-
公开(公告)号:US10901771B2
公开(公告)日:2021-01-26
申请号:US16255768
申请日:2019-01-23
Applicant: VMware, Inc.
Inventor: Srinivas Neginhal , Medhavi Dhawan , Vjekoslav Brajkovic , Cheng Zhang , Jiaqi Chen , David Tsai , Maithem Munshed , Zeeshan Lokhandwala , Ming Wen , Ragnar Edholm , Rajneesh Bajpai
IPC: G06F9/46 , G06F9/455 , H04L29/06 , G06F16/182 , G06F3/06
Abstract: Certain embodiments described relate to methods and systems for adding one or more nodes to a first cluster including a first node in a computer system. A method performed by the first node comprises retrieving a first cluster configuration associated with the first cluster from a distributed database through a first database server (DBS) and creating a second cluster configuration using the first cluster configuration and information received from a second node as part of a request to join the first cluster. The method further comprises populating a first one or more local trust stores of a first one or more processes executing on the first node with a second one or more security certificates of a second one or more processes executing on the second node. The method further comprises writing the second cluster configuration to the distributed database and returning the second cluster configuration to the second node.
-
2.
公开(公告)号:US20200233689A1
公开(公告)日:2020-07-23
申请号:US16255768
申请日:2019-01-23
Applicant: VMware, Inc.
Inventor: Srinivas NEGINHAL , Medhavi Dhawan , Vjekoslav Brajkovic , Cheng Zhang , Jiaqi Chen , David Tsai , Maithem Munshed , Zeeshan Lokhandwala , Ming Wen , Ragnar Edholm , Rajneesh Bajpai
IPC: G06F9/455 , H04L29/06 , G06F16/182 , G06F3/06
Abstract: Certain embodiments described herein are directed to methods and systems for adding one or more nodes to a first cluster including a first node in a computer system. A method performed by the first node comprises receiving a first request from a second node to join the first cluster. The method also comprises retrieving a first cluster configuration associated with the first cluster from a distributed database through a first database server (DBS) and creating a second cluster configuration using the first cluster configuration and information received from the second node as part of the request. The method further comprises populating a first one or more local trust stores of a first one or more processes executing on the first node with a second one or more security certificates of a second one or more processes executing on the second node. The method further comprises writing the second cluster configuration to the distributed database and returning the second cluster configuration to the second node.
-