CN117215826A - Data backup method, device and system - Google Patents

Data backup method, device and system Download PDF

Info

Publication number
CN117215826A
CN117215826A CN202210620228.5A CN202210620228A CN117215826A CN 117215826 A CN117215826 A CN 117215826A CN 202210620228 A CN202210620228 A CN 202210620228A CN 117215826 A CN117215826 A CN 117215826A
Authority
CN
China
Prior art keywords
target data
node
data backup
backup
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210620228.5A
Other languages
Chinese (zh)
Inventor
陶书敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN202210620228.5A priority Critical patent/CN117215826A/en
Publication of CN117215826A publication Critical patent/CN117215826A/en
Pending legal-status Critical Current

Links

Landscapes

  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses a data backup method, a device and a system, which relate to the technical field of data backup, and the method comprises the following steps: the method comprises the steps of sending target data to be backed up to a plurality of target data backup nodes, wherein the target data backup nodes are used for backing up the target data; when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, controlling the target data backup nodes to perform data synchronization, so that the target data stored by each target data backup node are the same; and when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server. The application can save the storage space of the transfer server.

Description

Data backup method, device and system
Technical Field
The present application relates to the field of data backup technologies, and in particular, to a data backup method, device, and system.
Background
With the continuous innovation of computer technology, cloud storage technology has been rapidly developed. Cloud storage is a new concept which extends and develops in the concept of cloud computing, and refers to a system which integrates a large number of storage devices of different types in a network through application software to cooperatively work and jointly provides data storage and service access functions for the outside through functions of cluster application, grid technology or a distributed file system. The cloud storage technology can realize data synchronization among a plurality of hosts, front-end storage servers, back-end storage servers and other nodes, so that the data on each host and each server are kept up-to-date and most complete.
In the related art, when the target data node fails to write the target backup data into the data backup node, the target data node needs to send the target backup data to the transit server, and then the target backup data is written into the data backup node again through the transit server until the target backup data is successfully written into the data backup node or the target backup data is expired and deleted.
When a large amount of backup data in the target node fails to be written, the data sent to the transit server is excessive, and therefore the transit server occupies a large amount of storage space.
Disclosure of Invention
In view of the above problems, the present application provides a data backup method, device and system, and the main purpose of the present application is to save the storage space of a transfer server.
In order to achieve the above purpose, the present application mainly provides the following technical solutions:
in a first aspect, the present application provides a data backup method, the method including:
the method comprises the steps of sending target data to be backed up to a plurality of target data backup nodes, wherein the target data backup nodes are used for backing up the target data;
when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, controlling the target data backup nodes to perform data synchronization, so that the target data stored by each target data backup node are the same;
And when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server.
In a second aspect, the present application provides a data backup method, the method comprising:
receiving control information sent by a target node, wherein the control information comprises node identifiers of a plurality of target data backup nodes;
and according to the plurality of node identifications, controlling the data synchronization between the target data backup nodes corresponding to the node identifications so that the target data stored by each target data backup node are the same.
In a third aspect, the present application provides a data backup apparatus, the apparatus comprising:
the sending unit is used for sending target data to be backed up to a plurality of target data backup nodes, and the target data backup nodes are used for backing up the target data;
the first control unit is used for receiving backup completion messages within a preset time period, and controlling the data synchronization among the target data backup nodes when the number of the backup completion messages is smaller than that of the target data backup nodes, so that the target data stored by each target data backup node are the same;
And the retransmission unit is used for transmitting the target data to a transit server when the backup completion message is not received within a preset time period, and retransmitting the target data to a plurality of target data backup nodes through the transit server.
In a fourth aspect, the present application provides a data backup apparatus, the apparatus comprising:
the receiving unit is used for receiving control information sent by the target nodes, wherein the control information comprises node identifiers of a plurality of target data backup nodes;
and the second control unit is used for controlling the data synchronization among the target data backup nodes corresponding to the node identifiers according to the plurality of node identifiers so that the target data stored by each target data backup node are the same.
In a fifth aspect, the present application provides a system comprising: the system comprises a target node, an anti-entropy server and a plurality of target data backup nodes, wherein:
the target node is used for sending target data to be backed up to a plurality of target data backup nodes; when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, control information is sent to the anti-entropy server, so that the anti-entropy server controls the target data backup nodes to perform data synchronization, and the control information comprises node identifiers of the target data backup nodes; when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server;
The anti-entropy server is used for receiving control information sent by the target node, wherein the control information comprises node identifiers of a plurality of target data backup nodes; according to the plurality of node identifications, controlling the data synchronization between the target data backup nodes corresponding to the node identifications so that the target data stored by each target data backup node are the same;
and the target data backup node is used for backing up the target data.
In a sixth aspect, the present application further provides a processor, where the processor is configured to execute a program, where the program executes the method described above.
In a seventh aspect, the present application further provides a storage medium, where the storage medium is configured to store a computer program, where the computer program when executed controls a device where the storage medium is located to perform the above method.
By means of the technical scheme, the data backup method, the device and the system provided by the application have the advantages that the target nodes receive the backup completion messages within the preset time period, the number of the backup completion messages is smaller than that of the target data backup nodes, namely, the target nodes determine that part of the target data backup nodes successfully backup the target data, at the moment, the target nodes do not send the target data to the transfer server, but control the target number backup nodes to perform data synchronization, so that the target data stored by each target data backup node are identical. And only if the target node does not receive the backup completion message within the preset time period, namely the target node determines that no target data backup node is successfully backed up, the target node sends target data to the transfer server. The target node sends the target data to the transfer server only when determining that no target data backup node is successful in backup, so that the data quantity sent to the transfer server is reduced to a certain extent, and the storage space of the transfer server is saved.
The foregoing description is only an overview of the present application, and is intended to be implemented in accordance with the teachings of the present application in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present application more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 is a flowchart of a data backup method according to an embodiment of the present application;
FIG. 2 is a flowchart of another data backup method according to an embodiment of the present application;
FIG. 3 is a flowchart of another data backup method according to an embodiment of the present application;
FIG. 4 is a flowchart of a data backup method according to an embodiment of the present application;
FIG. 5 shows a flowchart of a method for interaction between a target node and an anti-entropy server according to an embodiment of the present application;
Fig. 6 shows a schematic structural diagram of a data backup device according to an embodiment of the present application;
FIG. 7 is a schematic diagram illustrating another data backup device according to an embodiment of the present application;
FIG. 8 is a schematic diagram illustrating a data backup device according to another embodiment of the present application;
FIG. 9 is a schematic diagram illustrating a structure of a data backup device according to an embodiment of the present application;
fig. 10 is a schematic diagram of a data backup system according to an embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present application are shown in the drawings, it should be understood that the present application may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the application to those skilled in the art.
With the continuous innovation of computer technology, cloud storage technology has been rapidly developed. Cloud storage is a new concept which extends and develops in the concept of cloud computing, and refers to a system which integrates a large number of storage devices of different types in a network through application software to cooperatively work and jointly provides data storage and service access functions for the outside through functions of cluster application, grid technology or a distributed file system. The cloud storage technology can realize data synchronization among a plurality of hosts, front-end storage servers, back-end storage servers and other nodes, so that the data on each host and each server are kept up-to-date and most complete. In the related art, when the target data node fails to write the target backup data into the data backup node, the target data node needs to send the target backup data to the transit server, and then the target backup data is written into the data backup node again through the transit server until the target backup data is successfully written into the data backup node or the target backup data is expired and deleted. When a large amount of backup data in the target node fails to be written, the data sent to the transit server is excessive, and therefore the transit server occupies a large amount of storage space.
In order to solve the above problems, an embodiment of the present application provides a data backup method, where when a portion of data backup nodes fail to backup, data synchronization is performed between the data backup nodes, and the method is applied to a target node, and specific execution steps of the method are as shown in fig. 1, and the method includes:
and 101, sending target data to be backed up to a plurality of target data backup nodes.
Wherein the target data is data to be backed up. The target data backup node is used for backing up target data. The distributed database comprises a target node and a plurality of target data backup nodes.
In a specific embodiment of this step, the remote terminal sends the target data to a target node in the distributed system. After the target node receives the target data, the target node determines target data backup nodes needing to store the target data from a plurality of data backup nodes according to the target data, and sends the target data to each target data backup node.
102, when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, controlling the data synchronization among the target data backup nodes, so that the target data stored by each target data backup node are the same.
Wherein the preset time period may be set by a technician based on experience. The backup completion message is used to indicate that the target data backup node successfully backs up the target data. The target data stored by each target data backup node in this step is identical, which means that the target data stored by each target data backup node is identical, that is, the target data stored by each target data backup node is identical in both data amount and data content.
In a specific embodiment of this step, under normal conditions, the target data backup node receives the target data and stores it. However, in the actual process, the target data backup node may not receive the target data due to a network or the like, so that the target data backup node fails to backup the data successfully. And the target data backup node can also fail to store the received target data in time due to the fact that the target data backup node is on the machine, so that the target data backup node fails to backup the target data successfully. And under the condition that the target data backup node does not successfully backup the target data, the target data backup node does not send a backup completion message to the target node. That is, only the target data backup node that successfully backed up can send a backup completion message to the target node. And when the target node receives the backup completion message in a preset time period, counting the number of the received backup completion messages in the preset time period. When the number is smaller than the number of the target data backup nodes, the target data backup nodes which are partially successful in backing up the target data exist, and the target data backup nodes which are not successful in backing up the target data exist. Therefore, the target nodes can control the data synchronization among the target data backup nodes, so that the target data backup nodes which do not successfully backup the target data can successfully backup the target data.
And 103, when the backup completion message is not received within a preset time period, the target data is sent to the transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server.
The transfer server may receive the target data sent by the target node, and send the target data to the plurality of target data backup nodes.
In a specific embodiment of this step, when the target node does not receive the backup completion message within a preset period of time, the target node sends the target data to the relay server, and then the relay server resends the target data to the plurality of target data backup nodes.
In the actual process, after the transfer server receives the target data sent by the target node, the transfer server can always send the target data to the target data backup node until all the target data backup nodes successfully backup the target data, or the method can be used, namely, after the transfer server sends the target data to the target data backup node, the transfer server only needs to receive at least one backup completion message, so that the data synchronization between the backup nodes is controlled. As can be seen from the above, there are various execution modes after the transfer server transmits the data, and therefore, the execution mode of the transfer server is not limited in this step.
In the embodiment of the application, the target nodes receive the backup completion messages within the preset time period, and the number of the backup completion messages is smaller than the number of the target data backup nodes, namely, the target nodes determine that part of the target data backup nodes successfully backup the target data, at the moment, the target nodes do not send the target data to the transfer server, but control the target number of the backup nodes to perform data synchronization, so that the target data stored by each target data backup node are the same. And only if the target node does not receive the backup completion message within the preset time period, namely the target node determines that no target data backup node is successfully backed up, the target node sends target data to the transfer server. The target node sends the target data to the transfer server only when determining that no target data backup node is successful in backup, so that the data quantity sent to the transfer server is reduced to a certain extent, and the storage space of the transfer server is saved.
