[go: up one dir, main page]

CN118170588B - Method and system for automatic disaster recovery and data migration - Google Patents

Method and system for automatic disaster recovery and data migration Download PDF

Info

Publication number
CN118170588B
CN118170588B CN202410441578.4A CN202410441578A CN118170588B CN 118170588 B CN118170588 B CN 118170588B CN 202410441578 A CN202410441578 A CN 202410441578A CN 118170588 B CN118170588 B CN 118170588B
Authority
CN
China
Prior art keywords
user
application
host
data
user service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410441578.4A
Other languages
Chinese (zh)
Other versions
CN118170588A (en
Inventor
何卫鹏
黄阶秀
贺鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jingao Information Technology Co ltd
Original Assignee
Guangzhou Jingao Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jingao Information Technology Co ltd filed Critical Guangzhou Jingao Information Technology Co ltd
Priority to CN202410441578.4A priority Critical patent/CN118170588B/en
Publication of CN118170588A publication Critical patent/CN118170588A/en
Application granted granted Critical
Publication of CN118170588B publication Critical patent/CN118170588B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1469Backup restoration techniques
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1448Management of the data involved in backup or backup restore
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/0614Improving the reliability of storage systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0643Management of files
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/0647Migration mechanisms
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0646Horizontal data movement in storage systems, i.e. moving data in between storage devices or systems
    • G06F3/065Replication mechanisms

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to a method and a system for automatic disaster recovery and data migration, wherein a user divides different importance levels for different application programs according to service demands or service conditions, the importance levels can be divided by automatically analyzing user behaviors and application use data through the system, before executing automatic disaster recovery from a main service host to a standby host, the system firstly detects hardware parameter differences between the two hosts, if the hardware parameters are found to have differences which affect the installation of a system image file on the standby host, the operating system of the main service host and the application data thereof are modified, in the modification process, the fact that all the application programs marked as 'necessary levels' by the user are not deleted is ensured, the data and configuration of the application programs with higher importance in the user-defined levels are reserved as much as possible, and the newly generated system image file is automatically installed on the standby host based on the adjusted operating system and application data.

Description

Method and system for automatic disaster recovery and data migration
Technical Field
The invention belongs to the field of data security, and particularly relates to a method and a system for automatic disaster recovery and data migration.
Background
There are many data Recovery software products on the market today, such as Recuva, easeUSData Recovery Wizard, DISK DRILL, R-Studio, STELLAR DATA Recovery, etc., which typically incorporate different types of Recovery techniques to cope with various data loss scenarios. For severely physically damaged hard disks, the user may need to seek the assistance of a specialized data recovery service company.
Many enterprise computer hosts need to be configured with special disaster recovery and management technologies of data migration, complete or incremental backups of system states, files and application programs are automatically or manually established at regular intervals, and the data state at the backup time point can be quickly recovered under the conditions of hardware faults, software errors, virus attacks or human misoperation and the like. When disaster occurs, the backup image can be used to quickly restore the whole system or key business data to a new host on the same or different hardware platform, thereby greatly reducing business interruption time. However, the existing techniques of automatic disaster recovery and data migration all face the practical problem that the hardware configuration of the primary host and the spare host are often difficult to achieve the same, so that the problem that the conflict of the hardware configuration cannot be successful in the process of automatic disaster recovery and data migration often occurs.
Disclosure of Invention
The present invention is directed to a method and system for automatic disaster recovery and data migration, which solve the above-mentioned problems in the prior art.
In order to solve the technical problems, the invention provides the following technical scheme:
the application discloses an automatic disaster recovery and data migration method, which comprises the steps of obtaining files and application data of an operating system of a user service host;
Listing the files and application data of the operation system of the user service host and storing the files and application data on a user service table;
reminding a user to divide different importance levels for different applications; if the number of times of reminding the user exceeds the threshold value, the user still does not actively divide different importance levels for different applications, and then the different importance levels are automatically divided for the different applications of the user according to the use data of the user for the applications;
the user or the system actively executes the method to divide different importance levels for different applications;
Detecting a difference in hardware parameters of the user service host and the standby host before performing automatic disaster recovery and data migration from the user service host to the standby host, and automatically performing installation of all system image files of the user service host to the standby host if there is no difference in hardware parameters of the user service host and the standby host or the difference in hardware parameters of the user service host and the standby host does not affect a process of installing all system image files of the user service host to the standby host;
If the hardware parameters of the user service host and the spare host are different, and the difference of the hardware parameters of the user service host and the spare host affects the process of installing all the system image files of the user service host to the spare host, modifying the files and application data of the operating system of the user service host; and generating an entire system image file of the new user service host based on the modified file of the operating system of the user service host and the application data, and automatically executing the installation of the entire system image file of the new user service host to the standby host.
Preferably, the data items recorded in the user service table structure comprise serial numbers, IP addresses, operating system information, key system files, application program lists, data catalogues, important files, configuration settings and documents;
the operating system information includes specific information items including operating system type, operating system version, installation date, serial number/license key;
the key system file comprises specific information items including file name, file path, file size, last modification date and remark; the application program list comprises specific information items including application program names, version numbers, installation paths, publishers/developers, license states and user-defined grades;
The data directory and the important file comprise specific information items including a data directory path, key data file names, data backup frequency and last backup date;
the configuration settings and documents include specific information items including a configuration file name, a configuration content abstract, and a modification date.
Preferably, the different importance levels are automatically classified for different applications of the user according to the use data of the application by the user, specifically: calculating the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of a certain application, and dividing different importance levels by the numerical ranges corresponding to the weighted summation numbers of the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of the application.
Preferably, different importance levels are assigned to different applications, namely, corresponding importance levels are selected for corresponding application programs in a user-defined level of an application program list in a user service table, wherein the importance levels comprise a necessary level, a1 st priority, a 2 nd priority, a3 rd priority, a.the.i., the.n. priority, and the.i. the importance levels are sequentially reduced. Preferably, in the process of modifying the file and the application data of the operating system of the user service host, the application programs with the user custom grade being the necessary grade are ensured to be reserved entirely, and the application programs with higher importance corresponding to the user custom grade are reserved as much as possible.
Preferably, the process of installing all system image files of the user service host to the standby host is ended if all application programs with the user custom grade of 'necessary grade' cannot be ensured to be reserved in the process of modifying the files and application data of the operating system of the user service host.
