Continuous deployment of applications
First Claim
1. A computer-implemented method for deploying an application, the computer-implemented method comprising performing computer-implemented operations for:
- requesting creation of a backup comprising data representing a base version of the application executed by a first host environment and content hosted by the first host environment;
obtaining the backup at a second host environment;
loading the backup at the second host environment;
upgrading the application hosted by the second host environment to obtain an upgraded version of the application;
generating at the second host environment, a request for data indicating a content change that has occurred at the first host environment after creation of the backup;
obtaining the data indicating the content change at the second host environment; and
modifying content hosted by the second host environment in accordance with the data indicating the content change, wherein the data indicating the content change comprises a tombstone list, and wherein the tombstone list comprises a custom field for storing a unique identifier corresponding to a data record deleted via the content change.
2 Assignments
0 Petitions
Accused Products
Abstract
Concepts and technologies are described herein for continuously deploying applications. In accordance with the concepts and technologies disclosed herein, a first host environment executes an application. An upgrade for the application is released by creating a backup of the application and content used by the application and restoring the backup at a second host environment. The application hosted by the second host environment is upgraded, traffic is routed to the second host environment, and performance of the upgraded application is monitored. If errors are detected in the upgraded application, the upgrade can be rolled back, and traffic can be rerouted back to the first host environment. If the errors are not detected, traffic can be increasingly routed to the second host environment and the first host environment can be deactivated.
40 Citations
17 Claims
-
1. A computer-implemented method for deploying an application, the computer-implemented method comprising performing computer-implemented operations for:
-
requesting creation of a backup comprising data representing a base version of the application executed by a first host environment and content hosted by the first host environment; obtaining the backup at a second host environment; loading the backup at the second host environment;
upgrading the application hosted by the second host environment to obtain an upgraded version of the application;generating at the second host environment, a request for data indicating a content change that has occurred at the first host environment after creation of the backup; obtaining the data indicating the content change at the second host environment; and modifying content hosted by the second host environment in accordance with the data indicating the content change, wherein the data indicating the content change comprises a tombstone list, and wherein the tombstone list comprises a custom field for storing a unique identifier corresponding to a data record deleted via the content change. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for deploying an application, the computer-implemented method comprising performing computer-implemented operations for:
-
creating, at a first host environment, a backup comprising data representing a base version of the application executed by the first host environment and content hosted by the first host environment; obtaining the backup at a second host environment; loading the backup at the second host environment to install the base version of the application at the second host environment and to create a copy of the content at the second host environment; upgrading the base version of the application hosted by the second host environment to obtain an upgraded version of the application; generating, at the second host environment, a request for data indicating a content change that has occurred at the first host environment after creation of the backup; obtaining the data indicating the content change at the second host environment; and modifying content hosted by the second host environment in accordance with the data indicating the content change, wherein the data indicating the content change comprises a tombstone list. and wherein e tombstone list con irises a custom field for storming a unique identifier corresponding to a data record deleted via the content change. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A computer storage medium having computer readable instructions stored thereupon that, when executed by a computer, cause the computer to:
-
create a backup of a first host environment, the backup comprising data representing a base version of an application executed by the first host environment and content hosted by the first host environment; load the backup to a second host environment to install the base version of the application at the second host environment and to create a copy of the content at the second host environment; upgrade the base version of the application hosted by the second host environment to obtain an upgraded version of the application; generate, the second host environment, a request for data indicating a content change that has occurred at the first host environment after creation of the backup; obtain the data indicating the content change at the second host environment; and modify content hosted by the second host environment in accordance with the data indicating the content change to synchronize the content hosted at the first host environment and the content stored at the second host environment, wherein the data indicating the content change comprises a tombstone list. and wherein the tombstone list comprises a custom field for storing a unique identifier corresponding, to a data record deleted via the content change. - View Dependent Claims (16, 17)
-
Specification