Systems and methods for managing application availability
First Claim
1. A computer-implemented method for managing application availability, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying an application running on a first cluster node of a failover cluster by receiving a request to stop the application;
determining that the application is a non-cluster-aware application that is not configured to take advantage of failover capabilities in a traditional cluster environment;
in response to determining that the application is not cluster aware, determining that configuration data of the application should be copied to a storage location accessible by a second cluster node of the failover cluster;
in response to determining that the configuration data of the application should be copied to the storage location, copying the configuration data of the application to the storage location by taking a backup of the configuration data after the application is stopped;
detecting failure of the first cluster node;
restoring the configuration data to the second cluster node by copying the configuration data to a memory region that stores registry data for the application such that the application is configured with the configuration data on the second cluster node;
executing the application on the second cluster node in accordance with the configuration data.
7 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for managing application availability. The method may include identifying an application running on a first cluster node of a failover cluster and copying configuration data of the application to a storage location accessible by a second cluster node of the failover cluster. The method may also include detecting failure of the first cluster node, restoring the configuration data to the second cluster node, and executing the application on the second cluster node in accordance with the configuration data. Various other methods, systems, and computer-readable media are also disclosed herein.
-
Citations
17 Claims
-
1. A computer-implemented method for managing application availability, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying an application running on a first cluster node of a failover cluster by receiving a request to stop the application; determining that the application is a non-cluster-aware application that is not configured to take advantage of failover capabilities in a traditional cluster environment; in response to determining that the application is not cluster aware, determining that configuration data of the application should be copied to a storage location accessible by a second cluster node of the failover cluster; in response to determining that the configuration data of the application should be copied to the storage location, copying the configuration data of the application to the storage location by taking a backup of the configuration data after the application is stopped; detecting failure of the first cluster node; restoring the configuration data to the second cluster node by copying the configuration data to a memory region that stores registry data for the application such that the application is configured with the configuration data on the second cluster node; executing the application on the second cluster node in accordance with the configuration data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for managing application availability, the system comprising:
-
an identification module programmed to; identify an application running on a first cluster node of a failover cluster by receiving a request to stop the application; determine that the application is a non-cluster-aware application that is not configured to take advantage of failover capabilities in a traditional cluster environment; in response to determining that the application is not cluster aware, determining that configuration data of the application should be copied to a storage location accessible by a second cluster node of the failover cluster; a monitoring module programmed to, in response to determining that the configuration data of the application should be copied to the storage location, copy the configuration data of the application to the storage location by taking a backup of the configuration data after the application is stopped; a first cluster agent installed on the first cluster node and programmed to communicate with the monitoring module; a second cluster agent installed on the second cluster node and programmed to; detect failure of the first cluster node; restore the configuration data to the second cluster node by copying the configuration data to a memory region that stores registry data for the application such that the application is configured with the configuration data on the second cluster node; execute the application on the second cluster node in accordance with the configuration data; at least one processor configured to execute the identification module, the monitoring module, the first cluster agent, and the second cluster agent. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A non-transitory computer-readable-storage medium comprising one or more computer-executable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify an application running on a first cluster node of a failover cluster by receiving a request to stop the application; determine that the application is a non-cluster-aware application that is not configured to take advantage of failover capabilities in a traditional cluster environment; in response to determining that the application is not cluster aware, determine that configuration data of the application should be copied to a storage location accessible by a second cluster node of the failover cluster; in response to determining that the configuration data of the application should be copied to the storage location, copy the configuration data of the application to the storage location by taking a backup of the configuration data after the application is stopped; detect failure of the first cluster node; restore the configuration data to the second cluster node by copying the configuration data to a memory region that stores registry data for the application such that the application is configured with the configuration data on the second cluster node; execute the application on the second cluster node in accordance with the configuration data. - View Dependent Claims (14, 15, 16, 17)
-
Specification