当前位置:网站首页>SQL Server database recovery case analysis
SQL Server database recovery case analysis
2022-06-24 02:00:00 【North Asia data security and rescue】
The fault environment is 4 Servers , Every server 12 The disk is divided into 2 Group raid, common 8 Group raid. According to the customer's description, a total of 4 Nodes , One of the nodes is still in use after failure , After the second section failure , A series of re launch operations have been carried out , The management storage software cannot be used . To prevent unrecoverable changes to the original disk due to some operations during data recovery , This leads to secondary data loss , Mirror the original disk . North Asia engineers conduct a detailed analysis , Get 5 Bottom image of all hard disks on node servers . Through the analysis of , It is found that the underlying index bitmap is damaged . Analyze all image files , Reorganize according to the underlying data raid, And extract each group raid Medium map, Data pair map Analyze , Manually index the data according to the bitmap , Exclude some corrupt bitmaps . The main data of the customer is SQL server database , After preliminary testing , The index bitmap is partially corrupted , Therefore, if the data is damaged after extracting the data volume , The database can be repaired . 【 Data recovery process 】 1. restructuring RAID The engineer is right about RAID Stripe size 、 Disk sequence 、 After analyzing the key information of the verification direction , Judge the offline order of the member disk . Ten groups were divided RAID Restructuring , And generate RAID Image file .
2. Data volume MAP check stay RAID To query and extract data volumes MAP Area . As shown in the figure :
View according to the index bitmap structure and index to the data area , check MAP Completeness and correctness of information , Exclude error indexing bitmap . Programming , according to MAP structure , Data pair MAP Analyze and organize , Sort out all key bitmap information . 3. Code writing and data volume generation First of all, according to the Lefthand Storage correlation structure algorithm , Write the corresponding data volume extraction program . Then use the written program to extract all data volumes .
Cause data MAP Partially damaged , According to the file system structure 、 File structure and other information to repair the data volume and verify the integrity and correctness of the extracted data volume . 4. Data volume analysis and repair Engineers analyze file systems in data volumes , And according to the structure of the file system , Verify the integrity and correctness of the file system . Parse the file system in the data volume , Get all the files , After viewing the file integrity and time information, extract the data in the data volume . 5. Database repair Data file extraction completed , Try attaching , Because the index bitmap is partially corrupted , Lead to SQL server The database cannot be attached directly , according to SQL server The data structure and data record storage rules perform a series of repair operations on the database . After repair , Install the same version of the database , Insert the repaired data into the new library .
6. data validation Customer led validation of data , After verification , Data is normally available . The recovery rate is 100%. about LeftHand Storage , We have mature recovery experience and recovery technology , In case of storage failure , Try not to do anything else , To avoid irreversible structural damage , Please restore professional data as soon as possible .
边栏推荐
- [JS reverse hundred examples] md5+aes encryption analysis of an easy payment password
- Introduction to development model + test model
- A multifunctional SSH Remote Server Management Tool
- 2021-11-10:o (1) time inserts, deletes and obtains random elements. Implement ra
- Six steps from strategy to product - johncutlefish
- Dart series: generics in dart classes
- Typescript is a weak type
- 2、 Shell position variable
- [technical grass planting] how to batch check your server status? Cloud probe panel setup tutorial
- Easycvr connects with Huawei IVS platform to query the foreign domain list interface definition and use sharing
猜你喜欢

BIM model example

Introduction to development model + test model

Stm32g474 infrared receiving based on irtim peripherals

layer 3 switch

How to fill in and register e-mail, and open mass mailing software for free
![[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)](/img/c8/f6c2a62b8ab8fa88bd2b3d8f35f592.jpg)
[SQL injection 12] user agent injection foundation and Practice (based on burpsuite tool and sqli labs LESS18 target machine platform)

163 mailbox login portal display, enterprise mailbox computer version login portal

I, a 27 year old female programmer, feel that life is meaningless, not counting the accumulation fund deposit of 430000
![[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)](/img/b5/a8c4bbaf868dd20b7dc9449d2a4378.jpg)
[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)

If there are enumerations in the entity object, the conversion of enumerations can be carried out with @jsonvalue and @enumvalue annotations
随机推荐
Super parameter tuning of neural network using keras tuner
Global and Chinese dealox industry development status and demand trend forecast report 2022-2028
Kubesphere upgrade & enable plug-ins after installation
[dry goods] configure failover active/acitve in transparent mode on Cisco ASA firewall
SAP mm Migo + 301 K can transfer vendor consignment inventory across factories
[SQL injection 13] referer injection foundation and Practice (based on burpseuite tool and sqli labs less19 target platform)
Gin framework: adding tracing Middleware
How to make a ECS into a fortress machine how long does it take to build a fortress machine
The core battlefield of China US AI arms race: trillion level pre training model
Six steps from strategy to product - johncutlefish
Comparison between rule engine and ML model - xlaszlo
SAP WM displays the standard report lx09 of TR item
Gin framework: implementing timeout Middleware
From idea to finished product, the necessary process of APP product development
[planting grass by technology] three big gifts prepared by Tencent cloud for you on the double 11, welcome to touch~
Tcapulusdb Jun · industry news collection
BIM model example
Query report of each mic quality inspection result on SAP QM inspection lot?
Echo framework: add tracing Middleware
Baysor: cell segmentation in imaging based spatial transcriptomics