Algorithm for maximizing application availability during automated enterprise deployments

ABSTRACT

A method of deploying enterprise applications or updates to data processing systems in a complex data processing environment. The enterprise applications or updates are phase deployed to the target data processing systems. Phased deployment includes the steps of preparing one affected node, quiescing all affected servers in the node, stopping all affected servers in the node, synchronizing the node, delivering the applications or updates, starting all affected servers, reactivating all affected servers, restoring the affected node, and repeating these steps for each affected node one at a time until all targeted data processing systems have been affected.

CROSS REFERENCE TO RELATED APPLICATION

The present invention is related to the following application entitledAlgorithm for Automated Enterprise Deployments, Ser. No. ______ attorneydocket no. CA920040134US1 filed on Dec. 3, 2004.

BACKGROUND OF THE INVENTION

1. Technical Field

The present invention is related generally to a data processing systemand in particular to a method and apparatus for processing data. Stillmore particularly, the present invention relates to a method, apparatus,and computer instructions for maximizing application availability whileautomatically deploying enterprise applications or updates in complexdata processing environments.

2. Description of Related Art

Modern data processing environments can be extremely complex. A dataprocessing environment may have a vast number of data processing systemsconnected to each other in a web of physical groupings known as nodesand logical groupings known as clusters. A node is a control mechanismfor one or more servers on a machine. A cluster logically deals withmultiple similar servers on different machines. Clusters can coexistwith other non-cluster servers on a machine and may contain all of thesame applications.

Due to the nature of the organization of inter-dependent applicationsthroughout the set of data processing systems, affecting one dataprocessing system in a node or cluster may affect other applications onother data processing systems in the data processing environment. If atleast one copy of each application does not remain running somewhere inthe data processing environment, then service may be denied and anavailability failure may occur. Moreover, one running copy of everyapplication may not be sufficient to maintain service. Multiple runningcopies of software may be required to achieve acceptable throughput andresponse service levels.

The complexity of modern data processing environments makes deployingnew enterprise applications (EARs), or other applications, onto dataprocessing systems difficult. The problem is especially complex ifupdated enterprise applications are deployed. If even one dataprocessing system requires an enterprise application update to bedeployed, then many other data processing systems can be affected.

Automated programs for deploying enterprise applications that areavailable today require voluminous code that is very expensive todesign, develop, debug, and maintain. Such programs are hard-coded toparticular sets of enterprise applications and particular environments.Such unique code is not transferable to other organizations, is notsupportable, and is not flexible enough to adapt to new applications ornew environments.

BRIEF SUMMARY OF THE INVENTION

The present invention provides a method, apparatus, and computer programproduct for automating the deployment of a number of enterpriseapplications and enterprise application updates on one or more computerdata processing systems operating in a data processing environment. Whenautomated enterprise deployment is invoked, computer instructions in acomputer readable medium provide for initializing, performing, andfinalizing deployment of the enterprise applications. Duringinitialization, a number of enterprise applications are selected to bedeployed on target data processing systems. During deployment, theenterprise applications are phase deployed to the target data processingsystems. Phased deployment includes the steps of optionally quiescingall affected servers in one affected node, stopping all affected serversin the node, synchronizing the node, delivering an application orupdate, restarting all affected servers, reactivating the affectedservers if quiesced, and then repeating these steps for each affectednode one at a time until all data processing systems have been affected.During the updating process, each affected server is updated one time,regardless of the number of updates, and all other unaffected servers inthat node remain operational in order to run applications. Similarly,unaffected nodes and all their servers remain operational throughout theupdate process. During the finalization of deployment, the deployment ofeach enterprise application is validated. Upon successful deployment,deployed enterprise applications are moved from a distribution directoryinto a released directory for audit purposes or for future rollback andrecovery use.

BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS

FIG. 1 is a pictorial representation of a network data processing systemin which the present invention may be implemented.

FIG. 2 is a block diagram of a data processing system that may beimplemented as a server in accordance with an aspect of the presentinvention.

FIG. 3 is a block diagram illustrating a data processing system in whichthe present invention may be implemented.

FIG. 4 is a block diagram illustrating an environment in which thepresent invention may be implemented.

FIG. 5 is a flowchart illustrating the automatic deployment ofenterprise applications in the operating environment of FIG. 4, inaccordance with an aspect of the present invention.

FIG. 6 is a flowchart illustrating steps taken during the initializedeployment step of FIG. 5, in accordance with an aspect of the presentinvention.

FIG. 7 is a flowchart illustrating steps taken during the performdeployment step of FIG. 5, in accordance with an aspect of the presentinvention.

FIG. 8 is a flowchart illustrating steps taken during the phaseddistribute deployment step of FIG. 7, in accordance with an aspect ofthe present invention.

DETAILED DESCRIPTION OF THE INVENTION

As will be appreciated by one of skill in the art, the present inventionmay be embodied as a method, system, or computer program product.Accordingly, the present invention may take the form of an entirelyhardware embodiment, an entirely software embodiment (includingfirmware, resident software, micro-code, etc.) or an embodimentcombining software and hardware aspects all generally referred to hereinas a “circuit” or “module.” Furthermore, the present invention may takethe form of a computer program product on a computer-usable storagemedium having computer-usable program code embodied in the medium.

Any suitable computer readable medium may be utilized. Thecomputer-usable or computer-readable medium may be, for example but notlimited to, an electronic, magnetic, optical, electromagnetic, infrared,or semiconductor system, apparatus, device, or propagation medium. Morespecific examples (a nonexhaustive list) of the computer-readable mediumwould include the following: an electrical connection having one or morewires, a portable computer diskette, a hard disk, a random access memory(RAM), a read-only memory (ROM), an erasable programmable read-onlymemory (EPROM or Flash memory), an optical fiber, a portable compactdisc read-only memory (CD-ROM), an optical storage device, atransmission media such as those supporting the Internet or an intranet,or a magnetic storage device. Note that the computer-usable orcomputer-readable medium could even be paper or another suitable mediumupon which the program is printed, as the program can be electronicallycaptured, via, for instance, optical scanning of the paper or othermedium, then compiled, interpreted, or otherwise processed in a suitablemanner, if necessary, and then stored in a computer memory. In thecontext of this document, a computer-usable or computer-readable mediummay be any medium that can contain, store, communicate, propagate, ortransport the program for use by or in connection with the instructionexecution system, apparatus, or device.

Computer program code for carrying out operations of the presentinvention may be written in an object oriented programming language suchas Java7, Smalltalk or C++. However, the computer program code forcarrying out operations of the present invention may also be written inconventional procedural programming languages, such as the “C”programming language. The program code may execute entirely on theuser's computer, partly on the user's computer, as a stand-alonesoftware package, partly on the user's computer and partly on a remotecomputer or entirely on the remote computer. In the latter scenario, theremote computer may be connected to the user's computer through a localarea network (LAN) or a wide area network (WAN), or the connection maybe made to an external computer (for example, through the Internet usingan Internet Service Provider).

The present invention is described below with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the invention. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

With reference now to the figures and in particular with reference toFIG. 1, a pictorial representation of a network data processing systemin which the present invention may be implemented is depicted. Networkdata processing system 100 is a network of computers in which thepresent invention may be implemented. Network data processing system 100contains a network 102, which is the medium used to providecommunications links between various devices and computers connectedtogether within network data processing system 100. Network 102 mayinclude connections, such as wire, wireless communication links, orfiber optic cables.

In the depicted example, server 104 is connected to network 102 alongwith storage unit 106. In addition, clients 108, 110, and 112 areconnected to network 102. These clients 108, 110, and 112 may be, forexample, personal computers or network computers. In the depictedexample, server 104 provides data, such as boot files, operating systemimages, and programs to clients 108-112. Clients 108, 110, and 112 areclients to server 104. Network data processing system 100 may includeadditional servers, clients, and other devices not shown. In thedepicted example, network data processing system 100 is the Internetwith network 102 representing a worldwide collection of networks andgateways that use the Transmission Control Protocol/Internet Protocol(TCP/IP) suite of protocols to communicate with one another. At theheart of the Internet is a backbone of high-speed data communicationlines between major nodes or host computers, consisting of thousands ofcommercial, government, educational and other computer systems thatroute data and messages. Of course, network data processing system 100also may be implemented as a number of different types of networks, suchas for example, an intranet, a local area network (LAN), or a wide areanetwork (WAN). FIG. 1 is intended as an example, and not as anarchitectural limitation for the present invention.

FIG. 2 is a block diagram of a data processing system that may beimplemented as a server, such as server 104 of FIG. 1, in accordancewith an aspect of the present invention. Data processing system 200 maybe a symmetric multiprocessor (SMP) system including a number ofprocessors 202 and 204 connected to system bus 206. Alternatively, asingle processor system may be employed. Also connected to system bus206 is memory controller/cache 208, which provides an interface to localmemory 209. I/O Bus Bridge 210 is connected to system bus 206 andprovides an interface to I/O bus 212. Memory controller/cache 208 andI/O Bus Bridge 210 may be integrated as depicted.

Peripheral component interconnect (PCI) bus bridge 214 connected to I/Obus 212 provides an interface to PCI local bus 216. A number of modemsmay be connected to PCI local bus 216. Typical PCI bus implementationswill support four PCI expansion slots or add-in connectors.Communications links to clients 108-112 in FIG. 1 may be providedthrough modem 218 and network adapter 220 connected to PCI local bus 216through add-in connectors.

Additional PCI bus bridges 222 and 224 provide interfaces for additionalPCI local buses 226 and 228, from which additional modems or networkadapters may be supported. In this manner, data processing system 200allows connections to multiple network computers. A memory-mappedgraphics adapter 230 and hard disk 232 may also be connected to I/O bus212 as depicted, either directly or indirectly.

Those of ordinary skill in the art will appreciate that the hardwaredepicted in FIG. 2 may vary. For example, other peripheral devices, suchas optical disk drives and the like, also may be used in addition to orin place of the hardware depicted. The depicted example is not meant toimply architectural limitations with respect to the present invention.

The data processing system depicted in FIG. 2 may be, for example, anIBM® eServer™ pSeries® computer system, running the Advanced InteractiveExecutive (AIX®) operating system or LINUX operating system (IBM,eServer, pSeries and AIX are trademarks of International BusinessMachines Corporation in the United States, other countries, or bothwhile Linux is a trademark of Linus Torvalds in the United States, othercountries, or both).

FIG. 3 is a block diagram illustrating a data processing system in whichthe present invention may be implemented. Data processing system 300 isan example of a client computer. Data processing system 300 employs aperipheral component interconnect (PCI) local bus architecture. Althoughthe depicted example employs a PCI bus, other bus architectures such asAccelerated Graphics Port (AGP) and Industry Standard Architecture (ISA)may be used. Processor 302 and main memory 304 are connected to PCIlocal bus 306 through PCI Bridge 308. PCI Bridge 308 also may include anintegrated memory controller and cache memory for processor 302.Additional connections to PCI local bus 306 may be made through directcomponent interconnection or through add-in boards. In the depictedexample, local area network (LAN) adapter 310, small computer systeminterface (SCSI) host bus adapter 312, and expansion bus interface 314are connected to PCI local bus 306 by direct component connection. Incontrast, audio adapter 316, graphics adapter 318, and audio/videoadapter 319 are connected to PCI local bus 306 by add-in boards insertedinto expansion slots. Expansion bus interface 314 provides a connectionfor a keyboard and mouse adapter 320, modem 322, and additional memory324. SCSI host bus adapter 312 provides a connection for hard disk drive326, tape drive 328, and CD-ROM drive 330. Typical PCI local busimplementations will support three or four PCI expansion slots or add-inconnectors.

An operating system runs on processor 302 and is used to coordinate andprovide control of various components within data processing system 300in FIG. 3. The operating system may be a commercially availableoperating system, such as Microsoft® Windows® XP (Microsoft and Windowsare trademarks of Microsoft Corporation in the United States, othercountries, or both). An object oriented programming system such as Java™may run in conjunction with the operating system and provide calls tothe operating system from Java programs or programs executing on dataprocessing system 300 (Java is a trademark of Sun Microsystems, Inc. inthe United States, other countries, or both) Instructions for theoperating system, the object-oriented programming system, and programsor programs are located on storage devices, such as hard disk drive 326,and may be loaded into main memory 304 for execution by processor 302.

Those of ordinary skill in the art will appreciate that the hardware inFIG. 3 may vary depending on the implementation. Other internal hardwareor peripheral devices, such as flash read-only memory (ROM), equivalentnonvolatile memory, or optical disk drives and the like, may be used inaddition to or in place of the hardware depicted in FIG. 3. In addition,the processes of the present invention may be applied to amultiprocessor data processing system.

As another example, data processing system 300 may be a stand-alonesystem configured to be bootable without relying on some type of networkcommunication interfaces. As a further example, data processing system300 may be a personal digital assistant (PDA) device, which isconfigured with ROM and/or flash ROM in order to provide non-volatilememory for storing operating system files and/or user-generated data.

The depicted example in FIG. 3 and above-described examples are notmeant to imply architectural limitations. For example, data processingsystem 300 also may be a notebook computer or hand held computer inaddition to taking the form of a PDA. Data processing system 300 alsomay be a kiosk or a Web appliance.

In a complex data processing environment, many data processing systemsare arranged into nodes and clusters, and each data processing systemsupports or runs a number of applications. These applications, and inparticular enterprise applications, are installed and updated on thedata processing systems and their application server programmingsystems. However, when an application is installed or updated, thatapplication is not available for service unless that application is alsoreplicated and running on other data processing systems. If oneapplication is not available for service, then often otherinter-dependent applications may also fail to provide service. It isvery inefficient to disable many or all data processing systems todeploy applications or application updates. However, it is verydifficult to update individual data processing systems without disablingmany data processing systems in the environment, due to the complexityof the operating environment and due to inter-dependencies between allthe enterprise applications.

The present invention provides a method, apparatus, and computer programproduct for automating the deployment of a number of enterpriseapplications and enterprise application updates on one or more computerdata processing systems operating in a data processing environment. Inthe illustrative examples, deploying an enterprise application meanstaking steps such as, for example, installing the enterpriseapplication, updating an existing enterprise application, reconfiguringan existing enterprise application, or deleting an existing enterpriseapplication. The most difficult deployment operation is updatingexisting enterprise applications in a manner which maintains maximumapplication availability throughout the enterprise.

