Method and apparatus for workflow based high availability analysis
First Claim
1. A computer-implemented method comprising:
- deploying an information network infrastructure comprising a plurality of deployed components on one or more computer nodes operating in a computer network;
executing a computerized process for analyzing the operation of the information network infrastructure over the computer network to identify at least one availability weak point of the deployed components of the information network infrastructure, wherein analyzing the operation of the information network infrastructure comprises;
determining a set of initial service workflows using information derived from both (i) one or more user-visible processes that are executed by users of the information network infrastructure and (ii) an application topology which implements services used by the user-visible processes;
determining internal relationships between applications in the application topology, wherein the internal relationships include invocations by one application of services of another application operating in the computer network;
defining a complete service workflow specification for the application topology by adding the determined internal relationships to the initial service workflows;
mapping the service workflow specification for the application topology to a topology of the information network infrastructure to generate a workflow data structure, wherein the workflow data structure comprises a component workflow data structure that provides information regarding a corresponding set of deployed components of the information network infrastructure, which are utilized by each of the user-visible processes that are executed by users of the information network infrastructure to perform a workflow of transactions through the information network infrastructure; and
performing an availability weak point analysis using the workflow data structure to determine one or more optimal high availability parameters for one or more of the deployed components of the information network infrastructure, wherein the one or more optimal high availability parameters comprises a parameter that specifies an amount to increase a capacity of one or more of the deployed components of the information network infrastructure; and
modifying the information network infrastructure by applying the one or more optimal high availability parameters to the one or more of the deployed components in the information network infrastructure so as to substantially eliminate one or more availability weak points in the one or more user-visible processes that are executed by users of the information network infrastructure,wherein the method is performed by executing program instructions by a computer.
1 Assignment
0 Petitions
Accused Products
Abstract
Techniques are disclosed for workflow based high availability analysis in computing systems. For example, a computer-implemented method for analyzing an information network infrastructure to identify one or more availability weak points includes the following steps. A workflow specification is provided based on one or more user-visible processes and an application topology. Service workflows associated with the specification are mapped from the application topology to the infrastructure to generate a workflow data structure. An availability weak point analysis is performed in accordance with the workflow data structure to determine one or more optimal high availability parameters for one or more deployed components of the infrastructure. The one or more optimal high availability parameters are applied in the infrastructure so as to substantially eliminate the one or more availability weak points.
28 Citations
20 Claims
-
1. A computer-implemented method comprising:
-
deploying an information network infrastructure comprising a plurality of deployed components on one or more computer nodes operating in a computer network; executing a computerized process for analyzing the operation of the information network infrastructure over the computer network to identify at least one availability weak point of the deployed components of the information network infrastructure, wherein analyzing the operation of the information network infrastructure comprises; determining a set of initial service workflows using information derived from both (i) one or more user-visible processes that are executed by users of the information network infrastructure and (ii) an application topology which implements services used by the user-visible processes; determining internal relationships between applications in the application topology, wherein the internal relationships include invocations by one application of services of another application operating in the computer network; defining a complete service workflow specification for the application topology by adding the determined internal relationships to the initial service workflows; mapping the service workflow specification for the application topology to a topology of the information network infrastructure to generate a workflow data structure, wherein the workflow data structure comprises a component workflow data structure that provides information regarding a corresponding set of deployed components of the information network infrastructure, which are utilized by each of the user-visible processes that are executed by users of the information network infrastructure to perform a workflow of transactions through the information network infrastructure; and performing an availability weak point analysis using the workflow data structure to determine one or more optimal high availability parameters for one or more of the deployed components of the information network infrastructure, wherein the one or more optimal high availability parameters comprises a parameter that specifies an amount to increase a capacity of one or more of the deployed components of the information network infrastructure; and modifying the information network infrastructure by applying the one or more optimal high availability parameters to the one or more of the deployed components in the information network infrastructure so as to substantially eliminate one or more availability weak points in the one or more user-visible processes that are executed by users of the information network infrastructure, wherein the method is performed by executing program instructions by a computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 12)
-
-
11. Apparatus comprising:
-
a memory; and a processor operatively coupled to the memory and configured to; deploy an information network infrastructure comprising a plurality of deployed components on one or more computer nodes operating in a computer network; execute a computerized process for analyzing the operation of the information network infrastructure over the computer network to identify at least one availability weak point of the deployed components of the information network infrastructure, wherein analyzing the operation of the information network infrastructure comprises; determining a set of initial service workflows using information derived from both (i) one or more user-visible processes that are executed by users of the information network infrastructure and (ii) an application topology which implements services used by the user-visible processes; determining internal relationships between applications in the application topology, wherein the internal relationships include invocations by one application of services of another application operating in the computer network; defining a complete service workflow specification for the application topology by adding the determined internal relationships to the initial service workflows; mapping the service workflow specification for the application topology to a topology of the information network infrastructure to generate a workflow data structure, wherein the workflow data structure comprises a component workflow data structure that provides information regarding a corresponding set of deployed components of the information network infrastructure, which are utilized by each of the user-visible processes that are executed by users of the information network infrastructure to perform a workflow of transactions through the information network infrastructure; and performing an availability weak point analysis using the workflow data structure to determine one or more optimal high availability parameters for one or more of the deployed components of the information network infrastructure, wherein the one or more optimal high availability parameters comprises a parameter that specifies an amount to increase a capacity of one or more of the deployed components of the information network infrastructure; and modify the information network infrastructure by applying the one or more optimal high availability parameters to the one or more of the deployed components in the information network infrastructure so as to substantially eliminate one or more availability weak points in the one or more user-visible processes that are executed by users of the information network infrastructure. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. An article of manufacture comprising a non-transitory computer readable storage medium including one or more programs which, when executed by a computer system perform the steps of:
-
deploying an information network, infrastructure comprising a plurality of deployed components on one or more computer nodes operating in a computer network; executing a computerized process for analyzing the operation of the information network infrastructure over the computer network to identify at least one availability weak point of the deployed components of the information network infrastructure, wherein analyzing the operation of the information network infrastructure comprises; determining a set of initial service workflows using information derived from both (i) one or more user-visible processes that are executed by users of the information network infrastructure and (ii) an application topology which implements services used by the user-visible processes; determining internal relationships between applications in the application topology, wherein the internal relationships include invocations by one application of services of another application operating in the computer network; defining a complete service workflow specification for the application topology by adding the determined, internal relationships to the initial service workflows; mapping the service workflow specification for the application topology to a topology of the information network infrastructure to generate a workflow data structure, wherein the workflow data structure comprises a component workflow data structure that provides information regarding a corresponding set of deployed components of the information network infrastructure, which we utilized by each of the user-visible processes that are executed by users of the information network, infrastructure to perform a workflow of transactions through the information network infrastructure; and performing an availability weak point analysis using the workflow data structure to determine one or more optimal high availability parameters for one or more of the deployed components of the information network infrastructure, wherein the one or more optimal high availability parameters comprises a parameter that specifies an amount to increase a capacity of one or more of the deployed components of the information network infrastructure; and modifying the information network infrastructure by applying the one or more optimal high availability parameters to the one or more of the deployed components in the information network infrastructure so as to substantially eliminate one or more availability weak points in the one or more user-visible processes that are executed by users of the information network infrastructure.
-
Specification