Apparatus, system, and method for verified fencing of a rogue node within a cluster
First Claim
1. An apparatus for verified fencing of a rogue node within a cluster, the apparatus comprising:
- an identification module configured to detect a network cluster partition and identify a rogue node within a cluster;
a shutdown module configured to send a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
a confirmation module configured to receive a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down.
1 Assignment
0 Petitions
Accused Products
Abstract
An apparatus, system, and method are provided for verified fencing of a rogue node within a cluster. The apparatus may include an identification module, a shutdown module, and a confirmation module. The identification module detects a cluster partition and identifies a rogue node with a cluster. The shutdown module sends a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster. The shutdown message may optionally permit the rogue node to preserve latent I/O data prior to shutting down. The confirmation module receives a shutdown ACK from the rogue node 206. Preferably, the shutdown ACK is sent just prior to the rogue node actually shutting down.
93 Citations
30 Claims
-
1. An apparatus for verified fencing of a rogue node within a cluster, the apparatus comprising:
-
an identification module configured to detect a network cluster partition and identify a rogue node within a cluster;
a shutdown module configured to send a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
a confirmation module configured to receive a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. An apparatus for verified fencing of a rogue node within a cluster, the apparatus comprising:
-
a message module configured to read a shutdown message from a message repository shared by the apparatus and a cluster of nodes;
a shutdown module configured to shutdown the apparatus; and
a confirmation module configured to send a shutdown acknowledgement (ACK) from the apparatus, the shutdown ACK sent just prior to the apparatus shutting down. - View Dependent Claims (11, 12, 13)
-
-
14. A system to provide verified fencing of a rogue node within a cluster, the system comprising:
-
a plurality of network nodes cooperating to share resources with disparate software applications;
a shared persistent repository accessible to each of the network nodes;
a failover module operating on each node, the failover module comprising an identification module configured to detect a network cluster partition and identify a rogue node within a cluster;
a shutdown module configured to send a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
a confirmation module configured to receive a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down. - View Dependent Claims (15, 16, 17, 18, 19)
-
-
20. A method for verified fencing of a rogue node within a cluster, the method comprising:
-
detecting a network cluster partition and identifying a rogue node within a cluster;
sending a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
receiving a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27)
-
-
28. A signal bearing medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform operations to verify fencing of a rogue node within a cluster, the operations comprising:
-
operation to detect a network cluster partition and identify a rogue node within a cluster;
operation to send a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
operation to receive a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down. - View Dependent Claims (29)
-
-
30. A signal bearing medium tangibly embodying a program of machine-readable instructions executable by a digital processing apparatus to perform operations to verify fencing of a rogue node within a cluster, the operations comprising:
-
a means for detecting a network cluster partition and identifying a rogue node within a cluster;
a means for sending a shutdown message to the rogue node using a message repository shared by the rogue node and the cluster; and
a means for receiving a shutdown acknowledgement (ACK) from the rogue node, the shutdown ACK sent just prior to the rogue node shutting down.
-
Specification