Controlling virtual overlay infrastructure
First Claim
1. A system comprising:
- physical resources; and
one or more virtual overlay infrastructures comprising virtual machines mapped onto the physical resources, wherein each of the one or more virtual overlay infrastructures comprises an infrastructure controller that is implemented by one or more virtual machines, andwherein the infrastructure controller for each of the one or more virtual overlay infrastructures includes,a user accessible part to allow a user of a respective virtual overlay infrastructure to request for a configuration of the respective virtual overlay infrastructure, anda user inaccessible part to prevent the user from accessing the physical resources and prevent the user from controlling a mapping of the virtual machines in the respective virtual overlay infrastructure onto the physical resources.
3 Assignments
0 Petitions
Accused Products
Abstract
A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated. Each infrastructure has its own infrastructure controller to create and configure the infrastructure. It has a user accessible part (CFC) for configuration of that user'"'"'s infrastructure, and a user inaccessible part (UFC) able to access the mapping and the physical resources. This increases user control to ease system administration, while maintaining security by limiting access to the mapping.
-
Citations
12 Claims
-
1. A system comprising:
-
physical resources; and one or more virtual overlay infrastructures comprising virtual machines mapped onto the physical resources, wherein each of the one or more virtual overlay infrastructures comprises an infrastructure controller that is implemented by one or more virtual machines, and wherein the infrastructure controller for each of the one or more virtual overlay infrastructures includes, a user accessible part to allow a user of a respective virtual overlay infrastructure to request for a configuration of the respective virtual overlay infrastructure, and a user inaccessible part to prevent the user from accessing the physical resources and prevent the user from controlling a mapping of the virtual machines in the respective virtual overlay infrastructure onto the physical resources. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A non-transitory computer readable medium storing machine readable instructions, which when executed by a processor perform a method of providing an infrastructure controller for each of one or more virtual overlay infrastructures, wherein each of the one or more virtual overlay infrastructures comprises virtual machines mapped onto physical resources, the machine readable instructions comprising code to:
-
provide a user accessible part to allow a user of a respective virtual overlay infrastructure to request for a configuration of the respective virtual overlay infrastructure; and provide a user inaccessible part to prevent the user from accessing the physical resources and prevent the user from controlling a mapping of the virtual machines in the respective virtual overlay infrastructure onto the physical infrastructure, wherein the user accessible part is to allow the user to send requests to the user inaccessible part to access system management entities including the mapping and the physical resources. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A method of providing an infrastructure controller for each of one or more virtual overlay infrastructures, wherein each of the one or more virtual overlay infrastructures comprises virtual machines mapped onto physical resources, the method comprising:
-
providing, by one or more processors, a user accessible part to allow a user of a respective virtual overlay infrastructure to request for a configuration of the respective virtual overlay infrastructure; and providing a user inaccessible part to prevent the user from accessing the physical resources and prevent the user from controlling a mapping of the virtual machines onto the physical resources, wherein the user accessible part is to allow the user to send requests to the user inaccessible part to access system management entities including the mapping and the physical resources.
-
Specification