When automated enterprise deployment is invoked, computer instructionsin a computer readable medium provide for initializing, performing, andfinalizing deployment of the enterprise applications. Duringinitialization, a number of enterprise applications or enterpriseapplication updates are selected to be deployed on target dataprocessing systems. The selected enterprise applications are read andinstalled in a distribution repository and their configuration settingsand targets are set. During deployment, the enterprise applications arephase deployed to the target data processing systems. Phased deploymentincludes the steps of optionally quiescing all affected servers in oneaffected node, stopping all affected servers in the node, synchronizingthe node, delivering an application or update, restarting all affectedservers, reactivating the affected servers if quiesced, and thenrepeating these steps for each affected node one at a time until alldata processing systems have been affected. During the updating process,each affected server is updated one time, regardless of the number ofupdates, and all other unaffected servers in that node remainoperational in order to run applications. Similarly, unaffected nodesand all their servers remain operational throughout the update process.During the finalization of deployment, the deployment of each enterpriseapplication is validated. Upon successful deployment, deployedenterprise applications are moved from the distribution directory into areleased directory for audit purposes or for future rollback andrecovery use.

FIG. 4 shows an illustrative environment wherein a deployment system 400installs and maintains applications on five data processing systems,402, 404, 406, 408, and 410 connected via a network, such as an intranetor the Internet. Each data processing system may be a build anddeployment server on a server such as server 104 of FIG. 1, a clientcomputer, such as clients 108, 110, and 112, or a stand-alone computer.Typically, the data processing environment is a collection of serversthat do not use the server-client structure. The deployment system 400need not be a separate data processing system, but may be one of theaffected data processing systems, 402, 404, 406, 408, and 410. Thedeployment system may also be computer instructions contained in acomputer readable medium for carrying out the deployment of enterpriseapplications. In addition, multiple deployment systems may beimplemented.

In any case, each data processing system executes a number ofapplications. Data processing system 1 402 executes application C 416.Data processing system 2 404 executes application A 412 and applicationB 414. Data processing system 3 406 is a redundant logical clustermember on a different physical node which also executes applications A412 and application B 414. Data processing system 4 executes redundantapplication C 416. Data processing system 4 is similar to dataprocessing system 1, but these two systems have not been logicallygrouped together as a cluster. Data processing system 410 executesnon-redundant application D 418. Data processing systems 402 and 404 arephysically grouped into Node A 420. Data processing systems 406, 408,and 410 are physically grouped into Node B 422. Data processing systems404 and 406 are logically grouped into cluster 424.

FIG. 4 shows four applications executed on five data processing systemsphysically grouped into two nodes. Two data processing systems arelogically grouped into one cluster. However, actual data processingenvironments may contain hundreds or even thousands of data processingsystems executing a vast array of applications. Similarly, the dataprocessing systems may be grouped into a great number of nodes andclusters.

FIG. 4 illustrates that one application may be executed on dataprocessing systems grouped in different nodes and clusters. For example,application A 412 runs on data processing systems 404, and 406, acrossnode A 420 and node B 422, and within cluster 424. Because of thecomplexity of this arrangement, if an update to application A is to besimultaneously deployed to data processing systems 404 and 406, then allfive data processing systems, 402, 404, 406, 408, and 410 may beaffected if either of the other applications C 416 or D 418 depend onthe affected application A 412.

In another example, if application A 412 is affected and first updatedonly on data processing system 404, then in order to quiesce work toapplication A 412 the entire data processing system 404 must be stoppedprior to its application update. Thus, application B 414 will also beunavailable in data processing system 404, even if that application B414 is not directly dependent on application A 412. Maintaining completeredundant copies of all applications within different clusters membershelps to avoid such associated application failures. However, in manydata processing environments, clusters might not be used or there may beone or more unique applications in certain cluster members. In addition,many enterprise systems may have a combination of non-clusteredapplications spread over different sets of nodes and servers due to anumber of reasons, including security, corporate organization, orgeographic location.

FIG. 5 is a flowchart illustrating the automatic deployment ofenterprise applications or updates in the operating environment of FIG.4, in accordance with an aspect of the present invention. Although theprocess of deploying enterprise applications or updates is described inthe context of deploying enterprise applications, the process may beused to deploy any application in a data processing environment. Analgorithm for deploying enterprise applications or updates is shown inan application entitled, “Algorithm for Automated EnterpriseDeployments,” attorney docket number CA920040134US1, U.S. applicationSer. No. ______, filed _, which is hereby incorporated by reference.

The process begins with a command to invoke the deployment of enterpriseapplications (step 500). The command to invoke deployment may come frominput provided by a user, in which case the invocation is a manualinvocation. The command to invoke deployment may come from inputprovided by an automatic process such as another computer program, inwhich case the invocation is an automatic invocation. In an illustrativeembodiment, automatic invocation is performed on a regular basis, suchas daily or weekly time periods. In this case, a program automaticallyinvokes the deployment of enterprise applications once during each timeperiod. However, a program may automatically invoke the deployment ofenterprise applications based on other conditions, such as the failureof one or more applications, the failure of one or more data processingsystems in the environment, the availability of new or updatedapplications, and the like.

Next, the deployment system, such as deployment system 400 of FIG. 4,initializes a set of enterprise applications to be deployed onto a setof data processing systems (step 502). During initialization, a subsetof enterprise applications may be selected, based on identifying indiciaor other indicia, from the set of enterprise applications in the dynamicdistribution directory. The deployment system then pre-validates thedeployment of the subset of enterprise applications to ensure that thedeployment of the subset of enterprise applications has an acceptablechance to succeed.

Next, a deployment system, such as deployment system 400 of FIG. 4,actually deploys the subset of enterprise applications or updates to thedata processing systems, such as data processing systems 402, 404, 406,408, and 410 of FIG. 4 (step 504). The term “deploying an enterpriseapplication” may refer to both deploying a new enterprise applicationand updating an existing enterprise application. As described further inrelation to FIG. 7 and FIG. 8, only a minimum number of data processingsystems are stopped while performing updates. Deploying an enterpriseapplication may involve installing a new enterprise application,updating a previous version of an installed enterprise application,reconfiguring or otherwise maintaining a previously installed enterpriseapplication, or uninstalling a previously installed enterpriseapplication.

After deploying the subset of enterprise applications to the dataprocessing systems, the deployment system validates the deployment (step506). The deployment of each enterprise application is verified. If thedeployment was successful, then that application is moved from thedistribution directory into the released directory. The application isalso versioned with the current date and time. If the deployment was notsuccessful, then that application is moved from the distributiondirectory into the failed directory.

FIG. 6 is a flowchart illustrating steps taken during the initializedeployment step 500 of FIG. 5, in accordance with an aspect of thepresent invention. First, the deployment system, such as deploymentsystem 400 in FIG. 4, determiines which enterprise applications will bedeployed to a set of data processing systems (step 600). Many enterpriseapplications may need to be deployed across one or more data processingsystems, though not all data processing systems necessarily will havethe same enterprise application deployed.

After determining which enterprise applications will be deployed, thedeployment system determines upon which data processing systems anenterprise application will be deployed (step 602). If an enterpriseapplication is to be deployed onto a data processing system, that dataprocessing system is an affected data processing system. For example, inthe data processing environment shown in FIG. 4, applications B and Cneed to be updated and each requires that an enterprise applicationupdate be deployed on each data processing system supportingapplications B and C. In this case, data processing systems 402, 404,406, and 408 support applications B or C. Thus, enterprise applicationswill be deployed to those four data processing systems, meaning thatdata processing systems 402, 404, 406, and 408 are affected dataprocessing systems.

After determining which data processing systems are affected, thedeployment system calculates the nodes and clusters that are affected bythe planned deployment of enterprise applications (step 604). If a dataprocessing system in a node or a cluster is affected by a deployment,then the entire node or cluster is also affected. Continuing theillustrative example, the affected nodes are node A 420 and node B 422.Both nodes are affected because data processing systems 402 and 404 arein node A 420 and data processing systems 406 and 408 are in node B 422.The cluster is affected because both data processing system 404 and dataprocessing system 406 are affected.

A more detailed process for initializing the deployment (step 502) isshown in an application entitled, “Algorithm for Automated EnterpriseDeployments,” attorney docket number CA920040134US1, U.S. applicationserial number ______, filed _, which is hereby incorporated byreference. However the initialization step is performed, the deploymentsystem proceeds to step 504, of FIG. 5, in which deployment of theenterprise applications is performed.

FIG. 7 is a flowchart illustrating steps taken during the performdeployment step 504 of FIG. 5, in accordance with an aspect of thepresent invention. The process of deploying the enterprise applicationsbegins with initializing all affected nodes (step 700). By initializingaffected nodes, the deployment system prepares each node for thedeployment of enterprise applications on each data processing systemwithin the node. In one example, initializing a node involves savinginformation contained in the node and disabling any automaticapplication updates that might affect that node.

Thereafter, the enterprise applications are phase distributed to alldata processing systems in all nodes (step 702). To phase distribute thedeployment of enterprise applications, deployment is executed on onenode at a time. Within the node, deployment is executed on all affectedprocessing systems at the same time. The process of phase distributingthe deployment of enterprise applications is illustrated in more detailin FIG. 8. After all enterprise applications have been deployed to theaffected data processing systems, settings are restored in all affectednodes (step 704). For example, the automatic synchronization function ofsome applications may be restored to synchronize nodes automatically.Thereafter, the process proceeds to the validation step (506) of FIG. 5.

FIG. 8 is a flowchart illustrating steps taken during the phasedistribute deployment step (702) of FIG. 7, in accordance with an aspectof the present invention. In the illustrative example of FIG. 8, thedeployment system first determines which data processing systems areaffected by the deployment, as well as which nodes and clusters areaffected by the deployment (previous step 604).

Next, one affected node is selected (step 800) and all its affectedservers are optionally quiesced (step 802). Quiescing a server involvespreventing a server from receiving more work, though quiesced dataprocessing systems within the node remain temporarily active and cancomplete currently pending tasks. Using the previous example of updatingapplications B and C in the data processing environment of FIG. 4, whenthose applications are deployed to node B 422, then data processingsystems 406 and 408 are optionally quiesced. Accordingly, dataprocessing systems 406, and 408, temporarily continue performingin-progress work to allow those data processing system to complete anypending tasks. However, unaffected data processing system 410 remainsfully active and keeps processing all ongoing and new requests.

Subsequently, all affected data processing systems in the node arestopped (step 804). In the illustrative example shown above, dataprocessing systems 406, and 408, are stopped. Stopping applicationservers allows any non-quiesced work requests to failover-recover toother redundant applications running on active servers. Next, a syncnode command is issued to the affected node so that all data processingsystems in the node are synchronized and the updates are simultaneouslydeployed to all affected data processing systems (step 806) in the node.

In addition, a configuration script may optionally be provided with theenterprise application to configure external resources required by adeployed enterprise application at this time. The configuration scriptcould perform configuration actions relating to the operating system,such as to copy files, create or clean directories, and to perform otherfunctions related to other programs, such as creating message queuingtables or JDBC data sources. Such actions may extend beyond the affecteddata processing systems. Other activities and checks also may beperformed on the affected data processing systems at this time.

In the illustrated example, application B 414 on data processing system406 and application C 416 on data processing system 408 are updated.Data processing system 410 is unaffected and continues to perform taskswhile data processing systems 406 and 408 are stopped. Enterpriseapplication updates are deployed to all affected data processing systemin a node simultaneously.

After all enterprise applications have been deployed, the deploymentsystem starts all affected data processing systems (step 808), if thedata processing systems had been stopped. Thereafter, the affectedservers are reactivated (step 810). Reactivating a server means that theserver will accept and process work requests for its applications. Inthe illustrative example, data processing systems 406 and 408 arestarted and reactivated.

After reactivating all servers on the affected node, the deploymentsystem determines whether any other affected nodes remain (step 812). Ifaffected nodes remain, then the process returns to step 800 in order toprocess the next affected node. If no affected nodes remain, then theprocess proceeds to finalize deployment (step 506 of FIG. 5). In theillustrated example, Application B 414 is deployed to data processingsystems 406 and 408 on node A 420. Thereafter, the process continues tofinalize deployment.

In another example related to the environment shown in FIG. 4,applications A 412 and B 414 require maintenance. To perform therequired maintenance, enterprise application updates are deployed to allaffected data processing systems. Here, the affected data processingsystems are data processing systems 404, and 406. Both node A 420 andnode B 422 are affected, and cluster 424 is affected as well. To deploythe enterprise applications, first node A 420 is prepared. Subsequently,data processing system 402 is optionally quiesced and then stopped. NodeA 420 is synchronized and all enterprise application updates aredeployed to data processing system 402. Thereafter, data processingsystem 402 is started and then, if quiesced, is reactivated. Next, nodeA 420 settings are restored.

Continuing the illustrative example, node B 422 is prepared after node A420 is restored. Data processing system 406 is affected, so that dataprocessing system is optionally quiesced and then stopped. Dataprocessing systems 408 and 410 remain active. Thereafter, node B 422 issynchronized and both enterprise application updates are deployed todata processing system 406. Next, data processing systems 406 is startedand then, if quiesced, is reactivated and, subsequently, node B isrestored.

The above illustrative examples demonstrate a method of minimizing thedown time of each affected data processing system in a complex dataprocessing environment. To the extent possible, each data processingsystem is affected one at a time to maximize the resources available tothe data processing environment. When multiple data processing systemsmust be stopped simultaneously due to node or cluster restrictions, alldeployments are conducted on all affected data processing systems at thesame time. However, each affected node is processed one node at a time,and only the affected servers within an affected node are stopped. Thus,application resources available to the data processing environment areincreased.

In the illustrative examples of FIG. 8, the entire process is performedautomatically. However, the process may also allow manual confirmations.In this case, the deployment system will deploy an enterpriseapplication to one data processing system, validate the deployment, andthen pause. The deployment system then displays the result to the user.The deployment system then prompts the user for input as to whether toproceed with installing an enterprise application on the next server, toreverse the deployment, or to terminate the entire process. Thedeployment system repeats this process for every data processing systemaffected by an enterprise application deployment. Typically, the defaultresponse at each stage is to proceed with deployment of the next system.On the other hand, the default response may be to suspend deployment ofenterprise applications or to stop the process altogether.

