当前位置:网站首页>[server data recovery] data recovery case of RAID5 crash of buddy storage
[server data recovery] data recovery case of RAID5 crash of buddy storage
2022-06-11 04:12:00 【North Asia data recovery】
Server storage failure :
Built in the same friend store raid5 The disk array crashed for an unknown reason and could not be started ,raid5 All virtual machines in are lost , among 3 The data in the virtual machine is particularly important , The administrator contacted our data recovery center to ask for this 3 Virtual machines for data recovery .
Server storage data recovery process :
1、 Analyze the storage infrastructure .
Through communication with the administrator and raid Analysis of , Understand the underlying structure of fault storage : Multiple physical disks form a storage pool and are divided into multiple disks lun, Data recovery is required lun1,lun1 Including that 3 Virtual machines . As shown in the figure below :

Storage structure
2、 restructuring raid.
When analyzing and reorganizing the array , The data recovery engineer finds that there are raid5 defect 2 Block hard disk , The hot spare has been enabled .( Restore the process in which the failure occurred : After the first hard disk is disconnected, the system starts the hot spare disk for replacement , When the second hard disk is disconnected raid5 In a degraded state , The third hard disk is disconnected, resulting in raid Array crash .) In this case, the data of the lost disk cannot be directly obtained through verification , Only full disks of the same size can be used 0 Reorganize the image ( Due to the dependence on empty images raid The structure of the file system will be seriously damaged , It is equivalent to that each strip will be missing two blocks of data , Therefore, unless special circumstances do not recommend such operation ).

The reconstruction raid
3、 Through reorganization raid Array extraction LUN. Through the further analysis of the storage structure, we get the result of the storage partition MAP block , To each LUN The data block pointer of . North Asia data recovery engineer writes data extraction program LUN debris . After extraction, the fragments are spliced , Complete composition LUN.

extract LUN
4、 export LUN And try to start , Because the operating system is damaged , Virtual machine failed to start .
5、 Extract the files in the virtual machine . Because the virtual machine could not start , Only files in the virtual machine can be extracted , But most of the files are seriously damaged , Only a few files are available , We have to continue to work out other data recovery schemes .
6、 Extract data by analyzing database pages . The virtual machine in this case has mysql database , You can use the particularity of the underlying storage of the database to scan data pages , Extract the data .( Both the parent disk and the snapshot file are damaged , The regular merge operation cannot complete the snapshot merge , Use the... Independently developed by North Asia VMFS The snapshot merging program performs snapshot merging .) The screenshot of the data recovery process is as follows :

7、 obtain mysql Data page and analyze . according to mysql Data page features scan and export data pages (innodb The engine can use this scheme ;myisam Because no “ Data pages ” The concept , So this solution is not available ), Analyze the system table to obtain the information of each user table , According to the... Of each table id Split the data page .
8、 Extract table structure 、 Extract record . Because the database has been used for a long time , The table structure has also changed many times , In addition, some data of the system table is lost after the storage is damaged , There is a lot of resistance in the record extraction process . First, get the table structure of each table in the original version of the database : The parent disk before the snapshot was merged because it was written earlier , Use the first drop disk for verification to obtain the complete data of this file , Then extract the table structure of each table in the database , After that, the administrator provides the latest version of database table creation script . Two groups of different table structures are used to extract data records and import them into the recovery environment mysql In the database , Then eliminate the garbled data caused by the change of table structure in each table , Finally, the two sets of data are exported as .sql file .
9、 data validation . Because the database table structures of the two versions are different , So the administrator contacts the application engineer for debugging . Import the platform after debugging , Platform debugging succeeded , The data recovery is completed .
边栏推荐
- Eth Of Erc20 And Erc721
- Watson K's Secret Diary
- How PTP helps several major operators meet 5g timing requirements
- A Security Analysis Of Browser Extensions
- Feature selection algorithm based on bare bones particleswarm optimization
- [signalr complete series] Net6 Zhongshi signalr communication
- Guide de migration Maui
- Implementation of one-dimensional convolutional neural network CNN based on FPGA (V) data quantization (with code)
- What great open source projects does Google have?
- Cloud broadcast alert, guanghetong helps intelligent camera to build a "river protection" drowning prevention system
猜你喜欢

再聊数据中心网络

2022 love analysis · privacy computing vendor panoramic report | love Analysis Report

Rational use of thread pool and thread variables

Guanghetong LTE Cat4 module l716 is upgraded to provide affordable and universal wireless applications for the IOT industry

详解 | 晶振的构造及工作原理

三层带防护内网红队靶场

为了实现零丢包,数据中心网络到底有多拼?

Discussion on the development trend of remote power management unit (Intelligent PDU)

A Security Analysis Of Browser Extensions

Vulkan-官方示例解读-RayTracing
随机推荐
June 10, 2022: Captain Shu crosses a sweet potato field from north to South (m long from north to South and N wide from east to West). The sweet potato field is divided into 1x1 squares. He can start
基于FPGA的一维卷积神经网络CNN的实现(五)数据量化(附代码)
Market prospect analysis and Research Report of digital line scan camera in 2022
Market prospect analysis and Research Report of beam combiner in 2022
Unity prefab scene 冲突合并工具 UnityYAMLMerge
写给通信年轻人的27个忠告
Discussion on the development trend of remote power management unit (Intelligent PDU)
Summary of C language implementation of BP neural network
ETH 中继接口
A.前缀极差(C语言)
检测php网站是否已经被攻破的方法
【CustomView】Glide+BitmapTransformation 图片上下边框波浪处理(WaveTransformation)
【CNN】|How much position information do convolutional neural networks encode?
MAUI 遷移指南
ESP8266_ RTOS modifies IP address and hostname in AP mode
Docker uses PXC to build a MySQL Cluster (mysql:5.7.24)
详解 | 晶振的构造及工作原理
雷达辐射源调制信号仿真(代码)
2022爱分析· 隐私计算厂商全景报告 | 爱分析报告
A - Eddy‘s AC难题(C语言)