WO2023165226A1 - Procédé et appareil de sauvegarde de ressources d'application, dispositif électronique et support de stockage - Google Patents

Procédé et appareil de sauvegarde de ressources d'application, dispositif électronique et support de stockage Download PDF

Info

Publication number
WO2023165226A1
WO2023165226A1 PCT/CN2022/140467 CN2022140467W WO2023165226A1 WO 2023165226 A1 WO2023165226 A1 WO 2023165226A1 CN 2022140467 W CN2022140467 W CN 2022140467W WO 2023165226 A1 WO2023165226 A1 WO 2023165226A1
Authority
WO
WIPO (PCT)
Prior art keywords
resource
target
application
backup
data
Prior art date
Application number
PCT/CN2022/140467
Other languages
English (en)
Chinese (zh)
Inventor
李龙峰
刘茂扬
Original Assignee
苏州浪潮智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 苏州浪潮智能科技有限公司 filed Critical 苏州浪潮智能科技有限公司
Publication of WO2023165226A1 publication Critical patent/WO2023165226A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution

Definitions

  • the present application relates to the field of computer technology, in particular to a method, device, electronic device and storage medium for backing up application resources.
  • the present application provides a backup method, device, electronic equipment and storage medium for application resources.
  • a method for backing up application resources including:
  • the resource backup request includes a first resource identifier corresponding to the first application resource to be backed up;
  • the first resource data is backed up to the object storage pool according to the target storage information, so as to complete the backup of the first application resource.
  • the method also includes:
  • the corresponding relationship between the resource identifier and the authentication information is established, and the corresponding relationship is stored in the database.
  • create target storage information corresponding to the first application resource in the object storage pool including:
  • a storage location and a storage path corresponding to the first application resource are created based on the encrypted configuration information, and the storage location and the storage path are used as target storage information.
  • the method before invoking the target interface according to the target authentication information to generate encryption configuration information corresponding to the first application resource, the method further includes:
  • the target authentication information matches the preset authentication information, determine that the target authentication information has been verified
  • the target interface is invoked according to the target authentication information to generate encryption configuration information corresponding to the first application resource.
  • backing up the first resource data to the object storage pool according to the target storage information includes:
  • the updated target interface is called to create the first backup data corresponding to the first application resource in the object storage pool, so as to complete the backup of the first application resource.
  • the method further includes:
  • the resource restoration request includes a second resource identifier corresponding to a second application resource to be restored;
  • a second application resource is generated in the target cluster based on the second backup data.
  • generating a second application resource in the target cluster based on the second backup data includes:
  • a second application resource is created on the target node according to the image file and the second backup data.
  • a device for backing up application resources including:
  • a receiving module configured to receive a resource backup request, wherein the resource backup request includes a first resource identifier corresponding to the first application resource to be backed up;
  • the response module is configured to, in response to the resource backup request, create target storage information corresponding to the first application resource in the object storage pool, and the object storage pool is used to store the backup data of the application resource;
  • a query module configured to use the first resource identifier to query the first resource data corresponding to the first application resource from the database
  • the backup module is configured to back up the first resource data to the object storage pool according to the target storage information, so as to complete the backup of the first application resource.
  • a storage medium is further provided, the storage medium includes a stored program, and the above steps are executed when the program runs.
  • an electronic device including a processor, a communication interface, a memory, and a communication bus, wherein, the processor, the communication interface, and the memory complete communication with each other through the communication bus; wherein:
  • the memory is used to store computer programs; the processor is used to execute the steps in the above method by running the programs stored in the memory.
  • the embodiment of the present application also provides a computer program product containing instructions, which, when run on a computer, causes the computer to execute the steps in the above method.
  • the above-mentioned technical solution provided by the embodiment of the present application has the following advantages: the method provided by the embodiment of the present application automatically creates the storage information of the application resources to be backed up in the object storage pool according to the resource backup request, and the storage information of the application resources to be backed up will be created according to the storage information.
  • the resource data of the backup application resource is backed up to the object storage pool, so as to realize the backup of the resource data in the object storage pool. This avoids the situation that the resource data of the application resource has not been backed up when it is lost, and improves the guarantee of the application resource.
  • FIG. 1 is a flow chart of a method for backing up application resources provided by an embodiment of the present application
  • FIG. 2 is a flow chart of a method for backing up application resources provided by another embodiment of the present application.
  • FIG. 3 is a schematic diagram of a service system provided by an embodiment of the present application.
  • FIG. 4 is a block diagram of an application resource backup device provided in an embodiment of the present application.
  • FIG. 5 is a schematic structural diagram of an electronic device provided by an embodiment of the present application.
  • Embodiments of the present application provide a backup method, device, electronic equipment, and storage medium for application resources.
  • the method provided by the embodiment of the present invention can be applied to any required electronic device, for example, it can be an electronic device such as a server or a terminal, which is not specifically limited here, and is referred to as an electronic device for convenience of description.
  • Fig. 1 is a flowchart of a method for backing up application resources provided by an embodiment of the present application. As shown in Fig. 1, the method includes:
  • Step S11 receiving a resource backup request, wherein the resource backup request includes a first resource identifier corresponding to the first application resource to be backed up.
  • the method provided by the embodiment of this application is applied to the target cluster.
  • the resource backup request can be initiated by the user to the target cluster through the client.
  • the selected operation acting on the client can be detected, and the selected first operation can be determined based on the selected operation.
  • An application resource and determine a first resource identifier corresponding to the first application resource, then generate a resource backup request according to the first resource identifier, and send the resource backup request to the target cluster.
  • the resource backup request can also be automatically initiated periodically.
  • the application resources in the target cluster can be detected periodically, and then the first resource identifier set corresponding to the deployed application resources in the target cluster can be determined. And acquire the second set of resource identifiers of the executed backup application resources from the object storage pool.
  • the first set of resource identifiers With the second set of resource identifiers, it is possible to determine from the first set of resource identifiers the first application resource in the target cluster that has not yet been backed up, and at this time obtain the first resource corresponding to the first application resource ID, and generate a resource backup request based on the first resource ID.
  • Step S12 in response to the resource backup request, create target storage information corresponding to the first application resource in the object storage pool, and the object storage pool is used to store backup data of the application resource.
  • the method further includes the following steps A1-A2:
  • Step A1 determine the resource identifier corresponding to the currently deployed application resource in the target cluster, and obtain the authentication information corresponding to the application resource.
  • Step A2 establish the corresponding relationship between the resource identifier and the authentication information, and store the corresponding relationship in the database.
  • this embodiment of the application will pre-collect the resource identifiers corresponding to the currently deployed application resources in the target cluster, and then query the corresponding authentication information for the resource identifiers, where the authentication information can be pre-uploaded by the developer.
  • the authentication information includes the access key corresponding to the application resource. Then establish the corresponding relationship between the resource identifier and the authentication information, and store the corresponding relationship in the database.
  • step S12 creating the target storage information corresponding to the first application resource in the object storage pool, includes the following steps B1-B3:
  • Step B1 obtaining the corresponding relationship between the resource identifier and the authentication information from the database, and obtaining the target authentication information corresponding to the first application resource based on the corresponding relationship.
  • the method before invoking the target interface according to the target authentication information to generate the encryption configuration information corresponding to the first application resource, the method further includes: verifying the target authentication information, If the information matches, it is determined that the target authentication information has passed the verification, and if the target authentication information has passed the verification, the target interface is invoked according to the target authentication information to generate encrypted configuration information corresponding to the first application resource.
  • Step B2 calling the target interface according to the target authentication information to generate encryption configuration information corresponding to the first application resource.
  • Step B3 Create a storage location and a storage path corresponding to the first application resource based on the encryption configuration information, and use the storage location and the storage path as target storage information.
  • the object storage authentication information call the target interface (that is, Kubernetes API) to create encrypted configuration information, and the encrypted configuration information carries object storage information, which is used to identify the final storage location and the uniqueness of the storage path .
  • object storage information For example: Use the information ID in the object storage information to identify the uniqueness.
  • encrypted configuration information is used to create unique storage paths and storage locations for application resources.
  • Step S13 using the first resource identifier to query the first resource data corresponding to the first application resource from the database.
  • the database also stores resource data corresponding to each application resource, so the first resource data corresponding to the first application resource can be queried from the database by using the first resource identifier, wherein the first resource data includes: Stateful load, stateless load, common configuration, encrypted configuration, service data, etc.
  • Step S14 back up the first resource data to the object storage pool according to the target storage information, so as to complete the backup of the first application resource.
  • step S14 backing up the first resource data to the object storage pool according to the target storage information, includes the following steps C1-C2:
  • Step C1 Generate an interface annotation of the target interface based on the first resource data, and add the interface annotation and target storage information to the target interface to obtain an updated target interface.
  • the first resource data is generated into an object structure according to a preset format, and then the object structure is added to the target interface in the form of interface annotation, and the target storage information is also added to the Target interface, get the updated target interface.
  • the object structure is added to the target interface in the manner of interface annotation, so that the target interface can directly create backup resources when called.
  • the object structure generated by generating the first resource data according to a preset format is as follows:
  • Step C2 calling the updated target interface to create first backup data corresponding to the first application resource in the object storage pool, so as to complete the backup of the first application resource.
  • the updated target interface is called to create the first backup data corresponding to the first application resource in the object storage pool according to the storage path and storage location, so as to complete the backup of the first application resource.
  • the method provided in the embodiment of this application automatically creates the storage information of the application resources to be backed up in the object storage pool according to the resource backup request, and backs up the resource data of the application resources to be backed up to the object storage pool according to the storage information, thereby realizing resource data storage in the object storage pool. Backups in the pool. This avoids the situation that the resource data of the application resource has not been backed up when it is lost, and improves the guarantee of the application resource.
  • the method further includes the following steps:
  • Step S21 receiving a resource restoration request, wherein the resource restoration request includes a second resource identifier corresponding to the second application resource to be restored.
  • the resource restoration request can be initiated by the user to the target cluster through the client. Specifically, the user can detect whether resource loss occurs in the target cluster through the client. The resource identifier of each application resource, the client will periodically query the survival status of the application resource in the target cluster according to the resource identifier. If the client does not query the survival state of the application resource corresponding to a resource identifier within the current detection cycle, it determines that the application resource corresponding to the resource identifier has been lost in the target cluster.
  • the client when there is resource loss in the target cluster, the client will determine the second application resource lost in the target cluster, and determine the second resource identifier corresponding to the lost second application resource.
  • the second resource identifier acquires the backup data of the second application resource from the object storage pool.
  • Step S22 acquiring second backup data matching the second resource identifier from the object storage pool.
  • the second backup data matching the second resource ID can be obtained from the object storage pool according to the second resource ID.
  • resource identifier a backup data A
  • resource identifier b backup data B
  • resource identifier c backup data C. Therefore, after determining the resource ID of the lost application resource, the backup data corresponding to the resource ID can be obtained from the object storage pool according to the resource ID, and the lost application resource can be restored in the target cluster based on the backup data.
  • Step S23 generating a second application resource in the target cluster based on the second backup data.
  • step S23 generating the second application resource in the target cluster based on the second backup data, includes the following steps D1-D3:
  • Step D1 query the target node corresponding to the second backup data from the target cluster.
  • Step D2 obtain the image file satisfying the corresponding framework of the target node from the image repository.
  • the target node after determining the target node to perform the restoration operation, it is necessary to query the framework corresponding to the target node, and then obtain the mirror file matching the framework from the mirror warehouse, which stores each node in the target cluster framework, and the image file corresponding to the framework.
  • Step D3 creating a second application resource on the target node according to the image file and the second backup data.
  • the target node in the target cluster creates the second application resource, thereby completing the restoration operation of the lost application resource.
  • the image file is similar to the rar ZIP archive, which makes a specific series of files into a single file in a certain format, so that users can download and use it conveniently.
  • the backup resources are pulled from the object storage pool and restored in the target cluster. In this way, the characteristics of high guarantee of application resources in the deployment of Kubernetes computing clusters based on multi-architecture domestic servers are improved.
  • the service system includes: a storage device and a backup device.
  • the storage device includes: a database and an object storage pool.
  • the backup device After the backup device receives the resource backup request, the backup device is configured to acquire the resource data of the application resources to be backed up from the database in the storage device, and create storage information in the object storage pool in the storage device. Then perform a backup operation according to the storage information, that is, back up the resource data of the application resource to be backed up to the object storage pool.
  • the target cluster also includes: a restoration device and a mirror warehouse, which are used to receive resource restoration requests, obtain the backup data corresponding to the application resources to be restored from the object storage pool according to the resource restoration requests, and obtain the backup data from the mirror warehouse Obtain an image file that satisfies the target node corresponding to the application resource to be restored, and then restore the application resource based on the image file and backup data.
  • a restoration device and a mirror warehouse which are used to receive resource restoration requests, obtain the backup data corresponding to the application resources to be restored from the object storage pool according to the resource restoration requests, and obtain the backup data from the mirror warehouse Obtain an image file that satisfies the target node corresponding to the application resource to be restored, and then restore the application resource based on the image file and backup data.
  • Fig. 4 is a block diagram of an application resource backup device provided by an embodiment of the present application, and the device can be implemented as part or all of an electronic device through software, hardware or a combination of the two. As shown in Figure 4, the device includes:
  • the receiving module 41 is configured to receive a resource backup request, wherein the resource backup request includes a first resource identifier corresponding to the first application resource to be backed up.
