In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-04-01 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
The main purpose of this article is to tell you briefly about the solution of malicious deletion of EXT3 MYSQL files. You can look up the relevant professional terms on the Internet or find some related books to supplement them. We will not dabble here, so let's go straight to the topic. I hope that this article on the solution of malicious deletion of EXT3 MYSQL files can bring you some practical help.
[description of data recovery failure]
The operating system and application environment of the customer CVM is redhat4.6 mysql, and the database is used to store the registration information of teachers and students. Every day, the linux script packages the database files into tar.gz to back up to other local data partitions. After the backup is successful, the backup files of the previous day are deleted. The system was maliciously encountered on a certain weekend, and all database files (including backups) were deleted.
[data recovery failure analysis]
This case belongs to ext3 file system data deletion. Theoretically, if the number of deleted files is relatively small and there are few write operations after deletion, the success rate of recovery will be higher, but if the number of deleted files is relatively large, then the possibility of full recovery of the data will be very small.
[data recovery process]
1. First of all, the user's data hard disk is completely mirrored, and the original media is in good physical condition.
two。 Determine the storage path of the original database file and backup file according to the relevant data information provided by the user, and determine that the database file has been backed up successfully on the last day according to the system log and other information. at the same time, it is found that the partition where the database backup file is located seldom writes after the file is deleted, while the system partition where the original database file is located has generated new system and temporary files after file deletion.
3. This paper mainly analyzes the partition where the database backup file is located, traces the file inode node back to the state before data deletion according to the relevant information of the backup file left by the file system, and migrates the backup file out.
4. Extract the recovered tar.gz file, and attach the database file to the corresponding database environment to verify the database record, confirm that the data is correct, and then deliver it to the customer for verification.
[data recovery results]
Data recovery takes a total of 3 hours, including 1 hour for mirroring the original disk and preliminary detection, and 2 hours for database backup file information search, recovery and verification.
[recommended storage security for CVM]
1. Operating system passwords should be set to be robust to increase the security of data storage and applications.
two。 The backup of database files should not be directly backed up to the local hard disk, but should be backed up to other storage through the network and other means.
3. After the data is lost, the operation of the partition where the lost data is located should be stopped as soon as possible to ensure the possibility of data recovery.
[data recovery performance pledge]
1. Free testing (test report can be issued)
two。 Sign a confidentiality agreement with the customer to keep the customer's data strictly confidential (no additional confidentiality fee)
3. Professional engineers provide data recovery services free of charge if not successful
4. The whole recovery process will not have any write operation to the customer's storage to ensure the data security of the original media.
5. Issue a recovery report after data recovery, and keep the data backup for 7 days free of charge
EXT3 MYSQL files have been maliciously deleted solutions to tell you here, for other related issues you want to know can continue to pay attention to our industry information. Our section will capture some industry news and professional knowledge to share with you every day.
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.