-
公开(公告)号:US20240160428A1
公开(公告)日:2024-05-16
申请号:US18055624
申请日:2022-11-15
Applicant: Salesforce, Inc.
Inventor: Shrikant Thakare , Maxence Weyrich , Hemanth Siddulugari , Julian Chow , Shivakarthik Subramanyam
CPC classification number: G06F8/65 , G06F9/4881
Abstract: Techniques are disclosed relating to upgrading nodes. A computer system may detect that an updated node image has been created that is an update to a previous node image used to deploy a plurality of nodes into an environment associated with the computer system. The computer system may determine an upgrade order in which to upgrade a set of the plurality of nodes. The upgrade order may be determined based on a rank associated with a given node of the set of nodes by a ranking service. The computer system may then upgrade the set of nodes according to the upgrade order. The upgrading of a first node of the set of nodes may include deploying a second node based on the updated node image and then evicting a set of application pods from the first node and redeploying the set of application pods onto the second node.
-
公开(公告)号:US20240160354A1
公开(公告)日:2024-05-16
申请号:US18055615
申请日:2022-11-15
Applicant: Salesforce, Inc.
Inventor: Shrikant Thakare , Maxence Weyrich , Shivakarthik Subramanyam
IPC: G06F3/06
CPC classification number: G06F3/0617 , G06F3/0647 , G06F3/067
Abstract: Techniques are disclosed relating to upgrading nodes. A computer system may detect that there is an update to a node image used to deploy a set of nodes managed by the computer system. The computer system may select, for an upgrade process, a first node from the set of nodes that includes a first volume used to store data of applications executing on that first node. The computer system may upgrade the first node by deploying a second node running the updated node image, transition the first node to a read-only mode in which read transactions but not write transactions are routed to the applications, and copy particular data from the first volume of the first node to a second volume of the second node. The computer system may, after completion of the copy operation, evict the applications from the first node and redeploy them on the second node.
-