Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data backup method and device

A data backup and data technology, which is applied in the direction of electrical digital data processing, special data processing applications, and redundant data error detection in calculations. , the large amount of backup data, etc., to achieve the effect of reducing the amount of backup data and supporting PIT recovery

Active Publication Date: 2017-02-15
NETEASE (HANGZHOU) NETWORK CO LTD
View PDF7 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When performing a full backup on the slave database based on the GTID mode, the backup tool will give the GTID set contained in the current full backup, but it will not give the location of the current full backup corresponding to the Binary log in the master database
[0010] In the existing GTID-based database, since the backup tool does not provide the corresponding relationship between the full backup and the Binary log in the main database, it is also impossible to quickly find the GTID in the Binary log of the main database through the set of GTIDs given. The location corresponding to the collection
Therefore, in the database based on the GTID mode in the prior art, it is necessary to copy all the data in the database for backup every time it is backed up, the amount of data to be backed up is large, the storage space occupied is large, and PIT recovery is not supported

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data backup method and device
  • Data backup method and device
  • Data backup method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach 1

[0075] Embodiment 1. After obtaining the pre-configured target time to which the data of the database to be restored is restored, when sending the data copied from the slave database during the backup and the binary log files obtained from the master database during the backup to the database to be restored, according to The time stamp in the binary log file is used to send all binary log files whose time stamp identifies the time before the target time to the database to be restored, and control the database to be restored to use the received binary log file to process the received data Make changes.

[0076] Specifically, the time tag in each binary log file records the time of the first change operation record and the time of the last change operation record in the binary log file, and each change operation record in the binary log file has a corresponding Therefore, after obtaining the pre-configured target time to which the data of the database to be restored is restored,...

Embodiment approach 2

[0078] Embodiment 2: After acquiring the pre-configured target moment to which the data of the database to be restored is restored, the data copied from the database during the backup and the binary log files obtained from the master database during the backup are sent to the database to be restored, and then the control When the recovery database uses the received binary log file to change the received data, control the database to be recovered to use the received binary log file to change the received data, and restore the data in the to-be-restored database to the target time to the same data as the primary database at the target time.

[0079] Specifically, control the database to be restored to use the received binary log file to change the received data, restore the data in the database to be restored to the target time to be the same as the data in the primary database at the target time, including: according to the binary log The time tag in the file controls the datab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a data backup method and device. The method comprises the steps of acquiring a final copy position of copied data in a binary system log file of a main database from a database during data backup in the database from the database based on a GTID (Global Transaction Identifier) mode; and acquiring a target binary system log file where the final copy position is located and a binary system log file behind the target binary system log file from the main database. According to the data backup method, during backup in the database based on the GTID mode, the backup data volume is reduced, the storage space occupied by the backup data is reduced, the backup time is reduced, and meanwhile, PIT (Point-In-time) recovery is effectively supported. Moreover, the embodiment of the invention provides a data backup device.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of data backup, and more specifically, embodiments of the present invention relate to a data backup method and device. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] MySQL is a relational database management system (Relational Database Management System, RDBMS). MySQL is currently the most popular relational database system, and MySQL is one of the best RDBMS application software in terms of WEB applications. [0004] With the popularity of cloud computing in China, most cloud services are built with the open source database MySQL, and most users build databases on cloud servers using MySQL databases. In order to improve the stability of the data, most MySQL databases set up slav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30G06F11/14
CPCG06F11/1448G06F16/273
Inventor 赖明星
Owner NETEASE (HANGZHOU) NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products