification environment is available, performing data recovery verification on the current backup data to be verified according to the matched target verification environment. Thereby obtaining the verification result of data recovery verification.
According to the embodiment of the invention, the current backup data to be verified is determined by arranging the time wheels according to the verification task; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; if the target verification environment meets the requirement, the data recovery verification is carried out on the current backup data to be verified through the target verification environment, the verification period of the backup data can be automatically and reasonably arranged, and the efficiency of the recovery verification of the backup data can be effectively improved.
Fig. 7 is a schematic structural diagram illustrating an apparatus for verifying validity of backup data according to an embodiment of the present invention. As shown in fig. 7, the apparatus 300 includes:
the first determining module 310 is configured to determine, according to the verification task arrangement time wheel, current backup data to be verified; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
a second determining module 320, configured to determine, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified;
a third determining module 330, configured to determine whether the capacity of the target verification environment meets the current backup data to be verified;
and the recovery verification module 340 is configured to perform data recovery verification on the current backup data to be verified through the target verification environment if the condition is met.
In an optional manner, before determining the current backup data to be verified according to the verification task arrangement time wheel, the method further includes: acquiring a plurality of backup data to be verified; based on a consistent Hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task; and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
In an optional manner, after obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups, the method further includes: acquiring new backup data to be verified; adding the new backup data to be verified into a list corresponding to the backup data to be verified; and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
In an optional manner, the obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups includes: distributing a plurality of identifications of the data to be verified for each date node group, wherein each virtual date in the plurality of virtual date groups bears at least 1 verification task; the date node group constitutes a first time wheel and the virtual date group constitutes a second time wheel; and forming the verification task arrangement time wheel by the first time wheel and the second time wheel, so that after the first time wheel moves for a certain verification date, the verification date is transmitted to the second time wheel to obtain a verification plan list in a second preset verification period, wherein the verification plan list comprises at least one verification task for verifying data to be verified.
In an optional manner, the determining, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified includes: acquiring metadata information corresponding to the verification resource pool; and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified.
In an optional manner, after determining whether the capacity of the target verification environment satisfies the current backup data to be verified, the method further includes: determining a calling state of an environment host of the target verification environment; when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified; and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
In an optional manner, when there is a call to the environment host, performing scrubbing on the environment host before a verification window period of the backup data to be currently verified includes: when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified; when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host; and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed.
The specific working process of each functional module in the device for verifying validity of backup data according to the embodiment of the present invention is substantially the same as the steps of the method embodiment described above, and is not described here again.
According to the embodiment of the invention, the current backup data to be verified is determined by arranging the time wheels according to the verification task; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; if the target verification environment meets the requirement, the data recovery verification is carried out on the current backup data to be verified through the target verification environment, the verification period of the backup data can be automatically and reasonably arranged, and the efficiency of the recovery verification of the backup data can be effectively improved.
Fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present invention, where the specific embodiment of the present invention does not limit a specific implementation of the computer device.
As shown in fig. 8, the computer apparatus may include: a processor (processor) 402, a Communications Interface 404, a memory 406, and a Communications bus 408.
Wherein: the processor 402, communication interface 404, and memory 406 communicate with each other via a communication bus 408. A communication interface 404 for communicating with network elements of other devices, such as clients or other servers. The processor 402 is configured to execute the program 410, and may specifically perform relevant steps in the above-described validity verification method for backup data.
In particular, program 410 may include program code comprising computer-executable instructions.
The processor 402 may be a central processing unit CPU, or an Application Specific Integrated Circuit ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement an embodiment of the present invention. The computer device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 406 for storing a program 410. Memory 406 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
The program 410 may specifically be invoked by the processor 402 to cause the computer device to perform the following operations:
determining current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
determining whether the capacity of the target verification environment meets the current backup data to be verified;
and if so, performing data recovery verification on the current backup data to be verified through the target verification environment.
In an optional manner, before determining the current backup data to be verified according to the verification task arrangement time wheel, the method further includes: acquiring a plurality of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task; and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
In an optional manner, after obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups, the method further includes: acquiring new backup data to be verified; adding the new backup data to be verified into a list corresponding to the backup data to be verified; and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
