Abstract:
A system and method can deploy and manage software services in virtualized and non-virtualized environments. The system provides an enterprise application virtualization solution that allows for centralized governance and control over software and Java applications. Operations teams can define policies, based on application-level service level agreements (SLA) that govern the allocation of hardware and software resources to ensure that quality of service (QoS) goals are met across virtual and non-virtualized platforms. The system use a rules engine that can compare administrator defined constraints with runtime metrics; generate events when a constraint is violated by a metric of the runtime metrics and generate events when a constraint is violated by a metric of the runtime metrics.
Abstract:
A system and method can provide a data service in a network environment. A subnet administrator can receive a path record resolution request from a source node, wherein the source node uses the path record resolution request to obtain an address of a destination node. Furthermore, the subnet administrator can provide an address of an intermediate node to the source node, wherein the intermediate node provides the data service. Then, the source node can send one or more data packets in a data flow to the intermediate node based on the address of the intermediate node.
Abstract:
A system and method for providing a virtual assembly builder for use with a cloud computing environment. In accordance with an embodiment, the system can include a virtual assembly builder component which maintains a repository of virtual assembly archives, wherein each virtual assembly can include a metadata and one or more virtual machine templates that can be used to instantiate an instance of the assembly; and a virtual assembly builder deployer provided as a web service or other interface, which enables operations for uploading virtual assemblies to the repository, registering virtual assemblies with cloud components, and/or managing deployment instances defined by an assembly.
Abstract:
A system and method can provide a data service in a network environment. A subnet administrator can receive a path record resolution request from a source node, wherein the source node uses the path record resolution request to obtain an address of a destination node. Furthermore, the subnet administrator can provide an address of an intermediate node to the source node, wherein the intermediate node provides the data service. Then, the source node can send one or more data packets in a data flow to the intermediate node based on the address of the intermediate node.
Abstract:
A system and method can provide a data service in a network environment. The network environment can include a node, which supports a data service component that can provide a data service. Additionally, a filter can be provided on a networking device, such as a host channel adaptor (HCA) that is associated with the node. The networking device operates to use the filter to identify one or more packets targeting the data service component without protocol termination. Furthermore, the filter can forward said one or more packets to the data service component.
Abstract:
A system and method can provide a data service in a network environment. The system can provide a data service component on a node in the network environment, wherein the network environment includes a plurality of nodes interconnected via a network fabric. Furthermore, the system can use a native packet forwarding mechanism to direct a data flow in the network fabric to said data service component on the node. Then, the system can use said data service component to process one or more data packets in the data flow in the network fabric.
Abstract:
A system and method can provide a data service in a network environment. The network environment can include a node, which supports a data service component that can provide a data service. Additionally, a filter can be provided on a networking device, such as a host channel adaptor (HCA) that is associated with the node. The networking device operates to use the filter to identify one or more packets targeting the data service component without protocol termination. Furthermore, the filter can forward said one or more packets to the data service component.
Abstract:
A system and method can provide a data service in a network environment. The system can provide a data service component on a node in the network environment, wherein the network environment includes a plurality of nodes interconnected via a network fabric. Furthermore, the system can use a native packet forwarding mechanism to direct a data flow in the network fabric to said data service component on the node. Then, the system can use said data service component to process one or more data packets in the data flow in the network fabric.
Abstract:
A system and method can support data service address resolution in a network environment. An intermediate node can receive an incoming data packet from a source node, wherein the incoming data packet targets a destination node, and wherein the incoming data packet includes a global identifier for the destination node and a local identifier for the intermediate node. Furthermore, the intermediate node can obtain local addressing information for the destination node based on the global identifier for the destination node. Then, the intermediate node can send an outgoing data packet to the destination node based on the obtained local addressing information for the destination node.
Abstract:
A system and method can support security management in a computing environment that includes one or more virtualized machines to which one or more applications can be deployed. The system can include a plurality of agents, wherein each agent resides on one of a plurality of machines in the computing environment and operates to manage software processes and resources running in the computing environment. The system also includes a controller that collects data from the plurality of agents about current operating performance of the computing environment, and uses the data gathered to enforce policies and to deploy services in a way that honors one or more service level agreements of the deployed services. Furthermore, the communication between each of the plurality of agents and the controller can be secured with a mutual authentication method, and the communication between an agent and an application is secured with a one-way authentication method.