Envoy for multi-tenant compute infrastructure
First Claim
1. A method for pulling a snapshot of data for a virtual machine of a tenant executing on a multi-tenant compute infrastructure, the method comprising:
- establishing a connection between an envoy of the tenant and a data management and storage (DMS) cluster including peer DMS nodes, the envoy being connected with the virtual machine via a virtual tenant network of the multi-tenant compute infrastructure, the envoy providing the DMS cluster access to the virtual machine via the virtual tenant network;
generating the snapshot of the virtual machine; and
sending the snapshot from the virtual machine to a peer DMS node via the envoy;
wherein;
the envoy is a second virtual machine of the tenant executing on the multi-tenant compute infrastructure;
the multi-tenant compute infrastructure restricts access by the DMS cluster to an infrastructure network connecting physical machines including a physical machine that executes the virtual machine;
the infrastructure network and the virtual tenant network use different network layers and share a physical layer;
the multi-tenant compute infrastructure restricts access by the DMS cluster to a second virtual tenant network of a second tenant of the multi-tenant compute infrastructure; and
the virtual tenant network and the second virtual tenant network use different network layers and share the physical layer.
3 Assignments
0 Petitions
Accused Products
Abstract
A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure includes an envoy connecting the DMS cluster to virtual machines of the tenant executing on the compute infrastructure. The envoy provides the DMS cluster with access to the virtual tenant network and the virtual machines of the tenant connected via the virtual tenant network for DMS services such as data fetch jobs to generate snapshots of the virtual machines. The envoy sends the snapshot from the virtual machine to a peer DMS node via the connection for storage within the DMS cluster. The envoy provides the DMS cluster with secure access to authorized tenants of the compute infrastructure while maintaining data isolation of tenants within the compute infrastructure.
-
Citations
15 Claims
-
1. A method for pulling a snapshot of data for a virtual machine of a tenant executing on a multi-tenant compute infrastructure, the method comprising:
-
establishing a connection between an envoy of the tenant and a data management and storage (DMS) cluster including peer DMS nodes, the envoy being connected with the virtual machine via a virtual tenant network of the multi-tenant compute infrastructure, the envoy providing the DMS cluster access to the virtual machine via the virtual tenant network; generating the snapshot of the virtual machine; and sending the snapshot from the virtual machine to a peer DMS node via the envoy;
wherein;the envoy is a second virtual machine of the tenant executing on the multi-tenant compute infrastructure; the multi-tenant compute infrastructure restricts access by the DMS cluster to an infrastructure network connecting physical machines including a physical machine that executes the virtual machine; the infrastructure network and the virtual tenant network use different network layers and share a physical layer; the multi-tenant compute infrastructure restricts access by the DMS cluster to a second virtual tenant network of a second tenant of the multi-tenant compute infrastructure; and the virtual tenant network and the second virtual tenant network use different network layers and share the physical layer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A multi-tenant compute infrastructure, comprising:
-
a virtual machine of a tenant of the compute infrastructure; a virtual tenant network; and an envoy connected to the virtual machine via the virtual tenant network, the envoy configured to; establish a connection with a data management and storage (DMS) cluster including peer DMS nodes to provide the DMS cluster access to the virtual machine via the virtual tenant network; generate a snapshot of the virtual machine; and send the snapshot from the virtual machine to a peer DMS node via the connection;
wherein;the envoy is a second virtual machine of the tenant executing on the multi-tenant compute infrastructure; the multi-tenant compute infrastructure restricts access by the DMS cluster to an infrastructure network connecting physical machines including a physical machine that executes the virtual machine; the infrastructure network and the virtual tenant network use different network layers and share a physical layer; the multi-tenant compute infrastructure restricts access by the DMS cluster to a second virtual tenant network of a second tenant of the multi-tenant compute infrastructure; and the virtual tenant network and the second virtual tenant network use different network layers and share the physical layer.
-
-
15. A non-transitory computer-readable medium comprising instructions that when executed by a processor configures the processor to:
-
establish a connection with a data management and storage (DMS) cluster including peer DMS nodes to provide the DMS cluster access to a virtual machine of a tenant of a multi-tenant compute infrastructure via a virtual tenant network; generate a snapshot of the virtual machine; and send the snapshot from the virtual machine to a peer DMS node via the connection;
wherein;the processor is a second virtual machine of the tenant executing on the multi-tenant compute infrastructure; the multi-tenant compute infrastructure restricts access by the DMS cluster to an infrastructure network connecting physical machines including a physical machine that executes the virtual machine; the infrastructure network and the virtual tenant network use different network layers and share a physical layer; the multi-tenant compute infrastructure restricts access by the DMS cluster to a second virtual tenant network of a second tenant of the multi-tenant compute infrastructure; and the virtual tenant network and the second virtual tenant network use different network layers and share the physical layer.
-
Specification