US 11,962,467 B2
Managing heterogeneous cluster environment
Hitham Ahmed Assem Aly Salama, Dublin (IE); Teodora Sandra Buda, Dublin (IE); Patrick J. O'Sullivan, Dublin (IE); Philip Perry, Dublin (IE); and Lei Xu, Dublin (IE)
Assigned to International Business Machines Corporation, Armonk, NY (US); and UNIVERSITY COLLEGE DUBLIN, Dublin (IE)
Filed by International Business Machines Corporation, Armonk, NY (US); and UNIVERSITY COLLEGE DUBLIN, Dublin (IE)
Filed on Aug. 14, 2017, as Appl. No. 15/676,334.
Prior Publication US 2019/0052534 A1, Feb. 14, 2019
Int. Cl. H04L 41/12 (2022.01); H04L 41/08 (2022.01); H04L 41/0816 (2022.01); H04L 41/5003 (2022.01); H04L 43/0876 (2022.01); H04L 67/1029 (2022.01); H04L 67/1031 (2022.01); H04L 67/1074 (2022.01); H04L 67/1095 (2022.01); H04L 67/1097 (2022.01); H04L 67/54 (2022.01)
CPC H04L 41/12 (2013.01) [H04L 41/0816 (2013.01); H04L 41/0886 (2013.01); H04L 43/0876 (2013.01); H04L 67/1029 (2013.01); H04L 67/1031 (2013.01); H04L 67/1076 (2013.01); H04L 67/1095 (2013.01); H04L 67/1097 (2013.01); H04L 67/54 (2022.05); H04L 41/5003 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method for use in managing a cluster comprising a plurality of computers, each computer comprising at least one hardware processor coupled to at least one memory, the plurality of computers within the cluster comprising a leader node and a plurality of follower nodes, the method comprising:
the leader node of the cluster collecting access pattern data for the plurality of follower nodes within the cluster;
based at least in part on the access pattern data, the leader node of the cluster determining that at least a first one of the plurality of follower nodes within the cluster is overutilized by analyzing a historical access pattern; and
responsive to determining that the first follower node is overutilized, selecting a subset of data stored at the first follower node to move based on a determination that the subset of data is frequently accessed and the leader node of the cluster moving the selected subset of data stored on the first follower node to at least a second one of the plurality of follower nodes within the cluster to configure the first follower node and the second follower node to be subjected to similar access patterns.