File access for applications deployed in a cloud environment
First Claim
1. A method of operating a computer system, the method comprising:
- reading file settings definitions that comprise identifications and properties of files that are configured to be accessed by a computer application;
replacing operations of a file interface in the computer application with file access interceptor operations that use the file settings to provide access to the files without file attributes in the computer application;
managing file access via the file access interceptor operations to provide data file storage and read access to the files; and
synchronizing file actions in each of a plurality of instances of the files,wherein replacing operations of the file interface comprises;
receiving a file access request from the computer application; and
generating a replacement file access request that provides the computer application with access to the file,wherein the file comprises a database file that includes data elements stored therein and that is used by a database application that operates using the database file, andwherein the file access request comprises file access parameters that identify a portion of the database file to be retrieved without retrieving other portions of the database file,wherein the file access interceptor receives an interceptor definition from the computer application and generates the replacement operation based on the interceptor definition,wherein the interceptor definition corresponds to a file request, andwherein the file request comprises a plurality of file settings corresponding to the data source that the computer application is configured to access.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of operating a virtual computer system including a file access interceptor and multiple virtual machines that are logically arranged in a virtualization environment that is managed by a virtualization environment manager is provided. The method includes reading file settings definitions that include identifications and properties of files that are configured to be accessed by a computer application, replacing operations of a file interface in the computer application using with file access interceptor operations that use the file settings to decouple file attributes from the computer application, managing file access via the file access interceptor operations to provide data file storage and read access to the files, and synchronizing file actions in each of a plurality of instances of the files. Related systems and computer program products are disclosed.
-
Citations
24 Claims
-
1. A method of operating a computer system, the method comprising:
-
reading file settings definitions that comprise identifications and properties of files that are configured to be accessed by a computer application; replacing operations of a file interface in the computer application with file access interceptor operations that use the file settings to provide access to the files without file attributes in the computer application; managing file access via the file access interceptor operations to provide data file storage and read access to the files; and synchronizing file actions in each of a plurality of instances of the files, wherein replacing operations of the file interface comprises; receiving a file access request from the computer application; and generating a replacement file access request that provides the computer application with access to the file, wherein the file comprises a database file that includes data elements stored therein and that is used by a database application that operates using the database file, and wherein the file access request comprises file access parameters that identify a portion of the database file to be retrieved without retrieving other portions of the database file, wherein the file access interceptor receives an interceptor definition from the computer application and generates the replacement operation based on the interceptor definition, wherein the interceptor definition corresponds to a file request, and wherein the file request comprises a plurality of file settings corresponding to the data source that the computer application is configured to access. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer program product for operating a computer system including a plurality of managed machines that use resources of the computer system, the computer program product comprising:
-
a non-transitory computer readable storage medium having computer readable program code embodied in the medium, the computer readable program code comprising; computer readable program code configured to replace a file interface operation of a computer application with a replacement operation corresponding to a data source that the computer application is configured to access; and computer readable program code configured to connect a cloud access control manager to the file access interceptor to synchronize multiple instances of the data source, wherein the computer readable program code configured to replace the file interface operation include computer readable program code to receive a file access request from the computer application and generate a replacement file access request that provides the computer application with access to the file, wherein the file access request comprises file access parameters that identify a portion of the file to be retrieved without retrieving other portions of the file, wherein the file comprises a database file that includes data elements stored therein and that is used by a database application that operates using the database file, wherein the file access interceptor receives an interceptor definition from the computer application and generates the replacement operation based on the interceptor definition, wherein the interceptor definition corresponds to a file request, and wherein the file request comprises a plurality of file settings corresponding to the data source that the computer application is configured to access.
-
-
10. A computer system, comprising:
-
a processor; a file access interceptor that, when executed by the processor, replaces a file interface operation of a computer application with a replacement operation corresponding to a data source that the computer application is configured to access; and a file access connector that, when executed by the processor, connects a cloud access control manager to the file access interceptor to coordinate multiple instances of the data source, wherein the data source that the computer application is configured to access comprises a database file that includes data elements stored therein that exclude the database file as a data element and that is used by a database application that operates using the database file, wherein the replacement operation includes a file request to the database file, the file request including a plurality of file settings that include query parameters corresponding to a query that is configured to be submitted to the database file, wherein the query parameters include data ranges corresponding to a field in the database file, wherein the file access interceptor receives an interceptor definition from the computer application and generates the replacement operation based on the interceptor definition, wherein the interceptor definition corresponds to a file request, and wherein the file request comprises a plurality of file settings corresponding to the data source that the computer application is configured to access. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A computer system, comprising:
-
a processor; a file access interceptor that, when executed by the processor, replaces a file interface operation of a computer application with a replacement operation corresponding to a data source that the computer application is configured to access; a file access connector that, when executed by the processor, connects a cloud access control manager to the file access interceptor to coordinate multiple instances of the data source; and a plurality of managed machines, each of the managed machines comprises a respective file access interceptor that replaces a respective file interface operation of a respective computer application with a respective replacement operation corresponding to access to the data source that the respective computer application is configured to access, wherein the data source that the computer application is configured to access comprises a database file that includes data elements stored therein that exclude the database file as a data element and that is used by a database application that operates using the database file, wherein the replacement operation includes a file request to the database file, the file request including a plurality of file settings that include query parameters corresponding to a query that is configured to be submitted to the database file, wherein the query parameters include data ranges corresponding to a field in the database file, and wherein the file access interceptor includes a priority module that generates priority data that corresponds to a determination of which of the respective computer applications has priority to access the data source. - View Dependent Claims (20, 21, 22, 23, 24)
-
Specification