When the backup completion message does not include the node identifier of the target data backup node, the target node may parse the backup completion message to obtain the node identifier, where the node identifier is the target data backup node after the backup is completed. Thus, the target node can control the target data backup node with which the backup is completed to perform data synchronization with the target data backup node with which the backup is not completed. The specific implementation steps are shown in fig. 2, including:
And 201, sending target data to be backed up to a plurality of target data backup nodes.
The target data backup node is used for backing up target data.
This step is similar to step 101 and will not be described in detail here.
202, when a backup completion message is received within a preset time period, and the number of the backup completion messages is smaller than the number of the target data backup nodes, determining a first target data backup node with completed backup and a second target data backup node with unfinished backup according to the node identification of the target data backup node included in the backup completion message.
In a specific embodiment of this step, when the backup completion messages are received within a preset period of time and the number of the backup completion messages is smaller than the number of the target data backup nodes, each backup completion message is parsed to obtain node identifiers included in each backup completion message, and the target data backup nodes corresponding to the node identifiers are used as the first target data backup nodes after the backup is completed. And taking other target data backup nodes except the first target data backup node as second target data backup nodes with unfinished backup.
203, controlling the first target data backup node and the second target data backup node to perform data synchronization.
In the specific implementation manner of the step, when a first target data backup node exists, all second target data backup nodes are data synchronized with the first target data backup node; when a plurality of first target data backup nodes exist, the plurality of first target data backup nodes are used for simultaneously carrying out data synchronization with the first target data backup nodes.
When there are multiple first target data backup nodes, according to the relationship between the numbers of the first target data backup nodes and the second target data backup nodes, the multiple first target data backup nodes and the first target data backup nodes are used for data synchronization, wherein one is that the number of the first target data backup nodes is greater than or equal to the number of the second target data backup nodes, and the other is that the number of the first target data backup nodes is smaller than the number of the second target data backup nodes.
For the first type, a different first target data backup node may be allocated to each second target data backup node, and the second target data backup node may be controlled to perform data synchronization with the allocated first target data backup node. For the second type, the second number and the first number of quotients may be determined first, and the quotients are used as the minimum number that each first target data backup node can be allocated to perform node allocation, and the remaining second target data backup nodes are allocated to different first target data backup nodes, and the second target data backup nodes and the allocated first target data backup nodes perform data synchronization.
In the embodiment of the application, when the backup completion message comprises the node identifiers of the target data backup nodes, the target nodes can analyze the backup completion message to obtain the node identifiers, and further control the target data backup nodes corresponding to the node identifiers and other target data backup nodes to perform data synchronization, so that the target data stored by each target data backup node is the same.
When the backup completion message does not include the node identifier of the target data backup node, the target node cannot determine the target node for which backup is completed, and the methods involved in steps 301 to 303 are required to synchronize data between each target data backup node. The specific implementation steps are shown in fig. 3, including:
and 301, sending target data to be backed up to a plurality of target data backup nodes.
The target data backup node is used for backing up target data.
This step is similar to step 101 and will not be described in detail here.
302, setting an arrangement sequence of a plurality of target data backup nodes when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes.
The arrangement sequence is used for determining the sequence of each target data backup node for circularly executing the data synchronization operation.
In a specific embodiment of this step, after the target node receives the target data sent by the remote terminal, the target node determines the node identifier of the target data backup node from the node identifiers of the plurality of data backup nodes, and uses the storage sequence of the node identifiers of the target data backup node as the arrangement sequence of the target data backup nodes.
303, according to the arrangement sequence, controlling the data synchronization between the target data backup nodes.
In the specific implementation manner of the step, selecting a target data backup node as a starting data backup node, and comparing whether the starting data backup node and a third target data backup node adjacent to the starting data backup node store the same target data according to the arrangement sequence; if the target data is the same, comparing the third target data backup node with target data stored by a fourth target data backup node adjacent to the third target data backup node in sequence; and if the data is different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
Wherein the third target data backup node adjacent thereto is the up/down target data backup node of the starting data backup node. The fourth target data backup node is the up/down target data backup node of the third target data backup node. That is, the third target data backup node and the fourth target data backup node are the second target data backup node and the third target data backup node arranged in the order of the arrangement order or the reverse order. The data comparison may be to compare whether the two data are identical.
Further, the target node randomly selects one target data backup node from the plurality of target data backup nodes as a starting data backup node, determines the position of the starting data backup node in the arrangement sequence, and compares whether the starting data backup node is identical with target data stored in a third target data backup node adjacent to the starting data backup node. If the target data is the same, comparing the third target data backup node with target data stored by a fourth target data backup node adjacent to the third target data backup node in sequence; and if the data is different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
Specifically, if not, the specific steps of controlling the initial data backup node and the third target data backup node to perform data synchronization are as follows: if the data are different, determining the missing data of the target data backup node with smaller data quantity, and transmitting the missing data to the target data backup node with smaller data quantity.
When the target data stored by the two target data backup nodes are different, it is indicated that there is a deletion of the target data stored by one target data backup node, and the target data backup node with the deletion of the target data is necessarily the target data backup node with a smaller data volume.
For example, the target data backup nodes include node 1, node 2, node 3, node 4 and node 5, and the order of the target data backup nodes is node 1, node 2, node 3, node 4 and node 5. If node 3 is selected as the starting data backup node, then node 4 is the third target data backup node, node 5 is the fourth target data backup node, or node 2 is the third target data backup node, and node 1 is the fourth target data backup node. Here, the node 4 is taken as a third target data backup node, and the node 5 is taken as a fourth target data backup node as an example. Firstly, comparing target data stored in the node 3 and the node 4 respectively, if the target data are different, controlling the node 3 and the node 4 to synchronize data, and then comparing the target data stored in the node 4 and the node 5, if the target data are identical, directly comparing the target data stored in the node 4 and the node 5. When comparing the target data stored by the node 4 and the node 5, if the target data are different, the node 4 and the node 5 are controlled to perform data synchronization, then the target data stored by the node 5 and the node 1 are compared, and if the target data are identical, the target data stored by the node 5 and the node 1 are directly compared. And then in the process of comparing the target data stored by the node 5 and the node 1, if the target data are different, the node 5 and the node 1 are controlled to perform data synchronization, then the target data stored by the node 1 and the node 2 are controlled to be compared, and if the target data are identical, the target data stored by the node 1 and the node 2 are compared. The above process is repeated until the target data stored by node 1, node 2, node 3, node 4 and node 5 are the same.
The process of controlling two target data backup nodes to perform data synchronization in the above process may be described by taking the control node 1 and the node 2 to perform data synchronization as an example. The specific process is that after the target node obtains the target data stored by the node 1 and the node 2 respectively, the target data stored by the node 1 and the node 2 are compared first, then the target data backup node and the difference data with smaller data quantity are determined, and finally the difference data is sent to the target data backup node with smaller data quantity. For example, taking a target data backup node with a smaller data volume as node 1 and a target data backup node with a larger data volume as node 2 as an example, the target node sends differential data to node 1, so as to realize data synchronization between node 1 and node 2. In this case, since node 1 may only backup a part of the target data during the process of backing up the target data by node 1, the difference data between node 1 and node 2 is actually the data missing from node 1.
In the above process, the target node may not send the difference data to the node 1, but notify the node 2 to send the stored target data to the node 1, so that the target data sent by the node 2 covers the target data stored in the node 1, thereby implementing data synchronization between the node 1 and the node 2.
The target data stored in the target data backup nodes are compared through the target nodes, the target data backup nodes are controlled to perform data synchronization, and the target data stored in the non-data backup nodes can be compared through the target data backup nodes, so that the target data backup nodes are controlled to perform data synchronization. Still take the target data backup node including node 1, node 2, node 3, node 4 and node 5, the arrangement order is node 1, node 2, node 3, node 4, node 5, and node 3 is taken as an example of the initial data backup node, when comparing the target data stored in node 3 and node 4 respectively, the target node can control node 3 to send the target data stored in itself to node 4, or control node 4 to send the target data stored in itself to node 3. Here, the node 4 will be described by taking the example of transmitting the target data stored in itself to the node 3, so that the node 3 compares the target data stored in itself with the target data transmitted by the node 4 after receiving the data transmitted by the node 4. If the detected target data amount stored by the node 4 is smaller, the target data sent by the node 4 directly cover the target data stored by the node, or difference data of the target data and the difference data are determined, new target data are generated based on the target data stored by the node and the difference data, and then data synchronization between the node 3 and the node 4 is realized. If the target data amount sent by the node 4 is detected to be less, the target data stored by the node or the determined difference data is sent to the node 4, so that the target data stored by the node 3 is the same as the target data stored by the node 4, and further the data synchronization of the node 3 and the node 4 is realized. If the target data stored by the node 4 is the same as the target data stored by the node 4, the node 4 directly compares the data between the node 4 and the node 5.
In the actual process, the target data stored in the target data backup node exists in the form of data fragments, so that the data fragments of the same data fragment identifier in different target data backup nodes can be compared, and further the comparison of the target data is completed. For example, 3 data slices are stored in the node 3, namely a data slice a1, a data slice a2 and a data slice a3, and 2 data slices are stored in the node 4, namely a data slice b1 and a data slice b3, wherein the data slice identifier of the data slice a1 is the same as the data slice identifier of the data slice b1, and the data slice identifier of the data slice a3 is the same as the data slice identifier of the data slice b3. Since the data slice identifier of the data slice a1 is the same as the data slice identifier of the data slice b1, the data slice a1 and the data slice b1 are compared. If the data fragments a1 and b1 are different, the data amounts included in the data fragments a1 and b1 are further compared, so that the data fragments with more data amounts can cover the data fragments with less data amounts. For example, the data amount of the data fragment a1 is small, so the data fragment a1 can be determined as a data fragment lacking data, and the data fragment b1 is made to cover the data fragment a1. If data slice a1 and data slice b1 are the same, then the next data slice is compared. Since there is no data fragment identifier identical to the data fragment identifier of the data fragment a2, there is no data fragment in contrast to the data fragment a2, and thus, the node 4 lacks the data fragment b2, and the control node 4 needs to acquire the data fragment a2 (i.e., the data fragment b 2). Finally, the data slice a3 and the data slice b3 are compared. If the data fragments a3 and b3 are different, the data amounts included in the data fragments a3 and b3 are further compared, so that the data fragments with more data amounts can cover the data fragments with less data amounts. If the data slice a3 and the data slice b3 are the same, the comparison of the data slices is completed.
In the implementation of the application, when the backup completion message does not include the node identification of the target data backup node, the target node does not know the target data backup node after the backup is completed, and at the moment, the target node controls the data synchronization between every two target data backup nodes until all target data stored by the target data backup nodes are the same.
In addition, the application provides a data backup method, which is used for carrying out data synchronization on a target data backup node, and the method is applied to an anti-entropy server, and the specific implementation steps are as shown in fig. 4, and the method comprises the following steps:
and 401, receiving control information sent by a target node.
Wherein the inverse entropy server is a server independent of the distributed system. The anti-entropy server is used for performing anti-entropy calculation on the target data backup node. The control information includes node identifiers of multiple target data backups, where the node identifiers are data that uniquely identify the target data backup nodes, and in the embodiment of the present application, the node identifiers may be terminal information corresponding to the target data backup nodes, for example, the node identifiers may be production identifiers of terminals.
In a specific embodiment of this step, the anti-entropy server receives the control information sent by the target node, and obtains node identifiers of a plurality of target data backup nodes in the control information.
In the actual process, when the target node determines that partial data is not successfully backed up, control information can be sent to the anti-entropy server. Or when the target node detects that the data in the data backup node is deleted by an operator, the control information can be sent to the anti-entropy server. Or each time interval is preset, the target node sends control information to the anti-entropy server so as to ensure that the data stored by the data backup node storing the same data are the same. Or when a certain data backup node detects that the data of the certain data backup node is deleted by an operator, the data synchronization message information can be sent to the anti-entropy server, so that the anti-entropy server can acquire the information including the node identification of the data backup node from the target node.
It should be noted that, the normal deletion should be that the remote end sending the target data sends a deletion message of the target data to the target node, so that the target node controls the target data backup node storing the target data to delete the stored target data according to the deletion message. The deletion of the data in the data backup node by the operator is not a normal deletion, but a person operating the target data backup node erroneously deletes the target data in the terminal. In order to restore the target data stored in the target data backup node, the target data backup node needs to perform data synchronization with other target data backup nodes, so as to ensure that the target data stored in the target data backup node are the same.
And 402, according to the plurality of node identifiers, controlling the data synchronization among the target data backup nodes corresponding to the node identifiers so that the target data stored by each target data backup node are the same.
In the embodiment of the application, the target node can inform the anti-entropy server to control the target data backup node to perform data synchronization, and the target node is not required to control the target data backup node to perform data synchronization, so that the operation resources of the target node are saved to a certain extent.
In addition, the application provides a method for interaction between the target node and the anti-entropy server, which is used for realizing the interaction process between the target node and the anti-entropy server, and the specific implementation steps are as shown in fig. 5, and the method comprises the following steps:
501, the target node sends control information to the inverse entropy server.
Wherein the control information includes a node identification of the target data backup node. The node identifier of the target data backup node may include the node identifier of the target data backup node, or may be other information that uniquely identifies the target data backup node.
In a specific embodiment of this step, the target data to be backed up is sent to a plurality of target data backup nodes. And when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, the control information can be sent to the anti-entropy server. Or when the target node detects that the data in the target data backup node is deleted by an operator, the control information may be sent to the anti-entropy server. Or each time interval is preset, the target node sends control information to the anti-entropy server so as to ensure that the data stored by the data backup node storing the same data are the same. Or when a certain data backup node detects that the data of the certain data backup node is deleted by an operator, the data synchronization message information can be sent to the anti-entropy server, so that the anti-entropy server can acquire the information including the node identification of the data backup node from the target node.
And 502, the inverse entropy server receives control information sent by the target node.
Wherein the control information includes node identifications of the plurality of target data backup nodes.
This step is similar to step 401 and will not be described in detail here.
503, the anti-entropy server obtains the encrypted data sent by the target data backup node corresponding to each node identifier according to the plurality of node identifiers.
The encrypted data is obtained by encrypting the stored target data by the target data backup node based on a preset rule. For example, the encrypted data is digest information of the target data.
In the specific implementation manner of this step, since the anti-entropy server is a server outside the distributed system, the target data backup node needs to encrypt the transmission data in order to ensure the security of the transmission data. Therefore, the anti-entropy server can inform the plurality of target data backup nodes to send corresponding encrypted data to the anti-entropy server according to the node identification of the plurality of target data backup nodes, and further obtain the encrypted data sent by each target data backup node.
And 504, controlling the data synchronization among the target data backup nodes by the anti-entropy server according to the encrypted data sent by the plurality of target data backup nodes, so that the target data stored by each target data backup node is the same.
In the specific implementation manner of this step, because the control information includes the node identifier of each target data backup node, the entropy server can determine the target data backup node that needs to perform data synchronization, and further acquire the encrypted data sent by each target data backup node, and further control the data synchronization between the target data backup nodes, so that the target data stored by each target data backup node is the same.
Further, an arrangement sequence of a plurality of target data backup nodes is set, wherein the arrangement sequence is used for determining the sequence of each target data backup node for circularly executing data synchronization operation; and controlling the data synchronization among the target data backup nodes according to the arrangement sequence.
Furthermore, according to the arrangement sequence, the specific steps of data synchronization between the control target data backup nodes are as follows: selecting a target data backup node as a starting data backup node, and comparing whether the starting data backup node and the third target data backup node adjacent to the starting data backup node send the same encrypted data according to the arrangement sequence; if the data are the same, comparing the third target data backup node with the encrypted data sent by the fourth target data backup node adjacent to the third target data backup node in sequence; and if the data is different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
It should be noted that, this step is similar to step 303, and will not be described in detail here.
In the embodiment of the application, the target node can inform the anti-entropy server to control the target data backup node to perform data synchronization, and the target node is not required to control the target data backup node to perform data synchronization, so that the operation resources of the target node are saved to a certain extent.
Further, as an implementation of the method embodiments shown in fig. 1 to 3, an embodiment of the present application provides a data backup device, which can save a storage space of a relay server. The embodiment of the device corresponds to the foregoing method embodiment, and for convenience of reading, details of the foregoing method embodiment are not described one by one in this embodiment, but it should be clear that the device in this embodiment can correspondingly implement all the details of the foregoing method embodiment. As shown in fig. 6, the apparatus includes:
a sending unit 601, configured to send target data to be backed up to a plurality of target data backup nodes, where the target data backup nodes are configured to backup the target data;
the first control unit 602 is configured to control data synchronization between the target data backup nodes when a backup completion message is received within a preset period of time and the number of the backup completion messages is smaller than the number of the target data backup nodes, so that target data stored in each target data backup node is the same;
And the retransmission unit 603 is configured to, when the backup completion message is not received within a preset period of time, send the target data to a relay server, and retransmit the target data to a plurality of target data backup nodes through the relay server.
Further, as shown in fig. 7, when the backup completion message includes a node identifier of the target data backup node, the first control unit 602 includes:
a determining module 6021, configured to determine, according to a node identifier of the target data backup node included in the backup completion message, a first target data backup node with complete backup and a second target data backup node with incomplete backup;
the first control module 6022 is configured to control data synchronization between the first target data backup node and the second target data backup node determined by the first determining module 6021.
Further, as shown in fig. 7, the first control module 6022 is further configured to:
when a first target data backup node exists, all second target data backup nodes are subjected to data synchronization with the first target data backup node;
when a plurality of first target data backup nodes exist, the plurality of first target data backup nodes are used for simultaneously carrying out data synchronization with the first target data backup nodes.
Further, as shown in fig. 7, when the backup completion message does not include the target data backup node information, the apparatus further includes a first setting unit 604:
a first setting unit 604, configured to set an arrangement order of a plurality of target data backup nodes, where the arrangement order is used to determine an order in which each target data backup node performs a data synchronization operation in a loop;
the first control unit 602 is further configured to:
and controlling the data synchronization between the target data backup nodes according to the arrangement sequence determined by the first setting unit 604.
Further, as shown in fig. 7, the first control unit 602 includes:
a comparing module 6023, configured to select a target data backup node as a starting data backup node, and compare, according to the arrangement order determined by the first setting unit 604, whether the target data stored in the starting data backup node and the target data stored in the third target data backup node adjacent to the starting data backup node are the same;
a first result module 6024, configured to compare the third target data backup node with the target data stored in the fourth target data backup node adjacent to the third target data backup node in order if the result of the comparison module 6023 is the same;
And a second result module 6025, configured to control the initial data backup node and the third target data backup node to perform data synchronization if the result of the comparison module 6023 is different.
Further, as shown in fig. 7, the second result module 6025 is further configured to:
if the result of the comparison module 6023 is different, determining the missing data of the target data backup node with smaller data volume, and sending the missing data to the target data backup node with smaller data volume.
Further, as shown in fig. 7, the first control unit 602 further includes a transmitting module 6026,
the sending module 6026 is configured to send control information to an anti-entropy server, so that the anti-entropy server controls the target data backup nodes to perform data synchronization, where the control information includes a node identifier of the target data backup.
Further, as an implementation of the method embodiments shown in fig. 4 to 5, an embodiment of the present application provides a data backup device, which may control a target data backup node to perform data synchronization. The embodiment of the device corresponds to the foregoing method embodiment, and for convenience of reading, details of the foregoing method embodiment are not described one by one in this embodiment, but it should be clear that the device in this embodiment can correspondingly implement all the details of the foregoing method embodiment. As shown in fig. 8, the apparatus includes:
A receiving unit 801, configured to receive control information sent by a target node, where the control information includes node identifiers of a plurality of target data backup nodes;
the second control unit 802 is configured to control, according to the node identifiers received by the plurality of receiving units 801, data synchronization between target data backup nodes corresponding to the node identifiers, so that target data stored in each target data backup node is the same.
Further, as shown in fig. 9, the second control unit 802 includes:
an obtaining module 8021, configured to obtain, according to node identifiers received by the plurality of receiving units 801, encrypted data sent by a target data backup node corresponding to each node identifier, where the encrypted data is obtained by encrypting, by the target data backup node, stored target data based on a preset rule;
the second control module 8022 is configured to control data synchronization between the target data backup nodes according to the encrypted data acquired by the plurality of acquisition modules 8021.
Further, as shown in fig. 9, the apparatus further includes a second setting unit 803:
a second setting unit 803 for setting an arrangement order of the plurality of target data backup nodes, the arrangement order being used for determining an order in which the respective target data backup nodes cyclically perform the data synchronization operation;
The second control module 8022 is further configured to:
and controlling the data synchronization between the target data backup nodes according to the arrangement sequence determined by the second setting unit 803.
Further, as shown in fig. 9, the second control module 8022 is further configured to:
selecting a target data backup node as a starting data backup node, and comparing whether the starting data backup node and the encrypted data sent by a third target data backup node adjacent to the starting data backup node are identical according to the arrangement sequence determined by the second setting unit 803;
if the data are the same, comparing the third target data backup node with the encrypted data sent by the fourth target data backup node adjacent to the third target data backup node in sequence;
and if the initial data backup node and the third target data backup node are different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
Further, as shown in fig. 10, an embodiment of the present application further provides a system, where the system includes: the system comprises a target node, an anti-entropy server and a plurality of target data backup nodes, wherein:
the target node is used for sending target data to be backed up to a plurality of target data backup nodes; when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, control information is sent to the anti-entropy server, so that the anti-entropy server controls the target data backup nodes to perform data synchronization, and the control information comprises node identifiers of the target data backup nodes; when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server;
The anti-entropy server is used for receiving control information sent by the target node, wherein the control information comprises node identifiers of a plurality of target data backup nodes; according to the plurality of node identifications, controlling the data synchronization between the target data backup nodes corresponding to the node identifications so that the target data stored by each target data backup node are the same;
and the target data backup node is used for backing up the target data.
Further, an embodiment of the present application further provides a processor, where the processor is configured to execute a program, where the program executes the data backup method described in fig. 1 to 5.
Further, an embodiment of the present application further provides a storage medium, where the storage medium is configured to store a computer program, where the computer program controls, when running, a device where the storage medium is located to execute the data backup method described in fig. 1 to 5.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the methods and apparatus described above may be referenced to one another. In addition, the "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent the merits and merits of the embodiments.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general-purpose systems may also be used with the teachings herein. The required structure for a construction of such a system is apparent from the description above. In addition, the present application is not directed to any particular programming language. It will be appreciated that the teachings of the present application described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present application.
Furthermore, the memory may include volatile memory, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), in a computer readable medium, the memory including at least one memory chip.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (16)

1. A method of data backup, the method comprising:
the method comprises the steps of sending target data to be backed up to a plurality of target data backup nodes, wherein the target data backup nodes are used for backing up the target data;
when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, controlling the target data backup nodes to perform data synchronization, so that the target data stored by each target data backup node are the same;
and when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server.
2. The method of claim 1, wherein when the backup completion message includes a node identification of a target data backup node, the controlling data synchronization between the target data backup nodes comprises:
determining a first target data backup node with complete backup and a second target data backup node with incomplete backup according to the node identification of the target data backup node included in the backup completion message;
And controlling the first target data backup node and the second target data backup node to perform data synchronization.
3. The method of claim 2, wherein said controlling data synchronization between the first target data backup node and the second target data backup node comprises:
when a first target data backup node exists, all second target data backup nodes are subjected to data synchronization with the first target data backup node;
when a plurality of first target data backup nodes exist, the plurality of first target data backup nodes are used for simultaneously carrying out data synchronization with the first target data backup nodes.
4. The method of claim 1, wherein when the backup completion message does not include target data backup node information, the method further comprises:
setting the arrangement sequence of a plurality of target data backup nodes, wherein the arrangement sequence is used for determining the sequence of each target data backup node for circularly executing data synchronization operation;
the controlling the data synchronization between the target data backup nodes comprises the following steps:
and controlling the data synchronization between the target data backup nodes according to the arrangement sequence.
5. The method of claim 4, wherein controlling data synchronization between the target data backup nodes according to the round robin order comprises:
selecting a target data backup node as a starting data backup node, and comparing whether the starting data backup node and a third target data backup node adjacent to the starting data backup node store the same target data according to an arrangement sequence;
if the target data are the same, comparing the third target data backup node with target data stored by a fourth target data backup node adjacent to the third target data backup node in sequence;
and if the initial data backup node and the third target data backup node are different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
6. The method of claim 4, wherein if the initial data backup node and the third target data backup node are not the same, controlling data synchronization comprises:
if the data are different, determining the missing data of the target data backup node with smaller data quantity, and transmitting the missing data to the target data backup node with smaller data quantity.
7. The method of claim 1, wherein said controlling data synchronization between the target data backup nodes comprises:
And sending control information to the anti-entropy server so that the anti-entropy server controls the data synchronization between the target data backup nodes, wherein the control information comprises the node identification of the target data backup.
8. A method of data backup, the method comprising:
receiving control information sent by a target node, wherein the control information comprises node identifiers of a plurality of target data backup nodes;
and according to the plurality of node identifications, controlling the data synchronization between the target data backup nodes corresponding to the node identifications so that the target data stored by each target data backup node are the same.
9. The method of claim 8, wherein controlling data synchronization between target data backup nodes corresponding to the node identifiers according to the plurality of node identifiers comprises:
according to the multiple node identifiers, obtaining encrypted data sent by a target data backup node corresponding to each node identifier, wherein the encrypted data is obtained by encrypting stored target data by the target data backup node based on a preset rule;
and controlling the target data backup nodes to perform data synchronization according to the encrypted data sent by the target data backup nodes.
10. The method according to claim 9, wherein the method further comprises:
setting the arrangement sequence of a plurality of target data backup nodes, wherein the arrangement sequence is used for determining the sequence of each target data backup node for circularly executing data synchronization operation;
and controlling the data synchronization between the target data backup nodes according to the encrypted data sent by the plurality of target data backup nodes, comprising the following steps:
and controlling the data synchronization between the target data backup nodes according to the arrangement sequence.
11. The method of claim 10, wherein controlling data synchronization between the target data backup nodes according to the ranking comprises:
selecting a target data backup node as a starting data backup node, and comparing whether the starting data backup node and the third target data backup node adjacent to the starting data backup node send the same encrypted data according to the arrangement sequence;
if the data are the same, comparing the third target data backup node with the encrypted data sent by the fourth target data backup node adjacent to the third target data backup node in sequence;
and if the initial data backup node and the third target data backup node are different, controlling the initial data backup node and the third target data backup node to perform data synchronization.
12. A data backup apparatus, the apparatus comprising:
the sending unit is used for sending target data to be backed up to a plurality of target data backup nodes, and the target data backup nodes are used for backing up the target data;
the first control unit is used for receiving backup completion messages within a preset time period, and controlling the data synchronization among the target data backup nodes when the number of the backup completion messages is smaller than that of the target data backup nodes, so that the target data stored by each target data backup node are the same;
and the retransmission unit is used for transmitting the target data to a transit server when the backup completion message is not received within a preset time period, and retransmitting the target data to a plurality of target data backup nodes through the transit server.
13. A data backup apparatus, the apparatus comprising:
the receiving unit is used for receiving control information sent by the target nodes, wherein the control information comprises node identifiers of a plurality of target data backup nodes;
and the second control unit is used for controlling the data synchronization among the target data backup nodes corresponding to the node identifiers according to the plurality of node identifiers so that the target data stored by each target data backup node are the same.
14. A system, the system comprising: the system comprises a target node, an anti-entropy server and a plurality of target data backup nodes, wherein:
the target node is used for sending target data to be backed up to a plurality of target data backup nodes; when the backup completion messages are received within a preset time period and the number of the backup completion messages is smaller than the number of the target data backup nodes, control information is sent to the anti-entropy server, so that the anti-entropy server controls the target data backup nodes to perform data synchronization, and the control information comprises node identifiers of the target data backup nodes; when the backup completion message is not received within a preset time period, the target data is sent to a transfer server, and the target data is sent to a plurality of target data backup nodes again through the transfer server;
the anti-entropy server is used for receiving control information sent by the target node, wherein the control information comprises node identifiers of a plurality of target data backup nodes; according to the plurality of node identifications, controlling the data synchronization between the target data backup nodes corresponding to the node identifications so that the target data stored by each target data backup node are the same;
And the target data backup node is used for backing up the target data.
15. A terminal for running a program, wherein the program when run performs the method of any one of claims 1-11.
16. A storage medium for storing a computer program, wherein the computer program when run controls a device in which the storage medium is located to perform the method of any one of claims 1-11.
CN202210620228.5A 2022-06-02 2022-06-02 Data backup method, device and system Pending CN117215826A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210620228.5A CN117215826A (en) 2022-06-02 2022-06-02 Data backup method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210620228.5A CN117215826A (en) 2022-06-02 2022-06-02 Data backup method, device and system

Publications (1)

Publication Number Publication Date
CN117215826A true CN117215826A (en) 2023-12-12

Family

ID=89037616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210620228.5A Pending CN117215826A (en) 2022-06-02 2022-06-02 Data backup method, device and system

Country Status (1)

Country Link
CN (1) CN117215826A (en)

Similar Documents

Publication Publication Date Title
CN110825420B (en) Method, device, equipment and storage medium for updating configuration parameters of distributed cluster
US9917884B2 (en) File transmission method, apparatus, and distributed cluster file system
CN111314479B (en) Data processing method and equipment
US11385830B2 (en) Data storage method, apparatus and system, and server, control node and medium
CN103530200A (en) Server hot backup system and method
CN105824846B (en) Data migration method and device
CN107423942B (en) Service transfer method and device
CN113835844B (en) Container cluster management method and device and cloud computing platform
CN110099108B (en) Block chain event duplicate removal method and device, computer equipment and storage medium
CN106487852B (en) Method, device, terminal equipment and system for realizing client file synchronization
CN110825758B (en) Transaction processing method and device
CN117215826A (en) Data backup method, device and system
CN109905459B (en) Data transmission method and device
CN110502460B (en) Data processing method and node
CN110830281B (en) Hot standby method and system based on mesh network structure
CN111142791A (en) Data migration method and device
CN115145782A (en) Server switching method, mooseFS system and storage medium
CN107016007B (en) Method and device for processing big data based on data warehouse
CN113282660B (en) Method and system for synchronizing data in cluster, electronic equipment and storage medium
CN113743564B (en) Counting method, counting device, electronic equipment and storage medium
CN111147226A (en) Data storage method, device and storage medium
CN116582453B (en) Monitoring data migration method and system in multi-service cluster scene
CN114553861B (en) File transmission method and device, storage medium and electronic equipment
CN113609199B (en) Database system, server, and storage medium
CN116599826A (en) Container maintenance method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination