US 12,443,446 B2
Fencing off cluster services based on shared storage access keys
George Mathew, Belmont, CA (US); Abhinav Duggal, Fremont, CA (US); Senthil Ponnuswamy, San Jose, CA (US); and Mahadev Karadigudda, San Jose, CA (US)
Assigned to Dell Products L.P., Round Rock, TX (US)
Filed by Dell Products L.P., Round Rock, TX (US)
Filed on Aug. 3, 2022, as Appl. No. 17/879,910.
Application 17/879,910 is a continuation in part of application No. 17/854,318, filed on Jun. 30, 2022.
Prior Publication US 2024/0004712 A1, Jan. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. G06F 9/50 (2006.01); G06F 9/54 (2006.01)
CPC G06F 9/5016 (2013.01) [G06F 9/50 (2013.01); G06F 9/5072 (2013.01); G06F 9/54 (2013.01); G06F 9/544 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system for fencing off cluster services based on shared storage access keys comprising:
one or more processors; and
a non-transitory computer readable medium storing a plurality of instructions, which when executed, cause the one or more processors to:
request, by a cluster service, in response to receiving a cluster message upon a loss by a first service of cluster membership communications in a first node in a cluster, a shared storage to generate and then provide a new access key, thereby enabling the shared storage to use the new access key to validate requests from a plurality of services which have cluster membership communications in the cluster to access resources stored by the shared storage;
receive, by the cluster service, the new access key from the shared storage;
send, by the cluster service, the new access key in at least one or more cluster messages to at least a second service which has cluster membership communications in a second node in the cluster of nodes, in response to the cluster service receiving the new access key from the shared storage;
create, by the second service, a key based on the new access key; and
access, by the second service, a resource, which was previously accessed by the first service, by using the key to create a request to access the resource stored by the shared storage, and then sending the request to the shared storage.