Process monitoring in a computer system
First Claim
1. A method of monitoring a process in a computer system using a process monitor, where the monitored process is not a child of the process monitor;
- the method including steps of;
a) uniquely determining the identity of a monitored process and verifying correct operation of the monitored process;
b) in the absence of verification of the correct operation of the monitored process, causing the monitored process to restart, the restarted process initially checking that it is operable and, if it is operable, indicating to the process monitor that it is operable and backgrounding itself, the monitored process, on successful restart, uniquely identifying itself to the computer system.
3 Assignments
0 Petitions
Accused Products
Abstract
The health of a process is monitored in a computer system by a process monitor. The monitored process (a configuration management system daemon (CMSD)) is not a child of the process monitor. The process monitor uniquely determines the identity of a monitored process and verifies the correct operation of the monitored process. In the absence of verification of the correct operation of the monitored process, the monitored process is caused to initiate. On successful initiation of the monitored process, the monitored process is uniquely identified to the system and is detached from the process monitor. Each monitored process is arranged to write, on initiation, its unique process identification information (PID) to a file, which file is then accessed by the process monitor to identify the process monitor. The process monitor can interrogate the operating system to verify correct operation of the CMSD. As an alternative, the process monitor could test whether the CMSD is functioning by making service requests to the CMSD.
-
Citations
44 Claims
-
1. A method of monitoring a process in a computer system using a process monitor, where the monitored process is not a child of the process monitor;
- the method including steps of;
a) uniquely determining the identity of a monitored process and verifying correct operation of the monitored process;
b) in the absence of verification of the correct operation of the monitored process, causing the monitored process to restart, the restarted process initially checking that it is operable and, if it is operable, indicating to the process monitor that it is operable and backgrounding itself, the monitored process, on successful restart, uniquely identifying itself to the computer system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
in the absence of an operable indication from the restarted monitored process, the process monitor issuing an error message and preventing further attempts to restart the monitored process.
- the method including steps of;
-
4. The method of claim 1, wherein the process monitor is a monitor process.
-
5. The method of claim 1, wherein the monitored process is a daemon process.
-
6. The method of claim 1, wherein the step (a) comprises attempting access to a predetermined location for process identification information uniquely identifying a monitored process.
-
7. The method of claim 6, wherein the predetermined location is a predetermined file.
-
8. The method of claim 1, wherein the monitored process is a configuration management system daemon.
-
9. The method of claim 8, wherein the configuration management system daemon responds to object definitions.
-
10. The method of claim 1, wherein step (a) comprises using the unique identity of the monitored process to verify correct operation of the monitored process.
-
11. The method of claim 10, wherein step (a) comprises interrogating an operating system of the computer system to verify correct operation of the monitored process.
-
12. The method of claim 10, wherein step (a) comprises requesting a service from the monitored process for verifying correct operation thereof.
-
13. A method of restarting a process to be monitored in a computer system, the method comprising:
-
spawning a new process; and
the new process checking that it is operable and, in response to determining that the new process is operable;
uniquely identifying itself to the computer system; and
causing an existing monitored process to terminate, whereby the new process becomes the monitored process. - View Dependent Claims (14, 15, 16)
a new process, an upgrade version of a process, or an existing process.
-
-
17. A computer system comprising a process to be monitored, the process to be monitored being configured, on successful initiation, uniquely to identify itself to the system, and a process monitor configured:
- uniquely to determine the identity of a monitored process;
to verify correct operation of the monitored process; and
, in the event of being unable to verify correct operation of the monitored process, to cause the monitored process to restart, wherein the monitored process, on successful restart, initially checks that it is operable and, if it is operable, indicates to the process monitor that it is operable, backgrounds itself and, uniquely identifies itself to the system. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
- uniquely to determine the identity of a monitored process;
- 37. A computer program on a carrier medium, the computer program forming a process monitor including program code configured uniquely to determine the identity of a monitored process, to verify correct operation of the monitored process, and, in the event of being unable to verify correct operation of the monitored process, to cause the monitored process to restart, such that the monitored process is not a child of the process monitor, and wherein the monitored process, on successful restart, initially checks that it is operable and, if it is operable, indicates to the process monitor that it is operable, backgrounds itself, and uniquely identifies itself to the system.
Specification