Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Explain the operation method of NetAppFAS3220 data recovery in detail

2025-04-02 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Servers >

Share

Shulou(Shulou.com)06/03 Report--

I. Overview of NetApp FAS3220:

NetApp FAS3220 is a midrange storage array launched by NetApp, which is built for NAS and SAN environments and is customized for virtualization, private cloud or traditional or previous uses. It is suitable for storage requirements ranging from a few TB to more than 2PB, providing data protection, scalability, automatic streamlining configuration, simplified cloning, backup and disaster recovery. The following describes the method of data recovery of NetApp FAS3220 storage.

Second, fault information:

The NetApp FAS 3220 model storage, hardware environment is a total of 96 pieces of 600G SAS hard disk, hard disk and ordinary hard disk is not the same, the sector size of this hard disk is 520byte a sector, the upper application environment is also very complex, all lun are mapped to the minicomputer, storage is Oracle database files or ASM bare device storage mode.

It may be a staff error, misoperation deleted all the lun on the storage, it is understood that at that time is to replan the storage space, directly delete all the storage volumes for reallocation. When the upper layer business went down before it was allocated after deletion, the operation and maintenance engineer urgently checked the failure and found that all the disks on the business server were gone, there was no way to access the data, and the operation error was found. Start the data recovery plan urgently.

3. Operation steps:

In order to protect the on-site environment and prevent secondary damage to the original disk caused by misoperation in the process of data recovery, the North Asian data recovery engineer mirrored each disk completely read-only. Since then, all restore operations are performed on the mirror file.

At the same time, the North Asia engineer urgently worked out the recovery plan to explain to the customer the feasibility of the recovery plan. After the customer approved the plan, we immediately implemented it in accordance with the plan. Here are the specific implementation steps of the recovery plan:

1. Stored procedure analysis of Netapp storage:

The first step is to analyze the disk sequence and the composition of LVM.

The second step is to scan all nodes in the hard disk.

The third step is to find the node whose file size meets the requirements in the node scan results and extract this node.

In the fourth step, all the direct data pointers of this file are extracted according to the first-level data pointer in the index root, and the file data is extracted after the pointer extraction is finished.

2. Parsing super block

Find the information about the super block in the front sector of the hard disk, and get the corresponding information from the super block. The following figure shows the basic information of the super block:

3. Eliminate the check disk

The data block will have block description information. Based on this information, you can determine which disks are check disks (the check disks need to be removed when extracting data). The following figure shows the description information of the check block:

4. Judge the order of aggr.

The disk sequence analysis is mainly based on the disk information of each disk and the RAID disk sequence table to determine the disk order. First of all, it is necessary to determine the aggr group to which each disk belongs, and then judge the disk order in the group and obtain the disk order of the data disk.

5. analysis of node and node head information.

The nodes of Netapp are distributed in a large number of data blocks, and are uniformly organized into node groups within the data blocks. Some bytes of each node group record some system data, and the partial bytes are a record of each file node. According to the user level, it can be divided into two categories: system file node and user file node.

6. Obtain the catalog item, and find the corresponding node according to its node number, as shown below:

7. After analyzing the storage structure, we began to use the NetApp parser in North Asia to extract the data, parse the asm file system, and extract the database files.

8. Set up the minicomputer environment, install oracle database, detect database files and backup files.

1. Detect database files

Start the database using the extracted database file and start normally

2. Detect database backup files

Filter out the latest database backup files, use the filtered backup files to restore the database, after one by one attempt, screen out the latest available database backup, restore the database environment, and be verified by the customer. the customer confirmed the database recovery, and the data recovery was a complete success.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Servers

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report