Method and apparatus for securing and managing cluster computing in a network data processing system
First Claim
1. A method for detecting unauthorized cluster installations in a network data processing system, the method comprising:
- discovering a presence of cluster signatures in a number of data processing systems within the network data processing system;
determining which systems belong to respective clusters within the network data processing system;
determining whether a respective cluster is an authorized cluster or-an unauthorized cluster; and
performing a automated action in response to determining that the respective cluster is an unauthorized cluster.
1 Assignment
0 Petitions
Accused Products
Abstract
A method, apparatus, and computer instructions for detecting unauthorized cluster installations, managing clusters, installing clusters, and configuring clusters in a network data processing system. If a presence of cluster signatures in a number of data processing systems within the network data processing system is discovered, a determination is made as to which systems belong to respective clusters within the network data processing system. A cluster signature is used for finding a cluster. This signature may be used to identify the type and version of cluster installed. A determination is made as to whether a respective cluster is an authorized cluster. An automated action is performed in response to determining that the respective cluster is an unauthorized cluster.
37 Citations
26 Claims
-
1. A method for detecting unauthorized cluster installations in a network data processing system, the method comprising:
-
discovering a presence of cluster signatures in a number of data processing systems within the network data processing system;
determining which systems belong to respective clusters within the network data processing system;
determining whether a respective cluster is an authorized cluster or-an unauthorized cluster; and
performing a automated action in response to determining that the respective cluster is an unauthorized cluster. - View Dependent Claims (2, 3, 4)
-
-
5. A method for managing clusters in a network data processing system, the method comprising:
-
searching the network data processing system for a cluster signature, wherein the cluster signature indicates an installation of a clustering software;
responsive to finding a cluster signature on a data processing system within the network data processing system, determining whether the installation of the clustering software is authorized or unauthorized; and
responsive to determining that the installation is unauthorized, performing an automated action. - View Dependent Claims (6, 7, 8)
-
-
9. A method for installing a cluster in a network data processing system, the method comprising:
-
scanning the network data processing system for cluster signatures;
responsive to a presence of an authorized cluster signature on a node in the network data processing system, determining a version of clustering software on the node to form an identified version;
determining whether the identified version is a correct version of the clustering software or an incorrect version of the clustering software; and
installing a correct version of the clustering software if the identified version is an incorrect version of the clustering software. - View Dependent Claims (10)
-
-
11. A data processing system for detecting unauthorized cluster installations in a network data processing system, the data processing system comprising:
-
a bus system;
a communications unit connected to the bus system;
a memory connected to the bus system, wherein the memory includes a set of instructions; and
a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to discover a presence of cluster signatures in a number of data processing systems within the network data processing system;
determine which systems belong to respective clusters within the network data processing system;
determine whether a respective cluster is an authorized cluster or an unauthorized cluster; and
perform a automated action in response to determining that the respective cluster is an unauthorized cluster.
-
-
12. A data processing system for managing clusters in a network data processing system, the data processing system comprising:
-
a bus system;
a communications unit connected to the bus system;
a memory connected to the bus system, wherein the memory includes a set of instructions; and
a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to search the network data processing system for a cluster signature in which the cluster signature indicates an installation of a clustering software;
determine whether the installation of the clustering software is authorized or unauthorized in response to finding a cluster signature on a data processing system within the network data processing system; and
perform an automated action in response to determining that the installation is unauthorized.
-
-
13. A data processing system for installing a cluster in a network data processing system, the data processing system comprising:
-
a bus system;
a communications unit connected to the bus system;
a memory connected to the bus system, wherein the memory includes a set of instructions; and
a processing unit connected to the bus system, wherein the processing unit executes the set of instructions to scan the network data processing system for cluster signatures;
determine a version of clustering software on the node to form an identified version in response to a presence of an authorized cluster signature on a node in the network data processing system;
determine whether the identified version is a correct version of the clustering software or an incorrect version of the clustering software; and
install a correct version of the clustering software if the identified version is an incorrect version of the clustering software.
-
-
14. A data processing system for detecting unauthorized cluster installations in a network data processing system, the data processing system comprising:
-
discovering means for discovering a presence of cluster signatures in a number of data processing systems within the network data processing system;
first determining means for determining which systems belong to respective clusters within the network data processing system;
second determining means for determining whether a respective cluster is an authorized cluster or an unauthorized cluster; and
performing means for performing a automated action in response to determining that the respective cluster is an unauthorized cluster. - View Dependent Claims (15, 16, 17)
-
-
18. A data processing system for managing clusters in a network data processing system, the data processing system comprising:
-
searching means for searching the network data processing system for a cluster signature, wherein the cluster signature indicates an installation of a clustering software;
determining means, responsive to finding a cluster signature on a data processing system within the network data processing system, for determining whether the installation of the clustering software is authorized or unauthorized; and
performing means, responsive to determining that the installation is unauthorized, for performing an automated action. - View Dependent Claims (19, 20, 21)
-
-
22. A data processing system for installing a cluster in a network data processing system, the data processing system comprising:
-
scanning means for scanning the network data processing system for cluster signatures;
first determining means, responsive to a presence of an authorized cluster signature on a node in the network data processing system, for determining a version of clustering software on the node to form an identified version;
second determining means for determining whether the identified version is a correct version of the clustering software or an incorrect version of the clustering software; and
installing means for installing a correct version of the clustering software if the identified version is an incorrect version of the clustering software. - View Dependent Claims (23)
-
-
24. A computer program product in a computer readable medium for detecting unauthorized cluster installations in a network data processing system, the computer program product comprising:
-
first instructions for discovering a presence of cluster signatures in a number of data processing systems within the network data processing system;
second instructions for determining which systems belong to respective clusters within the network data processing system;
third instructions for determining whether a respective cluster is an authorized cluster or an unauthorized cluster; and
fourth instructions for performing a automated action in response to determining that the respective cluster is an unauthorized cluster.
-
-
25. A computer program product in a computer readable medium for managing clusters in a network data processing system, the computer program product comprising:
-
first instructions for searching the network data processing system for a cluster signature, wherein the cluster signature indicates an installation of a clustering software;
second instructions, responsive to finding a cluster signature on a data processing system within the network data processing system, for determining whether the installation of the clustering software is authorized or unauthorized; and
third instructions, responsive to determining that the installation is unauthorized, for performing an automated action.
-
-
26. A computer program product in a computer readable medium for installing a cluster in a network data processing system, the computer program product comprising:
-
first instructions for scanning the network data processing system for cluster signatures;
second instructions, responsive to a presence of an authorized cluster signature on a node in the network data processing system, for determining a version of clustering software on the node to form an identified version;
third instructions for determining whether the identified version is a correct version of the clustering software or an incorrect version of the clustering software; and
fourth instructions for installing a correct version of the clustering software if the identified version is an incorrect version of the clustering software.
-
Specification