Preferably, modifying the file and application data of the operating system of the user service host includes deleting part of the file and application data of the operating system or replacing part of the file and application data of the operating system.
Preferably, in modifying the files and application data of the operating system of the user service host, it is ensured that the applications with "user custom level" being "necessary level" are all reserved, and as many more important applications corresponding to "user custom level" are reserved as possible, specifically:
analyzing the hardware difference from the user service host to the standby host, listing the user service form, and determining the grade of the application software; checking the hardware compatibility of the file to be deleted or replaced and the standby host computer, and confirming that the new file is suitable for the target environment;
For the files and application data of the operating system which are not suitable for the target environment, firstly processing the files and application data of the operating system of the modified user service host corresponding to the low-priority application according to the predefined importance level rule; for the application program and related files with the importance of 'necessary level' corresponding to 'user custom level', the application program is kept unchanged or replaced only under the condition of having an explicit compatible alternative scheme;
For the application programs and related files with higher importance corresponding to the user custom grade, the application programs and related files are changed by the scheme with the maximum number or replaced under the condition of having an explicit compatible alternative scheme;
If modification of the registry key is involved, ensuring that registry keys associated with the removed or replaced file are properly cleaned or updated; after the operation is finished, the integrity check of the system is operated, so that the system is still stable, and key services and applications can be started normally.
The present application also discloses an automated disaster recovery and data migration system comprising a computer program product of instructions that, when run on a computer, cause the computer to perform the automated disaster recovery and data migration method described above.
Advantageous effects
The user can divide different importance levels for different application programs according to service demands or service conditions, the importance levels can be divided by automatically analyzing user behaviors and application use data through the system, before executing automatic disaster recovery from a main service host to a standby host, the system can detect hardware parameter differences between the two hosts, if the hardware parameters are found to have differences affecting the installation of a system image file on the standby host, the operating system of the main service host and the application data thereof are modified, in the modification process, the application programs marked as 'necessary level' by the user are ensured not to be deleted, the data and the configuration of the application programs with higher importance in the user custom level are reserved as much as possible, all system image files of the new user service host are created based on the adjusted operating system and the application data, and the newly generated system image files are automatically installed on the standby host so as to realize complete migration and recovery of the system.
The application can be seen to be an automatic system migration scheme which is intelligently adapted to hardware changes and considers application importance, and ensures that key applications can be migrated to a standby host without damage during disaster recovery.
Drawings
FIG. 1 is a flow chart of a method of automated disaster recovery and data migration.
Detailed Description
The technical solutions of the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The application discloses an automatic disaster recovery and data migration method, as shown in figure 1, comprising the steps of obtaining files and application data of an operating system of a user service host;
The specific methods for obtaining the files and application data of the operating systems of the user service host will vary for different operating systems. The following describes how to obtain files and application data of the two operating systems, namely Windows and Linux:
for the Windows operating system:
1. Operating system information:
Operating system type and version: and inputting 'systeminfo' in the command prompt window and returning to check the information of the 'operating system name' and the 'OS version'.
Installation date: the 'HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\ CurrentVersion \ INSTALLDATE' key may be looked up by a registry editor (regedit) to translate to the actual date.
Serial number/license key: the serial number is not directly displayed in the system and is obtained using a script.
2. Key system files:
File name, path, size, last modification date: all files under the directory and their detailed attributes may be listed using a resource manager or command line (e.g., 'dir/sfilname. Ext' or 'dir/s c: \windows\systems 32').
3. List of applications:
Application name, version number, installation path: the installed application list can be viewed through the "uninstaller" function of the control panel; or may be obtained by looking up a registry or by using third party software (e.g., belarc Advisor).
Issuer/developer, license status, user: obtained by the application's document or by run-time checking.
4. Data directory and important files:
Data directory path, key data file name: the directory and file names are searched by the resource manager or command line.
Frequency of data backup, date of last backup: this information is maintained by the user himself or by the software performing the backup task maintaining a log, consulting the relevant log file or software interface.
5. Configuration settings and documents:
Profile name: depending on the particular application or service, the corresponding configuration file, e.g., file in the INI, XML, JSON format, is found under its installation directory.
Configuring content abstract and modification date: the text editor may be used to open the configuration file to view the content digest and view the last modification date via the file attributes.
For the Linux operating system:
1. Operating system information:
operating system type and version: inputting uname-a' to check the kernel and release information in the terminal; the 'cat/etc/os-release' looks at the detailed release details.
