Method and system for transparently failing over a computer name in a server cluster
First Claim
1. A method of returning a computer identity to an application independent of the machine on which the application is running, comprising:
- providing a machine for running the application, the machine having a first computer identity;
associating a second computer identity with the application;
receiving a request from the application to return a computer identity to the application;
determining that the application is set for failing over in a cluster environment; and
returning the second computer identity to the application in response to the request.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for transparently failing over a computer name with a legacy application running in a server cluster. When the application is set for failing over in the cluster, the cluster software locates a virtual computer name on which the application is dependent, and associates the virtual name with the application. When the application runs and requests its computer name from the system, the system looks for the virtual computer name, and, if detected, the system returns the virtual computer name to the application as the computer name. The virtual computer name thus moves with the application regardless of the machine on which it is running in the cluster. When the application is not set for failing over in the cluster, the system instead returns the actual machine name.
-
Citations
42 Claims
-
1. A method of returning a computer identity to an application independent of the machine on which the application is running, comprising:
-
providing a machine for running the application, the machine having a first computer identity;
associating a second computer identity with the application;
receiving a request from the application to return a computer identity to the application;
determining that the application is set for failing over in a cluster environment; and
returning the second computer identity to the application in response to the request. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of selectively returning a computer identity to an application, comprising:
-
(a) providing a machine for running the application, the machine having a first computer identity;
(b) determining if the application is to be failed over in a server cluster, and if the application is to be failed over, associating with the application a second computer identity that is independent of the machine;
(c) running the application;
(d) receiving a request from the application to return a computer identity to the application, and in response, determining if the second computer identity is associated with the running application; and
(i) if the second computer identity is associated with the running application, returning the second computer identity to the application in response to the request, and (ii) if the second computer identity is not associated with the running application, returning the first computer identity to the application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. In a server cluster, a method of returning a computer name to an application, comprising:
-
receiving a request to run the application on a machine in the cluster;
establishing a process environment block associated with the application;
searching a dependency tree for a virtual computer name related to the application;
writing the virtual computer name into the process environment block;
running the application;
receiving a request from the application to return a computer name thereto;
detecting the virtual computer name in the process environment block; and
returning the virtual computer name to the application as the computer name. - View Dependent Claims (20, 21, 22, 23, 24, 25, 26)
-
-
27. In a server cluster, a system for returning a computer name to an application, comprising:
-
a dependency tree maintained in the cluster for the application, the dependency tree including a virtual computer name in a dependent relationship with the application;
a block of information associated with the application;
a mechanism for searching the dependency tree to locate the virtual computer name and for writing the virtual computer name into the block of information; and
an interface for receiving a request from the application to return a computer name thereto, the interface returning the virtual computer name in the block of information to the application as the computer name. - View Dependent Claims (28, 29, 30, 31, 32)
-
-
33. In a server cluster, a method of failing over a computer name with an application, comprising:
-
(a) relating the application to a virtual computer name;
(b) on a first machine of the cluster;
(i) associating the application with the virtual computer name;
(ii) running the application;
(iii) detecting a request for a computer name from the application;
(iv) returning the virtual computer name in response to the request; and
(v) failing the application;
and (c) on a second machine of the cluster;
(i) associating the application with the virtual computer name;
(ii) running the application;
(iii) detecting a request for a computer name from the application, and (iv) returning the virtual computer name in response to the request. - View Dependent Claims (34, 35, 36, 37)
-
-
38. A method of selectively returning a computer identity to a running application, comprising:
-
(a) running the application on a machine having a first computer identity;
(b) receiving a request from the application to return a computer identity to the application, and in response;
(i) determining if the application is set for failing over in a server cluster, and (1) if the application is set for failing over, returning a second computer identity that is independent of the machine in response to the request; and
(2) if the application is not set for failing over, returning the first computer identity in response to the request. - View Dependent Claims (39, 40, 41, 42)
-
Specification