Generating reverse installation file for network restoration
First Claim
1. A method comprising:
- accessing an original installation automation file used to generate a provisioning installation on a target;
accessing, by a processing device, a package management tool to identify one or more files installed on the target using the original installation automation file that have been modified;
embedding a copy of each of the one or more files that have been modified in a reverse installation automation file, the reverse installation automation file to re-install software resources on the target in the event of a malfunction;
inserting at least one of a path, a command, or a key associated with a file not controlled by the package management tool into the reverse installation automation file, wherein the file not controlled by the package management tool is stored in a backup storage system;
associating a set of security credentials comprising an authorized key for the target with the reverse installation automation file by embedding the set of security credentials in the reverse installation automation file, the authorized key corresponding to another machine which is authorized to access the target; and
storing the reverse installation automation file on a machine that is not the target.
1 Assignment
0 Petitions
Accused Products
Abstract
Embodiments relate to systems and methods for generating a reverse installation file for network restoration. A set of managed machines, such as personal computers or servers, can be managed by a network management engine communicating with the machines via a secure channel. The network management engine can scan the managed network for kickstart, or provisioning answer files, that were used to install software to network nodes at a prior time. The network management engine can access the original kickstart file, and update that file to reflect a current state of the associated machine by inserting user-supplied updates, storage configuration updates, security credentials, and/or other data. Upon a crash or other malfunction of the associated machine, the network management platform can access the reverse kickstart file and generate a restoration of that node to a current state from the reverse kickstart data.
-
Citations
17 Claims
-
1. A method comprising:
-
accessing an original installation automation file used to generate a provisioning installation on a target; accessing, by a processing device, a package management tool to identify one or more files installed on the target using the original installation automation file that have been modified; embedding a copy of each of the one or more files that have been modified in a reverse installation automation file, the reverse installation automation file to re-install software resources on the target in the event of a malfunction; inserting at least one of a path, a command, or a key associated with a file not controlled by the package management tool into the reverse installation automation file, wherein the file not controlled by the package management tool is stored in a backup storage system; associating a set of security credentials comprising an authorized key for the target with the reverse installation automation file by embedding the set of security credentials in the reverse installation automation file, the authorized key corresponding to another machine which is authorized to access the target; and storing the reverse installation automation file on a machine that is not the target. - View Dependent Claims (2, 3, 4, 5, 15)
-
-
6. A system, comprising:
-
a memory; and a processing device operatively coupled to the memory, the processing device to; access a package management tool to identify one or more files installed on a target device in a managed network using the original installation automation file that have been modified; embed a copy of each of the one or more files that have been modified in a reverse installation automation file, the reverse installation automation file to re-install software resources on the target in the event of a malfunction; insert at least one of a path, a command, or a key associated with a file not controlled by the package management tool into the reverse installation automation file, wherein the file not controlled by the package management tool is stored in a backup storage system; embed a set of security credentials comprising an authorized key for the target in the reverse installation automation file to associate the set of security credentials with the reverse installation automation file, the authorized key corresponding to another machine which is authorized to access the target; and store the reverse installation automation file on a machine that is not the target. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A non-transitory machine-readable medium storing instructions, that, when executed by a processing device, cause the processing device to:
-
access, by the processing device, a package management tool to identify one or more files installed on the target using an original installation automation file that have been modified; embed a copy of each of the one or more files that have been modified in a reverse installation automation file, the reverse installation automation file to re-install software resources on the target in the event of a malfunction; insert at least one of a path, a command, or a key associated with a file not controlled by the package management tool into the reverse installation automation file, wherein the file not controlled by the package management tool is stored in a backup storage system; embed a set of security credentials comprising an authorized key for the target in the reverse installation automation file to associate the set of security credentials with the reverse installation automation file, the authorized key corresponding to another machine which is authorized to access the target; and store the reverse installation automation file on a machine that is not the target. - View Dependent Claims (13, 14, 16, 17)
-
Specification