Using confidence values for synchronizing file systems
First Claim
1. A computer implemented method for analyzing an installation to determine a file system promotion path during an online patching cycle, the method comprising:
- identifying an initial run edition file system and a shadow file system, the shadow file system being at least some duration older than the initial run edition file system;
analyzing a history of changes that are applied to an installation of the initial run edition file system during the at least some duration to determine whether the changes cause instability for the initial run edition file system when an upcoming upgrade is applied to the initial run edition file system;
storing, at a first location of a non-transitory computer readable storage medium, a result of determining whether the changes cause instability as a confidence value;
determining whether to select the shadow file system or the initial run edition file system to be upgraded based in part or in whole upon the confidence value;
selecting the shadow file system to be upgraded with the upcoming upgrade when the confidence value is below a threshold; and
selecting the initial run edition file system to be upgraded with the upcoming upgrade when the confidence value is equal or above the threshold.
1 Assignment
0 Petitions
Accused Products
Abstract
A system, computer implemented method, and computer program product for analyzing an installation to determine a file system promotion path during an online patching cycle. The method commences by identifying an initial file system and a shadow file system, the shadow file system being at least some duration older than the initial run file system, then analyzing a history of events that occurred in or on the installation during the duration to determine a degree of confidence. Based on the degree of confidence, then selecting the initial file system to be used on the online patching cycle when the confidence value is equal or above a threshold, or selecting the shadow file system to be used in the online patching cycle when the confidence value is below a threshold. The history of events is recorded in forms of a patch list, a log file, or a list of configuration events.
81 Citations
20 Claims
-
1. A computer implemented method for analyzing an installation to determine a file system promotion path during an online patching cycle, the method comprising:
-
identifying an initial run edition file system and a shadow file system, the shadow file system being at least some duration older than the initial run edition file system; analyzing a history of changes that are applied to an installation of the initial run edition file system during the at least some duration to determine whether the changes cause instability for the initial run edition file system when an upcoming upgrade is applied to the initial run edition file system; storing, at a first location of a non-transitory computer readable storage medium, a result of determining whether the changes cause instability as a confidence value; determining whether to select the shadow file system or the initial run edition file system to be upgraded based in part or in whole upon the confidence value; selecting the shadow file system to be upgraded with the upcoming upgrade when the confidence value is below a threshold; and selecting the initial run edition file system to be upgraded with the upcoming upgrade when the confidence value is equal or above the threshold. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer system for analyzing an installation to determine a file system promotion path during an online patching cycle, comprising:
-
a computer processor to execute a set of program code instructions; and a memory to hold the program code instructions, in which the program code instructions comprises program code which, when executed by the computer processor, causes the computer processor to; identify an initial run edition file system and a shadow file system, the shadow file system being at least some duration older than the initial run edition file system; analyze a history of changes that are applied to the initial run edition file system during the at least some duration to determine whether the changes cause instability for the initial run edition file system when an upcoming upgrade is applied to the initial run edition file system; store, at a first location of the memory, a result of determining whether the changes cause instability as a confidence value; determine whether to select the shadow file system or the initial run edition file system to be upgraded based in part or in whole upon the confidence value; select the shadow file system to be upgraded with the upcoming upgrade when the confidence value is below a threshold; and select the initial run edition file system to be upgraded with the upcoming upgrade when the confidence value is equal or above the threshold. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer program product embodied in a non-transitory computer readable medium, the non-transitory computer readable medium having stored thereon a sequence of instructions which, when executed by a processor causes the processor to execute a set of acts to implement analyzing an installation to determine a file system promotion path during an online patching cycle, the set of acts comprising:
-
identifying an initial run edition file system and a shadow file system, the shadow file system being at least some duration older than the initial run edition file system; analyzing a history of changes that are applied to the initial run edition file system during the at least some duration to determine whether the changes cause instability for the initial run edition file system when an upcoming upgrade is applied to the initial run edition file system; store, at a first location of the memory, a result of determining whether the changes cause instability as a confidence value; determining whether to select the shadow file system or the initial run edition file system to be upgraded based in part or in whole upon the confidence value; selecting the shadow file system to be upgraded with the upcoming upgrade when the confidence value is below a threshold; and selecting the initial run edition file system to be upgraded with the upcoming upgrade when the confidence value is equal or above the threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification