×

Controlling access of clients to service in cluster environment

  • US 9,665,450 B2
  • Filed: 10/14/2015
  • Issued: 05/30/2017
  • Est. Priority Date: 02/14/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • creating a first set of addresses registered in a name server, a second set of addresses not registered in the name server, and available for assignment to any server because no client accesses any server via any address within the second set, and a third set of addresses not registered in the name server, and unavailable for assignment to any server because each address of the third set is used by at least one client to access a corresponding server to which the address was previously assigned;

    moving, by an address pool controller hardware device, a first address of the first set of addresses registered in the name server from a first server that has failed to a second server;

    prohibiting access to the first server;

    moving, by the address pool controller hardware device, the first address from the first set of addresses to the third set of addresses;

    removing, by the address pool controller hardware device, the first address from the name server;

    evaluating, by the address pool controller hardware device, one or more monitored usage parameter values of the first address to determine whether at least one of the monitored usage parameter values is below a minimum usage threshold value; and

    in response to determining that the at least one of the monitored usage parameter values is below the minimum usage threshold value, moving, by the address pool controller hardware device, the first address from the third set of addresses to the second set of addresses,wherein the second server holds processes assigned to the first address, the processes assigned to the first address being one or more of processes that were already initiated on the first server before occurrence of an incident resulting in failure of the first server, and processes being requested by the client after the occurrence of the incident, the client having cached the first address before the occurrence of the incident.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×