Identity-aware load balancing
First Claim
1. A method for identity-aware load balancing, the method comprising:
- identifying, using an attribute communicated with a packet, at an application executing in a data processing system, a sender of the packet, wherein the packet is directed to a set of resources managed by a load balancer;
selecting a rule corresponding to the sender;
changing, based on the sender, a manner of queuing the packet at the load balancer prior for a load balancing operation using a subset of resources;
executing, using a processor and a memory, the rule to identify a characteristic of an algorithm, the identified characteristic being usable in the load balancing operation of the load balancer;
communicating the packet and the identified characteristic of the algorithm to the load balancer;
causing, responsive to the communicating, the load balancer to select an algorithm for a load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm; and
further causing, responsive to the communicating, the load balancing operation to instruct the subset of resources to use a determined type of cryptography with the packet.
3 Assignments
0 Petitions
Accused Products
Abstract
A method, system, and computer program product for identity-aware load balancing are provided in the illustrative embodiments. A sender of a packet is identified using an attribute communicated with the packet. The attribute is sufficient to identify a sender of the packet. The packet is directed to a set of resources managed by a load balancing application. A rule corresponding to the sender is selected. The rule is executed to identify a characteristic of an algorithm usable in a load balancing operation of the load balancing application. The packet and the identified characteristic of the algorithm are communicated to the load balancer. The communicating causes the load balancer to select an algorithm for a load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm.
8 Citations
20 Claims
-
1. A method for identity-aware load balancing, the method comprising:
-
identifying, using an attribute communicated with a packet, at an application executing in a data processing system, a sender of the packet, wherein the packet is directed to a set of resources managed by a load balancer; selecting a rule corresponding to the sender; changing, based on the sender, a manner of queuing the packet at the load balancer prior for a load balancing operation using a subset of resources; executing, using a processor and a memory, the rule to identify a characteristic of an algorithm, the identified characteristic being usable in the load balancing operation of the load balancer; communicating the packet and the identified characteristic of the algorithm to the load balancer; causing, responsive to the communicating, the load balancer to select an algorithm for a load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm; and further causing, responsive to the communicating, the load balancing operation to instruct the subset of resources to use a determined type of cryptography with the packet. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A computer program product for identity-aware load balancing, the computer program product comprising:
-
one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more storage devices, to identify, using an attribute communicated with a packet, at an application executing in a data processing system, a sender of the packet, wherein the packet is directed to a set of resources managed by a load balancer; program instructions, stored on at least one of the one or more storage devices, to select a rule corresponding to the sender; program instructions, stored on at least one of the one or more storage devices, to change, based on the sender, a manner of queuing the packet at the load balancer prior for a load balancing operation using a subset of resources; program instructions, stored on at least one of the one or more storage devices, to execute the rule to identify a characteristic of an algorithm, the identified characteristic being usable in the load balancing operation of the load balancer; program instructions, stored on at least one of the one or more storage devices, to communicate the packet and the identified characteristic of the algorithm to the load balancer; program instructions, stored on at least one of the one or more storage devices, to cause, responsive to the communicating, the load balancer to select an algorithm for a load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm; and program instructions, stored on at least one of the one or more storage devices, to further cause, responsive to the communicating, the load balancing operation to instruct the subset of resources to use a determined type of cryptography with the packet. - View Dependent Claims (17, 18, 19)
-
-
20. A computer system for identity-aware load balancing, the computer system comprising:
-
one or more processors, one or more computer-readable memories and one or more computer-readable tangible storage devices; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to identify, using an attribute communicated with a packet, at an application executing in a data processing system, a sender of the packet, wherein the packet is directed to a set of resources managed by a load balancer; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to select a rule corresponding to the sender; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to change, based on the sender, a manner of queuing the packet at the load balancer prior for a load balancing operation using a subset of resources; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to execute the rule to identify a characteristic of an algorithm, the identified characteristic being usable in a load balancing operation of the load balancer; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to communicate the packet and the identified characteristic of the algorithm to the load balancer; program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to cause, responsive to the communicating, the load balancer to select an algorithm for the load balancing operation with the packet such that the selected algorithm includes the identified characteristic of the algorithm; and program instructions, stored on at least one of the one or more storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, to further cause, responsive to the communicating, the load balancing operation to instruct the subset of resources to use a determined type of cryptography with the packet.
-
Specification