Patent application number | Description | Published |
20110106774 | Bootstrapping Server Using Configuration File Stored In Server-Managed Storage - A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data. | 05-05-2011 |
20130055018 | DETECTION OF LOGICAL CORRUPTION IN PERSISTENT STORAGE AND AUTOMATIC RECOVERY THEREFROM - A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site. | 02-28-2013 |
20140250323 | DETECTION OF LOGICAL CORRUPTION IN PERSISTENT STORAGE AND AUTOMATIC RECOVERY THEREFROM - A method, system, and computer program product for restoring blocks of data stored at a corrupted data site using two or more mirror sites. The method commences by receiving a trigger event from a component within an application server environment where the trigger event indicates detection of a corrupted data site. The trigger is classified into at least one of a plurality of trigger event types, which trigger event type signals further processing for retrieving from at least two mirror sites, a first stored data block and a second stored data block corresponding to the same logical block identifier from the first mirror site. The retrieved blocks are compared to determine a match value, and when the match value is greater than a confidence threshold, then writing good data to the corrupted data site before performing consistency checks on blocks in physical or logical proximity to the corrupted data site. | 09-04-2014 |
20140282475 | EMBEDDING PATCH LISTS WITHIN COMPILED PROGRAM CODE - Systems, methods, and other embodiments associated with maintaining information about patches installed on a node are described. In one embodiment, a method includes, in response to installing a patch to a program, updating a list of installed patches in a computer by adding an identifier of the patch to the list of installed patches. The method also includes embedding the updated list of installed patches into compiled binary code of the program. | 09-18-2014 |
20140376362 | DYNAMIC CLIENT FAIL-OVER DURING A ROLLING PATCH INSTALLATION BASED ON TEMPORAL SERVER CONDITIONS - A method, system, and computer program product for upgrade procedures in high-availability clustered systems. The method selects fail-over nodes during rolling patch installation and comprises steps for identifying a first node to upgrade, migrating services of the first node to a second node and shutting down the first node to perform its upgrade, then migrating the services back from the second node to the first node. When performing an upgrade of the other nodes of the cluster (e.g., nodes of the cluster other than the first node), rather than migrating the services of the node to be upgraded to another node that still needs to be upgraded, instead migrate the services of the node to be upgraded to a node that has already been upgraded. This reduces the brown-out time at least to the extent that this method incurs only one migration per node rather than two migrations per node. | 12-25-2014 |
20140379645 | SYSTEMS AND METHODS TO RETAIN AND RECLAIM RESOURCE LOCKS AND CLIENT STATES AFTER SERVER FAILURES - A method, system, and computer program for high-availability database systems. The method commences by replicating (e.g., from a first server to a second server) a data structure having entries describing resource locks and client states. The replication can be performed to any number of servers. Upon detecting a failure of a connection between the first server and a client to which the first server is connected, the system establishes a new connection between the second server and the client by updating the replicated data structure to describe new connection between the second server and the client and updating the entries of the replicated data structure to reflect the new connection and the then current aspects of the resource locks and client states. The client can be a database instance, and the act of replicating can be accomplished using a broadcast channel. The servers can be organized in a computing cluster. | 12-25-2014 |
20150089608 | AUTOMATIC CREATION AND MANAGEMENT OF CREDENTIALS IN A DISTRIBUTED ENVIRONMENT - A multi-node cluster is configured for credential management. A method commences by retrieving a super-user credential from a credential record stored in a location accessible to the cluster, then propagating the super-user credential to a set of nodes in the multi-node cluster. A credential creating processes is invoked on at least some of the set of nodes. Application-level credential access can be implemented in a multi-cluster environment by carrying-out an exchange that passes credentials between a first cluster and a second cluster over a secure channel. A protocol is observed whereby one or more applications running on the first cluster receive new credentials for accessing the second cluster from the credential serving process after the credential creating process creates the new credential. | 03-26-2015 |
20150160949 | BOOTSTRAPPING SERVER USING CONFIGURATION FILE STORED IN SERVER-MANAGED STORAGE - A method and apparatus for booting a clustered management system is provided where the configuration information required to boot the system is stored within the system itself. The techniques cope with several issues including finding the configuration data on the physical disk before the logical disk system is established, coping with replicated copies of configuration data, network partitions and disk drive failures that may prevent a booting node to have perfect knowledge of the state of the entire system, and active nodes modifying or moving configuration data while the booting node is searching for a consistent, correct copy of configuration data. | 06-11-2015 |