In an optional manner, the obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups includes: assigning a plurality of identifiers of the data to be verified to each of the date node groups, wherein each virtual date in the plurality of virtual date groups bears at least 1 verification task; the date node group constitutes a first time wheel and the virtual date group constitutes a second time wheel; and forming the verification task arrangement time wheel by the first time wheel and the second time wheel, so that after the first time wheel moves for a certain verification date, the verification date is transmitted to the second time wheel to obtain a verification plan list in a second preset verification period, wherein the verification plan list comprises at least one verification task for verifying data to be verified.
In an optional manner, the determining, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified includes: acquiring metadata information corresponding to the verification resource pool; and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified.
In an optional manner, after determining whether the capacity of the target verification environment satisfies the current backup data to be verified, the method further includes: determining a calling state of an environment host of the target verification environment; when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified; and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
In an optional manner, when there is a call to the environment host, performing scrubbing on the environment host before a verification window period of the backup data to be currently verified includes: when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified; when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host; and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed.
According to the embodiment of the invention, the current backup data to be verified is determined by arranging the time wheels according to the verification task; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; if the target verification environment meets the requirement, the data recovery verification is carried out on the current backup data to be verified through the target verification environment, the verification period of the backup data can be automatically and reasonably arranged, and the efficiency of the recovery verification of the backup data can be effectively improved.
An embodiment of the present invention provides a computer-readable storage medium, where the storage medium stores at least one executable instruction, and when the executable instruction runs on a computer device, the computer device is enabled to execute a validity verification method for backup data in any method embodiment described above.
The executable instructions may be specifically configured to cause the computer device to perform the following operations:
determining current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
determining whether the capacity of the target verification environment meets the current backup data to be verified;
and if so, performing data recovery verification on the current backup data to be verified through the target verification environment.
In an optional manner, before determining the current backup data to be verified according to the verification task arrangement time wheel, the method further includes: acquiring a plurality of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified; based on a consistent hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task; and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
In an optional manner, after obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups, the method further includes: acquiring new backup data to be verified; adding the new backup data to be verified into a list corresponding to the backup data to be verified; and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
In an optional manner, the obtaining the verification task arrangement time wheel according to a plurality of the date node groups and a plurality of virtual date groups corresponding to each of the date node groups includes: assigning a plurality of identifiers of the data to be verified to each of the date node groups, wherein each virtual date in the plurality of virtual date groups bears at least 1 verification task; the date node group constitutes a first time wheel and the virtual date group constitutes a second time wheel; and forming the verification task arrangement time wheel by the first time wheel and the second time wheel, so that after the first time wheel moves for a certain verification date, the verification date is transmitted to the second time wheel to obtain a verification plan list in a second preset verification period, wherein the verification plan list comprises at least one verification task for verifying data to be verified.
In an optional manner, the determining, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified includes: acquiring metadata information corresponding to the verification resource pool; and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified.
In an optional manner, after determining whether the capacity of the target verification environment satisfies the current backup data to be verified, the method further includes: determining a calling state of an environment host of the target verification environment; when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified; and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
In an alternative manner, the performing, when there is a call to the environment host, cleaning the environment host before the verification window period of the backup data to be currently verified includes: when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified; when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host; and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed.
According to the embodiment of the invention, the current backup data to be verified is determined by arranging the time wheels according to the verification task; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan; determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool; determining whether the capacity of the target verification environment meets the current backup data to be verified; if the target verification environment meets the requirement, the data recovery verification is carried out on the current backup data to be verified through the target verification environment, the verification period of the backup data can be automatically and reasonably arranged, and the efficiency of the recovery verification of the backup data can be effectively improved.
The embodiment of the invention provides a device for verifying the validity of backup data, which is used for executing the method for verifying the validity of the backup data.
Embodiments of the present invention provide a computer program, where the computer program can be called by a processor to enable a computer device to execute a validity verification method for backup data in any of the above method embodiments.
Embodiments of the present invention provide a computer program product, which includes a computer program stored on a computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are run on a computer, the computer is caused to execute the method for verifying validity of backup data in any of the above-mentioned method embodiments.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention can be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limited to the order of execution unless otherwise specified.

Claims (10)

1. A method for verifying the validity of backup data, the method comprising:
determining current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
determining whether the capacity of the target verification environment meets the current backup data to be verified;
and if so, performing data recovery verification on the current backup data to be verified through the target verification environment.
2. The method of claim 1, wherein before determining the backup data currently to be verified according to the verification task scheduling time round, the method further comprises:
acquiring a plurality of backup data to be verified;
based on a consistent Hash algorithm, carrying out verification date arrangement on the plurality of backup data to be verified by taking a first preset verification period as a node to obtain a plurality of date node groups; each group of date node group corresponds to a group of backup data to be verified;
based on a consistent Hash algorithm, carrying out verification date arrangement by taking a second preset verification period as a node on each backup data to be verified in each date node group to obtain a plurality of virtual date groups; each virtual date in the plurality of virtual date groups undertakes at least 1 verification task;
and obtaining the verification task arrangement time wheel according to the plurality of date node groups and the plurality of virtual date groups corresponding to the date node groups.
3. The method of claim 2, wherein after obtaining the validation task assignment time wheel based on the plurality of date node groups and the plurality of virtual date groups corresponding to each of the date node groups, the method further comprises:
acquiring new backup data to be verified;
adding the new backup data to be verified into a list corresponding to the backup data to be verified;
and based on the consistent hash algorithm, performing verification date arrangement with a first preset verification period as a node on each piece of backup data to be verified to obtain a plurality of date node groups, and performing verification date arrangement with a second preset verification period as a node on each piece of backup data to be verified in each date node group to obtain a plurality of virtual date groups so as to obtain a new verification task arrangement time wheel.
4. The method according to claim 2, wherein obtaining the validation task assignment time wheel according to a plurality of the date node groups and a plurality of virtual date groups corresponding to each of the date node groups comprises:
assigning a plurality of identifiers of the data to be verified to each of the date node groups, wherein each virtual date in the plurality of virtual date groups bears at least 1 verification task;
the date node group constitutes a first time wheel and the virtual date group constitutes a second time wheel;
and forming the verification task arrangement time wheel by the first time wheel and the second time wheel, so that after the first time wheel moves for a certain verification date, the verification date is transmitted to the second time wheel to obtain a verification plan list in a second preset verification period, wherein the verification plan list comprises at least one verification task for verifying data to be verified.
5. The method according to claim 1, wherein the determining, from a preset verification resource pool, a target verification environment corresponding to the current backup data to be verified includes:
acquiring metadata information corresponding to the verification resource pool;
and performing verification environment allocation decision according to the metadata information and the current backup data to be verified to obtain a target verification environment corresponding to the current backup data to be verified.
6. The method of claim 1, wherein after determining whether the capacity of the target verification environment satisfies the backup data to be currently verified, the method further comprises:
determining a calling state of an environment host of the target verification environment;
when the environment host computer is called, cleaning the environment host computer before the verification window period of the current backup data to be verified;
and when the cleaning is successful, determining that the capacity of the target verification environment meets the current backup data to be verified.
7. The method of claim 6, wherein performing scrubbing on the environment host before a verification window period of the backup data to be currently verified when there is a call to the environment host comprises:
when the environment host computer is called, determining the environment capacity and the available capacity of the environment host computer and the capacity of the current backup data to be verified;
when the environment capacity of the environment host is larger than a first preset threshold and the environment host is not associated with a verification task, cleaning the capacity of the environment host;
and when the capacity of the current backup data to be verified is smaller than the available capacity and the environment capacity touches the first preset threshold, preferentially executing a verification recovery task of the current backup data to be verified, and performing capacity cleaning on the environment host after the task is completed.
8. An apparatus for verifying validity of backup data, the apparatus comprising:
the first determining module is used for determining the current backup data to be verified according to the verification task configuration time wheel; the verification task arrangement time wheel is used for carrying out time arrangement on each verification task in the verification plan;
the second determining module is used for determining a target verification environment corresponding to the current backup data to be verified from a preset verification resource pool;
a third determining module, configured to determine whether a capacity of the target verification environment meets the current backup data to be verified;
and the recovery verification module is used for performing data recovery verification on the current backup data to be verified through the target verification environment if the target verification environment is met.
9. A computer device, comprising: the system comprises a processor, a memory, a communication interface and a communication bus, wherein the processor, the memory and the communication interface are communicated with each other through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction causes the processor to execute the operation of the validity verification method of the backup data according to any one of claims 1 to 7.
10. A computer-readable storage medium having stored therein at least one executable instruction which, when run on a computer device, causes the computer device to perform the operations of the validity verification method of backup data according to any one of claims 1 to 7.
CN202210823403.0A 2022-07-14 2022-07-14 Validity verification method and device of backup data and computer equipment Pending CN115185744A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210823403.0A CN115185744A (en) 2022-07-14 2022-07-14 Validity verification method and device of backup data and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210823403.0A CN115185744A (en) 2022-07-14 2022-07-14 Validity verification method and device of backup data and computer equipment

Publications (1)

Publication Number Publication Date
CN115185744A true CN115185744A (en) 2022-10-14

Family

ID=83519412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210823403.0A Pending CN115185744A (en) 2022-07-14 2022-07-14 Validity verification method and device of backup data and computer equipment

Country Status (1)

Country Link
CN (1) CN115185744A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319119A (en) * 2023-05-26 2023-06-23 广东广宇科技发展有限公司 Accompanying type iterative communication verification method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116319119A (en) * 2023-05-26 2023-06-23 广东广宇科技发展有限公司 Accompanying type iterative communication verification method
CN116319119B (en) * 2023-05-26 2023-09-26 广东广宇科技发展有限公司 Accompanying type iterative communication verification method

Similar Documents

Publication Publication Date Title
CN108595157B (en) Block chain data processing method, device, equipment and storage medium
WO2022078345A1 (en) Method for data interaction between multiple devices, and related device
US9262205B2 (en) Selective checkpointing of links in a data flow based on a set of predefined criteria
CN110838065A (en) Transaction data processing method and device
US10496843B2 (en) Systems and method for automatically securing sensitive data in public cloud using a serverless architecture
CN109255056B (en) Data reference processing method, device, equipment and storage medium of block chain
CN104424013A (en) Method and device for deploying virtual machine in computing environment
CN106815254A (en) A kind of data processing method and device
CN112559635B (en) Service processing method, device, equipment and medium for Ethernet alliance chain node
CN103294558A (en) MapReduce scheduling method supporting dynamic trust evaluation
CN114328133A (en) Single-mechanism distributed conflict detection method and system and deposit separation framework
CN105096034A (en) Realizing method for electronic government and electronic government system
CN115185744A (en) Validity verification method and device of backup data and computer equipment
CN104468240A (en) Cloud terminal management method and device
EP3553689A1 (en) System and method for automatically securing sensitive data in public cloud using a serverless architecture
CN110990329A (en) Method, equipment and medium for high availability of federated computing
CN115168509A (en) Processing method and device of wind control data, storage medium and computer equipment
US20190073280A1 (en) Stopping central processing units for data collection based on event categories of events
CN112328960B (en) Optimization method and device for data operation, electronic equipment and storage medium
US11288291B2 (en) Method and system for relation discovery from operation data
CN110719260B (en) Intelligent network security analysis method and device and computer readable storage medium
CN117370472B (en) Data processing method, device, equipment and storage medium
CN112433841B (en) Resource pool scheduling method, system, server and storage medium
CN116385116A (en) Method for acquiring big data of multiple household appliances by utilizing priority queue and computing equipment
Chen et al. Boosting Correlated Failure Repair in SSD Data Centers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination