Infinite micro-services architecture
First Claim
Patent Images
1. A method, comprising:
- automatically registering a plurality of micro-services with a central data storage device, the registering including determining a mapping between intermediate identifiers that identify selected micro-services and physical addresses of one or more servers that execute the selected micro-services, wherein each intermediate identifier of the intermediate identifiers is one or more of a name or a name space and is not an address;
executing a first micro-service using computer code including a first instruction, the first micro-service programmatically calling a second micro-service in the computer code with the first instruction including an intermediate identifier, the intermediate identifier being of the form of an x.y pair wherein x represents a name and y represents a type of authentication, the intermediate identifier being a first x.y pair or a second x.y pair, wherein the first x.y pair and the second x. y pair are fixed and do not change, the first micro-service using the second micro-service and calling the second micro-service via the intermediate identifier that identifies the second micro-service;
wherein the first x.y pair maps to a first prioritized table and the second x.y pair maps to a second prioritized table;
wherein the first prioritized table comprises a first plurality of first URLs arranged in a ranked priority order, each of the first URLs being a server address of a different server;
wherein the second prioritized table comprises a second plurality of second URLs arranged in a ranked priority order, each of the second URLs being a server address of a different server;
wherein when a server associated with a URL becomes disabled a first message is sent to the central data storage device, and responsively the URL of the disabled server is reduced in priority or removed from one or more of the first prioritized table or the second prioritized table, and the ranked priority order of one or more of the first prioritized table or the second prioritized table is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged;
wherein when a new server with a new URL that executes the new micro-service comes on line a second message is sent to the central data storage device, and responsively the new URL of the new server is added to one or more of the first prioritized table or the second prioritized table and the ranked priority order is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged;
wherein the computer code is executed including the first instruction and a determination is made as to whether the first x.y pair is being used or the second x.y pair is being used;
wherein the second micro-service is executed from the computer code by mapping the first x.y to the first prioritized table when the first x.y is being used, or by mapping the second x.y pair to the second prioritized table when the second x.y pair is being used, and subsequently utilizing the highest priority URL obtained from the first prioritized table or from the second prioritized table.
2 Assignments
0 Petitions
Accused Products
Abstract
A plurality of micro-services is automatically registered with a central data storage device. During registration, a mapping is determined between intermediate identifiers that identify selected micro-services and physical addresses of one or more servers that execute the selected micro-services. At least one of the physical addresses are dynamically updated based upon operational changes to the one or more servers or based upon a registration of an additional server.
-
Citations
6 Claims
-
1. A method, comprising:
-
automatically registering a plurality of micro-services with a central data storage device, the registering including determining a mapping between intermediate identifiers that identify selected micro-services and physical addresses of one or more servers that execute the selected micro-services, wherein each intermediate identifier of the intermediate identifiers is one or more of a name or a name space and is not an address; executing a first micro-service using computer code including a first instruction, the first micro-service programmatically calling a second micro-service in the computer code with the first instruction including an intermediate identifier, the intermediate identifier being of the form of an x.y pair wherein x represents a name and y represents a type of authentication, the intermediate identifier being a first x.y pair or a second x.y pair, wherein the first x.y pair and the second x. y pair are fixed and do not change, the first micro-service using the second micro-service and calling the second micro-service via the intermediate identifier that identifies the second micro-service; wherein the first x.y pair maps to a first prioritized table and the second x.y pair maps to a second prioritized table; wherein the first prioritized table comprises a first plurality of first URLs arranged in a ranked priority order, each of the first URLs being a server address of a different server; wherein the second prioritized table comprises a second plurality of second URLs arranged in a ranked priority order, each of the second URLs being a server address of a different server; wherein when a server associated with a URL becomes disabled a first message is sent to the central data storage device, and responsively the URL of the disabled server is reduced in priority or removed from one or more of the first prioritized table or the second prioritized table, and the ranked priority order of one or more of the first prioritized table or the second prioritized table is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged; wherein when a new server with a new URL that executes the new micro-service comes on line a second message is sent to the central data storage device, and responsively the new URL of the new server is added to one or more of the first prioritized table or the second prioritized table and the ranked priority order is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged; wherein the computer code is executed including the first instruction and a determination is made as to whether the first x.y pair is being used or the second x.y pair is being used; wherein the second micro-service is executed from the computer code by mapping the first x.y to the first prioritized table when the first x.y is being used, or by mapping the second x.y pair to the second prioritized table when the second x.y pair is being used, and subsequently utilizing the highest priority URL obtained from the first prioritized table or from the second prioritized table. - View Dependent Claims (2, 3)
-
-
4. A system, comprising:
-
a central data storage device; a plurality of servers executing a plurality of micro-services, wherein each of the servers executes a selected one of the plurality of micro-services, the plurality of servers being coupled to the central data storage device; wherein each of the plurality of micro-services registers with the central data storage device by determining a mapping between intermediate identifiers that identify selected ones of the micro-services and physical addresses of the servers, wherein each intermediate identifier of the intermediate identifiers is one or more of a name or a name space and is not an address; wherein a first micro-service is executed using computer code including a first instruction, the first micro-service programmatically calling a second micro-service in the computer code with the first instruction with an intermediate identifier, the intermediate identifier being of the form of an x.y pair wherein x represents a name and y represents a type of authentication, the intermediate identifier being a first x.y pair or a second x.y pair, wherein the first x.y pair and the second x. y pair are fixed and do not change, the first micro-service using the second micro-service and calling the second micro-service via the intermediate identifier that identifies the second micro-service; wherein the computer code is executed including the first instruction and a determination is made as to whether the first x.y pair is being used or the second x.y pair is being used; wherein the first prioritized table comprises a first plurality of first URLs arranged in a ranked priority order, each of the URLs being a server address of a different server; wherein the second prioritized table comprises a second plurality of second URLs arranged in a ranked priority order, each of the second URLs being a server address of a different server; wherein when a server associated with a URL becomes disabled a first message is sent to the central data storage device, and responsively the URL of the disabled server is reduced in priority or removed from one or more of the first prioritized table or the second prioritized table, and the ranked priority order of one or more of the first prioritized table or the second prioritized table is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged; wherein when a new server with a new URL that executes the new micro-service comes on line a second message is sent to the central data storage device, and responsively the new URL of the new server is added to one or more of the first prioritized table or the second prioritized table and the ranked priority order is readjusted and wherein the computer code and the intermediate identifier in the first instruction remain unchanged; wherein the computer code is executed including the first instruction and a determination is made as to whether the first x.y pair is being used or the second x.y pair is being used; wherein the second micro-service is executed from the computer code by mapping the first x.y to the first prioritized table when the first x.y is being used, or by mapping the second x.y pair to the second prioritized table when the second x.y pair is being used, and subsequently utilizing the highest priority URL obtained from the first prioritized table or from the second prioritized table. - View Dependent Claims (5, 6)
-
Specification