Abstract:
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.
Abstract:
Systems and methods provision isolated paths from virtual private clouds to corresponding storage virtual machines. In response to a determination that resources for a first tenant of the virtual private cloud are to be provisioned, a subnet for the virtual private cloud is created, where the subnet does not overlap with any other subnet on a network associated with the virtual private cloud. A first VLAN is created on a gateway communicably coupled to the storage server. A first storage virtual machine (SVM) associated with the tenant is created. One or more storage volumes of one or more storage devices are associated with the SVM, where the one or more storage volumes are not allocated to any other SVM.
Abstract:
A method for managing a resource configuration of a heterogeneously managed computer system. During processing of a resource management request, retrieving a set of resource tags are retrieved. Each resource tag associates a local resource identifier that is assigned within a first configuration management domain with an index identifier that is assigned within a second configuration management naming domain. The retrieved tags are mutually associated utilizing the index identifiers to generating a system configuration map. The resource management request is compared with the system configuration map to identify target resources and corresponding target resource information. One or more resource queries are generated based on the identified target resource and corresponding target resource information.
Abstract:
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.
Abstract:
A method for managing a resource configuration of a heterogeneously managed computer system. During processing of a resource management request, retrieving a set of resource tags are retrieved. Each resource tag associates a local resource identifier that is assigned within a first configuration management domain with an index identifier that is assigned within a second configuration management naming domain. The retrieved tags are mutually associated utilizing the index identifiers to generating a system configuration map. The resource management request is compared with the system configuration map to identify target resources and corresponding target resource information. One or more resource queries are generated based on the identified target resource and corresponding target resource information.
Abstract:
A just-in-time storage allocation is initiated for storage at a remote storage device having flash storage. Each of multiple containers comprises a grouping of one or more of the flash storage. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance. A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.
Abstract:
A cloud asset manager can securely provide multi-tenant access to remote assets while preserving isolation across tenants. The remote asset manager defines various roles for legitimate users of the remote asset manager. The roles are associated with credentials that provide access to the remote assets and/or information about the remote assets maintained by a service provider. And the users map to roles based on attempted actions that access the service provider. Thus, a user's requested action is attempted with credentials associated with a role that maps to the requested action.
Abstract:
A method for managing a resource configuration of a heterogeneously managed computer system. During processing of a resource management request, retrieving a set of resource tags are retrieved. Each resource tag associates a local resource identifier that is assigned within a first configuration management domain with an index identifier that is assigned within a second configuration management naming domain. The retrieved tags are mutually associated utilizing the index identifiers to generating a system configuration map. The resource management request is compared with the system configuration map to identify target resources and corresponding target resource information. One or more resource queries are generated based on the identified target resource and corresponding target resource information.
Abstract:
A just-in-time storage allocation is initiated for storage at a remote storage device having flash storage. Each of multiple containers comprises a grouping of one or more of the flash storage. The just-in-time storage allocation includes an application profile that includes a priority criteria for the storage of either a priority of performance over efficiency or a priority of efficiency over performance. A determination is made of whether at least one container of the multiple containers satisfies the priority criteria based on at least one attribute of the at least one container. The storage is allocated in the at least one container, in response to the at least one container satisfying the priority criteria.
Abstract:
A method for managing a resource configuration of a heterogeneously managed computer system. During processing of a resource management request, retrieving a set of resource tags are retrieved. Each resource tag associates a local resource identifier that is assigned within a first configuration management domain with an index identifier that is assigned within a second configuration management naming domain. The retrieved tags are mutually associated utilizing the index identifiers to generating a system configuration map. The resource management request is compared with the system configuration map to identify target resources and corresponding target resource information. One or more resource queries are generated based on the identified target resource and corresponding target resource information.