Installation date: a command to consult the system log or use the install time is required, for example, on Ubuntu, the BIOS install date can be queried through 'sudo dmidecode-s BIOS-install-date'.
Serial number/license key: linux release mostly does not require an activation key, but enterprise release may involve subscription information that is kept in vendor provided locations.
2. Key system files:
Recursively listing file information of the whole file system by using the 'ls-lR/' command, wherein the file information comprises authority, size and modification time; files may also be conditionally looked up by the 'find' command.
3. List of applications:
The installed package manifest is checked using a package manager command, such as 'dpkg- -list' (Debian/Ubuntu) or 'rpm-qa' (RedHat/CentOS).
License status and user information need to be obtained from the document or source code of the software package itself.
4. Data directory and important files:
The data directory path and rights are viewed through 'ls-ld/path/to/direction'.
For backup information of important files, log files of cron jobs or dedicated backup tools, such as rsync, bacula, etc., generated log records may be checked.
5. Configuration settings and documents:
profile name: the configuration file is searched according to the position of the service or the application, for example, the configuration file of the system service is stored in the/etc catalog.
Configuring content abstract and modification date: the file content is checked using 'cat/path/to/config_file', and the metadata of the file is checked by 'stat/path/to/config_file', including the last modification date.
Listing the files and application data of the operation system of the user service host and storing the files and application data on a user service table;
the data items recorded in the user service table structure comprise serial numbers/IDs, host names/IP addresses, operating system information, key system files, application program lists, data catalogues, important files, configuration settings and documents;
the operating system information includes specific information items including operating system type, operating system version, installation date, serial number/license key;
the key system file comprises specific information items including file name, file path, file size, last modification date and remark;
the application program list comprises specific information items including application program names, version numbers, installation paths, publishers/developers, license states and user-defined grades;
The data directory and the important file comprise specific information items including a data directory path, key data file names, data backup frequency and last backup date;
The configuration setting and document comprises specific information items including a configuration file name, a configuration content abstract and a modification date;
Reminding the user to divide different importance levels for different applications, and if the number of times of reminding the user exceeds a threshold value, the user still does not actively divide different importance levels for different applications, and then dividing different importance levels for different applications of the user automatically according to the use data of the user for the applications;
according to the application using data of the user, different importance levels are automatically divided for different applications of the user, specifically:
1. Using frequency analysis:
recording the number of times the user starts each application program every day, every week or every month; the higher the frequency, the greater the dependence and importance on the user representing the application; recording an application use frequency P1;
2. And (5) using time length statistics:
Calculating the time spent by the user on each application, the application used for a long time may reflect its core position in the user's work or life; recording the application use time length P2;
3. active time period analysis:
Analyzing what time period a user most commonly uses an application, if at critical working or learning time, the application may be of higher importance; recording the using time length P3 of the key time period of the application;
4. functional relevance assessment:
studying interactions and dependencies between different applications, it may be of higher importance if one application is often used as input or output for another application; recording the associated application number P4 of the applications;
Calculating the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of a certain application, and dividing different importance levels by the numerical ranges corresponding to the weighted summation numbers of the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of the application;
The user or the system actively executes to divide different importance levels for different applications, namely, corresponding importance levels are selected for corresponding application programs in user self-defined levels of an application program list in a user service table, wherein the importance levels comprise a necessary level, a1 st priority, a 2 nd priority, a 3 rd priority, a.the.i. and a n-th priority with sequentially reduced importance; applications of lower importance include, for example, optional game software, professional software for specific industries, occasional use of image editors, and other entertainment software for non-core functions, which are classified near the nth priority, applications of higher importance such as the necessary level, the 1 st priority, etc. for meeting basic work, learning, and network security requirements;
Detecting a difference in hardware parameters of the user service host and the standby host before performing automatic disaster recovery and data migration from the user service host to the standby host, and automatically performing installation of all system image files of the user service host to the standby host if there is no difference in hardware parameters of the user service host and the standby host or the difference in hardware parameters of the user service host and the standby host does not affect a process of installing all system image files of the user service host to the standby host;
If the hardware parameters of the user service host and the spare host are different, and the difference of the hardware parameters of the user service host and the spare host affects the process of installing all the system image files of the user service host to the spare host, modifying the files and application data of the operating system of the user service host; and generating a new full system image file of the user service host based on the modified file of the operating system of the user service host and the application data, and automatically executing the installation of the new full system image file of the user service host to the standby host; under the condition that the hardware is not compatible, the problem can be solved by simply copying the whole system image file to the standby host, but the system and the drive are purposefully adjusted according to the hardware characteristics of the target host, and the software application can be ensured to run smoothly in a new hardware environment;
In the process of modifying the file and application data of the operating system of the user service host, ensuring that the application programs with the user self-defined grade being the necessary grade are all reserved and the application programs with higher importance corresponding to the user self-defined grade are reserved as much as possible;
analyzing the hardware difference from the user service host to the standby host, listing the user service form, and determining the grade of the application software;
Checking the hardware compatibility of the file to be deleted or replaced and the standby host computer, and confirming that the new file is suitable for the target environment;
For the files and application data of the operating system which are not suitable for the target environment, firstly processing the files and application data of the operating system of the modified user service host corresponding to the low-priority application according to the predefined importance level rule; for the application program and related files with the importance of 'necessary level' corresponding to 'user custom level', the application program is kept unchanged or replaced only under the condition of having an explicit compatible alternative scheme;
For the application programs and related files with higher importance corresponding to the user custom grade, the application programs and related files are changed by the scheme with the maximum number or replaced under the condition of having an explicit compatible alternative scheme;
if modification of the registry key is involved, ensuring that registry keys associated with the removed or replaced file are properly cleaned or updated;
after the operation is finished, the integrity check of the system is operated, so that the system is still stable, and key services and applications can be started normally.
Modifying the file and application data of the operating system of the user service host includes deleting part of the file and application data of the operating system or replacing part of the file and application data of the operating system;
If the user self-defined grade is not ensured to be reserved in the whole application program of the necessary grade in the process of modifying the file and the application data of the operating system of the user service host, ending the process of installing the whole system image file of the user service host to the standby host;
According to the application, different importance levels are divided for different applications through the user; or actively dividing different importance levels for different applications, automatically dividing different importance levels for different applications of a user according to the use data of the user to the application, detecting the difference of hardware parameters of the user service host and the standby host before executing automatic disaster recovery and data migration from the user service host to the standby host, and modifying the file and application data of an operating system of the user service host if the difference of the hardware parameters of the user service host and the standby host exists and the difference of the hardware parameters of the user service host and the standby host affects the process of installing all system image files of the user service host to the standby host; and based on the file and application data of the operating system of the user service host after modification, generating the whole system image file of the new user service host, automatically executing the installation of the whole system image file of the new user service host to the standby host, and ensuring that the application programs with the ' user custom grade ' as the ' necessary grade ' are all reserved and the application programs with higher importance corresponding to the ' user custom grade ' are reserved as much as possible in the process of modifying the file and application data of the operating system of the user service host, namely, the user divides different importance grades for different application programs according to service requirements or use conditions, and can automatically analyze user behaviors and application use data to divide the importance grades through the system, before executing the automatic disaster recovery from the main service host to the standby host, the system can detect the hardware parameter difference between the two hosts, if the difference of the installation of the system image file on the standby host is found, the operating system of the main service host and the application data thereof are modified, ensuring that all the applications marked as the ' necessary grade ' are not deleted and the user custom grade ' are possibly reserved in the modification process, and the user custom grade is also capable of automatically analyzing the user behavior and the application data to the standby host, and automatically installing the new user service host is based on the new user custom data, and the new image file is automatically configured to be automatically restored to the system.
The application can be seen to be an automatic system migration scheme which is intelligently adapted to hardware changes and considers application importance, and ensures that key applications can be migrated to a standby host without damage during disaster recovery.
Embodiments of the application that require protection include:
The automatic disaster recovery and data migration method comprises the steps of obtaining files and application data of an operating system of a user service host;
Listing the files and application data of the operation system of the user service host and storing the files and application data on a user service table;
reminding a user to divide different importance levels for different applications; if the number of times of reminding the user exceeds the threshold value, the user still does not actively divide different importance levels for different applications, and then the different importance levels are automatically divided for the different applications of the user according to the use data of the user for the applications;
the user or the system actively executes the method to divide different importance levels for different applications;
Detecting a difference in hardware parameters of the user service host and the standby host before performing automatic disaster recovery and data migration from the user service host to the standby host, and automatically performing installation of all system image files of the user service host to the standby host if there is no difference in hardware parameters of the user service host and the standby host or the difference in hardware parameters of the user service host and the standby host does not affect a process of installing all system image files of the user service host to the standby host;
If the hardware parameters of the user service host and the spare host are different, and the difference of the hardware parameters of the user service host and the spare host affects the process of installing all the system image files of the user service host to the spare host, modifying the files and application data of the operating system of the user service host; and generating an entire system image file of the new user service host based on the modified file of the operating system of the user service host and the application data, and automatically executing the installation of the entire system image file of the new user service host to the standby host.
Preferably, the data items recorded in the user service table structure comprise serial numbers, IP addresses, operating system information, key system files, application program lists, data catalogues, important files, configuration settings and documents;
the operating system information includes specific information items including operating system type, operating system version, installation date, serial number/license key;
the key system file comprises specific information items including file name, file path, file size, last modification date and remark;
the application program list comprises specific information items including application program names, version numbers, installation paths, publishers/developers, license states and user-defined grades;
The data directory and the important file comprise specific information items including a data directory path, key data file names, data backup frequency and last backup date;
the configuration settings and documents include specific information items including a configuration file name, a configuration content abstract, and a modification date.
Preferably, the different importance levels are automatically classified for different applications of the user according to the use data of the application by the user, specifically:
Calculating the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of a certain application, and dividing different importance levels by the numerical ranges corresponding to the weighted summation numbers of the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of the application.
Preferably, different importance levels are assigned to different applications, namely, corresponding importance levels are selected for corresponding application programs in a user-defined level of an application program list in a user service table, wherein the importance levels comprise a necessary level, a1 st priority, a2 nd priority, a 3 rd priority, a.the.i., the.n. priority, and the.i. the importance levels are sequentially reduced.
Preferably, in the process of modifying the file and the application data of the operating system of the user service host, the application programs with the user custom grade being the necessary grade are ensured to be reserved entirely, and the application programs with higher importance corresponding to the user custom grade are reserved as much as possible.
Preferably, the process of installing all system image files of the user service host to the standby host is ended if all application programs with the user custom grade of 'necessary grade' cannot be ensured to be reserved in the process of modifying the files and application data of the operating system of the user service host.
Preferably, modifying the file and application data of the operating system of the user service host includes deleting part of the file and application data of the operating system or replacing part of the file and application data of the operating system.
Preferably, in modifying the files and application data of the operating system of the user service host, it is ensured that the applications with "user custom level" being "necessary level" are all reserved, and as many more important applications corresponding to "user custom level" are reserved as possible, specifically:
analyzing the hardware difference from the user service host to the standby host, listing the user service form, and determining the grade of the application software;
Checking the hardware compatibility of the file to be deleted or replaced and the standby host computer, and confirming that the new file is suitable for the target environment;
For the files and application data of the operating system which are not suitable for the target environment, firstly processing the files and application data of the operating system of the modified user service host corresponding to the low-priority application according to the predefined importance level rule; for the application program and related files with the importance of 'necessary level' corresponding to 'user custom level', the application program is kept unchanged or replaced only under the condition of having an explicit compatible alternative scheme;
For the application programs and related files with higher importance corresponding to the user custom grade, the application programs and related files are changed by the scheme with the maximum number or replaced under the condition of having an explicit compatible alternative scheme;
if modification of the registry key is involved, ensuring that registry keys associated with the removed or replaced file are properly cleaned or updated;
after the operation is finished, the integrity check of the system is operated, so that the system is still stable, and key services and applications can be started normally.
The embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method provided by the above embodiments.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, where the above program may be stored in a computer readable storage medium, and when the program is executed, the program performs steps including the above method embodiments; and the aforementioned storage medium may be at least one of the following media: read-only Memory (ROM), RAM, magnetic disk or optical disk, etc.
The present application also discloses an automated disaster recovery and data migration system comprising a computer program product of instructions that, when run on a computer, cause the computer to perform the automated disaster recovery and data migration method described above.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment is mainly described in a different point from other embodiments. The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the present application.

Claims (7)

1. The method for automatically recovering disaster and transferring data is characterized by comprising the steps of obtaining files and application data of an operating system of a user service host;
Listing the files and application data of the operation system of the user service host and storing the files and application data on a user service table;
reminding a user to divide different importance levels for different applications; if the number of times of reminding the user exceeds the threshold value, the user still does not actively divide different importance levels for different applications, and then the different importance levels are automatically divided for the different applications of the user according to the use data of the user for the applications;
the user or the system actively executes the method to divide different importance levels for different applications;
Detecting a difference in hardware parameters of the user service host and the standby host before performing automatic disaster recovery and data migration from the user service host to the standby host, and automatically performing installation of all system image files of the user service host to the standby host if there is no difference in hardware parameters of the user service host and the standby host or the difference in hardware parameters of the user service host and the standby host does not affect a process of installing all system image files of the user service host to the standby host;
If the hardware parameters of the user service host and the spare host are different, and the difference of the hardware parameters of the user service host and the spare host affects the process of installing all the system image files of the user service host to the spare host, modifying the files and application data of the operating system of the user service host; and generating a new full system image file of the user service host based on the modified file of the operating system of the user service host and the application data, and automatically executing the installation of the new full system image file of the user service host to the standby host; the data items recorded in the user service table structure comprise sequence numbers, IP addresses, operating system information, key system files, application program lists, data catalogues, important files, configuration settings and documents;
the operating system information includes specific information items including operating system type, operating system version, installation date, serial number/license key;
the key system file comprises specific information items including file name, file path, file size, last modification date and remark;
the application program list comprises specific information items including application program names, version numbers, installation paths, publishers/developers, license states and user-defined grades;
The data directory and the important file comprise specific information items including a data directory path, key data file names, data backup frequency and last backup date;
The configuration setting and document comprises specific information items including a configuration file name, a configuration content abstract and a modification date;
according to the application using data of the user, different importance levels are automatically divided for different applications of the user, specifically:
Calculating the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of a certain application, and dividing different importance levels by the numerical ranges corresponding to the weighted summation numbers of the use frequency P1, the use time length P2, the use time length P3 of the key time period and the associated application quantity P4 of the application.
2. The method according to claim 1, wherein different importance levels are assigned to different applications, namely, corresponding importance levels are selected for corresponding applications in "user custom levels" of "application list" in "user service table", and the importance levels include a necessity level, a1 st priority, a2 nd priority, a3 rd priority, a.the.a., an n-th priority, which have sequentially decreasing importance.
3. The method according to claim 2, wherein the applications with "user custom classes" being "necessary classes" are ensured to be fully reserved and the applications with high importance corresponding to "user custom classes" are ensured to be fully reserved during the process of modifying the files and application data of the operating system of the user service host.
4. A method for automated disaster recovery and data migration according to claim 3 wherein the process of installing all system image files of the user service host to the standby host is terminated if complete reservation of the "user custom level" application cannot be ensured during modification of files and application data of the operating system of the user service host.
5. The method of claim 4, wherein modifying the files and application data of the operating system of the user service host includes deleting or replacing a portion of the files and application data of the operating system.
6. The method for automatic disaster recovery and data migration according to claim 5, wherein in modifying files and application data of an operating system of a user service host, it is ensured that all applications with "user custom level" being "necessary level" are reserved and that applications with high importance corresponding to "user custom level" are reserved:
analyzing the hardware difference from the user service host to the standby host, listing the user service form, and determining the grade of the application software;
Checking the hardware compatibility of the file to be deleted or replaced and the standby host computer, and confirming that the new file is suitable for the target environment;
For the files and application data of the operating system which are not suitable for the target environment, firstly processing the files and application data of the operating system of the modified user service host corresponding to the low-priority application according to the predefined importance level rule; for the application program and related files with the importance of 'necessary level' corresponding to 'user custom level', the application program is kept unchanged or replaced only under the condition of having an explicit compatible alternative scheme;
For the application programs and related files with high importance corresponding to the user custom grade, the application programs are changed by the scheme with the maximum number or replaced under the condition of having an explicit compatible alternative scheme;
if modification of the registry key is involved, ensuring that registry keys associated with the removed or replaced file are properly cleaned or updated;
after the operation is finished, the integrity check of the system is operated, so that the system is still stable, and key services and applications can be started normally.
7. An automated disaster recovery and data migration system, comprising a computer program product of instructions that, when run on a computer, cause the computer to perform a method of automated disaster recovery and data migration as claimed in claim 1.
CN202410441578.4A 2024-04-12 2024-04-12 Method and system for automatic disaster recovery and data migration Active CN118170588B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410441578.4A CN118170588B (en) 2024-04-12 2024-04-12 Method and system for automatic disaster recovery and data migration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410441578.4A CN118170588B (en) 2024-04-12 2024-04-12 Method and system for automatic disaster recovery and data migration

Publications (2)

Publication Number Publication Date
CN118170588A CN118170588A (en) 2024-06-11
CN118170588B true CN118170588B (en) 2024-08-09

Family

ID=91348436

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410441578.4A Active CN118170588B (en) 2024-04-12 2024-04-12 Method and system for automatic disaster recovery and data migration

Country Status (1)

Country Link
CN (1) CN118170588B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104487960A (en) * 2012-06-04 2015-04-01 美国飞康软件公司 Automated disaster recovery and data migration

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8417796B2 (en) * 2006-01-17 2013-04-09 Leostream Corporation System and method for transferring a computing environment between computers of dissimilar configurations
US8112657B2 (en) * 2010-06-14 2012-02-07 At&T Intellectual Property I, L.P. Method, computer, and computer program product for hardware mapping

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104487960A (en) * 2012-06-04 2015-04-01 美国飞康软件公司 Automated disaster recovery and data migration

Also Published As

Publication number Publication date
CN118170588A (en) 2024-06-11

Similar Documents

Publication Publication Date Title
US8806476B2 (en) Implementing a software installation process
US8719809B2 (en) Point in time rollback and un-installation of software
US8423963B2 (en) Computer implemented API management mechanism for generating upgrade risk level handling
CN102216905B (en) Method and system for creating application restore point for application operated in computer system
US7334157B1 (en) Restore of data to a computer system having different hardware
US7430686B1 (en) Data processing recovery system and method spanning multiple operating system
US7509544B2 (en) Data repair and synchronization method of dual flash read only memory
US8151260B2 (en) Method for providing an image of software installed on a computer system
JP5757509B2 (en) System reset
US20020194535A1 (en) Backup of a computer
US20040107199A1 (en) Computer application backup method and system
JP6238983B2 (en) Browsing open file history
EP1490771A1 (en) Using disassociated images for computer and storage resource management
US20060271924A1 (en) Method and apparatus for automating updates to dependencies
US9256509B1 (en) Computing environment analyzer
US9146722B2 (en) Reinstalling a computer based on frequency of application utilization
US20070294332A1 (en) Processing device for end customer operation
US20090070626A1 (en) Methods and systems for operating system bare-metal recovery
US20080155319A1 (en) Methods and systems for managing removable media
CN118170588B (en) Method and system for automatic disaster recovery and data migration
CN116149707B (en) Method and device for detecting and avoiding upgrading risk of distributed system
US20060200589A1 (en) Automated driver reset for an information handling system
US8316444B2 (en) Third-party software product certification
JP4838226B2 (en) Network logging processing program, information processing system, and network logging information automatic saving method
CN114090052B (en) A method, device, terminal and storage medium for repairing Linux system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant