CN115562910A - Data abnormal machine recovery method, device, equipment and storage medium - Google Patents

Data abnormal machine recovery method, device, equipment and storage medium Download PDF

Info

Publication number
CN115562910A
CN115562910A CN202211236182.3A CN202211236182A CN115562910A CN 115562910 A CN115562910 A CN 115562910A CN 202211236182 A CN202211236182 A CN 202211236182A CN 115562910 A CN115562910 A CN 115562910A
Authority
CN
China
Prior art keywords
data
backup
recovery
data recovery
recovered
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211236182.3A
Other languages
Chinese (zh)
Inventor
袁保瑞
陈亨迪
徐嘉敏
张雪
葛林蔚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Pudong Development Bank Co Ltd
Original Assignee
Shanghai Pudong Development Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Pudong Development Bank Co Ltd filed Critical Shanghai Pudong Development Bank Co Ltd
Priority to CN202211236182.3A priority Critical patent/CN115562910A/en
Publication of CN115562910A publication Critical patent/CN115562910A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1479Generic software techniques for error detection or fault masking
    • G06F11/1482Generic software techniques for error detection or fault masking by means of middleware or OS functionality
    • G06F11/1484Generic software techniques for error detection or fault masking by means of middleware or OS functionality involving virtual machines

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a data abnormal machine recovery method, a data abnormal machine recovery device, data abnormal machine recovery equipment and a storage medium. The method comprises the steps that when a data recovery request is received, a virtual machine template is obtained according to the data recovery request, and the virtual machine template is sent to a current client side, so that the current client side creates a data recovery environment based on the virtual machine template, wherein the data recovery request comprises a client side identification, a backup time period, an initial storage path, a current client side identification and a target storage path, wherein the client side identification is used for executing backup operation of backup data to be recovered; when the data recovery environment of the current client is detected to be completely established, data recovery operation is carried out on the backup data to be recovered stored in the initial storage position to obtain recovered data, and the recovered data are stored to the target storage position of the current client. The problem that data loss caused by data coverage is easy to occur in the existing database recovery method is solved.

Description

Data abnormal machine recovery method, device, equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for recovering data from a different data engine.
Background
With the rapid development of cloud computing, cloud services and solutions will grow. Along with this, the demand of data backup is increasing, and MySQL backup occupies most of the demand of book backup, and the demand for the function of MySQL database recovery is rapidly increasing.
The conventional MySQL backup data recovery method is generally used for recovering backup data on an original virtual machine, but the recovery method is easy to cause data loss due to data coverage.
It is therefore desirable to provide a secure data recovery method to avoid data loss due to data overlay.
Disclosure of Invention
The invention provides a data abnormal machine recovery method, a data abnormal machine recovery device, data abnormal machine recovery equipment and a storage medium, and aims to solve the problem that data loss is easily caused by data coverage in the conventional database recovery method.
According to an aspect of the present invention, there is provided a data heterogeneous recovery method, including:
when a data recovery request is received, a virtual machine template is obtained according to the data recovery request, and the virtual machine template is sent to a current client side so that the current client side can create a data recovery environment based on the virtual machine template, wherein the data recovery request comprises a client side identifier, a backup time period, an initial storage path, the current client side identifier and a target storage path, wherein the client side identifier is used for executing backup operation of backup data to be recovered;
when the data recovery environment of the current client is detected to be completely established, performing data recovery operation on the backup data to be recovered stored in the initial storage position to obtain recovered data, and storing the recovered data to a target storage position of the current client, wherein both the current client and the client performing the backup operation on the backup data to be recovered can access the initial storage position.
According to another aspect of the present invention, there is provided a data recovery apparatus, including:
the system comprises an environment creation module, a data recovery module and a data recovery module, wherein the environment creation module is used for acquiring a virtual machine template according to a data recovery request when receiving the data recovery request, and sending the virtual machine template to a current client so as to create a data recovery environment based on the virtual machine template by the current client, and the data recovery request comprises a client identifier for executing backup operation of backup data to be recovered, a backup time period, an initial storage path, the current client identifier and a target storage path;
and the data recovery module is used for performing data recovery operation on the backup data to be recovered stored in the initial storage position to obtain recovered data and storing the recovered data to a target storage position of the current client when the completion of the creation of the data recovery environment of the current client is detected, wherein both the current client and the client performing the backup operation on the backup data to be recovered can access the initial storage position.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein, the first and the second end of the pipe are connected with each other,
the memory stores a computer program executable by the at least one processor, and the computer program is executed by the at least one processor to enable the at least one processor to execute the data recovery method according to any embodiment of the present invention.
According to another aspect of the present invention, there is provided a computer-readable storage medium storing computer instructions for causing a processor to implement the data recovery method according to any one of the embodiments of the present invention when the computer instructions are executed.
According to the technical scheme of the data abnormal machine recovery method provided by the embodiment of the invention, a data recovery environment is established at the current client through a virtual machine template, data recovery operation is carried out on backup data to be recovered, which is stored in an initial storage position, so as to obtain recovered data, and the recovered data is stored to a target storage position of the current client. Compared with the prior art that the backup data to be restored is restored to the virtual machine which completes the backup operation, the backup data to be restored is restored to the current client, so that the data coverage condition caused by the restoration of the backup data to be restored can be avoided, and the safety of the data restoration operation is improved; the method is not limited to restoring the backup data to be restored to the virtual machine which completes the backup operation, and the flexibility of data restoration can be improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present invention, nor do they necessarily limit the scope of the invention. Other features of the present invention will become apparent from the following description.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a data recovery method according to an embodiment of the present invention;
fig. 2A is a block diagram of a data recovery apparatus according to a second embodiment of the present invention;
fig. 2B is a block diagram of a structure of another data recovery apparatus for different data machines according to the second embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device implementing the data abnormal recovery method provided by the third embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
Fig. 1 is a flowchart of a data abnormal recovery method according to an embodiment of the present invention, where the embodiment is applicable to a situation that an abnormal recovery needs to be performed when a database fails, and the method may be executed by a data abnormal recovery device, where the data abnormal recovery device may be implemented in a form of hardware and/or software, and the data abnormal recovery device may be configured in an electronic device. As shown in fig. 1, the method includes:
s110, when a data recovery request is received, a virtual machine template is obtained according to the data recovery request, the virtual machine template is sent to a current client side, so that the current client side creates a data recovery environment based on the virtual machine template, and the data recovery request comprises a client side identification, a backup time period, an initial storage path, a current client side identification and a target storage path, wherein the client side identification is used for executing backup operation of backup data to be recovered.
The virtual machine template is a copy of a virtual machine with known parameter configuration, a deployed virtual machine is converted into the virtual machine template, and when the virtual machine is created through the virtual machine template, configuration parameters of the created virtual machine are the same as those of an original virtual machine of the virtual machine, that is, the virtual machine created based on the virtual machine template does not need parameter configuration.
In one embodiment, the virtual machine template is a MySQL database virtual machine template.
And the current client identifier is the identifier of the client sending the data recovery request. The initial storage path is a current storage path of the backup data to be restored, and the target storage path is a storage path of the backup data to be restored after restoration.
When a data recovery request is detected, corresponding configuration information is obtained according to the data recovery request, and a virtual machine template is obtained according to virtual machine version information in the configuration information. Specifically, the backup data to be restored and the attribute information of the backup data to be restored are determined according to the client identifier, the backup time period and the initial storage path, which execute the backup operation of the backup data to be restored, in the data restoration request, and the virtual machine template is obtained according to the virtual machine version information in the attribute information. For example, if the version information of the virtual machine is 5.7, a virtual machine template corresponding to the version of the virtual machine of 5.7 is obtained; and if the virtual machine version information is 8.0, acquiring a virtual machine template corresponding to the virtual machine version of 8.0. It can be understood that, the accuracy of acquiring the virtual machine template and the accuracy of creating data recovery can be improved by acquiring the virtual machine template according to the version information of the virtual machine, so that the accuracy of data recovery is improved.
And after the virtual machine template is obtained, sending the virtual machine template to the current client side so that the current client side completes the creation of a data recovery environment according to the virtual machine template. Specifically, the backup server additionally sends a virtual machine installation script while sending the virtual machine template to the current client, and after the current client receives the virtual machine template and the virtual machine installation script, the current client can run the virtual machine installation script to complete the operation of creating the data recovery environment based on the virtual machine, so that the speed and the accuracy of creating the data recovery environment are improved.
In one embodiment, when a data recovery request is detected, the configuration information of backup data to be recovered is acquired by the following steps: when a data recovery request is detected, account information of a current login user identifier is acquired; and when determining that the current login user identification has the data recovery right at the current moment according to the account information, acquiring corresponding configuration information according to the data recovery request.
Specifically, the account information includes a user identification, an authorization time period, and a bound IP address. When a data recovery request is detected, account information for sending the data recovery request is obtained, if the IP address used by the current login user identification is the same as the binding IP address, and the current time is within the authorized time period, the current login user identification is judged to have the data recovery authority at the current time, and meanwhile, the configuration information of the backup data to be recovered is obtained according to the data recovery request. The method and the device are used for reducing the access pressure and the data recovery pressure of the backup server and improving the data recovery speed of the backup server by limiting the login time of each account. The user identity and the data recovery authority are verified firstly, the configuration information of the data to be recovered is acquired after the data to be verified is passed, data leakage can be effectively prevented, and the safety of data recovery is improved.
The user identification information may be represented by a user token or a user name. The IP in this embodiment may be selected as a virtual private network address. It will be appreciated that the backup server may also verify the login account of the current client via the IP address.
In the fields of banks and the like, the requirements on the security, stability and reliability of data are very high, a core server or a database system for processing core data and services is generally deployed in a subnet which cannot be accessed by a public network, a web server for accessing the public network is deployed in the environment of another subnet, and the subnet is connected with the public network. In a Virtual Private Cloud (VPC) network, a user can realize access control over core data and a service server through access control between subnets, and the access requirement of a public network is met while the security and controllability of the core data are ensured.
The VPC operates on a public cloud, isolates a part of public cloud resources for a user and gives the right of the resources privately used by the user, the VPC ensures that the resources between each user are isolated, so that the flexibility of an IP address is very high, the problem of overlapping of the IP addresses is avoided, and the user is not influenced by other users when in use.
Regarding the authorization period, in one embodiment, the authorization period may be an hour of the day, or 2 hours, or 24 hours. For accounts with an authorization period of 24 hours, the time to access the backup server and data recovery is not limited. And when determining that the authorization time period corresponding to the account identification which sends the data recovery request is 24 hours, the backup server directly acquires the configuration information of the data to be backed up.
If the IP address used by the current login user identification is the same as the binding IP address and the current time is within the authorized time period of the binding IP address, judging that the current login user identification has the data recovery authority at the current time, and calling a management platform interface to acquire the configuration information of the backup data to be recovered according to the data recovery request. The configuration information of the backup data to be restored further comprises data packet version information, the size of the database space and the backup IP address.
Illustratively, the IP address bound by the currently logged-in user a is IP1, and the time period for which the data is authorized to be recovered is 9:00-17:00. firstly, determining whether an IP logged in by a user is IP1, if so, passing the authentication of the currently logged user A, then judging whether the current moment is within an authorization time period of the IP1, and if so, determining that the currently logged user A has data recovery authority; otherwise, the current login user A does not have the data recovery authority, and prompt information for indicating no data recovery authority is output.
Regarding the creation of the data recovery environment, in one embodiment, after acquiring the version information of the virtual machine, the database space and the backup IP address, a New-VM-VHDPath D: \ \ Disk1. Vhdx-memorystartbytes 4GB-Name VM1-SwitchName v switch-CPU 4-Disk 100GB-IPAddress 192.168.0.1 command is used to create a virtual machine VM1 with Disk1 as a template, the virtual machine includes a 4-core CPU and a 4GB memory, the virtual machine is connected to a vSwitch network, the IP address is 192.168.0.1, and the hard Disk capacity is 100GB.
And S120, when the data recovery environment of the current client is detected to be completely established, executing data recovery operation on the backup data to be recovered stored in the initial storage position to obtain recovered data, and storing the recovered data to a target storage position of the current client, wherein the current client and the client executing the backup operation on the backup data to be recovered can both access the initial storage position.
Based on an API (application programming interface) of the NetBackup Console, determining an initial storage position of the backup data to be restored in the backup server according to the client identifier for executing the backup operation of the backup data to be restored and the backup time, then performing data restoration on the backup data to be restored stored in the initial storage position to obtain restored data, and storing the restored data to a target storage position of the current client.
By restoring the backup data to be restored to the target storage position of the current client instead of restoring to the non-current client which executes the backup operation of the backup data to be restored, the situation that the non-current client is covered by data due to restoration of data storage and the situation that the data is lost due to data covering can be prevented, and therefore the safety of data restoration is improved.
In one embodiment, the backup server detects the data recovery process in real time, automatically verifies the integrity of the recovery data stored by the current client after detecting that the storage of the recovery data is completed, and improves the automation and timeliness of the verification of the integrity of the recovery data.
In one embodiment, after the data recovery is completed, the user can send a data integrity verification instruction to the backup server through the current client; and when detecting the data integrity verification instruction, the backup server verifies the integrity of the recovered data to generate an integrity verification result. In one embodiment, when the integrity verification passes, the integrity verification result is verification passing; when the integrity verification fails, the integrity verification result is verification failure, and when the integrity verification result is verification failure, the prompt information of the verification failure is output, and meanwhile, the reason of the verification failure is also output, such as data integrity error caused by data backup, data integrity error caused by a recovery process, or data integrity error caused by data storage. The data integrity verification can verify the accuracy of the recovered data, improve the user's knowledge of the data recovery process, and timely locate the root of the problem when the recovered data has a problem.
In one embodiment, a sandbox environment for the private network is built across network segments based on the VPCs, and the backup server verifies the integrity of the recovery data based on the sandbox environment. The integrity of a typical database file includes: entity integrity, which refers to the integrity of rows in a table, is mainly used to ensure that data (records) of operations are not empty, unique and not repeated; domain integrity, which refers to the integrity of the columns in a table, must satisfy some particular data type or constraint; and the integrity reference refers to an inter-table rule which is used for ensuring the consistency of data of the two tables. The present embodiment does not limit the way of verifying the integrity of the recovered data. A sandbox mode is built based on VPC and used for application verification after abnormal machine recovery, the requirement of a user on integrity verification of data recovered by abnormal machines of the MySQL database is met to a great extent, and safety of data recovered by abnormal machines of the MySQL database is improved.
In one embodiment, when a data recovery operation is detected, the different-machine recovery information is synchronized, and the different-machine recovery information comprises a backup server identification, a current client identification, virtual machine version information, data recovery time, a space capacity corresponding to recovery data, and an integrity verification result. The different machine recovery information is synchronized to the management platform, so that batch downloading, addition, deletion and query of MySQL different machine recovery information can be carried out by calling the management platform API, and the consulting and traceability of data recovery are improved.
Optionally, after the integrity verification of the recovery data passes, the backup server may automatically start the data recovery method provided in the embodiment of the present invention, build a data recovery environment on the current client through the virtual machine template, perform a data recovery operation on the backup data to be recovered stored in the initial storage location to obtain the recovery data, and store the recovery data to the target storage location of the current client. Compared with the prior art that the backup data to be restored is restored to the virtual machine which completes the backup operation, the backup data to be restored is restored to the current client, so that the data coverage condition caused by the restoration of the backup data to be restored can be avoided, and the safety of the data restoration operation is improved; the method and the device are not limited to restoring the backup data to be restored to the virtual machine which completes the backup operation, and can also improve the flexibility of data restoration.
Example two
Fig. 2A is a block diagram of a data recovery apparatus according to a second embodiment of the present invention. As shown in fig. 2A, the apparatus includes:
the environment creating module 210 is configured to, when a data recovery request is received, obtain a virtual machine template according to the data recovery request, and send the virtual machine template to a current client, so that the current client creates a data recovery environment based on the virtual machine template, where the data recovery request includes a client identifier for executing a backup operation of backup data to be recovered, a backup time period, an initial storage path, the current client identifier, and a target storage path;
a data recovery module 220, configured to perform a data recovery operation on the to-be-recovered backup data stored in the initial storage location to obtain recovered data when it is detected that the data recovery environment of the current client is completely created, and store the recovered data in a target storage location of the current client, where both the current client and the client performing the backup operation on the to-be-recovered backup data may access the initial storage location.
Optionally, the environment creating module 210 is specifically configured to obtain corresponding configuration information according to the data recovery request, where the configuration information includes version information of the virtual machine; and acquiring a virtual machine template according to the virtual machine version information in the configuration information.
Optionally, the environment creating module 210 is specifically configured to, when a data recovery request is detected, obtain account information of the current login user identifier; and when determining that the current login user identification has the data recovery right at the current moment according to the account information, acquiring configuration information of the backup data to be recovered according to the data recovery request.
Optionally, the environment configuration module 210 is specifically configured to determine that the current login user identifier has the data recovery right at the current time if the IP address used by the current login user identifier is the same as the bound IP address and the current time is within the authorized time period, and obtain configuration information of the backup data to be recovered according to the data recovery request, where the account information includes the user identifier, the authorized time period, and the bound IP address
Optionally, the IP address is a virtual private network address.
Optionally, as shown in fig. 2B, the apparatus further includes a data verification module 230, configured to, when a data integrity verification instruction is detected, verify the integrity of the recovered data to generate an integrity verification result.
Optionally, the data verification module 230 is specifically configured to verify the integrity of the recovered data based on the sandbox mode to generate an integrity verification result when the data integrity verification instruction is detected.
According to the data abnormal machine recovery device provided by the embodiment of the invention, a data recovery environment is established at the current client through the virtual machine template, data recovery operation is carried out on backup data to be recovered stored at the initial storage position to obtain recovered data, and the recovered data is stored to the target storage position of the current client. Compared with the prior art that the backup data to be restored is restored to the virtual machine which completes the backup operation, the backup data to be restored is restored to the current client, so that the data coverage caused by the restoration of the backup data to be restored can be avoided, and the safety of the data restoration operation is improved; the method and the device are not limited to restoring the backup data to be restored to the virtual machine which completes the backup operation, and can also improve the flexibility of data restoration.