In order to increase the resources available to the data processingenvironment, the deployment system can re-route tasks performed byaffected data processing to unaffected data processing systems withinaffected or unaffected nodes. In addition, the action of quiescing aserver and later reactivating it is optional. As long as the server isstopped prior to updating its application, failover-recovery will routenew work requests to redundant applications on active servers, and onlysome in-progress work requests might fail. However, by first quiescingthe server work and allowing in-progress work to be completed, thehighest levels of application availability can be achieved.

Thus, the present invention provides a method, apparatus and computerprogram product for automating the deployment of a number of enterpriseapplications or updates on one or more computer data processing systemsoperating in a data processing environment. When automated enterprisedeployment is invoked, computer instructions in a computer readablemedium provide for initializing, performing, and finalizing deploymentof the enterprise applications. During initialization, a number ofenterprise applications or updates are selected to be deployed on targetdata processing systems. During deployment, the enterprise applicationsare phase deployed to the target data processing systems. Phaseddeployment includes the steps of preparing one affected node, optionallyquiescing and then stopping all affected servers in the node,synchronizing the node, delivering the update, starting and then (ifquiesced) reactivating all affected servers, restoring the affectednode, and then repeating these steps for each affected node one at atime until all data processing systems have been affected. During thefinalization of deployment, the deployment of each enterpriseapplication is validated. Upon successful deployment, deployedenterprise applications are moved from a distribution directory into areleased directory for audit purposes or for future rollback andrecovery use.

The flowcharts and block diagrams in the Figures illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof code, which comprises one or more executable instructions forimplementing the specified logical function(s). It should also be notedthat, in some alternative implementations, the functions noted in theblock may occur out of the order noted in the figures. For example, twoblocks shown in succession may, in fact, be executed substantiallyconcurrently, or the blocks may sometimes be executed in the reverseorder, depending upon the functionality involved. It will also be notedthat each block of the block diagrams and/or flowchart illustration, andcombinations of blocks in the block diagrams and/or flowchartillustration, can be implemented by special purpose hardware-basedsystems which perform the specified functions or acts, or combinationsof special purpose hardware and computer instructions.

The terminology used herein is for the purpose of describing particularembodiments only and is not intended to be limiting of the invention. Asused herein, the singular forms “a”, “an” and “the” are intended toinclude the plural forms as well, unless the context clearly indicatesotherwise. It will be further understood that the terms “comprises”and/or “comprising,” when used in this specification, specify thepresence of stated features, integers, steps, operations, elements,and/or components, but do not preclude the presence or addition of oneor more other features, integers, steps, operations, elements,components, and/or groups thereof.

The description of the present invention has been presented for purposesof illustration and description, and is not intended to be exhaustive orlimited to the invention in the form disclosed. Many modifications andvariations will be apparent to those of ordinary skill in the art. Theembodiment was chosen and described in order to best explain theprinciples of the invention, the practical application, and to enableothers of ordinary skill in the art to understand the invention forvarious embodiments with various modifications as are suited to theparticular use contemplated.

1. A method of deploying an enterprise application on at least one dataprocessing system operating in one of a set of nodes, the methodcomprising: identifying an affected node; preparing the affected node;stopping each affected data processing system; deploying the enterpriseapplication on each affected data processing system; starting eachaffected data processing system; and restoring the affected node.
 2. Themethod of claim 1 further comprising: quiescing each affected dataprocessing system after preparing the affected node; reactivating eachaffected data processing system after starting each affected dataprocessing system.
 3. The method of claim 1 wherein the node comprisesmore than one data processing system and wherein the method furthercomprises: executing a synchronize node command after stopping eachaffected data processing system on the affected node.
 4. The method ofclaim 1 further comprising: pre-validating the deployment of theenterprise application before deploying the enterprise application. 5.The method of claim 1 further comprising: post-validating the deploymentof the enterprise application after starting each affected dataprocessing system.
 6. A method of deploying an enterprise application ona set of data processing systems operating in a data processingenvironment having a first node and a second node, the methodcomprising: determining whether the first node will be affected, whereinthe first node is affected if the enterprise application will bedeployed on at least one data processing system in the first node;determining whether the second node will be affected, wherein the secondnode is affected if the enterprise application will be deployed on atleast one data processing system in the second node; if the first nodeis affected: preparing the first node; stopping each affected dataprocessing system in the first node, wherein an affected data processingsystem is a data processing system to which the enterprise applicationwill be deployed; deploying the enterprise applications on each affecteddata processing system in the first node; thereafter starting eachaffected data processing system in the first node; restoring the firstnode; thereafter, if the second node is affected, preparing the secondnode; stopping each affected data processing system in the second node,wherein an affected data processing system is a data processing systemto which an enterprise application will be deployed; deploying theenterprise application on each affected data processing system in thesecond node; thereafter starting each affected data processing system inthe second node; restoring the second node; wherein at least one of thefirst node and the second node will be affected.
 7. The method of claim6 further comprising: if the first node is affected, quiescing eachaffected server on the first node before stopping each affected serveron the first node, and reactivating each affected server on the firstnode after starting each affected server on the first node; if thesecond node is affected, quiescing each affected server on the secondnode before stopping each affected servers on the second node, andreactivating each affected server on the second node after starting eachaffected server on the second node.
 8. The method of claim 6 wherein thefirst node is affected and the second node is affected.
 9. The method ofclaim 6 wherein: the first node is affected; and with respect to thefirst node, stopping each data processing system, deploying theenterprise application on each data processing system, and starting eachaffected data processing system are performed sequentially upon oneaffected data processing system at a time until the enterpriseapplication has been deployed on all affected data processing systems inthe first node.
 10. The method of claim 6 wherein: the first node isaffected; and with respect to the first node, stopping each dataprocessing system, deploying the enterprise application on each dataprocessing system, and starting each affected data processing system areperformed on all affected data processing systems simultaneously. 11.The method of claim 6 further comprising: executing a synchronize nodecommand after stopping each data processing system in the first node;and executing a synchronize node command after stopping each dataprocessing system in the second node.
 12. The method of claim 6 furthercomprising: if the first node is affected, then prior to preparing thefirst node performing pre-validating the deployment of the enterpriseapplication to the affected data processing systems in the first node;and if the second node is affected, then prior to preparing the secondnode performing pre-validating the deployment of the enterpriseapplication to the affected data processing systems in the second node.13. The method of claim 6 further comprising: if the first node isaffected, post-validating the deployment of the enterprise applicationon each affected data processing system in the first node and performedstarting each affected data processing system in the first node; and ifthe second node is affected, post-validating the deployment of theenterprise application on each affected data processing system in thesecond node and performed after starting each affected data processingsystem in the second node.
 14. A computer program product for deployingan enterprise application on a data processing system operating in anode, wherein the node is part of a set of nodes operating in a dataprocessing environment having a plurality of data processing systems,the computer program product comprising: a computer readable mediumhaving computer readable program code embodied therein, the computerreadable program code comprising: first computer readable program codeconfigured to identify an affected node from the set of nodes, whereinthe affected node is the node containing the data processing system uponwhich the enterprise application will be deployed; second computerreadable program code configured to prepare the affected node; thirdcomputer readable program code configured to stop the data processingsystem; fourth computer readable program code configured to deploy theenterprise application on the data processing system; fifth computerreadable program code configured to start the data processing systemafter deploying the enterprise application; and sixth computer readableprogram code configured to restore the affected node.
 15. The computerprogram product of claim 14 further comprising: seventh computerreadable program code configured to quiesce the data processing systemafter preparing the node; and eighth computer readable program codeconfigured to reactivate the data processing system after starting thedata processing system.
 16. The computer program product of claim 14further comprising: seventh computer readable program code configured toexecute a synchronize node command after stopping the data processingsystem.
 17. The computer program product of claim 14 further comprising:seventh computer readable program code configured to pre-validate thedeployment of the enterprise application before preparing the affectednode.
 18. The computer program product of claim 14 further comprising:seventh computer readable program code configured to post-validate thedeployment of the enterprise application after starting the dataprocessing system.
 19. A data processing system comprising: a bus; amemory operably connected to the bus; a processor unit operablyconnected to the bus; a computer program product in the memory fordeploying an enterprise application on a data processing systemoperating in a node, wherein the node is part of a set of nodesoperating in a data processing environment, the computer program productcomprising: a computer readable medium having computer readable programcode embodied therein, the computer readable program code comprising:first computer readable program code configured to identify an affectednode from the set of nodes, wherein the affected node is the nodecontaining the data processing system upon which the enterpriseapplication will be deployed; second computer readable program codeconfigured to prepare the affected node; third computer readable programcode configured to stop the data processing system after preparing thenode to form a stopped data processing system; fourth computer readableprogram code configured to deploy the enterprise application on the dataprocessing system; fifth computer readable program code configured tostart the stopped data processing system after deploying the enterpriseapplication; and sixth computer readable program code configured torestore the affected node.
 20. The data processing system of claim 19wherein the computer program product further comprises: seventh computerreadable program code configured to quiesce the data processing systemafter preparing the node; and eighth computer readable program codeconfigured to reactivate the data processing system after starting thedata processing system.
 21. The data processing system of claim 19wherein the computer program product further comprises: seventh computerreadable program code configured to execute a synchronize node commandafter stopping the data processing system.
 22. The data processingsystem of claim 19 wherein the computer program product furthercomprises: seventh computer readable program code configured topre-validate the deployment of the enterprise application beforepreparing the affected node.
 23. The data processing system of claim 19wherein the computer program product further comprises: seventh computerreadable program code configured to post-validate the deployment of theenterprise application after starting the data processing system.