Event management

ABSTRACT

Managing network event information from a plurality of network appliances is disclosed. Each network appliance provides a network service and each has a version of a common database. Managing includes detecting network event information at a first network appliance, updating a version of the common database on the first network appliance with the network event information, and propagating the network event information to other versions of the database on other network appliances.

CROSS REFERENCE TO OTHER APPLICATIONS

This application is a continuation of co-pending U.S. patent applicationSer. No. 11/232,466, entitled EVENT MANAGEMENT filed Sep. 21, 2005 whichis incorporated herein by reference for all purposes

BACKGROUND OF THE INVENTION

In a database grid, various events may be logged in order to bettermanage the system. For example, the system may be configured to log anevent if a particular device in the network is overheating. When anevent occurs on a node, an SNMP trap is typically sent from the node toan SNMP management node. The SNMP manager can then determine that anevent has occurred. Centralized event management, in which only themanagement node has knowledge of events on other nodes, introduces delayand inefficiency in the system. In addition, having a single managementnode creates a single point of failure in the system. An improved methodof event management is needed.

SUMMARY OF THE INVENTION

Systems and methods for managing network event information from aplurality of network appliances each providing a network service andeach having a version of a common database are provided. In someembodiments, a method of managing network event information from aplurality of network appliances each providing a network service andeach having a version of a common database includes detecting networkevent information at a first network appliance, provisionally updating aversion of the common database on the first network appliance with thenetwork event information, determining whether a conflict existsrelating to the updating of the version of the common database, in anevent the conflict does not exist relating to the updating of theversion of the common database: permanently updating the version of thecommon database on the first network appliance with the network eventinformation, and propagating the network event information to otherversions of the database on other network appliances, and in an eventthe conflict exists relating to the updating of the version of thecommon database: resolving the conflict relating to the updating of theversion of the common database.

The method may further include updating a version of the common databaseon a second network appliance with the network event information.

The first network appliance may be a master.

A master may propagate the network information.

The event information may be associated with the first networkappliance.

BRIEF DESCRIPTION OF THE DRAWINGS

Various embodiments of the invention are disclosed in the followingdetailed description and the accompanying drawings.

FIG. 1A is a diagram illustrating a centralized distributed databasesystem 100.

FIG. 1B is a diagram illustrating a partitioned distributed databasesystem 120

FIG. 2A is a diagram of a system for performing semantic replication. Inthis example, system 200 is a distributed database.

FIG. 2B is a flowchart illustrating a method of performing semanticreplication. In this example, a database change is received at a node(250).

FIG. 2C is a diagram of a system for performing semantic replicationwhere one or more nodes have different database semantics.

FIG. 3A is a diagram illustrating a system for provisionally writingdata in a distributed database

FIG. 3B is a flowchart illustrating a method of provisionally writingdata in a distributed database.

FIGS. 4A-4C are diagrams illustrating a DHCP example of provisionallywriting data in a distributed database.

FIGS. 5A-5B are diagrams illustrating a DNS example of provisionallywriting data in a distributed database.

FIGS. 6A-6B are diagrams illustrating a RADIUS example of provisionallywriting data in a distributed database.

FIG. 7A is a diagram illustrating a system for reconciling provisionallywritten data in a distributed database.

FIG. 7B is a flowchart illustrating a method of provisionally writingdata in a distributed database at a member

FIG. 7C is a flowchart illustrating a process for propagating an itemfrom a journal queue to a master.

FIG. 7D is a flowchart illustrating a method of reconcilingprovisionally written data in a distributed database at a master.

FIG. 7E is a flowchart illustrating a process for propagating an itemfrom a journal queue to a member.

FIG. 7F is a flowchart illustrating a method of receiving an item on thereplication stream at an originating member.

FIG. 7G is a flowchart illustrating a method of receiving an item on thereplication stream at a non-originating member.

FIG. 8 is a diagram illustrating a system for performing atomictransactions in a distributed database.

FIG. 9A is a diagram illustrating a system for provisionally writingdata using atomic transactions in a distributed database.

FIG. 9B is a block diagram illustrating how a markup languagerepresentation of a database is transformed into a specific databaseschema.

FIG. 10 is a diagram illustrating the relationships between variousstructures that can be defined using ref-types.

FIG. 11 is a flowchart illustrating a method of generating a databaseschema from a markup language representation of the database.

FIG. 12 is a diagram illustrating an example of generating an SQL tablefrom an RTXML representation of the table.

FIG. 13 is a flowchart illustrating a method of generating an in memoryrepresentation of an RTXML structure.

FIG. 14 is a flowchart illustrating a method of generating an SQL tablefrom an in memory representation of a structure.

FIG. 15 is a flowchart illustrating a method of enforcing a referenceduring an insert.

FIG. 16 is a flowchart illustrating a method of enforcing a referenceduring a delete.

FIG. 17 is a diagram illustrating five versions of a database, v1 to v5.

FIG. 18 is a diagram illustrating various versions of a database.

FIG. 19 is a flowchart illustrating a method of converting a databasefrom a first version to a second version.

FIG. 20 is a diagram of a translation graph.

FIG. 21 is a flowchart illustrating a method of applying translationsteps to arrive at a desired database version.

FIG. 22 is a flowchart illustrating a method of translating a databasefrom one version to the next version.

FIG. 23 is a block diagram illustrating a system used in one embodimentto manage a database cluster having multiple database versions.

FIG. 24 is a flowchart illustrating a method of propagating an updatefrom a first database to a second database with a different version.

FIG. 25 is a block diagram illustrating a database grid.

FIG. 26 is a flowchart illustrating a method of sending a databaseupdate to a master from a member.

FIG. 27 is a flowchart illustrating a method of receiving a databaseupdate at a master from a member.

FIG. 28 is a flowchart illustrating a method of receiving a databaseupdate at a member from a master.

FIG. 29 is a diagram illustrating an event management system.

FIG. 30 is a flowchart illustrating a method of responding to a databaseupdate at a node.

FIG. 31 is a diagram illustrating a grid.

DETAILED DESCRIPTION

The invention can be implemented in numerous ways, including as aprocess, an apparatus, a system, a composition of matter, a computerreadable medium such as a computer readable storage medium or a computernetwork wherein program instructions are sent over optical or electroniccommunication links. In this specification, these implementations, orany other form that the invention may take, may be referred to astechniques. In general, the order of the steps of disclosed processesmay be altered within the scope of the invention.

A detailed description of one or more embodiments of the invention isprovided below along with accompanying figures that illustrate theprinciples of the invention. The invention is described in connectionwith such embodiments, but the invention is not limited to anyembodiment. The scope of the invention is limited only by the claims andthe invention encompasses numerous alternatives, modifications andequivalents. Numerous specific details are set forth in the followingdescription in order to provide a thorough understanding of theinvention. These details are provided for the purpose of example and theinvention may be practiced according to the claims without some or allof these specific details. For the purpose of clarity, technicalmaterial that is known in the technical fields related to the inventionhas not been described in detail so that the invention is notunnecessarily obscured.

Semantic Replication

FIG. 1A is a diagram illustrating a centralized distributed databasesystem 100. A distributed database is a database in which portions ofthe database are stored on more than one computer within a network. Alocal application or user has read access to the portion of the databaseat that location. To keep the various locations synchronized, writes(e.g., inserts, updates, and deletes) to the database are typicallyreplicated between the various locations, as applicable. A typicaldistributed database is either centralized or partitioned.

System 100 is shown to include master 102 and members 104, 106, and 108.Reads can be performed at any node. For example, each node maintains aread only cache. Writes must be performed through master 102. Writerequests are sent to master 102, and the database in master 102 isupdated. The data is replicated to the members by propagating thechanged data (e.g., changed columns and/or rows) to each of members 104,106, and 108. Each member receives the data and places it in its cache(or local version of the database). This approach can be bandwidthintensive when a large amount of data needs to be propagated. Forexample, if 5 million records with “infoblox.com” need to be changed to“infoblox.xyz.com”, those 5 million changed records would need to beshipped. A centralized database is difficult to scale. All changed datais transmitted, which can consume high bandwidth and can overwhelm thesystem. All writes must go through the master, which increases latency,particularly in a highly distributed system. In addition, the master canbecome a bottleneck.

FIG. 1B is a diagram illustrating a partitioned distributed databasesystem 120. System 120 is partitioned into three portions each with alocal master and members. Each master has full write authority for thatpartition. However, writes to each partition are generally notcoordinated. For example, a host name may be added to partition 140 thatmay already exist in partition 122, resulting in inconsistent databetween the two partitions. Some sort of coordination between eachpartition is needed if such inconsistencies are to be avoided. If asingle overall master is selected, that master could become a bottlenecksince it would need to approve all transactions. It would be desirableto have a faster and more scalable distributed database.

In addition, a member can comprise a high availability (HA) pair, or anactive node and a passive (or redundant) node, where the passive nodeserves as a backup to the active node in case of failure. Currently datais not reliably consistent between the active and the passive nodes.Thus, if there is a failure of one node, there can be a loss of data. Itwould therefore also be desirable to have a more reliable distributeddatabase.

FIG. 2A is a diagram of a system for performing semantic replication. Inthis example, system 200 is a distributed database. For example, thedistributed database may provide a network identity service, such asDNS, DHCP, RADIUS, or LDAP. System 200 is shown to include master 204and two members 208 and 210. Any number of members may be included inother embodiments. Each of master 204 and members 208 and 210 may resideon a computer, appliance, or any other appropriate device. Master 204and members 208 and 210 may be physically co-located or separated.Master 204 is shown to include semantic processor 214 and a masterversion of the database 216. Member 208 is shown to include semanticprocessor 218 and a local version of the database 220. Member 210 isshown to include semantic processor 224 and a local version of thedatabase 216 (or local database 216).

In some embodiments, the semantic processor is considered part of thelocal database. Semantic processors 214, 218, and 224 communicate over asemantic replication channel (SRC) 230 a and 230 b and a semantic changechannel (SCC) 232 a and 232 b as shown. Databases 216, 220, and 226 maycommunicate over a data replication channel (DRC) 234 a and 234 b. Adatabase change request is received at master 204. A database change (ordatabase write) request is a request that modifies the database in anyway when executed. The write request may be expressed as a command,instruction, function, query or operation. For example the change may bean operation such as insert, update, or delete. Semantic processor 214interprets the change and applies the change to database 216. The changeis propagated to semantic processors 218 and 224 over SCC 230 a and 230b, respectively. Semantic processors 218 and 224 interpret the changeand apply the change to databases 220 and 226, respectively.

In some embodiments, the change is expressed as a semantic command thatis one of a predefined set of commands. A semantic command, as usedherein, is a write request expressed semantically. The semantic commandcan be defined by operations, instructions, other semantic commands, orin any other appropriate way. In some embodiments, the semantic commandis defined by one or more operations. Semantic commands may be describedin a markup language, such as XML. In one embodiment, the semanticcommands are specified in RTXML, as described below and in U.S. patentapplication Ser. No. 10/950,357 entitled MARKUP LANGUAGE SPECIFICATIONOF A DATABASE SCHEMA, which is incorporated herein by reference for allpurposes. In some embodiments, the data (e.g., objects) in the databaseis described in a markup language such as XML (e.g., RTXML) and semanticprocessors 214, 218, and 224 each include an XML engine or interpreter.

In this example, databases 216, 220, and 226 each have the same versionof data. In one embodiment, the data in each of the databases isexpressed in the same version of RTXML. Semantic processors 214, 218,and 224 are each capable of interpreting the same set of commands withina group of semantic processors. For example, the commands are expressedin the same version of RTXML. Individual processors may interpretcommands differently. Different interpretations of the semanticprocessors can be reconciled. In some embodiments, a map of semanticinterpretation and members is maintained.

A system upgrade may be performed where the semantic processors 214,218, and 224 and databases 216, 220, and 226 are upgraded. In someembodiments, first the master is migrated. For example, database 216 ismigrated and semantic processor 214 is upgraded. In one embodiment,database 216 is migrated as described below and in U.S. patentapplication Ser. No. 10/950,192 entitled DATABASE MIGRATION, which isincorporated herein by reference for all purposes. The new version ofdatabase 216 is then replicated over data replication channel 234 a and234 b to databases 220 and 226. Semantic processors 218 and 224 areupgraded over semantic change channels 232 a and 232 b. In someembodiments, each of nodes 204, 208, and 210 is independently migrated.For example, database 220 and database 226 are each migrated usingMDXML.

FIG. 2B is a flowchart illustrating a method of performing semanticreplication. In this example, a database change is received at a node(250). For example, the node could be master 204, member 208, or member210 in FIG. 2A. The change may be expressed as a semantic command, asdescribed above. For example, the command could be defined by one ormore database operations. The change is interpreted (252). For example,one or more operations that can be used to implement the change aredetermined. In some embodiments, a semantic processor determines one ormore database operations that can be used to execute a semantic command.The change is applied (256). For example, the semantic processor couldapply one or more database operations to the local database.

The node may either be the master or a member. When the node is amaster, the change may originate at the master or at a member. Forexample, the change can be received at a member and sent to the master.The change can be received directly at the master. For example, anapplication running on the master requests the change.

When the node is a member, the change may originate at a master, anothermember, or the same member. For example, the change can be received atthe master, applied to the database on the master, and sent to themember. The change can be received at another node, propagated to themaster, applied to the master, and sent to the member. The change can bereceived at the member, sent to the master, applied to the master, andsent back to the member. In this case, the change can be applied to themember the first or second time the change is received. For example, thechange can be applied to the member before forwarding it to the master.Later, the change is sent to the master for reconciliation with thedatabase on the master. In this case, the member has provisional writeauthority, as more fully described below. In some embodiments, eachmember is an HA pair including an active node and a passive node. Thechange is applied to the HA pair as a single atomic transaction, as morefully described below.

In some embodiments, changes may be interpreted differently by differentprocessors. Different semantic interpretations may be captured in amarkup language description, such as RTXML, as described below and inU.S. patent application Ser. No. 10/950,357 entitled MARKUP LANGUAGESPECIFICATION OF A DATABASE SCHEMA, which was previously incorporated byreference. In this example, semantics refers to application semantics.Application specific semantics in the database can be captured andapplied in an efficient way.

FIG. 2C is a diagram of a system for performing semantic replicationwhere one or more nodes have different database semantics. System 250 isshown to include master 280 and two members 282 and 284. Any number ofmembers may be included in other embodiments. Master 280 is shown toinclude semantic translation processor 260, semantic processor 270 and amaster version of the database 264. Member 282 is shown to includesemantic translation processor 258, semantic processor 272 and a localversion of the database 266. Member 284 is shown to include semantictranslation processor 262, semantic processor 262 and a local version ofthe database 268. In some embodiments, the semantic processor isconsidered part of the local database. Semantic translation processors260, 258, and 262 communicate over a semantic replication channel (SRC)286 a and 286 b.

In this example, each of databases 264, 266 and 268 express data usingdifferent semantics. Also, each semantic processor is capable ofinterpreting a different set of (semantic) commands. Thus, each semanticprocessor is different. In some embodiments, each database expressesdata in a different version of RTXML and each semantic processorunderstands commands from a different version of RTXML. In this example,semantic processor 270 and database 264 use version 1, semanticprocessor 272 and database 266 use version 2, and semantic processor 274and database 268 use version 3.

The semantic translation processor is connected between the semanticprocessor and the semantic replication channel. The semantic translationprocessor translates semantic commands so that they can be processed bya local semantic processor. For example, on node 284, semantic processor274 includes an ability to translate a semantic command from node 280 toa semantic command that can be processed by semantic processor 274.Similarly, semantic processor 272 includes an ability to translate asemantic command from node 280 to a semantic command that can beprocessed by semantic processor 272. On node 280, semantic processor 260includes an ability to translate a semantic command (e.g., sent over SRC286 a) from node 282 to a semantic command that can be processed bysemantic processor 270. Semantic processor 260 also includes an abilityto translate a semantic command (e.g., sent over SRC 286 b) from node284 to a semantic command that can be processed by semantic processor270.

For example, a database change may be received at master 280. The changeis expressed in version 1 (e.g., of RTXML). Semantic processor 270interprets the change and applies the change to database 264. The changeis propagated to members 282 and 284. Semantic translation processors258 and 262 receive the change and translate the change to a locallyunderstood semantic command. For example, semantic translation processor258 translates the change so that it is expressed in version 2. In someembodiments, the translation is described in a markup language, such asXML. In some embodiments, the translation is performed using MDXML, asdescribed below and in U.S. patent application Ser. No. 10/950,184entitled MULTIVERSION DATABASE CLUSTER MANAGEMENT, which is incorporatedherein by reference for all purposes. Semantic processors 272 and 274interpret the change and apply the change to databases 266 and 268,respectively.

FIG. 3A is a diagram illustrating a system for provisionally writingdata in a distributed database. In this example, system 300 is shown toinclude master 304 and members 306, 308, and 310. Each of members 306,308, and 310 has provisional write authority. In other words, a writerequest received at any one of members 306, 308, and 310 can be appliedto a local database before the change is propagated to master 304. Themaster gives a “contract” to the member to write to its local databasewithout having to consult the master. The contract gives permission (orauthority) to write to a space under the condition that the write isreconciled with the master database in the future.

More than one member can have authority to write to the same space(e.g., the whole or a portion of the database). In this example, acontract to write to the same space has been given to both members 306and 308. A conflict can occur when both members 306 and 308provisionally write to the same record. The conflict may be a dataconsistency or application logic conflict. For example, a conflictoccurs when member 306 deletes a record and member 308 writes to therecord. The conflict is discovered when the delete and write arepropagated to the master. The conflict may be resolved according to apolicy. For example, the master may ignore the write. Member 308 isnotified and responds to the conflict as appropriate. For example, themember may back out the write. Further examples are provided below.

FIG. 3B is a flowchart illustrating a method of provisionally writingdata in a distributed database. In some embodiments, this process isperformed at one of members 306, 308, or 310. In this example, a writerequest is received at a member (330). The write request can beexpressed in any appropriate way. In one embodiment, the write requestis expressed as a change, such as a semantic command, as describedabove. In one embodiment, the write request is expressed as data, e.g.,the write request is made by sending the changed columns and/or rows. Insome embodiments, a changed data item is sent. The changed data item maybe denoted by a reference associated with an index. The write isperformed on the member (332). For example, the write may be performedaccording to the process shown in FIG. 2B. The write request is sent tothe master (334).

In some embodiments, some or all of the data can be identified by areference. References may be contextual to a particular index. In someembodiments, all indexes are described in a global data description. Theglobal data description may be described in a markup language, such asRTXML.

It is determined whether performing the write would cause a conflict(336). For example, the write may be to a record that has been deleted.If it is determined that there would not be a conflict, the write isperformed on the master (338). For example, the write may be performedaccording to the process shown in FIG. 2B. If it is determined thatthere would be a conflict, the conflict is reconciled (340). Forexample, the write request can be ignored or other actions can be taken.For example, if the write is to a record that has been deleted, a usercan be prompted regarding whether to insert the record. In someembodiments, a conflict management system specifies how conflicts shouldbe reconciled, e.g., in a markup language.

An indication of the status of the write request is sent to the member(342). The indication could be implicit. For example, the indicationcould be the write request (in the case where there is no conflict) orinstructions for resolving the conflict (in the case where there isconflict). For example, if there is no conflict on the master, in someembodiments, a write request is sent to all the members. In someembodiments, the member stores the write requests it sends to the masterand upon receiving an indication of success (of the write request on themaster), the member removes that write request from where it is stored.As such, the member can verify the merging of the write requests (withthe master). If there is conflict on the master, in some embodiments,status is sent only the originating member. In some embodiments, uponreceiving an indication of conflict, the originating member reverses thewrite.

Thus, in a distributed database, a local version of a database may bewritten to optimistically (i.e., by assuming the local version iscorrect) without consulting a master version of the database.Provisional or optimistic write authority can decrease latency,particularly in a highly distributed system.

FIGS. 4A-4C are diagrams illustrating a DHCP example of provisionallywriting data in a distributed database. In this example, system 400 isshown to include master 402, members 404 and 410, routers 406 and 412,and host devices 408 and 414. Members 404 and 410 are servers orappliances that provide DHCP service. Master 402 has a master copy of aDHCP database. Each member 404 and 410 has a local copy of the DHCPdatabase. DHCP member 404 serves router 406 and device 408 in thisexample. Similarly, DHCP member 410 serves router 412 and device 414.Devices 408 and 414 are network devices each requesting an IP addressassignment using DHCP. Router 406 is the first upstream network devicefrom device 408. Router 412 is the first upstream network device fromdevice 414.

In FIG. 4A, device 408 is shown requesting an IP address. The request isreceived by router 406 and forwarded to DHCP member 404. DHCP member 404accesses its local copy of the DHCP database and assigns IP address“10.5.34.2” to device 408. Member 404 writes to its local copy of theDHCP database to reflect the assignment. Member 404 sends the assignmentto router 406, which forwards the assignment to device 408. Device 408operates using IP address “10.5.34.2”. Similarly, device 414 is shownrequesting an IP address. The request is received by router 412 andforwarded to DHCP member 410. DHCP member 410 accesses its local copy ofthe DHCP database and assigns IP address “10.5.34.2” to device 414.Member 410 writes to its local copy of the DHCP database to reflect theassignment. Member 410 sends the assignment to router 412, which forwardthe assignment to device 414. Device 414 operates using IP address“10.5.34.2”.

In FIG. 4B, member 404 sends a write request (corresponding to the IPaddress assignment of “10.5.34.2” to device 408) to master 402. Master402 receives the write request and updates the master copy of thedatabase accordingly. At a later time, member 410 sends a write request(corresponding to the IP address assignment of “10.5.34.2” to device414) to master 402. Master 402 receives the write request and determinesthat there is a conflict. In this case, both devices 408 and 414 cannotbe assigned the same IP address. The conflict is resolved. An indicationof the conflict is sent to member 410. Member 410 assigns a new IPaddress “10.5.34.3” to device 414. The new assignment is sent to router412. Router 412 is updated so that IP address “10.5.34.2” is mapped to“10.5.34.3” via network address translation (NAT) as shown in FIG. 4C.For example, packets arriving at router 412 with destination address“10.5.34.3” are redirected to “10.5.34.2”. The source address in eachpacket from device arriving at router 412 may also be mapped from“10.5.34.2” to “10.5.34.3”. Device 414 does not need to be aware thatits IP address is being remapped by router 412. Device 414 can keep itscurrent IP address assignment until it renews its lease. As such, thedistributed database is self adaptive (or self healing).

FIGS. 5A-5B are diagrams illustrating a DNS example of provisionallywriting data in a distributed database. In this example, system 500 isshown to include master 502, members 504 and 510, and devices 508 and514. Members 504 and 510 are servers or appliances that provide DNSservice. Master 502 has a master copy of a DNS database. Each member 504and 510 has a local copy of the DNS database. DNS member 504 servesdevice 508 and DNS member 510 serves device 514 in this example. Devices508 and 514 are network devices each registering a host name and IPaddress using the DNS protocol.

Device 508 is shown registering hostname “name1” and IP address“10.31.5.2” on member 504. Member 504 writes to its local copy of theDNS database to reflect the hostname, IP address pair. Similarly, device514 is shown registering hostname “name1” and IP address “10.31.5.3” onmember 510. Member 510 writes to its local copy of the DNS database toreflect the hostname, IP address pair.

In FIG. 5B, member 504 sends a write request (corresponding toregistration of “name1”, “10.31.5.2”) to master 502. Master 502 receivesthe write request and updates the master database accordingly. Later,member 510 sends a write request (corresponding to the registration of“name1”, “10.31.4.3”) to master 502. Master 502 receives the writerequest and determines that there is a conflict. In this case, hostname“name1” cannot be registered by two devices. The conflict is resolved.In one embodiment, a notification is sent to an administrator. Theadministrator responds to the conflict as appropriate. For example, theadministrator could change the hostname on device 514 to “name2” toresolve the conflict.

FIGS. 6A-6B are diagrams illustrating a RADIUS example of provisionallywriting data in a distributed database. In this example, system 600 isshown to include master 602, members 604 and 610, routers 606 and 612,and host devices 608 and 614. Members 604 and 610 are servers orappliances that provide RADIUS service. Master 602 has a master copy ofa RADIUS database. Each member 604 and 610 has a local copy of theRADIUS database. RADIUS member 604 serves router 606 and device 608 inthis example. Similarly, RADIUS member 610 serves router 612 and device614. Each of devices 608 and 614 is a network device, such as a computeror a laptop. A user of device 608 is prompted for credentials by router606, in response to a network access attempt, for example. Similarly, auser of device 614 is prompted for credentials by router 612. Router 606is the first upstream network device from device 608. Router 612 is thefirst upstream network device from device 614. Router 606 blocks trafficto/from device 608 until the user of device 608 isauthorized/authenticated, e.g., using 802.1X policy enforcement.Similarly, router 612 blocks traffic to/from device 614 until the userof device 614 is authorized/authenticated.

In FIG. 6A, device 608 is shown sending credentials. The credentials arereceived by router 606 and forwarded to RADIUS member 604. RADIUS member604 determines whether to authorize and authenticate the user. Forexample, RADIUS member 604 accesses its local copy of the RADIUSdatabase and determines whether the credentials are correct and/orwhether the user is authorized. In some embodiments, the user isauthorized if the user has not authorized previously within some timeperiod. Member 604 writes to its local copy of the RADIUS database toreflect the authorization and/or authentication. Member 604 sends theupdate to router 606, which then allows traffic flow to/from device 608.Similarly, device 614 is shown sending credentials. The credentials arereceived by router 612 and forwarded to RADIUS member 610. RADIUS member610 determines whether to authorize and authenticate the user. Forexample, RADIUS member 610 accesses its local copy of the RADIUSdatabase and determines whether the credentials are correct and/orwhether the user is authorized. Member 610 writes to its local copy ofthe RADIUS database to reflect the authorization and/or authentication.Member 610 sends the update to router 612, which then allows trafficflow to/from device 614.

In FIG. 6B, member 604 sends a write request (corresponding to theauthorization/authentication of the user on device 608) to master 602.Master 602 receives the write request and updates the master copy of thedatabase accordingly. At a later time, member 610 sends a write request(corresponding to the authorization/authentication of the user on device614) to master 602. Master 602 receives the write request and determinesthat there is a conflict. In this case, assume that both write requestswere made within a certain time period and that the same user cannot beauthorized more than once within a certain time period. For example, theuser was already authenticated within a certain time period, which couldindicate a distributed attack. In one embodiment, an indication of theconflict, such as a revocation list, is sent to routers 606 and 612.Routers 606 and 612 are updated to revoke authorization for that user.In some embodiments, related information such as the length of time theuser has been logged in is logged. In some embodiments, provisionalwrites are disabled for that user for a certain length of time. In otherwords, a write received from that user at a member is not applied to themember without first consulting the master.

In another example, provisional write authority in a RADIUS distributeddatabase can reduce sign-on, or the number of times a user needs to signon. For example, if a particular user has been authorized/authenticatedat device 608, and the user attempts to access the network using device614, the user does not need to sign on again. Router 612 forwards therequest to RADIUS member 610, which recognizes that the user is alreadyauthorized/authenticated at device 608. RADIUS member 610 writes to itslocal database to authorize/authenticate the user at device 614, sends amessage back to the switch, and the switch allows the user to access thenetwork via device 614.

FIG. 7A is a diagram illustrating a system for reconciling provisionallywritten data in a distributed database. In this example, system 700 isshown to include master 704 and two members 708 and 710. Any number ofmembers may be included in other embodiments. Master 704 is shown toinclude journal queue 702, semantic processor 714, and a master versionof the database 716. Member 708 is shown to include journal queue 706,semantic processor 718, and a local version of the database 720. Member710 is shown to include semantic journal queue 704, processor 724 and alocal version of the database 726. In some embodiments, semanticprocessor 714, 718, and 724 are not needed, e.g., in a system thatperforms replication by propagating data rather than semantics. In thisexample, nodes 704, 708, and 710 communicate over merge stream 730 a and730 b and replication stream 732 a and 732 b.

Each of members 708 and 710 has provisional write authority. In otherwords, a write request (e.g., update) received at any one of members 708and 710 is optimistically applied to the local (member) database withouthaving to consult the master. At a later time, the local database andmaster database are reconciled, as more fully described below. Forexample, a write request received at member 708 is applied to database720 and placed in journal queue 706. In some embodiments, writing todatabase 720 and writing to journal queue 706 are performed as a singleatomic transaction. Later, the write is propagated to the master overmerge stream 730 a to reconcile the write with the master. At a latertime, the master propagates the write request (or conflict status) overreplication streams 732 a and 732 b to members 708 and 710,respectively.

In some embodiments, the journal queue is stored as a file. A write maybe stored in the journal queue in any appropriate way. In someembodiments, the journal queue is a database of items (or records). Anitem, as used herein, refers to a write request, transaction, command,instruction, function, data, operation or any other unit appropriate forstoring the write. In some embodiments, a semantic command is decomposedinto primitives and the primitives are stored. For example, primitivesmay include insert, update, delete, or an aggregate group of operationsthat are interdependent. For example, a command to update a singlerecord may be stored, or a single command associated with updating 5million records (e.g., from “infoblox.com” to “infoblox.abc.com”) may bestored. In some embodiments, a markup language is used to store items inthe journal queue. In some embodiments, data is stored in the journalqueue and data is pushed up the merge stream to the master. In someembodiments, all the nodes share the same semantics, e.g., they are allrelational databases, and relational database commands are stored in thejournal queue.

FIG. 7B is a flowchart illustrating a method of provisionally writingdata in a distributed database at a member. In some embodiments, thisprocess is performed at one of members 708 or 710. In this example, awrite request is received at a member (740). As used herein, this memberis referred to as the member who originated the request, or the“originating member”. The write request may be received from a commandline interface or an application, for example. In some embodiments, thewrite request is expressed as a change, such as a semantic command, asdescribed above. In some embodiments, the write request is expressed asdata, i.e., the write request is expressed by the changed columns and/orrows. The write is applied to the member database and journal queue as asingle atomic transaction (742). For example, if the write is receivedat member 710, it is applied to database 726 and journal queue 704 inone atomic transaction. In some embodiments, Berkeley DB, such as aversion made by Sleepycat Software in Lincoln, Mass., or anothertransactional subsystem that ensures atomicity of transactions is used.The write request may be applied according to the process shown in FIG.2B, or the write may be performed by placing data in the database. Thewrite may be stored in the journal queue as one or more items, asdescribed above.

FIG. 7C is a flowchart illustrating a process for propagating an itemfrom a journal queue to a master. In some embodiments, this process isperformed at one of members 708 or 710 by a journal replicator (orjournal replication process). This process may be performed in parallelwith the process of FIG. 7B. In this example, the journal queue is read(746). In some embodiments, the journal queue is stored as a databaseand the journal replicator performs a database transaction to read fromthe queue. One or more items may be read from the journal queue. In someembodiments, the item(s) is removed from the journal queue after it isread. In other embodiments, the item(s) remains in the journal queueuntil a response is later received from the master, as more fullydescribed below. The item(s) is sent to the master on the merge stream(748). Items may be read from the journal queue at regular intervals orat other times.

FIG. 7D is a flowchart illustrating a method of reconcilingprovisionally written data in a distributed database at a master. Insome embodiments, this process is performed at master 704 in response toreceiving an item on the merge stream from a member, as in (748)described above. In this example, an item is received on the mergestream (752). For example, the item may be the item sent in (748). Theitem may be a write request, or a component of a write request, such asa primitive, as described above. In some embodiments, more than one itemis received and combined into a higher level write request. It isdetermined whether executing the item would cause a conflict on themaster (754). If it is determined that there would not be a conflict(754), the item is executed on the master and written to the masterjournal queue in one atomic transaction (756). If it is determined thatthere would be a conflict on the master, the conflict is reconciled(760). For example, there may be a conflict resolution system thatspecifies how conflicts should be reconciled. In some embodiments,status information is sent to the originating member over thereplication stream. In some embodiments, status information (indicatinga conflict) is placed in the journal queue for sending back to theoriginating member at a later time, as more fully described below.

FIG. 7E is a flowchart illustrating a process for propagating an itemfrom a journal queue to a member. In some embodiments, this process isperformed at master 704 by a journal replicator (or journal replicationprocess). The journal replicator reads the queue and sends item(s) tothe member(s). This process may be performed in parallel with theprocess of FIG. 7D. In this example, the journal queue is read (762). Insome embodiments, the journal queue is stored as a database and thejournal replicator performs a database transaction to read from thequeue. One or more items may be read from the journal queue. Forexample, the item may be a write request or status information(indicating whether there was a conflict). In some embodiments, theitem(s) is removed from the journal queue after it is read. The item(s)is sent to the member on the replication stream (764). Items may be readfrom the journal queue at regular intervals or at other times. The itemmay be sent to the originating member and/or any other member(s). Forexample, if the item is status information indicating that there was aconflict on the master, the item would be sent to the originatingmember. If the item is a write request (indicating that there was noconflict on the master), the item would be propagated to all members. Inthis case, the item is “lazily” replicated over the merge stream tomembers.

FIG. 7F is a flowchart illustrating a method of receiving an item on thereplication stream at an originating member. In some embodiments, thisprocess is performed on one of members 708 or 710 in response toreceiving an item on the replication stream from a master, as describedabove. In this example, the item is received from the master over thereplication stream (768). The item is removed from the journal queue(772). In other words, the member recognizes its own write request andgarbage collects the journal queue. In this way, the journal queue canbe used to verify that a write request has been reconciled with themaster. It is determined whether there was a conflict (774) on themaster. If it is determined that there was a conflict, the conflict ismanaged (778). For example, the corresponding transaction, operation, orsemantic command may be backed out of the member database. If it isdetermined that there was not a conflict, the process ends (776). Insome embodiments, removing the item from the journal queue and managingthe conflict are performed as one atomic transaction. This way, if theconflict is not handled, the journal queue is still aware of that fact.In some embodiments, removing the item from the journal queue isoptional. In this case, the item may have been removed from the journalqueue when it was originally sent over the merge stream.

FIG. 7G is a flowchart illustrating a method of receiving an item on thereplication stream at a non-originating member. In some embodiments,this process is performed on one of members 708 or 710 in response toreceiving an item on the replication stream from a master, as describedabove. In this example, an item is received from the master over thereplication stream (780). For example, the item was applied to themaster without conflict and the item has been sent to the member forreplication. The write is applied to the member database (782). In someembodiments, this process is performed on all non-originating members tosynchronize the member databases with the master database.

In some embodiments, the processes described above are performed withinsystem 700. For example, if member 708 is the originating member, theprocesses of FIGS. 7B, 7C, and 7F are performed on member 708. Theprocesses of FIGS. 7D and 7E are performed on master 704. The process ofFIG. 7G is performed on non-originating member 710. In one embodiment,member 708 receives a write request in the form of a semantic commandand the semantic command is processed by semantic processor 718.Semantic processor 718 interprets the semantic command and appliesappropriate operations to database 720. In the same atomic transaction,the semantic command is placed in journal queue 706. The semanticcommand is decomposed into primitives and the primitives are stored injournal queue 706. The primitives are propagated over merge stream 730 ato be reconciled with the master. If there is a conflict, master 704notifies member 708. If there is not a conflict, master 704 applies theprimitives and propagates the primitives to members 708 and 710 overreplication stream 732 a and 732 b. In some embodiments, this is donevia journal queue 706. Member 708 receives the primitives and removesthem from journal queue 706. Member 710 receives the primitives andapplies them to local database 726.

FIG. 8 is a diagram illustrating a system for performing atomictransactions in a distributed database. In this example, system 800 isshown to include master 804 and two members 808 and 810. Master 804 isshown to be an HA pair including an active node and a passive node.Similarly each of members 808 and 810 is an HA pair including an activenode and a passive node. The active node provides access to the databaseand the passive node serves as a backup to the active node.

If, master 804 receives a write request, the write request is applied tothe active node (written to the database in the active node) and to thepassive node as a single atomic transaction. In other words, the writeis transactionally replicated to the passive node. Thus, the active andpassive nodes are transactionally consistent. If a node fails, there isno data loss. The write is then propagated to the members. Each memberapplies the write to the active node and the passive node in a singleatomic transaction. The write may be expressed in any appropriate way,such as a semantic or other command or instruction. The write may beexpressed as data that is to be pushed to (written to) the database, inthe case of data replication.

In this example, members 808 and 810 may or may not have provisionalwrite authority. In the case where members 808 and 810 have provisionalwrite authority, a write request received at a member is applied to theactive and passive nodes within the member as an atomic transaction. Thewrite is then propagated to the master.

FIG. 9A is a diagram illustrating a system for provisionally writingdata using atomic transactions in a distributed database. In thisexample, system 900 is shown to include master 904 and two members 908and 910. Any number of members may be included in other embodiments.Master 904 is shown to include an active node and a passive node.Similarly, each of members 908 and 910 includes an active node and apassive node. The active node provides access to the local database. Forexample, when a read (e.g., select) request is received at member 908,active database 920 is read. The passive node serves as a backup to theactive node. In the event of failure of the active node, the passivenode handles database access at that member. Each node includes ajournal queue and a local version of the database. In some embodiments,each node includes a semantic processor and/or semantic translationprocessor.

In some embodiments, members 908 and 910 each have provisional writeauthority. A write request received at member 908 is applied to localdatabase 920 and placed in journal queue 906 in a single atomictransaction. The write request is also applied to the passive node,i.e., the write request is applied to local database 921 and placed injournal queue 907 in a single atomic transaction. In some embodiments,the write to the active node (to database 920 and to journal queue 906)and the write to the passive node (to database 921 and to journal queue907) are part one atomic transaction. In other words, the write istransactionally replicated to the passive node. Thus, the databases andjournal queues on both the active and the passive nodes aretransactionally consistent.

Later, the write (e.g., journal queue item(s)) is propagated fromjournal queue 906 to the master over merge stream 930 a to reconcile thewrite with database 916 on the master. In other words, the write islazily replicated to the master. If there is no conflict on the master,the write request is applied to active database 916 and placed injournal queue 902 in a single atomic transaction. The write request isalso applied to the passive node, i.e., the write request is applied tolocal database 917 and placed in journal queue 903 in a single atomictransaction. In some embodiments, the write to the active node (todatabase 916 and to journal queue 902) and the write to the passive node(to database 917 and to journal queue 903) are part of one atomictransaction.

At a later time, master 904 propagates the write request (or conflictstatus) over replication streams 932 a and 932 b. In the case of noconflict, the write request is replicated to all members in someembodiments. In other words, the write is lazily replicated to themembers. In some embodiments, the write is replicated to all membersexcept the originating member. In the case of conflict, a conflictindication is sent to the originating member. In some embodiments, theconflict indication is sent to all members. This may be the case forease of implementation, for example.

As described above, each member receives the information over itsrespective replication stream. The originating member 908 confirms thewrite (in the case where there is no conflict) and manages the conflict(e.g., backs out the transaction) in the case where there is a conflict.The corresponding item(s) is removed from the journal queue on theactive node and on the passive node. In some embodiments, removing theitem(s) from the journal queue occurs on the active and passive node ina single atomic transaction. The non-originating member 910 applies thewrite (as it has not seen the write before), in the case where there wasno conflict on the master. Member 910 manages the conflict in the casewhere there is a conflict. For example, if the conflict was that a writerequest was received for an object that was deleted, the conflictresolution may specify that the request should be ignored.

In this example, a write to a first version of the database in the nodeand a write to an entity representative of a state of the first versionof the database are performed in one atomic transaction. The entitycould be a journal queue or a second version of the database in apassive node.

In case of network segmentation or failure, having transactionalreplication between the active and passive nodes means that the activeand passive versions (copies) of the database are transactionallyconsistent. As such, there is no data loss in the event of a nodefailure. In addition, having the journal queue write and database writeon each node also be transactionally consistent means that there is noloss of data being merged with the master. If a member gets disconnectedfrom the master, the journal queue can continue to fill up locally.

Markup Language Specification of a Database Schema

Databases may be organized in a particular schema, such as an objectoriented or a relational schema, each of which is specific to a databaselanguage. Routines to access and manage the data are implemented in aspecific database language, which requires intricate knowledge of thelanguage. Further, existing schemas typically do not provide astraightforward way to handle relationships between various objects inthe database. Logical data consistency of these relationships ismaintained by implementing database language specific routines, which istime consuming and prone to error. A more robust method of implementinga database schema is needed.

Generating a database schema is disclosed. The database schema isspecified in a markup language and translated into an in memoryrepresentation. Specific database language code is generated from the inmemory representation. Database relationships may be enforced byspecifying within a database schema a reference type that associates twostructures and specifies the relationship between the two structures,and automatically generating code that checks the relationship betweenthe two structures.

FIG. 9B is a block diagram illustrating how a markup languagerepresentation of a database is transformed into a specific databaseschema. In this example, a markup language based on Extensible MarkupLanguage (XML) specifies a database schema. This markup language isreferred to as Runtime XML (RTXML). RTXML specifies the objects in thedatabase and the logical relationships between objects in the database.RTXML also provides mechanisms to check values in the database forconsistency. Using RTXML to specify the database schema provides a layerof abstraction from the target database language, which can greatlysimplify development time and effort. In this example, XML 9502 isprocessed by a front end compiler 9504 into an internal representation9506. For example, the XML structures may be represented by compiled Ccode. A backend code generator 9508 processes internal representation906 and generates a database language specific representation of thestructures. For example, Structured Query Language (SQL) 9510, ObjectQuery Language (OQL) 9512, or Berkeley DB 9514 (e.g., a version made bySleepycat Software) are examples of some of the database schema that maybe generated. In some embodiments, backend code generator 9508 includesa separate code generator for each database language that may bedesired.

The following is an example of RTXML code (Example 1):

<package name=“.com.infoblox.dns”>  <structure name=“host”>   <membername=“zone” type=“.com.infoblox.dns.zone” ref-type=“deep”key-type=“key”>    <syntax string_length=“64”/>   </member>   <membername=“host_name” type=“rtxml.string” key-type=“key”>    <syntaxstring_length=“64”/>   </member>   <member name=“ip_address”type=“rtxml.string”>    <syntax “ip_address”/>   </member>  </structure> <function name=“insert_host”>   <argument name=“zone”/>   <argumentname=“host_name”/>   <argument name=“ip_address”/>   <return name=“host”query=“INSERT INTO host (zone, host_name, ip_address) values(‘${zone}’,‘${host_name}’,‘${ip_address})”>   </return>  </function></package>

In this example, one structure and one function are specified within apackage “.com.infoblox.dns”. Structure is an example of a tag defined inRTXML. The structure has a name “host” and is a host structure. The hoststructure includes three members: a zone, a host_name, and anip_address. The zone member includes three attributes: a type, aref-type, and a key-type. The existence of the ref-type attributeindicates that the structure refers to another structure of typeindicated by the type attribute. In this case, the type is“.com.infoblox.dns.zone”, so the host structure refers to a zonestructure (not shown) defined in the package .com.infoblox.dns.

The ref-type attribute, in this case “deep”, indicates the type ofrelationship between this structure and a parent structure (thestructure to which this structure refers) or child structures(structures referring to this structure). A ref-type of “deep” indicatesthat if the parent structure does not exist, the structure cannot exist.In this case, the host structure cannot exist unless the parent zonestructure exists. A ref-type of “shallow” indicates that it is notnecessary for a parent or a child of the structure to exist. A ref-typeof “pinned” indicates that the structure cannot be deleted if there is achild structure referring to it. A key-type of “key” indicates that themember is part of the key for that structure. The key is a uniqueidentifier of the structure. In some embodiments, the key is aconcatenation of the values of all members tagged as keys. In this case,members host_name and zone are tagged as keys. If the host_name is“mail” and the zone is “infoblox.com”, the key would be“mail.infoblox.com”. A syntax tag is also shown within the zone member,indicating that member zone must follow the specified syntax rule (inthis case, the zone value is of maximum length 64). Similarly, membershost_name and ip_address have various attributes to describe theircharacteristics. Any number of other structures may also be defined.

The function has a name “insert_host” and includes three arguments:“zone”, “host_name”, and “ip_address”. The “return” tag indicates thefunction to be generated. For example, if this code were part of XML9502 from FIG. 9A, SQL 9510 would include the SQL table of the hoststructure and an SQL function (“insert_host(zone, host_name,ip_address”) that is provided, for example, as part of a supplementallibrary.

Any other function can be represented in RTXML. For example, databasefunctions, such as update, insert, delete, and select, can similarly bedefined in RTXML.

FIG. 10 is a diagram illustrating the relationships between variousstructures that can be defined using ref-types. In this example, eachnode 1010-1020 represents a structure. Three zone structures 1010, 1012,and 1020 and two host structures 1014 and 1016 are shown. Each noderepresenting a host structure shows the host_name and type. For example,host structure 1014 has host_name “mail” and type “infoblox”. The typeindicates the referenced structure, or parent structure. In the case ofhost structure 1014, the parent structure is zone structure 1012 withzone_name “infoblox”. Similarly, zone structure 1012 has type “com”,indicating that zone structure 1012 references zone structure 1010 withzone_name “com”. Zone structure 1010 has type “.”, indicating that thereis no zone above zone 1010. A structure can thus refer to a structure ofthe same type, as shown by the zone structure in this example. Alsoshown are the parent and child relationships that can exist betweenstructures. In this case, zone 1010 is the parent of zone 1012 and zone1020, zone 1012 is the parent of host 1014 and host 1016, host 1014 andhost 1016 are children of zone 1012, and zone 1012, and zone 1020 arechildren of zone 1010.

FIG. 11 is a flowchart illustrating a method of generating a databaseschema from a markup language representation of the database. In thisexample, structures in a markup language are received (1102). Forexample, a markup language such as RTXML is specified where thespecification includes various structures and functions. (e.g., XML 9502in FIG. 9B). An in memory representation of the structures is generated(1104). (e.g., internal representation 9506 in FIG. 9B) For example, afront end compiler may generate the in memory representation, as morefully described below. Language specific structures and functions aregenerated (1106). (e.g., specific database blocks 9510-9514) Forexample, a back end code generator may take the in memory representationof the structures and generate the equivalent database language specificcode, such as SQL code, as more fully described below. The functions maybe provided as part of a library to the developer, for example.

FIG. 12 is a diagram illustrating an example of generating an SQL tablefrom an RTXML representation of the table. In this example, the firstportion of RTXML code from Example 1 (RTXML 1202) is shown. From RTXML1202 an in memory representation is generated, as described in step1104. In some embodiments, the in memory representation of thestructures is represented by compiled C code 1204. For example, astructure in RTXML would be equivalent to a structure in C. There aremany other ways in which in memory structures can be stored, such as ina hash table, for example. For simplicity, additional code that may alsobe included is not shown in this example. For example, code representingthe ref-type and key information is not shown. Compiled C code 1204 isused to generate an SQL representation of the host structure 1206, asdescribed in step 1106. For example, a structure in C would beequivalent to a table in SQL. Alternatively, to generate an OQLdatabase, assuming the equivalent to an RTXML structure in OQL is afield, code to create an OQL field would be shown instead of code 1206.Similarly, in the case of a Berkeley DB database, the appropriateBerkeley DB syntax would be generated to insert the in memory structureand its associated key into a Berkeley DB database.

An RTXML function, such as “insert_host” shown above, would be similarlystored as an in memory structure and then converted to a specificdatabase language, such as SQL. In some embodiments, certain functionsare implicit in a structure definition. For example, for each structure,insert, delete, update, and select functions may be generatedautomatically.

FIG. 13 is a flowchart illustrating a method of generating an in memoryrepresentation of an RTXML structure. In some embodiments, this processcan be used to perform step 1104 from FIG. 11. In this example, an XMLfile is parsed. For each XML structure, the start of a structure isgenerated in an intermediate language (1302), such as C or Java. Forexample, assuming RTXML 1202 is being parsed, the following code wouldbe generated in C:

struct host {

For each member of each XML structure, the member is generated in theintermediate language (1304). For example, assuming RTXML 1202 is beingparsed, the following code would be generated in C:

char zone[64];

char host_name[64];

char ip_address[64];

For each XML structure, a close of structure is generated in theintermediate language (1306). For example, assuming RTXML 1202 is beingparsed, “};” would be generated in C:

As such, C code 1204 would be generated by this process. Theintermediate language is compiled to generate an in memoryrepresentation (1308). In this example, a C compiler could be used togenerate the in memory representation of the host structure.

FIG. 14 is a flowchart illustrating a method of generating an SQL tablefrom an in memory representation of a structure. In some embodiments,this process can be used to perform step 1106 from FIG. 11. In thisexample, in memory structures are parsed. For each in memory structure,SQL code is generated to create a table. For example, assuming the inmemory representation of code 1204 is being parsed, the following codewould be generated in SQL to indicate the beginning of a table creation:

create table host=

(

For each member within each in memory structure, an SQL column isgenerated. For example, assuming the in memory representation of code1204 is being parsed, the following code would be generated in SQL:

zone varchar(63),

host_name varchar(63),

ip_address varchar(63),

For each structure, SQL code closing the table is generated (1406). Forexample, assuming the in memory representation of code 1204 is beingparsed, “)” would be generated in SQL to indicate the end of the tablecreation.

As such, the SQL code 1206 would be generated by this process. Forsimplicity, additional code that may also be included is not shown inthis example. For example, code representing the ref-type and keyinformation is not shown.