  • the response module 42 is configured to, in response to the resource backup request, create target storage information corresponding to the first application resource in the object storage pool, and the object storage pool is used to store backup data of the application resource.
  • the query module 43 is configured to query the first resource data corresponding to the first application resource from the database by using the first resource identifier.
  • the backup module 44 is configured to back up the first resource data to the object storage pool according to the target storage information, so as to complete the backup of the first application resource.
  • the device for backing up application resources further includes: a storage module, configured to determine the resource identifier corresponding to the currently deployed application resource in the target cluster, and obtain the authentication information corresponding to the application resource; establish the resource identifier and authentication information The corresponding relationship between them, and store the corresponding relationship in the database.
  • a storage module configured to determine the resource identifier corresponding to the currently deployed application resource in the target cluster, and obtain the authentication information corresponding to the application resource; establish the resource identifier and authentication information The corresponding relationship between them, and store the corresponding relationship in the database.
  • the response module 42 is configured to obtain the correspondence between the resource identifier and the authentication information from the database, and obtain the target authentication information corresponding to the first application resource based on the correspondence;
  • the target interface generates encrypted configuration information corresponding to the first application resource; creates a storage location and a storage path corresponding to the first application resource based on the encrypted configuration information, and uses the storage location and the storage path as target storage information.
  • the device for backing up application resources further includes: a storage module, configured to verify the target authentication information; and determine the target authentication information when the target authentication information matches the preset authentication information The verification is passed; if the verification of the target authentication information is passed, the target interface is invoked according to the target authentication information to generate encrypted configuration information corresponding to the first application resource.
  • the backup module 44 is configured to generate the interface annotation of the target interface based on the first resource data, and add the interface annotation and target storage information to the target interface to obtain an updated target interface; call the updated target interface The interface creates the first backup data corresponding to the first application resource in the object storage pool, so as to complete the backup of the first application resource.
  • the device for backing up application resources further includes: a restoration module, configured to receive a resource restoration request, wherein the resource restoration request includes a second resource identifier corresponding to the second application resource to be restored;
  • the second backup data matching the second resource identifier is obtained from the storage pool; and the second application resource is generated in the target cluster based on the second backup data.
  • the restoration module is used to query the target node corresponding to the second backup data from the target cluster; obtain the image file satisfying the corresponding framework of the target node from the mirror warehouse; The target node creates a second application resource.
  • the embodiment of this application also provides an electronic device. As shown in FIG.
  • the communication bus 1504 completes mutual communication.
  • Memory 1503 for storing computer programs
  • the processor 1501 is configured to implement the steps of the above-mentioned embodiments when executing the computer program stored in the memory 1503 .
  • the communication bus mentioned in the above-mentioned terminal may be a Peripheral Component Interconnect (PCI for short) bus or an Extended Industry Standard Architecture (EISA for short) bus or the like.
  • PCI Peripheral Component Interconnect
  • EISA Extended Industry Standard Architecture
  • the communication bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of representation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.
  • the communication interface is used for communication between the terminal and other devices.
  • the memory may include a random access memory (Random Access Memory, RAM for short), and may also include a non-volatile memory (non-volatile memory), such as at least one disk memory.
  • non-volatile memory such as at least one disk memory.
  • the memory may also be at least one storage device located far away from the aforementioned processor.
  • the above-mentioned processor can be a general-purpose processor, including a central processing unit (Central Processing Unit, referred to as CPU), a network processor (Network Processor, referred to as NP), etc.; it can also be a digital signal processor (Digital Signal Processing, referred to as DSP) , Application Specific Integrated Circuit (ASIC for short), Field Programmable Gate Array (Field-Programmable Gate Array, FPGA for short) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.
  • CPU Central Processing Unit
  • NP Network Processor
  • DSP Digital Signal Processing
  • ASIC Application Specific Integrated Circuit
  • FPGA Field-Programmable Gate Array
  • a computer-readable storage medium is also provided, and instructions are stored in the computer-readable storage medium, and when it is run on a computer, the computer is made to execute any one of the above-mentioned embodiments.
  • the method for backing up the application resources is also provided.
  • a computer program product including instructions is also provided, which, when run on a computer, causes the computer to execute the application resource backup method described in any one of the above embodiments.
  • a computer program product includes one or more computer instructions.
  • Computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, e.g. Coaxial cable, optical fiber, digital subscriber line) or wireless (such as infrared, wireless, microwave, etc.) to another website site, computer, server or data center.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server, a data center, etc. integrated with one or more available media.
  • Available media may be magnetic media (eg, floppy disk, hard disk, magnetic tape), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk).

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

La présente demande divulgue un procédé et un appareil de sauvegarde de ressources d'application, un dispositif électronique et un support de stockage. Le procédé consiste : à recevoir une demande de sauvegarde de ressources, la demande de sauvegarde de ressources comprenant un premier identifiant de ressources correspondant à une première ressource d'application à soumettre à une opération de sauvegarde ; en réponse à la demande de sauvegarde de ressources, à créer des informations de stockage cible correspondant à la première ressource d'application dans un groupe de stockage d'objet ; à interroger des premières données de ressources correspondant à la première ressource d'application à partir d'une base de données en utilisant le premier identifiant de ressources ; et à sauvegarder les premières données de ressources dans le groupe de stockage d'objet en fonction des informations de stockage cible pour achever la sauvegarde de la première ressource d'application. Selon la présente demande, des informations de stockage de ressources d'application à sauvegarder dans le groupe de stockage d'objets sont automatiquement créées selon la demande de sauvegarde de ressources et des données de ressources desdites ressources d'application sont sauvegardées dans le groupe de stockage d'objet selon les informations de stockage, ce qui permet d'obtenir une sauvegarde des données de ressources. La situation dans laquelle les données de ressources des ressources d'application n'ont pas été sauvegardées lorsqu'elles sont perdues est évitée, ce qui permet d'améliorer la sécurité des ressources d'application.
PCT/CN2022/140467 2022-03-02 2022-12-20 Procédé et appareil de sauvegarde de ressources d'application, dispositif électronique et support de stockage WO2023165226A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210195612.5 2022-03-02
CN202210195612.5A CN114328029B (zh) 2022-03-02 2022-03-02 一种应用资源的备份方法、装置、电子设备及存储介质

Publications (1)

Publication Number Publication Date
WO2023165226A1 true WO2023165226A1 (fr) 2023-09-07

Family

ID=81030265

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/140467 WO2023165226A1 (fr) 2022-03-02 2022-12-20 Procédé et appareil de sauvegarde de ressources d'application, dispositif électronique et support de stockage

Country Status (2)

Country Link
CN (1) CN114328029B (fr)
WO (1) WO2023165226A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114328029B (zh) * 2022-03-02 2022-06-03 苏州浪潮智能科技有限公司 一种应用资源的备份方法、装置、电子设备及存储介质
CN117312044A (zh) * 2022-06-28 2023-12-29 华为技术有限公司 一种备份方法及装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541694A (zh) * 2012-01-18 2012-07-04 浪潮(北京)电子信息产业有限公司 一种数据库备份的方法及装置
CN112181720A (zh) * 2020-09-11 2021-01-05 济南浪潮数据技术有限公司 一种基于云管理平台的虚拟数据中心备份方法及装置
CN113687911A (zh) * 2021-07-30 2021-11-23 广东浪潮智慧计算技术有限公司 一种元数据管理方法、***、电子设备及存储介质
CN113722157A (zh) * 2021-11-03 2021-11-30 苏州浪潮智能科技有限公司 一种虚拟机数据管理方法、装置、设备及介质
CN113722155A (zh) * 2021-11-01 2021-11-30 苏州浪潮智能科技有限公司 一种分布式文件***内数据备份及修复方法及相关组件
CN114090344A (zh) * 2022-01-19 2022-02-25 苏州浪潮智能科技有限公司 用于容器集群的删除备份资源的方法、装置、设备及介质
CN114328029A (zh) * 2022-03-02 2022-04-12 苏州浪潮智能科技有限公司 一种应用资源的备份方法、装置、电子设备及存储介质

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8819471B2 (en) * 2011-06-03 2014-08-26 Apple Inc. Methods and apparatus for power state based backup
CN108279996A (zh) * 2018-01-17 2018-07-13 链家网(北京)科技有限公司 一种云端数据备份处理方法及装置
CN109284205B (zh) * 2018-09-21 2023-04-07 平安科技(深圳)有限公司 快照备份方法、装置、计算机设备及存储介质
CN111597078A (zh) * 2020-05-15 2020-08-28 山东汇贸电子口岸有限公司 一种复制ceph块存储数据至对象存储的定时备份方法及***
CN112380067B (zh) * 2020-11-30 2023-08-22 四川大学华西医院 一种Hadoop环境下基于元数据的大数据备份***及方法

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102541694A (zh) * 2012-01-18 2012-07-04 浪潮(北京)电子信息产业有限公司 一种数据库备份的方法及装置
CN112181720A (zh) * 2020-09-11 2021-01-05 济南浪潮数据技术有限公司 一种基于云管理平台的虚拟数据中心备份方法及装置
CN113687911A (zh) * 2021-07-30 2021-11-23 广东浪潮智慧计算技术有限公司 一种元数据管理方法、***、电子设备及存储介质
CN113722155A (zh) * 2021-11-01 2021-11-30 苏州浪潮智能科技有限公司 一种分布式文件***内数据备份及修复方法及相关组件
CN113722157A (zh) * 2021-11-03 2021-11-30 苏州浪潮智能科技有限公司 一种虚拟机数据管理方法、装置、设备及介质
CN114090344A (zh) * 2022-01-19 2022-02-25 苏州浪潮智能科技有限公司 用于容器集群的删除备份资源的方法、装置、设备及介质
CN114328029A (zh) * 2022-03-02 2022-04-12 苏州浪潮智能科技有限公司 一种应用资源的备份方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
CN114328029B (zh) 2022-06-03
CN114328029A (zh) 2022-04-12

Similar Documents

Publication Publication Date Title
WO2023165226A1 (fr) Procédé et appareil de sauvegarde de ressources d'application, dispositif électronique et support de stockage
US20210234669A1 (en) Using cache objects to store events for adding corresponding objects in a blockchain
US9910895B2 (en) Push subscriptions
US11953997B2 (en) Systems and methods for cross-regional back up of distributed databases on a cloud service
US10762109B2 (en) Asynchronous deletion in non-relational databases
WO2018233630A1 (fr) Découverte de défaillance
US8660996B2 (en) Monitoring files in cloud-based networks
US11442752B2 (en) Central storage management interface supporting native user interface versions
US20220083426A1 (en) Method and system for hybrid incremental file-based backups
US20230122861A1 (en) Unified metadata search
US20210097476A1 (en) Container Management Method, Apparatus, and Device
US9930063B2 (en) Random identifier generation for offline database
US20180121486A1 (en) System and Method for Configuration Management Database Governance
US10902018B2 (en) Synchronizing in-use source data and an unmodified migrated copy thereof
US10104163B1 (en) Secure transfer of virtualized resources between entities
US20070118597A1 (en) Processing proposed changes to data
US9665732B2 (en) Secure Download from internet marketplace
US11195179B2 (en) Detecting cashback and other related reimbursement frauds using blockchain technology
WO2023092316A1 (fr) Procédé et appareil d'ouverture de session à un service tiers, dispositif terminal, et support de stockage
CN107085681B (zh) 鲁棒的计算设备标识框架
WO2018121164A1 (fr) Procédé, dispositif et système de création de numéros de service
US20200401561A1 (en) Method, device, and computer program product for managing data object
CN107704557B (zh) 操作互斥数据的处理方法、装置、计算机设备和存储介质
US10635838B1 (en) Cloud based dead drop for isolated recovery systems
CN115987683B (zh) 区块链网络中节点访问控制方法、装置、设备和介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22929652

Country of ref document: EP

Kind code of ref document: A1