System and method for enforcing future policies in a compute environment
First Claim
1. A method comprising:
- receiving a request for resources within a compute environment, wherein the request comprises a credential that places a limit on use of the compute environment for a job associated with the request;
generating a credential map for the credential that indicates one of reserved resources and consumed resources at given time frames;
generating a resource availability map that identifies times and resources that are available independent of any policy;
generating a composite intersecting map that intersects the resource availability map with the credential map;
selecting a time frame for reserving resources for the request based on the composite intersecting map; and
reserving resources within the compute environment for the request based on the time frame and the composite intersecting map.
7 Assignments
0 Petitions
Accused Products
Abstract
A disclosed system receives a request for resources, generates a credential map for each credential associated with the request, the credential map including a first type of resource mapping and a second type of resource mapping. The system generates a resource availability map, generates a first composite intersecting map that intersects the resource availability map with a first type of resource mapping of all the generated credential maps and generates a second composite intersecting map that intersects the resource availability map and a second type of resource mapping of all the generated credential maps. With the first and second composite intersecting maps, the system can allocate resources within the compute environment for the request based on at least one of the first composite intersecting map and the second composite intersecting map.
-
Citations
12 Claims
-
1. A method comprising:
-
receiving a request for resources within a compute environment, wherein the request comprises a credential that places a limit on use of the compute environment for a job associated with the request; generating a credential map for the credential that indicates one of reserved resources and consumed resources at given time frames; generating a resource availability map that identifies times and resources that are available independent of any policy; generating a composite intersecting map that intersects the resource availability map with the credential map; selecting a time frame for reserving resources for the request based on the composite intersecting map; and reserving resources within the compute environment for the request based on the time frame and the composite intersecting map. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
a processor; and a computer-readable medium storing instructions, which, when executed by the processor, perform a method comprising; receiving a request for resources within a compute environment, wherein the request comprises a credential that places a limit on use of the compute environment for a job associated with the request; generating a credential map for the credential that indicates one of reserved resources and consumed resources at given time frames; generating a resource availability map that identifies times and resources that are available independent of any policy; generating a composite intersecting map that intersects the resource availability map with the credential map; selecting a time frame for reserving resources for the request based on the composite intersecting map; and reserving resources within the compute environment for the request based on the time frame and the composite intersecting map.
-
-
12. A non-transitory computer-readable medium storing instructions for controlling a computing device, the instructions, when executed by the computing device, cause the computing device to perform a method comprising:
-
receiving a request for resources within a compute environment, wherein the request comprises a credential that places a limit on use of the compute environment for a job associated with the request; generating a credential map for the credential that indicates one of reserved resources and consumed resources at given time frames; generating a resource availability map that identifies times and resources that are available independent of any policy; generating a composite intersecting map that intersects the resource availability map with the credential map; selecting a time frame for reserving resources for the request based on the composite intersecting map; and reserving resources within the compute environment for the request based on the time frame and the composite intersecting map.
-
Specification