FIG. 15 is a flowchart illustrating a method of enforcing a referenceduring an insert. For example, a host is of ref-type “deep”, so logicmust be provided to ensure that a host is not inserted unless it has aparent. This logic would execute each time a request to insert a host(or add a host) is received. A request to insert a host is received(1602). For example, a user may enter in SQL (or another target databaselanguage) the following:

insert_host(“infoblox.com”, “mail”, “10.0.0.1”)

The zone structure (i.e., table, in the case of SQL) that is beingreferenced is found (1504). It is determined whether the specified zoneexists in the structure. In the above example, it is determined whetherthe specified zone “infoblox.com” exists. If the specified zone does notexist, the insert is disallowed (1508). If it is determined that thespecified zone does exist, the host is inserted (1512).

FIG. 16 is a flowchart illustrating a method of enforcing a referenceduring a delete. For example, other structures such as host have aref-type “deep” to zone, so logic must be provided to ensure that when azone is deleted, structures referring to the zone are deleted tomaintain logical database consistency. This logic would execute eachtime a request to delete a zone is received. A request to delete a zoneis received (1502). For example, a user may enter in SQL (or anothertarget database language) the following:

delete_zone(“infoblox.com”)

All structures referring to the zone are found (1604). For example,“mail.infoblox.com” and “www.infoblox.com” may be found in the aboveexample. The referring structures are deleted (1606). i.e.,“mail.infoblox.com” and “www.infoblox.com” would be deleted in the aboveexample. Other types of structures may also be found and deleted. Forexample, if the zone to be deleted were “.com”, zone structure“infoblox.com” would also be found and deleted. The zone is deleted(1608).

In some embodiments, not all referring structures are deleted. Forexample, if a referring structure has ref-type “shallow”, there is norequirement for a parent of a child to exist. As such, any structurereferring to the structure to be deleted would have its referenceremoved (e.g., nullified).

In some embodiments, it is not possible to delete all referringstructures. For example, if a referring structure has ref-type “pinned”,the structure may not be deleted if there is a child structure referringto it. As such, the attempt to delete would be disallowed.

In some embodiments, the logic described in FIGS. 15 and 16 is generatedin step 1106 by a backend code generator. In one embodiment, the logicis integrated in functions provided in a supplemental library in step1106 from FIG. 11. For example, the logic described in FIG. 15 would beprovided in the “insert_host” function. The logic described in FIG. 16would be provided in the “delete_zone” function. In other embodiments,the logic is provided implicitly by the target database language. Forexample, some target database languages may provide a way to specify andenforce these relationships.

Database Migration and Multiversion Database Cluster Management

A database schema describes the organization and structure of data in adatabase. Typically the schema of a database is modified incrementallywith each new software release. FIG. 17 is a diagram illustrating fiveversions of a database, v1 to v5. For example, a first version (v1) of acustomer database may include first name, last name, and SSN fields. Inthe next version (v2), a date of birth field may be added. As moreversions are released, a customer site may end up with multipledatabases each having different versions of software. Maintaining thelogic to migrate the various existing versions to newer versions becomesincreasingly difficult. For example, in FIG. 1, specific logic must bemaintained to translate from v1 to v2, v1 to v3, v1 to v4, v1 to v5, v3to v5, v2 to v3, v2 to v4, v4 to v5, and v2 to v5. In addition, it isdifficult to express translations that span more than one version, suchas a translation from v1 to v3. It would be desirable to have a simplermethod for translating databases.

Converting a first version of a database to a second version isdisclosed. Available translation steps are determined, a translationpath from the first version of the database to the second version isselected, and translation steps in the translation path are executed.

FIG. 18 is a diagram illustrating various versions of a database. Inthis example, Version 1 of the database includes a Customer object withthree members: LastName, FirstName, and SSN. Version 2 of the databaseincludes a customer object with four members: LastName, FirstName, SSN,and DOB_US_Format (i.e., month-date-year). Version 3 of the databaseincludes a customer object with three members: LastName.FirstName, SSN,and DOB_Euro_Format (i.e., date-month-year). Version 2, patch 1 of thedatabase includes a customer object with four members: LastName,FirstName, SSN, and DOB_Std_Format. Although objects are described inthis example, any other appropriate data structures, such as tables orstructures, may also be used.

t1 represents the translation from version 1 to version 2. t1 includes anew member translation for the Customer object, where the new member isDOB_US_Format. t2 represents the translation from version 1 to version2, patch 1. t2 includes a new member translation for the Customerobject, where the new member is DOB_Std_Format. t3 represents thetranslation from version 2 to version 3. t3 includes two member valuetransform translations for the Customer object. The first member valuetransform concatenates LastName and FirstName. The second member valuetransform reformats DOB_US_Format to DOB_Euro_Format. t4 represents thetranslation from version 2, patch 1 to version 3. t4 includes two membervalue transform translations for the Customer object. The first membervalue transform concatenates LastName and FirstName. The second membervalue transform reformats DOB_Std_Format to DOB_Euro_Format. Forexample, to migrate a database from version 1 to version 3, either t1and t3, or t2 and t4 can be applied. The translations are lossless andany available translation path can be taken. In one embodiment, eachtranslation t1-t4 is expressed in a markup language such as XML, as morefully described below.

The following is an example of an XML description of a database (Example1):

  <database version=”2.0.0_R18″/>  <object>   <property name=”name”value=”127.0.0.1″/>   <property name=”_type”value=”.com.infoblox.one.node”/>   <property name=”first_name”value=”John”/>   <property name=”last_name” value=”Doe”/>  </object> <object>   <property name=”name” value=”com″/>   <property name=”_type”value=”.com.infoblox.one.zone”/>  </object>   .   .   . </database>

In this example, the specification describes version 2.0.0_R18 of adatabase. The database includes a plurality of objects. Each objectincludes one or more members, where a member includes a name value pair.For example, the first object has four members: name “127.0.0.1”, type“.com.infoblox.one.node”, first_name “John”, and last_name “Doe”. Thefirst object is a node object. The second object has two members: name“com” and type “.com.infoblox.one.zone”. The second object is a zoneobject. Any number of objects can be specified. In one embodiment, theXML description of the database used is RTXML, a markup languagedescribed above and in U.S. patent application Ser. No. 10/950,357,which was previously incorporated by reference.

The following is an example of a Migration Description XML (MDXML)specification of a translation (Example 2):

<STRUCTURE-TRANSFORM STRUCT-NAME=”.com.infoblox.one.node”> <MEMBER-NAME-CHANGE PRE-XFORM-VALUE=”name” POST-XFORM-VALUE=”node_name”/>  <MEMBER-VALUE-CHANGE MEMBER-NAME=”name”PRE-XFORM-VALUE=”127.0.0.1″ POST- XFORM-VALUE=”192.168.1.2”/> <MEMBER-VALUE-CHANGE MEMBER-NAME=”name” PRE-XFORM-VALUE=”127.0.0.2″POST- XFORM-VALUE=”192.168.1.3”/>  <NEW-MEMBER MEMBER=”DOB”DEFAULT-VALUE=”Jan. 1, 1970″  <MEMBER-VALUE-XFORM>   <concat>   <first_name>    <last_name>   </concat>   <destination full_name/> </MEMBER-VALUE-XFORM> </STRUCTURE-TRANSFORM>

For example, MDXML may be used to describe a translation such as t1, t2,t3, or t4. In this example, the translation to be applied to structuresof type “.com.infoblox.one.node” is specified. The translation mayinclude a set of translations (or transforms), such as the following:

MEMBER-NAME-CHANGE changes the name of a member. For example, if thename of the structure was previously “name”, it would be changed to“node_name”.

MEMBER-VALUE-CHANGE changes the value of a member. For example, if thevalue of the name of the structure was previously “127.0.0.1”, it wouldbe changed to “192.168.1.2”.

NEW-MEMBER adds a new member to the structure. For example, a new memberwith name “DOB” and value “Jan. 1, 1970” would be created in thestructure.

MEMBER-VALUE-XFORM transforms the value of a member. For example,first_name and last_name values would be transformed according to theconcat tag, where the concat tag could indicate a concatenation of thefirst_name and last_name values.

Other types of translations may also be specified for objects of type“.com.infoblox.one.node”. Translations for other types of objects mayalso be specified.

The following is an example of an XML description of a database afterthe translation shown in Example 2 is applied to the database shown inExample 1 (Example 3):

  <database version=”2.0.0_R19″/>  <object>   <property name=”node_name”value=”192.168.1.2″/>   <property name=”_type”value=”.com.infoblox.one.node”/>   <property name=”dob” value=”Jan. 1,1970″/>   <property name=”full_name” value=”John.Doe”/>  </object> <object>   <property name=”name” value=”com″/>   <property name=”_type”value=”.com.infoblox.one.zone”/>  </object>    .    .    . </database>

As shown, “node” has become “node_name”. The member with name “_type” isunchanged. “dob” is a new member. “full_name” is a new member whosevalue is the concatenation of the first_name and last_name values. Thezone object is the same, since there were no translations described forthe zone object in the MDXML translation shown in Example 2.

FIG. 19 is a flowchart illustrating a method of converting a databasefrom a first version to a second version. In this example, a graph isbuilt based on a map list and MDXML files (1902). The following is anexample of a map list (Example 4):

<rtxml-version-map-list>  <RTXML-VERSION-MAP version=”2.0.0-R18″md5=”2bf689e0aa69ab0663147908250cacc0″/>  <RTXML-VERSION-MAPversion=”2.0.0-R19″ md5=”79fcd96045cb43147845d8336892a835″/></rtxml-version-map-list>

The map list uniquely maps a content based key to a database version. Inone embodiment, the content based key is a hash value, such as an MD5sum, of the database schema. In the example shown, the first mapping isfrom version “2.0.0-R18” to key “2bf689e0aa69ab0663147908250cacc0”. Thekey was obtained by taking a hash of the version “2.0.0-R18” databaseschema. Using the map list, the database version can be determined andthe appropriate translation graph can be constructed. FIG. 20 is adiagram of a translation graph. A translation graph describes theavailable paths that may be used to translate a database from oneversion to another version. In this example, the translation graph showsthe available paths that may be used to translate a database fromversion “2.0.0_R18” to version “2.0.0_R24”. (“2.0.0_Roff” might be aspecial release created for a particular customer.) For example,translations t1, t2, t3, t9, translations t4, t5, or translations t6,t7, t8, t9 may be applied to translate the database from version2.0.0_R18 to version 2.0.0_R24. In one embodiment, for each translationstep t1-t9, there is an MDXML file that describes the translation. Thus,if there is an MDXML file available for a particular translation, thattranslation is available for use as a step in a translation path.

Returning to FIG. 19, a translation path is selected (1904). Forexample, the shortest path (e.g., t4, t5) or the first path found (e.g.,t1, t2, t3, t9) may be selected. The appropriate translation steps inthe path are applied to the database (1906). For example, if theshortest path was selected in step 1904, the MDXML file for t4 and theMDXML file for t5 would be used to translate the database, as more fullydescribed below.

FIG. 21 is a flowchart illustrating a method of applying translationsteps to arrive at a desired database version. In one embodiment, thismethod is used to perform step 1906 of FIG. 19. In this example, an XMLdump of the database is performed (2102). For example, the databasecould be a relational, object-oriented, or any other type of database.That database would be dumped into an XML file, e.g., formattedsimilarly to the file shown in Example 1. In one embodiment, thedatabase is already described in XML. The database is translated fromthe current version to the next version (2104) using the appropriateMDXML file. In one embodiment, the MDXML file is parsed into in memorystructures based on the type of structure, e.g., there is one in memorystructure describing the translations for each type of structure. It isdetermined whether the database version is the desired version (2106).If the database version is the desired version, the process ends (2108).If the database version is not the desired database version, the processreturns to step 2104 in which the database is translated from thecurrent version to the next version using the appropriate MDXML file.For example, if the next step is to perform translation t2 in FIG. 4,“t2.mdxml” is used. In this example, the database is translated from oneversion to another incrementally, i.e., the database is translated oneversion at a time until the desired version is reached. In oneembodiment, each time a new database version is released, an MDXML fileis released to describe the incremental translation from the previousversion.

FIG. 22 is a flowchart illustrating a method of translating a databasefrom one version to the next version. In one embodiment, this process isused to perform step 2104 of FIG. 21. In this example, the first objectis read (2202). In one embodiment, the first object in an XML filerepresenting a database is read. For example, returning to Example 1,the first object read would be the node object with name “127.0.0.1” andtype “.com.infoblox.one.node”. It is determined whether there are anytranslations for that object type. For example, if the object is a nodeobject, it is determined whether there are any translations for the nodeobject. In some embodiments, the in memory structures of the MDXML fileparsed in step 2104 are consulted for translations corresponding to theobject. For example, if the MDXML file looked like Example 2, it wouldbe determined that there are translations for the node object, as thestructure transform shown is for an object (or structure) of type node(“.com.infoblox.one.node”). If it is determined that there aretranslation(s) for that object type, the translation is applied to theobject (2206). For example, if the structure transform for objects oftype node shown in Example 2 is applied to the node object shown inExample 1, the resulting object would look like the node structure shownin Example 3. The resulting object is written to a file (2208), e.g.,tmp.xml. It is determined whether the object is the last object in thedatabase XML file (2210). If the object is the last object, the processends (2212). If the object is not the last object, the process returnsto step 2202 and the next object is read. Returning to step 2204, ifthere are no translations for that object type, the object is written tothe file (2208) and the process continues as described above. Theresulting file (e.g., tmp.xml) is the XML file associated with thetranslated database. The resulting file may be used to generate the newdatabase, such as an object oriented or relational database. In someembodiments, rather than translating one object at a time, objects aretranslated in groups.

In addition to database migration, the system and methods describedherein may also be used for other purposes. For example, in oneembodiment the techniques described above are used to manage a databasecluster having multiple versions of a database.

FIG. 23 is a block diagram illustrating a system used in one embodimentto manage a database cluster having multiple database versions. In thisexample, the system includes five databases 2302-2310. Databases 2302and 2304 have version 1 software. Databases 2306 and 2308 have version 2software, and database 2310 has version 3 software. Such a scenario, inwhich multiple database versions exist within a cluster, can occurduring a system upgrade process. For example, rather than upgrading allthe databases to the latest version at once, the databases may bemigrated one at a time. In one embodiment, databases 2302-2310 serve asbackups of each other. If one database fails, there are four remainingbackup databases that are available. All the databases would need tofail before the cluster failed. If any one of databases 2302-2310 isupdated, the other databases would also need to be updated.

t1 represents the translation from version 1 to version 2. t1′represents the translation from version 2 to version 1. t3 representsthe translation from version 2 to version 3. t3′ represents thetranslation from version 3 to version 2. For example, an update sentfrom database 2302 to database 2306 would be translated using t1. Anupdate from sent from database 2306 to database 2304 would be translatedusing t1′. An update sent from database 2304 to database 2308 would betranslated using t1. An update sent from database 2304 to database 2310would be translated using t1 and t3. Each of translations t1, t1′, t3,and t3′ may be described by an XML file, such as an MDXML file.

FIG. 24 is a flowchart illustrating a method of propagating an updatefrom a first database to a second database with a different version. Inthis example, an update is received (2402). For example, an update isreceived at database 2302 in FIG. 23. The update could be any writerequest, such as update, delete, or insert. The version of the databaseis determined (2404). For example, a content based key, such as a hashvalue, is generated based on the first database schema. A map list canbe consulted to determine the version of the database from the contentbased key, as described above. A translation path is determined (2406).In one embodiment, a translation graph is consulted to determine thetranslation path. For example, to propagate an update from database 2304(version 1) to database 2310 (version 3), there may be two availabletranslation paths: t1, t3 or t2, t4. The translation path may bedetermined based on any appropriate criteria, such as the shortest pathor the first path found. The translation path may be predetermined. Forexample, translation path t1, t3 may be the predetermined path; that is,when an update is received at database 2310, translation path t1, t3 isautomatically used to translate the update. In some embodiments, thetranslation occurs at database 2304. For example, a translation from v2to v1 may occur at database 2304. The updates are sequentially applied(2408). For example, t1 is applied followed by t3 if translation patht1, t3 is selected. Similarly, the update could be propagated to theother databases in the cluster.

Event Management

FIG. 25 is a block diagram illustrating a database grid. As used herein,a grid refers to a cluster. In this example, database grid 2500 is shownto include a master node 2502 and member nodes 2504-2510. Database grid2500 may be a homogenous grid in which each of appliances 2504-2510 arethe same type of appliance (e.g., appliances 2504-2510 are each DNSappliances), or a heterogeneous grid in which appliances 2504-2510include more than one type of appliance, as shown in FIG. 25. Any numberof nodes could be included in database grid 2500.

In this example, members 2504-2510 are network appliances. Master 2502,DNS appliances 2504 and 2506, RADIUS appliance 2508, and LDAP appliance2510 each include a version of a common database. Master 2502 andmembers 2504 and 2508 are high availability (HA) pairs. An HA pairincludes an active (primary) node and a passive (secondary or redundant)node, where the passive node serves as a backup to the active node whenthe active node fails. Any node of database grid 2500 may be an HA pair.

Each of nodes 2502-2510 has knowledge of events that occurred at theother nodes. Events can include alarms, faults, or any other occurrenceconfigured as an event. For example, various processes could monitor thememory usage of the appliance, the temperature of the CPU, variousnetwork connections, or an indicator of health of the node. If thememory usage or temperature exceeds a certain value, an event could belogged. Events could include the detection of server faults (e.g., DNSserver faults), replication problems, or other internal problems. Insome embodiments, the common database includes information about eventsthat occurred at other nodes. For example, the common database couldinclude data, configuration information, state information, and eventsassociated with each node. Configuration information could include theIP address of each node. State information could include the serialnumber associated with a DNS zone, dynamic configuration information,and/or CPU usage associated with each node.

When an update is received at any of devices 2502-2510, the update ispropagated to the other devices. The update can include an event. Forexample, if an event occurs at a device, the event information ispropagated to the other devices. In some embodiments, the update ispropagated as described above.

Any node can use SNMP to report events to an SNMP management system. Insome embodiments, a subset of devices 2502-2510 is designated asmanagement nodes and events are propagated to the management nodes.

In some embodiments, the master is a floating master. The master can beswapped with a member if the master fails.

Events may be related to fault and alarms. Events may be related tousers, device, and/or sessions. For example, an event related to adevice could include a hard drive failing. An event related to a usercould include the user logging in or an administrator manipulating data.An event related to a session could include a rule or tunnel opening fora particular protocol.

Events may be noticed and one or more actions may be performed, as morefully described below. Events may be logged or audited. For example,actions performed by a user or administrator can be audited, such aslogging in and/or logging out. When a user attempts to perform an actionthat for which the user does not have permission, the event can belogged or audited.

Actions can include restarting services. For example, the system mayknow about a protocol, such as LDAP and/or DNS. A health check of theprotocol can be performed. If a system configuration changes such that adaemon associated with the protocol needs to be restarted, that daemonmay be killed and restarted. For example, a user may use a GUI to log invia the web to master 2502. The user could change the DNS configurationto disallow queries from a particular address. When this event isdetected, the name daemon is reloaded with a new filter or rule appliedto it. In another example, if the name service daemon's configuration isout of date, a restart name daemon handler could be invoked. Servicescould be restarted based on the user's configuration.

Events may be observed from monitoring. Monitoring could includeenvironmental or health checks, such as checking the CPU temperature,disk drive error status, amount of free memory, amount of free diskspace, etc. For example, when the hard drive is full or nearly full, adisk full handler could be invoked.

FIG. 26 is a flowchart illustrating a method of sending a databaseupdate to a master from a member. For example, the member could be anyone of members 2504-2510. In this example, the member monitors forevents (2620). For example, the member monitors certain processes forevents. An event is detected (2622). Optionally, the local version ofthe common database is updated (2624). In some embodiments, the localversion of the common database is not updated until the update isreconciled by the master, e.g., if replication is provided by BerkeleyDB, such as a version made by Sleepycat Software in Lincoln, Mass. Theupdate (event) is sent to the master (2626).

FIG. 27 is a flowchart illustrating a method of receiving a databaseupdate at a master from a member. For example, this process could occurat master 2502 in response to a member sending an update to the masterin (2626). In this example, event information is received from anappliance (2730). The master version of the common database is updated(2733). The database change is distributed to the other appliances(2734). For example, if DNS appliance 2504 sends an update to master2502, master 2502 is updated, and the change is distributed to members2504-2510.

FIG. 28 is a flowchart illustrating a method of receiving a databaseupdate at a member from a master. For example, this process could beperformed on one of members 2504-2510 after receiving a distributeddatabase change from the master in (2734). In this example, eventinformation is received from the master (2830) at a member. It isdetermined whether the member is the originating appliance (i.e., theappliance that originally received the event) (2832). If the member isnot the originating appliance, the local version of the common databaseis updated (2833). If the member is the receiving appliance, the processends (2834). In other words, the member recognizes that it has alreadybeen updated and ignores the change received back from the master.

In some embodiments, the originating member is updated upon receivingthe change back from the master, e.g., if Sleepycat replication is used,as described above. In such embodiments, the originating member is notupdated until the change is reconciled at the master and distributedback to the originating member.

In some embodiments, an event is cleared when the condition that causedthe event no longer exists. For example, if there is an overheatingevent in which the temperature of an appliance is too high, the event iscleared when the temperature drops. A clearing event is a type of updateand can be propagated like any other event as described above.

FIG. 29 is a diagram illustrating an event management system. In thisexample, node 2912 is shown to include an event management system 2904,locally detected events 2910, externally detected events 2908, andprocess manager 2906. Local node 2912 could be a master or a member.Locally detected events 2910 and externally detected events 2908 areprovided to event management system 2904. Locally detected events 2910include events that occur locally, e.g., the temperature of the localdevice exceeding a certain value. Externally detected events 2908include events that occur at other nodes. For example, externallydetected events 2908 may be received from a master, as in (2830).

External commands 2902 can be sent to event management system 2904 andprocess manager 2906. External commands 2902 include, for example,commands from an SNMP manager or from an administrator. Externalcommands 2902 can override actions performed on node 2912. For example,an SNMP command can override an action. Event management system 2904receives events 2908 and 2910 and/or external commands 2902 and providesinformation to process manager 2906. Process manager 2906 receivesexternal commands 2902 and/or information from event management system2904. For example, process manager 2906 may follow an action guide thatspecifies an action(s) to perform when a particular event or set ofevents occurs. For example, if the temperature of a local device is toohot, process manager 2906 may increase the number of fans running onthat device or lower the processing speed, reduce the load, or shut downthe device.

In some embodiments, the system is used in conjunction with other nodesthat use other types of event management. For example, SNMP traps couldbe sent outside the grid to an SNMP management system.

FIG. 30 is a flowchart illustrating a method of responding to a databaseupdate at a node. For example, this process could be performed at amember or master during (2624), (2733), or (2833). In some embodiments,this process is performed at node 2912. In this example, a local versionof the common database is updated (3030). It is determined whether anexternal command is received (3031). For example, the external commandcould be received by event management system 2904 or process manager2906. If an external command is received, the external command isperformed (3034). If an external command is not received, it isdetermined whether an action should be performed (3032). For example,process manager 2906 could determine whether an action should beperformed based on an action guide. For example, the action guide couldinclude performing a recovery or corrective action in the case of afault event. If it is determined that an action should be performed, theaction is performed (3033). If it is not determined that an actionshould be performed, the process ends (3036).

For example, if an event indicating a local DNS failure is received atan appliance, the local process manager could determine that the DNSservice should be restarted on that appliance. In some embodiments, theprocess manager consults a dependency tree, in which more than oneaction is taken as a result of an event. For example, more than oneprocess may need to be restarted if a particular fault (e.g., a softwarefailure) occurs.

If a DNS appliance receives an event indicating that another DNSappliance is down, that DNS appliance could start providing the servicepreviously provided by the failed DNS appliance.

FIG. 31 is a diagram illustrating a grid. Grid 3100 is shown to includemaster 3102, RADIUS server 3104, DHCP server 3106, DNS server 3108, andclient 3110. A user could log using client 3110 via the IEEE 802.1xstandard. RADIUS server 3104 could send a response to client 3110 andDHCP server could respond with a lease. DHCP server 3108 could perform adynamic DNS (DDNS) update and set a host name for the forward andreverse zones. In other words, an A record and a PTR record are createdfor client 3110.

Suppose the user turns off client 3110 before the DHCP lease is up. Forexample, there may be a couple of hours remaining on the lease. TheRADIUS protocol can determine whether a user is still logged in. If itis determined that the user has logged off, the user's data can bedeprovisioned from the protocol databases. In other words, the DHCPlease is and the A record and PTR record are deprovisioned. This allowsfor a more efficient utilization of the address space and more accurateDNS information.

Although the foregoing embodiments have been described in some detailfor purposes of clarity of understanding, the invention is not limitedto the details provided. There are many alternative ways of implementingthe invention. The disclosed embodiments are illustrative and notrestrictive.

What is claimed is:
 1. A method of managing network event informationfrom a plurality of network appliances each providing a network serviceand each having a version on a master, comprising: detecting networkevent information at a first network appliance; updating a version on amaster on the first network appliance with the network eventinformation, comprising: receiving an item from the master; and placingthe item in a journal queue, the journal queue being used to verify thatthe item has been reconciled with the master; determining whether aconflict exists relating to the updating of the version on the master,wherein the determining whether the conflict exists comprises:determining whether the network event information includes the same IPaddress being assigned to a device that exists on the master; in anevent that the conflict does not exist relating to the updating of theversion on the master: propagating the network event information toother versions of the database on other network appliances; and removingthe item from the journal queue in one atomic transaction; and in anevent that the conflict exists relating to the updating of the versionon the master: backing the item out of the master; and resolving theconflict relating to the updating of the version on the master, whereinthe resolving of the conflict includes: sending a new IP address for thedevice to a router, comprising: updating the router to map the new IPaddress to the same IP address assigned to the device to redirectpackets directed to the new IP address to the same IP address, the newIP address and the same IP address having the same network address anddifferent host addresses; and propagating the network event informationto other versions of the database on other network appliances.
 2. Themethod as recited in claim 1, further including updating a version ofthe master on a second network appliance with the network eventinformation.
 3. The method as recited in claim 1, wherein the eventinformation is associated with the first network appliance.
 4. Themethod as recited in claim 1, wherein the master includes networkservice data or event information.
 5. The method as recited in claim 1,further including receiving an external command.
 6. The method asrecited in claim 1, further including receiving a simple networkmanagement protocol (SNMP) command.
 7. The method as recited in claim 1,further including responding to the event information.
 8. The method asrecited in claim 1, further including determining whether to perform anaction based on the event information.
 9. The method as recited in claim1, further including performing an action.
 10. The method as recited inclaim 1, further including restarting a service.
 11. The method asrecited in claim 1, wherein the event information indicates that anothernetwork appliance has failed and further including providing the networkservice previously provided by the failed network appliance.
 12. Themethod as recited in claim 1, wherein an action is determined based onthe event information and the action is overridden by a simple networkmanagement protocol (SNMP) command.
 13. The method as recited in claim1, wherein detecting includes detecting that a user has logged off. 14.The method as recited in claim 1, further including deprovisioning datafrom the database.
 15. A system for managing network event informationfrom a plurality of network appliances each providing a network serviceand each having a version on a master, comprising: a processorconfigured to: detect network event information at a first networkappliance; update a version on a master on the first network appliancewith the network event information, comprising: receive an item from themaster; and place the item in a journal queue, the journal queue beingused to verify that the item has been reconciled with the master;determine whether a conflict exists relating to the updating of theversion on the master, wherein the determining whether the conflictexists comprises: determine whether the network event informationincludes the same IP address being assigned to a device that exists onthe master; in an event that the conflict does not exist relating to theupdating of the version on the master: propagate the network eventinformation to other versions on the master; remove the item from thejournal queue in one atomic transaction; and in an event that theconflict exists relating to the updating on the master; back the itemout of the master; and resolve the conflict relating to the updating ofthe version of the common database, wherein the resolving of theconflict includes: send a new IP address for the device to a router,comprising: update the router to map the new IP address to the same IPaddress assigned to the device to redirect packets directed to the newIP address to the same IP address, the new IP address and the same IPaddress having the same network address and different host addresses;and propagating the network event information to other versions of thedatabase on other network appliances; and a memory coupled with theprocessor, wherein the memory provides the processor with instructions.16. A computer program product for managing network event informationfrom a plurality of network appliances each providing a network serviceand each having a version on a master, the computer program productbeing embodied in a non-transitory computer readable medium andcomprising computer instructions for: detecting network eventinformation at a first network appliance; updating a version on a masteron the first network appliance with the network event information,comprising: receiving an item from the master; and placing the item in ajournal queue, the journal queue being used to verify that the item hasbeen reconciled with the master; determining whether a conflict existsrelating to the updating of the version exists on the master, whereinthe determining whether the conflict relating to the updating of theversion exists on the master comprises: determining whether the networkevent information includes the same IP address being assigned to adevice that exists on another device; in an event that the conflict doesnot exist relating to the updating of the version on the master:propagating the network event information to other versions of thedatabase on other network appliances; and removing the item from thejournal queue in one atomic transaction; and in an event that theconflict exists relating to the updating of the version on the master:backing the item out of the master; and resolving the conflict relatingto the updating of the version of the common database, wherein theresolving of the conflict includes: sending a new IP address for thedevice to a router, comprising: updating the router to map the new IPaddress to the same IP address assigned to the device to redirectpackets directed to the new IP address to the same IP address, the newIP address and the same IP address having the same network address anddifferent host addresses; and propagating the network event informationto other versions of the database on other network appliances.
 17. Themethod as recited in claim 1, wherein the redirecting of the packetsdirected to the new IP address to the same IP address is performed basedon network address translation.