The data abnormal machine recovery device provided by the embodiment of the invention can execute the data abnormal machine recovery method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
EXAMPLE III
FIG. 3 illustrates a schematic diagram of an electronic device 10 that may be used to implement an embodiment of the present invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 3, the electronic device 10 includes at least one processor 11, and a memory communicatively connected to the at least one processor 11, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, and the like, wherein the memory stores a computer program executable by the at least one processor, and the processor 11 can perform various suitable actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from a storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data necessary for the operation of the electronic apparatus 10 can also be stored. The processor 11, the ROM 12, and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
A number of components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, or the like; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The processor 11 performs the various methods and processes described above, such as the data recovery method.
In some embodiments, the data recovery method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the data transaction recovery method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the data transaction recovery method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for implementing the methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be performed. A computer program can execute entirely on a machine, partly on a machine, as a stand-alone software package partly on a machine and partly on a remote machine or entirely on a remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. A computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical host and VPS service are overcome.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present invention may be executed in parallel, sequentially, or in different orders, and are not limited herein as long as the desired results of the technical solution of the present invention can be achieved.
The above-described embodiments should not be construed as limiting the scope of the invention. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A data heterogeneous recovery method is characterized by comprising the following steps:
when a data recovery request is received, a virtual machine template is obtained according to the data recovery request, and the virtual machine template is sent to a current client side so that the current client side can create a data recovery environment based on the virtual machine template, wherein the data recovery request comprises a client side identifier, a backup time period, an initial storage path, the current client side identifier and a target storage path, wherein the client side identifier is used for executing backup operation of backup data to be recovered;
when the data recovery environment of the current client is detected to be completely established, performing data recovery operation on the backup data to be recovered stored in the initial storage position to obtain recovered data, and storing the recovered data to a target storage position of the current client, wherein both the current client and the client performing the backup operation on the backup data to be recovered can access the initial storage position.
2. The method of claim 1, wherein obtaining a virtual machine template according to the data recovery request comprises:
acquiring corresponding configuration information according to the data recovery request, wherein the configuration information comprises virtual machine version information;
and acquiring a virtual machine template according to the virtual machine version information in the configuration information.
3. The method according to claim 2, wherein the obtaining the corresponding configuration information according to the data recovery request comprises:
when a data recovery request is detected, account information of a current login user identifier is acquired;
and when determining that the current login user identification has the data recovery right at the current moment according to the account information, acquiring configuration information of the backup data to be recovered according to the data recovery request.
4. The method according to claim 3, wherein the account information includes a user identifier, an authorization time period, and a binding IP address, and the obtaining the configuration information of the backup data to be restored according to the data restoration request when it is determined that the current login user identifier has the data restoration right at the current time according to the account information includes:
and if the IP address used by the current login user identifier is the same as the binding IP address and the current moment is positioned in the authorized time period, judging that the current login user identifier has the data recovery authority at the current moment, and acquiring the configuration information of the backup data to be recovered according to the data recovery request.
5. The method of claim 4, wherein the IP address is a virtual private network address.
6. The method of claim 1, wherein after storing the recovery data to the current client, further comprising:
and when the data integrity verification instruction is detected, verifying the integrity of the recovery data to generate an integrity verification result.
7. The method of claim 6, wherein verifying the integrity of the recovery data upon detecting a data integrity verification instruction comprises:
and when a data integrity verification instruction is detected, verifying the integrity of the recovery data based on a sandbox mode to generate an integrity verification result.
8. A data recovery device for a heterogeneous computer, comprising:
the system comprises an environment creation module, a data recovery module and a data recovery module, wherein the environment creation module is used for acquiring a virtual machine template according to a data recovery request when receiving the data recovery request, and sending the virtual machine template to a current client so as to create a data recovery environment based on the virtual machine template by the current client, and the data recovery request comprises a client identifier for executing backup operation of backup data to be recovered, a backup time period, an initial storage path, the current client identifier and a target storage path;
and the data recovery module is used for performing data recovery operation on the backup data to be recovered stored in the initial storage position to obtain recovered data and storing the recovered data to a target storage position of the current client when the completion of the creation of the data recovery environment of the current client is detected, wherein both the current client and the client performing the backup operation on the backup data to be recovered can access the initial storage position.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the data transaction recovery method of any one of claims 1-7.
10. A computer-readable storage medium storing computer instructions for causing a processor to perform the data transaction recovery method of any one of claims 1-7 when executed.
CN202211236182.3A 2022-10-10 2022-10-10 Data abnormal machine recovery method, device, equipment and storage medium Pending CN115562910A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211236182.3A CN115562910A (en) 2022-10-10 2022-10-10 Data abnormal machine recovery method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211236182.3A CN115562910A (en) 2022-10-10 2022-10-10 Data abnormal machine recovery method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115562910A true CN115562910A (en) 2023-01-03

Family

ID=84745250

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211236182.3A Pending CN115562910A (en) 2022-10-10 2022-10-10 Data abnormal machine recovery method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115562910A (en)

Similar Documents

Publication Publication Date Title
CN108549580B (en) Method for automatically deploying Kubernets slave nodes and terminal equipment
US10169173B2 (en) Preserving management services with distributed metadata through the disaster recovery life cycle
EP3149591B1 (en) Tracking application deployment errors via cloud logs
CN107408064B (en) Method for executing commands in virtual machine instances and system for implementing the method
CN112840321A (en) Application programming interface for automated operations management
US10635473B2 (en) Setting support program, setting support method, and setting support device
KR102158754B1 (en) Method and apparatus for operating on smart network interface card
CN107632937B (en) Method and device for testing virtual machine cluster and readable storage medium
CN110764871A (en) Cloud platform-based mimicry application packaging and control system and method
EP3761173A1 (en) Physical-to-virtual migration method and apparatus, and storage medium
US20190294796A1 (en) Resolving anomalies for network applications using code injection
CN111124615A (en) Virtual machine migration method, device, equipment and computer readable storage medium
US9237071B2 (en) Computer-readable recording medium, verification method, and verification device
US9965624B2 (en) Log analysis device, unauthorized access auditing system, computer readable medium storing log analysis program, and log analysis method
CN113489691A (en) Network access method, device, computer readable medium and electronic equipment
CN108228308A (en) The monitoring method and device of virtual machine
CN105068899A (en) Automatic reboot stability test method for Vmware system
CN113946854A (en) File access control method and device and computer readable storage medium
US10922305B2 (en) Maintaining storage profile consistency in a cluster having local and shared storage
CN112099916B (en) Virtual machine data migration method and device, computer equipment and storage medium
CN108459960A (en) Method of automatic configuration, device, equipment and the storage medium of test environment
CN115562910A (en) Data abnormal machine recovery method, device, equipment and storage medium
CN110413373A (en) Restoration methods, device, electronic equipment and the storage medium of fault virtual machine
CN115774742A (en) Data storage newly-increased method, device, equipment, medium and product of private cloud
CN109101253B (en) Management method and device for host in cloud computing system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination