CN113127261A - File processing method, device, equipment and storage medium - Google Patents
File processing method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN113127261A CN113127261A CN201911417930.6A CN201911417930A CN113127261A CN 113127261 A CN113127261 A CN 113127261A CN 201911417930 A CN201911417930 A CN 201911417930A CN 113127261 A CN113127261 A CN 113127261A
- Authority
- CN
- China
- Prior art keywords
- target file
- record information
- operation record
- file
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 26
- 238000012545 processing Methods 0.000 claims abstract description 140
- 238000000034 method Methods 0.000 claims abstract description 30
- 238000011084 recovery Methods 0.000 claims abstract description 29
- 238000012544 monitoring process Methods 0.000 claims description 7
- 230000004044 response Effects 0.000 claims description 4
- 238000004590 computer program Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 239000000284 extract Substances 0.000 description 4
- 230000002159 abnormal effect Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 101100217298 Mus musculus Aspm gene Proteins 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000008707 rearrangement Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1415—Saving, restoring, recovering or retrying at system level
- G06F11/1435—Saving, restoring, recovering or retrying at system level using file system or storage system metadata
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/16—File or folder operations, e.g. details of user interfaces specifically adapted to file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/178—Techniques for file synchronisation in file systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- Quality & Reliability (AREA)
- Human Computer Interaction (AREA)
- Library & Information Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention discloses a file processing method, a file processing device, file processing equipment and a storage medium. The method is performed by a first client associated with a first server, comprising: if the high-risk processing operation on the target file is monitored according to the user input information, determining operation record information of the target file; executing high-risk processing operation on the target file, and sending operation record information of the target file to the second client so as to enable the second server to store the operation record information; the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server. According to the method and the device, the target file can be restored in a targeted mode according to the operation record information, the operation record information is stored in the second server, the first client side can be prevented from being mistakenly operated to delete the operation record information, and the storage safety of the operation record information is guaranteed.
Description
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to a file processing method, a file processing device, file processing equipment and a storage medium.
Background
At present, in order to prevent the loss of server files, two servers are generally provided, including a master server and a slave server, and when the master server is abnormal, the slave server takes over the IP of the master server and executes all services. Sometimes, the user often performs misoperation on the main server, such as deletion, coverage and the like of key files or directories. When the above situation occurs, although the master server can be switched to the slave server, the key files or directories of the master server cannot be restored in time.
If the files are synchronized to the master server through the slave server, the files of the slave server need to be completely backed up to the master server, and due to the lack of detailed logs for key files or directory operations, the files needing to be backed up cannot be known, and misoperation sometimes cannot be sensed frequently, so that all the files need to be synchronized, the file synchronization takes a long time, and part of the files are repeatedly backed up.
Disclosure of Invention
The embodiment of the invention provides a file processing method, a file processing device, file processing equipment and a storage medium, which are used for recovering a file which is subjected to misoperation when the file is subjected to misoperation.
In a first aspect, an embodiment of the present invention provides a file processing method, which is executed by a first client supported in a first server, and includes:
if monitoring high-risk processing operation on the target file according to user input information, determining operation record information of the target file;
executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
In a second aspect, an embodiment of the present invention provides a file processing method, which is executed by a second client associated with a second server, and includes:
receiving operation record information sent by a first client;
storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
In a third aspect, an embodiment of the present invention provides a file processing apparatus configured in a device loaded with a first client, where the apparatus includes:
the operation record information determining module is used for determining the operation record information of the target file if the high-risk processing operation on the target file is monitored according to the user input information;
the high-risk processing operation execution module is used for executing high-risk processing operation on the target file and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
In a fourth aspect, an embodiment of the present invention provides a file processing apparatus configured in a device loaded with a second client, where the apparatus includes:
the operation record information receiving module is used for receiving the operation record information sent by the first client;
the operation record information storage module is used for storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
In a fifth aspect, an embodiment of the present invention further provides an apparatus loaded with a first client or a second client, including:
one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a file processing method as described in any of the embodiments of the present invention as performed by a first client associated with a first server, or a file processing method as described in any of the embodiments of the present invention as performed by a second client associated with a second server.
In a sixth aspect, embodiments of the present invention further provide a computer-readable storage medium, on which a computer program is stored, which when executed by a processor implements a file processing method performed by a first client associated with a first server according to any one of the embodiments of the present invention, or implements a file processing method performed by a second client associated with a second server according to any one of the embodiments of the present invention.
In the embodiment of the invention, if the high-risk processing operation on the target file is monitored according to the user input information, the operation record information of the target file is determined, so that when the target file needs to be restored, the target file to be restored can be determined in a targeted manner according to the operation record information for restoration. The operation record information of the target file is sent to the second client, so that the second server stores the operation record information, the operation record information is prevented from being deleted by misoperation of the first client, the target file cannot be recovered according to the operation record information, and the storage safety of the operation record information is ensured.
Drawings
FIG. 1 is a flowchart of a file processing method performed by a first client associated with a first server according to an embodiment of the present invention;
FIG. 2 is a flowchart of a file processing method executed by a first client associated with a first server according to another embodiment of the present invention;
FIG. 3 is a flowchart of a file processing method performed by a second client associated with a second server according to an embodiment of the present invention;
FIG. 4 is a block diagram of an apparatus for processing a file executed by a first client associated with a first server according to an embodiment of the present invention;
FIG. 5 is a block diagram of an apparatus for processing a file by a second client associated with a second server according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Fig. 1 is a flowchart illustrating a file processing method performed by a first client associated with a first server according to an embodiment of the present invention. The file processing method provided by the embodiment can be applied to the case of recovering the target file which is subjected to the misoperation, and typically, the embodiment of the invention can be applied to the case of accurately determining the file which needs to be recovered according to the operation record information and recovering the file when the file is subjected to the misoperation. The method may particularly be performed by a file processing apparatus, which may be implemented by means of software and/or hardware, which may be integrated in a device loaded with the first client. Referring to fig. 1, the method of the embodiment of the present invention may be performed by a first client in a first server, and includes:
s110, if the high-risk processing operation on the target file is monitored according to the user input information, determining the operation record information of the target file.
The user input information may be operation instruction information input by a user, may be an input code statement, or may be operation instruction information generated by triggering a control. The high-risk processing operation may be an operation other than a restore operation on the target file, such as delete, move, copy, add content, delete content, and the like. The operation record information comprises the high-risk processing operation time of the target file, the storage directory and the target file identification information and is used for recovering the target file.
For example, since the high-risk processing operation may change the file, and if the high-risk processing operation is an error operation, the file may be changed and cannot be restored to the original file, the high-risk processing operation needs to be monitored, so that when the high-risk processing operation is monitored, the operation record information of the target file is determined in time, and it is convenient to accurately restore the target file when the target file needs to be restored subsequently.
Specifically, the above steps can be implemented by redefining the high-risk processing operation instruction. For example, the first client searches for instructions corresponding to all high-risk processing operations that can act on the target file in the first server, such as rm, move, copy instructions, and the like, renames the instructions, for example, renames rm to rm _ back, adds a corresponding instruction code for obtaining operation record information of the target file to rm _ back, and repackages the instruction as the content executed by the rm _ back instruction. And then placing the command tool which is re-packaged and renamed in the first client under the path of the original tool so as to be called. When the first client monitors the instruction of the high-risk processing operation, because the writing mode of the instruction is still the conventional mode, the instruction needs to be firstly analyzed and replaced by the repackaged and named instruction. For example, for the instruction rm-fr/usr/lib, it is parsed into rm _ back-fr/usr/lib/xx 1; rm-fr/usr/lib/xx2.. the execution is to firstly traverse all the files in each storage directory, store the related information of the files, such as file names, summary information obtained by calculation, and the like, and then execute corresponding processing operation. Similarly, mv/home/xx/usr/lib/can be resolved as mv _ back/home/xx/xx 1; mv _ back/home/xx/xx2 … …, mv _ back/usr/lib/xx 1; mv _ back/usr/lib/xx2 … …. For operations such as file modification or file addition, since an operation for a specific file is indicated, operation record information of a target file for executing the operation can be directly saved without traversing.
In the embodiment of the present application, monitoring a high risk processing operation of an object file according to user input information includes: according to a file processing instruction which is input by a user and comprises any file name, taking the file as the target file, and determining to monitor high-risk processing operation on the target file; or according to a file processing instruction which is input by a user and comprises any file storage directory, all files in the file storage directory are used as the target files, and the high-risk processing operation of the target files is determined to be monitored.
For example, the file processing instruction may be a file processing instruction including a file name, e.g., rm-fr/usr/lib/xx. At this time, the file is used as a target file, and the operation record information of the file is acquired. rm-fr/usr/lib represents that all files under the storage directory are processed, at this time, all files under the directory are taken as target files, all files under the directory are traversed, and operation record information of all files is obtained.
In this embodiment of the present application, determining the identification information of the target file includes: determining abstract information of the target file; and taking the abstract information and the name of the target file as the identification information of the target file.
Illustratively, the first client acquires a target file, i.e. a file to be processed, or all files in the storage directory and the subdirectories, calculates digest information of each target file one by one, such as md5 value, SHA1 value, SHA256 value, and the like, and uses the name and digest information of the target file as identification information of the target file. In addition, the time for acquiring the high-risk processing operation of the target file may be, for example, the time for receiving the high-risk processing operation on the target file, or the time for executing the high-risk processing operation on the target file. And acquiring the storage directory where the target file is located, so that the operation record information comprises the high-risk processing operation time of the target file, the storage directory and the identification information of the target file.
S120, executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so that the second server stores the operation record information; wherein the second client is hosted in the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
Illustratively, when the first client monitors high-risk processing operation on the target file, the first client performs queue storage on operation record information of the target file and executes the high-risk processing operation on the target file. And if the current high-risk processing operation is suspended, terminated or the queue storage is full, transmitting the operation record information saved in the queue to the second client. The sending format may include a message type, a message ID, a message timestamp, a client IP sending the message, a mac address corresponding to the client IP, a network card number, a data part byte length, a data part, and the like, as shown in table 1. The message type of the operation record information reported by the first client may be a digital number, for example, 03, the message timestamp is the high-risk processing operation time of the target file, and the data portion includes an operation instruction of the high-risk processing operation, a name and summary information of the target file, and the like.
TABLE 1
And after receiving the operation record information, the second client extracts the high-risk processing operation time, the operation instruction of the high-risk processing operation, the name and the abstract information of the target file and the like from the operation record information and stores the extracted high-risk processing operation time, the operation instruction of the high-risk processing operation, the name and the abstract information in the second server. When the first client monitors a recovery instruction of the target file, the second client acquires operation record information from the second server, acquires the target file from the second server according to the operation record information, and recovers the target file in the first server. The operation record information of the target file is sent to the second client, so that the second server stores the operation record information, the problem that the first client deletes the operation record information due to misoperation and cannot recover the target file according to the operation record information is solved, and the storage safety of the operation record information is guaranteed.
In the embodiment of the present application, the operation record information may be stored in a first server associated with the first client, and when the operation record information in the first server is not deleted by an erroneous operation, the target file may be restored according to the operation record information stored in the first server.
In the embodiment of the application, if the high-risk processing operation on the target file is monitored according to the user input information, the operation record information of the target file is determined, so that when the target file needs to be restored, the target file to be restored can be determined in a targeted manner according to the operation record information, and the restoration can be performed. The operation record information of the target file is sent to the second client, so that the second server stores the operation record information, the problem that the first client deletes the operation record information by misoperation and cannot recover the target file according to the operation record information is solved, and the storage safety of the operation record information is ensured.
Fig. 2 is a flowchart illustrating a file processing method executed by a first client associated with a first server according to another embodiment of the present invention. For further optimization of the embodiments, details which are not described in detail in the embodiments are described in the embodiments. Referring to fig. 2, the file processing method provided in this embodiment may include:
s210, if the high-risk processing operation on the target file is monitored according to the user input information, determining the operation record information of the target file.
In another embodiment of the present application, if a high-risk processing operation on an object file is monitored according to user input information, before determining operation record information of the object file, the method further includes: and sending registration information and keep-alive information to the second client so that the second client verifies and registers the first client according to the registration information and establishes communication connection with the first client.
Illustratively, the second client listens to a default port, e.g., 3910, and if the port is found to be occupied, increments the listening port number to the unoccupied port. The first client initiates a registration with an available port of the second client via a communication protocol, such as TCP, and sends a registration message or a keep-alive message to an incremented default port number if the registration is abnormal. And when the second client successfully receives the registration information or the keep-alive information of the first client, returning a response message, such as ok, to the first client. The format of the registration information is shown in table 1, the message type may be 01, and the keep-alive message type may be 02. And sending a registration message and a keep-alive message to the second client by the first client for registration and keep-alive, so that a trusted communication connection is established between the first client and the second client, and the subsequent sending and receiving of the operation record information are facilitated.
S220, executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so that the second server stores the operation record information; wherein the second client is associated with the second server.
And S230, if a recovery instruction for any target file is monitored, acquiring operation record information of the target file.
For example, if the high-risk processing operation on the target file is directly performed, when the high-risk processing operation on a part of the target file is an error operation, the part of the target file cannot be restored in a targeted manner. Therefore, in the embodiment of the present application, the operation record information of the target file is stored, and when a recovery instruction for any target file is detected, the stored operation record information of the target file is acquired, so that specific information of the target file which needs to be replied can be determined, and the target file which needs to be recovered is recovered.
In another embodiment of the present application, the obtaining operation record information of the target file includes: sending an operation record information query request to a second client; the operation record information query request comprises high-risk processing operation time of a target file, so that a second client determines operation record information to be returned according to the high-risk processing operation time of the target file; and receiving operation record information returned by the second server in response to the operation record information query request.
In order to improve the storage safety of the operation record information and avoid the operation record information from being deleted by the misoperation of the first client, the operation record information is saved in the second server. When the first client monitors a recovery instruction of any target file, an operation record information query request is sent to the second client so as to obtain operation record information from the second server. And the second client inquires the operation record information of the target file matched with the time according to the high-risk processing operation time of the target file in the operation record inquiry request, so that the operation record information is returned to the first client, and the first client receives the operation record information. When the second client side stores the operation record information, the second client side extracts the relevant operation record information from the message which is sent by the first client side and carries the operation record information to store the operation record information, so that when the operation record information is returned to the first client side, the second client side rebuilds the operation record information according to the message sending format in the table 1 to send the operation record information through the message format in the table 1, and the first client side is ensured to be capable of accurately receiving the operation record information. Wherein the message type may be set to 05 to distinguish from other messages.
And S240, acquiring the target file from the second server according to the operation record information.
In another embodiment of the present application, acquiring a target file from a second server according to the operation record information includes: determining a first storage directory of a target file in the first server and a second storage directory in the second server according to the storage directories in the operation record information; acquiring a target file from the second storage directory according to the file identification information in the operation record information;
for example, the first client determines, according to a message sent by the second client, an instruction of a high-risk processing operation performed on the target file, and if the instruction includes a name of the target file, it indicates that the high-risk processing operation is a processing operation directly performed on the target file, so that the storage directory of the target file is searched through the instruction or the operation record information. If the instruction only includes the storage directory of the target file, it indicates that the high-risk processing operation is an operation on all files in the storage directory, and therefore, the storage directory is created in the first server to recover the target file. The first server may search for the storage directory in the operation record information, and if the storage directory exists in the first server, the storage directory does not need to be created. If the storage directory does not exist in the first server, the storage directory is created in the first server.
Specifically, the first client hangs the content corresponding to the target file storage directory in the second server to the storage directory of the first server, so as to access the content in the storage directory of the second server and obtain the target file.
In another embodiment of the present application, acquiring a target file from the second storage directory according to file identification information in the operation record information includes: acquiring a candidate file from the second storage directory according to the file name in the operation record information; determining summary information of the candidate file; and if the summary information of the candidate file is the same as that of the target file, determining the candidate file as the target file. After the summary information of the candidate file is determined, the method further comprises the following steps: if the summary information of all the candidate files is different from the summary information of the target file, acquiring a new candidate file from a backup storage directory of a second server according to the file name; determining summary information of the new candidate file; and if the summary information of the new candidate file is the same as that of the target file, determining the new candidate file as the target file.
Illustratively, the summary information of the candidate file is calculated by acquiring a file having the same name as the target file in the operation record information from a storage directory in the second server for hanging the disk, as the candidate file. And if the summary information of the candidate file is consistent with the summary information in the operation record information, the candidate file is the target file to be recovered. If the file name is not consistent with the name of the target file in the operation record information, the target file in the storage directory of the second server is changed, so that the file with the same name as the target file in the operation record information is inquired through the backup storage directory in the second server and is used as a new candidate file, and the summary information of the new candidate file is calculated. And if the summary information of the new candidate file is consistent with the summary information in the operation record information, the new candidate file is the target file to be recovered.
In another embodiment of the present application, if the second client monitors the high-risk processing operation on the target file in the second server, the second client stores the target file in the backup storage directory to backup the target file, and then executes the high-risk processing operation on the target file in the second server.
S250, storing the acquired target file into the first server so as to recover the target file in the first server.
Correspondingly, the storing the obtained target file in the first server includes: and storing the target file in a first storage directory in the first server.
And the first client acquires a file consistent with the related information of the target file in the operation record information through the second server storage directory, and stores the file in the storage directory of the first server to recover the target file. And after the target file is recovered, removing the hanging disc.
According to the technical scheme of the embodiment of the invention, when the recovery instruction of any target file is monitored, the operation record information of the target file is acquired, the target file is acquired from the second server according to the operation record information, and the target file is stored in the first storage directory of the first server, so that the target file to be recovered is accurately determined according to the operation record information without recovering all the target files, and the recovery efficiency of the target file is improved. And in the process of obtaining the target file, double searching is carried out according to the name and the storage directory of the target file, so that the accuracy of the target file is ensured.
Fig. 3 is a flowchart of a file processing method executed by a second client associated with a second server according to an embodiment of the present invention. The file processing method provided by the embodiment can be applied to the case of recovering the target file which is subjected to the misoperation, and typically, the embodiment of the invention can be applied to the case of accurately determining the file which needs to be recovered according to the operation record information and recovering the file when the file is subjected to the misoperation. The method may particularly be performed by a file processing apparatus, which may be implemented by means of software and/or hardware, which may be integrated in a device loaded with the second client. The details such as explanation of the concept of the noun and the like, which are not described in detail in the present embodiment, are described in detail in the above embodiments. Referring to fig. 3, the method of the embodiment of the present invention may be performed by a second client associated with a second server, and includes:
and S310, receiving operation record information sent by the first client.
Illustratively, when the first client monitors high-risk processing operation on the target file, the first client performs queue storage on operation record information of the target file and executes the high-risk processing operation on the target file. And if the current high-risk processing operation is suspended, terminated or the queue storage is full, transmitting the operation record information saved in the queue to the second client. And the second client receives the operation record information sent by the first client. The format of the received message is shown in table 1, and the second server further parses and extracts the received message to obtain the content related to the operation record information therein. The operation record information comprises the high-risk processing operation time of the target file, the storage directory and the target file identification information and is used for recovering the target file.
S320, storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
Illustratively, the second client stores the operation record information in the second server, so that the problem that the first client cannot recover the target file according to the operation record information due to deletion of the operation record information caused by misoperation of the first client if the operation record information is stored in the first client is avoided, and the storage safety of the operation record information is ensured.
After the operation record information is stored in the second server, the method further includes: if an operation record query request sent by a first client is received, acquiring the high-risk processing operation time of a target file in the operation record query request; determining operation record information to be returned according to the high-risk processing operation time of the target file; and sending the operation record information to be returned to the first server.
For example, when the first client monitors a recovery instruction for any target file, an operation record information query request is sent to the second client, so as to obtain operation record information from the second server. And the second client inquires the operation record information of the target file matched with the time according to the high-risk processing operation time of the target file in the operation record inquiry request, so that the operation record information is returned to the first client, and the first client receives the operation record information. When the second client side stores the operation record information, the second client side extracts the relevant operation record information from the message which is sent by the first client side and carries the operation record information to store the operation record information, so that when the operation record information is returned to the first client side, the second client side rebuilds the operation record information according to the message sending format in the table 1 to send the operation record information through the message format in the table 1, and the first client side is ensured to be capable of accurately receiving the operation record information.
Optionally, the method further includes: if the high-risk processing operation on the target file in the second server is monitored, processing the target file according to the corresponding rule of the high-risk processing operation; wherein, according to the corresponding rule of the high-risk processing operation, the processing operation of the target file comprises the following steps: storing the target file in a backup storage directory so that the first client acquires the target file from the backup storage directory of the second server; and executing high-risk processing operation on the target file in the second server.
Similar to the way that the first client operates the high-risk processing, when the second client monitors the high-risk processing operation, the second client analyzes the instruction, for example, the delete instruction rm-fr/usr/lib is analyzed into mv/usr/lib/xx1,/var/backup/usr/lib/xx1, mv/usr/lib/xx2,/var/backup/usr/lib/xx2, that is, all the target files in the storage directory are traversed, and all the target files are moved to the backup storage directory. And for the coverage instruction mv/home/xx/usr/lib/, if the storage directory/home/xx/usr/lib/to be processed is an empty directory, directly executing the coverage operation. If the storage directory to be processed is not an empty directory, traversing/home/xx/and/usr/lib/directory and sub-directory: mv/usr/lib/xx 1/var/backup/usr/lib/; and mv/home/xx/xx1/var/backup/, all files in the storage directory are moved to the backup storage directory for backup. For modified files or added files, the target files are directly copied and stored in the backup storage directory before the processing operation is executed.
In the embodiment of the application, the operation record information sent by the first client is received and stored in the second server, so that when the first client needs to restore the target file, the target file to be restored can be determined in a targeted manner according to the operation record information for restoration. The operation record information is stored through the second server, the problem that the operation record information is deleted by misoperation of the first client side and the target file cannot be recovered according to the operation record information is solved, and therefore the storage safety of the operation record information is guaranteed.
Fig. 4 is a schematic structural diagram of an apparatus for processing a file executed by a first client associated with a first server according to an embodiment of the present invention. The device can be suitable for recovering the target file which is operated by mistake, and typically, the embodiment of the invention can be suitable for accurately determining the file which needs to be recovered according to the operation record information when the file is operated by mistake and recovering the file. The apparatus may be implemented by software and/or hardware, and the apparatus may be integrated in a device loaded with the first client. Referring to fig. 4, the apparatus specifically includes:
an operation record information determining module 410, configured to determine operation record information of a target file if a high-risk processing operation on the target file is monitored according to user input information;
a high-risk processing operation executing module 420, configured to execute a high-risk processing operation on the target file, and send operation record information of the target file to a second client, so that the second server stores the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
In this embodiment, the high risk processing operation executing module 420 includes:
the file name instruction analysis unit is used for taking the file as the target file according to a file processing instruction which is input by a user and comprises any file name, and determining and monitoring high-risk processing operation on the target file; or,
and the file storage directory instruction analysis unit is used for taking all files in the file storage directory as the target files according to a file processing instruction which is input by a user and comprises any file storage directory, and determining to monitor the high-risk processing operation of the target files.
In this embodiment of the present application, the operation record information includes high-risk processing operation time of the target file, a storage directory, and target file identification information, and is used to recover the target file.
In an embodiment of the present application, the operation record information determining module 410 includes:
the abstract information determining unit is used for determining the abstract information of the target file;
and the identification information determining unit is used for taking the abstract information and the name of the target file as the identification information of the target file.
In an embodiment of the present application, the apparatus further includes:
the operation record information acquisition module is used for acquiring the operation record information of any target file if a recovery instruction of the target file is monitored;
the target file acquisition module is used for acquiring a target file from the second server according to the operation record information;
and the target file recovery module is used for storing the acquired target file into the first server so as to recover the target file in the first server.
In this embodiment of the present application, the operation record information obtaining module includes:
the query request sending unit is used for sending an operation record information query request to the second client; the operation record information query request comprises high-risk processing operation time of a target file, so that a second client determines operation record information to be returned according to the high-risk processing operation time of the target file;
and the receiving unit is used for receiving the operation record information returned by the second server in response to the operation record information inquiry request.
In this embodiment of the present application, the target file obtaining module includes:
a storage directory determining unit, configured to determine, according to a storage directory in the operation record information, a first storage directory of a target file in the first server and a second storage directory in the second server;
the target file query unit is used for acquiring a target file from the second storage directory according to the file identification information in the operation record information;
correspondingly, the target file recovery module is specifically configured to:
and storing the target file in a first storage directory in the first server.
In this embodiment of the present application, the target file querying unit includes:
a candidate file obtaining subunit, configured to obtain a candidate file from the second storage directory according to the file name in the operation record information;
a candidate file abstract determining subunit, configured to determine abstract information of the candidate file;
and the target file determining subunit is configured to determine that the candidate file is the target file if the summary information of the candidate file is the same as the summary information of the target file.
In an embodiment of the present application, the apparatus further includes:
a new candidate file obtaining module, configured to obtain a new candidate file from a backup storage directory of a second server according to the file name if the summary information of all the candidate files is different from the summary information of the target file;
the new candidate file abstract determining module is used for determining abstract information of the new candidate file;
and the new candidate file replacing module is used for determining the new candidate file as the target file if the summary information of the new candidate file is the same as that of the target file.
In an embodiment of the present application, the apparatus further includes:
and the registration keep-alive module is used for sending registration information and keep-alive information to the second client so that the second client verifies and registers the first client according to the registration information and establishes communication connection with the first client.
According to the technical scheme of the embodiment of the invention, when the high-risk processing operation on the target file is monitored according to the user input information, the operation record information of the target file is determined through the operation record information determining module, so that when the target file needs to be restored, the target file to be restored can be determined in a targeted manner according to the operation record information for restoration. The high-risk processing operation of the target file is executed through the high-risk processing operation execution module, and the operation record information of the target file is sent to the second client side, so that the second server stores the operation record information, the operation record information is prevented from being deleted by misoperation of the first client side, the target file cannot be recovered according to the operation record information, and the storage safety of the operation record information is guaranteed.
Fig. 5 is a schematic structural diagram of an apparatus for processing a file executed by a second client associated with a second server according to an embodiment of the present invention. The device can be suitable for recovering the target file which is operated by mistake, and typically, the embodiment of the invention can be suitable for accurately determining the file which needs to be recovered according to the operation record information when the file is operated by mistake and recovering the file. The apparatus may be implemented by software and/or hardware, and the apparatus may be integrated in a device loaded with the second client. Referring to fig. 5, the apparatus specifically includes:
an operation record information receiving module 510, configured to receive operation record information sent by a first client;
an operation record information storage module 520, configured to store the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
In another embodiment of the present application, the operation record information includes high-risk processing operation time of the target file, a storage directory, and target file identification information, and is used to recover the target file.
In yet another embodiment of the present application, the apparatus further comprises:
the record query request receiving module is used for acquiring the high-risk processing operation time of the target file in the operation record query request if the operation record query request sent by the first client is received;
and the operation record information returning module is used for sending the operation record information to be returned to the first server.
In yet another embodiment of the present application, the apparatus further comprises:
the backup module is used for storing the target file in a backup storage directory if the high-risk processing operation on the target file in the second server is monitored, so that the first client side can obtain the target file from the backup storage directory of the second server;
and the processing operation execution module is used for executing high-risk processing operation on the target file in the second server.
According to the technical scheme of the embodiment of the invention, the operation record information sent by the first client side is received through the operation record information receiving module; the operation record information storage module stores the operation record information in a second server; and recovering the target file in the first server, so that the operation record information is prevented from being deleted by the misoperation of the first client, the target file cannot be recovered according to the operation record information, and the storage safety of the operation record information is ensured. The operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, so that when the target file needs to be recovered, the target file to be recovered can be determined in a targeted manner according to the operation record information to recover the target file
Fig. 6 is a schematic structural diagram of an apparatus according to an embodiment of the present invention. Fig. 6 illustrates a block diagram of an exemplary device 612 suitable for use in implementing embodiments of the present invention. The device 612 shown in fig. 6 is only an example and should not bring any limitations to the functionality or scope of use of the embodiments of the present invention.
As shown in fig. 6, the device is loaded with a first client or a second client, and the device 612 includes: one or more processors 616; a memory 628 for storing one or more programs, when the one or more programs are executed by the one or more processors 616, causing the one or more processors 616 to implement the file processing method executed by the first client associated with the first server according to the embodiment of the present invention, including:
if monitoring high-risk processing operation on the target file according to user input information, determining operation record information of the target file;
executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
Or, implementing the file processing method executed by the second client associated with the second server provided by the embodiment of the present invention includes:
receiving operation record information sent by a first client;
storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
Is expressed in the form of general-purpose equipment. Components of device 612 may include, but are not limited to: one or more processors or processors 616, a system memory 628, and a bus 618 that couples various system components including the system memory 628 and the processors 616.
The system memory 628 may include computer system readable storage media in the form of volatile memory, such as Random Access Memory (RAM)630 and/or cache memory 632. The device 612 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage system 634 may be used to read from and write to non-removable, nonvolatile magnetic storage media (not shown in FIG. 6, commonly referred to as a "hard drive"). Although not shown in FIG. 6, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical storage medium) may be provided. In such cases, each drive may be connected to bus 618 by one or more data storage media interfaces. Memory 628 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 640 having a set (at least one) of program modules 642 may be stored, for example, in memory 628, such program modules 662 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. Program modules 662 generally perform the functions and/or methodologies of the described embodiments of the invention.
The processor 616 executes various functional applications and data processing, such as implementing a file processing method provided by an embodiment of the present invention, by executing at least one of the other programs among the plurality of programs stored in the system memory 628.
One embodiment of the present invention provides a storage medium containing computer-executable instructions, which when executed by a computer processor, are configured to perform a file processing method performed by a first client associated with a first server, as provided by an embodiment of the present invention, including:
if monitoring high-risk processing operation on the target file according to user input information, determining operation record information of the target file;
executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
Or, the file processing method executed by the second client associated with the second server according to the embodiment of the present invention includes:
receiving operation record information sent by a first client;
storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
Computer storage media for embodiments of the present invention can take the form of any combination of one or more computer-readable storage media. The computer readable storage medium may be a computer readable signal storage medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In embodiments of the invention, the computer readable storage medium may be any tangible storage medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal storage medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal storage medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable storage medium may be transmitted using any appropriate storage medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or device. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.
Claims (14)
1. A file processing method performed by a first client associated with a first server, the method comprising:
if monitoring high-risk processing operation on the target file according to user input information, determining operation record information of the target file;
executing high-risk processing operation on the target file, and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
2. The method of claim 1, wherein monitoring high risk processing operations of the target document based on user input information comprises:
according to a file processing instruction which is input by a user and comprises any file name, taking the file as the target file, and determining to monitor high-risk processing operation on the target file; or,
according to a file processing instruction which is input by a user and comprises any file storage directory, all files in the file storage directory are used as the target files, and the high-risk processing operation of the target files is determined and monitored; the operation record information comprises high-risk processing operation time of the target file, a storage directory and target file identification information, and is used for recovering the target file.
3. The method of claim 2, wherein determining identification information of the target file comprises:
determining abstract information of the target file;
and taking the abstract information and the name of the target file as the identification information of the target file.
4. The method of claim 1, after determining the operation record information of the target file, further comprising:
if a recovery instruction for any target file is monitored, acquiring operation record information of the target file;
acquiring a target file from a second server according to the operation record information;
and storing the acquired target file into the first server so as to recover the target file in the first server.
5. The method of claim 4, wherein obtaining the operation record information of the target file comprises:
sending an operation record information query request to a second client; the operation record information query request comprises high-risk processing operation time of a target file, so that a second client determines operation record information to be returned according to the high-risk processing operation time of the target file;
and receiving operation record information returned by the second server in response to the operation record information query request.
6. The method of claim 4, wherein obtaining the target file from the second server according to the operation record information comprises:
determining a first storage directory of a target file in the first server and a second storage directory in the second server according to the storage directories in the operation record information;
acquiring a target file from the second storage directory according to the file identification information in the operation record information;
correspondingly, the storing the obtained target file in the first server includes:
and storing the target file in a first storage directory in the first server.
7. The method according to claim 6, wherein obtaining the target file from the second storage directory according to the file identification information in the operation record information comprises:
acquiring a candidate file from the second storage directory according to the file name in the operation record information;
determining summary information of the candidate file;
if the summary information of the candidate file is the same as that of the target file, determining the candidate file as the target file;
if the summary information of all the candidate files is different from the summary information of the target file, acquiring a new candidate file from a backup storage directory of a second server according to the file name;
determining summary information of the new candidate file;
and if the summary information of the new candidate file is the same as that of the target file, determining the new candidate file as the target file.
8. A method of file processing performed by a second client associated with a second server, the method comprising:
receiving operation record information sent by a first client;
storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
9. The method of claim 8, wherein the operation record information includes a high-risk processing operation time of the target file, a storage directory, and target file identification information for restoring the target file;
correspondingly, after the operation record information is stored in the second server, the method further includes:
if an operation record query request sent by a first client is received, acquiring the high-risk processing operation time of a target file in the operation record query request;
determining operation record information to be returned according to the high-risk processing operation time of the target file;
and sending the operation record information to be returned to the first server.
10. The method of claim 8, further comprising:
if the high-risk processing operation on the target file in the second server is monitored, processing the target file according to the corresponding rule of the high-risk processing operation;
wherein, according to the corresponding rule of the high-risk processing operation, the processing operation of the target file comprises the following steps:
storing the target file in a backup storage directory so that the first client acquires the target file from the backup storage directory of the second server;
and executing high-risk processing operation on the target file in the second server.
11. A file processing apparatus, configured in a device loaded with a first client, for implementing a method performed by the first client, the apparatus comprising:
the operation record information determining module is used for determining the operation record information of the target file if the high-risk processing operation on the target file is monitored according to the user input information;
the high-risk processing operation execution module is used for executing high-risk processing operation on the target file and sending operation record information of the target file to a second client so as to enable the second server to store the operation record information; wherein the second client is associated with the second server;
the operation record information is used for acquiring the target file from the second server according to the operation record information when a recovery instruction of the target file is monitored, and recovering the target file in the first server.
12. A file processing apparatus, configured in a device loaded with a second client, for implementing a method executed by the second client, the apparatus comprising:
the operation record information receiving module is used for receiving the operation record information sent by the first client;
the operation record information storage module is used for storing the operation record information in a second server; the operation record information is used for acquiring the target file from the second server according to the operation record information when the first client monitors a recovery instruction of the target file, and recovering the target file in the first server.
13. An apparatus, wherein the apparatus is loaded with a first client or a second client, comprising: one or more processors;
a memory for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement a method of processing a document as claimed in any one of claims 1 to 7, or a method of processing a document as claimed in any one of claims 8 to 10.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of processing a document as claimed in any one of claims 1 to 7, or a method of processing a document as claimed in any one of claims 8 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911417930.6A CN113127261A (en) | 2019-12-31 | 2019-12-31 | File processing method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911417930.6A CN113127261A (en) | 2019-12-31 | 2019-12-31 | File processing method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113127261A true CN113127261A (en) | 2021-07-16 |
Family
ID=76769619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911417930.6A Pending CN113127261A (en) | 2019-12-31 | 2019-12-31 | File processing method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113127261A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114036507A (en) * | 2021-11-09 | 2022-02-11 | 北京天融信网络安全技术有限公司 | Method, device, electronic equipment and medium for acquiring dangerous instructions |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100268738A1 (en) * | 2009-04-16 | 2010-10-21 | Brown William B | System that maintains objects created and modified within designated directories on a per-client basis in a network filesystem |
CN104217174A (en) * | 2014-09-05 | 2014-12-17 | 四川长虹电器股份有限公司 | Safety storage system and safety storage method for distributed files |
CN106547801A (en) * | 2015-09-23 | 2017-03-29 | 北京奇虎科技有限公司 | Database data flash back method and apparatus |
CN107729177A (en) * | 2017-09-18 | 2018-02-23 | 中国科学院信息工程研究所 | Backup data store management method, device and system based on cloud storage |
-
2019
- 2019-12-31 CN CN201911417930.6A patent/CN113127261A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100268738A1 (en) * | 2009-04-16 | 2010-10-21 | Brown William B | System that maintains objects created and modified within designated directories on a per-client basis in a network filesystem |
CN104217174A (en) * | 2014-09-05 | 2014-12-17 | 四川长虹电器股份有限公司 | Safety storage system and safety storage method for distributed files |
CN106547801A (en) * | 2015-09-23 | 2017-03-29 | 北京奇虎科技有限公司 | Database data flash back method and apparatus |
CN107729177A (en) * | 2017-09-18 | 2018-02-23 | 中国科学院信息工程研究所 | Backup data store management method, device and system based on cloud storage |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114036507A (en) * | 2021-11-09 | 2022-02-11 | 北京天融信网络安全技术有限公司 | Method, device, electronic equipment and medium for acquiring dangerous instructions |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10956389B2 (en) | File transfer system using file backup times | |
US8799709B2 (en) | Snapshot management method, snapshot management apparatus, and computer-readable, non-transitory medium | |
US20200319979A1 (en) | System and method of restoring a clean backup after a malware attack | |
US10326792B2 (en) | Virus intrusion route identification device, virus intrusion route identification method, and program | |
AU2012214744B2 (en) | Processes and methods for client-side fingerprint caching to improve deduplication system backup performance | |
US9864736B2 (en) | Information processing apparatus, control method, and recording medium | |
WO2019231527A1 (en) | Versioning validation for data transfer between heterogeneous data stores | |
US9817834B1 (en) | Techniques for performing an incremental backup | |
CN108415986B (en) | Data processing method, device, system, medium and computing equipment | |
CN110765206A (en) | Data synchronization system, method, device, equipment and storage medium | |
CN111240892B (en) | Data backup method and device | |
WO2021112909A1 (en) | Managing replication state for deleted objects | |
US9391935B1 (en) | Techniques for file classification information retention | |
CN112866979B (en) | User information association method, device, equipment and medium based on 5G service interface | |
CN113127261A (en) | File processing method, device, equipment and storage medium | |
CN114328029A (en) | Backup method and device of application resources, electronic equipment and storage medium | |
US9852031B2 (en) | Computer system and method of identifying a failure | |
CN118193642A (en) | Database data synchronization method, equipment, medium and product | |
CN118069745A (en) | SQL SERVER increment acquisition method, storage medium and equipment based on transaction log | |
TW201308946A (en) | Method for resuming downloading data from interruptive-point | |
US11977636B2 (en) | Storage transaction log | |
CN117076191A (en) | File metadata backup method on HDD disk and metadata backup server | |
US10896103B2 (en) | Information processing system | |
JP2008226177A (en) | Distributed processing program, system and method | |
CN114490516A (en) | File system processing method, recycle bin management method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |