Abstract

The present disclosure provides a system and method for implementing a configuration management strategy during product migration/system version upgrades. The method involves creating a new cluster level (admin controlled) configuration, named locked list, that contains other configuration key as the value. After creation of the list, this locked list is populated with the configuration keys that admin wants control. Then, the code base is checked-in where runtime configuration is set. A checker is added to skip whenever a config whose key matches with the locked list value. For example, checker does not perform anything and just return if a match case is found. This will ensure that the user’s business use case is not impacted if they try to change the value. Present disclosure provides seamless migration/upgrade paths for new versions of the system by providing admin an ability to provide default upgrade path for users without breaking use cases.

Creative Commons License

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

Share

COinS