当前位置:网站首页>Essentially a database data recovery 】 【 database cannot read data recovery case
Essentially a database data recovery 】 【 database cannot read data recovery case
2022-08-03 15:32:00 【North Asia Data Recovery】
SqlServer database failure & analysis:
The data of the SQL server database cannot be read.The administrator contacts our data recovery center for database data recovery.
The database data recovery engineer analyzed the faulty database and found that the reason why the SQL Server database file could not be read was because the underlying File Record was truncated to 0, the beginning of the file could not be found, and the data table structure was also damaged.The space of about 80M in front of the image file and a part of the space in the middle are overwritten, and the system table is damaged and cannot be read. Consider using an automatic backup file to extract the table structure.
日志中的操作记录:
Because the system table is damaged, the structure of a large number of data tables cannot be determined, and the recovery work can only be performed by database data recovery engineers based on experience.
Database data recovery plan:
After consultation with the Beiya database data recovery engineer team, the following database data recovery plan was determined:
Backup user data - analyze the database of the old data in the backup file - find the data table from the old databaseStructure——Extract the structure of a part of the data table from the log——Extract intact data from the log and residual data——Recover the corresponding data according to the log, and check whether the data is correct——Recover all data after checking that the data is correct.
SqlServer database data recovery process:
1. Backup data.
Hardware engineers first detect whether there is a physical failure of the hard drive.Make mirror backups of each hard disk after no hardware problems are found.
Backup all hard drive data with professional tools:
2. Scan image files.
Open the residual files with tools and analyze the underlying data of the hard disk, and find that there are still many SQL Server logs and backup files in the underlying hard disk.There are many operation records of database insert statements in the residual log.The table creation statement and some old data are found in the residual backup file, and try to extract the data.
In order to speed up data extraction, Beiya data recovery engineers have written a small program to extract database-related data, scan all residual database data in the entire hard disk, and extract all data.
3. Analyze scan data.
After analyzing all the scanned log files, it is found that there are data pages in the log files, which have a fixed beginning and end. Each piece of data has its own object ID number in a fixed position.Continue to search for data records with the same object Id, and find that the structure is the same. It can be determined that this is intact data and can be extracted.
After analyzing the scanned backup file, it is found that many table building statements can be extracted from it, and a part of the table structure can be obtained.For the remaining table structure, since the part truncated to 0 happens to be in the system table, there is no way to extract the table structure, and the table structure and data type can only be inferred from the data extracted from the log.
4. Extract data.
According to the previous analysis, Beiya data recovery engineer wrote a program to extract the table building statement from the backup file, analyze the table structure and various data types according to the table building statement, and search for 22H, 22H, 22H,07H, 05H table.Write a new program to extract the records in the log according to the correspondence between these established tables and OBJECT_IDs, correspond to the data and tables according to the object ID, and insert them into the new table.
5. Verify all data.
After verification by the administrator, the recovered new table is basically the same as the data observed using professional tools, and the data recovery is successful.
边栏推荐
- 【FPGA教程案例44】图像案例4——基于FPGA的图像中值滤波verilog实现,通过MATLAB进行辅助验证
- PHP中高级面试题 – 第三天
- 测试基础整合-测试分类、软件质量模型、测试流程、测试用例、测试点划分方法、缺陷、例子
- Deep Learning - Install CUDA and CUDNN to implement GPU operation of tensorflow
- NodeJs - cross domain
- 每日练习------有10个数字要求分别用选择法从大到小输出
- How to prevent hacking Windows server security Settings
- 随笔-UGUI中LayoutGroup来自适应长度图片长度
- HDU 1160 FatMouse's Speed(最长递减子序列变形)
- 在北极都可以穿短袖了,温度飙升至32.5℃
猜你喜欢
The general trend, another key industry related to Sino-US competition, has reached a critical moment
又有大厂员工连续加班倒下/ 百度搜狗取消快照/ 马斯克生父不为他骄傲...今日更多新鲜事在此...
证实了,百度没有快照了
Currency ATM: Solana Wallet Has Unknown Security Vulnerability, A Large Number Of Users' Digital Assets Are Stolen
2021年12月电子学会图形化二级编程题解析含答案:消灭蝙蝠
2021年12月电子学会图形化四级编程题解析含答案:新冠疫苗接种系统
力扣1206. 设计跳表--SkipList跳表是怎么跳的?
动态链接库.dll、.so和静态库.a,cmake指令
leetcode:899. 有序队列【思维题】
MATLAB gcf图窗保存图像,黑色背景/透明背景
随机推荐
问题1:get和post的区别
在北极都可以穿短袖了,温度飙升至32.5℃
教你如何获取微信公众号历史文章链接
2022-08-03日报:汪林望 vs 刘铁岩:AI、机器学习在材料科学研究中能发挥哪些作用?
Detailed explanation of cloud hard disk EVS and how to use and avoid pits [HUAWEI CLOUD is simple and far]
问题5:发现缺陷怎么办?缺陷的类型有哪些?
分享一款免费OPC UA服务器
随笔-UGUI中LayoutGroup来自适应长度图片长度
NFT盲盒挖矿DAO智能合约dapp系统开发详情
Currency ATM: Solana Wallet Has Unknown Security Vulnerability, A Large Number Of Users' Digital Assets Are Stolen
Js array method is summarized
简单理解try catch和try finally
高压直流输电(HVDC)的最优潮流(OPF)(Matlab代码实现)
JS handwritten call apply bind (detailed) (interview)
MySQL中的基数是啥?
How much does Ark Survival Evolved cost?
php类的析构函数:__destruct
高等数学(第七版)同济大学 习题4-1 个人解答
PHP高级面试题 - 第二天
冒烟测试冒烟测试