CN115396327A - System access switching method and device - Google Patents

System access switching method and device Download PDF

Info

Publication number
CN115396327A
CN115396327A CN202211109709.6A CN202211109709A CN115396327A CN 115396327 A CN115396327 A CN 115396327A CN 202211109709 A CN202211109709 A CN 202211109709A CN 115396327 A CN115396327 A CN 115396327A
Authority
CN
China
Prior art keywords
drilling
time period
disaster recovery
drilled
drilling plan
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211109709.6A
Other languages
Chinese (zh)
Other versions
CN115396327B (en
Inventor
周侃
耿鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202211109709.6A priority Critical patent/CN115396327B/en
Publication of CN115396327A publication Critical patent/CN115396327A/en
Application granted granted Critical
Publication of CN115396327B publication Critical patent/CN115396327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0654Management of faults, events, alarms or notifications using network fault recovery
    • H04L41/0668Management of faults, events, alarms or notifications using network fault recovery by dynamic selection of recovery network elements, e.g. replacement by the most appropriate element after failure

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Hardware Redundancy (AREA)

Abstract

The application provides a system access switching method and device, and relates to the technical field of data access. The system access switching method comprises the following steps: receiving a plurality of disaster recovery drilling plan documents from a first terminal, and updating the drilling time period of one disaster recovery drilling plan document when the situation that the drilling time periods of any two disaster recovery drilling plan documents are overlapped and the identification of the system to be drilled of one disaster recovery drilling plan document is the identification of the system with mutually exclusive identification of the system to be drilled in the other disaster recovery drilling plan document is detected, so that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped; when the current time reaches any drilling time period, the access address of the system to be drilled in the corresponding disaster recovery drilling plan document is switched from the first access address to the second access address, so that the second terminal accesses the system to be drilled through the second access address, and data loss or system failure is avoided.

Description

System access switching method and device
Technical Field
The present application relates to the field of data access technologies, and in particular, to a system access switching method and apparatus.
Background
Disaster recovery switching refers to that two or more sets of systems with the same function are established in different places far away from each other, and when one system stops working due to accidents (such as fire, earthquake, server failure, hard disk damage and the like), the whole system can be switched to the other place, so that the functions of the system can continue to work normally.
Generally, some enterprises (such as banks and fund companies) perform disaster recovery handover exercises in order to normally perform disaster recovery handover in case of an accident. Since an enterprise generally includes a plurality of systems, it is necessary to set different drilling time periods for different systems. However, when a plurality of systems perform disaster recovery handover, data loss or system failure of some systems may be caused.
Disclosure of Invention
The application provides a system access switching method and device, which are used for solving the problem that data loss or system failure of some systems can be caused when a plurality of systems perform disaster recovery switching exercises.
In a first aspect, the present application provides a system access switching method, including: receiving a plurality of disaster tolerance drilling plan documents from a first terminal, wherein each disaster tolerance drilling plan document at least comprises an identifier of a system to be drilled, a drilling time period and an identifier of the system which is mutually exclusive with the identifier of the system to be drilled; when it is detected that the drilling time periods of any two disaster recovery drilling plan documents are overlapped, and the identifier of the system to be drilled of one disaster recovery drilling plan document is the identifier of the system with mutually exclusive identifier of the system to be drilled in the other disaster recovery drilling plan document, updating the drilling time period of one disaster recovery drilling plan document so as to ensure that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped; and when the current moment reaches any drilling time period, switching the access address of the system to be drilled in the corresponding disaster recovery drilling plan document from the first access address to the second access address so that the second terminal accesses the system to be drilled through the second access address.
When a server detects that the drilling time periods of any two disaster recovery drilling plan documents are overlapped, and the identifier of a system to be drilled of one disaster recovery drilling plan document is mutually exclusive of the identifiers of the systems to be drilled in the other disaster recovery drilling plan document, the server shows that data loss or system failure can be caused if the two systems are subjected to disaster recovery switching drilling simultaneously. In this way, the server updates the drilling time periods of one of the disaster recovery drilling plan documents, so that the drilling time periods of the two disaster recovery drilling plan documents do not overlap. Therefore, disaster recovery switching rehearsal is carried out on the two systems in different time periods, and data loss or system faults are avoided.
In a possible implementation manner, each disaster tolerance drilling plan document further includes a creation time, and the step of updating the drilling time period of one of the disaster tolerance drilling plan documents so that there is no overlap between the drilling time periods of the two disaster tolerance drilling plan documents includes: the drilling time periods of the disaster recovery drilling plan documents at the later time are delayed from being created, so that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped.
Generally, the earlier the disaster recovery drilling plan document is created, the earlier the user may want to perform switching drilling on the system to be drilled corresponding to the disaster recovery drilling plan document, so that the drilling time period of the disaster recovery drilling plan document with the later creation time is delayed, and the user's requirements can be met while avoiding data loss or system failure.
In a possible implementation manner, after receiving a plurality of disaster recovery drilling plan documents from the terminal, the method provided by the present application further includes: and if the drilling time period of any disaster recovery drilling plan document is detected to be overlapped with a preset first target time period which does not allow the switching of the access address of the system, delaying the drilling time period of the disaster recovery drilling plan document to a next second target time period which allows the switching of the access address of the system. Therefore, the data loss or system failure caused by the switching of the system to be performed corresponding to the disaster recovery drilling plan document in the first target time period can be avoided, and the user requirements can be met.
In a possible implementation manner, each disaster tolerance drilling plan document further includes a drilling cycle of a system to be drilled, and after delaying the drilling time period of the disaster tolerance drilling plan document to a next second target time period that allows switching of an access address of the system, the method provided by the present application further includes: when the fact that the delayed drilling time period of the disaster tolerance drilling plan document is overlapped with the drilling time period in the other disaster tolerance drilling plan document is detected, and the identification of the system to be drilled of the disaster tolerance drilling plan document is the identification of the system with the mutually exclusive identification of the system to be drilled in the other disaster tolerance drilling plan document is detected, the drilling time period of the other disaster tolerance drilling plan document is delayed to the next second target time period allowing the switching of the access address of the system.
Because the drilling time period of the disaster tolerance drilling plan document is delayed once, when the situation that the system to be drilled corresponding to the disaster tolerance drilling plan document and the system to be drilled corresponding to another disaster tolerance drilling plan document are mutually exclusive is detected, the drilling time period of another disaster tolerance drilling plan document is delayed to the next second target time period allowing the access address of the system to be switched, and the requirement that the user switches the system to be drilled corresponding to the disaster tolerance drilling plan document earlier can be met.
In a possible implementation manner, each disaster tolerance drilling plan document further includes a drilling scenario type, where the drilling scenario type corresponds to an influence degree of access of the system to be drilled after the access address of the system to be drilled is switched, and the method provided by the present application further includes: and when the current time reaches any drilling time period, sending a notification message to a third terminal associated with the corresponding drilling scene type, wherein the notification message is used for indicating that the access of a system to be drilled in the drilling time period has influence.
In this way, the user can perceive whether the access of the system to be performed has an influence in the performance time period through the third terminal.
In one possible implementation, the method provided by the present application further includes: and when the influence degree corresponding to the drilling scene type is larger than the set threshold value and the drilling time period is within the working day, delaying the drilling time period to be within the non-working day.
The time period of the drilling corresponding to the disaster recovery drilling plan document is delayed to the non-working day, so that the requirements of the user can be met while data loss or system faults are caused when the system to be drilled corresponding to the disaster recovery drilling plan document is switched and drilled.
In one possible embodiment, the method provided by the present application further includes: receiving a login request from a first terminal, wherein the login request carries a user account; when the type of the user account is an administrator account, sending implementation progress data of a plurality of disaster recovery drilling plan documents to a first terminal; and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan documents associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
In a second aspect, the present application further provides a system access switching apparatus, including: and the data receiving unit is used for receiving a plurality of disaster tolerance drilling plan documents from the first terminal, and each disaster tolerance drilling plan document at least comprises an identifier of a system to be drilled, a drilling time period and an identifier of a system which is mutually exclusive with the identifier of the system to be drilled. And the data updating unit is used for updating the drilling time period of one disaster recovery drilling plan document when the situation that the drilling time periods of any two disaster recovery drilling plan documents are overlapped and the identification of the system to be drilled of one disaster recovery drilling plan document is the identification of the system with mutually exclusive identification of the system to be drilled in the other disaster recovery drilling plan document is detected, so that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped. And the data access unit is used for switching the access address of the system to be trained in the corresponding disaster recovery drilling plan document from the first access address to the second access address when the current time reaches any drilling time period, so that the second terminal can access the system to be trained through the second access address.
In a third aspect, the present application also provides a computer-readable storage medium storing a computer program, which, when executed by a processor, causes a computer to perform the method as provided in the first aspect.
In a fourth aspect, the present application also provides a server comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor causing the server to perform the method as provided in the first aspect when executing the computer program.
In a fifth aspect, the present application also provides a computer program product comprising a computer program which, when executed, causes a computer to perform the method as provided in the first aspect.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and those skilled in the art can obtain other drawings without inventive labor.
Fig. 1 is a flowchart of a system access switching method according to an embodiment of the present application;
fig. 2 is an interaction diagram of a first server before system access switching according to an embodiment of the present application;
fig. 3 is an interaction diagram after system access switching of a first server according to an embodiment of the present application;
fig. 4 is a flowchart of a system access switching apparatus according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by persons skilled in the art based on the embodiments in the present application in light of the present disclosure, are within the scope of protection of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the preceding drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Generally, some enterprises (such as banks and fund companies) perform disaster recovery handover exercises in order to normally perform disaster recovery handover in case of an accident. Since an enterprise generally includes a plurality of systems, different drilling time periods need to be set for different systems. However, when a plurality of systems perform disaster recovery handover drilling, data loss or system failure of some systems may be caused.
Based on the technical problem, the invention idea of the application is as follows: the two disaster tolerance drilling plans corresponding to the system to be drilled with mutual exclusion during simultaneous drilling can be detected, and the drilling time periods of the two disaster tolerance drilling plans are set to be not overlapped. Therefore, disaster recovery switching drilling is carried out on the two mutually exclusive systems to be drilled in different time periods, and data loss or system faults are avoided.
Hereinafter, the technical solution of the present application and how to solve the above technical problems will be described in detail by specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Referring to fig. 1, the present application provides a system access switching method applied to a first server 100. As shown in fig. 2, the first server 100 is communicatively connected to a first terminal 400, wherein the first terminal 400 may be a computer of a staff member (e.g., a back-office staff member of a bank or a financial company). Specifically, the system access switching method includes:
s101: the first server 100 receives a plurality of disaster tolerance drilling plan documents from the first terminal 400, each disaster tolerance drilling plan document at least including an identifier of a system to be drilled, a drilling time period, and an identifier of a system mutually exclusive from the identifier of the system to be drilled.
It should be noted that the mutually exclusive system with the system to be exercised is: when the system to be exercised and the mutually exclusive system operate simultaneously, the two systems will affect each other, and data loss or system failure may occur in either party.
The worker may set a plurality of disaster recovery drilling plan documents at the first terminal 400. For example, the set disaster tolerance drilling plan document a includes an identifier of the system a, a drilling time period a, and an identifier of the system B that is mutually exclusive from the identifier of the system a to be drilled; the set disaster tolerance drilling plan document B comprises an identifier of a system B to be drilled, a drilling time period B and an identifier of the system A mutually exclusive with the identifier of the system B, wherein the drilling time period B is overlapped with the drilling time period A; the set disaster tolerance drilling plan document C comprises the identification of the system C to be drilled and the drilling time period C.
The staff member may set a plurality of disaster recovery drilling plan documents on the interface of the first terminal 400 in a form filling manner, or may set a plurality of disaster recovery drilling plan documents on the interface of the first terminal 400 in a form of a plurality of attachments, which is not limited herein.
S102: when it is detected that there is an overlap between the drilling time periods of any two disaster tolerance drilling plan documents and the identifier of the system to be drilled of one disaster tolerance drilling plan document is a mutually exclusive identifier of the systems to be drilled in the other disaster tolerance drilling plan document, first server 100 updates the drilling time period of one disaster tolerance drilling plan document so that there is no overlap between the drilling time periods of the two disaster tolerance drilling plan documents.
On the basis of the embodiment corresponding to S101, when detecting that the drilling time period a in the disaster recovery drilling plan document a overlaps with the drilling time period B in the disaster recovery drilling plan document B and the system a to be drilled is mutually exclusive with the system B to be drilled, the first server 100 updates the drilling time period B in the disaster recovery drilling plan document B (for example, the drilling time period B is delayed from 14-00 of this saturday to 14-00 of the next saturday.
Further, each disaster tolerance drilling plan document also comprises a creation time, and the drilling time periods of the disaster tolerance drilling plan documents with the later creation time are delayed, so that the drilling time periods of the two disaster tolerance drilling plan documents are not overlapped. For example, the creation time of the disaster tolerance drilling plan document a is earlier than the creation time of the disaster tolerance drilling plan document B. At this time, the drilling time period of the disaster recovery drilling plan document B is delayed so that there is no overlap between the drilling time periods of the disaster recovery drilling plan document a and the disaster recovery drilling plan document B.
Generally, the earlier the disaster recovery drilling plan document is created, the earlier the user may want to perform switching drilling on the system to be drilled corresponding to the disaster recovery drilling plan document, so that the drilling time period of the disaster recovery drilling plan document with the later creation time is delayed, and the user's requirements can be met while avoiding data loss or system failure.
Further, each disaster recovery drilling plan document also includes a drilling period of the system to be drilled. For example, when the system to be performed included in the disaster tolerance drilling plan is a dual-activity architecture system, the drilling cycle is to perform disaster tolerance drilling once every three months, and when the system to be performed included in the disaster tolerance drilling plan is a database system, the disaster tolerance drilling is performed once every six months; and when the system to be performed included in the disaster tolerance drilling plan is the designated important information system, performing disaster tolerance drilling once every three years.
Based on the above embodiment, when it is detected that the delayed drilling time period of the disaster recovery drilling plan document overlaps with the drilling time period in another disaster recovery drilling plan document, and the identifier of the system to be drilled of the disaster recovery drilling plan document is the identifier of the system with mutually exclusive identifier of the system to be drilled in another disaster recovery drilling plan document, the drilling time period of another disaster recovery drilling plan document is delayed to a next second target time period for allowing switching of the access address of the system.
Exemplarily, if the drilling cycle corresponding to the delayed disaster tolerance drilling plan document B is 3 months, when the drilling time period of the disaster tolerance drilling plan document B exceeds 3 months from the previous drilling time period, and overlaps with the drilling time period in another disaster tolerance drilling plan document and there is mutual exclusion with the system to be drilled, the drilling time period of the other disaster tolerance drilling plan document B is delayed until a next second target time period allowing switching of the access address of the system, while the drilling time period of the other disaster tolerance drilling plan document is preferentially performed on the system to be drilled corresponding to the disaster tolerance drilling plan document B in the delayed drilling time period. The second target time period may be a time period in a non-working day (such as weekend), or a non-working time period in a non-working day (such as thursday 18.
It can be understood that, since the drilling time period of the disaster recovery drilling plan document has been delayed once, when it is detected that the system to be performed corresponding to the disaster recovery drilling plan document is mutually exclusive with the system to be performed corresponding to another disaster recovery drilling plan document, the drilling time period of another disaster recovery drilling plan document is delayed to a next second target time period allowing switching of the access address of the system, so that the requirement of the user for switching the drilling of the system to be performed corresponding to the disaster recovery drilling plan document earlier can be met.
S103: when the current time reaches any drilling time period, the first server 100 switches the access address of the system to be drilled in the corresponding disaster tolerance drilling plan document from the first access address to the second access address, so that the second terminal accesses the system to be drilled through the second access address.
Illustratively, a target application (such as mobile banking and financial management applications) runs on the second terminal, and the target application comprises a plurality of target controls, such as a transfer control, a deposit control, a withdrawal control and the like. Initially, as shown in fig. 2, when the transfer control is triggered, the first terminal 400 may access the transfer system located in the second server 200 at location a through the first access address; when the withdrawal control is triggered, the first terminal 400 may access the withdrawal system located in the second server 200 at the a location through the first access address; when the deposit control is triggered, the first terminal 400 may access the deposit system in the second server 200 located at the a site through the first access address.
When the access address of the system to be trained is switched from the first access address to the second access address, as shown in fig. 3, when the transfer control is triggered, the first terminal 400 may access the transfer system in the third server 300 located at the B-site through the second access address; when the withdrawal control is triggered, the first terminal 400 may access a withdrawal system in the third server 300 located at the B place through the second access address; when the deposit control is triggered, the first terminal 400 may access the deposit system in the third server 300 located at the B site through the second access address.
It should be noted that, the above-mentioned S103 may be implemented not only by the first server 100, but also by another server, and is not limited herein.
In summary, the present application provides a system access switching method, where a server detects that there is overlap between drilling time periods of any two disaster recovery drilling plan documents, and an identifier of a system to be performed of one of the disaster recovery drilling plan documents is an identifier of a system with mutually exclusive identifiers of the systems to be performed in the other disaster recovery drilling plan document, which indicates that data loss or system failure may be caused if the two systems are subjected to disaster recovery switching drilling at the same time. In this way, the server updates the drilling time period of one of the disaster tolerance drilling plan documents, so that the drilling time periods of the two disaster tolerance drilling plan documents do not overlap. Therefore, the disaster recovery switching drilling is carried out on the two systems to be drilled in different time periods, and data loss or system faults are avoided.
In a possible implementation manner, after S101, the method provided by the present application further includes: and if the drilling time period of any disaster recovery drilling plan document is detected to be overlapped with a preset first target time period which does not allow the switching of the access address of the system, delaying the drilling time period of the disaster recovery drilling plan document to a next second target time period which allows the switching of the access address of the system.
The preset first target time period for not allowing switching of the access address of the system can be a festival and holiday time period such as a national day time period, a spring festival time period and the like, and a transaction peak time period such as 618, twenty-one and the like. The drilling time period of the disaster tolerance drilling plan document is delayed to a next second target time period allowing switching of the access address of the system, so that data loss or system failure caused by switching of the system to be drilled corresponding to the disaster tolerance drilling plan document in the first target time period can be avoided, and the requirements of users can be met. For example, if the drilling time period of the disaster tolerance drilling plan document is in the national day time period, the drilling time period of the disaster tolerance drilling plan document is delayed to the first saturday after the national day time period.
In a possible implementation manner, each disaster recovery drilling plan document further includes a drilling scene type, and the drilling scene type corresponds to the influence degree of the access of the system to be drilled after the access address of the system to be drilled is switched. Illustratively, the drill scene type may include drill scene type 1-true handover and have a large business impact; the drilling scene type 2-real switching and smaller business influence; drill scene type 2-real switching and no traffic impact during non-working hours.
The method provided by the application can further comprise the following steps: and when the current time reaches any drilling time period, sending a notification message to a third terminal associated with the corresponding drilling scene type, wherein the notification message is used for indicating that the access of a system to be drilled in the drilling time period has influence. Exemplarily, when the drilling scene type is the drilling scene type 1-real handover and has a large business impact, the first server 100 needs to upload materials of the backup to a third terminal of a monitoring department such as an uploaded people bank, a union pay or a network, and send a notification announcement to the third terminal facing the customer and a third terminal of a staff of the bank, the notification announcement being used for indicating that there is a large business impact in performing the system handover in the drilling time period. When the drilling scene type is the drilling scene type 2-real switching and has a small business influence, the first server 100 needs the third terminal of the client to upload and the third terminal of the bank staff to send a notification notice, and the notification notice is used for indicating that the system switching in the drilling time period has a small business influence. And when the drilling scene type is the drilling scene type 3-real switching and has no service influence, a notification notice which is uploaded to a third terminal of the staff in the line is needed, and the notification notice is used for indicating that the system switching in the drilling time period has no service influence. In this way, the user can perceive whether there is an influence on the access of the system to be exercised during the exercise time period through the third terminal.
In one possible embodiment, the method provided by the present application further includes: and when the influence degree corresponding to the drilling scene type is larger than the set threshold value and the drilling time period is within the working day, delaying the drilling time period to be within the non-working day. Therefore, the drilling time period corresponding to the disaster tolerance drilling plan document is delayed to be within the non-working day, so that the data loss or system failure caused when the system to be drilled corresponding to the disaster tolerance drilling plan document is switched to be drilled can be further avoided, and the requirements of the user can be met.
In a possible implementation manner, the method provided in the embodiment of the present application further includes: receiving a login request from the first terminal 400, wherein the login request carries a user account; when the type of the user account is the administrator account, sending implementation progress data of a plurality of disaster recovery drilling plan documents to the first terminal 400; when the type of the user account is a department user account, the implementation progress data of the disaster recovery drilling plan document associated with the department user account among the plurality of disaster recovery drilling plan documents is sent to the first terminal 400.
Referring to fig. 4, the present application further provides a system access switching apparatus, which includes a data receiving unit 401, a data updating unit 402, and a data accessing unit 403, wherein,
a data receiving unit 401, configured to receive multiple disaster tolerance drilling plan documents from the first terminal, where each disaster tolerance drilling plan document at least includes an identifier of a system to be drilled, a drilling time period, and an identifier of a system that is mutually exclusive from the identifier of the system to be drilled. A data updating unit 402, configured to update the drilling time period of one of the disaster tolerance drilling plan documents when it is detected that there is overlap between the drilling time periods of any two disaster tolerance drilling plan documents and the identifier of the system to be drilled of one of the disaster tolerance drilling plan documents is a mutually exclusive identifier of the systems to be drilled in the other disaster tolerance drilling plan document, so that there is no overlap between the drilling time periods of the two disaster tolerance drilling plan documents. A data access unit 403, configured to switch, when the current time reaches any drilling time period, an access address of the system to be drilled in the corresponding disaster recovery drilling plan document from the first access address to a second access address, so that the second terminal accesses the system to be drilled through the second access address.
In a possible implementation, each disaster tolerance drilling plan document further includes a creation time, and the data updating unit 402 is specifically configured to delay the drilling time period of the disaster tolerance drilling plan document with the later creation time, so that there is no overlap in the drilling time periods of the two disaster tolerance drilling plan documents.
In a possible implementation manner, the data updating unit 402 is further configured to delay the drilling time period of any disaster tolerance drilling plan document to a next second target time period that allows switching of the access address of the system if it is detected that the drilling time period of the disaster tolerance drilling plan document overlaps with a preset first target time period that does not allow switching of the access address of the system.
In a possible implementation manner, each disaster tolerance drilling plan document further includes a drilling cycle of the system to be drilled, and the data updating unit 402 is further configured to, when it is detected that there is an overlap between the delayed drilling time period of the disaster tolerance drilling plan document and the drilling time period of another disaster tolerance drilling plan document, and the identifier of the system to be drilled of the disaster tolerance drilling plan document is an identifier of a mutually exclusive system of the identifiers of the systems to be drilled of the another disaster tolerance drilling plan document, delay the drilling time period of the another disaster tolerance drilling plan document to a next second target time period that allows switching of the access address of the system.
In a possible implementation manner, each disaster recovery drilling plan document further includes a drilling scene type, and the drilling scene type corresponds to the influence degree of the access of the system to be drilled after the access address of the system to be drilled is switched. The apparatus provided by the embodiment of the present application may further include: and the data sending unit is used for sending a notification message to the third terminal associated with the corresponding drilling scene type when the current time reaches any drilling time slot, wherein the notification message is used for indicating that the access of the system to be drilled in the drilling time slot has influence.
In a possible embodiment, the data updating unit 402 is further configured to delay the drilling time period to a non-working day when the impact degree corresponding to the drilling scene type is greater than a set threshold and the drilling time period is within a working day.
In a possible implementation manner, the data receiving unit 401 is further configured to receive a login request from the first terminal, where the login request carries the user account. The apparatus provided by the embodiment of the present application may further include: the data sending unit is used for sending implementation progress data of a plurality of disaster tolerance drilling plan documents to the first terminal when the type of the user account is the administrator account; and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan documents associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
Embodiments of the present application further provide a server, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the server is caused to perform the method provided in fig. 1 as described above.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as a memory comprising instructions, executable by a processor to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like. The non-transitory computer readable storage medium, when executed by a processor of a server, enables the server to perform the method of fig. 1 described above.
Embodiments of the present application also provide a computer program product, which includes a computer program, and the computer program is executed by a processor to perform the method of fig. 1.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A system access switching method, comprising:
receiving a plurality of disaster tolerance drilling plan documents from a first terminal, wherein each disaster tolerance drilling plan document at least comprises an identifier of a system to be drilled, a drilling time period and an identifier of a system mutually exclusive with the identifier of the system to be drilled;
when it is detected that the drilling time periods of any two disaster recovery drilling plan documents are overlapped, and the identifier of the system to be drilled of one disaster recovery drilling plan document is the identifier of the mutually exclusive system of the identifiers of the systems to be drilled in the other disaster recovery drilling plan document, updating the drilling time period of one disaster recovery drilling plan document so as to enable the drilling time periods of the two disaster recovery drilling plan documents not to be overlapped;
and when the current time reaches any drilling time period, switching the access address of the system to be drilled in the corresponding disaster recovery drilling plan document from a first access address to a second access address, so that a second terminal can access the system to be drilled through the second access address.
2. The method of claim 1, wherein each of the disaster recovery drilling plan documents further includes a creation time, and wherein updating the drilling time period of one of the disaster recovery drilling plan documents such that there is no overlap in the drilling time periods of the two disaster recovery drilling plan documents comprises:
and delaying the drilling time periods of the disaster recovery drilling plan documents with the later creation time, so that the drilling time periods of the two disaster recovery drilling plan documents are not overlapped.
3. The method according to claim 1, wherein after said receiving a plurality of disaster recovery drilling planning documents from a terminal, the method further comprises:
and if the drilling time period of any disaster tolerance drilling plan document is detected to be overlapped with a preset first target time period which does not allow the switching of the access address of the system, delaying the drilling time period of the disaster tolerance drilling plan document to a next second target time period which allows the switching of the access address of the system.
4. The method according to claim 3, wherein each of the disaster tolerance drilling planning documents further includes a drilling cycle of the system to be drilled, and after the delaying of the drilling time period of the disaster tolerance drilling planning document to the next second target time period allowing switching of the access address of the system, the method further includes:
when it is detected that the delayed drilling time period of the disaster recovery drilling plan document is overlapped with the drilling time period in another disaster recovery drilling plan document, and the identifier of the system to be drilled of the disaster recovery drilling plan document is the identifier of the system with mutually exclusive identifier of the system to be drilled in the another disaster recovery drilling plan document, delaying the drilling time period of the another disaster recovery drilling plan document to a next second target time period allowing switching of the access address of the system.
5. The method according to claim 1, wherein each of the disaster recovery drilling planning documents further includes a drilling scenario type corresponding to a degree of influence on an access of the system to be drilled after an access address of the system to be drilled is switched, the method further comprising:
and when the current time reaches any drilling time period, sending a notification message to a third terminal associated with the corresponding drilling scene type, wherein the notification message is used for indicating that the access of a system to be drilled is influenced in the drilling time period.
6. The method of claim 5, further comprising: and when the influence degree corresponding to the drilling scene type is larger than a set threshold value and the drilling time period is in a working day, delaying the drilling time period to a non-working day.
7. The method of claim 1, further comprising:
receiving a login request from the first terminal, wherein the login request carries a user account;
when the type of the user account is an administrator account, sending implementation progress data of the disaster recovery drilling plan documents to the first terminal;
and when the type of the user account is a department user account, sending implementation progress data of the disaster recovery drilling plan documents associated with the department user account in the plurality of disaster recovery drilling plan documents to the first terminal.
8. A system access switching apparatus, comprising:
the data receiving unit is used for receiving a plurality of disaster tolerance drilling plan documents from a first terminal, wherein each disaster tolerance drilling plan document at least comprises an identifier of a system to be drilled, a drilling time period and an identifier of the system which is mutually exclusive with the identifier of the system to be drilled;
the data updating unit is used for updating the drilling time period of one disaster tolerance drilling plan document when the situation that the drilling time periods of any two disaster tolerance drilling plan documents are overlapped and the identification of the system to be drilled of one disaster tolerance drilling plan document is the identification of the system with mutually exclusive identification of the system to be drilled in the other disaster tolerance drilling plan document is detected, so that the drilling time periods of the two disaster tolerance drilling plan documents are not overlapped;
and the data access unit is used for switching the access address of the system to be performed in the corresponding disaster recovery drilling plan document from a first access address to a second access address when the current time reaches any drilling time period, so that a second terminal can access the system to be performed through the second access address.
9. A server comprising a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor, when executing the computer program, causes the server to perform the method of any of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when executed by a processor, causes a computer to carry out the method of any one of claims 1 to 7.
CN202211109709.6A 2022-09-13 2022-09-13 System access switching method and device Active CN115396327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211109709.6A CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211109709.6A CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Publications (2)

Publication Number Publication Date
CN115396327A true CN115396327A (en) 2022-11-25
CN115396327B CN115396327B (en) 2023-11-21

Family

ID=84126810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211109709.6A Active CN115396327B (en) 2022-09-13 2022-09-13 System access switching method and device

Country Status (1)

Country Link
CN (1) CN115396327B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100191884A1 (en) * 2008-06-12 2010-07-29 Gravic, Inc. Method for replicating locks in a data replication engine
CN106254100A (en) * 2016-07-27 2016-12-21 腾讯科技(深圳)有限公司 A kind of data disaster tolerance methods, devices and systems
CN112153134A (en) * 2020-09-18 2020-12-29 北京浪潮数据技术有限公司 Disaster tolerance drilling method, device, equipment and storage medium of disaster tolerance cloud host

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100191884A1 (en) * 2008-06-12 2010-07-29 Gravic, Inc. Method for replicating locks in a data replication engine
CN106254100A (en) * 2016-07-27 2016-12-21 腾讯科技(深圳)有限公司 A kind of data disaster tolerance methods, devices and systems
CN112153134A (en) * 2020-09-18 2020-12-29 北京浪潮数据技术有限公司 Disaster tolerance drilling method, device, equipment and storage medium of disaster tolerance cloud host

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
闵捷: ""大型ERP系统中灾难备份机制的研究与构建"", 《中国优秀硕士学位论文全文数据库信息科技辑》, pages 138 - 76 *

Also Published As

Publication number Publication date
CN115396327B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
CN107301536B (en) Resource transfers method and device
CN109901949B (en) Application disaster recovery system and method for double-activity data center
US11665124B2 (en) Interface, method and computer program product for controlling the transfer of electronic messages
US20210217021A1 (en) System and server for receiving transaction requests
US11080690B2 (en) Device, system, method and computer program product for processing electronic transaction requests
US20080288267A1 (en) Method and apparatus for automatically managing work tickets
CN106487486B (en) Service processing method and data center system
US20170344960A1 (en) A System, Method and Computer Program Product for Receiving Electronic Messages
WO2016046545A1 (en) Disaster recovery system
JP6097105B2 (en) Information processing apparatus and worker assignment method
US10169139B2 (en) Using predictive analytics of natural disaster to cost and proactively invoke high-availability preparedness functions in a computing environment
Oberg et al. Disasters will happen-are you ready?
CN112905486B (en) Service integration test method, device and system
EP4060514A1 (en) Distributed database system and data disaster backup drilling method
CN113905129A (en) Method and device for intercepting crank call
CN115396327A (en) System access switching method and device
CN108513019B (en) Method and system for realizing automatic call distribution service cluster
CN102447798B (en) Recharge-for-recovery method and device
CN109936462A (en) Disaster recovery method and device
CN107291575B (en) Processing method and equipment for data center fault
IL259284B1 (en) Network bridge for local transaction authorization
JP2014203227A (en) Terminal management operation system and method
JPWO2020158016A1 (en) Backup system and its method and program
CN110704545B (en) Data calling method and device for data source provider
CN104850795B (en) A kind of key management system and the method for changing account information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant