The present invention relates generally to cloud computing, and more particularly to allowing access to underling hardware consoles to correct problems experiencing by user.
In a cloud computing environment, computing is delivered as a service rather than a product, whereby shared resources, software and information are provided to computers and other devices as a metered service over a network, such as the Internet. In such an environment, computation, software, data access and storage services are provided to users that do not require knowledge of the physical location and configuration of the system that delivers the services.
The functions of the cloud computing environment are performed by a data center, which includes disparate hardware components (e.g., storage controllers, network switches, physical compute machines) which are integrated amongst each other. Each of these components may have different interfaces to manage the particular component. For example, storage controllers may have a web based and Command Line Interface (CLI) based interface. Network switches and physical compute machines may have other different interfaces. In many cases, there are multiples interfaces for each component.
When these hardware components are combined together to service the user's computing requirements, not all of the features of these components are used by the user. In some cases, the features of the components may actually conflict with each other. Attempts have been made to assist the user in managing the components so as to more effectively utilize the components, such as to correct problems experiencing by the user in servicing the user's computing requirements. However, such management products present numerous options and configurations that make it difficult for the user to effectively manage the components.
In one embodiment of the present invention, a method for providing access to underlying hardware consoles to correct problems experiencing by a user comprises receiving a request to access a managing system, where the managing system is configured to provide access to underlying hardware consoles that are combined together to service the user's computing requirements. The method further comprises identifying one or more managing systems to address problems in servicing the user's computing requirements in response to authenticating the user to access the managing system. Additionally, the method comprises presenting a list of the identified one or more managing systems for the user to connect. Furthermore, the method comprises receiving a selection of one or more managing systems from the list of one or more managing systems. The method additionally comprises enabling the user access to the selected one or more managing systems in response to providing appropriate authentication credentials. In addition, the method comprises providing, by a processor, an interface for the user to select one or more of the underlying hardware consoles to access.
Other forms of the embodiment of the method described above are in a system and in a computer program product.
The foregoing has outlined rather generally the features and technical advantages of one or more embodiments of the present invention in order that the detailed description of the present invention that follows may be better understood. Additional features and advantages of the present invention will be described hereinafter which may form the subject of the claims of the present invention.
A better understanding of the present invention can be obtained when the following detailed description is considered in conjunction with the following drawings, in which:
The present invention comprises a method, system and computer program product for providing access to underlying hardware consoles to correct problems experiencing by a user. In one embodiment of the present invention, the administrative server receives a request from the user to access a managing system (referred to herein as the “advanced manager”) (an advanced manager is configured to provide access to the underlying hardware consoles that are combined together to service a user's computing requirements). The administrative server presents a list of one or more advanced managers for the user to connect that were identified as being able to address the problem(s) the user is experiencing (e.g., problems in servicing the user's computing requirements) based on the current state of the system. The administrative server receives a selection of one or more advanced managers from the list of advanced managers. The administrative server then enables access to the selected advanced managers in response to the user providing appropriate authentication credentials (e.g., password). An interface is then provided to the user by the selected advanced managers to select the underlying hardware consoles to access. In this manner, the user is provided access to the underlying hardware consoles to correct problems experiencing by the user (e.g., problems in servicing the user's computing requirements) without presenting numerous options and configurations so as to allow the user to easily and effectively manage the hardware components used in servicing the user's computing requirements.
In the following description, numerous specific details are set forth to provide a thorough understanding of the present invention. However, it will be apparent to those skilled in the art that the present invention may be practiced without such specific details. In other instances, well-known circuits have been shown in block diagram form in order not to obscure the present invention in unnecessary detail. For the most part, details considering timing considerations and the like have been omitted inasmuch as such details are not necessary to obtain a complete understanding of the present invention and are within the skills of persons of ordinary skill in the relevant art.
It is understood in advance that although this disclosure includes a detailed description on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, the embodiments of the present invention are capable of being implemented in conjunction with any type of clustered computing environment now known or later developed.
In any event, the following definitions have been derived from the “The NIST Definition of Cloud Computing” by Peter Mell and Timothy Grance, dated September 2011, which is cited on an Information Disclosure Statement filed herewith, and a copy of which is provided to the U.S. Patent and Trademark Office.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models.
Characteristics are as follows:
On-Demand Self-Service: A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed, automatically without requiring human interaction with each service's provider.
Broad Network Access: Capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops and workstations).
Resource Pooling: The provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state or data center). Examples of resources include storage, processing, memory and network bandwidth.
Rapid Elasticity: Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
Measured Service: Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth and active user accounts). Resource usage can be monitored, controlled and reported providing transparency for both the provider and consumer of the utilized service.
Service Models are as follows:
Software as a Service (SaaS): The capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based e-mail) or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
Platform as a Service (PaaS): The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment.
Infrastructure as a Service (IaaS): The capability provided to the consumer is to provision processing, storage, networks and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
Deployment Models are as follows:
Private Cloud: The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed and operated by the organization, a third party or some combination of them, and it may exist on or off premises.
Community Cloud: The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy and compliance considerations). It may be owned, managed and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises.
Public Cloud: The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed and operated by a business, academic or government organization, or some combination of them. It exists on the premises of the cloud provider.
Hybrid Cloud: The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds).
Referring now to the Figures in detail,
Network 103 may be, for example, a local area network, a wide area network, a wireless wide area network, a circuit-switched telephone network, a Global System for Mobile Communications (GSM) network, Wireless Application Protocol (WAP) network, a WiFi network, an IEEE 802.11 standards network, various combinations thereof, etc. Other networks, whose descriptions are omitted here for brevity, may also be used in conjunction with system 100 of
Cloud computing environment 102 is used to deliver computing as a service to client device 101 implementing the model discussed above. An embodiment of cloud computing environment 102 is discussed below in connection with
Referring now to
Referring now to
While
Returning back to
As further illustrated in
As will be discussed in greater detail in connection with
Referring again to
Referring now to
Referring again to
Administrative server 302, advanced manager 304 may further include a communications adapter 509 coupled to bus 502. Communications adapter 509 interconnects bus 502 with a network (e.g., network 103 of
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or computer program product. Accordingly, aspects of the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, micro-code, etc.) or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module” or “system.” Furthermore, aspects of the present invention may take the form of a computer program product embodied in one or more computer readable medium(s) having computer readable program code embodied thereon.
Any combination of one or more computer readable medium(s) may be utilized. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C++ or the like and conventional procedural programming languages, such as the C programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
Aspects of the present invention are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the present invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the function/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the function/acts specified in the flowchart and/or block diagram block or blocks.
As stated in the Background section, the functions of the cloud computing environment are performed by a data center, which includes disparate hardware components (e.g., storage controllers, network switches, physical compute machines) which are integrated amongst each other. Each of these components may have different interfaces to manage the particular component. For example, storage controllers may have a web based and Command Line Interface (CLI) based interface. Network switches and physical compute machines may have other different interfaces. In many cases, there are multiples interfaces for each component. When these hardware components are combined together to service the user's computing requirements, not all of the features of these components are used by the user. In some cases, the features of the components may actually conflict with each other. Attempts have been made to assist the user in managing the components so as to more effectively utilize the components, such as to correct problems experiencing by the user in servicing the user's computing requirements. However, such management products present numerous options and configurations that make it difficult for the user to effectively manage the components.
The principles of the present invention provide a means for providing a user access to the underlying hardware consoles to correct problems experiencing by the user (e.g., problems in servicing the user's computing requirements) without presenting numerous options and configurations so as to allow the user to easily and effectively manage the hardware components used in servicing the user's computing requirements as discussed below in connection with
As stated above,
Referring to
In step 602, administrative server 302 generates a unique password to access advanced manager 304. In one embodiment, administrative server 302 generates a unique password to access advanced manager 304 using the date and serial number of the system (e.g., the hardware components, such as hardware components 401, 402, 403, that may reside in a single unit (rack) that is used to service the user's computing requirements) as well as the key discussed above. In this manner, a two stage authentication process is implemented.
In some implementations, method 600 may include other and/or additional steps that, for clarity, are not depicted. Further, in some implementations, method 600 may be executed in a different order presented and that the order presented in the discussion of
Once the user has the password to access advanced manager 304, the user may access the advanced manager 304 in order to access the underlying hardware consoles to correct problems experiencing by the user as discussed below in connection with
Referring to
In step 702, administrative server 302 authenticates the user of client 101 to access advanced manager 304.
In response to authenticating the user, administrative server 302, in step 703, identifies one or more advanced managers 304 to address the problem(s) the user is experiencing (e.g., problems in servicing the user's computing requirements) based on the current state of the system (e.g., the hardware components, such as hardware components 401, 402, 403, that may reside in a single unit that is used to service the user's computing requirements). By specifically identifying the advanced managers 304 to address the problem(s) the user is experiencing, the user will not be presented with numerous options and configurations thereby allowing the user to easily and effectively manage the hardware components used in servicing the user's computing requirements as discussed below.
In step 704, administrative server 302 presents a list of the identified advanced managers 304 (those advanced managers 304 identified in step 703) for the user to select. In one embodiment, the advanced managers 304 that are presented to the user are those advanced managers 304 that can resolve any problem(s) that the user is experiencing (e.g., problems in servicing the user's computing requirements) based on the current state of the system.
In step 705, administrative server 302 receives a selection of one or more advanced managers 304 from the list of advanced managers 304 presented to the user in step 704. In one embodiment, the user may also select the protocol (e.g., Secure Shell (SSH), Hypertext Transfer Protocol Secure (HTTPS)) to be used for accessing the selected advanced manager(s) 304.
In step 706, administrative server 302 receives authentication credentials (e.g., password) to access the selected advanced managers 304. By requiring the user to be authenticated by administrative server 302 as well as requiring the user to provide authentication credentials (e.g., password) to access advanced manager(s) 304, two levels of security are implemented.
In step 707, a determination is made by administrative server 302 as to whether it received the correct password. If administrative server 302 did not receive the correct password, then, in step 708, administrative server 302 does not enable the user of client 101 to access the selected advanced managers 304.
If, however, administrative server 302 receives the correct password, then, in step 709, administrative server 302 enables the user of client 101 to access the selected advanced managers 304. As discussed above, advanced managers 304 provide access to the underlying hardware consoles that are combined together to service the user's computing requirements. In this manner, the user is provided access to the underlying hardware consoles to correct problems experiencing by the user (e.g., problems in servicing the user's computing requirements) without presenting numerous options and configurations so as to allow the user to easily and effectively manage the hardware components used in servicing the user's computing requirements.
In one embodiment, administrative server 302 opens a socket that listens on an ephemeral port (short-lived transport protocol port for Internet Protocol (IP) communications) and passes the port to the user of client 101. The user of client 101 may then connect to administrative server 302. Once client 101 connects to administrative server 302, administrative server 302 opens a socket connection to the selected advanced managers 304 using the IP address and port for the advanced managers 304. In the case of a single-session protocol, such as SSH, the listening port is then closed. For multi-session protocols, such as HTTPS, the listening socket is left open for additional connections.
In one embodiment, a proxy 306 is configured to forward all data received from client 101 to the selected advanced managers 304. In the case of encrypted data, it is not decrypted at proxy 306 but passed as-is from client 101 to the selected advanced managers 304.
In step 710, the selected advanced managers 304 provide an interface for the user of client 101 to select the underlying hardware consoles to access. In one embodiment, a hardware map is presented on the interface of client 101 that graphically displays the individual hardware components (e.g., hardware components 401, 402, 403) inside the cloud computing rack. In response to the user clicking on a hardware component, the user is presented with the option of opening the underlying hardware console.
Optionally, in step 711, the selected advanced managers 304 recommend to the user of client 101 underlying hardware consoles to select based on the current problems in servicing the user's computing requirements.
Optionally, in step 712, the selected advanced managers 304 present guided tasks to the user of client 101 for resolving a problem identified in servicing the user's computing requirements.
In step 713, a determination is made by administrative server 302 as to whether a preset amount of time has elapsed. If a preset amount of time has not elapsed, then administrative server 302 continues to determine whether a preset amount of time has elapsed in step 713.
If, however, a preset amount of time has elapsed, then, in step 714, administrative server 302 disables access to the selected advanced managers 304.
In some implementations, method 700 may include other and/or additional steps that, for clarity, are not depicted. Further, in some implementations, method 700 may be executed in a different order presented and that the order presented in the discussion of
The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.