Mechanism for providing external access to a secured networked virtualization environment
First Claim
Patent Images
1. A method for providing external access into a secured networked virtualization environment, comprising:
- performing a first leadership election amongst nodes of the secured networked virtualization environment that elects a leader node that directs an external communication from an external entity to a node within the secured networked virtualization environment;
assigning a cluster virtual IP address to the leader node, wherein the cluster virtual IP address is a different IP address than an IP address of the leader node;
generating a reverse tunnel, using a processor of the leader node, based at least in part on the cluster virtual IP address, wherein the external communication from the external entity to the node within the secured networked virtualization environment is sent via the reverse tunnel associated with the cluster virtual IP address;
identifying failure of the leader node;
performing a second leadership election amongst the nodes of the secured networked virtualization environment to elect a new leader node;
assigning the cluster virtual IP address to the new leader node; and
generating another reverse tunnel by the new leader node to allow the external entity to communicate with the secured networked virtualization environment.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for providing external access into a secured networked virtualization environment, includes performing a leadership election amongst nodes of the secured networked virtualization environment to elect a leader node, assigning a cluster virtual IP address to the leader node and generating a reverse tunnel, using a processor, by the leader node to allow for an external entity to communicate with the secured networked virtualization environment.
-
Citations
37 Claims
-
1. A method for providing external access into a secured networked virtualization environment, comprising:
-
performing a first leadership election amongst nodes of the secured networked virtualization environment that elects a leader node that directs an external communication from an external entity to a node within the secured networked virtualization environment; assigning a cluster virtual IP address to the leader node, wherein the cluster virtual IP address is a different IP address than an IP address of the leader node; generating a reverse tunnel, using a processor of the leader node, based at least in part on the cluster virtual IP address, wherein the external communication from the external entity to the node within the secured networked virtualization environment is sent via the reverse tunnel associated with the cluster virtual IP address; identifying failure of the leader node; performing a second leadership election amongst the nodes of the secured networked virtualization environment to elect a new leader node; assigning the cluster virtual IP address to the new leader node; and generating another reverse tunnel by the new leader node to allow the external entity to communicate with the secured networked virtualization environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computer program product embodied on a non-transitory computer readable medium, the non-transitory computer readable medium having stored thereon a sequence of instructions which, when executed by a processor causes the processor to execute a method for providing external access into a secured networked virtualization environment, comprising:
-
performing a first leadership election amongst nodes of the secured networked virtualization environment that elects a leader node that directs an external communication from an external entity to a node within the secured networked virtualization environment; assigning a cluster virtual IP address to the leader node, wherein the cluster virtual IP address is a different IP address than an IP address of the leader node; generating a reverse tunnel, using a processor of the leader node, based at least in part on the cluster virtual IP address, wherein the external communication from the external entity to the node within the secured networked virtualization environment is sent via the reverse tunnel associated with the cluster virtual IP address; identifying failure of the leader node; performing a second leadership election amongst the nodes of the secured networked virtualization environment to elect a new leader node; assigning the cluster virtual IP address to the new leader node; and generating another reverse tunnel by the new leader node to allow the external entity to communicate with the secured networked virtualization environment. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32)
-
-
33. A system for providing external access into a secured networked virtualization environment, comprising:
-
a computer processor to execute a set of program code instructions; and a memory to hold the set of program code instructions, in which the set of program code instructions comprises program code to perform;
performing a first leadership election amongst nodes of the secured networked virtualization environment that elects a leader node that directs an external communication from an external entity to a node within the secured networked virtualization environment;
assigning a cluster virtual IP address to the leader node, wherein the cluster virtual IP address is a different IP address than an IP address of the leader node;
generating a reverse tunnel, using a processor of the leader node, based at least in part on the cluster virtual IP address, wherein the external communication from the external entity to the node within the secured networked virtualization environment is sent via the reverse tunnel associated with the cluster virtual IP address;
identifying failure of the leader node;performing a second leadership election amongst the nodes of the secured networked virtualization environment to elect a new leader node;
assigning the cluster virtual IP address to the new leader node; and
generating another reverse tunnel by the new leader node to allow the external entity to communicate with the secured networked virtualization environment. - View Dependent Claims (34, 35, 36, 37)
-
Specification