In a software-defined data center (SDDC), virtual infrastructure, which includes virtual compute, storage, and networking resources, is provisioned from hardware infrastructure that includes a plurality of host computers, storage devices, and networking devices. The provisioning of the virtual infrastructure is carried out by management software that communicates with virtualization software (e.g., hypervisor) installed in the host computers.
SDDC users move through various business cycles, requiring them to expand and contract SDDC resources to meet business needs. This leads users to employ multi-cloud solutions, such as typical hybrid cloud solutions where the SDDC spans across an on-premises data center and a public cloud. Running applications across multiple clouds can engender complexity in setup, management, and operations. Further, there is a need for centralized control and management of applications across the different clouds. One such complexity is product enablement. The traditional licensing model where users obtain license keys for different application deployments can become burdensome in multi-cloud environments. Users should be able to move workloads between clouds seamlessly while minimizing licensing costs. Users desire to pay for what they use regardless of deployment.
In an embodiment, a method of entitling endpoint software in a multi-cloud environment having a public cloud in communication through a messaging fabric with a data center is described. The method includes: determining, by an entitlement service executing as a cloud service in the public cloud, deployment information for the endpoint software executing on virtualized hosts of the data center; generating, by the entitlement service in response to an entitlement request, an entitlement task in response to verifying the entitlement request against the deployment information; sending, through the messaging fabric, the entitlement task from the entitlement service to an entitlement agent of an agent platform appliance executing in the data center; and applying, by the entitlement agent in cooperation with a licensing service of the endpoint software, a subscription entitlement as indicated in the entitlement task.
Further embodiments include a non-transitory computer-readable storage medium comprising instructions that cause a computer system to carry out the above method, as well as a computer system configured to carry out the above method.
Keyless licensing in a multi-cloud computing system is described. In embodiments, the multi-cloud computing system includes a public cloud in communication with one or more data centers through a message fabric. The public cloud includes cloud services executing therein that are configured to interact with endpoint software executing in the data centers. In embodiments, the cloud services, establish connections with the endpoint software using an agent platform appliance executing in the data center. The agent platform appliance and the cloud services communicate through the messaging fabric, as opposed to a virtual private network (VPN) or similar private connection. In embodiments, an entitlement service executing as a cloud service in the public cloud is configured to interact with endpoint software executing in a data center for the purpose of applying subscription entitlement(s) to the endpoint software. The subscription entitlement(s) enable features of the endpoint software. As discussed above, the conventional method of obtaining license keys for purchased licenses and applying those license keys to endpoint software in the data center can be burdensome in multi-cloud environments. In the techniques described herein, a user interacts with the entitlement service, which automatically applies subscription entitlement(s) to the target endpoint software. The entitlement service achieves keyless licensing in that the user does not have to manually apply license keys to the endpoint software. Rather, the user can obtain a license and then interact with the entitlement service, which executes as a cloud service in the public cloud, to apply the authorized subscription entitlement(s) to the target endpoint software. In this manner, a user can apply licenses to a plurality of endpoint software executing in one or more data centers through a single cloud service. These and further embodiments are described below with respect to the drawings.
One or more embodiments employ a cloud control plane for managing the configuration of SDDCs, which may be of different types and which may be deployed across different geographical regions, according to a desired state of the SDDC defined in a declarative document referred to herein as a desired state document. The cloud control plane is responsible for generating the desired state and specifying configuration operations to be carried out in the SDDCs according to the desired state. Thereafter, configuration agents running locally in the SDDCs establish cloud inbound connections with the cloud control plane to acquire the desired state and the configuration operations to be carried out, and delegate the execution of these configuration operations to services running in a local SDDC control plane.
One or more embodiments provide a cloud platform from which various services, referred to herein as “cloud services” are delivered to the SDDCs through agents of the cloud services that are running in an appliance (referred to herein as an “agent platform appliance”). A cloud platform hosts containers and/or virtual machines (VMs) in which software components can execute, including cloud services and other services and databases as described herein. Cloud services are services provided from a public cloud to endpoint software executing in data centers such as the SDDCs. The agent platform appliance is deployed in the same customer environment, e.g., a private data center, as the management appliances of the SDDCs. In one embodiment, the cloud platform is provisioned in a public cloud and the agent platform appliance is provisioned as a virtual machine in the customer environment, and the two communicate over a public network, such as the Internet. In addition, the agent platform appliance and the management appliances communicate with each other over a private physical network, e.g., a local area network. Examples of cloud services that are delivered include an SDDC configuration service, an SDDC upgrade service, an SDDC monitoring service, an SDDC inventory service, and a message broker service. Each of these cloud services has a corresponding agent deployed on the agent platform appliance. All communication between the cloud services and the endpoint software of the SDDCs is carried out through the agent platform appliance using a messaging fabric, for example, through respective agents of the cloud services that are deployed on the agent platform appliance. The messaging fabric is software that exchanges messages between the cloud platform and agents in the agent platform appliance over the public network. The components of the messaging fabric are described below.
An SDDC is depicted in
As used herein, a “customer environment” means one or more private data centers managed by the customer, which is commonly referred to as “on-prem,” a private cloud managed by the customer, a public cloud managed for the customer by another organization, or any combination of these. In addition, the SDDCs of any one customer may be deployed in a hybrid manner, e.g., on-premise, in a public cloud, or as a service, and across different geographical regions.
In the embodiments, the agent platform appliance and the management appliances are a VMs instantiated on one or more physical host computers (not shown in
One or more embodiments provide a cloud platform from which various services, referred to herein as “cloud services” are delivered to the SDDCs through agents of the cloud services that are running in an appliance (referred to herein as an “agent platform appliance”). The cloud platform is a computing platform that hosts containers or virtual machines corresponding to the cloud services that are delivered from the cloud platform. The agent platform appliance is deployed in the same customer environment, e.g., a private data center, as the management appliances of the SDDCs. In one embodiment, the cloud platform is provisioned in a public cloud and the agent platform appliance is provisioned as a virtual machine in the customer environment, and the two communicate over a public network, such as the Internet. In addition, the agent platform appliance and the management appliances communicate with each other over a private physical network, e.g., a local area network. Examples of cloud services that are delivered include an SDDC configuration service, an SDDC upgrade service, an SDDC monitoring service, an SDDC inventory service, and a message broker service. Each of these cloud services has a corresponding agent deployed on the agent platform appliance. All communication between the cloud services and the management software of the SDDCs is carried out through the agent platform appliance, for example, through respective agents of the cloud services that are deployed on the agent platform appliance.
In one embodiment, each of the cloud services is a microservice that is implemented as one or more container images executed on a virtual infrastructure of public cloud 10. The cloud services include a cloud service provider (CSP) ID service 110, an entitlement service 120, a task service 130, a scheduler service 140, and a message broker (MB) service 150. Similarly, each of the agents deployed in the Agent platform appliances is a microservice that is implemented as one or more container images executing in the gateway appliances.
CSP ID service 110 manages authentication of access to cloud platform 12 through UI 11 or through an API call made to one of the cloud services via API gateway 15. Access through UI 11 is authenticated if login credentials entered by the user are valid. API calls made to the cloud services via API gateway 15 are authenticated if they contain CSP access tokens issued by CSP ID service 110. Such CSP access tokens are issued by CSP ID service 110 in response to a request from identity agent 112 if the request contains valid credentials.
In the embodiment, entitlement service 120 executes as a cloud service of cloud platform 12 that interacts with endpoint software in a data center to apply subscription entitlement(s) to the endpoint software. A subscription entitlement enables a feature or features of the endpoint software each providing some functionality. Without a subscription entitlement, the corresponding feature and its functionality is disabled in the endpoint software. The entitlement service 120 generates commands that are hereinafter referred to as “entitlement commands.” In response to an entitlement command, entitlement service 120 creates a task corresponding to the entitlement command and makes an API call to task service 130 to perform the task (“entitlement task”). Task service 130 then schedules the task to be performed with scheduler service 140, which then creates a message containing the task to be performed and inserts the message in a message queue managed by MB service 150. After scheduling the task to be performed with scheduler service 140, task service 130 periodically polls scheduler service 140 for status of the scheduled task.
At predetermined time intervals, MB agent 114, which is deployed in agent platform appliance 31, makes an API call to MB service 150 to exchange messages that are queued in their respective queues (not shown), i.e., to transmit to MB service 150 messages MB agent 114 has in its queue and to receive from MB service 150 messages MB service 150 has in its queue. MB service 150 implements a messaging fabric on behalf of cloud platform 12 over which messages are exchanged between cloud platform (e.g., cloud services 120) and agent platform appliance 31 (e.g., cloud agents 116). Agent platform appliance 31 can register with cloud platform 12 by executing MB agent 114 in communication with MB service 150. In the embodiment, messages from MB service 150 are routed to entitlement agent 116 if the messages contain entitlement tasks. Entitlement agent 116 thereafter issues a command to a management appliance that is targeted in the entitlement task (e.g., by invoking APIs of the management appliance) to perform the entitlement task and to check on the status of the entitlement task performed by the management appliance. When the task is completed by the management appliance, entitlement agent 116 invokes an API of scheduler service 140 to report the completion of the task.
Discovery agent 118 communicates with the management appliances of SDDC 41 to obtain authentication tokens for accessing the management appliances. In the embodiments, entitlement agent 116 acquires the authentication token for accessing the management appliance from discovery agent 118 prior to issuing commands to the management appliance, and includes the authentication token in any commands issued to the management appliance.
In the embodiment illustrated in
A software platform 224 of each host 240 provides a virtualization layer, referred to herein as a hypervisor 228, which directly executes on hardware platform 222. In an embodiment, there is no intervening software, such as a host operating system (OS), between hypervisor 228 and hardware platform 222. Thus, hypervisor 228 is a Type-1 hypervisor (also known as a “bare-metal” hypervisor). As a result, the virtualization layer in host cluster 218 (collectively hypervisors 228) is a bare-metal virtualization layer executing directly on host hardware platforms. Hypervisor 228 abstracts processor, memory, storage, and network resources of hardware platform 222 to provide a virtual machine execution space within which multiple virtual machines (VM) 236 may be concurrently instantiated and executed. Applications and/or appliances 244 execute in VMs 236 and/or containers 238 (discussed below).
Host cluster 218 is configured with a software-defined (SD) network layer 275. SD network layer 275 includes logical network services executing on virtualized infrastructure in host cluster 218. The virtualized infrastructure that supports the logical network services includes hypervisor-based components, such as resource pools, distributed switches, distributed switch port groups and uplinks, etc., as well as VM-based components, such as router control VMs, load balancer VMs, edge service VMs, etc. Logical network services include logical switches and logical routers, as well as logical firewalls, logical virtual private networks (VPNs), logical load balancers, and the like, implemented on top of the virtualized infrastructure. In embodiments, SDDC 41 includes edge transport nodes 278 that provide an interface of host cluster 218 to a wide area network (WAN) (e.g., a corporate network, the public Internet, etc.). VIM management appliance 51A (also referred to as a VIM appliance) is a physical or virtual server that manages host cluster 218 and the virtualization layer therein. VIM management appliance 51A installs agent(s) in hypervisor 228 to add a host 240 as a managed entity. VIM management appliance 51A logically groups hosts 240 into host cluster 218 to provide cluster-level functions to hosts 240, such as VM migration between hosts 240 (e.g., for load balancing), distributed power management, dynamic VM placement according to affinity and anti-affinity rules, and high-availability. The number of hosts 240 in host cluster 218 may be one or many. VIM management appliance 51A can manage more than one host Cluster 218.
In an embodiment, SDDC 41 further includes a network manager 212. Network manager 212 (another management appliance 51B) is a physical or virtual server that orchestrates SD network layer 275. In an embodiment, network manager 212 comprises one or more virtual servers deployed as VMs. Network manager 212 installs additional agents in hypervisor 228 to add a host 240 as a managed entity, referred to as a transport node. In this manner, host cluster 218 can be a cluster of transport nodes. One example of an SD networking platform that can be configured and used in embodiments described herein as network manager 212 and SD network layer 275 is a VMware NSX® platform made commercially available by VMware, Inc. of Palo Alto, CA.
VIM management appliance 51A and network manager 212 comprise a virtual infrastructure (VI) control plane 213 of SDDC 41. VIM management appliance 51A can include various VI services. The VI services include various virtualization management services, such as a distributed resource scheduler (DRS), high-availability (HA) service, single sign-on (SSO) service, virtualization management daemon, and the like. An SSO service, for example, can include a security token service, administration server, directory service, identity management service, and the like configured to implement an SSO platform for authenticating users.
In embodiments, SDDC 401 can include a container orchestrator 277. Container orchestrator 277 implements an orchestration control plane, such as Kubernetes®, to deploy and manage applications or services thereof on host cluster 218 using containers 238. In embodiments, hypervisor 228 can support containers 238 executing directly thereon. In other embodiments, containers 238 are deployed in VMs 236 or in specialized VMs referred to as “pod VMs 242.” A pod VM 242 is a VM that includes a kernel and container engine that supports execution of containers, as well as an agent (referred to as a pod VM agent) that cooperates with a controller executing in hypervisor 228 (referred to as a pod VM controller). Container orchestrator 277 can include one or more master servers configured to command and configure pod VM controllers in host cluster 218. Master server(s) can be physical computers attached to network 280 or VMs 236 in host cluster 218.
VIM management appliance 51A includes a licensing service 229, features 235, and optionally software addons 227. A user can be entitled to turn on one or more features 235 of VIM management appliance 51A. Features 235 include various functionalities, which can be part of different entitlement levels. For example, a lower entitlement level can include less enabled features 235 than a higher entitlement level. In embodiments, VIM management appliance 51A includes one or more software addons 227. A user can be entitled to install and execute software addons 227. Licensing service 229 receives entitlement information from cloud platform 12 and enables/disables features 235 and software addons 227 according to the entitlement information. Techniques for generating and providing the entitlement information are described below. In this manner licensing service 229 provides for “keyless licensing” by receiving entitlement information from cloud platform 12 and applying the entitlement information to VIM management appliance 51A. A user is not required to apply a software license key to VIM management appliance 51A through its user interface. Rather, as described further below, the user cooperates with cloud platform 12 to subscribe to various SDDC features, which can include VIM management appliance 51A and a corresponding set of features 235 and software addons 227 (if any). While embodiments are described herein with respect to VIM management appliance 51A, the keyless licensing techniques can be used with other VI control plane software, such as network manager 212 or the like.
Entitlement service 120 communicates with entitlement agent 116 in SDDC 41. In embodiments, entitlement agent 116 can be part of agent platform appliance 31. Entitlement agent 116 communicates with various services in SDDC 41, including licensing service 229 in VIM management appliance 51A (or any other appliance being entitled using the keyless entitlement techniques described herein).
At step 504, entitlement service 120 verifies the subscription entitlement against the deployment information. That is, entitlement service 120 verifies that the user has a subscription that authorizes the requested entitlement and verifies that SDDC 41 includes the deployment for the subscription. For example, if the requested entitlement is for VIM management appliance 51A, entitlement service 120 verifies that VIM management appliance 51A has been deployed, has the necessary version, software features, addon software, and the like to satisfy the requested entitlement. At step 506, entitlement service 120 creates an entitlement task (assuming there is a subscription and there is a deployment that can accept the subscription). At step 508, entitlement service 120 sends the entitlement task to entitlement agent 116 in response to a request by entitlement agent 116. Entitlement agent 116 polls for tasks from entitlement service 120.
Keyless licensing in a multi-cloud computing system has been described. A user interacts with an entitlement service executing as a cloud service in a public cloud to apply subscription entitlement(s) to target endpoint software. The entitlement service verifies licenses obtained by the user for the requested subscription entitlements and verifies that the deployment of the target endpoint software can accept the subscription entitlements. Upon verification, the entitlement service interacts with the endpoint software through a messaging fabric and an agent platform appliance of the data center in which the endpoint software executes. The entitlement service automatically applies the subscription entitlement(s) to the endpoint software, dispensing with the need for the user to manually apply licensing keys to the endpoint software. The user can apply many subscription entitlements across different target endpoint software in one or more data centers. The user can also withdraw any applied entitlements through the entitlement service. The entitlement service provides a centralized cloud service for managing software licensing across data centers in a multi-cloud environment.
One or more embodiments of the invention also relate to a device or an apparatus for performing these operations. The apparatus may be specially constructed for required purposes, or the apparatus may be a general-purpose computer selectively activated or configured by a computer program stored in the computer. Various general-purpose machines may be used with computer programs written in accordance with the teachings herein, or it may be more convenient to construct a more specialized apparatus to perform the required operations.
The embodiments described herein may be practiced with other computer system configurations including hand-held devices, microprocessor systems, microprocessor-based or programmable consumer electronics, minicomputers, mainframe computers, etc.
One or more embodiments of the present invention may be implemented as one or more computer programs or as one or more computer program modules embodied in computer readable media. The term computer readable medium refers to any data storage device that can store data which can thereafter be input to a computer system. Computer readable media may be based on any existing or subsequently developed technology that embodies computer programs in a manner that enables a computer to read the programs. Examples of computer readable media are hard drives, NAS systems, read-only memory (ROM), RAM, compact disks (CDs), digital versatile disks (DVDs), magnetic tapes, and other optical and non-optical data storage devices. A computer readable medium can also be distributed over a network-coupled computer system so that the computer readable code is stored and executed in a distributed fashion.
Although one or more embodiments of the present invention have been described in some detail for clarity of understanding, certain changes may be made within the scope of the claims. Accordingly, the described embodiments are to be considered as illustrative and not restrictive, and the scope of the claims is not to be limited to details given herein but may be modified within the scope and equivalents of the claims. In the claims, elements and/or steps do not imply any particular order of operation unless explicitly stated in the claims.
Virtualization systems in accordance with the various embodiments may be implemented as hosted embodiments, non-hosted embodiments, or as embodiments that blur distinctions between the two. Furthermore, various virtualization operations may be wholly or partially implemented in hardware. For example, a hardware implementation may employ a look-up table for modification of storage access requests to secure non-disk data.
Many variations, additions, and improvements are possible, regardless of the degree of virtualization. The virtualization software can therefore include components of a host, console, or guest OS that perform virtualization functions.
Plural instances may be provided for components, operations, or structures described herein as a single instance. Boundaries between components, operations, and data stores are somewhat arbitrary, and particular operations are illustrated in the context of specific illustrative configurations. Other allocations of functionality are envisioned and may fall within the scope of the invention. In general, structures and functionalities presented as separate components in exemplary configurations may be implemented as a combined structure or component. Similarly, structures and functionalities presented as a single component may be implemented as separate components. These and other variations, additions, and improvements may fall within the scope of the appended claims.