CN118696301A - Observability framework for multi-cloud infrastructure - Google Patents
Observability framework for multi-cloud infrastructure Download PDFInfo
- Publication number
- CN118696301A CN118696301A CN202380019796.2A CN202380019796A CN118696301A CN 118696301 A CN118696301 A CN 118696301A CN 202380019796 A CN202380019796 A CN 202380019796A CN 118696301 A CN118696301 A CN 118696301A
- Authority
- CN
- China
- Prior art keywords
- cloud
- cloud environment
- service
- customer
- vcn
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 claims abstract description 133
- 230000008569 process Effects 0.000 claims description 91
- 230000004044 response Effects 0.000 claims description 27
- 238000012550 audit Methods 0.000 claims description 16
- 238000012795 verification Methods 0.000 claims description 11
- 238000004458 analytical method Methods 0.000 claims description 6
- 238000004891 communication Methods 0.000 description 70
- 238000012545 processing Methods 0.000 description 60
- 238000003860 storage Methods 0.000 description 54
- 230000006870 function Effects 0.000 description 47
- 238000010586 diagram Methods 0.000 description 35
- 238000007726 management method Methods 0.000 description 34
- 238000013507 mapping Methods 0.000 description 19
- 239000002184 metal Substances 0.000 description 19
- 230000006855 networking Effects 0.000 description 16
- 238000012544 monitoring process Methods 0.000 description 13
- 238000005516 engineering process Methods 0.000 description 12
- 239000003795 chemical substances by application Substances 0.000 description 10
- 238000013461 design Methods 0.000 description 10
- 238000012986 modification Methods 0.000 description 9
- 230000004048 modification Effects 0.000 description 9
- 239000000758 substrate Substances 0.000 description 9
- 238000005538 encapsulation Methods 0.000 description 8
- 238000001914 filtration Methods 0.000 description 8
- 238000013519 translation Methods 0.000 description 7
- 101100012902 Saccharomyces cerevisiae (strain ATCC 204508 / S288c) FIG2 gene Proteins 0.000 description 6
- 230000005540 biological transmission Effects 0.000 description 6
- 238000010276 construction Methods 0.000 description 6
- 230000000694 effects Effects 0.000 description 6
- 101001121408 Homo sapiens L-amino-acid oxidase Proteins 0.000 description 5
- 102100026388 L-amino-acid oxidase Human genes 0.000 description 5
- 239000008186 active pharmaceutical agent Substances 0.000 description 5
- 238000004590 computer program Methods 0.000 description 5
- 230000000007 visual effect Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 4
- 230000002093 peripheral effect Effects 0.000 description 4
- 230000010076 replication Effects 0.000 description 4
- 235000008694 Humulus lupulus Nutrition 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 230000001413 cellular effect Effects 0.000 description 3
- 230000000295 complement effect Effects 0.000 description 3
- 238000009826 distribution Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000010354 integration Effects 0.000 description 3
- 230000033001 locomotion Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000003825 pressing Methods 0.000 description 3
- 101000827703 Homo sapiens Polyphosphoinositide phosphatase Proteins 0.000 description 2
- 102100023591 Polyphosphoinositide phosphatase Human genes 0.000 description 2
- 230000001133 acceleration Effects 0.000 description 2
- 238000007792 addition Methods 0.000 description 2
- 238000010924 continuous production Methods 0.000 description 2
- 230000036541 health Effects 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000002955 isolation Methods 0.000 description 2
- 238000010801 machine learning Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000008520 organization Effects 0.000 description 2
- 230000004224 protection Effects 0.000 description 2
- 238000011084 recovery Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 238000012384 transportation and delivery Methods 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 230000002776 aggregation Effects 0.000 description 1
- 238000004220 aggregation Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000002591 computed tomography Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000007796 conventional method Methods 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000002059 diagnostic imaging Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000000786 liquid-assisted grinding Methods 0.000 description 1
- 238000002595 magnetic resonance imaging Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 238000005192 partition Methods 0.000 description 1
- 229920003245 polyoctenamer Polymers 0.000 description 1
- 238000002600 positron emission tomography Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000012552 review Methods 0.000 description 1
- 238000013403 standard screening design Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
- 238000002604 ultrasonography Methods 0.000 description 1
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
描述了用于将与服务的执行相关的可观察性数据从第一云环境导出到第二云环境的技术。该服务在第一云环境中为第二云环境的客户执行。在第一云环境中为第二云环境的客户收集与服务的执行相关联的可观察性数据。可观察性数据包括与服务的执行相关联的一个或多个度量。从第一云环境收集的可观察性数据被传送到第二云环境,以使与第二云环境的客户相关联的用户能够经由第二云环境访问可观察性数据。
Techniques for exporting observability data associated with execution of a service from a first cloud environment to a second cloud environment are described. The service is executed in the first cloud environment for a customer of the second cloud environment. Observability data associated with execution of the service is collected in the first cloud environment for the customer of the second cloud environment. The observability data includes one or more metrics associated with execution of the service. The observability data collected from the first cloud environment is transmitted to the second cloud environment to enable users associated with the customers of the second cloud environment to access the observability data via the second cloud environment.
Description
相关申请的交叉引用CROSS-REFERENCE TO RELATED APPLICATIONS
本申请是非临时申请,并要求下列每个临时申请的权益。以下列出的每个临时申请的全部内容均以引用的方式并入本文中,用于所有目的。This application is a non-provisional application and claims the benefit of each of the provisional applications listed below. The entire contents of each of the provisional applications listed below are incorporated herein by reference for all purposes.
(1)美国临时申请No.63/306,007,于2022年2月2日提交;(1) U.S. Provisional Application No. 63/306,007, filed on February 2, 2022;
(2)美国临时申请No.63/306,918,于2022年2月4日提交;(2) U.S. Provisional Application No. 63/306,918, filed on February 4, 2022;
(3)美国临时申请No.63/321,614,于2022年3月18日提交;(3) U.S. Provisional Application No. 63/321,614, filed on March 18, 2022;
(4)美国临时申请No.63/333,965,于2022年4月22日提交;(4) U.S. Provisional Application No. 63/333,965, filed on April 22, 2022;
(5)美国临时申请No.63/336,811,于2022年4月29日提交;(5) U.S. Provisional Application No. 63/336,811, filed on April 29, 2022;
(6)美国临时申请No.63/339,297,于2022年5月6日提交;(6) U.S. Provisional Application No. 63/339,297, filed on May 6, 2022;
(7)美国临时申请No.63/350,212,于2022年6月8日提交;和(7) U.S. Provisional Application No. 63/350,212, filed on June 8, 2022; and
(8)美国临时申请No.63/416,784,于2022年10月17日提交。(8) U.S. Provisional Application No. 63/416,784, filed on October 17, 2022.
技术领域Technical Field
本公开涉及云体系架构,并且更具体地涉及用于链接两个云环境的技术,使得一个云环境的用户可以使用由另一个云环境提供的服务。The present disclosure relates to cloud architecture, and more particularly to techniques for linking two cloud environments so that users of one cloud environment can use services provided by another cloud environment.
背景技术Background Art
过去几年,云服务的采用率急剧上升并且这个趋势只会越来越增加。各种不同的云环境由不同的云服务提供商(CSP)提供,每个云环境提供一组一个或多个云服务。由云环境提供的该组云服务可以包括一个或多个不同类型的服务,包括但不限于软件即服务(SaaS)服务、基础设施即服务(IaaS)服务、平台即服务(PaaS)服务等。The adoption rate of cloud services has increased dramatically over the past few years and this trend will only increase. Various cloud environments are provided by different cloud service providers (CSPs), and each cloud environment provides a set of one or more cloud services. The set of cloud services provided by the cloud environment may include one or more different types of services, including but not limited to software as a service (SaaS) services, infrastructure as a service (IaaS) services, platform as a service (PaaS) services, etc.
虽然目前有各种不同的云环境可用,但每个云环境都为其订阅客户提供封闭的生态系统。因此,云环境的客户被限于使用由该云环境提供的服务。对于订阅由一个CSP提供的云环境的客户来说,没有容易的方式经由该云环境使用由不同CSP提供的不同云环境中所提供的服务。本文讨论的实施例解决了这些问题以及其他问题。本文讨论的实施例解决了这些问题以及其他问题。Although there are currently a variety of different cloud environments available, each cloud environment provides a closed ecosystem for its subscribing customers. Therefore, customers of a cloud environment are limited to using the services provided by that cloud environment. For customers who subscribe to a cloud environment provided by one CSP, there is no easy way to use the services provided in a different cloud environment provided by a different CSP via that cloud environment. The embodiments discussed herein address these and other problems. The embodiments discussed herein address these and other problems.
发明内容Summary of the invention
本公开一般而言涉及改进的云体系架构,并且更具体地涉及用于链接两个云的技术,使得一个云环境的用户可以使用由另一个不同云环境提供的服务。本文描述了各种实施例,包括方法、系统、存储可由一个或多个处理器执行的程序、代码或指令的非暂态计算机可读存储介质等。一些实施例可以通过使用计算机程序产品来实现,该计算机程序产品包括计算机程序/指令,该计算机程序/指令在由处理器执行时使处理器执行本公开中描述的任何方法。The present disclosure relates generally to improved cloud architectures, and more specifically to techniques for linking two clouds so that users of one cloud environment can use services provided by another different cloud environment. Various embodiments are described herein, including methods, systems, non-transitory computer-readable storage media storing programs, codes, or instructions executable by one or more processors, etc. Some embodiments may be implemented using a computer program product that includes a computer program/instructions that, when executed by a processor, causes the processor to perform any of the methods described in the present disclosure.
本公开的实施例提供了一种多云控制平面(MCCP)框架,该框架提供将特定云网络(例如,Oracle云基础设施(OCI))的服务交付给其他云(例如,在Microsoft Azure中)上的用户的能力。MCCP框架允许((一个或多个)其他云环境的)用户访问云环境的服务(例如,PaaS服务),同时提供尽可能接近该用户的(一个或多个)原生云环境的用户体验。MCCP的关键价值主张是客户将能够体验外部云中的服务的完整数据平面能力。Embodiments of the present disclosure provide a multi-cloud control plane (MCCP) framework that provides the ability to deliver services of a specific cloud network (e.g., Oracle Cloud Infrastructure (OCI)) to users on other clouds (e.g., in Microsoft Azure). The MCCP framework allows users (of (one or more) other cloud environments) to access services of a cloud environment (e.g., PaaS services) while providing a user experience that is as close as possible to that user's native cloud environment (one or more). The key value proposition of MCCP is that customers will be able to experience the full data plane capabilities of services in external clouds.
本公开的一个实施例针对一种方法,包括:在第一云环境中执行由第一云环境提供的服务,该服务是为第二云环境的客户执行的;在第一云环境中收集与为第二云环境的客户在第一云环境中执行该服务相关联的可观察性数据(observability data),该可观察性数据包括与所述执行相关联的一个或多个度量;以及将从第一云环境收集的可观察性数据传送到第二云环境,以使与第二云环境的客户相关联的用户能够经由第二云环境访问该可观察性数据。One embodiment of the present disclosure is directed to a method, comprising: executing a service provided by the first cloud environment in a first cloud environment, the service being executed for a customer of a second cloud environment; collecting in the first cloud environment observability data associated with executing the service in the first cloud environment for a customer of the second cloud environment, the observability data comprising one or more metrics associated with the execution; and transmitting the observability data collected from the first cloud environment to the second cloud environment so that a user associated with the customer of the second cloud environment can access the observability data via the second cloud environment.
本公开的一方面提供了一种计算设备,该计算设备包括一个或多个数据处理器以及包含指令的非暂态计算机可读存储介质,指令在一个或多个数据处理器上执行时,使得计算设备执行本文公开的一个或多个方法的部分或全部。One aspect of the present disclosure provides a computing device including one or more data processors and a non-transitory computer-readable storage medium containing instructions, which, when executed on the one or more data processors, causes the computing device to perform part or all of one or more methods disclosed herein.
本公开的另一方面提供了一种有形地实施在非暂态机器可读存储介质中的计算机程序产品,包括被配置为使一个或多个数据处理器执行本文公开的一个或多个方法的部分或全部的指令。Another aspect of the present disclosure provides a computer program product tangibly embodied in a non-transitory machine-readable storage medium, comprising instructions configured to cause one or more data processors to perform part or all of one or more methods disclosed herein.
当参考以下说明书、权利要求书和附图时,前述以及其他特征和实施例将变得更加清楚。The foregoing and other features and embodiments will become more fully apparent upon reference to the following description, claims and accompanying drawings.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
当参考附图阅读以下具体实施方式时,可以更好地理解本公开的特征、实施例和优点。The features, embodiments, and advantages of the present disclosure may be better understood when the following detailed description is read with reference to the accompanying drawings.
图1是分布式环境的高级图,示出了根据某些实施例的由云服务提供商基础设施托管的虚拟或覆盖云网络。1 is a high-level diagram of a distributed environment illustrating a virtual or overlay cloud network hosted by a cloud service provider infrastructure, according to certain embodiments.
图2描绘了根据某些实施例的CSPI内的物理网络中的物理组件的简化体系架构图。2 depicts a simplified architectural diagram of physical components in a physical network within a CSPI, according to certain embodiments.
图3示出了根据某些实施例的CSPI内的示例布置,其中主机机器连接到多个网络虚拟化设备(NVD)。3 illustrates an example arrangement within a CSPI, in which a host machine is connected to multiple network virtualization devices (NVDs), according to some embodiments.
图4描绘了根据某些实施例的主机机器和NVD之间的连接性,用于提供I/O虚拟化以支持多租赁(multitenancy)。4 depicts connectivity between a host machine and an NVD for providing I/O virtualization to support multitenancy, according to some embodiments.
图5描绘了根据某些实施例的由CSPI提供的物理网络的简化框图。5 depicts a simplified block diagram of a physical network provided by CSPI according to certain embodiments.
图6描绘了根据某些实施例的分布式环境的简化高级图,该分布式环境包括由不同云服务提供商(CSP)提供的多个云环境,其中云环境包括提供专门基础设施的特定云环境,该专门基础设施使得由该特定云环境提供的一个或多个云服务能够被其他云环境的客户使用。Figure 6 depicts a simplified high-level diagram of a distributed environment according to certain embodiments, which distributed environment includes multiple cloud environments provided by different cloud service providers (CSPs), where the cloud environment includes a specific cloud environment that provides a specialized infrastructure that enables one or more cloud services provided by the specific cloud environment to be used by customers of other cloud environments.
图7描绘了根据一些实施例的多云控制平面(MCCP)的示例性高级体系架构。FIG7 depicts an exemplary high-level architecture of a multi-cloud control plane (MCCP) according to some embodiments.
图8A和图8B描绘了根据一些实施例的用于链接不同云环境中的两个用户账户的示例性过程。8A and 8B depict an exemplary process for linking two user accounts in different cloud environments, according to some embodiments.
图9描绘了图示根据一些实施例的多云控制平面(MCCP)的组件的示例性系统图。9 depicts an exemplary system diagram illustrating components of a multi-cloud control plane (MCCP) in accordance with some embodiments.
图10A图示了根据某些实施例的链路-资源对象(link-resource object)的示例性关系图样。FIG. 10A illustrates an exemplary relationship diagram of a link-resource object in accordance with some embodiments.
图10B描绘了图示根据某些实施例的链接不同云环境中的两个用户账户的示例过程的流程图。10B depicts a flow diagram illustrating an example process of linking two user accounts in different cloud environments in accordance with certain embodiments.
图10C图示了图示根据某些实施例的在部署资源时使用云-链路资源对象(cloud-link resource obejct)的示例过程的流程图。10C illustrates a flow diagram illustrating an example process for using a cloud-link resource object when deploying resources in accordance with certain embodiments.
图11描绘了根据一些实施例的用于导出可观察性数据的示例性可观察性框架。FIG. 11 depicts an exemplary observability framework for deriving observability data in accordance with some embodiments.
图12描绘了图示根据某些实施例的在导出可观察性数据时执行的过程的流程图。12 depicts a flow diagram illustrating a process performed when exporting observability data in accordance with certain embodiments.
图13描绘了图示根据一些实施例的用于导出可观察性数据的持续过程的泳道图。13 depicts a swim lane diagram illustrating an ongoing process for deriving observability data in accordance with some embodiments.
图14描绘了根据一些实施例的用于导出审计日志(audit log)信息的另一个示例性可观察性框架。FIG. 14 depicts another exemplary observability framework for exporting audit log information in accordance with some embodiments.
图15描绘了图示根据一些实施例的用于导出审计日志信息的持续过程的泳道图。15 depicts a swim lane diagram illustrating an ongoing process for exporting audit log information in accordance with some embodiments.
图16A-图16L描绘了根据某些实施例的为多云控制台生成的示例性图形用户界面。16A-16L depict exemplary graphical user interfaces generated for a multi-cloud console, according to certain embodiments.
图17描绘了图示根据某些实施例的在生成用于多云控制台的示例图形用户界面时执行的过程的流程图。17 depicts a flow diagram illustrating a process performed in generating an example graphical user interface for a multi-cloud console in accordance with certain embodiments.
图18是图示根据至少一个实施例的用于实现云基础设施即服务系统的一种模式的框图。FIG. 18 is a block diagram illustrating one mode for implementing a cloud infrastructure as a service system according to at least one embodiment.
图19是图示根据至少一个实施例的用于实现云基础设施即服务系统的另一种模式的框图。FIG. 19 is a block diagram illustrating another mode for implementing a cloud infrastructure as a service system according to at least one embodiment.
图20是图示根据至少一个实施例的用于实现云基础设施即服务系统的另一种模式的框图。FIG. 20 is a block diagram illustrating another mode for implementing a cloud infrastructure as a service system according to at least one embodiment.
图21是图示根据至少一个实施例的用于实现云基础设施即服务系统的另一种模式的框图。FIG. 21 is a block diagram illustrating another mode for implementing a cloud infrastructure as a service system according to at least one embodiment.
图22是图示根据至少一个实施例的示例计算机系统的框图。22 is a block diagram illustrating an example computer system in accordance with at least one embodiment.
具体实施方式DETAILED DESCRIPTION
在以下描述中,出于解释的目的,阐述了具体细节以便提供对某些实施例的透彻理解。然而,显然可以在没有这些具体细节的情况下实践各种实施例。附图和描述并非旨在限制。词语“示例性”在本文用于表示“用作示例、实例或图示”。本文描述为“示例性”的任何实施例或设计不一定被解释为优选或优于其他实施例或设计。In the following description, for the purpose of explanation, specific details are set forth in order to provide a thorough understanding of certain embodiments. However, it is apparent that various embodiments can be practiced without these specific details. The drawings and descriptions are not intended to be limiting. The word "exemplary" is used herein to mean "serving as an example, instance, or illustration." Any embodiment or design described herein as "exemplary" is not necessarily to be construed as preferred or superior to other embodiments or designs.
本公开一般而言涉及改进的云体系架构,并且更具体地涉及用于链接两个云的技术,使得一个云环境的用户可以使用由另一个不同的云环境提供的服务。本文描述了各种实施例,包括方法、系统、存储可由一个或多个处理器执行的程序、代码或指令的非暂态计算机可读存储介质等。一些实施例可以通过使用计算机程序产品来实现,该计算机程序产品包括计算机程序/指令,计算机程序/指令在由处理器执行时使处理器执行本公开中描述的任何方法。The present disclosure relates generally to improved cloud architectures, and more specifically to techniques for linking two clouds so that users of one cloud environment can use services provided by another different cloud environment. Various embodiments are described herein, including methods, systems, non-transitory computer-readable storage media storing programs, codes, or instructions executable by one or more processors, etc. Some embodiments may be implemented using a computer program product that includes a computer program/instructions that, when executed by a processor, causes the processor to perform any of the methods described in the present disclosure.
本公开的实施例提供了一种多云控制平面(MCCP)框架,该框架提供将特定云网络(例如,Oracle云基础设施(OCI))的服务交付给其他云(例如,在Microsoft Azure中)上的用户的能力。MCCP框架允许((一个或多个)其他云环境的)用户访问云环境的服务(例如,PaaS服务),同时提供尽可能接近该用户的(一个或多个)原生云环境的用户体验。MCCP的关键价值主张是客户将能够体验外部云中的服务的完整数据平面能力。Embodiments of the present disclosure provide a multi-cloud control plane (MCCP) framework that provides the ability to deliver services of a specific cloud network (e.g., Oracle Cloud Infrastructure (OCI)) to users on other clouds (e.g., in Microsoft Azure). The MCCP framework allows users (of (one or more) other cloud environments) to access services of a cloud environment (e.g., PaaS services) while providing a user experience that is as close as possible to that user's native cloud environment (one or more). The key value proposition of MCCP is that customers will be able to experience the full data plane capabilities of services in external clouds.
MCCP以对用户透明的方式使第二云基础设施的用户(例如,Azure用户)能够使用由第一云基础设施(例如,OCI)提供的资源(例如,数据库资源)。具体而言,由第一云基础设施提供的服务在第二云基础设施中表现为“原生(native)”服务。这允许第二云基础设施的客户原生地访问由第一云基础设施提供的服务。如下文参考图6-图17将描述的,MCCP是在第一云基础设施中执行的微服务(microservice)的集合,该集合暴露第一云基础设施的资源以供外部云用户(例如,第二云基础设施的用户)使用。这些微服务中的每个微服务充当代理,该代理向与由第一云基础设施提供的资源提供通信。MCCP enables users of the second cloud infrastructure (e.g., Azure users) to use resources (e.g., database resources) provided by the first cloud infrastructure (e.g., OCI) in a manner that is transparent to the users. Specifically, the services provided by the first cloud infrastructure appear as "native" services in the second cloud infrastructure. This allows customers of the second cloud infrastructure to natively access services provided by the first cloud infrastructure. As will be described below with reference to FIGS. 6-17 , MCCP is a collection of microservices executed in the first cloud infrastructure that expose the resources of the first cloud infrastructure for use by external cloud users (e.g., users of the second cloud infrastructure). Each of these microservices acts as a proxy that provides communication with the resources provided by the first cloud infrastructure.
云网络的示例Cloud Network Example
术语云服务一般用于指由云服务提供商(CSP)使用由CSP提供的系统和基础设施(云基础设施)按需(例如,经由订阅模型)对用户或客户可用的服务。通常,构成CSP的基础设施的服务器和系统与客户自己的预置服务器和系统是分开的。因此,客户可以利用由CSP提供的云服务,而无需为服务购买单独的硬件和软件资源。云服务被设计为向订阅客户提供对应用和计算资源的简单、可扩展的访问,而无需客户投资购买用于提供服务的基础设施。The term cloud service is generally used to refer to services that are made available on demand (e.g., via a subscription model) to users or customers by a cloud service provider (CSP) using systems and infrastructure (cloud infrastructure) provided by the CSP. Typically, the servers and systems that make up the CSP's infrastructure are separate from the customer's own on-premises servers and systems. Therefore, customers can take advantage of cloud services provided by a CSP without having to purchase separate hardware and software resources for the service. Cloud services are designed to provide subscribing customers with simple, scalable access to applications and computing resources without requiring customers to invest in the infrastructure used to provide the service.
有几个云服务提供商提供各种类型的云服务。有各种不同类型或模型的云服务,包括软件即服务(SaaS)、平台即服务(PaaS)、基础设施即服务(IaaS)等。There are several cloud service providers that offer various types of cloud services. There are various different types or models of cloud services including Software as a Service (SaaS), Platform as a Service (PaaS), Infrastructure as a Service (IaaS), etc.
客户可以订阅由CSP提供的一项或多项云服务。客户可以是任何实体,诸如个人、组织、企业等。当客户订阅或注册由CSP提供的服务时,将为该客户创建租赁或账户。然后,客户可以经由这个账户访问与该账户相关联的订阅的一个或多个云资源。A customer can subscribe to one or more cloud services provided by a CSP. A customer can be any entity, such as an individual, organization, enterprise, etc. When a customer subscribes to or registers for a service provided by a CSP, a lease or account is created for the customer. The customer can then access one or more subscribed cloud resources associated with the account via this account.
如上所述,基础设施即服务(IaaS)是一种特定类型的云计算服务。在IaaS模型中,CSP提供客户可用来构建他们自己的可定制网络并部署客户资源的基础设施(称为云服务提供商基础设施或CSPI)。因此,客户的资源和网络由CSP提供的基础设施托管在分布式环境中。这与传统计算不同,在传统计算中,客户的资源和网络由客户提供的基础设施托管。As mentioned above, Infrastructure as a Service (IaaS) is a specific type of cloud computing service. In the IaaS model, the CSP provides infrastructure (called Cloud Service Provider Infrastructure or CSPI) that customers can use to build their own customizable networks and deploy customer resources. Therefore, the customer's resources and network are hosted in a distributed environment by the infrastructure provided by the CSP. This is different from traditional computing, in which the customer's resources and network are hosted by the infrastructure provided by the customer.
CSPI可以包括互连的高性能计算资源,包括各种主机机器、存储器资源和形成物理网络的网络资源,该物理网络也被称为基板网络或底层网络。CSPI中的资源可以散布在一个或多个数据中心上,这一个或多个数据中心可以在地理上散布在一个或多个地理区域上。虚拟化软件可以由这些物理资源执行以提供虚拟化的分布式环境。虚拟化在物理网络上创建覆盖网络(也称为基于软件的网络、软件定义的网络或虚拟网络)。CSPI物理网络为在物理网络之上创建一个或多个覆盖或虚拟网络提供了底层基础。物理网络(或基板网络或底层网络)包括物理网络设备,诸如物理交换机、路由器、计算机和主机机器等。覆盖网络是在物理基板网络之上运行的逻辑(或虚拟)网络。给定的物理网络可以支持一个或多个覆盖网络。覆盖网络通常使用封装技术来区分属于不同覆盖网络的流量。虚拟或覆盖网络也称为虚拟云网络(VCN)。虚拟网络是使用软件虚拟化技术(例如,管理程序(hypervisor)、由网络虚拟化设备(NVD)(例如,smartNIC)实现的虚拟化功能、架顶式(TOR)交换机、实现由NVD执行的一个或多个功能的智能TOR,以及其他机制)创建可以在物理网络之上运行的网络抽象层来实现的。虚拟网络可以采用多种形式,包括对等网络、IP网络等。虚拟网络通常是层3IP网络或者层2VLAN。这种虚拟或覆盖联网的方法常常被称为虚拟或覆盖层3网络。为虚拟网络开发的协议的示例包括IP-in-IP(或通用路由封装(GRE))、虚拟可扩展LAN(VXLAN—IETF RFC 7348)、虚拟专用网络(VPN)(例如,MPLS层3虚拟专用网络(RFC 4364))、VMware的NSX、GENEVE(通用网络虚拟化封装)等。CSPI may include interconnected high-performance computing resources, including various host machines, memory resources, and network resources that form a physical network, which is also referred to as a substrate network or underlying network. The resources in CSPI may be spread across one or more data centers, which may be geographically spread across one or more geographic regions. Virtualization software may be executed by these physical resources to provide a virtualized distributed environment. Virtualization creates an overlay network (also referred to as a software-based network, a software-defined network, or a virtual network) on a physical network. The CSPI physical network provides an underlying foundation for creating one or more overlay or virtual networks on top of a physical network. A physical network (or substrate network or underlying network) includes physical network devices, such as physical switches, routers, computers, and host machines. An overlay network is a logical (or virtual) network that runs on top of a physical substrate network. A given physical network may support one or more overlay networks. Overlay networks typically use encapsulation technology to distinguish traffic belonging to different overlay networks. A virtual or overlay network is also referred to as a virtual cloud network (VCN). Virtual networks are implemented by creating a network abstraction layer that can run on top of a physical network using software virtualization technology (e.g., hypervisors, virtualization functions implemented by network virtualization devices (NVDs) (e.g., smartNICs), top-of-rack (TOR) switches, smart TORs that implement one or more functions performed by NVDs, and other mechanisms). Virtual networks can take many forms, including peer-to-peer networks, IP networks, etc. Virtual networks are typically layer 3 IP networks or layer 2 VLANs. This method of virtual or overlay networking is often referred to as a virtual or overlay layer 3 network. Examples of protocols developed for virtual networks include IP-in-IP (or Generic Routing Encapsulation (GRE)), Virtual Extensible LAN (VXLAN—IETF RFC 7348), Virtual Private Networks (VPNs) (e.g., MPLS Layer 3 Virtual Private Networks (RFC 4364)), VMware's NSX, GENEVE (Generic Network Virtualization Encapsulation), etc.
对于IaaS,由CSP提供的基础设施(CSPI)可以被配置为通过公共网络(例如,互联网)提供虚拟化计算资源。在IaaS模型中,云计算服务提供商可以托管基础设施组件(例如,服务器、存储设备、网络节点(例如,硬件)、部署软件、平台虚拟化(例如,管理程序层)等)。在一些情况下,IaaS提供商还可以供应各种服务来伴随那些基础设施组件(例如,计费、监视、日志记录、安全性、负载平衡和聚类等)。因此,由于这些服务可以是策略驱动的,因此IaaS用户可以能够实现策略来驱动负载平衡以维持应用可用性和性能。CSPI提供基础设施和一组互补云服务,其使得客户能够在高度可用的被托管的分布式环境中构建和运行广泛的应用和服务。CSPI在可从各种联网位置(诸如从客户的预置网络)安全访问的灵活的虚拟网络中提供高性能计算资源和能力以及存储容量。当客户订阅或注册由CSP提供的IaaS服务时,为该客户创建的租赁是CSPI内的安全且隔离的分区,客户可以在其中创建、组织和管理他们的云资源。For IaaS, the infrastructure (CSPI) provided by the CSP can be configured to provide virtualized computing resources over a public network (e.g., the Internet). In the IaaS model, cloud computing service providers can host infrastructure components (e.g., servers, storage devices, network nodes (e.g., hardware), deployment software, platform virtualization (e.g., hypervisor layer), etc.). In some cases, IaaS providers can also supply various services to accompany those infrastructure components (e.g., billing, monitoring, logging, security, load balancing, and clustering, etc.). Therefore, since these services can be policy-driven, IaaS users can implement policies to drive load balancing to maintain application availability and performance. CSPI provides infrastructure and a set of complementary cloud services that enable customers to build and run a wide range of applications and services in a highly available, hosted, distributed environment. CSPI provides high-performance computing resources and capabilities and storage capacity in a flexible virtual network that can be securely accessed from various networked locations (such as from a customer's pre-set network). When a customer subscribes to or signs up for an IaaS service provided by a CSP, the tenancy created for that customer is a secure and isolated partition within CSPI where the customer can create, organize, and manage their cloud resources.
客户可以使用由CSPI提供的计算、存储器和联网资源构建他们自己的虚拟网络。可以在这些虚拟网络上部署一个或多个客户资源或工作负载,诸如计算实例。例如,客户可以使用由CSPI提供的资源来构建一个或多个可定制且私有的虚拟网络,称为虚拟云网络(VCN)。客户可以在客户VCN上部署一个或多个客户资源,诸如计算实例。计算实例可以采用虚拟机、裸机实例等形式。因此,CSPI提供基础设施和一组互补云服务,其使得客户能够在高度可用的虚拟被托管环境中构建和运行广泛的应用和服务。客户不管理或控制由CSPI提供的底层物理资源,但具有对于操作系统、存储和已部署应用的控制;并且可能还有对所选择的联网组件(例如,防火墙)的有限控制。Customers can build their own virtual networks using the computing, storage, and networking resources provided by CSPI. One or more customer resources or workloads, such as computing instances, can be deployed on these virtual networks. For example, customers can use the resources provided by CSPI to build one or more customizable and private virtual networks, called virtual cloud networks (VCNs). Customers can deploy one or more customer resources, such as computing instances, on customer VCNs. Computing instances can take the form of virtual machines, bare metal instances, and the like. Therefore, CSPI provides infrastructure and a set of complementary cloud services that enable customers to build and run a wide range of applications and services in a highly available virtual hosted environment. Customers do not manage or control the underlying physical resources provided by CSPI, but have control over operating systems, storage, and deployed applications; and may also have limited control over selected networking components (e.g., firewalls).
CSP可以提供控制台,其使得客户和网络管理员能够使用CSPI资源来配置、访问和管理部署在云中的资源。在某些实施例中,控制台提供可以被用于访问和管理CSPI的基于web的用户界面。在某些实施方式中,控制台是由CSP提供的基于web的应用。The CSP may provide a console that enables customers and network administrators to use CSPI resources to configure, access, and manage resources deployed in the cloud. In some embodiments, the console provides a web-based user interface that can be used to access and manage CSPI. In some implementations, the console is a web-based application provided by the CSP.
CSPI可以支持单租赁或多租赁体系架构。在单租赁体系架构中,软件(例如,应用、数据库)或硬件组件(例如,主机机器或服务器)服务于单个客户或租户。在多租赁体系架构中,软件或硬件组件服务于多个客户或租户。因此,在多租赁体系架构中,CSPI资源在多个客户或租户之间共享。在多租赁情况下,在CSPI中采取预防措施并实施保护措施,以确保每个租户的数据都是隔离的并且对其他租户保持不可见。CSPI can support single-tenancy or multi-tenancy architecture. In a single-tenancy architecture, software (e.g., application, database) or hardware component (e.g., host machine or server) serves a single customer or tenant. In a multi-tenancy architecture, software or hardware component serves multiple customers or tenants. Therefore, in a multi-tenancy architecture, CSPI resources are shared among multiple customers or tenants. In the case of multi-tenancy, precautions are taken and protections are implemented in CSPI to ensure that each tenant's data is isolated and remains invisible to other tenants.
在物理网络中,网络端点(“endpoint”)是指连接到物理网络并与其所连接的网络来回通信的计算设备或系统。物理网络中的网络端点可以连接到局域网(LAN)、广域网(WAN)或其他类型的物理网络。物理网络中的传统端点的示例包括调制解调器、枢纽、桥接器、交换机、路由器和其他网络设备、物理计算机(或主机机器)等。物理网络中的每个物理设备都有可用于与设备通信的固定网络地址。这个固定网络地址可以是层2地址(例如,MAC地址)、固定层3地址(例如,IP地址)等。在虚拟化的环境或虚拟网络中,端点可以包括各种虚拟端点,诸如由物理网络的组件托管(例如,由物理主机机器托管)的虚拟机。虚拟网络中的这些端点通过覆盖地址寻址,诸如覆盖层2地址(例如,覆盖MAC地址)和覆盖层3地址(例如,覆盖IP地址)。网络覆盖通过允许网络管理者使用软件管理(例如,经由实现用于虚拟网络的控制平面的软件)围绕与网络端点相关联的覆盖地址移动来实现灵活性。因而,与物理网络不同,在虚拟网络中,可以使用网络管理软件将覆盖地址(例如,覆盖IP地址)从一个端点移至另一个端点。由于虚拟网络建立在物理网络之上,因此虚拟网络中组件之间的通信涉及虚拟网络和底层物理网络。为了促进此类通信,CSPI的组件被配置为学习和存储将虚拟网络中的覆盖地址映射到基板网络中的实际物理地址的映射,反之亦然。然后使用这些映射来促进通信。客户流量被封装以促进虚拟网络中的路由。In a physical network, a network endpoint ("endpoint") refers to a computing device or system that is connected to a physical network and communicates back and forth with the network to which it is connected. A network endpoint in a physical network can be connected to a local area network (LAN), a wide area network (WAN), or other types of physical networks. Examples of traditional endpoints in a physical network include modems, hubs, bridges, switches, routers and other network devices, physical computers (or host machines), etc. Each physical device in a physical network has a fixed network address that can be used to communicate with the device. This fixed network address can be a layer 2 address (e.g., a MAC address), a fixed layer 3 address (e.g., an IP address), etc. In a virtualized environment or virtual network, endpoints can include various virtual endpoints, such as virtual machines hosted by components of the physical network (e.g., hosted by a physical host machine). These endpoints in a virtual network are addressed by overlay addresses, such as overlay layer 2 addresses (e.g., overlay MAC addresses) and overlay layer 3 addresses (e.g., overlay IP addresses). Network overlays achieve flexibility by allowing network administrators to move around overlay addresses associated with network endpoints using software management (e.g., via software that implements a control plane for a virtual network). Thus, unlike a physical network, in a virtual network, an overlay address (e.g., an overlay IP address) can be moved from one endpoint to another using network management software. Since the virtual network is built on top of the physical network, communication between components in the virtual network involves the virtual network and the underlying physical network. To facilitate such communication, components of CSPI are configured to learn and store mappings that map overlay addresses in the virtual network to actual physical addresses in the substrate network, and vice versa. These mappings are then used to facilitate communication. Customer traffic is encapsulated to facilitate routing in the virtual network.
因而,物理地址(例如,物理IP地址)与物理网络中的组件相关联,并且覆盖地址(例如,覆盖IP地址)与虚拟或覆盖网络中的实体相关联。物理IP地址是与基板或物理网络中的物理设备(例如,网络设备)相关联的IP地址。例如,每个NVD都有相关联的物理IP地址。覆盖IP地址是与覆盖网络中的实体相关联的覆盖地址,诸如与客户的虚拟云网络(VCN)中的计算实例相关联的覆盖地址。各自具有其自己的私有VCN的两个不同客户或租户可以潜在地在他们的VCN中使用相同的覆盖IP地址,而无需彼此了解。物理IP地址和覆盖IP地址都是真实IP地址的类型。它们与虚拟IP地址是分开的。虚拟IP地址通常是表示或映射到多个真实IP地址的单个IP地址。虚拟IP地址提供虚拟IP地址与多个真实IP地址之间的一对多映射。例如,负载平衡器可以使用VIP来映射或表示多个服务器,每个服务器具有其自己的真实IP地址。Thus, a physical address (e.g., a physical IP address) is associated with a component in a physical network, and an overlay address (e.g., an overlay IP address) is associated with an entity in a virtual or overlay network. A physical IP address is an IP address associated with a physical device (e.g., a network device) in a substrate or physical network. For example, each NVD has an associated physical IP address. An overlay IP address is an overlay address associated with an entity in an overlay network, such as an overlay address associated with a computing instance in a customer's virtual cloud network (VCN). Two different customers or tenants, each with their own private VCN, can potentially use the same overlay IP address in their VCNs without knowing each other. Both physical IP addresses and overlay IP addresses are types of real IP addresses. They are separate from virtual IP addresses. A virtual IP address is typically a single IP address that represents or maps to multiple real IP addresses. A virtual IP address provides a one-to-many mapping between a virtual IP address and multiple real IP addresses. For example, a load balancer can use a VIP to map or represent multiple servers, each with its own real IP address.
云基础设施或CSPI被物理地托管在世界上的一个或多个区域的一个或多个数据中心中。CSPI可以包括物理或基板网络中的组件和位于建立在物理网络组件之上的虚拟网络中的经虚拟化的组件(例如,虚拟网络、计算实例、虚拟机等)。在某些实施例中,CSPI被组织和托管在领域、区域和可用性域中。区域通常是包含一个或多个数据中心的局部化的地理区域。区域一般彼此独立并且可以相隔很远,例如,跨越国家甚至大陆。例如,第一区域可以在澳大利亚,另一个在日本,另一个在印度,等等。CSPI资源在区域之间划分,使得每个区域都有自己独立的CSPI资源子集。每个区域可以提供一组核心基础设施服务和资源,诸如计算资源(例如,裸机服务器、虚拟机、容器和相关基础设施等);存储资源(例如,块卷存储、文件存储、对象存储、归档存储);联网资源(例如,虚拟云网络(VCN)、负载平衡资源、与预置网络的连接)、数据库资源;边缘联网资源(例如,DNS);以及访问管理和监视资源等。每个区域一般都有多条路径将其连接到领域中的其他区域。The cloud infrastructure or CSPI is physically hosted in one or more data centers in one or more regions of the world. The CSPI may include components in a physical or substrate network and virtualized components (e.g., virtual networks, computing instances, virtual machines, etc.) located in a virtual network built on top of the physical network components. In some embodiments, the CSPI is organized and hosted in domains, regions, and availability domains. A region is typically a localized geographic area containing one or more data centers. Regions are generally independent of each other and can be far apart, for example, across countries or even continents. For example, a first region may be in Australia, another in Japan, another in India, and so on. CSPI resources are divided between regions so that each region has its own independent subset of CSPI resources. Each region can provide a set of core infrastructure services and resources, such as computing resources (e.g., bare metal servers, virtual machines, containers and related infrastructure, etc.); storage resources (e.g., block volume storage, file storage, object storage, archive storage); networking resources (e.g., virtual cloud network (VCN), load balancing resources, connections to pre-set networks), database resources; edge networking resources (e.g., DNS); and access management and monitoring resources, etc. Each region generally has multiple paths connecting it to other regions in the domain.
一般而言,应用被部署在它被最频繁使用的区域中(即,部署在与该区域相关联的基础设施上),因为使用附近的资源比使用远处的资源更快。应用也可以出于各种原因而部署在不同的区域,诸如冗余以减轻区域范围内事件(诸如大型天气系统或地震)的风险,以满足法律管辖、税域和其他商业或社会标准等的不同要求。Generally speaking, an application is deployed in the region where it is most frequently used (i.e., on the infrastructure associated with that region) because it is faster to use nearby resources than to use distant resources. Applications may also be deployed in different regions for various reasons, such as redundancy to mitigate the risk of region-wide events (such as large weather systems or earthquakes), to meet different requirements of legal jurisdictions, tax domains, and other business or social standards, etc.
区域内的数据中心可以被进一步组织和细分为可用性域(AD)。可用性域可以与位于区域内的一个或多个数据中心对应。区域可以由一个或多个可用性域组成。在这种分布式环境中,CSPI资源要么是特定于区域的,诸如虚拟云网络(VCN),要么是特定于可用性域的,诸如计算实例。Data centers within a region can be further organized and subdivided into availability domains (ADs). An availability domain can correspond to one or more data centers located within a region. A region can consist of one or more availability domains. In this distributed environment, CSPI resources are either region-specific, such as a virtual cloud network (VCN), or availability domain-specific, such as a compute instance.
区域内的AD彼此隔离,容错的,并且被配置为使得它们极不可能同时发生故障。这是通过AD不共享关键基础设施资源(诸如联网、物理电缆、电缆路径、电缆入口点等)来实现的,使得区域内的一个AD处的故障不太可能影响同一区域内其他AD的可用性。同一区域内的AD可以通过低时延、高带宽网络彼此连接,这使得可以提供到其他网络(例如,互联网、客户的预置网络等)的高可用性连接并在多个AD中构建复制系统以同时实现高可用性和灾难恢复。云服务使用多个AD来确保高可用性并防止资源故障。随着IaaS提供商提供的基础设施的增长,可以添加更多区域和AD以及附加的容量。可用性域之间的流量通常是加密的。ADs within a region are isolated from each other, fault-tolerant, and configured so that it is extremely unlikely that they will fail simultaneously. This is achieved by ADs not sharing critical infrastructure resources (such as networking, physical cables, cable paths, cable entry points, etc.), making it unlikely that a failure at one AD within a region will affect the availability of other ADs within the same region. ADs within the same region can be connected to each other via a low-latency, high-bandwidth network, which makes it possible to provide high-availability connections to other networks (e.g., the Internet, customer's on-premises network, etc.) and build replication systems in multiple ADs to achieve both high availability and disaster recovery. Cloud services use multiple ADs to ensure high availability and prevent resource failures. As the infrastructure provided by the IaaS provider grows, more regions and ADs can be added, along with additional capacity. Traffic between availability domains is typically encrypted.
在某些实施例中,区域被分组为领域。领域是区域的逻辑集合。领域彼此隔离并且不共享任何数据。同一领域中的区域可以彼此通信,但不同领域中的区域不能。客户与CSP的租赁或账户存在于单个领域中,并且可以散布在属于该领域的一个或多个区域中。通常,当客户订阅IaaS服务时,在领域内客户指定的区域(称为“主”区域)中为该客户创建租赁或账户。客户可以将客户的租赁扩展到领域内的一个或多个其他区域。客户无法访问不在客户的租赁所在领域中的区域。In some embodiments, regions are grouped into domains. A domain is a logical collection of regions. Domains are isolated from each other and do not share any data. Regions in the same domain can communicate with each other, but regions in different domains cannot. A customer's lease or account with a CSP exists within a single domain and can be spread across one or more regions belonging to that domain. Typically, when a customer subscribes to an IaaS service, a lease or account is created for that customer in a customer-specified region within a domain (called the "home" region). A customer can extend the customer's lease to one or more other regions within a domain. A customer cannot access regions that are not in the domain where the customer's lease is located.
IaaS提供商可以提供多个领域,每个领域满足特定的一组客户或用户的需要。例如,可以为商业客户提供商业领域。作为另一个示例,对于特定国家内的客户,可以那个国家提供领域。作为又一个示例,可以为政府提供政府领域,等等。例如,政府领域可以满足特定政府的需要并且可以具有比商业领域更高的安全性级别。例如,Oracle云基础设施(OCI)目前为商业区域提供领域,并且为政府云区域提供两个领域(例如,FedRAMP授权的和IL5授权的)。An IaaS provider may offer multiple domains, each domain meeting the needs of a specific set of customers or users. For example, a business domain may be provided for business customers. As another example, for customers within a specific country, a domain may be provided for that country. As yet another example, a government domain may be provided for a government, and so on. For example, a government domain may meet the needs of a specific government and may have a higher level of security than a business domain. For example, Oracle Cloud Infrastructure (OCI) currently offers a domain for a business region and two domains (e.g., FedRAMP-authorized and IL5-authorized) for a government cloud region.
在某些实施例中,AD可以被细分成一个或多个故障域。故障域是AD内的基础设施资源的分组,以提供反亲和性(anti-affinity)。故障域允许计算实例的分布,使得这些实例不位于单个AD内的相同物理硬件上。这被称为反亲和性。故障域是指共享单点故障的一组硬件组件(计算机、交换机等)。计算池在逻辑上被划分为故障域。因此,影响一个故障域的硬件故障或计算硬件维护事件不影响其他故障域中的实例。取决于实施例,每个AD的故障域的数量可以有所不同。例如,在某些实施例中,每个AD包含三个故障域。故障域充当AD内的逻辑数据中心。In some embodiments, AD can be subdivided into one or more fault domains. Fault domains are groupings of infrastructure resources within an AD to provide anti-affinity. Fault domains allow the distribution of computing instances so that they are not located on the same physical hardware within a single AD. This is called anti-affinity. A fault domain refers to a group of hardware components (computers, switches, etc.) that share a single point of failure. The computing pool is logically divided into fault domains. Therefore, a hardware failure or computing hardware maintenance event that affects one fault domain does not affect instances in other fault domains. Depending on the embodiment, the number of fault domains per AD may vary. For example, in some embodiments, each AD contains three fault domains. Fault domains act as logical data centers within an AD.
当客户订阅IaaS服务时,来自CSPI的资源被供应给客户并与客户的租赁相关联。客户可以使用这些供应的资源来构建私有网络并在这些网络上部署资源。由CSPI在云中托管的客户网络被称为虚拟云网络(VCN)。客户可以使用为客户分配的CSPI资源来设置一个或多个虚拟云网络(VCN)。VCN是虚拟的或软件定义的私有网络。部署在客户的VCN中的客户资源可以包括计算实例(例如,虚拟机、裸机实例)和其他资源。这些计算实例可以表示各种客户工作负载,诸如应用、负载平衡器、数据库等。部署在VCN上的计算实例可以通过公共网络(诸如互联网)与公共可访问端点(“公共端点”)、与同一VCN或其他VCN(例如,客户的其他VCN或不属于客户的VCN)中的其他实例、与客户的预置数据中心或网络以及与服务端点和其他类型的端点通信。When a customer subscribes to an IaaS service, resources from CSPI are provisioned to the customer and associated with the customer's lease. Customers can use these provisioned resources to build private networks and deploy resources on these networks. Customer networks hosted by CSPI in the cloud are called virtual cloud networks (VCNs). Customers can use CSPI resources allocated to customers to set up one or more virtual cloud networks (VCNs). VCNs are virtual or software-defined private networks. Customer resources deployed in a customer's VCN may include computing instances (e.g., virtual machines, bare metal instances) and other resources. These computing instances may represent various customer workloads, such as applications, load balancers, databases, and the like. Computing instances deployed on VCNs can communicate with publicly accessible endpoints ("public endpoints"), with other instances in the same VCN or other VCNs (e.g., other VCNs of customers or VCNs that do not belong to customers), with customer's pre-set data centers or networks, and with service endpoints and other types of endpoints through public networks (such as the Internet).
CSP可以使用CSPI来提供各种服务。在一些情况下,CSPI的客户本身可以表现得像服务提供商一样并使用CSPI资源提供服务。服务提供商可以暴露由标识信息(例如,IP地址、DNS名称和端口)表征的服务端点。客户的资源(例如,计算实例)可以通过访问由服务为该特定服务暴露的服务端点来使用该特定服务。这些服务端点一般是用户可经由公共通信网络(诸如互联网)使用与端点相关联的公共IP地址公开访问的端点。可公开访问的网络端点有时也称为公共端点。CSPs can use CSPI to provide various services. In some cases, customers of CSPI can themselves behave like service providers and use CSPI resources to provide services. Service providers can expose service endpoints characterized by identification information (e.g., IP addresses, DNS names, and ports). Customers' resources (e.g., computing instances) can use a particular service by accessing the service endpoints exposed by the service for that particular service. These service endpoints are generally endpoints that are publicly accessible to users via a public communication network (such as the Internet) using a public IP address associated with the endpoint. Publicly accessible network endpoints are sometimes also referred to as public endpoints.
在某些实施例中,服务提供商可以经由用于服务的端点(有时称为服务端点)来暴露服务。服务的客户然后可以使用这个服务端点来访问服务。在某些实施方式中,为服务提供的服务端点可以由打算消费该服务的多个客户访问。在其他实施方式中,可以为客户提供专用服务端点,使得只有该客户可以使用该专用服务端点来访问服务。In some embodiments, a service provider may expose a service via an endpoint for the service (sometimes referred to as a service endpoint). Customers of the service may then use this service endpoint to access the service. In some implementations, the service endpoint provided for a service may be accessed by multiple customers that intend to consume the service. In other implementations, a dedicated service endpoint may be provided to a customer so that only the customer can access the service using the dedicated service endpoint.
在某些实施例中,当创建VCN时,它与私有覆盖无类域间路由(CIDR)地址空间相关联,该地址空间是被指派给VCN的一系列私有覆盖IP地址(例如,10.0/16)。VCN包括相关联的子网、路由表和网关。VCN驻留在单个区域内,但可以跨越该区域的可用性域中的一个或多个或全部。网关是为VCN配置的虚拟接口并且使得能够传送去往VCN和从VCN到VCN外部的一个或多个端点的流量。可以为VCN配置一种或多种不同类型的网关,以启用去往和来自不同类型端点的通信。In certain embodiments, when a VCN is created, it is associated with a private overlay Classless Inter-Domain Routing (CIDR) address space, which is a range of private overlay IP addresses (e.g., 10.0/16) assigned to the VCN. The VCN includes associated subnets, routing tables, and gateways. The VCN resides within a single region, but can span one or more or all of the availability domains in that region. A gateway is a virtual interface configured for the VCN and enables the transmission of traffic to and from the VCN to one or more endpoints outside the VCN. One or more different types of gateways can be configured for the VCN to enable communications to and from different types of endpoints.
VCN可以被细分为一个或多个子网络,诸如一个或多个子网。因此,子网是可以在VCN内创建的配置的单元或细分。VCN可以有一个或多个子网。VCN内的每个子网都与连续范围的覆盖IP地址(例如,10.0.0.0/24和10.0.1.0/24)相关联,这些覆盖IP地址不与该VCN中的其他子网重叠并且表示VCN的地址空间内的地址空间子集。A VCN can be subdivided into one or more subnetworks, such as one or more subnets. Thus, a subnet is a unit or subdivision of a configuration that can be created within a VCN. A VCN can have one or more subnets. Each subnet within a VCN is associated with a contiguous range of overlay IP addresses (e.g., 10.0.0.0/24 and 10.0.1.0/24) that do not overlap with other subnets in that VCN and represent a subset of the address space within the address space of the VCN.
每个计算实例与虚拟网络接口卡(VNIC)相关联,这使得计算实例能够参与VCN的子网。VNIC是物理网络接口卡(NIC)的逻辑表示。一般而言,VNIC是实体(例如,计算实例、服务)与虚拟网络之间的接口。VNIC存在于子网中,具有一个或多个相关联的IP地址,以及相关联的安全性规则或策略。VNIC相当于交换机上的层2端口。VNIC附接到计算实例和VCN内的子网。与计算实例相关联的VNIC使得计算实例能够成为VCN的子网的一部分,并且使得计算实例能够与和计算实例位于同一子网上的端点、与VCN中的不同子网中的端点或与VCN外部的端点通信(例如,发送和接收分组)。因此,与计算实例相关联的VNIC确定计算实例如何与VCN内部和外部的端点连接。当计算实例被创建并添加到VCN内的子网时,创建用于计算实例的VNIC并将其与该计算实例相关联。对于包括一组计算实例的子网,该子网包含与该组计算实例对应的VNIC,每个VNIC附接到该组计算机实例内的计算实例。Each computing instance is associated with a virtual network interface card (VNIC), which enables the computing instance to participate in the subnet of the VCN. VNIC is a logical representation of a physical network interface card (NIC). In general, a VNIC is an interface between an entity (e.g., a computing instance, a service) and a virtual network. VNICs exist in subnets, have one or more associated IP addresses, and associated security rules or policies. VNICs are equivalent to layer 2 ports on switches. VNICs are attached to subnets within computing instances and VCNs. The VNICs associated with computing instances enable the computing instance to become part of the subnet of the VCN, and enable the computing instance to communicate (e.g., send and receive packets) with endpoints located on the same subnet as the computing instance, with endpoints in different subnets in the VCN, or with endpoints outside the VCN. Therefore, the VNICs associated with computing instances determine how the computing instance is connected to endpoints inside and outside the VCN. When a computing instance is created and added to a subnet within the VCN, a VNIC for the computing instance is created and associated with the computing instance. For a subnet that includes a group of computing instances, the subnet includes VNICs corresponding to the group of computing instances, and each VNIC is attached to a computing instance within the group of computing instances.
经由与计算实例相关联的VNIC为每个计算实例指派私有覆盖IP地址。这个私有覆盖网络IP地址在创建计算实例时被指派给与计算实例相关联的VNIC并被用于路由去往和来自计算实例的流量。给定子网中的所有VNIC使用相同的路由表、安全性列表和DHCP选项。如上所述,VCN内的每个子网与连续范围的覆盖IP地址(例如,10.0.0.0/24和10.0.1.0/24)相关联,这些覆盖IP地址不与该VCN中的其他子网重叠并且表示VCN的地址空间内的地址空间子集。对于VCN的特定子网上的VNIC,被指派给该VNIC的私有覆盖IP地址是来自为子网分配的连续范围的覆盖IP地址的地址。A private overlay IP address is assigned to each computing instance via the VNIC associated with the computing instance. This private overlay network IP address is assigned to the VNIC associated with the computing instance when the computing instance is created and is used to route traffic to and from the computing instance. All VNICs in a given subnet use the same routing table, security list, and DHCP options. As described above, each subnet within the VCN is associated with a continuous range of overlay IP addresses (e.g., 10.0.0.0/24 and 10.0.1.0/24), which do not overlap with other subnets in the VCN and represent a subset of the address space within the address space of the VCN. For a VNIC on a specific subnet of the VCN, the private overlay IP address assigned to the VNIC is an address from the continuous range of overlay IP addresses allocated for the subnet.
在某些实施例中,除了私有覆盖IP地址之外,计算实例还可以可选地被指派附加的覆盖IP地址,诸如例如如果在公共子网中,则为一个或多个公共IP地址。这多个地址要么在同一个VNIC上要么在与计算实例相关联的多个VNIC上指派。但是,每个实例具有主VNIC,主VNIC是在实例启动期间创建的并且与指派给该实例的覆盖私有IP地址相关联——这个主VNIC无法被删除。称为辅助VNIC的附加VNIC可以被添加到与主VNIC相同的可用性域中的现有实例。所有VNIC都在与该实例相同的可用性域中。辅助VNIC可以位于与主VNIC相同的VCN中的子网中,或者位于同一VCN或不同VCN中的不同子网中。In some embodiments, in addition to the private overlay IP address, the computing instance may optionally be assigned additional overlay IP addresses, such as, for example, one or more public IP addresses if in a public subnet. These multiple addresses are either assigned on the same VNIC or on multiple VNICs associated with the computing instance. However, each instance has a primary VNIC, which is created during instance startup and is associated with the overlay private IP address assigned to the instance-this primary VNIC cannot be deleted. Additional VNICs, called auxiliary VNICs, can be added to existing instances in the same availability domain as the primary VNIC. All VNICs are in the same availability domain as the instance. The auxiliary VNIC can be located in a subnet in the same VCN as the primary VNIC, or in a different subnet in the same VCN or in a different VCN.
如果计算实例在公共子网中,那么可以可选地为其指派公共IP地址。在创建子网时,可以将子网指定为公共子网或者私有子网。私有子网意味着子网中的资源(例如,计算实例)和相关联的VNIC不能具有公共覆盖IP地址。公共子网意味着子网中的资源和相关联的VNIC可以具有公共IP地址。客户可以指定子网存在于单个可用性域中或跨区域或领域中的多个可用性域。If the compute instances are in a public subnet, they can optionally be assigned public IP addresses. When creating a subnet, you can specify the subnet as either a public subnet or a private subnet. A private subnet means that the resources (e.g., compute instances) and associated VNICs in the subnet cannot have public overlay IP addresses. A public subnet means that the resources in the subnet and associated VNICs can have public IP addresses. Customers can specify that a subnet exists in a single availability domain or across multiple availability domains in a region or domain.
如上所述,VCN可以被细分成一个或多个子网。在某些实施例中,为VCN配置的虚拟路由器(VR)(称为VCN VR或简称为VR)使得VCN的子网之间能够通信。对于VCN内的子网,VR表示用于该子网的逻辑网关,其使得该子网(即,该子网上的计算实例)能够与VCN内的其他子网上的端点以及与VCN外的其他端点通信。VCN VR是逻辑实体,其被配置为在VCN中的VNIC和与VCN相关联的虚拟网关(“网关”)之间路由流量。下文关于图1进一步描述网关。VCNVR是层3/IP层概念。在一个实施例中,对于VCN存在一个VCN VR,其中VCN VR潜在地具有通过IP地址寻址的不受限制数量的端口,VCN的每个子网有一个端口。以这种方式,VCN VR对于VCN VR所附接到的VCN中的每个子网具有不同的IP地址。VR还连接到为VCN配置的各种网关。在某些实施例中,用于子网的覆盖IP地址范围中的特定覆盖IP地址被保留用于该子网的VCN VR的端口。例如,考虑VCN有两个子网,相关联的地址范围分别是10.0/16和10.1/16。对于地址范围为10.0/16的VCN中的第一个子网,这个范围内的地址被保留用于该子网的VCN VR的端口。在一些情况下,范围内的第一个IP地址可以被保留用于VCN VR。例如,对于覆盖IP地址范围为10.0/16的子网,可以为该子网的VCN VR的端口保留IP地址10.0.0.1。对于地址范围为10.1/16的同一VCN中的第二个子网,VCN VR可以具有IP地址为10.1.0.1的用于第二个子网的端口。VCN VR对于VCN中的每个子网具有不同的IP地址。As described above, a VCN can be subdivided into one or more subnets. In some embodiments, a virtual router (VR) configured for the VCN (referred to as a VCN VR or simply a VR) enables communication between subnets of the VCN. For a subnet within a VCN, the VR represents a logical gateway for the subnet, which enables the subnet (i.e., the computing instance on the subnet) to communicate with endpoints on other subnets within the VCN and with other endpoints outside the VCN. The VCN VR is a logical entity that is configured to route traffic between a VNIC in the VCN and a virtual gateway ("gateway") associated with the VCN. The gateway is further described below with respect to FIG. 1. The VCNVR is a layer 3/IP layer concept. In one embodiment, there is a VCN VR for the VCN, wherein the VCN VR potentially has an unlimited number of ports addressed by an IP address, and each subnet of the VCN has one port. In this way, the VCN VR has a different IP address for each subnet in the VCN to which the VCN VR is attached. The VR is also connected to various gateways configured for the VCN. In some embodiments, specific overlay IP addresses in an overlay IP address range for a subnet are reserved for ports of a VCN VR for that subnet. For example, consider a VCN with two subnets, with associated address ranges of 10.0/16 and 10.1/16, respectively. For the first subnet in the VCN with address range 10.0/16, addresses in this range are reserved for ports of the VCN VR for that subnet. In some cases, the first IP address in the range may be reserved for the VCN VR. For example, for a subnet with an overlay IP address range of 10.0/16, IP address 10.0.0.1 may be reserved for ports of the VCN VR for that subnet. For a second subnet in the same VCN with address range 10.1/16, the VCN VR may have a port with IP address 10.1.0.1 for the second subnet. The VCN VR has a different IP address for each subnet in the VCN.
在一些其他实施例中,VCN内的每个子网可以具有其自己的相关联的VR,该VR可由子网使用与VR相关联的保留或默认IP地址寻址。例如,保留或默认IP地址可以是与该子网相关联的IP地址范围中的第一个IP地址。子网中的VNIC可以使用这个默认或保留IP地址与和子网相关联的VR通信(例如,发送和接收分组)。在这种实施例中,VR是该子网的入口/出口点。与VCN内的子网相关联的VR可以与和VCN内的其他子网相关联的其他VR通信。VR还可以与和VCN相关联的网关通信。子网的VR功能在执行子网中的VNIC的VNIC功能的一个或多个NVD上运行或由其执行。In some other embodiments, each subnet within a VCN may have its own associated VR that may be addressed by the subnet using a reserved or default IP address associated with the VR. For example, the reserved or default IP address may be the first IP address in a range of IP addresses associated with the subnet. The VNICs in the subnet may communicate (e.g., send and receive packets) with the VRs associated with the subnet using this default or reserved IP address. In such embodiments, the VR is the entry/exit point for the subnet. A VR associated with a subnet within the VCN may communicate with other VRs associated with other subnets within the VCN. The VR may also communicate with a gateway associated with the VCN. The VR functions of the subnet run on or are performed by one or more NVDs that perform the VNIC functions of the VNICs in the subnet.
可以为VCN配置路由表、安全性规则和DHCP选项。路由表是用于VCN的虚拟路由表并且包括通过网关或特殊配置的实例将流量从VCN内的子网路由到VCN外部的目的地的规则。可以定制VCN的路由表以控制分组如何转发/路由到VCN和从VCN转发/路由。DHCP选项是指在实例启动时自动提供给实例的配置信息。Routing tables, security rules, and DHCP options can be configured for a VCN. A routing table is a virtual routing table for a VCN and includes rules for routing traffic from subnets within the VCN to destinations outside the VCN through gateways or specially configured instances. A VCN's routing table can be customized to control how packets are forwarded/routed to and from the VCN. DHCP options refer to configuration information that is automatically provided to an instance when the instance starts.
为VCN配置的安全性规则表示用于VCN的覆盖防火墙规则。安全性规则可以包括入口和出口规则,并指定允许进出VCN内的实例的流量的类型(例如,基于协议和端口)。客户可以选择给定规则是有状态的还是无状态的。例如,客户可以通过用源CIDR 0.0.0.0/0和目的地TCP端口22设立有状态入口规则来允许来自任何地方的传入SSH流量到一组实例。安全性规则可以使用网络安全性组或安全性列表来实现。网络安全性组由仅适用于该组中的资源的一组安全性规则组成。另一方面,安全性列表包括适用于使用该安全性列表的任何子网中的所有资源的规则。可以为VCN提供带有默认安全性规则的默认安全性列表。为VCN配置的DHCP选项提供在实例启动时自动提供给VCN中的实例的配置信息。The security rules configured for a VCN represent the overlay firewall rules for the VCN. Security rules can include ingress and egress rules and specify the type of traffic allowed in and out of instances within the VCN (e.g., based on protocol and port). Customers can choose whether a given rule is stateful or stateless. For example, a customer can allow incoming SSH traffic from anywhere to a group of instances by setting up a stateful ingress rule with source CIDR 0.0.0.0/0 and destination TCP port 22. Security rules can be implemented using network security groups or security lists. A network security group consists of a set of security rules that apply only to resources in that group. On the other hand, a security list includes rules that apply to all resources in any subnet that uses the security list. A default security list with default security rules can be provided for a VCN. The DHCP options configured for a VCN provide configuration information that is automatically provided to instances in the VCN when the instances are launched.
在某些实施例中,用于VCN的配置信息由VCN控制平面确定和存储。例如,用于VCN的配置信息可以包括关于以下的信息:与VCN相关联的地址范围、VCN内的子网和相关联的信息、与VCN相关联的一个或多个VR、VCN中的计算实例和相关联的VNIC、执行与VCN相关联的各种虚拟化网络功能的NVD(例如,VNIC、VR、网关)、用于VCN的状态信息以及其他VCN相关信息。在某些实施例中,VCN分发服务向NVD发布由VCN控制平面存储的配置信息或其部分。分发的信息可以被用于更新由NVD存储和用来转发去往和来自VCN中的计算实例的分组的信息(例如,转发表、路由表等)。In some embodiments, configuration information for a VCN is determined and stored by a VCN control plane. For example, configuration information for a VCN may include information about address ranges associated with the VCN, subnets within the VCN and associated information, one or more VRs associated with the VCN, compute instances in the VCN and associated VNICs, NVDs that perform various virtualized network functions associated with the VCN (e.g., VNICs, VRs, gateways), state information for the VCN, and other VCN-related information. In some embodiments, a VCN distribution service publishes configuration information, or portions thereof, stored by the VCN control plane to the NVD. The distributed information may be used to update information (e.g., forwarding tables, routing tables, etc.) stored by the NVD and used to forward packets to and from compute instances in the VCN.
在某些实施例中,VCN和子网的创建由VCN控制平面(CP)处置并且计算实例的发动由计算控制平面处置。计算控制平面负责为计算实例分配物理资源,然后调用VCN控制平面来创建VNIC并将其附接到计算实例。VCN CP还将VCN数据映射发送到被配置为执行分组转发和路由功能的VCN数据平面。在某些实施例中,VCN CP提供负责向VCN数据平面提供更新的分发服务。VCN控制平面的示例也在图6、图7、图8和图9中描绘(参见标号616、716、816和916)并在下面进行描述。In some embodiments, the creation of VCNs and subnets is handled by a VCN control plane (CP) and the launch of compute instances is handled by a compute control plane. The compute control plane is responsible for allocating physical resources to the compute instances and then calling the VCN control plane to create and attach VNICs to the compute instances. The VCN CP also sends VCN data maps to a VCN data plane that is configured to perform packet forwarding and routing functions. In some embodiments, the VCN CP provides a distribution service that is responsible for providing updates to the VCN data plane. Examples of VCN control planes are also depicted in FIGS. 6 , 7 , 8 , and 9 (see reference numerals 616 , 716 , 816 , and 916 ) and are described below.
客户可以使用由CSPI托管的资源创建一个或多个VCN。部署在客户VCN上的计算实例可以与不同的端点通信。这些端点可以包括由CSPI托管的端点和在CSPI外部的端点。Customers can create one or more VCNs using resources hosted by CSPI. Compute instances deployed on customer VCNs can communicate with different endpoints. These endpoints can include endpoints hosted by CSPI and endpoints external to CSPI.
用于使用CSPI实现基于云的服务的各种不同体系架构在图1、图2、图3、图4、图5和图18-22中进行了描绘,并且在下文中进行描述。图1是分布式环境100的高级图,示出了根据某些实施例的由CSPI托管的覆盖或客户VCN。图1中描绘的分布式环境包括覆盖网络中的多个组件。图1中描绘的分布式环境100仅仅是示例,并且不旨在不当地限制要求保护的实施例的范围。许多变化、替代和修改是可能的。例如,在一些实施方式中,图1中描绘的分布式环境可以具有比图1中所示的那些更多或更少的系统或组件,可以组合两个或更多个系统,或者可以具有不同的系统配置或布置。Various different architectures for implementing cloud-based services using CSPI are depicted in Figures 1, 2, 3, 4, 5, and 18-22, and are described below. Figure 1 is a high-level diagram of a distributed environment 100, showing an overlay or customer VCN hosted by CSPI according to certain embodiments. The distributed environment depicted in Figure 1 includes multiple components in an overlay network. The distributed environment 100 depicted in Figure 1 is merely an example and is not intended to unduly limit the scope of the claimed embodiments. Many variations, substitutions, and modifications are possible. For example, in some embodiments, the distributed environment depicted in Figure 1 may have more or fewer systems or components than those shown in Figure 1, may combine two or more systems, or may have different system configurations or arrangements.
如图1中描绘的示例中所示,分布式环境100包括提供服务和资源的CSPI 101,客户可以订阅并使用这些服务和资源来构建他们的虚拟云网络(VCN)。在某些实施例中,CSPI101向订阅客户提供IaaS服务。CSPI 101内的数据中心可以被组织到一个或多个区域中。图1中示出了一个示例区域“区域US”102。客户已经为区域102配置了客户VCN c/o Oracle国际公司。客户可以在VCN 104上部署各种计算实例,其中计算实例可以包括虚拟机或裸机实例。实例的示例包括应用、数据库、负载平衡器等。As shown in the example depicted in FIG. 1 , a distributed environment 100 includes a CSPI 101 that provides services and resources that customers can subscribe to and use to build their virtual cloud network (VCN). In some embodiments, CSPI 101 provides IaaS services to subscribing customers. Data centers within CSPI 101 can be organized into one or more regions. An example region “Region US” 102 is shown in FIG. 1 . A customer has configured a customer VCN c/o Oracle International Corporation for region 102. Customers can deploy various computing instances on VCN 104, where computing instances can include virtual machines or bare metal instances. Examples of instances include applications, databases, load balancers, etc.
在图1中描绘的实施例中,客户VCN 104包括两个子网,即,“子网-1”和“子网-2”,每个子网具有其自己的CIDR IP地址范围。在图1中,子网-1的覆盖IP地址范围是10.0/16,并且子网-2的地址范围是10.1/16。VCN虚拟路由器105表示用于VCN的逻辑网关,其使得能够在VCN 104的子网之间以及与VCN外部的其他端点通信。VCN VR 105被配置为在VCN 104中的VNIC和与VCN 104相关联的网关之间路由流量。VCN VR 105为VCN 104的每个子网提供端口。例如,VR 105可以为子网-1提供具有IP地址10.0.0.1的端口并为子网-2提供具有IP地址10.1.0.1的端口。In the embodiment depicted in FIG. 1 , customer VCN 104 includes two subnets, “Subnet-1” and “Subnet-2,” each with its own CIDR IP address range. In FIG. 1 , the coverage IP address range for Subnet-1 is 10.0/16, and the address range for Subnet-2 is 10.1/16. VCN virtual router 105 represents a logical gateway for the VCN that enables communication between subnets of VCN 104 and with other endpoints outside the VCN. VCN VR 105 is configured to route traffic between VNICs in VCN 104 and gateways associated with VCN 104. VCN VR 105 provides ports for each subnet of VCN 104. For example, VR 105 may provide a port with IP address 10.0.0.1 for Subnet-1 and a port with IP address 10.1.0.1 for Subnet-2.
可以在每个子网上部署多个计算实例,其中计算实例可以是虚拟机实例和/或裸机实例。子网中的计算实例可以由CSPI 101内的一个或多个主机机器托管。计算实例经由与计算实例相关联的VNIC参与子网。例如,如图1中所示,计算实例C1经由与计算实例相关联的VNIC成为子网-1的一部分。同样,计算实例C2经由与C2相关联的VNIC成为子网-1的一部分。以类似的方式,多个计算实例(它们可以是虚拟机实例或裸机实例)可以是子网-1的一部分。经由其相关联的VNIC,每个计算实例被指派私有覆盖IP地址和MAC地址。例如,在图1中,计算实例C1的覆盖IP地址为10.0.0.2,MAC地址为M1,而计算实例C2的私有覆盖IP地址为10.0.0.3,MAC地址为M2。子网-1中的每个计算实例(包括计算实例C1和C2)都有到使用IP地址10.0.0.1的VCN VR 105的默认路由,该IP地址是用于子网-1的VCN VR 105的端口的IP地址。Multiple computing instances can be deployed on each subnet, where the computing instances can be virtual machine instances and/or bare metal instances. The computing instances in the subnet can be hosted by one or more host machines within CSPI 101. The computing instances participate in the subnet via the VNIC associated with the computing instance. For example, as shown in FIG1 , the computing instance C1 becomes part of subnet-1 via the VNIC associated with the computing instance. Similarly, the computing instance C2 becomes part of subnet-1 via the VNIC associated with C2. In a similar manner, multiple computing instances (which can be virtual machine instances or bare metal instances) can be part of subnet-1. Via its associated VNIC, each computing instance is assigned a private overlay IP address and MAC address. For example, in FIG1 , the overlay IP address of the computing instance C1 is 10.0.0.2, the MAC address is M1, and the private overlay IP address of the computing instance C2 is 10.0.0.3, and the MAC address is M2. Each compute instance in subnet-1 (including compute instances C1 and C2) has a default route to VCN VR 105 using IP address 10.0.0.1, which is the IP address of the port of VCN VR 105 for subnet-1.
子网-2上可以部署多个计算实例,包括虚拟机实例和/或裸机实例。例如,如图1中所示,计算实例D1和D2经由与相应计算实例相关联的VNIC成为子网-2的一部分。在图1中所示的实施例中,计算实例D1的覆盖IP地址为10.1.0.2,MAC地址为MM1,而计算实例D2的私有覆盖IP地址为10.1.0.3,MAC地址为MM2。子网-2中的每个计算实例(包括计算实例D1和D2)都有到使用IP地址10.1.0.1的VCN VR 105的默认路由,该IP地址是用于子网-2的VCN VR105的端口的IP地址。Multiple computing instances can be deployed on Subnet-2, including virtual machine instances and/or bare metal instances. For example, as shown in FIG1 , computing instances D1 and D2 become part of Subnet-2 via VNICs associated with the respective computing instances. In the embodiment shown in FIG1 , the overlay IP address of computing instance D1 is 10.1.0.2, the MAC address is MM1, and the private overlay IP address of computing instance D2 is 10.1.0.3, the MAC address is MM2. Each computing instance in Subnet-2 (including computing instances D1 and D2) has a default route to VCN VR 105 using IP address 10.1.0.1, which is the IP address of the port of VCN VR 105 for Subnet-2.
VCN A 104还可以包括一个或多个负载平衡器。例如,可以为子网提供负载平衡器,并且可以将负载平衡器配置为跨子网上的多个计算实例负载平衡流量。还可以提供负载平衡器以在VCN中跨子网负载平衡流量。VCN A 104 may also include one or more load balancers. For example, a load balancer may be provided for a subnet, and the load balancer may be configured to load balance traffic across multiple compute instances on the subnet. A load balancer may also be provided to load balance traffic across subnets in the VCN.
部署在VCN 104上的特定计算实例可以与各种不同的端点通信。这些端点可以包括由CSPI 200托管的端点和在CSPI 200外部的端点。由CSPI 101托管的端点可以包括:与特定计算实例位于同一子网上的端点(例如,子网-1中的两个计算实例之间的通信);位于不同子网上但位于同一VCN内的端点(例如,子网-1中的计算实例与子网-2中的计算实例之间的通信);同一区域中的不同VCN中的端点(例如,子网-1中的计算实例与同一区域106或110中的VCN中的端点之间的通信,子网-1中的计算实例与同一区域中的服务网点110中的端点之间的通信);或不同区域中的VCN中的端点(例如,子网-1中的计算实例与不同区域108中的VCN中的端点之间的通信)。由CSPI 101托管的子网中的计算实例也可以与不由CSPI 101托管(即,在CSPI 101外部)的端点通信。这些外部端点包括客户的预置网络116中的端点、其他远程云托管网络118中的端点、可经由公共网络(诸如互联网)访问的公共端点114及其他端点。A particular computing instance deployed on VCN 104 can communicate with a variety of different endpoints. These endpoints can include endpoints hosted by CSPI 200 and endpoints external to CSPI 200. Endpoints hosted by CSPI 101 can include: endpoints on the same subnet as a particular computing instance (e.g., communication between two computing instances in subnet-1); endpoints on different subnets but within the same VCN (e.g., communication between a computing instance in subnet-1 and a computing instance in subnet-2); endpoints in different VCNs in the same region (e.g., communication between a computing instance in subnet-1 and an endpoint in a VCN in the same region 106 or 110, communication between a computing instance in subnet-1 and an endpoint in a service point 110 in the same region); or endpoints in VCNs in different regions (e.g., communication between a computing instance in subnet-1 and an endpoint in a VCN in a different region 108). Compute instances in a subnet hosted by CSPI 101 can also communicate with endpoints that are not hosted by CSPI 101 (i.e., external to CSPI 101). These external endpoints include endpoints in a customer's on-premises network 116, endpoints in other remote cloud-hosted networks 118, public endpoints 114 accessible via a public network (such as the Internet), and other endpoints.
使用与源计算实例和目的地计算实例相关联的VNIC促进同一子网上的计算实例之间的通信。例如,子网-1中的计算实例C1可能想要将分组发送到子网-1中的计算实例C2。针对源自于源计算实例且其目的地是同一子网中的另一个计算实例的分组,该分组首先由与源计算实例相关联的VNIC处理。由与源计算实例相关联的VNIC执行的处理可以包括从分组报头确定分组的目的地信息、识别为与源计算实例相关联的VNIC配置的任何策略(例如,安全性列表)、确定分组的下一跳、根据需要执行任何分组封装/解封装功能、然后将分组转发/路由到下一跳,目的是促进分组到其预期目的地的通信。当目的地计算实例与源计算实例位于同一子网中时,与源计算实例相关联的VNIC被配置为识别与目的地计算实例相关联的VNIC并将分组转发到该VNIC以供处理。然后执行与目的地计算实例相关联的VNIC并将分组转发到目的地计算实例。Use VNICs associated with source and destination computing instances to facilitate communication between computing instances on the same subnet. For example, computing instance C1 in subnet-1 may want to send a packet to computing instance C2 in subnet-1. For a packet originating from a source computing instance and whose destination is another computing instance in the same subnet, the packet is first processed by the VNIC associated with the source computing instance. The processing performed by the VNIC associated with the source computing instance may include determining the destination information of the packet from the packet header, identifying any policy (e.g., security list) configured for the VNIC associated with the source computing instance, determining the next hop of the packet, performing any packet encapsulation/decapsulation functions as needed, and then forwarding/routing the packet to the next hop, with the purpose of facilitating communication of the packet to its intended destination. When the destination computing instance is in the same subnet as the source computing instance, the VNIC associated with the source computing instance is configured to identify the VNIC associated with the destination computing instance and forward the packet to the VNIC for processing. The VNIC associated with the destination computing instance is then executed and the packet is forwarded to the destination computing instance.
对于要从子网中的计算实例传送到同一VCN中的不同子网中的端点的分组,通过与源和目的地计算实例相关联的VNIC以及VCN VR来促进通信。例如,如果图1中子网-1中的计算实例C1想要将分组发送到子网-2中的计算实例D1,那么该分组首先由与计算实例C1相关联的VNIC处理。与计算实例C1相关联的VNIC被配置为使用默认路由或VCN VR的端口10.0.0.1将分组路由到VCN VR 105。VCN VR 105被配置为使用端口10.1.0.1将分组路由到子网-2。然后,与D1相关联的VNIC接收并处理分组并且VNIC将分组转发到计算实例D1。For packets to be transmitted from a compute instance in a subnet to an endpoint in a different subnet in the same VCN, communication is facilitated by the VNICs associated with the source and destination compute instances and the VCN VRs. For example, if compute instance C1 in subnet-1 in Figure 1 wants to send a packet to compute instance D1 in subnet-2, the packet is first processed by the VNIC associated with compute instance C1. The VNIC associated with compute instance C1 is configured to route the packet to VCN VR 105 using the default route or port 10.0.0.1 of the VCN VR. VCN VR 105 is configured to route the packet to subnet-2 using port 10.1.0.1. The VNIC associated with D1 then receives and processes the packet and the VNIC forwards the packet to compute instance D1.
对于要从VCN 104中的计算实例传送到VCN 104外部的端点的分组,通信由与源计算实例相关联的VNIC、VCN VR 105和与VCN 104相关联的网关促进。一种或多种类型的网关可以与VCN 104相关联。网关是VCN和另一个端点之间的接口,其中该另一个端点在VCN外部。网关是层3/IP层概念并且使得VCN能够与VCN外部的端点通信。因此,网关促进VCN与其他VCN或网络之间的流量流动。可以为VCN配置各种不同类型的网关以促进与不同类型的端点的不同类型的通信。取决于网关,通信可以通过公共网络(例如,互联网)或通过私有网络。各种通信协议可以用于这些通信。For packets to be transmitted from a compute instance in VCN 104 to an endpoint outside of VCN 104, communication is facilitated by a VNIC associated with the source compute instance, a VCN VR 105, and a gateway associated with VCN 104. One or more types of gateways may be associated with VCN 104. A gateway is an interface between a VCN and another endpoint, where the other endpoint is outside of the VCN. A gateway is a layer 3/IP layer concept and enables a VCN to communicate with an endpoint outside of the VCN. Thus, a gateway facilitates the flow of traffic between a VCN and other VCNs or networks. A variety of different types of gateways may be configured for a VCN to facilitate different types of communications with different types of endpoints. Depending on the gateway, communications may be over a public network (e.g., the Internet) or over a private network. Various communication protocols may be used for these communications.
例如,计算实例C1可能想要与VCN 104外部的端点通信。分组可以首先由与源计算实例C1相关联的VNIC处理。VNIC处理确定分组的目的地在C1的子网-1外部。与C1相关联的VNIC可以将分组转发到用于VCN 104的VCN VR 105。VCN VR 105然后处理分组,并且作为处理的一部分,基于分组的目的地,确定与VCN 104相关联的特定网关作为该分组的下一跳。然后,VCN VR 105可以将分组转发到识别出的特定网关。例如,如果目的地是客户的预置网络内的端点,那么分组可以由VCN VR 105转发到为VCN 104配置的动态路由网关(DRG)网关122。分组然后可以从网关转发到下一跳,以促进分组到其最终预期目的地的传送。For example, compute instance C1 may want to communicate with an endpoint outside of VCN 104. The packet may first be processed by a VNIC associated with source compute instance C1. The VNIC processing determines that the destination of the packet is outside of C1's subnet-1. The VNIC associated with C1 may forward the packet to VCN VR 105 for VCN 104. VCN VR 105 then processes the packet and, as part of the processing, determines a specific gateway associated with VCN 104 as a next hop for the packet based on the packet's destination. VCN VR 105 may then forward the packet to the identified specific gateway. For example, if the destination is an endpoint within a customer's on-premises network, the packet may be forwarded by VCN VR 105 to a dynamic routing gateway (DRG) gateway 122 configured for VCN 104. The packet may then be forwarded from the gateway to the next hop to facilitate delivery of the packet to its final intended destination.
可以为VCN配置各种不同类型的网关。可以为VCN配置的网关的示例在图1中描绘并且在下文进行描述。与VCN相关联的网关的示例也在图18、图19、图20和图21中描绘(例如,通过附图标记1834、1836、1838、1934、1936、1938、2034、2036、2038、2134、2136和2138引用的网关)并且在下文进行描述。如图1中描绘的实施例中所示,动态路由网关(DRG)122可以添加到客户VCN 104或与客户VCN 104相关联,并为客户VCN 104与另一个端点之间的私有网络流量通信提供路径,其中该另一个端点可以是客户的预置网络116、CSPI 101的不同区域中的VCN 108、或者不由CSPI 101托管的其他远程云网络118。客户预置网络116可以是使用客户的资源构建的客户网络或客户数据中心。对客户预置网络116的访问一般是非常受限的。对于同时具有客户预置网络116和由CSPI 101在云中部署或托管的一个或多个VCN104的客户,客户可能想要他们的预置网络116和他们的基于云的VCN 104能够彼此沟通。这使得客户能够构建扩展的混合环境,涵盖由CSPI 101托管的客户的VCN 104和他们的预置网络116。DRG 122启用这种此通信。为了启用此类通信,设立通信信道124,其中信道的一个端点位于客户预置网络116中,而另一个端点位于CSPI 101中并连接到客户VCN 104。通信信道124可以通过公共通信网络(诸如互联网)或私有通信网络。可以使用各种不同的通信协议,诸如公共通信网络(诸如互联网)上的IPsec VPN技术、使用私有网络而不是公共网络的Oracle的FastConnect技术等。客户预置网络116中形成通信信道124的一个端点的设备或装备被称为客户驻地装备(CPE),诸如图1中描绘的CPE 126。在CSPI 101侧,端点可以是执行DRG 122的主机机器。A variety of different types of gateways may be configured for a VCN. Examples of gateways that may be configured for a VCN are depicted in FIG. 1 and described below. Examples of gateways associated with a VCN are also depicted in FIG. 18 , FIG. 19 , FIG. 20 , and FIG. 21 (e.g., gateways referenced by reference numerals 1834 , 1836 , 1838 , 1934 , 1936 , 1938 , 2034 , 2036 , 2038 , 2134 , 2136 , and 2138 ) and described below. As shown in the embodiment depicted in FIG. 1 , a dynamic routing gateway (DRG) 122 may be added to or associated with a customer VCN 104 and provide a path for private network traffic communications between the customer VCN 104 and another endpoint, which may be a customer's on-premise network 116 , a VCN 108 in a different region of the CSPI 101 , or another remote cloud network 118 not hosted by the CSPI 101 . The customer premise network 116 can be a customer network or a customer data center built using the customer's resources. Access to the customer premise network 116 is generally very limited. For customers who have both a customer premise network 116 and one or more VCNs 104 deployed or hosted in the cloud by CSPI 101, customers may want their premise network 116 and their cloud-based VCN 104 to communicate with each other. This enables customers to build an extended hybrid environment that covers the customer's VCN 104 hosted by CSPI 101 and their premise network 116. DRG 122 enables this communication. In order to enable such communication, a communication channel 124 is established, wherein one endpoint of the channel is located in the customer premise network 116, and the other endpoint is located in CSPI 101 and connected to the customer VCN 104. The communication channel 124 can pass through a public communication network (such as the Internet) or a private communication network. A variety of different communication protocols can be used, such as IPsec VPN technology on a public communication network (such as the Internet), Oracle's FastConnect technology that uses a private network instead of a public network, and the like. The equipment or devices that form one endpoint of the communication channel 124 in the customer premises network 116 are referred to as customer premises equipment (CPE), such as CPE 126 depicted in FIG.
在某些实施例中,可以将远程对等连接(RPC)添加到DRG,这允许客户将一个VCN与不同区域中的另一个VCN对等化(peer)。使用这种RPC,客户VCN 104可以使用DRG 122与另一个区域中的VCN 108连接。DRG 122还可以被用于与不由CSPI 101(诸如MicrosoftAzure云、亚马逊AWS云等)托管的其他远程云网络118通信。In some embodiments, a remote peer connection (RPC) can be added to the DRG, which allows a customer to peer one VCN with another VCN in a different region. Using this RPC, a customer VCN 104 can connect to a VCN 108 in another region using a DRG 122. DRG 122 can also be used to communicate with other remote cloud networks 118 that are not hosted by CSPI 101 (such as Microsoft Azure Cloud, Amazon AWS Cloud, etc.).
如图1中所示,可以为客户VCN 104配置互联网网关(IGW)120,其使得VCN 104上的计算实例能够与可通过诸如互联网之类的公共网络访问的公共端点114通信。IGW 120是将VCN连接到诸如互联网之类的公共网络的网关。IGW 120使得VCN(诸如VCN 104)内的公共子网(其中公共子网中的资源具有公共覆盖IP地址)能够直接访问公共网络114(诸如互联网)上的公共端点112。使用IGW 120,可以从VCN 104内的子网或从互联网发起连接。As shown in FIG1 , an Internet Gateway (IGW) 120 may be configured for a customer VCN 104, which enables computing instances on the VCN 104 to communicate with public endpoints 114 accessible via a public network such as the Internet. The IGW 120 is a gateway that connects the VCN to a public network such as the Internet. The IGW 120 enables public subnets within a VCN such as VCN 104 (where resources in the public subnet have public overlay IP addresses) to directly access public endpoints 112 on a public network 114 such as the Internet. Using the IGW 120, connections may be initiated from a subnet within the VCN 104 or from the Internet.
网络地址转换(NAT)网关128可以被配置用于客户的VCN 104,并使得客户的VCN中没有专用公共覆盖IP地址的云资源能够访问互联网,并且它在不向直接传入互联网连接(例如,L4-L7连接)暴露那些资源的情况下这样做。这使得VCN内的私有子网(诸如VCN 104中的私有子网-1)能够私有访问互联网上的公共端点。在NAT网关中,只能从私有子网发起到公共互联网的连接,而不能从互联网发起到私有子网的连接。A network address translation (NAT) gateway 128 may be configured for a customer's VCN 104 and enables cloud resources in the customer's VCN that do not have dedicated public overlay IP addresses to access the Internet, and it does so without exposing those resources to direct incoming Internet connections (e.g., L4-L7 connections). This enables private subnets within a VCN (such as Private Subnet-1 in VCN 104) to privately access public endpoints on the Internet. In a NAT gateway, connections can only be initiated from a private subnet to the public Internet, and connections cannot be initiated from the Internet to a private subnet.
在某些实施例中,服务网关(SGW)126可以被配置用于客户VCN 104,并为VCN 104和服务网络110中支持的服务端点之间的私有网络流量提供路径。在某些实施例中,服务网络110可以由CSP提供并且可以提供各种服务。这种服务网络的示例是Oracle的服务网络,它提供可供客户使用的各种服务。例如,客户VCN 104的私有子网中的计算实例(例如,数据库系统)可以将数据备份到服务端点(例如,对象存储),而无需公共IP地址或访问互联网。在某些实施例中,VCN可以只有一个SGW,并且连接只能从VCN内的子网发起,而不能从服务网络110发起。如果VCN与另一个对等化,那么另一个VCN中的资源通常不能访问SGW。用FastConnect或VPN Connect连接到VCN的预置网络中的资源也可以使用为该VCN配置的服务网关。In some embodiments, a service gateway (SGW) 126 may be configured for a customer VCN 104 and provide a path for private network traffic between the VCN 104 and service endpoints supported in the service network 110. In some embodiments, the service network 110 may be provided by a CSP and may provide a variety of services. An example of such a service network is Oracle's service network, which provides a variety of services available to customers. For example, a computing instance (e.g., a database system) in a private subnet of a customer VCN 104 may back up data to a service endpoint (e.g., an object storage) without requiring a public IP address or access to the Internet. In some embodiments, a VCN may have only one SGW, and connections may only be initiated from a subnet within the VCN, not from the service network 110. If a VCN is peered with another, resources in the other VCN generally cannot access the SGW. Resources in a pre-set network connected to a VCN with FastConnect or VPN Connect may also use the service gateway configured for that VCN.
在某些实施方式中,SGW 126使用服务无类域间路由(CIDR)标签的概念,该服务CIDR标签是表示用于感兴趣的服务或服务组的所有区域性公共IP地址范围的字符串。客户在他们配置SGW和相关路由规则以控制到服务的流量时使用服务CIDR标签。客户可以在配置安全性规则时可选地使用它,而无需在服务的公共IP地址未来发生改变时调整安全性规则。In some embodiments, the SGW 126 uses the concept of a service classless inter-domain routing (CIDR) label, which is a string that represents all regional public IP address ranges for a service or group of services of interest. Customers use the service CIDR label when they configure the SGW and related routing rules to control traffic to the service. Customers can optionally use it when configuring security rules, without having to adjust the security rules if the public IP addresses of the services change in the future.
本地对等网关(LPG)132是可以添加到客户VCN 104并使得VCN 104能够与同一区域中的另一个VCN对等化的网关。对等化是指VCN使用私有IP地址进行通信,无需流量穿过公共网络(诸如互联网)或无需通过客户的预置网络116路由流量。在优选实施例中,VCN对于它建立的每个对等化具有单独的LPG。本地对等化或VCN对等化是用于在不同应用或基础设施管理功能之间建立网络连接性的常见做法。A Local Peer Gateway (LPG) 132 is a gateway that can be added to a customer VCN 104 and enables the VCN 104 to peer with another VCN in the same region. Peering refers to the VCNs communicating using private IP addresses without the traffic traversing a public network such as the Internet or without routing the traffic through the customer's on-premises network 116. In a preferred embodiment, the VCN has a separate LPG for each peering it establishes. Local peering or VCN peering is a common practice for establishing network connectivity between different applications or infrastructure management functions.
服务提供商(诸如服务网络110中的服务的提供商)可以使用不同的访问模型提供对服务的访问。根据公共访问模型,服务可以被暴露为客户VCN中的计算实例可经由公共网络(诸如互联网)公开访问的公共端点,和/或可以经由SGW 126私有访问。根据特定的私有访问模型,服务可作为客户的VCN中的私有子网中的私有IP端点被访问。这称为私有端点(PE)访问并且使得服务提供商能够将其服务暴露为客户的私有网络中的实例。私有端点资源表示客户的VCN内的服务。每个PE在客户的VCN中由客户选择的子网中表现为VNIC(称为PE-VNIC,具有一个或多个私有IP)。因此,PE提供了使用VNIC在私有客户VCN子网中呈现服务的方式。由于端点被暴露为VNIC,因此与VNIC相关联的所有特征(诸如路由规则、安全性列表等)现在都可以用于PE VNIC。Service providers (such as providers of services in service network 110) can provide access to services using different access models. According to the public access model, the service can be exposed as a public endpoint that is publicly accessible to a computing instance in a customer VCN via a public network (such as the Internet), and/or can be privately accessed via SGW 126. According to a specific private access model, the service can be accessed as a private IP endpoint in a private subnet in the customer's VCN. This is called private endpoint (PE) access and enables a service provider to expose its services as instances in a customer's private network. Private endpoint resources represent services within a customer's VCN. Each PE appears as a VNIC (called a PE-VNIC, with one or more private IPs) in a subnet selected by the customer in the customer's VCN. Therefore, PE provides a way to present services in a private customer VCN subnet using VNICs. Since the endpoint is exposed as a VNIC, all features associated with the VNIC (such as routing rules, security lists, etc.) can now be used for the PE VNIC.
服务提供商可以注册他们的服务以启用通过PE的访问。提供商可以将策略与服务相关联,这限制了服务对客户租赁的可见性。提供商可以在单个虚拟IP地址(VIP)下注册多个服务,尤其是对于多租户服务。可以有表示相同服务的多个这样的私有端点(在多个VCN中)。Service providers can register their services to enable access through PE. Providers can associate policies with services, which limits the visibility of the service to customer tenancies. Providers can register multiple services under a single virtual IP address (VIP), especially for multi-tenant services. There can be multiple such private endpoints (in multiple VCNs) representing the same service.
私有子网中的计算实例然后可以使用PE VNIC的私有IP地址或服务DNS名称来访问服务。客户VCN中的计算实例可以通过将流量发送到客户VCN中的PE的私有IP地址来访问该服务。私有访问网关(PAGW)130是可以附接到服务提供商VCN(例如,服务网络110中的VCN)的网关资源,该服务提供商VCN充当来自/去往客户子网私有端点的所有流量的入口/出口点。PAGW 130使得提供商能够在不利用其内部IP地址资源的情况下扩展PE连接的数量。提供商只需要为在单个VCN中注册的任何数量的服务配置一个PAGW。提供商可以将服务表示为一个或多个客户的多个VCN中的私有端点。从客户的角度来看,PE VNIC不是附接到客户的实例,而是看起来附接到客户希望与之交互的服务。去往私有端点的流量经由PAGW130路由到服务。这些被称为客户到服务私有连接(C2S连接)。The compute instances in the private subnet can then access the service using the private IP address of the PE VNIC or the service DNS name. The compute instances in the customer VCN can access the service by sending traffic to the private IP address of the PE in the customer VCN. The private access gateway (PAGW) 130 is a gateway resource that can be attached to a service provider VCN (e.g., a VCN in the service network 110) that acts as an entry/exit point for all traffic from/to the private endpoints of the customer subnet. PAGW 130 enables providers to scale the number of PE connections without utilizing their internal IP address resources. Providers only need to configure one PAGW for any number of services registered in a single VCN. Providers can represent services as private endpoints in multiple VCNs for one or more customers. From the customer's perspective, the PE VNIC is not attached to the customer's instance, but appears to be attached to the service that the customer wants to interact with. Traffic to the private endpoint is routed to the service via PAGW 130. These are referred to as customer-to-service private connections (C2S connections).
通过允许流量流经FastConnect/IPsec链路和客户VCN中的私有端点,PE概念还可以被用于将对于服务的私有访问扩展到客户的预置网络和数据中心。通过允许流量在LPG132和客户的VCN中的PE之间流动,还可以将服务的私有访问扩展到客户的对等VCN。The PE concept can also be used to extend private access to services to the customer's on-premises networks and data centers by allowing traffic to flow through FastConnect/IPsec links and private endpoints in the customer's VCN. Private access to services can also be extended to the customer's peer VCNs by allowing traffic to flow between LPG 132 and the PE in the customer's VCN.
客户可以在子网级别控制VCN中的路由,因此客户可以指定客户的VCN(诸如VCN104)中的哪些子网使用每个网关。VCN的路由表被用于决定是否允许流量通过特定网关离开VCN。例如,在特定实例中,用于客户VCN 104内的公共子网的路由表可以通过IGW 120发送非本地流量。用于同一客户VCN 104内的私有子网的路由表可以通过SGW 126发送以CSP服务为目的地的流量。所有剩余流量可以经由NAT网关128发送。路由表仅控制离开VCN的流量。The customer can control routing in the VCN at the subnet level, so the customer can specify which subnets in the customer's VCN (such as VCN 104) use each gateway. The routing table of the VCN is used to decide whether to allow traffic to leave the VCN through a particular gateway. For example, in a specific instance, the routing table for a public subnet within a customer VCN 104 can send non-local traffic through IGW 120. The routing table for a private subnet within the same customer VCN 104 can send traffic destined for CSP services through SGW 126. All remaining traffic can be sent via NAT gateway 128. The routing table only controls traffic leaving the VCN.
与VCN相关联的安全性列表被用于控制经由入站连接经由网关进入VCN的流量。子网中的所有资源都使用相同的路由表和安全性列表。安全性列表可以被用于控制允许进出VCN的子网中的实例的特定类型的流量。安全性列表规则可以包括入口(入站)和出口(出站)规则。例如,入口规则可以指定允许的源地址范围,而出口规则可以指定允许的目的地地址范围。安全性规则可以指定特定的协议(例如,TCP、ICMP)、特定的端口(例如,用于SSH的22、用于Windows RDP的3389)等。在某些实施方式中,实例的操作系统可以强制执行自己的符合安全性列表规则的防火墙规则。规则可以是有状态的(例如,跟踪连接并自动允许响应,而没有针对响应流量的明确安全性列表规则)或无状态的。The security list associated with the VCN is used to control the traffic that enters the VCN via the gateway via an inbound connection. All resources in the subnet use the same routing table and security list. The security list can be used to control specific types of traffic that are allowed to enter and exit the instances in the subnet of the VCN. Security list rules can include ingress (inbound) and egress (outbound) rules. For example, an ingress rule can specify a range of allowed source addresses, and an egress rule can specify a range of allowed destination addresses. Security rules can specify specific protocols (e.g., TCP, ICMP), specific ports (e.g., 22 for SSH, 3389 for Windows RDP), etc. In some embodiments, the operating system of the instance can enforce its own firewall rules that comply with the security list rules. Rules can be stateful (e.g., tracking connections and automatically allowing responses without explicit security list rules for response traffic) or stateless.
(即,通过部署在VCN 104上的资源或计算实例)来自客户VCN的访问可以被分类为公开访问、私有访问或专用访问。公开访问是指使用公共IP地址或NAT访问公共端点的访问模型。私有访问使得VCN 104中具有私有IP地址的客户工作负载(例如,私有子网中的资源)能够访问服务,而无需穿过诸如互联网之类的公共网络。在某些实施例中,CSPI 101使得具有私有IP地址的客户VCN工作负载能够使用服务网关访问服务(的公共服务端点)。因此,服务网关通过在客户的VCN和驻留在客户的私有网络外部的服务的公共端点之间建立虚拟链接来提供私有访问模型。Access from a customer VCN (i.e., through resources or compute instances deployed on VCN 104) can be categorized as public access, private access, or dedicated access. Public access refers to an access model that uses a public IP address or NAT to access a public endpoint. Private access enables customer workloads (e.g., resources in a private subnet) in VCN 104 with private IP addresses to access services without traversing a public network such as the Internet. In certain embodiments, CSPI 101 enables customer VCN workloads with private IP addresses to access (public service endpoints of) services using a service gateway. Thus, the service gateway provides a private access model by establishing a virtual link between a customer's VCN and a public endpoint of a service that resides outside of the customer's private network.
此外,CSPI可以使用诸如FastConnect公开对等化之类的技术提供专用公开访问,其中客户预置实例可以使用FastConnect连接访问客户VCN中的一个或多个服务,而无需穿过诸如互联网之类的公共网络。CSPI还可以使用FastConnect私有对等化提供专用私有访问,其中具有私有IP地址的客户预置实例可以使用FastConnect连接访问客户的VCN工作负载。FastConnect是对使用公共互联网将客户的预置网络连接到CSPI及其服务的网络连接性替代方案。与基于互联网的连接相比,FastConnect提供了简单、灵活且经济的方式来创建具有更高带宽选项的专用和私有连接以及更可靠和一致的网络体验。Additionally, CSPI can provide dedicated public access using technologies such as FastConnect public peering, where a customer on-premises instance can use a FastConnect connection to access one or more services in a customer's VCN without traversing a public network such as the Internet. CSPI can also provide dedicated private access using FastConnect private peering, where a customer on-premises instance with a private IP address can use a FastConnect connection to access the customer's VCN workloads. FastConnect is a network connectivity alternative to using the public Internet to connect a customer's on-premises network to CSPI and its services. FastConnect provides a simple, flexible, and cost-effective way to create dedicated and private connections with higher bandwidth options and a more reliable and consistent network experience compared to Internet-based connections.
图1和上面的伴随描述描述了示例虚拟网络中的各种经虚拟化的组件。如上所述,虚拟网络建立在底层物理或基板网络上。图2描绘了根据某些实施例的为虚拟网络提供底层的CSPI 200内的物理网络中的物理组件的简化体系架构图。如图所示,CSPI 200提供分布式环境,包括由云服务提供商(CSP)提供的组件和资源(例如,计算、存储器和网络资源)。这些组件和资源被用于向订阅客户(即,已订阅由CSP提供的一个或多个服务的客户)提供云服务(例如,IaaS服务)。基于客户订阅的服务,为客户供应CSPI 200的资源的子集(例如,计算、存储器和网络资源)。然后,客户可以使用由CSPI 200提供的物理计算、存储器和联网资源构建其自己的基于云的(即,CSPI托管的)可定制且私有虚拟网络。如前面所指示的,这些客户网络被称为虚拟云网络(VCN)。客户可以在这些客户VCN上部署一个或多个客户资源,诸如计算实例。计算实例可以是虚拟机、裸机实例等形式。CSPI 200提供基础设施和一组互补云服务,其使得客户能够在高度可用的托管环境中构建和运行广泛的应用和服务。FIG. 1 and the accompanying description above describe various virtualized components in an example virtual network. As described above, the virtual network is built on an underlying physical or substrate network. FIG. 2 depicts a simplified architecture diagram of physical components in a physical network within CSPI 200 that provides an underlying layer for the virtual network, according to certain embodiments. As shown, CSPI 200 provides a distributed environment that includes components and resources (e.g., computing, storage, and network resources) provided by a cloud service provider (CSP). These components and resources are used to provide cloud services (e.g., IaaS services) to subscribing customers (i.e., customers who have subscribed to one or more services provided by the CSP). Based on the services subscribed by the customer, a subset of the resources of CSPI 200 (e.g., computing, storage, and network resources) is provisioned to the customer. The customer can then build its own cloud-based (i.e., CSPI-hosted) customizable and private virtual network using the physical computing, storage, and networking resources provided by CSPI 200. As indicated above, these customer networks are referred to as virtual cloud networks (VCNs). Customers can deploy one or more customer resources, such as computing instances, on these customer VCNs. The computing instances can be in the form of virtual machines, bare metal instances, and the like. CSPI 200 provides infrastructure and a set of complementary cloud services that enable customers to build and run a wide range of applications and services in a highly available hosting environment.
在图2中描绘的示例实施例中,CSPI 200的物理组件包括一个或多个物理主机机器或物理服务器(例如,202、206、208)、网络虚拟化设备(NVD)(例如,210、212)、架顶式(TOR)交换机(例如,214、216)和物理网络(例如,218)、以及物理网络218中的交换机。物理主机机器或服务器可以托管和执行参与VCN的一个或多个子网的各种计算实例。计算实例可以包括虚拟机实例和裸机实例。例如,图1中描绘的各种计算实例可以由图2中描绘的物理主机机器托管。VCN中的虚拟机计算实例可以由一个主机机器或多个不同的主机机器执行。物理主机机器也可以托管虚拟主机机器、基于容器的主机或功能等。图1中描绘的VNIC和VCN VR可以由图2中描绘的NVD执行。图1中描绘的网关可以由主机机器和/或由图2中描述的NVD执行。In the example embodiment depicted in FIG. 2 , the physical components of CSPI 200 include one or more physical host machines or physical servers (e.g., 202 , 206 , 208 ), network virtualization devices (NVDs) (e.g., 210 , 212 ), top-of-rack (TOR) switches (e.g., 214 , 216 ), and physical networks (e.g., 218 ), and switches in physical network 218 . The physical host machines or servers may host and execute various computing instances that participate in one or more subnets of a VCN. The computing instances may include virtual machine instances and bare metal instances. For example, the various computing instances depicted in FIG. 1 may be hosted by the physical host machines depicted in FIG. 2 . The virtual machine computing instances in a VCN may be executed by one host machine or multiple different host machines. The physical host machines may also host virtual host machines, container-based hosts or functions, etc. The VNICs and VCN VRs depicted in FIG. 1 may be executed by the NVD depicted in FIG. 2 . The gateways depicted in FIG. 1 may be executed by the host machines and/or by the NVD described in FIG. 2 .
主机机器或服务器可以执行在主机机器上创建和启用经虚拟化的环境的管理程序(也称为虚拟机监视器或VMM)。虚拟化或经虚拟化的环境促进了基于云的计算。一个或多个计算实例可以由主机机器上的管理程序在该主机机器上创建、执行和管理。主机机器上的管理程序使得主机机器的物理计算资源(例如,计算、存储器和网络资源)能够在由主机机器执行的各种计算实例之间共享。A host machine or server may execute a hypervisor (also referred to as a virtual machine monitor or VMM) that creates and enables a virtualized environment on the host machine. A virtualized or virtualized environment facilitates cloud-based computing. One or more computing instances may be created, executed, and managed on the host machine by a hypervisor on the host machine. The hypervisor on the host machine enables the physical computing resources (e.g., computing, memory, and network resources) of the host machine to be shared between the various computing instances executed by the host machine.
例如,如图2中所描绘的,主机机器202和208分别执行管理程序260和266。这些管理程序可以使用软件、固件或硬件或其组合来实现。通常,管理程序是位于主机机器的操作系统(OS)之上的过程或软件层,OS进而在主机机器的硬件处理器上执行。管理程序通过使得主机机器的物理计算资源(例如,诸如处理器/核心之类的处理资源、存储器资源、网络资源)能够在由主机机器执行的各种虚拟机计算实例之间共享来提供经虚拟化的环境。例如,在图2中,管理程序260可以位于主机机器202的OS之上并使得主机机器202的计算资源(例如,处理、存储器和网络资源)能够在由主机机器202执行的计算实例(例如,虚拟机)之间共享。虚拟机可以具有其自己的操作系统(称为访客操作系统),该操作系统可以与主机机器的OS相同或不同。由主机机器执行的虚拟机的操作系统可以与由同一主机机器执行的另一个虚拟机的操作系统相同或不同。因此,管理程序使得多个操作系统能够被同时执行,同时共享主机机器的相同计算资源。图2中描绘的主机机器可以具有相同或不同类型的管理程序。For example, as depicted in FIG. 2 , host machines 202 and 208 execute hypervisors 260 and 266, respectively. These hypervisors can be implemented using software, firmware, or hardware, or a combination thereof. Typically, a hypervisor is a process or software layer located above the operating system (OS) of a host machine, and the OS is then executed on the hardware processor of the host machine. The hypervisor provides a virtualized environment by enabling the physical computing resources of the host machine (e.g., processing resources such as processors/cores, memory resources, network resources) to be shared between various virtual machine computing instances executed by the host machine. For example, in FIG. 2 , a hypervisor 260 can be located above the OS of the host machine 202 and enables the computing resources of the host machine 202 (e.g., processing, memory, and network resources) to be shared between computing instances (e.g., virtual machines) executed by the host machine 202. A virtual machine can have its own operating system (referred to as a guest operating system), which can be the same or different from the OS of the host machine. The operating system of a virtual machine executed by a host machine can be the same or different from the operating system of another virtual machine executed by the same host machine. Thus, a hypervisor enables multiple operating systems to be executed simultaneously while sharing the same computing resources of the host machine.The host machines depicted in Figure 2 may have the same or different types of hypervisors.
计算实例可以是虚拟机实例或裸机实例。在图2中,主机机器202上的计算实例268和主机机器208上的计算实例274是虚拟机实例的示例。主机机器206是提供给客户的裸机实例的示例。The computing instance can be a virtual machine instance or a bare metal instance. In Figure 2, computing instance 268 on host machine 202 and computing instance 274 on host machine 208 are examples of virtual machine instances. Host machine 206 is an example of a bare metal instance provided to a customer.
在某些情况下,可以向单个客户供应整个主机机器,并且由该主机机器托管的一个或多个计算实例(或者虚拟机或者裸机实例)全都属于同一客户。在其他情况下,主机机器可以在多个客户(即,多个租户)之间共享。在这种多租赁场景中,主机机器可以托管属于不同客户的虚拟机计算实例。这些计算实例可以是不同客户的不同VCN的成员。在某些实施例中,裸机计算实例由没有管理程序的裸机服务器托管。当供应裸机计算实例时,单个客户或租户维持对托管该裸机实例的主机机器的物理CPU、存储器和网络接口的控制,并且主机机器不与其他客户或租户共享。In some cases, the entire host machine can be supplied to a single customer, and one or more computing instances (or virtual machines or bare metal instances) hosted by the host machine all belong to the same customer. In other cases, the host machine can be shared between multiple customers (i.e., multiple tenants). In this multi-tenancy scenario, the host machine can host virtual machine computing instances belonging to different customers. These computing instances can be members of different VCNs of different customers. In certain embodiments, the bare metal computing instance is hosted by a bare metal server without a hypervisor. When supplying a bare metal computing instance, a single customer or tenant maintains control of the physical CPU, memory, and network interface of the host machine hosting the bare metal instance, and the host machine is not shared with other customers or tenants.
如前所述,作为VCN的一部分的每个计算实例与使得该计算实例能够成为VCN的子网的成员的VNIC相关联。与计算实例相关联的VNIC促进分组或帧往返于计算实例的通信。VNIC在计算实例被创建时与计算实例相关联。在某些实施例中,对于由主机机器执行的计算实例,与该计算实例相关联的VNIC由连接到主机机器的NVD执行。例如,在图2中,主机机器202执行与VNIC 276相关联的虚拟机计算实例268,并且VNIC 276由连接到主机机器202的NVD 210执行。作为另一个示例,由主机机器206托管的裸机实例272与由连接到主机机器206的NVD 212执行的VNIC 280相关联。作为又一个示例,VNIC 284与由主机机器208执行的计算实例274相关联,并且VNIC 284由连接到主机机器208的NVD 212执行。As previously described, each computing instance that is part of a VCN is associated with a VNIC that enables the computing instance to become a member of a subnet of the VCN. The VNIC associated with the computing instance facilitates the communication of packets or frames to and from the computing instance. The VNIC is associated with the computing instance when the computing instance is created. In some embodiments, for a computing instance executed by a host machine, the VNIC associated with the computing instance is executed by an NVD connected to the host machine. For example, in FIG. 2 , the host machine 202 executes a virtual machine computing instance 268 associated with a VNIC 276, and the VNIC 276 is executed by an NVD 210 connected to the host machine 202. As another example, a bare metal instance 272 hosted by a host machine 206 is associated with a VNIC 280 executed by an NVD 212 connected to the host machine 206. As yet another example, a VNIC 284 is associated with a computing instance 274 executed by a host machine 208, and the VNIC 284 is executed by an NVD 212 connected to the host machine 208.
对于由主机机器托管的计算实例,连接到该主机机器的NVD还执行与计算实例是其成员的VCN对应的VCN VR。例如,在图2中描绘的实施例中,NVD 210执行与计算实例268是其成员的VCN对应的VCN VR 277。NVD 212还可以执行与对应于由主机机器206和208托管的计算实例的VCN对应的一个或多个VCN VR 283。For compute instances hosted by a host machine, the NVD connected to the host machine also executes VCN VRs corresponding to the VCNs of which the compute instances are members. For example, in the embodiment depicted in FIG. 2 , NVD 210 executes VCN VR 277 corresponding to the VCN of which compute instance 268 is a member. NVD 212 may also execute one or more VCN VRs 283 corresponding to the VCNs corresponding to the compute instances hosted by host machines 206 and 208.
主机机器可以包括使得主机机器能够连接到其他设备的一个或多个网络接口卡(NIC)。主机机器上的NIC可以提供使得主机机器能够通信地连接到另一个设备的一个或多个端口(或接口)。例如,主机机器可以使用在主机机器上和NVD上提供的一个或多个端口(或接口)连接到NVD。主机机器也可以连接到其他设备,诸如另一个主机机器。The host machine may include one or more network interface cards (NICs) that enable the host machine to connect to other devices. The NIC on the host machine may provide one or more ports (or interfaces) that enable the host machine to communicatively connect to another device. For example, the host machine may connect to the NVD using one or more ports (or interfaces) provided on the host machine and on the NVD. The host machine may also connect to other devices, such as another host machine.
例如,在图2中,主机机器202使用链路220连接到NVD 210,链路220在由主机机器202的NIC 232提供的端口234与NVD 210的端口236之间延伸。主机机器206使用链路224连接到NVD 212,链路224在由主机机器206的NIC 244提供的端口246与NVD 212的端口248之间延伸。主机机器208使用链路226连接到NVD 212,链路226在由主机机器208的NIC 250提供的端口252与NVD 212的端口254之间延伸。2 , host machine 202 is connected to NVD 210 using link 220, which extends between port 234 provided by NIC 232 of host machine 202 and port 236 of NVD 210. Host machine 206 is connected to NVD 212 using link 224, which extends between port 246 provided by NIC 244 of host machine 206 and port 248 of NVD 212. Host machine 208 is connected to NVD 212 using link 226, which extends between port 252 provided by NIC 250 of host machine 208 and port 254 of NVD 212.
NVD进而经由通信链路连接到架顶式(TOR)交换机,这些TOR交换机连接到物理网络218(也称为交换架构)。在某些实施例中,主机机器和NVD之间以及NVD和TOR交换机之间的链路是以太网链路。例如,在图2中,NVD 210和212分别使用链路228和230连接到TOR交换机214和216。在某些实施例中,链路220、224、226、228和230是以太网链路。连接到TOR的主机机器和NVD的集合有时称为机架。The NVDs, in turn, are connected to top-of-rack (TOR) switches via communication links, which are connected to a physical network 218 (also referred to as a switching fabric). In some embodiments, the links between the host machines and the NVDs and between the NVDs and the TOR switches are Ethernet links. For example, in FIG2 , NVDs 210 and 212 are connected to TOR switches 214 and 216 using links 228 and 230, respectively. In some embodiments, links 220, 224, 226, 228, and 230 are Ethernet links. A collection of host machines and NVDs connected to a TOR is sometimes referred to as a rack.
物理网络218提供使得TOR交换机能够彼此通信的通信架构。物理网络218可以是多层网络。在某些实施方式中,物理网络218是交换机的多层Clos网络,其中TOR交换机214和216表示多层和多节点物理交换网络218的叶级节点。不同的Clos网络配置是可能的,包括但不限于2层网络、3层网络、4层网络、5层网络和一般的“n”层网络。Clos网络的示例在图5中描绘并在下面进行描述。The physical network 218 provides a communication architecture that enables the TOR switches to communicate with each other. The physical network 218 can be a multi-layer network. In some embodiments, the physical network 218 is a multi-layer Clos network of switches, where the TOR switches 214 and 216 represent leaf-level nodes of the multi-layer and multi-node physical switching network 218. Different Clos network configurations are possible, including but not limited to 2-layer networks, 3-layer networks, 4-layer networks, 5-layer networks, and general "n"-layer networks. An example of a Clos network is depicted in Figure 5 and described below.
主机机器和NVD之间可能存在各种不同的连接配置,诸如一对一配置、多对一配置、一对多配置等。在一对一配置实施方式中,每个主机机器连接到自己单独的NVD。例如,在图2中,主机机器202经由主机机器202的NIC 232连接到NVD 210。在多对一配置中,多个主机机器连接到一个NVD。例如,在图2中,主机机器206和208分别经由NIC 244和250连接到同一个NVD 212。There may be various different connection configurations between the host machine and the NVD, such as a one-to-one configuration, a many-to-one configuration, a one-to-many configuration, etc. In a one-to-one configuration implementation, each host machine is connected to its own separate NVD. For example, in FIG2 , the host machine 202 is connected to the NVD 210 via the NIC 232 of the host machine 202. In a many-to-one configuration, multiple host machines are connected to one NVD. For example, in FIG2 , the host machines 206 and 208 are connected to the same NVD 212 via the NICs 244 and 250, respectively.
在一对多配置中,一个主机机器连接到多个NVD。图3示出了CSPI 300内的示例,其中主机机器连接到多个NVD。如图3中所示,主机机器302包括网络接口卡(NIC)304,NIC 304包括多个端口306和308。主机机器300经由端口306和链路320连接到第一NVD 310,并经由端口308和链路322连接到第二NVD 312。端口306和308可以是以太网端口,并且主机机器302与NVD 310和312之间的链路320和322可以是以太网链路。NVD 310进而连接到第一TOR交换机314并且NVD 312连接到第二TOR交换机316。NVD 310、312与TOR交换机314、316之间的链路可以是以太网链路。TOR交换机314和316表示多层物理网络318中的层0交换设备。In a one-to-many configuration, one host machine is connected to multiple NVDs. FIG. 3 shows an example within CSPI 300 where a host machine is connected to multiple NVDs. As shown in FIG. 3 , host machine 302 includes a network interface card (NIC) 304 that includes multiple ports 306 and 308. Host machine 300 is connected to a first NVD 310 via port 306 and link 320, and to a second NVD 312 via port 308 and link 322. Ports 306 and 308 may be Ethernet ports, and links 320 and 322 between host machine 302 and NVDs 310 and 312 may be Ethernet links. NVD 310 is in turn connected to a first TOR switch 314 and NVD 312 is connected to a second TOR switch 316. Links between NVDs 310, 312 and TOR switches 314, 316 may be Ethernet links. TOR switches 314 and 316 represent layer 0 switching devices in a multi-layer physical network 318.
图3中描绘的布置提供了两条单独的物理网络路径从物理交换机网络318到主机机器302:第一条路径穿过TOR交换机314到NVD 310再到主机机器302,第二条路径穿过TOR交换机316到NVD 312再到主机机器302。单独的路径提供了主机机器302的增强的可用性(称为高可用性)。如果路径(例如,路径之一中的链路断开)或设备(例如,特定NVD未运行)之一出现问题,那么另一条路径可以被用于去往/来自主机机器302的通信。3 provides two separate physical network paths from the physical switch network 318 to the host machine 302: a first path through the TOR switch 314 to the NVD 310 and then to the host machine 302, and a second path through the TOR switch 316 to the NVD 312 and then to the host machine 302. The separate paths provide enhanced availability (referred to as high availability) of the host machine 302. If a problem occurs in one of the paths (e.g., a link in one of the paths is broken) or a device (e.g., a particular NVD is not running), then the other path can be used for communications to/from the host machine 302.
在图3中描绘的配置中,主机机器使用由主机机器的NIC提供的两个不同端口连接到两个不同的NVD。在其他实施例中,主机机器可以包括使得主机机器能够连接到多个NVD的多个NIC。3, the host machine is connected to two different NVDs using two different ports provided by the host machine's NIC. In other embodiments, the host machine may include multiple NICs that enable the host machine to connect to multiple NVDs.
返回去参考图2,NVD是执行一个或多个网络和/或存储虚拟化功能的物理设备或组件。NVD可以是具有一个或多个处理单元(例如,CPU、网络处理单元(NPU)、FPGA、分组处理管线等)、包含高速缓存的存储器、以及端口的任何设备。各种虚拟化功能可以由NVD的一个或多个处理单元所执行的软件/固件来执行。Referring back to FIG. 2 , an NVD is a physical device or component that performs one or more network and/or storage virtualization functions. An NVD may be any device having one or more processing units (e.g., a CPU, a network processing unit (NPU), an FPGA, a packet processing pipeline, etc.), a memory including a cache, and a port. Various virtualization functions may be performed by software/firmware executed by one or more processing units of the NVD.
NVD可以以各种不同的形式实现。例如,在某些实施例中,NVD被实现为称为smartNIC的接口卡或具有板载嵌入式处理器的智能NIC。smartNIC是与主机机器上的NIC分开的设备。在图2中,NVD 210和212可以被实现为分别连接到主机机器202以及主机机器206和208的smartNIC。NVD can be implemented in a variety of different forms. For example, in some embodiments, NVD is implemented as an interface card called smartNIC or an intelligent NIC with an onboard embedded processor. SmartNIC is a device separate from the NIC on the host machine. In Figure 2, NVD 210 and 212 can be implemented as smartNICs connected to host machine 202 and host machines 206 and 208, respectively.
但是,smartNIC只是NVD实施方式的一个示例。各种其他实施方式是可能的。例如,在一些其他实施方式中,NVD或由NVD执行的一个或多个功能可以结合到一个或多个主机机器、一个或多个TOR交换机以及CSPI 200的其他组件中或由其执行。例如,NVD可以在主机机器中实施,其中由NVD执行的功能由主机机器执行。作为另一个示例,NVD可以是TOR交换机的一部分,或者TOR交换机可以被配置为执行由NVD执行的功能,这使得TOR交换机能够执行用于公共云的各种复杂分组转换。执行NVD的功能的TOR有时被称为智能TOR。在向客户提供虚拟机(VM)实例而非裸机(BM)实例的其他实施方式中,由NVD执行的功能可以在主机机器的管理程序内部实现。在一些其他实施方式中,NVD的功能中的一些可以卸载到在一组主机机器上运行的集中式服务。However, smartNIC is only one example of an NVD implementation. Various other implementations are possible. For example, in some other implementations, NVD or one or more functions performed by NVD may be incorporated into or performed by one or more host machines, one or more TOR switches, and other components of CSPI 200. For example, NVD may be implemented in a host machine, where the functions performed by NVD are performed by the host machine. As another example, NVD may be part of a TOR switch, or a TOR switch may be configured to perform the functions performed by NVD, which enables the TOR switch to perform various complex packet conversions for a public cloud. A TOR that performs the functions of NVD is sometimes referred to as a smart TOR. In other implementations that provide virtual machine (VM) instances to customers instead of bare metal (BM) instances, the functions performed by NVD may be implemented inside the hypervisor of the host machine. In some other implementations, some of the functions of NVD may be offloaded to a centralized service running on a group of host machines.
在某些实施例中,诸如当实现为如图2中所示的smartNIC时,NVD可以包括使其能够连接到一个或多个主机机器以及一个或多个TOR交换机的多个物理端口。NVD上的端口可以被分类为面向主机的端口(也称为“南端口”)或面向网络或面向TOR的端口(也称为“北端口”)。NVD的面向主机的端口是用于将NVD连接到主机机器的端口。图2中面向主机的端口的示例包括NVD 210上的端口236以及NVD 212上的端口248和254。NVD的面向网络的端口是用于将NVD连接到TOR交换机的端口。图2中面向网络的端口的示例包括NVD 210上的端口256和NVD 212上的端口258。如图2中所示,NVD 210使用从NVD 210的端口256延伸到TOR交换机214的链路228连接到TOR交换机214。类似地,NVD 212使用从NVD 212的端口258延伸到TOR交换机216的链路230连接到TOR交换机216。In certain embodiments, such as when implemented as a smartNIC as shown in FIG. 2 , the NVD may include multiple physical ports that enable it to connect to one or more host machines and one or more TOR switches. Ports on the NVD may be classified as host-facing ports (also referred to as “south ports”) or network-facing or TOR-facing ports (also referred to as “north ports”). The host-facing ports of the NVD are ports for connecting the NVD to host machines. Examples of host-facing ports in FIG. 2 include port 236 on NVD 210 and ports 248 and 254 on NVD 212. The network-facing ports of the NVD are ports for connecting the NVD to TOR switches. Examples of network-facing ports in FIG. 2 include port 256 on NVD 210 and port 258 on NVD 212. As shown in FIG. 2 , NVD 210 is connected to TOR switch 214 using link 228 extending from port 256 of NVD 210 to TOR switch 214. Similarly, NVD 212 is connected to TOR switch 216 using link 230 extending from port 258 of NVD 212 to TOR switch 216 .
NVD经由面向主机的端口从主机机器接收分组和帧(例如,由主机机器托管的计算实例生成的分组和帧),并且在执行必要的分组处理之后,可以经由NVD的面向网络的端口将分组和帧转发到TOR交换机。NVD可以经由NVD的面向网络的端口从TOR交换机接收分组和帧,并且在执行必要的分组处理之后,可以经由NVD的面向主机的端口将分组和帧转发到主机机器。NVD receives packets and frames (e.g., packets and frames generated by a compute instance hosted by the host machine) from a host machine via a host-facing port, and after performing necessary packet processing, may forward the packets and frames to a TOR switch via a network-facing port of NVD. NVD may receive packets and frames from a TOR switch via a network-facing port of NVD, and after performing necessary packet processing, may forward the packets and frames to a host machine via a host-facing port of NVD.
在某些实施例中,在NVD和TOR交换机之间可以有多个端口和相关联的链路。这些端口和链路可以聚合以形成多个端口或链路的链路聚合体组(称为LAG)。链路聚合允许将两个端点之间(例如,NVD和TOR交换机之间)的多条物理链路视为单条逻辑链路。给定LAG中的所有物理链路都可以以相同的速度在全双工模式下操作。LAG有助于增加两个端点之间的连接的带宽和可靠性。如果LAG中的物理链路之一发生故障,那么流量被动态且透明地重新指派到LAG中的其他物理链路之一。聚合的物理链路比每条单独的链路递送更高的带宽。与LAG相关联的多个端口被视为单个逻辑端口。流量可以跨LAG的多条物理链路被负载平衡。可以在两个端点之间配置一个或多个LAG。这两个端点可以位于NVD和TOR交换机之间、主机机器和NVD之间,等等。In some embodiments, there may be multiple ports and associated links between the NVD and the TOR switch. These ports and links may be aggregated to form a link aggregate group (referred to as a LAG) of multiple ports or links. Link aggregation allows multiple physical links between two endpoints (e.g., between the NVD and the TOR switch) to be treated as a single logical link. All physical links in a given LAG may operate in full-duplex mode at the same speed. LAG helps increase the bandwidth and reliability of the connection between the two endpoints. If one of the physical links in the LAG fails, the traffic is dynamically and transparently reassigned to one of the other physical links in the LAG. The aggregated physical links deliver higher bandwidth than each individual link. Multiple ports associated with the LAG are treated as a single logical port. Traffic may be load balanced across multiple physical links of the LAG. One or more LAGs may be configured between two endpoints. The two endpoints may be located between the NVD and the TOR switch, between the host machine and the NVD, and so on.
NVD实现或执行网络虚拟化功能。这些功能由NVD执行的软件/固件执行。网络虚拟化功能的示例包括但不限于:分组封装和解封装功能;用于创建VCN网络的功能;用于实现网络策略的功能,诸如VCN安全性列表(防火墙)功能性;促进去往和来自VCN中的计算实例的分组的路由和转发的功能;等等。在某些实施例中,在接收到分组后,NVD被配置为执行用于处理分组得分组处理管线并确定如何转发或路由分组。作为这个分组处理管线的一部分,NVD可以执行与覆盖网络相关联的一个或多个虚拟功能,诸如执行与VCN中的计算机实例相关联的VNIC、执行与VCN相关联的虚拟路由器(VR)、分组的封装和解封装以促进虚拟网络中的转发或路由、某些网关(例如,本地对等网关)的执行、安全性列表的实施方式、网络安全组、网络地址转换(NAT)功能性(例如,逐个主机地将公共IP转换到私有IP)、节流功能和其他功能。NVD implements or performs network virtualization functions. These functions are performed by software/firmware executed by NVD. Examples of network virtualization functions include, but are not limited to: packet encapsulation and decapsulation functions; functions for creating VCN networks; functions for implementing network policies, such as VCN security lists (firewall) functionality; functions for facilitating routing and forwarding of packets to and from computing instances in the VCN; and the like. In some embodiments, upon receiving a packet, NVD is configured to execute a packet processing pipeline for processing the packet and determining how to forward or route the packet. As part of this packet processing pipeline, NVD may execute one or more virtual functions associated with an overlay network, such as executing a VNIC associated with a computer instance in the VCN, executing a virtual router (VR) associated with the VCN, encapsulation and decapsulation of packets to facilitate forwarding or routing in a virtual network, execution of certain gateways (e.g., local peer gateways), implementation of security lists, network security groups, network address translation (NAT) functionality (e.g., translating public IPs to private IPs on a host-by-host basis), throttling functions, and other functions.
在某些实施例中,NVD中的分组处理数据路径可以包括多个分组管线,每个分组管线由一系列分组变换级组成。在某些实施方式中,在接收到分组后,分组被解析并分类到单个管线。然后以线性方式处理分组,一个级接一个级,直到分组被丢弃或者通过NVD的接口发送出去。这些级提供基本的功能性分组处理构建块(例如,验证报头、强制执行节流、插入新的层2报头、强制执行L4防火墙、VCN封装/解封装等),以便可以通过组合现有级来构建新的管线,并且可以通过创建新级并将它们插入现有管线来添加新的功能性。In some embodiments, the packet processing data path in NVD may include multiple packet pipelines, each packet pipeline consisting of a series of packet transformation stages. In some embodiments, after receiving a packet, the packet is parsed and classified into a single pipeline. The packet is then processed in a linear manner, one stage after another, until the packet is discarded or sent out through the interface of NVD. These stages provide basic functional packet processing building blocks (e.g., verifying headers, enforcing throttling, inserting new layer 2 headers, enforcing L4 firewalls, VCN encapsulation/decapsulation, etc.) so that new pipelines can be built by combining existing stages, and new functionality can be added by creating new stages and plugging them into existing pipelines.
NVD可以执行与VCN的控制平面和数据平面对应的控制平面和数据平面功能这两者。VCN控制平面的示例也在图18、图19、图20和图21中描绘(参见标号1816、1916、2016和2116)并在下文中描述。VCN数据平面的示例在图18、图19、图20和图21中描绘(参见标号1818、1918、2018和2118)并在下文中描述。控制平面功能包括用于配置控制数据如何被转发的网络的功能(例如,设置路由和路由表、配置VNIC等)。在某些实施例中,提供了VCN控制平面,它集中计算所有覆盖到基板映射并将它们发布到NVD和虚拟网络边缘设备(诸如各种网关,诸如DRG、SGW、IGW等)。防火墙规则也可以使用相同的机制发布。在某些实施例中,NVD仅获得与该NVD相关的映射。数据平面功能包括基于使用控制平面设立的配置来实际路由/转发分组的功能。VCN数据平面是通过在客户的网络分组穿过基板网络之前对其进行封装来实现的。封装/解封装功能性在NVD上实现。在某些实施例中,NVD被配置为拦截进出主机机器的所有网络分组并执行网络虚拟化功能。NVD can perform both control plane and data plane functions corresponding to the control plane and data plane of VCN. Examples of VCN control planes are also depicted in Figures 18, 19, 20, and 21 (see reference numerals 1816, 1916, 2016, and 2116) and described below. Examples of VCN data planes are depicted in Figures 18, 19, 20, and 21 (see reference numerals 1818, 1918, 2018, and 2118) and described below. Control plane functions include functions for configuring a network for controlling how data is forwarded (e.g., setting routes and routing tables, configuring VNICs, etc.). In some embodiments, a VCN control plane is provided that centrally calculates all overlay-to-substrate mappings and publishes them to NVD and virtual network edge devices (such as various gateways, such as DRGs, SGWs, IGWs, etc.). Firewall rules can also be published using the same mechanism. In some embodiments, NVD only obtains mappings associated with the NVD. Data plane functions include functions for actually routing/forwarding packets based on configurations established using the control plane. The VCN data plane is implemented by encapsulating the customer's network packets before they traverse the substrate network. The encapsulation/decapsulation functionality is implemented on the NVD. In some embodiments, the NVD is configured to intercept all network packets in and out of the host machine and perform network virtualization functions.
如上面所指示的,NVD执行各种虚拟化功能,包括VNIC和VCN VR。NVD可以执行与连接到VNIC的一个或多个主机机器托管的计算实例相关联的VNIC。例如,如图2中所描绘的,NVD 210执行与由连接到NVD 210的主机机器202托管的计算实例268相关联的VNIC 276的功能性。作为另一个示例,NVD 212执行与由主机机器206托管的裸机计算实例272相关联的VNIC 280,并执行与由主机机器208托管的计算实例274相关联的VNIC 284。主机机器可以托管属于不同VCN(其属于不同客户)的计算实例,并且连接到主机机器的NVD可以执行与计算实例对应的VNIC(即,执行VNIC相关功能性)。As indicated above, NVD performs various virtualization functions, including VNIC and VCN VR. NVD can execute VNICs associated with compute instances hosted by one or more host machines connected to the VNICs. For example, as depicted in FIG. 2 , NVD 210 executes functionality of VNIC 276 associated with compute instance 268 hosted by host machine 202 connected to NVD 210. As another example, NVD 212 executes VNIC 280 associated with bare metal compute instance 272 hosted by host machine 206, and executes VNIC 284 associated with compute instance 274 hosted by host machine 208. Host machines can host compute instances belonging to different VCNs (which belong to different customers), and NVDs connected to the host machines can execute VNICs corresponding to the compute instances (i.e., perform VNIC-related functionality).
NVD还执行与计算实例的VCN对应的VCN虚拟路由器。例如,在图2中描绘的实施例中,NVD 210执行与计算实例268所属的VCN对应的VCN VR 277。NVD 212执行与由主机机器206和208托管的计算实例所属的一个或多个VCN对应的一个或多个VCN VR 283。在某些实施例中,与该VCN对应的VCN VR由连接到托管属于该VCN的至少一个计算实例的主机机器的所有NVD执行。如果主机机器托管属于不同VCN的计算实例,那么连接到该主机机器的NVD可以执行与那些不同VCN对应的VCN VR。The NVD also executes a VCN virtual router corresponding to the VCN of the compute instance. For example, in the embodiment depicted in FIG. 2 , NVD 210 executes a VCN VR 277 corresponding to the VCN to which compute instance 268 belongs. NVD 212 executes one or more VCN VRs 283 corresponding to one or more VCNs to which the compute instances hosted by host machines 206 and 208 belong. In some embodiments, the VCN VR corresponding to the VCN is executed by all NVDs connected to the host machine hosting at least one compute instance belonging to the VCN. If the host machine hosts compute instances belonging to different VCNs, then the NVDs connected to the host machine can execute VCN VRs corresponding to those different VCNs.
除了VNIC和VCN VR之外,NVD还可以执行各种软件(例如,守护进程)并且包括一个或多个硬件组件,这一个或多个硬件组件促进由NVD执行的各种网络虚拟化功能。为了简单起见,这些各种组件被分组在一起作为图2中所示的“分组处理组件”。例如,NVD 210包括分组处理组件286并且NVD 212包括分组处理组件288。例如,用于NVD的分组处理组件可以包括分组处理器,该分组处理器被配置为与NVD的端口和硬件接口交互以监视由NVD接收的和使用NVD传送的所有分组并存储网络信息。网络信息例如可以包括识别由NVD处置的不同网络流的网络流信息和每个流信息(例如,每个流统计信息)。在某些实施例中,网络流信息可以在每个VNIC的基础上来存储。分组处理器可以执行逐分组的操纵以及实现有状态的NAT和L4防火墙(FW)。作为另一个示例,分组处理组件可以包括被配置为将由NVD存储的信息复制到一个或多个不同的复制目标存储库的复制代理。作为又一个示例,分组处理组件可以包括被配置为执行NVD的日志记录功能的日志记录代理。分组处理组件还可以包括用于监视NVD的性能和健康状况并且还可能监视连接到NVD的其他组件的状态和健康状况的软件。In addition to the VNIC and VCN VR, NVD may also execute various software (e.g., daemons) and include one or more hardware components that facilitate various network virtualization functions performed by NVD. For simplicity, these various components are grouped together as a "packet processing component" shown in FIG. 2. For example, NVD 210 includes a packet processing component 286 and NVD 212 includes a packet processing component 288. For example, a packet processing component for NVD may include a packet processor configured to interact with the port and hardware interface of NVD to monitor all packets received by NVD and transmitted using NVD and store network information. Network information may, for example, include network flow information and per-flow information (e.g., per-flow statistics) that identify different network flows handled by NVD. In some embodiments, network flow information may be stored on a per-VNIC basis. The packet processor may perform packet-by-packet manipulation and implement stateful NAT and L4 firewalls (FW). As another example, the packet processing component may include a replication agent configured to copy information stored by NVD to one or more different replication target repositories. As yet another example, the packet processing component may include a logging agent configured to perform logging functions of the NVD.The packet processing component may also include software for monitoring the performance and health of the NVD and possibly also monitoring the status and health of other components connected to the NVD.
图1示出了示例虚拟或覆盖网络的组件,包括VCN、VCN内的子网、部署在子网上的计算实例、与计算实例相关联的VNIC、用于VCN的VR以及为VCN配置的一组网关。图1中描绘的覆盖组件可以由图2中描绘的物理组件中的一个或多个执行或托管。例如,VCN中的计算实例可以由图2中描绘的一个或多个主机机器执行或托管。对于由主机机器托管的计算实例,与该计算实例相关联的VNIC通常由连接到该主机机器的NVD执行(即,VNIC功能性由连接到该主机机器的NVD提供)。用于VCN的VCN VR功能由连接到托管或执行作为该VCN的一部分的计算实例的主机机器的所有NVD执行。与VCN相关联的网关可以由一种或多种不同类型的NVD执行。例如,某些网关可以由smartNIC执行,而其他网关可以由一个或多个主机机器或NVD的其他实施方式执行。FIG. 1 illustrates components of an example virtual or overlay network, including a VCN, a subnet within the VCN, a computing instance deployed on the subnet, a VNIC associated with the computing instance, a VR for the VCN, and a set of gateways configured for the VCN. The overlay components depicted in FIG. 1 may be executed or hosted by one or more of the physical components depicted in FIG. 2 . For example, a computing instance in the VCN may be executed or hosted by one or more host machines depicted in FIG. 2 . For a computing instance hosted by a host machine, a VNIC associated with the computing instance is typically executed by an NVD connected to the host machine (i.e., VNIC functionality is provided by an NVD connected to the host machine). The VCN VR functionality for the VCN is executed by all NVDs connected to a host machine that hosts or executes a computing instance as part of the VCN. Gateways associated with the VCN may be executed by one or more different types of NVDs. For example, some gateways may be executed by smartNICs, while other gateways may be executed by one or more host machines or other implementations of the NVD.
如上所述,客户VCN中的计算实例可以与各种不同的端点通信,其中端点可以与源计算实例在同一子网内、在不同子网中但与源计算实例在同一VCN内,或者端点在源计算实例的VCN外部。使用与计算实例相关联的VNIC、VCN VR以及与VCN相关联的网关来促进这些通信。As described above, a compute instance in a customer VCN can communicate with a variety of different endpoints, where the endpoint can be in the same subnet as the source compute instance, in a different subnet but in the same VCN as the source compute instance, or the endpoint is external to the source compute instance's VCN. These communications are facilitated using VNICs associated with the compute instances, VCN VRs, and gateways associated with the VCN.
对于VCN中同一子网上的两个计算实例之间的通信,使用与源和目的地计算实例相关联的VNIC促进通信。源和目的地计算实例可以由同一主机机器或不同的主机机器托管。源自于源计算实例的分组可以从托管源计算实例的主机机器转发到连接到该主机机器的NVD。在NVD上,使用分组处理管线处理分组,这可以包括与源计算实例相关联的VNIC的执行。由于分组的目的地端点位于同一子网内,因此与源计算实例相关联的VNIC的执行导致分组被转发到执行与目的地计算实例相关联的VNIC的NVD,该NVD然后处理分组并将其转发到目的地计算实例。与源和目的地计算实例相关联的VNIC可以在同一个NVD上执行(例如,当源和目的地计算实例由同一个主机机器托管时)或在不同的NVD上执行(例如,当源和目的地计算实例由连接到不同NVD的不同主机机器托管时)。VNIC可以使用由NVD存储的路由/转发表来确定分组的下一跳。For communication between two computing instances on the same subnet in a VCN, VNICs associated with the source and destination computing instances are used to facilitate communication. The source and destination computing instances can be hosted by the same host machine or different host machines. Packets originating from the source computing instance can be forwarded from the host machine hosting the source computing instance to the NVD connected to the host machine. On the NVD, packets are processed using a packet processing pipeline, which can include the execution of the VNIC associated with the source computing instance. Since the destination endpoint of the packet is located in the same subnet, the execution of the VNIC associated with the source computing instance causes the packet to be forwarded to the NVD that executes the VNIC associated with the destination computing instance, which then processes the packet and forwards it to the destination computing instance. The VNICs associated with the source and destination computing instances can be executed on the same NVD (e.g., when the source and destination computing instances are hosted by the same host machine) or on different NVDs (e.g., when the source and destination computing instances are hosted by different host machines connected to different NVDs). The VNIC can use the routing/forwarding table stored by the NVD to determine the next hop of the packet.
对于要从子网中的计算实例传送到同一VCN中不同子网中的端点的分组,源自于源计算实例的分组从托管源计算实例的主机机器传送到连接到该主机机器的NVD。在NVD上,使用分组处理管线处理分组,这可以包括一个或多个VNIC以及与VCN相关联的VR的执行。例如,作为分组处理管线的一部分,NVD执行或调用与和源计算实例相关联的VNIC对应的功能性(也称为执行VNIC)。由VNIC执行的功能性可以包括查看分组上的VLAN标签。由于分组的目的地在子网外部,因此接下来由NVD调用和执行VCN VR功能性。然后,VCN VR将分组路由到执行与目的地计算实例相关联的VNIC的NVD。与目的地计算实例相关联的VNIC然后处理分组并将分组转发到目的地计算实例。与源和目的地计算实例相关联的VNIC可以在同一个NVD上执行(例如,当源和目的地计算实例由同一个主机机器托管时)或在不同的NVD上执行(例如,当源和目的地计算实例由连接到不同NVD的不同主机机器托管时)。For packets to be transmitted from a compute instance in a subnet to an endpoint in a different subnet in the same VCN, packets originating from the source compute instance are transmitted from the host machine hosting the source compute instance to an NVD connected to the host machine. On the NVD, the packet is processed using a packet processing pipeline, which may include the execution of one or more VNICs and VRs associated with the VCN. For example, as part of the packet processing pipeline, the NVD executes or calls functionality corresponding to the VNIC associated with the source compute instance (also referred to as executing the VNIC). The functionality executed by the VNIC may include checking the VLAN tag on the packet. Since the destination of the packet is outside the subnet, the VCN VR functionality is next called and executed by the NVD. The VCN VR then routes the packet to the NVD executing the VNIC associated with the destination compute instance. The VNIC associated with the destination compute instance then processes the packet and forwards the packet to the destination compute instance. The VNICs associated with the source and destination compute instances may be executed on the same NVD (e.g., when the source and destination compute instances are hosted by the same host machine) or on different NVDs (e.g., when the source and destination compute instances are hosted by different host machines connected to different NVDs).
如果分组的目的地在源计算实例的VCN外部,那么源自于源计算实例的分组从托管源计算实例的主机机器传送到连接到该主机机器的NVD。NVD执行与源计算实例相关联的VNIC。由于分组的目的地端点在VCN外部,因此分组随后由用于该VCN的VCN VR处理。NVD调用VCN VR功能性,这可能导致分组被转发到执行与VCN相关联的适当网关的NVD。例如,如果目的地是客户的预置网络内的端点,那么分组可以由VCN VR转发到执行为VCN配置的DRG网关的NVD。VCN VR可以在与执行与源计算实例相关联的VNIC的NVD相同的NVD上执行,或者由不同的NVD执行。网关可以由NVD执行,NVD可以是smartNIC、主机机器或其他NVD实施方式。然后,分组由网关处理并转发到下一跳,该下一跳促进将分组传送到其预期的目的地端点。例如,在图2中描绘的实施例中,源自于计算实例268的分组可以通过链路220(使用NIC232)从主机机器202传送到NVD 210。在NVD 210上,调用VNIC 276,因为它是与源计算实例268相关联的VNIC。VNIC 276被配置为检查分组中封装的信息,并确定用于转发分组的下一跳,目的是促进将分组传送到其预期的目的地端点,然后将分组转发到确定的下一跳。If the destination of the packet is outside the VCN of the source compute instance, then the packet originating from the source compute instance is transmitted from the host machine hosting the source compute instance to the NVD connected to the host machine. The NVD executes the VNIC associated with the source compute instance. Since the destination endpoint of the packet is outside the VCN, the packet is then processed by the VCN VR for the VCN. The NVD calls the VCN VR functionality, which may cause the packet to be forwarded to the NVD that executes the appropriate gateway associated with the VCN. For example, if the destination is an endpoint within the customer's provisioned network, the packet can be forwarded by the VCN VR to the NVD that executes the DRG gateway configured for the VCN. The VCN VR can be executed on the same NVD as the NVD that executes the VNIC associated with the source compute instance, or by a different NVD. The gateway can be executed by the NVD, which can be a smartNIC, a host machine, or other NVD implementation. The packet is then processed by the gateway and forwarded to the next hop, which facilitates the transmission of the packet to its intended destination endpoint. 2 , a packet originating from compute instance 268 may be transmitted from host machine 202 to NVD 210 via link 220 (using NIC 232). On NVD 210, VNIC 276 is invoked because it is the VNIC associated with source compute instance 268. VNIC 276 is configured to inspect information encapsulated in the packet and determine a next hop for forwarding the packet with the intent of facilitating delivery of the packet to its intended destination endpoint, and then forward the packet to the determined next hop.
部署在VCN上的计算实例可以与各种不同端点通信。这些端点可以包括由CSPI200托管的端点和CSPI 200外部的端点。由CSPI 200托管的端点可以包括同一VCN或其他VCN中的实例,这些VCN可以是客户的VCN,或者是不属于客户的VCN。由CSPI 200托管的端点之间的通信可以通过物理网络218执行。计算实例还可以与不由CSPI 200托管或在CSPI200外部的端点通信。这些端点的示例包括客户的预置网络内的端点或数据中心,或可通过公共网络(诸如互联网)访问的公共端点。与CSPI 200外部的端点的通信可以使用各种通信协议通过公共网络(例如,互联网)(图2中未示出)或专用网络(图2中未示出)来执行。The computing instances deployed on the VCN can communicate with various different endpoints. These endpoints can include endpoints hosted by CSPI 200 and endpoints external to CSPI 200. The endpoints hosted by CSPI 200 can include instances in the same VCN or other VCNs, which can be the customer's VCNs or VCNs that do not belong to the customer. Communication between endpoints hosted by CSPI 200 can be performed over physical network 218. The computing instances can also communicate with endpoints that are not hosted by CSPI 200 or are external to CSPI 200. Examples of these endpoints include endpoints within a customer's on-premise network or data center, or public endpoints that can be accessed via a public network (such as the Internet). Communication with endpoints external to CSPI 200 can be performed over a public network (e.g., the Internet) (not shown in FIG. 2) or a private network (not shown in FIG. 2) using various communication protocols.
图2中描绘的CSPI 200的体系架构仅仅是示例并且不旨在限制。在替代实施例中,变化、替代方案和修改是可能的。例如,在一些实施方式中,CSPI 200可以具有比图2中所示的系统或组件更多或更少的系统或组件,可以组合两个或更多个系统,或者可以具有不同的系统配置或布置。图2中描绘的系统、子系统和其他组件可以在由相应系统的一个或多个处理单元(例如,处理器、核心)执行的软件(例如,代码、指令、程序)中、使用硬件或其组合实现。软件可以存储在非暂态存储介质上(例如,存储器设备上)。The architecture of CSPI 200 depicted in FIG2 is merely an example and is not intended to be limiting. In alternative embodiments, variations, alternatives, and modifications are possible. For example, in some implementations, CSPI 200 may have more or fewer systems or components than those shown in FIG2 , may combine two or more systems, or may have a different system configuration or arrangement. The systems, subsystems, and other components depicted in FIG2 may be implemented in software (e.g., code, instructions, programs) executed by one or more processing units (e.g., processors, cores) of the respective systems, using hardware, or a combination thereof. The software may be stored on a non-transitory storage medium (e.g., on a memory device).
图4描绘了根据某些实施例的主机机器和NVD之间的连接性,用于提供I/O虚拟化以支持多租赁。如图4中所描绘的,主机机器402执行提供虚拟化的环境的管理程序404。主机机器402执行两个虚拟机实例,属于客户/租户#1的VM1 406和属于客户/租户#2的VM2408。主机机器402包括经由链路414连接到NVD 412的物理NIC 410。每个计算实例都附接到由NVD 412执行的VNIC。在图4中的实施例中,VM1 406附接到VNIC-VM1 420并且VM2 408附接到VNIC-VM2422。FIG. 4 depicts connectivity between a host machine and NVD for providing I/O virtualization to support multi-tenancy in accordance with certain embodiments. As depicted in FIG. 4 , a host machine 402 executes a hypervisor 404 that provides a virtualized environment. The host machine 402 executes two virtual machine instances, VM1 406 belonging to customer/tenant #1 and VM2 408 belonging to customer/tenant #2. The host machine 402 includes a physical NIC 410 connected to NVD 412 via a link 414. Each computing instance is attached to a VNIC executed by NVD 412. In the embodiment in FIG. 4 , VM1 406 is attached to VNIC-VM1 420 and VM2 408 is attached to VNIC-VM2 422.
如图4中所示,NIC 410包括两个逻辑NIC,逻辑NIC A 416和逻辑NIC B 418。每个虚拟机附接到其自己的逻辑NIC并被配置为与其自己的逻辑NIC一起工作。例如,VM1 406附接到逻辑NIC A 416并且VM2 408附接到逻辑NIC B 418。虽然主机机器402仅包括由多个租户共享的一个物理NIC 410,但由于逻辑NIC,每个租户的虚拟机相信他们有自己的主机机机器和网卡。4, NIC 410 includes two logical NICs, logical NIC A 416 and logical NIC B 418. Each virtual machine is attached to and configured to work with its own logical NIC. For example, VM1 406 is attached to logical NIC A 416 and VM2 408 is attached to logical NIC B 418. Although host machine 402 includes only one physical NIC 410 shared by multiple tenants, each tenant's virtual machines believe they have their own host machine and network card due to the logical NICs.
在某些实施例中,每个逻辑NIC被指派其自己的VLAN ID。因此,特定的VLAN ID被指派给用于租户#1的逻辑NIC A 416,并且不同的VLAN ID被指派给用于租户#2的逻辑NICB 418。当分组从VM1 406传送时,由管理程序将指派给租户#1的标签附加到分组,然后分组通过链路414从主机机器402传送到NVD 412。以类似的方式,当分组从VM2 408被传送时,由管理程序将指派给租户#2的标签附加到分组,然后分组通过链路414从主机机器402传送到NVD 412。因而,从主机机器402传送到NVD 412的分组424具有识别特定租户和相关联的VM的相关联的标签426。在NVD上,对于从主机机器402接收到的分组424,与该分组相关联的标签426被用于确定分组是由VNIC-VM1 420还是由VNIC-VM2 422处理。分组随后由对应的VNIC处理。图4中描述的配置使得每个租户的计算实例能够相信它们拥有自己的主机机器和NIC。图4中描述的设置提供了I/O虚拟化以支持多租赁。In some embodiments, each logical NIC is assigned its own VLAN ID. Thus, a particular VLAN ID is assigned to logical NIC A 416 for tenant #1, and a different VLAN ID is assigned to logical NIC B 418 for tenant #2. When a packet is transmitted from VM1 406, a tag assigned to tenant #1 is appended to the packet by the hypervisor, and the packet is then transmitted from the host machine 402 to the NVD 412 over link 414. In a similar manner, when a packet is transmitted from VM2 408, a tag assigned to tenant #2 is appended to the packet by the hypervisor, and the packet is then transmitted from the host machine 402 to the NVD 412 over link 414. Thus, a packet 424 transmitted from the host machine 402 to the NVD 412 has an associated tag 426 that identifies the particular tenant and the associated VM. On NVD, for a packet 424 received from a host machine 402, a tag 426 associated with the packet is used to determine whether the packet is processed by VNIC-VM1 420 or VNIC-VM2 422. The packet is then processed by the corresponding VNIC. The configuration depicted in FIG4 enables each tenant's compute instance to believe that they have their own host machine and NIC. The setup depicted in FIG4 provides I/O virtualization to support multi-tenancy.
图5描绘了根据某些实施例的物理网络500的简化框图。图5中描绘的实施例被结构化为Clos网络。Clos网络是特定类型的网络拓扑,其被设计为提供连接冗余性,同时维持高对分带宽和最大资源利用率。Clos网络是一种无阻塞、多级或多层交换网络,其中级数或层数可以是二、三、四、五等。图5中描绘的实施例是3层网络,包括层1、2和3。TOR交换机504表示Clos网络中的层0交换机。一个或多个NVD连接到TOR交换机。层0交换机也称为物理网络的边缘设备。层0交换机连接到也称为叶交换机的层1交换机。在图5中描绘的实施例中,一组“n”个层0TOR交换机连接到一组“n”个层1交换机并形成群聚(pod)。群聚中的每个层0交换机都互连到该群聚中的所有层1交换机,但群聚之间没有交换机的连接性。在某些实施方式中,两个群聚称为块。每个块由一组“n”个层2交换机(有时称为主干交换机)提供服务或连接到这些交换机。物理网络拓扑中可以有几个块。层2交换机进而连接到“n”个层3交换机(有时称为超级主干交换机)。物理网络500上的分组的通信通常使用一种或多种层3通信协议来执行。通常,物理网络的所有层(TOR层除外)都是n向冗余的,因此允许高可用性。可以为群聚和块指定策略,以控制交换机在物理网络中彼此的可见性,从而启用物理网络的缩放。FIG. 5 depicts a simplified block diagram of a physical network 500 according to certain embodiments. The embodiment depicted in FIG. 5 is structured as a Clos network. A Clos network is a specific type of network topology that is designed to provide connection redundancy while maintaining high bisection bandwidth and maximum resource utilization. A Clos network is a non-blocking, multi-stage or multi-layer switching network, in which the number of stages or layers can be two, three, four, five, etc. The embodiment depicted in FIG. 5 is a 3-layer network, including layers 1, 2, and 3. A TOR switch 504 represents a layer 0 switch in a Clos network. One or more NVDs are connected to a TOR switch. A layer 0 switch is also referred to as an edge device of a physical network. A layer 0 switch is connected to a layer 1 switch, also referred to as a leaf switch. In the embodiment depicted in FIG. 5, a group of "n" layer 0 TOR switches are connected to a group of "n" layer 1 switches and form a pod. Each layer 0 switch in a pod is interconnected to all layer 1 switches in the pod, but there is no switch connectivity between pods. In some embodiments, two pods are referred to as blocks. Each block is served by or connected to a set of "n" layer 2 switches (sometimes called spine switches). There can be several blocks in the physical network topology. The layer 2 switches are in turn connected to "n" layer 3 switches (sometimes called super spine switches). Communication of packets on the physical network 500 is typically performed using one or more layer 3 communication protocols. Typically, all layers of the physical network (except the TOR layer) are n-way redundant, thus allowing high availability. Policies can be specified for clusters and blocks to control the visibility of switches to each other in the physical network, thereby enabling scaling of the physical network.
Clos网络的特征是从一个层0交换机到另一个层0交换机(或从连接到层0交换机的NVD到连接到层0交换机的另一个NVD)的最大跳数是固定的。例如,在3层Clos网络中,分组从一个NVD到达另一个NVD最多需要七跳,其中源和目标NVD连接到Clos网络的叶层。同样,在4层Clos网络中,分组从一个NVD到达另一个NVD最多需要九跳,其中源和目标NVD连接到Clos网络的叶层。因此,Clos网络体系架构在整个网络中维持一致的时延,这对于数据中心内部和数据中心之间的通信是重要的。Clos拓扑水平扩展且具有成本效益。通过在各个层添加更多交换机(例如,更多叶交换机和主干交换机)以及通过增加相邻层的交换机之间的链路数量,可以轻松增加网络的带宽/吞吐量容量。A Clos network is characterized by a fixed maximum number of hops from one layer 0 switch to another layer 0 switch (or from an NVD connected to a layer 0 switch to another NVD connected to a layer 0 switch). For example, in a 3-layer Clos network, a packet takes at most seven hops to reach from one NVD to another NVD, where the source and destination NVDs are connected to the leaf layer of the Clos network. Similarly, in a 4-layer Clos network, a packet takes at most nine hops to reach from one NVD to another NVD, where the source and destination NVDs are connected to the leaf layer of the Clos network. Therefore, the Clos network architecture maintains consistent latency throughout the network, which is important for communications within and between data centers. The Clos topology scales horizontally and is cost-effective. The bandwidth/throughput capacity of the network can be easily increased by adding more switches at various layers (e.g., more leaf switches and spine switches) and by increasing the number of links between switches in adjacent layers.
在某些实施例中,CSPI内的每个资源被指派唯一的标识符,称为云标识符(CID)。这个标识符被包括作为资源的信息的一部分并且可以被用于管理资源,例如,经由控制台或通过API。用于CID的示例语法是:In some embodiments, each resource within the CSPI is assigned a unique identifier, called a cloud identifier (CID). This identifier is included as part of the resource's information and can be used to manage the resource, for example, via the console or through an API. An example syntax for a CID is:
ocid1.<资源类型>.<领域>.[区域][.未来使用].<唯一ID>ocid1.<resource type>.<domain>.[region][.future use].<unique ID>
其中,in,
ocid1:指示CID的版本的文字串;ocid1: a text string indicating the version of the CID;
资源类型:资源的类型(例如,实例、卷、VCN、子网、用户、组等);Resource Type: The type of resource (e.g., instance, volume, VCN, subnet, user, group, etc.);
领域:资源所在的领域。示例值为用于商业领域的“c1”、用于政府云领域的“c2”或用于联邦政府云领域的“c3”等。每个领域可以有其自己的域名;Domain: The domain in which the resource resides. Example values are "c1" for the commercial domain, "c2" for the government cloud domain, or "c3" for the federal government cloud domain. Each domain can have its own domain name;
区域:资源所在的区域。如果该区域不适用于该资源,那么这个部分可能为空;Region: The region where the resource is located. This section may be empty if the region does not apply to the resource;
未来使用:保留以备将来使用。Future Use: Reserved for future use.
唯一ID:ID的唯一部分。格式可以因资源或服务的类型而异。Unique ID: The unique portion of the ID. The format can vary depending on the type of resource or service.
多云介绍Multi-cloud Introduction
图6描绘了根据某些实施例的包括由不同云服务提供商(CSP)提供的多个云环境的分布式环境600的简化高级图,其中云环境包括提供专门的基础设施的特定云环境,该基础设施使得由该特定云环境提供的一个或多个云服务能够被其他云环境的客户使用。如图6中所描绘的,各种不同的云环境(也称为“云”)可以由不同的云服务提供商(CSP)提供,每个云环境或云提供可以由该云环境的一个或多个客户订阅的一个或多个云服务。由CSP提供的云环境提供的一组云服务可以包括一个或多个不同类型的云服务,包括但不限于软件即服务(SaaS)服务、基础设施即服务(IaaS)服务、平台即服务(PaaS)服务、数据库即服务(DBaaS)服务等。由各种CSP提供的云环境的示例包括由Oracle Corporation提供的Cloud Infrastructure(OCI)、由Microsoft Corporation提供的Azure、由Google LLC提供的Google CloudTM、由Amazon Corporation提供的Amazon WebServices等。由特定云环境提供的云服务可以不同于由另一个云环境提供的一组云服务。Figure 6 depicts a simplified high-level diagram of a distributed environment 600 including multiple cloud environments provided by different cloud service providers (CSPs) according to certain embodiments, wherein the cloud environments include a specific cloud environment that provides a specialized infrastructure that enables one or more cloud services provided by the specific cloud environment to be used by customers of other cloud environments. As depicted in Figure 6, various different cloud environments (also referred to as "clouds") may be provided by different cloud service providers (CSPs), each cloud environment or cloud providing one or more cloud services that may be subscribed to by one or more customers of the cloud environment. The set of cloud services provided by the cloud environments provided by the CSPs may include one or more different types of cloud services, including, but not limited to, Software as a Service (SaaS) services, Infrastructure as a Service (IaaS) services, Platform as a Service (PaaS) services, Database as a Service (DBaaS) services, and the like. Examples of cloud environments provided by various CSPs include those provided by Oracle Corporation. Cloud Infrastructure (OCI), provided by Microsoft Corporation Azure, Google Cloud TM provided by Google LLC, Amazon Web Services provided by Amazon Corporation Etc. The cloud services provided by a particular cloud environment may be different from the set of cloud services provided by another cloud environment.
在典型的云环境中,CSP提供云服务提供商基础设施(CSPI),CSPI被用于向其客户提供由该云环境提供的一个或多个云服务。由CSP提供的CSPI可以包括各种类型的硬件和软件资源,包括计算资源、存储器资源、联网资源、用于访问云服务的控制台等。由CSP提供的云环境的客户可以订阅由该云环境提供的云服务中的一个或多个。CSP可以向其客户提供各种订阅模型。在客户订阅由云环境提供的云服务之后,一个或多个用户可以与订阅客户相关联,并且这些用户可以使用客户订阅的云服务。在某些实施方式中,当客户订阅由特定云环境提供的云服务时,将为该客户创建客户账户或客户租赁。一个或多个用户然后可以与客户租赁相关联,然后这些用户可以在客户租赁下使用客户订阅的服务。有关客户订阅的服务、与客户租赁相关联的用户等的信息通常存储在云环境内并与客户租赁相关联。In a typical cloud environment, a CSP provides a cloud service provider infrastructure (CSPI), which is used to provide one or more cloud services provided by the cloud environment to its customers. The CSPI provided by the CSP may include various types of hardware and software resources, including computing resources, memory resources, networking resources, consoles for accessing cloud services, and the like. Customers of a cloud environment provided by a CSP may subscribe to one or more of the cloud services provided by the cloud environment. The CSP may provide various subscription models to its customers. After a customer subscribes to a cloud service provided by the cloud environment, one or more users may be associated with the subscribing customer, and these users may use the cloud services subscribed by the customer. In some embodiments, when a customer subscribes to a cloud service provided by a particular cloud environment, a customer account or customer lease is created for the customer. One or more users may then be associated with the customer lease, and these users may then use the services subscribed by the customer under the customer lease. Information about services subscribed by a customer, users associated with a customer lease, and the like is typically stored within the cloud environment and associated with the customer lease.
例如,图6中描绘了由三个不同的CSP提供的三个不同的云环境。这些包括由CSP A提供的云环境A(云A)610、由CSP B提供的云环境B(云B)640以及由CSP C提供的云环境C(云C)660。云A 610包括由CSP A提供的基础设施CSPI_A 612,并且这个基础设施可以被用于提供由云A 610提供的一组服务“服务A”614。一个或多个客户(例如,客户A1 616-1、客户A2616-2)可以订阅由云A610提供的服务A 614中的一个或多个服务。一个或多个用户618-1可以与客户A1 616-1相关联,并可以使用客户A1 616-1在云A 610中订阅的服务。以类似的方式,一个或多个用户618-2可以与客户A2616-2相关联,并可以使用客户A2 616-2在云A 610中订阅的服务。在各种用例中,客户A1 616-1订阅的服务可以不同于客户A2 616-2订阅的服务。For example, three different cloud environments provided by three different CSPs are depicted in FIG6 . These include cloud environment A (Cloud A) 610 provided by CSP A, cloud environment B (Cloud B) 640 provided by CSP B, and cloud environment C (Cloud C) 660 provided by CSP C. Cloud A 610 includes infrastructure CSPI_A 612 provided by CSP A, and this infrastructure can be used to provide a set of services “Service A” 614 provided by Cloud A 610. One or more customers (e.g., Customer A1 616-1, Customer A2 616-2) can subscribe to one or more services in Service A 614 provided by Cloud A 610. One or more users 618-1 can be associated with Customer A1 616-1 and can use the services subscribed by Customer A1 616-1 in Cloud A 610. In a similar manner, one or more users 618-2 may be associated with customer A2 616-2 and may use services subscribed by customer A2 616-2 in cloud A 610. In various use cases, the services subscribed by customer A1 616-1 may be different from the services subscribed by customer A2 616-2.
如图6中所描绘的,云B 640包括由CSP B提供的基础设施CSPI_B 642,并且这个基础设施可以被用于提供由云B 640提供的一组服务“服务B”644。一个或多个客户(例如,客户B1 646-1)可以订阅服务B 644中的一个或多个服务。一个或多个用户648-1可以与客户B1 646-1相关联,并可以使用在云B 640中由客户B1 646-1订阅的服务。6 , cloud B 640 includes infrastructure CSPI_B 642 provided by CSP B, and this infrastructure can be used to provide a set of services “Service B” 644 provided by cloud B 640. One or more customers (e.g., customer B1 646-1) can subscribe to one or more services in Service B 644. One or more users 648-1 can be associated with customer B1 646-1 and can use the services subscribed by customer B1 646-1 in cloud B 640.
如图6中所描绘的,云C 660包括由CSP C提供的基础设施CSPI_C 662,并且这个基础设施可以被用于提供由云C 660提供的一组服务“服务C”664。一个或多个客户(例如,客户C1 666-1)可以订阅服务C 664中的一个或多个服务。一个或多个用户668-1可以与客户C1 666-1相关联,并可以使用在云C 660中由客户C1 666-1订阅的服务。要注意的是,服务A614、服务B 644和服务C 664可以彼此不同。6 , cloud C 660 includes infrastructure CSPI_C 662 provided by CSP C, and this infrastructure can be used to provide a set of services “Service C” 664 provided by cloud C 660. One or more customers (e.g., customer C1 666-1) can subscribe to one or more services in service C 664. One or more users 668-1 can be associated with customer C1 666-1 and can use the services subscribed by customer C1 666-1 in cloud C 660. It is noted that service A 614, service B 644, and service C 664 can be different from each other.
在现有的云实施方式中,每个云为其订阅客户和相关用户提供闭合的生态系统。因此,云环境的客户及其相关用户被限于使用该客户订阅的由云提供的服务。例如,客户B1646-1及其用户648-1被限于使用由云B 640提供的服务B 644,并且不能使用他们在云B640中的账户访问来自不同云环境的服务,诸如由云A 610提供的服务A 614中的服务或由云C 660提供的服务C 664中的服务。本文描述的教导克服了这一限制。如本公开中所描述的,描述了使得能够在两个云环境之间创建链路的各种技术,该链路使得由第一CSP提供的第一云环境提供的服务能够由第二不同CSP提供的不同的第二云环境的客户(和相关用户)使用客户在第二云环境中的账户来使用。In existing cloud implementations, each cloud provides a closed ecosystem for its subscribing customers and associated users. Therefore, customers of a cloud environment and their associated users are limited to using the services provided by the cloud to which the customer subscribes. For example, customer B1 646-1 and its user 648-1 are limited to using service B 644 provided by cloud B 640, and cannot use their account in cloud B 640 to access services from a different cloud environment, such as services in service A 614 provided by cloud A 610 or services in service C 664 provided by cloud C 660. The teachings described herein overcome this limitation. As described in the present disclosure, various techniques are described that enable the creation of a link between two cloud environments, which enables services provided by a first cloud environment provided by a first CSP to be used by customers (and associated users) of a different second cloud environment provided by a second, different CSP using the customer's account in the second cloud environment.
例如,在图6中描绘的实施例中,除了其他基础设施620之外,由CSP A提供的基础设施CSPI_A 612还包括特殊基础设施622(称为多云启用基础设施622或MEI 622或多云基础设施622),该特殊基础设施622使得由云A提供的一个或多个服务614能够由其他云(诸如云B 640和C 660)的客户和相关用户使用那些其他云中的客户账户来使用。在某些实施方式中,云B和C的客户不必在云A开设单独的账户以使用由云A 610提供的服务614中的一个或多个。云B 640的客户B1 646-1和相关用户648-1可以使用他们在云B 640中的客户账户或租赁来使用由云A 610提供的一个或多个服务614。作为另一个示例,云C 660的客户C1666-1和相关用户668-1可以使用他们在云C 660中的客户账户或租赁来使用由云A 610提供的一个或多个服务614。For example, in the embodiment depicted in FIG6 , the infrastructure CSPI_A 612 provided by CSP A includes, in addition to other infrastructure 620, special infrastructure 622 (referred to as multi-cloud enabling infrastructure 622 or MEI 622 or multi-cloud infrastructure 622) that enables one or more services 614 provided by cloud A to be used by customers and associated users of other clouds, such as clouds B 640 and C 660, using customer accounts in those other clouds. In some embodiments, customers of clouds B and C do not have to open separate accounts with cloud A to use one or more of the services 614 provided by cloud A 610. Customer B1 646-1 and associated users 648-1 of cloud B 640 can use one or more services 614 provided by cloud A 610 using their customer accounts or tenancies in cloud B 640. As another example, customer C1 666 - 1 and associated user 668 - 1 of cloud C 660 can use their customer accounts or leases in cloud C 660 to use one or more services 614 provided by cloud A 610 .
在某些实施方式中,MEI 622使得能够在云A 610与其他云之间创建链路,其中这些链路可以由其他云的客户及其相关联的用户用来访问和使用由云A 610提供的服务。这在图6中以符号形式示为在云A 610和云B 640之间创建的链路670,以及在云A 610和云C660之间创建的链路672。经由链路670,云B 640的客户可以访问或使用由云A 610提供的一个或多个服务614。同样,经由链路672,云C 660的客户可以访问或使用由云A 610提供的一个或多个服务614。In certain embodiments, MEI 622 enables the creation of links between cloud A 610 and other clouds, where these links can be used by customers of other clouds and their associated users to access and use services provided by cloud A 610. This is symbolically shown in FIG. 6 as a link 670 created between cloud A 610 and cloud B 640, and a link 672 created between cloud A 610 and cloud C 660. Via link 670, customers of cloud B 640 can access or use one or more services 614 provided by cloud A 610. Similarly, via link 672, customers of cloud C 660 can access or use one or more services 614 provided by cloud A 610.
存在可以实现MEI 612的不同方式。在某些实施例中,MEI 612可以包括使得能够与不同云建立链路的组件。例如,在图6中,MEI 622包括负责启用与云B 640的链路670的基础设施组件624,以及用于启用与云C 660的链路672的基础设施组件626。以类似的方式,MEI 622可以包括启用和促进与其他云的链路的其他组件。在一些实施例中,MEI 622的组件还可以促进与多个不同云的链路。There are different ways to implement MEI 612. In some embodiments, MEI 612 may include components that enable links to different clouds. For example, in FIG6 , MEI 622 includes an infrastructure component 624 responsible for enabling a link 670 with cloud B 640, and an infrastructure component 626 for enabling a link 672 with cloud C 660. In a similar manner, MEI 622 may include other components that enable and facilitate links with other clouds. In some embodiments, components of MEI 622 may also facilitate links with multiple different clouds.
一个云的客户可能想要或期望使用由不同云提供的云服务的原因有几个。以图6为例,云B 640的客户B1 646-1可能想要使用由云A610提供的云服务614的原因有多个。在一个用例场景中,这种情况可能发生,因为云A 610提供具有云B 640未提供的功能性的云服务。作为另一个用例场景,云A和B可以提供类似的服务,但由云A 610提供的服务可以比由云B 640提供的对应服务更好(例如,更多特征/功能性、更快等)。作为另一个用例场景,云B 640的客户B1 646-1可能想要使用由云A 610提供的云服务,因为该服务的价格比云B640提供的更便宜。在一些情况下,可以存在云B 640的客户B1 646-1可能想要使用由云A610提供的云服务地理限制或其他原因。例如,云A 610可以在云B 640未提供服务的地理区域提供期望的服务,或者云B 640未在客户要求服务的地理区域提供特定服务。还可能存在为什么一个云的客户可能想要使用由不同云提供的服务的其他几个用例场景。There are several reasons why a customer of one cloud may want or desire to use cloud services provided by a different cloud. Using FIG. 6 as an example, there are several reasons why customer B1 646-1 of cloud B 640 may want to use cloud services 614 provided by cloud A 610. In one use case scenario, this may occur because cloud A 610 provides cloud services with functionality that cloud B 640 does not provide. As another use case scenario, clouds A and B may provide similar services, but the service provided by cloud A 610 may be better (e.g., more features/functionality, faster, etc.) than the corresponding service provided by cloud B 640. As another use case scenario, customer B1 646-1 of cloud B 640 may want to use cloud services provided by cloud A 610 because the price of the service is cheaper than that provided by cloud B 640. In some cases, there may be geographic restrictions or other reasons why customer B1 646-1 of cloud B 640 may want to use cloud services provided by cloud A 610. For example, cloud A 610 may provide a desired service in a geographic area not provided by cloud B 640, or cloud B 640 may not provide a particular service in a geographic area where a customer requires service. There may be several other use case scenarios why a customer of one cloud may want to use services provided by a different cloud.
在某些实施例中,MEI 622提供能力并执行功能以在云A 610和另一个云之间创建链路,并且经由该链路,使得与另一个云的客户相关联的用户能够以无缝的方式从另一个云本身访问和使用由云A 610提供的服务。例如,MEI 622使得与云640的客户B1 646-1相关联的用户648-1能够以无缝的方式访问由云A 610提供的服务A 614中的服务。在某些实施方式中,可以提供用户648-1可以从云B 640内访问的用户界面(例如,控制台),该用户界面使得用户能够看到由云A 610提供的服务614的列表并选择用户648-1希望访问的特定服务。响应于用户选择,MEI 622负责执行在云A和B之间建立链路670的处理,以使得能够访问所请求的服务。用于设立链路670的处理基本上由MEI 622自动执行。客户B1 646-1或相关联的用户648-1不必担心执行促进在云A 610和B 640之间创建、维护和使用链路670所需的任何系统、联网或其他配置改变。在创建云之间的链路时,用户或客户没有任何负担。使用本公开中描述的技术,以快速高效的方式创建链路。In some embodiments, the MEI 622 provides the capability and performs functions to create a link between cloud A 610 and another cloud, and via the link, enables users associated with customers of another cloud to access and use services provided by cloud A 610 from the other cloud itself in a seamless manner. For example, the MEI 622 enables a user 648-1 associated with customer B1 646-1 of cloud 640 to access services in service A 614 provided by cloud A 610 in a seamless manner. In some embodiments, a user interface (e.g., a console) that the user 648-1 can access from within cloud B 640 can be provided, which enables the user to see a list of services 614 provided by cloud A 610 and select a specific service that the user 648-1 wishes to access. In response to the user selection, the MEI 622 is responsible for performing the process of establishing a link 670 between clouds A and B to enable access to the requested service. The process for setting up the link 670 is substantially automatically performed by the MEI 622. Customer B1 646-1 or associated user 648-1 does not have to worry about performing any system, networking or other configuration changes required to facilitate the creation, maintenance and use of link 670 between clouds A 610 and B 640. There is no burden on the user or customer when creating a link between clouds. Using the techniques described in this disclosure, the link is created in a fast and efficient manner.
MEI 622可以使用各种技术使链路的创建和使用对用户和客户而言是无缝式的,从而提供增强的用户体验。在某些实施方式中,MEI 622使客户B1和相关用户648-1所交互的用户界面(例如,图形用户界面GUI等)和处理流(诸如用于从云A 610请求服务和用于从云A610访问所请求的服务)与客户/用户在云B 640中将体验到的界面和处理流基本相似。以这种方式,可能习惯于云B 640的界面和处理流的客户或用户不必学习新的界面和处理流来从云A 610访问服务614。MEI 622可以为不同云环境的用户呈现不同的界面和处理流。例如,可以向来自云B 640的用户呈现与云B的用户界面和流程基本相似的第一组用户界面和流程,而向从云C 660访问云A 610的用户呈现与云C的用户界面和流程基本相似的另一组用户界面和流程。这样做是为了简化从其他云访问云A 610的服务614并因此增强用户的体验。MEI 622 can use various technologies to make the creation and use of links seamless for users and customers, thereby providing an enhanced user experience. In some embodiments, MEI 622 makes the user interface (e.g., graphical user interface GUI, etc.) and processing flow (such as for requesting services from cloud A 610 and for accessing the requested services from cloud A 610) interacted by customer B1 and related user 648-1 substantially similar to the interface and processing flow that the customer/user will experience in cloud B 640. In this way, customers or users who may be accustomed to the interface and processing flow of cloud B 640 do not have to learn new interfaces and processing flows to access services 614 from cloud A 610. MEI 622 can present different interfaces and processing flows for users of different cloud environments. For example, a first set of user interfaces and processes substantially similar to the user interface and process of cloud B can be presented to users from cloud B 640, while another set of user interfaces and processes substantially similar to the user interface and process of cloud C can be presented to users accessing cloud A 610 from cloud C 660. This is done to simplify accessing services 614 of Cloud A 610 from other clouds and thus enhance the user's experience.
作为另一个示例,每个云环境通常包括被配置为提供云环境的安全性的身份管理系统。身份管理系统被配置为保护云环境中的资源,包括由CSP提供的资源和部署在云环境中的订阅云客户的资源。由身份管理系统执行的功能包括,例如,管理与云的订阅客户和相关用户相关联的身份凭证(例如,用户名、密码等)、使用身份凭证基于为云环境配置的许可/访问策略来调控用户对云资源和服务的访问、以及其他功能。不同的云可以使用不同的身份管理系统和相关联的技术。例如,云A 610中的身份管理系统和相关联的过程可以与云B 640中的身份管理系统和相关联的过程完全不同,而云B 640中的身份管理系统和相关联的过程又可以与云C 660中的身份管理系统和相关联的过程完全不同。在某些实施方式中,虽然不同云环境之间的身份管理系统和相关联的过程存在差异,但本文描述的技术使得与第一云的客户相关联的用户能够使用与第一云中的客户和用户相关联的相同身份凭证来访问由不同云提供的云服务。As another example, each cloud environment typically includes an identity management system configured to provide security for the cloud environment. The identity management system is configured to protect resources in the cloud environment, including resources provided by the CSP and resources of subscribing cloud customers deployed in the cloud environment. Functions performed by the identity management system include, for example, managing identity credentials (e.g., usernames, passwords, etc.) associated with subscribing customers and associated users of the cloud, using identity credentials to regulate user access to cloud resources and services based on permission/access policies configured for the cloud environment, and other functions. Different clouds may use different identity management systems and associated technologies. For example, the identity management system and associated processes in cloud A 610 may be completely different from the identity management system and associated processes in cloud B 640, which in turn may be completely different from the identity management system and associated processes in cloud C 660. In some embodiments, despite differences in identity management systems and associated processes between different cloud environments, the techniques described herein enable users associated with customers of a first cloud to access cloud services provided by different clouds using the same identity credentials associated with customers and users in the first cloud.
例如,在图6中所描绘的实施例中,由CSP B提供的云B 640可以包括身份管理系统,该身份管理系统向其订阅客户和相关用户(诸如客户B1 646-1和相关用户648-1)指派或分配身份凭证。这些身份凭证与在云B 640中为客户B1 646-1创建的租赁相关联。在某些实施方式中,由云A 610提供的MEI 622使得与云B客户B1 646-1相关联的用户648-1能够使用与云B 640中的用户648-1和客户B1 646-1相关联的身份凭证来访问来自云A 610中的服务A 614中的服务。这大大增强了用户648-1的用户体验,因为他们不必仅为了访问云A 610中的服务614而创建特定于云A 610的新身份凭证。MEI 622促进了这种访问。For example, in the embodiment depicted in FIG. 6 , cloud B 640 provided by CSP B may include an identity management system that assigns or distributes identity credentials to its subscribing customers and associated users, such as customer B1 646-1 and associated user 648-1. These identity credentials are associated with a lease created for customer B1 646-1 in cloud B 640. In certain embodiments, the MEI 622 provided by cloud A 610 enables user 648-1 associated with cloud B customer B1 646-1 to access services from service A 614 in cloud A 610 using identity credentials associated with user 648-1 and customer B1 646-1 in cloud B 640. This greatly enhances the user experience for user 648-1, as they do not have to create new identity credentials specific to cloud A 610 simply to access services 614 in cloud A 610. The MEI 622 facilitates such access.
作为示例,云B 640的客户B1可以从由云A 610提供的一组服务614中选择使用服务,诸如数据库即服务(DBaaS)。响应于这种选择,MEI 622使得在云A 610和云B 640之间自动创建链路670,以使与客户B1 646-1相关联的用户648-1能够使用由云A 610提供的DBaaS服务。链路670的自动设立由MEI 622促成。在设立链路670之后,用户648-1可以经由云B640使用云A 610中的DBaaS服务。作为使用这个服务的一部分,用户648-1可以经由云B 640向云A 610发送创建数据库资源的请求。作为响应,CSPI_A 612可以在云A 610中创建所请求的数据库。在某些实施方式中,所创建的数据库可以在云A 610中为客户B1创建的虚拟网络(例如,虚拟云网络或VCN)中供应,并且用户648-1可经由云B 640访问。然后,用户648-1可以从云B 640向云A 610发送请求以使用所供应的数据库。这些请求可以包括,例如,将数据写入数据库、更新存储在数据库中的数据、删除数据库中的数据、删除数据库、创建附加的数据库等的请求。在一些用例中,这些请求可以经由云B 640源自于用户648-1或源自于由云B 640提供的服务644。以这种方式,由云A 610提供的MEI 622使得与由不同CSP提供的不同云的客户相关联的用户能够无缝地访问由云A 610提供的服务。As an example, customer B1 of cloud B 640 may select to use a service, such as database as a service (DBaaS), from a set of services 614 provided by cloud A 610. In response to this selection, MEI 622 causes a link 670 to be automatically created between cloud A 610 and cloud B 640 to enable user 648-1 associated with customer B1 646-1 to use the DBaaS service provided by cloud A 610. The automatic establishment of link 670 is facilitated by MEI 622. After link 670 is established, user 648-1 may use the DBaaS service in cloud A 610 via cloud B 640. As part of using this service, user 648-1 may send a request to create a database resource to cloud A 610 via cloud B 640. In response, CSPI_A 612 may create the requested database in cloud A 610. In some embodiments, the created database may be provisioned in a virtual network (e.g., a virtual cloud network or VCN) created for customer B1 in cloud A 610 and accessible to user 648-1 via cloud B 640. User 648-1 may then send requests from cloud B 640 to cloud A 610 to use the provisioned database. These requests may include, for example, requests to write data to the database, update data stored in the database, delete data in the database, delete a database, create an additional database, and the like. In some use cases, these requests may originate from user 648-1 via cloud B 640 or from a service 644 provided by cloud B 640. In this manner, the MEI 622 provided by cloud A 610 enables users associated with customers of different clouds provided by different CSPs to seamlessly access services provided by cloud A 610.
图6中描绘的分布式环境600仅仅是个示例,并非旨在过度限制所要求保护的实施例的范围。许多变化、替代和修改是可能的。例如,在替代实施例中,分布式环境600可以具有更多或更少的云环境。云环境还可以具有更多或更少的系统和组件,或者可以具有系统和组件的不同配置或布置。图6中描绘的系统和组件可以在由相应系统的一个或多个处理单元(例如,处理器、核心)执行的软件(例如,代码、指令、程序)中、使用硬件或其组合来实现。软件可以存储在非暂态存储介质上(例如,在存储器设备上)。The distributed environment 600 depicted in Figure 6 is merely an example and is not intended to overly limit the scope of the claimed embodiments. Many variations, substitutions, and modifications are possible. For example, in alternative embodiments, the distributed environment 600 may have more or less cloud environments. The cloud environment may also have more or less systems and components, or may have different configurations or arrangements of systems and components. The systems and components depicted in Figure 6 may be implemented in software (e.g., code, instructions, programs) executed by one or more processing units (e.g., processors, cores) of the corresponding system, using hardware or a combination thereof. The software may be stored on a non-transient storage medium (e.g., on a memory device).
多云控制平面(MCCP)Multi-Cloud Control Plane (MCCP)
图7描绘了根据一些实施例的多云控制平面(MCCP)的高级体系架构。如图7中所示,高级体系架构700包括由第一云服务提供商(例如,OCI)720提供的第一云环境和由第二云服务提供商710(即,Azure)提供的第二云环境。第一云环境720包括第一云基础设施720A,其向第一云环境720的用户提供多种服务。此外,第一云环境720包括多云基础设施720B,其供应将第一云基础设施720A(例如,Oracle云基础设施(OCI))的服务交付给其他云环境(例如,第二云基础设施710A)的用户的能力。多云基础设施720B允许用户以尽可能接近用户的原生云环境的用户体验访问其他云上的服务(例如,Oracle PaaS服务),同时提供云环境之间的简单集成。FIG7 depicts a high-level architecture of a multi-cloud control plane (MCCP) according to some embodiments. As shown in FIG7 , the high-level architecture 700 includes a first cloud environment provided by a first cloud service provider (e.g., OCI) 720 and a second cloud environment provided by a second cloud service provider 710 (i.e., Azure). The first cloud environment 720 includes a first cloud infrastructure 720A that provides a variety of services to users of the first cloud environment 720. In addition, the first cloud environment 720 includes a multi-cloud infrastructure 720B that provides the ability to deliver services of the first cloud infrastructure 720A (e.g., Oracle Cloud Infrastructure (OCI)) to users of other cloud environments (e.g., second cloud infrastructure 710A). The multi-cloud infrastructure 720B allows users to access services on other clouds (e.g., Oracle PaaS services) with a user experience as close as possible to the user's native cloud environment, while providing simple integration between cloud environments.
第二云基础设施710A包括第二云门户711、活动目录712、资源管理器713、客户订阅715、第一云提供商717的订阅。第二云门户711是第二环境710的客户可以登录并管理其云部署和实例的集中访问点。要注意的是,第二云门户可以提供用于监视和操作由第二云基础设施提供的服务的选项。活动目录712是由第二云基础设施710A提供的服务,其为管理员提供管理最终用户身份和访问特权的能力。它的服务可以包括核心目录、访问管理和身份保护。资源管理器713是第二云基础设施的部署和管理服务,即,向用户提供针对部署在客户订阅715中的资源执行操作(例如,创建、更新、删除等)的管理层。要注意的是,客户订阅也可以称为虚拟网络(VNET),客户应用在其中部署和执行。第二云基础设施710A中的第一云提供商717的订阅包括快速路由(express route)和辐条及枢纽(spoke and hub)VNET,它们供应要与第二云基础设施710A建立的网络连接(例如,从预置位置、从外部云环境)。要注意的是,此类连接可以不通过公共互联网路由,从而为用户提供更高的可靠性、更快的速度、一致的时延和更高的安全性。The second cloud infrastructure 710A includes a second cloud portal 711, an active directory 712, a resource manager 713, a customer subscription 715, and a subscription to a first cloud provider 717. The second cloud portal 711 is a centralized access point where customers of the second environment 710 can log in and manage their cloud deployments and instances. It should be noted that the second cloud portal may provide options for monitoring and operating services provided by the second cloud infrastructure. The active directory 712 is a service provided by the second cloud infrastructure 710A that provides administrators with the ability to manage end-user identities and access privileges. Its services may include core directories, access management, and identity protection. The resource manager 713 is a deployment and management service for the second cloud infrastructure, that is, it provides users with a management layer for performing operations (e.g., create, update, delete, etc.) on resources deployed in the customer subscription 715. It should be noted that a customer subscription may also be referred to as a virtual network (VNET) in which customer applications are deployed and executed. The subscription of the first cloud provider 717 in the second cloud infrastructure 710A includes express routes and spoke and hub VNETs, which provide network connections to be established with the second cloud infrastructure 710A (e.g., from a pre-set location, from an external cloud environment). It should be noted that such connections may not be routed through the public Internet, thereby providing users with higher reliability, faster speeds, consistent latency, and higher security.
第一云基础设施720A包括控制平面724、客户租赁726和多云基础设施720B。第一云基础设施720A的控制平面724是第一云环境的原生控制平面,其提供跨云环境的管理和编排。在这里设置配置基线、供应用户和角色访问以及应用驻留,从而它们可以与相关服务一起被执行。多云基础设施720B包括多云平台数据平面722和多云平台数据平面728。如前所述,多云基础设施720B供应使得其他云环境(例如,第二云环境710)的用户以尽可能接近用户的原生云环境(例如,第二云环境710)的用户体验访问由第一云环境提供的服务的功能,同时提供云环境之间的简单集成。The first cloud infrastructure 720A includes a control plane 724, a customer lease 726, and a multi-cloud infrastructure 720B. The control plane 724 of the first cloud infrastructure 720A is the native control plane of the first cloud environment, which provides management and orchestration across cloud environments. Configuration baselines are set here, user and role access is provided, and application residency is provided so that they can be executed with related services. The multi-cloud infrastructure 720B includes a multi-cloud platform data plane 722 and a multi-cloud platform data plane 728. As previously described, the multi-cloud infrastructure 720B provides functions that enable users of other cloud environments (e.g., the second cloud environment 710) to access the services provided by the first cloud environment with a user experience as close as possible to the user's native cloud environment (e.g., the second cloud environment 710), while providing simple integration between cloud environments.
图7的MCCP体系架构还包括多云控制台721(与第二云门户711不同),其允许在第二云基础设施710中被认证的用户对经由多云基础设施720B暴露的第一云基础设施720的资源执行控制平面操作。在一些实施方式中,如图7中所示,传输到多云控制台721的所有用户705请求都被定向到第一云环境中包括的多云基础设施。应认识到的是,用户705可以将针对由第一云基础设施提供的资源的请求(例如,CRUD请求)直接传输到多云控制台721。多云控制台721被配置为处理具有与第二云基础设施本地使用的语法或格式类似的语法或格式的请求。换句话说,多云控制台721具有类似的观感,以及使用与第二云基础设施710A中包括的第二云门户711类似的术语。在一些实施方式中,可以在第二云控制台711中提供将用户指引到多云控制台721的链路(例如,weblink)。The MCCP architecture of FIG. 7 also includes a multi-cloud console 721 (different from the second cloud portal 711), which allows users authenticated in the second cloud infrastructure 710 to perform control plane operations on resources of the first cloud infrastructure 720 exposed via the multi-cloud infrastructure 720B. In some embodiments, as shown in FIG. 7, all user 705 requests transmitted to the multi-cloud console 721 are directed to the multi-cloud infrastructure included in the first cloud environment. It should be recognized that the user 705 can transmit a request (e.g., a CRUD request) for resources provided by the first cloud infrastructure directly to the multi-cloud console 721. The multi-cloud console 721 is configured to process requests with a syntax or format similar to that used locally by the second cloud infrastructure. In other words, the multi-cloud console 721 has a similar look and feel, and uses terms similar to the second cloud portal 711 included in the second cloud infrastructure 710A. In some embodiments, a link (e.g., a weblink) that directs the user to the multi-cloud console 721 can be provided in the second cloud console 711.
第一云基础设施720A中所包括的多云基础设施720B包括多个微服务,诸如权限模块722A、代理模块722B、平台服务模块722C、云-链路适配器722D、适配器池722E(包括适配器1、适配器2、适配器3和适配器4)以及网络链路适配器722F。适配器池722E可以包括诸如Exa-data云服务适配器、自主数据库共享适配器、自主数据库专用适配器和虚拟机数据库适配器之类的适配器。The multi-cloud infrastructure 720B included in the first cloud infrastructure 720A includes a plurality of microservices, such as an authority module 722A, an agent module 722B, a platform service module 722C, a cloud-link adapter 722D, an adapter pool 722E (including adapter 1, adapter 2, adapter 3, and adapter 4), and a network link adapter 722F. The adapter pool 722E may include adapters such as an Exa-data cloud service adapter, an autonomous database shared adapter, an autonomous database dedicated adapter, and a virtual machine database adapter.
适配器池722E中包括的每个适配器负责向其他云环境(例如,第二云环境)的用户暴露一组唯一的底层资源(由第一云基础设施720A提供)。具体而言,适配器池722E中的每个适配器映射到由第一云基础设施720A提供的特定产品或资源。要注意的是,实际资源是由第一云基础设施的原生控制平面724创建的。例如,关于数据库即服务(DBaaS),控制平面724中包括的DBaaS控制平面被配置为实例化第一云环境的客户租赁726中的Exa数据库资源。Each adapter included in the adapter pool 722E is responsible for exposing a unique set of underlying resources (provided by the first cloud infrastructure 720A) to users of other cloud environments (e.g., the second cloud environment). Specifically, each adapter in the adapter pool 722E maps to a specific product or resource provided by the first cloud infrastructure 720A. It should be noted that the actual resources are created by the native control plane 724 of the first cloud infrastructure. For example, with respect to Database as a Service (DBaaS), the DBaaS control plane included in the control plane 724 is configured to instantiate an Exa database resource in a customer lease 726 of the first cloud environment.
由多云基础设施720B接收的传入请求由权限模块722A处理,以执行认证和访问控制。每个请求都包括与第二云基础设施中的用户的账户相关联的令牌。权限模块提取令牌并结合活动目录712(即,第二云基础设施710A的身份提供商系统)验证令牌。在验证成功后,权限模块722A可以检查与用户相关联的角色(即,一组特权)。要注意的是,角色可以与针对该角色许可的一个或多个任务/操作相关联。根据一个实施例,权限模块722A负责对MCCP的传入请求进行认证,并基于与令牌相关联的角色授权是否允许用户执行所请求的操作。在一些实施方式中,权限模块722A可以通过利用服务平台(即,与第一云基础设施相关联的SPLAT)的自定义认证特征来执行上述认证处理。SPLAT接受传入请求并将其转发到权限模块722A,权限模块722A进一步解析传入请求以确定权限决策并向SPLAT返回成功或失败消息。如果成功,SPLAT将请求传递给路由代理722B,而如果失败,SPLAT直接向调用者返回错误响应。Incoming requests received by the multi-cloud infrastructure 720B are processed by the permission module 722A to perform authentication and access control. Each request includes a token associated with the user's account in the second cloud infrastructure. The permission module extracts the token and verifies the token in conjunction with the active directory 712 (i.e., the identity provider system of the second cloud infrastructure 710A). After successful verification, the permission module 722A can check the role (i.e., a set of privileges) associated with the user. It should be noted that the role can be associated with one or more tasks/operations permitted for the role. According to one embodiment, the permission module 722A is responsible for authenticating the incoming request of the MCCP and authorizing whether the user is allowed to perform the requested operation based on the role associated with the token. In some embodiments, the permission module 722A can perform the above-mentioned authentication processing by utilizing the custom authentication features of the service platform (i.e., the SPLAT associated with the first cloud infrastructure). SPLAT accepts the incoming request and forwards it to the permission module 722A, which further parses the incoming request to determine the permission decision and returns a success or failure message to the SPLAT. If successful, SPLAT passes the request to routing agent 722B, while if unsuccessful, SPLAT returns an error response directly to the caller.
多云基础设施720B中包括的代理模块722B(也称为路由代理模块)是接收来自多云控制台721的传入请求并将该请求路由到适配器池722E中包括的特定适配器的组件。根据一个实施例,代理模块722B接受来自第一云基础设施的服务平台(即,SPLAT)的预认证的请求,并基于传入请求中包括的路径信息将请求路由到适当的适配器。在一些实施方式中,代理模块722B提取与服务提供商对应的标识符(来自传入请求)并将该请求路由到适配器池722E中的适当适配器。The proxy module 722B (also referred to as a routing proxy module) included in the multi-cloud infrastructure 720B is a component that receives an incoming request from the multi-cloud console 721 and routes the request to a specific adapter included in the adapter pool 722E. According to one embodiment, the proxy module 722B accepts a pre-authenticated request from the service platform (i.e., SPLAT) of the first cloud infrastructure and routes the request to an appropriate adapter based on the path information included in the incoming request. In some implementations, the proxy module 722B extracts an identifier corresponding to a service provider (from the incoming request) and routes the request to an appropriate adapter in the adapter pool 722E.
多云基础设施720B中包括的云-链路适配器722D负责处置由第一云基础设施提供的资源的生命周期操作。云-链路适配器722D被配置为在第二云基础设施的活动目录租户(及其相关联的订阅)与第一云基础设施中的用户的对应租赁/账户之间创建映射(或在注册处理中创建的关系)。换句话说,云-链路适配器722D生成与第一云基础设施中用户的租赁相关联的第一标识符到与第二云基础设施中用户的账户相关联的第二标识符的映射。The cloud-link adapter 722D included in the multi-cloud infrastructure 720B is responsible for handling lifecycle operations of resources provided by the first cloud infrastructure. The cloud-link adapter 722D is configured to create a mapping (or a relationship created in the registration process) between the active directory tenant (and its associated subscription) of the second cloud infrastructure and the corresponding lease/account of the user in the first cloud infrastructure. In other words, the cloud-link adapter 722D generates a mapping of a first identifier associated with the lease of the user in the first cloud infrastructure to a second identifier associated with the account of the user in the second cloud infrastructure.
在一些实施方式中,云-链路适配器722D在外部云标识符(例如,与第二云基础设施中的用户的账户相关联的第二标识符)和(与第一云基础设施中的用户的租赁相关联的)第一标识符之间执行翻译,以使得通过多云控制平面722的操作能够映射到第一云基础设施中的适当底层资源。在一些实施例中,云-链路适配器生成数据对象以存储上述映射信息。附加地,云-链路适配器722D还生成与数据对象相关联的资源主体。基于请求中包括的令牌(及其相关联的角色),为资源主体指派一个或多个许可。用户基于资源主体(resource-principal)从第二云基础设施访问由第一云基础设施提供的下游服务。云-链路适配器722D可以将数据对象和相关联的资源主体存储在第一云基础设施中用户的租赁的根隔间中。可替代地或附加地,云-链路适配器722D还可以将数据对象和资源主体本地保存在多云基础设施的平台服务模块722C上,以便多云基础设施中包括的其他适配器无缝访问。In some embodiments, the cloud-link adapter 722D performs translation between an external cloud identifier (e.g., a second identifier associated with an account of a user in the second cloud infrastructure) and a first identifier (associated with a tenancy of a user in the first cloud infrastructure) so that operations through the multi-cloud control plane 722 can be mapped to appropriate underlying resources in the first cloud infrastructure. In some embodiments, the cloud-link adapter generates a data object to store the above-mentioned mapping information. Additionally, the cloud-link adapter 722D also generates a resource principal associated with the data object. Based on the token (and its associated role) included in the request, one or more permissions are assigned to the resource principal. The user accesses downstream services provided by the first cloud infrastructure from the second cloud infrastructure based on the resource principal. The cloud-link adapter 722D can store the data object and the associated resource principal in the root compartment of the tenancy of the user in the first cloud infrastructure. Alternatively or additionally, the cloud-link adapter 722D can also store the data object and the resource principal locally on the platform service module 722C of the multi-cloud infrastructure so that other adapters included in the multi-cloud infrastructure can access it seamlessly.
网络链路模块(也称为网络适配器)722F负责在客户订阅715(在第二云基础设施中)和对应的客户租赁/账户(在第一云基础设施中)726之间创建网络链路。根据一些实施例,网络链路模块722F获得令牌(来自平台服务模块722C)并创建(1)多云平台数据平面728与客户租赁726之间的第一对等化关系(在第一云环境中),以及(2)客户订阅715与第二云基础设施中包括的第一云服务提供商717的订阅之间的第二对等化关系(在第二云环境中)。The network link module (also referred to as a network adapter) 722F is responsible for creating a network link between a customer subscription 715 (in the second cloud infrastructure) and a corresponding customer lease/account (in the first cloud infrastructure) 726. According to some embodiments, the network link module 722F obtains a token (from the platform services module 722C) and creates (1) a first peering relationship between the multi-cloud platform data plane 728 and the customer lease 726 (in the first cloud environment), and (2) a second peering relationship between the customer subscription 715 and a subscription of a first cloud service provider 717 included in the second cloud infrastructure (in the second cloud environment).
网络链路模块722F还被配置为在第一云环境与第二云环境之间建立网络连接性,即,网络链路模块722F可以配置互连719以通信地耦合两个云环境。应认识到的是,在两个云环境之间形成网络链路后,在客户的订阅中(例如,在第二云基础设施的VNET中)执行的应用能够访问资源,例如,部署在第一云基础设施的客户租赁726中的Exa数据库资源。另外,如图7中所示,在租赁726内,提供遥测的功能性。这种功能性涉及维护与部署在客户租赁中的资源及其相应使用情况相关的日志、度量和其他性能参数。根据一些实施例,MCCP产生与第一云环境中的不同资源相关联的日志和度量的镜像,并例如在仪表板中(例如,在第二云环境的客户订阅715中包括的应用洞察模块中)发布度量、日志、事件等以供进一步处理。The network link module 722F is also configured to establish network connectivity between the first cloud environment and the second cloud environment, that is, the network link module 722F can configure the interconnect 719 to communicatively couple the two cloud environments. It should be appreciated that after the network link is formed between the two cloud environments, applications executed in the customer's subscription (e.g., in the VNET of the second cloud infrastructure) are able to access resources, such as Exa database resources deployed in the customer's lease 726 of the first cloud infrastructure. In addition, as shown in Figure 7, within the lease 726, telemetry functionality is provided. This functionality involves maintaining logs, metrics, and other performance parameters related to the resources deployed in the customer's lease and their corresponding usage. According to some embodiments, the MCCP generates a mirror of the logs and metrics associated with different resources in the first cloud environment, and publishes the metrics, logs, events, etc., for further processing, for example, in a dashboard (e.g., in an application insight module included in the customer subscription 715 of the second cloud environment).
在一些实施例中,多云基础设施中包括的平台服务模块722C被配置为存储与提供给第二云基础设施的第一云基础设施的服务相关联的凭证。平台服务模块722C为适配器池722E中包括的不同适配器提供例如令牌/资源主体,使得适配器可以与第一云基础设施的原生控制平面724通信。通过一些实施例,平台服务模块722C暴露由不同适配器调用的API以执行任务,诸如:In some embodiments, a platform service module 722C included in the multi-cloud infrastructure is configured to store credentials associated with services provided to a first cloud infrastructure provided to a second cloud infrastructure. The platform service module 722C provides, for example, tokens/resource principals to different adapters included in the adapter pool 722E so that the adapters can communicate with the native control plane 724 of the first cloud infrastructure. By some embodiments, the platform service module 722C exposes APIs called by different adapters to perform tasks, such as:
·向适配器出售最小范围的访问令牌(由第二云基础设施颁发)。例如,网络适配器722F要求访问令牌执行上述网络对等化操作。• Sell the adapter a minimum scoped access token (issued by the second cloud infrastructure). For example, the network adapter 722F requires an access token to perform the above-mentioned network peering operations.
·提供资源主体,适配器将使用该资源主体来调用下游服务以在第一云基础设施的客户租赁中创建资源。Provide a resource principal that the adapter will use to call a downstream service to create a resource in the customer tenancy of the first cloud infrastructure.
·触发从第一云基础设施到第二云基础设施的可观察性数据(日志、度量、事件)的复制。Trigger the replication of observability data (logs, metrics, events) from a first cloud infrastructure to a second cloud infrastructure.
如前所述,适配器池包括多个适配器,每个适配器负责向第二云基础设施的用户暴露第一云基础设施的一组唯一底层资源,即,每个适配器映射到由第一云环境提供的特定产品或资源。例如,Exa数据库适配器充当第二云基础设施用户创建和利用Exa数据库资源的代理。Exa数据库是硬件和软件的预配置组合,其提供用于执行数据库的基础设施。根据一些实施例,Exa数据库包括一组资源:(a)Exadata基础设施(即,硬件)、(b)VM云集群、(c)容器数据库和(d)可插拔数据库。根据一些实施例,多云基础设施提供了(第二云基础设施的用户)分析堆叠的基础设施的每个级别的能力。而且,MCCP为用户提供了灵活性,用户只需发出对于工作流的创建命令(经由多云控制台721),之后MCCP在堆栈的每个级别自动创建单个资源。应认识到的是,虽然图7中所描绘的适配器池722F包括四个不同的适配器,但这绝不限制MCCP体系架构700的范围。MCCP体系架构可以包括其他适配器,例如,基于云服务提供商的要求专供特定云服务提供商使用的专用适配器。As previously described, the adapter pool includes multiple adapters, each of which is responsible for exposing a unique set of underlying resources of the first cloud infrastructure to the user of the second cloud infrastructure, that is, each adapter maps to a specific product or resource provided by the first cloud environment. For example, the Exa database adapter acts as an agent for the second cloud infrastructure user to create and utilize Exa database resources. Exa database is a preconfigured combination of hardware and software that provides an infrastructure for executing a database. According to some embodiments, Exa database includes a set of resources: (a) Exadata infrastructure (i.e., hardware), (b) VM cloud cluster, (c) container database, and (d) pluggable database. According to some embodiments, the multi-cloud infrastructure provides (users of the second cloud infrastructure) the ability to analyze each level of the stacked infrastructure. Moreover, MCCP provides users with the flexibility of only issuing a create command for the workflow (via the multi-cloud console 721), after which MCCP automatically creates a single resource at each level of the stack. It should be recognized that although the adapter pool 722F depicted in Figure 7 includes four different adapters, this in no way limits the scope of the MCCP architecture 700. The MCCP architecture may include other adapters, such as specialized adapters designed for use with specific cloud service providers based on the requirements of the cloud service provider.
图8A和图8B描绘了根据一些实施例的用于链接不同云环境中的两个用户账户的示例性流程图。这两个用户账户可以对应于第一云基础设施中的第一用户账户(例如,租赁)和第二云基础设施中的第二用户账户。图8A描绘了链接两个用户账户的处理,其中用户的租赁首先在第一云基础设施中创建,然后链接到第二云基础设施中的用户的账户。图8B描绘了链接两个用户账户的处理,其中用户的租赁在第一云基础设施中已经创建,即,租赁已经存在。Figures 8A and 8B depict exemplary flow diagrams for linking two user accounts in different cloud environments according to some embodiments. The two user accounts may correspond to a first user account (e.g., a lease) in a first cloud infrastructure and a second user account in a second cloud infrastructure. Figure 8A depicts a process for linking two user accounts, where the user's lease is first created in the first cloud infrastructure and then linked to the user's account in the second cloud infrastructure. Figure 8B depicts a process for linking two user accounts, where the user's lease has already been created in the first cloud infrastructure, i.e., the lease already exists.
图8A描绘了当表示客户的用户(诸如系统管理员)从第二云基础设施向(第一云基础设施中包括的)多云基础设施发出调用以注册第一云基础设施中提供的服务时执行的数据流。可以为第二云基础设施的用户提供特殊控制台(本文中称为多云控制台)以在第一云基础设施内开设账户并将第一云基础设施中的用户的账户链接到第二云基础设施中的用户的账户。要注意的是,链接第一和第二云基础设施中的账户使得用户能够(从第二云基础设施)利用由第一云基础设施提供的一个或多个服务。在某些实施方式中,用户使用多云控制台注册服务。响应于该注册,可以向用户发送使得用户能够登录多云控制台的URL。多云控制台暴露与第二云基础设施的UI和API类似的UI和API。8A depicts the data flow performed when a user (such as a system administrator) representing a customer makes a call from the second cloud infrastructure to the multi-cloud infrastructure (included in the first cloud infrastructure) to register a service provided in the first cloud infrastructure. A special console (referred to herein as the multi-cloud console) can be provided for users of the second cloud infrastructure to open an account within the first cloud infrastructure and link the user's account in the first cloud infrastructure to the user's account in the second cloud infrastructure. It should be noted that linking the accounts in the first and second cloud infrastructures enables the user to utilize one or more services provided by the first cloud infrastructure (from the second cloud infrastructure). In some embodiments, the user registers for the service using the multi-cloud console. In response to the registration, a URL that enables the user to log in to the multi-cloud console can be sent to the user. The multi-cloud console exposes a UI and API similar to the UI and API of the second cloud infrastructure.
多云控制台可以提供各种UI(例如,GUI),这些UI提供用户可选择的选项,使得第二云基础设施的用户能够在第一云基础设施中开设账户并进一步链接第一和第二云基础设施中的用户账户。例如,多云控制台可以提供注册UI,该注册UI使得用户能够在第一云基础设施中创建账户/租赁并将用户(在第一云基础设施中)的账户链接到用户在第二云基础设施中的账户。一旦响应于注册/链接请求而触发的处理完成,用户在相应云基础设施中的账户就链接在一起。作为处理的一部分,多云控制台使得用户(例如,系统管理员)能够登录第二云基础设施,并请求:(a)创建用户的账户(在第一云基础设施中)并链接用户的账户;或者(b)对于用户已在第一云基础设施中拥有的账户,请求将用户的第一云基础设施账户链接到用户的第二云基础设施账户。The multi-cloud console may provide various UIs (e.g., GUIs) that provide user-selectable options that enable a user of the second cloud infrastructure to open an account in the first cloud infrastructure and further link the user's account in the first and second cloud infrastructures. For example, the multi-cloud console may provide a registration UI that enables a user to create an account/lease in the first cloud infrastructure and link the user's account (in the first cloud infrastructure) to the user's account in the second cloud infrastructure. Once the processing triggered in response to the registration/linking request is completed, the user's accounts in the respective cloud infrastructures are linked together. As part of the processing, the multi-cloud console enables a user (e.g., a system administrator) to log into the second cloud infrastructure and request: (a) to create an account for the user (in the first cloud infrastructure) and link the user's account; or (b) for an account that the user already has in the first cloud infrastructure, request to link the user's first cloud infrastructure account to the user's second cloud infrastructure account.
因而,在某些用例中,存在两种可能性:(a)用户已在第一云基础设施中拥有现有账户或租赁,并且现在经由多云控制台注册UI,用户请求在用户的账户之间创建链路(有关这个处理的细节将在下面参考图8B进行描述),或(b)用户请求既在第一云基础设施中创建新账户,又将新创建的账户与用户在第二云基础设施中的账户进行链接。有关这个处理的细节将在下面参考图8A进行描述。应认识到的是,账户的链接使得用户能够经由第二云使用第一云中的资源。例如,经由第二云,用户可以请求在第一云中创建或供应资源,利用和管理第一云中的资源,删除第一云中的资源等。Thus, in certain use cases, there are two possibilities: (a) the user already has an existing account or lease in the first cloud infrastructure, and now, via the multi-cloud console registration UI, the user requests to create a link between the user's accounts (details of this process will be described below with reference to FIG. 8B ), or (b) the user requests to both create a new account in the first cloud infrastructure and link the newly created account with the user's account in the second cloud infrastructure. Details of this process will be described below with reference to FIG. 8A . It should be appreciated that the linking of accounts enables the user to use resources in the first cloud via the second cloud. For example, via the second cloud, the user can request to create or provision resources in the first cloud, utilize and manage resources in the first cloud, delete resources in the first cloud, etc.
如图8A中所示,在步骤1中,响应于用户提供给多云控制台(例如,多云控制台的注册UI)的请求在第一云基础设施中为用户创建新账户并将其链接到第二云基础设施中的用户账户的输入,多云控制台调用(在第一云基础设施中的)账户服务以创建新账户。要注意的是,该调用包括由第二云基础设施生成的令牌。由第二云基础设施生成并包括在对账户服务的调用中的令牌使得在第一云基础设施中创建的账户或租赁能够链接到第二云基础设施中用户的账户。As shown in FIG8A , in step 1 , in response to input provided by a user to a multi-cloud console (e.g., a registration UI of the multi-cloud console) requesting the creation of a new account for a user in a first cloud infrastructure and linking it to a user account in a second cloud infrastructure, the multi-cloud console calls an account service (in the first cloud infrastructure) to create the new account. Note that the call includes a token generated by the second cloud infrastructure. The token generated by the second cloud infrastructure and included in the call to the account service enables the account or tenancy created in the first cloud infrastructure to be linked to the user's account in the second cloud infrastructure.
在步骤2,作为为用户设立新账户的处理的一部分,账户服务可以调用多云控制平面中包括的权限/代理模块(例如,图7的多云基础设施中包括的权限模块722A)来验证令牌。权限/代理模块验证令牌(如前面参考图7所述)并且只有在成功验证令牌之后才能继续进一步的处理。在成功验证令牌后,账户服务在第一云基础设施中为用户创建新账户。作为创建新账户的一部分,可以创建原生用户并将其与新创建的账户相关联。但是,注意的是,不使用这个原生用户的凭证。更确切地说,第二云基础设施中用户的身份被用于管理第一云基础设施中的账户及其(来自第二云基础设施的)资源。In step 2, as part of the process of setting up a new account for the user, the account service may call an authority/proxy module included in the multi-cloud control plane (e.g., authority module 722A included in the multi-cloud infrastructure of FIG. 7 ) to verify the token. The authority/proxy module verifies the token (as described above with reference to FIG. 7 ) and can only continue further processing after successfully verifying the token. After successfully verifying the token, the account service creates a new account for the user in the first cloud infrastructure. As part of creating the new account, a native user may be created and associated with the newly created account. However, it is noted that the credentials of this native user are not used. Rather, the identity of the user in the second cloud infrastructure is used to manage the account and its resources (from the second cloud infrastructure) in the first cloud infrastructure.
在第一云基础设施中的账户服务成功创建新账户之后,在步骤3,账户服务调用(多云基础设施中包括的)云-链路适配器以在第二云基础设施中用户的账户与第一云基础设施中新创建的账户之间创建链路(也称为云-链路)。在某些实施方式中,云-链路适配器向账户服务和多云控制台暴露API。这些API可以由账户服务(或由多云控制台)调用以请求账户的链接。要注意的是,在一些实施方式中,步骤3的调用中不包括令牌,因为请求链接的调用不是由用户发出的,而是由账户服务指示的。在这种情况下,云-链路适配器不执行要求另一个令牌的另一个认证,因为它依赖于作为使用在步骤1中接收到的令牌设立账户的处理的一部分,账户服务已经针对用户执行了必要的认证。After the account service in the first cloud infrastructure successfully creates the new account, in step 3, the account service calls the cloud-link adapter (included in the multi-cloud infrastructure) to create a link (also referred to as a cloud-link) between the user's account in the second cloud infrastructure and the newly created account in the first cloud infrastructure. In some embodiments, the cloud-link adapter exposes APIs to the account service and the multi-cloud console. These APIs can be called by the account service (or by the multi-cloud console) to request the linking of the account. Note that in some embodiments, a token is not included in the call of step 3 because the call to request the linking is not made by the user, but rather instructed by the account service. In this case, the cloud-link adapter does not perform another authentication requiring another token because it relies on the account service having already performed the necessary authentication for the user as part of the process of setting up the account using the token received in step 1.
在一些实施方式中,步骤3中由云-链路适配器执行的链接两个账户的处理包括:In some embodiments, the process of linking the two accounts performed by the cloud-link adapter in step 3 includes:
(a)云-链路适配器创建数据对象(本文中也称为云-链路资源对象,用于存储识别所链接的两个账户的元数据信息)。例如,数据对象存储元数据信息,其包括与在第一云基础设施中创建的租赁(即,账户)相关联的第一标识符和与针对第二云服务提供商的用户账户相关联的第二标识符的映射。(a) The cloud-link adapter creates a data object (also referred to herein as a cloud-link resource object, which is used to store metadata information identifying the two accounts being linked.) For example, the data object stores metadata information including a mapping of a first identifier associated with a tenancy (i.e., an account) created in a first cloud infrastructure and a second identifier associated with a user account for a second cloud service provider.
(b)云-链路适配器创建新的隔间,用于存储和包含用户可以/将使用多云控制台管理的第一云基础设施侧的资源。在一些实施方式中,云-链路资源对象是在客户在第一云基础设施中的账户的根目录下创建的。(b) The cloud-link adapter creates a new compartment for storing and containing resources on the first cloud infrastructure side that the user can/will manage using the multi-cloud console. In some embodiments, the cloud-link resource object is created in the root directory of the customer's account in the first cloud infrastructure.
(c)云-链路适配器为第二云基础设施的用户期望使用的资源创建新的资源主体(在本文称为云链路资源主体)。(c) The cloud-link adapter creates a new resource principal (referred to herein as a cloud-link resource principal) for the resource that the user of the second cloud infrastructure desires to use.
(d)云-链路适配器可以执行促进将第一云基础设施中的域链接到活动目录(例如,如图7中所示的第二云基础设施的活动目录712)的一个或多个联合设立。联合第一云基础设施和第二云基础设施的账户的处理允许第二云基础设施中的用户/用户组在第一云基础设施中进行认证,并且允许来自第一云基础设施的用户/组在第二云基础设施中进行认证。(d) The cloud-link adapter may perform one or more federation setups that facilitate linking a domain in the first cloud infrastructure to an active directory (e.g., active directory 712 of the second cloud infrastructure as shown in FIG7 ). The process of federating accounts of the first cloud infrastructure and the second cloud infrastructure allows users/user groups in the second cloud infrastructure to authenticate in the first cloud infrastructure, and allows users/user groups from the first cloud infrastructure to authenticate in the second cloud infrastructure.
在某些实施方式中,基于用户在第二云基础设施的账户中的凭证/令牌,许可与云-链路资源主体相关联。当用户使用多云控制台请求新账户或请求将第一云基础设施中用户的账户链接到第二云基础设施中用户的账户时,用户提供设立资源主体的同意。另外,如步骤4中所示,云-链路资源主体被传输到下游服务,以使得用户能够利用来自第二云基础设施的(一个或多个)下游服务(例如,由第一云基础设施提供的一个或多个服务)。In some embodiments, based on the user's credentials/token in the account of the second cloud infrastructure, the permission is associated with the cloud-link resource principal. When the user uses the multi-cloud console to request a new account or request to link the user's account in the first cloud infrastructure to the user's account in the second cloud infrastructure, the user provides consent to establish the resource principal. In addition, as shown in step 4, the cloud-link resource principal is transmitted to the downstream service to enable the user to utilize the downstream service(s) from the second cloud infrastructure (e.g., one or more services provided by the first cloud infrastructure).
转到图8B,描绘了与将第一云基础设施中的现有账户或租赁链接到第二云基础设施中的用户的账户相关的处理。如图8B中所示,用户经由多云控制台提供的注册UI请求链接第一云基础设施和第二云基础设施中用户的账户。作为响应,在步骤1中,多云控制台调用云-链路适配器以链接账户。可以使用由云-链路适配器向注册UI暴露的API之一进行这种调用。在某些实施方式中,在步骤1中传递给云-链路适配器的信息包括识别第二云基础设施中的用户账户以及第一云基础设施中的用户账户的信息、由第二云基础设施颁发的令牌等。Turning to FIG. 8B , a process related to linking an existing account or lease in a first cloud infrastructure to a user's account in a second cloud infrastructure is depicted. As shown in FIG. 8B , a user requests to link the user's account in the first cloud infrastructure and the second cloud infrastructure via a registration UI provided by the multi-cloud console. In response, in step 1 , the multi-cloud console calls a cloud-link adapter to link the account. This call can be made using one of the APIs exposed by the cloud-link adapter to the registration UI. In some embodiments, the information passed to the cloud-link adapter in step 1 includes information identifying the user account in the second cloud infrastructure and the user account in the first cloud infrastructure, a token issued by the second cloud infrastructure, and the like.
在步骤2,云-链路适配器调用多云基础设施中包括的权限/代理模块来认证在步骤1中接收到的令牌。作为这个认证的一部分,权限/代理模块确定发出请求的用户是否在第二云基础设施侧具有足够的权限来发出链路请求。作为验证的一部分,可以检查在第二云基础设施侧设置的角色和许可。响应于用户被成功验证,云-链路适配器从先前为用户创建的数据对象中检索与用户期望使用的资源相关联的资源主体。另外,如步骤3中所示,将云链路资源主体传输到下游服务,以使得用户能够利用来自第二云基础设施的(一个或多个)下游服务(例如,由第一云基础设施提供的一个或多个服务)。In step 2, the cloud-link adapter calls a permission/proxy module included in the multi-cloud infrastructure to authenticate the token received in step 1. As part of this authentication, the permission/proxy module determines whether the user making the request has sufficient permissions on the second cloud infrastructure side to make the link request. As part of the verification, the roles and permissions set on the second cloud infrastructure side can be checked. In response to the user being successfully authenticated, the cloud-link adapter retrieves the resource subject associated with the resource that the user desires to use from the data object previously created for the user. In addition, as shown in step 3, the cloud link resource subject is transmitted to the downstream service to enable the user to utilize (one or more) downstream services from the second cloud infrastructure (e.g., one or more services provided by the first cloud infrastructure).
图9描绘了图示根据一些实施例的多云控制平面(MCCP)的组件的示例性系统图。MCCP 900包括服务平台(SPLAT)910、路由代理915、云-链路适配器920、数据库适配器925、网络适配器930和MCCP平台935。在用户成功完成如上文参考图8A和图8B所述的注册处理后,用户可以利用多云控制台905发出访问、创建或更新第一云基础设施中用户的租赁中的资源的命令。为了便于说明,在下文中,描述了用户利用多云控制台发出创建Exa数据库资源的请求的场景。FIG9 depicts an exemplary system diagram illustrating components of a multi-cloud control plane (MCCP) according to some embodiments. MCCP 900 includes a service platform (SPLAT) 910, a routing agent 915, a cloud-link adapter 920, a database adapter 925, a network adapter 930, and an MCCP platform 935. After a user successfully completes the registration process as described above with reference to FIG8A and FIG8B, the user can use the multi-cloud console 905 to issue a command to access, create, or update resources in the user's tenancy in the first cloud infrastructure. For ease of explanation, hereinafter, a scenario is described in which a user uses the multi-cloud console to issue a request to create an Exa database resource.
在一些实施方式中,用户访问多云控制台905并提供登录信息,例如,用户在第二云基础设施中的凭证。多云控制台905提供多个选项,例如,创建资源、访问资源、更新资源等。此类选项可以以多云控制台905中的可选择的图标(例如,按钮)的形式提供给用户。当用户执行选择(例如,创建资源)后,触发对服务平台910的API调用。应认识到的是,对服务平台910发出的请求不是针对第一云基础设施的原生调用。更确切地说,该调用是包括授权报头的REST类型调用,该授权报头包括与第二云基础设施中的用户相关联的令牌。In some embodiments, a user accesses the multi-cloud console 905 and provides login information, such as the user's credentials in the second cloud infrastructure. The multi-cloud console 905 provides multiple options, such as creating resources, accessing resources, updating resources, etc. Such options can be provided to the user in the form of selectable icons (e.g., buttons) in the multi-cloud console 905. When the user performs a selection (e.g., creating a resource), an API call to the service platform 910 is triggered. It should be recognized that the request issued to the service platform 910 is not a native call to the first cloud infrastructure. More specifically, the call is a REST type call including an authorization header that includes a token associated with the user in the second cloud infrastructure.
包括令牌的REST调用进一步被转发到执行认证和访问控制操作的路由代理模块915。根据一些实施例,路由代理模块915通过提取REST调用中包括的令牌来执行认证操作。路由代理模块915通过将签名(用于对请求进行签名)与第二云基础设施的公开可用的签名进行比较来验证令牌,以确保请求源自于与第二云基础设施相关联的有效客户。附加地,路由代理模块915还可以检查与令牌相关联的角色(即,特权),例如,该角色是否与ExadataDB管理员等对应。基于角色,路由代理模块915可以将请求路由到MCCP框架900中包括的适当适配器。The REST call including the token is further forwarded to the routing proxy module 915 which performs authentication and access control operations. According to some embodiments, the routing proxy module 915 performs authentication operations by extracting the token included in the REST call. The routing proxy module 915 verifies the token by comparing the signature (used to sign the request) with the publicly available signature of the second cloud infrastructure to ensure that the request originates from a valid customer associated with the second cloud infrastructure. Additionally, the routing proxy module 915 may also check the role (i.e., privilege) associated with the token, for example, whether the role corresponds to an ExadataDB administrator, etc. Based on the role, the routing proxy module 915 may route the request to the appropriate adapter included in the MCCP framework 900.
根据一个实施例,路由代理模块915将(与令牌相关联的)角色与为每个适配器发布和指派(作为API规范的一部分)的预配置角色列表进行比较。例如,如果与令牌相关联的角色与“Exadata DB管理员”对应,那么可以将请求理解为创建Exa数据库的请求,因此将请求转发到数据库适配器925。此外,根据一些实施例,路由代理模块915可以分析REST调用中包括的信息,诸如提供商ID、所请求的资源类型等,并且基于所分析的信息,路由代理模块915可以将请求转发到适当的适配器。According to one embodiment, the routing proxy module 915 compares the role (associated with the token) to a list of preconfigured roles published and assigned (as part of the API specification) for each adapter. For example, if the role associated with the token corresponds to "Exadata DB Administrator", then the request can be understood as a request to create an Exa database, and the request is therefore forwarded to the database adapter 925. In addition, according to some embodiments, the routing proxy module 915 can analyze the information included in the REST call, such as the provider ID, the requested resource type, etc., and based on the analyzed information, the routing proxy module 915 can forward the request to the appropriate adapter.
在一些实施方式中,由路由代理模块915获得的请求可以不包括识别在将要部署资源的第一云基础设施中的用户租赁的信息。因此,路由代理模块915与云-链路适配器920通信以获得第二云基础设施中的用户账户到第一云基础设施中的用户租赁的映射信息。如果映射信息存在,那么路由代理模块915获取与第一云基础设施中的用户租赁相关的信息并将该信息传递给数据库适配器925。以这种方式,数据库适配器925知道在将要创建/部署资源的第一云基础设施中的用户租赁。但是,如果云-链路适配器920确定不存在映射信息,那么路由代理模块915可以简单地发出“未授权访问”消息作为对创建数据库资源的请求的响应,该消息被传输回用户。In some embodiments, the request obtained by the routing agent module 915 may not include information identifying the user's tenancy in the first cloud infrastructure where the resource is to be deployed. Therefore, the routing agent module 915 communicates with the cloud-link adapter 920 to obtain mapping information of the user account in the second cloud infrastructure to the user's tenancy in the first cloud infrastructure. If the mapping information exists, the routing agent module 915 obtains information related to the user's tenancy in the first cloud infrastructure and passes the information to the database adapter 925. In this way, the database adapter 925 is aware of the user's tenancy in the first cloud infrastructure where the resource is to be created/deployed. However, if the cloud-link adapter 920 determines that the mapping information does not exist, the routing agent module 915 can simply issue an "unauthorized access" message as a response to the request to create the database resource, which is transmitted back to the user.
要注意的是,在一些实施方式中,云-链路适配器920创建数据对象(本文中称为云链路资源对象)用于存储识别所链接的两个账户的元数据信息。例如,数据对象存储元数据信息,包括与第一云基础设施中的租赁(即,账户)相关联的第一标识符与和第二云服务提供商的用户的账户相关联的第二标识符的映射。此外,云-链路适配器920还为第二云基础设施的用户期望创建/管理的资源(例如,数据库)创建资源主体(本文中称为云链路资源主体)。云-链路适配器920可以在第一云基础设施中的用户租赁的根隔间内维护数据对象以及资源主体。在一些实施例中,云-链路适配器920还可以在MCCP平台935中本地保存数据对象和/或资源主体。It should be noted that in some embodiments, the cloud-link adapter 920 creates a data object (referred to herein as a cloud link resource object) for storing metadata information identifying the two linked accounts. For example, the data object stores metadata information including a mapping of a first identifier associated with a lease (i.e., an account) in the first cloud infrastructure and a second identifier associated with an account of a user of the second cloud service provider. In addition, the cloud-link adapter 920 also creates a resource principal (referred to herein as a cloud link resource principal) for a resource (e.g., a database) that a user of the second cloud infrastructure desires to create/manage. The cloud-link adapter 920 can maintain the data object as well as the resource principal within the root compartment of the user's lease in the first cloud infrastructure. In some embodiments, the cloud-link adapter 920 can also locally store the data object and/or resource principal in the MCCP platform 935.
在一些实施例中,数据库适配器925可以(指示或)与网络适配器930通信以创建第二云基础设施中的用户账户与第一云基础设施中的用户租赁之间的网络链路。例如,网络适配器930可以从第二云基础设施模块中的原生服务945获得与用户相关联的令牌并创建:(1)MCCP的数据平面与第一云基础设施中用户的租赁之间的第一对等化关系(在第一云环境中),以及(2)用户的账户与第二云基础设施中包括的第一云提供商的订阅之间的第二对等化关系(在第二云环境中)。In some embodiments, the database adapter 925 may (instruct or) communicate with the network adapter 930 to create a network link between the user account in the second cloud infrastructure and the user's tenancy in the first cloud infrastructure. For example, the network adapter 930 may obtain a token associated with the user from the native service 945 in the second cloud infrastructure module and create: (1) a first peering relationship between the data plane of the MCCP and the user's tenancy in the first cloud infrastructure (in the first cloud environment), and (2) a second peering relationship between the user's account and a subscription of the first cloud provider included in the second cloud infrastructure (in the second cloud environment).
网络适配器930还被配置为在第一云基础设施与第二云基础设施之间建立网络连接性,即,网络适配器930可以配置将两个云环境通信地耦合的互连(例如,图7中的互连719)。应认识到的是,在第一云基础设施中的用户租赁与第二云基础设施中的用户账户之间形成网络链路后,在用户的订阅/账户中执行的应用能够访问资源,例如,在第一云基础设施的租赁中部署的Exa数据库。此外,对等化关系的创建供应了在第二云基础设施中(例如,在第二云基础设施中的用户的订阅中执行的仪表板应用中)可访问的度量,例如数据库使用情况度量。The network adapter 930 is also configured to establish network connectivity between the first cloud infrastructure and the second cloud infrastructure, i.e., the network adapter 930 may configure an interconnect (e.g., interconnect 719 in FIG. 7 ) that communicatively couples the two cloud environments. It should be appreciated that after a network link is formed between a user's tenancy in the first cloud infrastructure and a user's account in the second cloud infrastructure, applications executing in the user's subscription/account are able to access resources, e.g., an Exa database deployed in the tenancy of the first cloud infrastructure. In addition, the creation of the peering relationship supplies metrics accessible in the second cloud infrastructure (e.g., in a dashboard application executing in the user's subscription in the second cloud infrastructure), such as database usage metrics.
在一些实施方式中,数据库适配器925可以获得本地保存在MCCP平台935中的资源主体。数据库适配器925可以向第一云基础设施中包括的一个或多个下游服务940传输请求(包括资源主体),以在第一云基础设施中的用户的租赁中创建资源。换句话说,第一云基础设施中包括的下游服务940利用从MCCP平台935获得的身份(即,资源主体)在第一云基础设施中的用户租赁中创建/部署所需资源,例如,Exa数据库。在用户发出创建Exa数据库的请求后,用户可以间歇性地轮询MCCP 900以获得请求的状态。在第一云基础设施的下游服务940在第一云基础设施中的用户租赁中创建资源并且网络适配器930建立对等化关系后,MCCP 900可以通知用户请求已成功完成。In some embodiments, the database adapter 925 can obtain a resource principal stored locally in the MCCP platform 935. The database adapter 925 can transmit a request (including the resource principal) to one or more downstream services 940 included in the first cloud infrastructure to create a resource in the user's lease in the first cloud infrastructure. In other words, the downstream service 940 included in the first cloud infrastructure uses the identity (i.e., the resource principal) obtained from the MCCP platform 935 to create/deploy the required resources, such as an Exa database, in the user's lease in the first cloud infrastructure. After the user issues a request to create an Exa database, the user can intermittently poll the MCCP 900 to obtain the status of the request. After the downstream service 940 of the first cloud infrastructure creates the resource in the user's lease in the first cloud infrastructure and the network adapter 930 establishes a peering relationship, the MCCP 900 can notify the user that the request has been successfully completed.
在云环境中建立租赁Establishing a lease in a cloud environment
如前面参考图7所描述的,包括在多云基础设施720B中的云-链路适配器722D负责处置由第一云基础设施提供的资源的生命周期操作。云-链路适配器722D被配置为创建第二云基础设施的活动目录租户(active directory tenant)(及其相关联的订阅)与第一云基础设施中用户的对应租赁/账户之间的映射。换句话说,云-链路适配器生成与用户在第一云基础设施中的租赁相关联的第一标识符和与用户在第二云基础设施中的账户相关联的第二标识符的映射。要注意的是,将用户在第一云基础设施中的租赁链接到用户在第二云基础设施中的账户使得用户能够利用该用户的与第二云基础设施相关联的身份信息来使用由第一云基础设施提供的服务。As described above with reference to FIG. 7 , a cloud-link adapter 722D included in the multi-cloud infrastructure 720B is responsible for handling lifecycle operations of resources provided by the first cloud infrastructure. The cloud-link adapter 722D is configured to create a mapping between an active directory tenant (and its associated subscription) of the second cloud infrastructure and a corresponding lease/account of the user in the first cloud infrastructure. In other words, the cloud-link adapter generates a mapping of a first identifier associated with the user's lease in the first cloud infrastructure and a second identifier associated with the user's account in the second cloud infrastructure. It is noted that linking the user's lease in the first cloud infrastructure to the user's account in the second cloud infrastructure enables the user to utilize the user's identity information associated with the second cloud infrastructure to use services provided by the first cloud infrastructure.
根据一些实施例,云-链路适配器722D创建数据对象(本文中称为云-链路资源对象或链路-资源对象),该数据对象包括将用户在第一云基础设施中的租赁链接到用户在第二云基础设施中的账户的信息。图10A图示了根据某些实施例的链路-资源对象的示例性关系图样。如关系图样1000中所示,云-链路资源对象1010将第一云环境1015中的租赁(例如,图7的客户租赁726)链接到第二云环境1017中的活动目录租户。第二云环境中的活动目录租户与第二云环境中用户的订阅/账户(例如,图7的客户订阅715)相关联。According to some embodiments, cloud-link adapter 722D creates a data object (referred to herein as a cloud-link resource object or link-resource object) that includes information linking a user's lease in a first cloud infrastructure to the user's account in a second cloud infrastructure. FIG. 10A illustrates an exemplary relationship diagram of link-resource objects according to some embodiments. As shown in relationship diagram 1000, cloud-link resource object 1010 links a lease in a first cloud environment 1015 (e.g., customer lease 726 of FIG. 7 ) to an active directory tenant in a second cloud environment 1017. The active directory tenant in the second cloud environment is associated with a user's subscription/account in the second cloud environment (e.g., customer subscription 715 of FIG. 7 ).
可以注意到的是,第二云环境1016中的用户订阅与第一云环境1015中用户的租赁具有1:1的关系。云-链路资源对象1010包括与用户在第一云基础设施中的租赁相关联的第一标识符(例如,第一云环境中的租赁名称)到与用户在第二云基础设施中的账户相关联的第二标识符(例如,第二云环境中的租赁ID和相关联的订阅)的映射。此外,云-链路资源对象1010还存储与第一云环境和第二云环境的区域/位置有关的位置信息1018,其中两个云环境中的用户账户之间的链接被启用。It can be noted that the user subscription in the second cloud environment 1016 has a 1:1 relationship with the user's lease in the first cloud environment 1015. The cloud-link resource object 1010 includes a mapping of a first identifier associated with the user's lease in the first cloud infrastructure (e.g., lease name in the first cloud environment) to a second identifier associated with the user's account in the second cloud infrastructure (e.g., lease ID in the second cloud environment and associated subscription). In addition, the cloud-link resource object 1010 also stores location information 1018 related to the region/location of the first cloud environment and the second cloud environment, where linking between the user account in the two cloud environments is enabled.
图10B描绘了图示根据某些实施例的链接不同云环境中的两个用户账户的示例过程的流程图。例如,图10B中所描绘的处理可以被用于将用户的Azure账户(即,第二云环境中的账户)与用户的Oracle账户(即,第一云环境中的账户)链接。当客户在第二云环境1070中创建租赁1072时,活动目录1073被与租赁1072相关联。注意的是,客户可以经由第二云门户(例如,图7的门户711)在第二云环境中创建租赁。活动目录1073被用于管理与客户的租赁1072相关联的身份,包括管理与关联于客户的租赁1072的用户相关联的身份。在图10B中,针对特定客户的租赁1073示出了活动目录1073。Figure 10B depicts a flowchart illustrating an example process of linking two user accounts in different cloud environments according to certain embodiments. For example, the process depicted in Figure 10B can be used to link a user's Azure account (i.e., an account in the second cloud environment) with a user's Oracle account (i.e., an account in the first cloud environment). When a customer creates a lease 1072 in the second cloud environment 1070, an active directory 1073 is associated with the lease 1072. Note that a customer can create a lease in the second cloud environment via a second cloud portal (e.g., portal 711 of Figure 7). Active directory 1073 is used to manage identities associated with a customer's lease 1072, including managing identities associated with users associated with a customer's lease 1072. In Figure 10B, active directory 1073 is shown for a particular customer's lease 1073.
在一些实施方式中,活动目录1073存储用于第二云环境内的身份管理的以下各条信息:In some embodiments, the active directory 1073 stores the following pieces of information for identity management within the second cloud environment:
(1)应用信息——包括识别已在第二云环境中向租赁1072注册并且可以由与租赁1072相关联的用户使用的一个或多个应用的信息。例如,在图10B中,活动目录1073存储识别已针为客户的租赁1072注册的多云应用1009的信息。对于每个应用,可以指定用于该应用的一个或多个角色。例如,在图10C中,与多云应用1009相关联的角色可以包括与管理员角色对应的第一角色(角色1)和与读者对应的第二角色(角色2)。要注意的是,角色可以与一个或多个用户相关联。如图10B中所示,用户1008包括与角色1相关联的第一用户(用户A)和与角色2相关联的第二用户(用户B)。角色2的访问特权可以与角色1的访问特权不同(例如,可以更少)。例如,角色1可以允许对资源(例如,数据库)的各种操作(例如,CRUD操作),而角色2可以仅允许对该资源的读取操作。(1) Application information - including information identifying one or more applications that have been registered with the lease 1072 in the second cloud environment and can be used by users associated with the lease 1072. For example, in FIG. 10B, the active directory 1073 stores information identifying the multi-cloud application 1009 that has been registered for the customer's lease 1072. For each application, one or more roles for the application can be specified. For example, in FIG. 10C, the roles associated with the multi-cloud application 1009 can include a first role (role 1) corresponding to an administrator role and a second role (role 2) corresponding to a reader. It should be noted that a role can be associated with one or more users. As shown in FIG. 10B, the user 1008 includes a first user (user A) associated with role 1 and a second user (user B) associated with role 2. The access privileges of role 2 can be different from the access privileges of role 1 (e.g., can be less). For example, role 1 can allow various operations (e.g., CRUD operations) on a resource (e.g., a database), while role 2 can only allow read operations on the resource.
(2)用户信息——包括识别与第二云环境中的租赁1072相关联的一组一个或多个用户的信息。例如,如图10B中所示,客户的租赁2072包括用户1008,用户1008包括两个用户,即,用户A和用户B。如下所述,用户A可以与管理用户对应,该管理用户可以请求为客户(在第一云环境中)创建新账户并将新账户链接到客户的租赁2072。此外,用户A还可以请求将第一云环境中的现有账户链接到第二云环境中的账户。(2) User information - includes information identifying a set of one or more users associated with the lease 1072 in the second cloud environment. For example, as shown in FIG. 10B , the customer's lease 2072 includes users 1008, which includes two users, namely, user A and user B. As described below, user A may correspond to an administrative user who may request to create a new account for the customer (in the first cloud environment) and link the new account to the customer's lease 2072. In addition, user A may also request to link an existing account in the first cloud environment to an account in the second cloud environment.
(3)组信息(组1006)——可以为租赁1072配置一个或多个组1006,并且识别这些组1006的信息被包括在用于租赁1072的活动目录1073中。例如,如图10B中所示,组信息1006包括包含用户A的管理组。要注意的是,组可以包括与租赁1072相关联的一个或多个用户,并且特定用户可以属于不同的组。(3) Group Information (Groups 1006) - One or more groups 1006 may be configured for a tenancy 1072, and information identifying these groups 1006 is included in the active directory 1073 for the tenancy 1072. For example, as shown in FIG10B , the group information 1006 includes an administrative group that includes user A. Note that a group may include one or more users associated with a tenancy 1072, and a particular user may belong to different groups.
(4)角色信息(AD角色1007)——包括识别已为租赁1072配置的一个或多个角色的信息。AD角色1007被视为全局角色。每个AD角色都识别该角色下被允许的任务/操作/活动。在图10B中的示例中,已为租赁1072配置了“管理员”角色。一个角色可以与一个或多个用户相关联。当角色与用户相关联时,该角色识别对于该用户被允许的任务/操作/活动。例如,在图10B中,用户A被显为与AD角色1007中的“管理员”角色相关联。如果“管理员”角色与该组用户2008中识别出的用户相关联,那么该用户被视为“管理员”并被允许执行管理员角色下被允许的任务/操作/活动。该组用户2008中的用户可以与AD角色1007中的一个或多个角色相关联。AD角色1007中的角色可以与组相关联。当特定角色与组相关联时,该组中的一个或多个用户被允许执行对于该角色所允许的任务/操作/活动。(4) Role Information (AD Roles 1007) - includes information identifying one or more roles that have been configured for the lease 1072. AD roles 1007 are considered global roles. Each AD role identifies the tasks/operations/activities that are allowed under the role. In the example in FIG. 10B , the "Administrator" role has been configured for the lease 1072. A role can be associated with one or more users. When a role is associated with a user, the role identifies the tasks/operations/activities that are allowed for the user. For example, in FIG. 10B , user A is shown as being associated with the "Administrator" role in AD roles 1007. If the "Administrator" role is associated with a user identified in the group of users 2008, then the user is considered an "Administrator" and is allowed to perform tasks/operations/activities allowed under the Administrator role. Users in the group of users 2008 can be associated with one or more roles in AD roles 1007. Roles in AD roles 1007 can be associated with groups. When a particular role is associated with a group, one or more users in the group are allowed to perform the tasks/operations/activities allowed for the role.
接下来,参考图10B描述可以被执行以用于将第一云环境1020中用户的租赁链接到第二云环境1070中用户的账户的过程。图10B中所描绘以及下文描述的过程是作为示例提供的,并且不意味着限制。在某些实施方式中,该过程可以有所不同。Next, a process that may be performed to link a user's lease in the first cloud environment 1020 to a user's account in the second cloud environment 1070 is described with reference to FIG. 10B . The process depicted in FIG. 10B and described below is provided as an example and is not meant to be limiting. In some implementations, the process may be different.
在步骤1,当用户(例如,图10B中的用户A)从(第二云环境中的)租赁1072向第一云环境发出请求在第一云环境中创建新的租赁并进一步请求将第一云环境中新创建的租赁链接到与该用户相关联的账户1072的调用(即,请求)时,可以发起该过程。可以认识到的是,用户A可以通过使用多云控制台(例如,图7中所描绘的控制台721)发起这种调用。该请求可以由第一云环境内的账户服务组件1021处理。在某些实施方式中,用户A可以通过调用由账户服务1021提供的API来发起调用。作为调用的一部分,用户A可以提供与第二云环境对应的用户的身份信息。这种身份信息可以是令牌的形式(例如,由第二云环境生成的承载令牌)。该令牌可以提供关于发出请求的用户的相关信息,诸如该用户在第二云环境的活动目录1073中的身份相关信息。该身份相关信息可以包括关于发出请求的用户在活动目录1073内的角色和组从属关系的信息。In step 1, the process may be initiated when a user (e.g., user A in FIG. 10B ) issues a call (i.e., a request) from a lease 1072 (in the second cloud environment) to the first cloud environment requesting the creation of a new lease in the first cloud environment and further requesting the linking of the newly created lease in the first cloud environment to an account 1072 associated with the user. It may be appreciated that user A may initiate such a call by using a multi-cloud console (e.g., console 721 depicted in FIG. 7 ). The request may be processed by an account service component 1021 within the first cloud environment. In some embodiments, user A may initiate the call by calling an API provided by the account service 1021. As part of the call, user A may provide identity information of a user corresponding to the second cloud environment. Such identity information may be in the form of a token (e.g., a bearer token generated by the second cloud environment). The token may provide relevant information about the user issuing the request, such as identity-related information of the user in the active directory 1073 of the second cloud environment. The identity-related information may include information about the roles and group affiliations of the user issuing the request within the active directory 1073.
响应于接收到请求,账户服务1021可以继续验证请求。在一些实施方式中,账户服务1021可以将该请求传输到被包括在第一云环境1020中的多云基础设施1050。具体而言,如前面参考图7所描述的,包括在多云基础设施1050中的权限模块1036可以验证请求。在请求中接收的令牌可以被用于验证用户。因而,与发出请求的用户(例如,用户A)相关联的身份被用于验证用户。作为验证的一部分,可以执行过程以核实用户A确实是客户的账户1072的成员或与该账户相关联的用户。另外,验证过程可以包括核实与用户相关联的一个或多个角色以确定用户是否具有足够的特权来发出与在第一云环境中创建新租赁有关的请求。In response to receiving the request, account service 1021 may proceed to verify the request. In some embodiments, account service 1021 may transmit the request to a multi-cloud infrastructure 1050 included in the first cloud environment 1020. Specifically, as described above with reference to FIG. 7, a permission module 1036 included in the multi-cloud infrastructure 1050 may verify the request. The token received in the request may be used to verify the user. Thus, the identity associated with the user making the request (e.g., user A) is used to verify the user. As part of the verification, a process may be performed to verify that user A is indeed a member of the customer's account 1072 or a user associated with the account. In addition, the verification process may include verifying one or more roles associated with the user to determine whether the user has sufficient privileges to issue a request related to creating a new lease in the first cloud environment.
一旦用户的核实成功,则在步骤3中,账户服务1021就继续在第一云环境1020中创建新的租赁/账户1022。租赁1022可以具有某些默认配置。例如,域1023与租赁1022相关联。与第二云环境上的活动目录1073类似,与第一云环境中的租赁相关联的域1023促进身份管理。域1023可以包括与租赁1022相关联的用户、组等。在某些实施方式中,在默认情况下,当创建账户/租赁1022时,域1023可以包括“管理员”组1024,该组包括用户,诸如图10B中所示的“用户1”。用户1的身份可以是为发出请求的用户(即,用户A)创建的。然而,如下面所讨论的,将用户在第一云基础设施中的租赁与用户在第二云基础设施中的账户相链接的原因之一是使用户能够利用第二云环境中用户的身份信息来使用第一云环境中的资源,使得用户不必记住或甚至知道在第一云环境侧创建的“用户1”身份。因而,用户A可以(使用与第二云环境相关的身份信息)访问多云控制台并触发在第一云环境中创建租赁的请求。Once the verification of the user is successful, in step 3, the account service 1021 proceeds to create a new lease/account 1022 in the first cloud environment 1020. The lease 1022 may have certain default configurations. For example, a domain 1023 is associated with the lease 1022. Similar to the active directory 1073 on the second cloud environment, the domain 1023 associated with the lease in the first cloud environment facilitates identity management. The domain 1023 may include users, groups, etc. associated with the lease 1022. In some embodiments, by default, when creating the account/lease 1022, the domain 1023 may include an "administrator" group 1024, which includes users, such as "User 1" shown in Figure 10B. The identity of User 1 may be created for the user who made the request (i.e., User A). However, as discussed below, one of the reasons for linking the user's lease in the first cloud infrastructure with the user's account in the second cloud infrastructure is to enable the user to use the resources in the first cloud environment using the user's identity information in the second cloud environment, so that the user does not have to remember or even know the "User 1" identity created on the first cloud environment side. Thus, user A can access the multi-cloud console (using identity information associated with the second cloud environment) and trigger a request to create a lease in the first cloud environment.
一旦已经在第一云环境中创建了租赁1022,就执行过程以将新创建的租赁1022与用户所关联的账户1072链接。在图10B中描绘的示例实施方式中,在步骤4,账户服务1021向被包括在多云基础设施1050中的云-链路适配器1030传输执行链接过程的请求。这种请求可以在其有效载荷中包括关于要链接的两个账户的信息、由第二云环境生成的令牌等。如下所述,作为链接相关过程的一部分,可以执行过程以使用户能够通过使用第二云环境中用户的登录/身份信息来访问由第一云环境提供的端点/API(例如,访问、使用和管理第一云环境中与用户相关联的租赁中的资源)。Once the lease 1022 has been created in the first cloud environment, a process is performed to link the newly created lease 1022 with the account 1072 associated with the user. In the example implementation depicted in FIG10B , at step 4, the account service 1021 transmits a request to perform a linking process to a cloud-link adapter 1030 included in the multi-cloud infrastructure 1050. Such a request may include in its payload information about the two accounts to be linked, a token generated by the second cloud environment, etc. As described below, as part of the linking-related process, a process may be performed to enable the user to access endpoints/APIs provided by the first cloud environment (e.g., to access, use, and manage resources in the lease associated with the user in the first cloud environment) by using the user's login/identity information in the second cloud environment.
由云-链路适配器1030执行的步骤5和步骤6与链接过程有关。在步骤5,云-链路适配器1030创建表示两个账户之间的链路的数据对象(即,链路-资源对象/或云-链路资源对象)1031。具体而言,如图10A中所示,链路-资源对象包括将第一云基础设施中的用户的租赁链接到用户在第二云基础设施中的账户的信息。链路-资源对象使用户能够利用由第一云环境提供的一个或多个服务。在一些实施方式中,将第一云环境中用户的租赁链接到第二云环境中用户的账户包括在链路-资源对象中存储与第一云环境中用户的租赁相关联的第一标识符到与第二云环境中用户的账户相关联的第二标识符的映射。在某些实施方式中,在步骤5中创建的云-链路资源对象1031被存储在与包括在第一云环境中的租赁1022相关联的隔间(例如,根隔间)中。Steps 5 and 6 performed by the cloud-link adapter 1030 are related to the linking process. In step 5, the cloud-link adapter 1030 creates a data object (i.e., a link-resource object/or a cloud-link resource object) 1031 representing a link between two accounts. Specifically, as shown in FIG. 10A , the link-resource object includes information linking a user's lease in the first cloud infrastructure to the user's account in the second cloud infrastructure. The link-resource object enables the user to utilize one or more services provided by the first cloud environment. In some embodiments, linking the lease of the user in the first cloud environment to the user's account in the second cloud environment includes storing in the link-resource object a mapping of a first identifier associated with the lease of the user in the first cloud environment to a second identifier associated with the user's account in the second cloud environment. In some embodiments, the cloud-link resource object 1031 created in step 5 is stored in a compartment (e.g., a root compartment) associated with the lease 1022 included in the first cloud environment.
在步骤6,云-链路适配器1030创建与云-链路资源对象1031相关联的资源主体(本文中也称为云-链路资源主体)1032。当用户(从第二云环境)向多云基础设施(例如,经由多云控制台)传输在第一云环境中创建/管理用户的租赁中的资源的请求时,多云基础设施使用请求中所包括的令牌来验证用户。由于令牌是由第二云环境生成的,因此它无法被第一云环境提供的服务识别。因此,云-链路适配器1030创建资源主体(其用作与资源对应的代表(deputy)或有效身份信息,并且是由包括在第一云环境中的多云基础设施生成的),第一云环境的下游服务利用该资源主体来执行该请求。In step 6, the cloud-link adapter 1030 creates a resource principal (also referred to herein as a cloud-link resource principal) 1032 associated with the cloud-link resource object 1031. When the user (from the second cloud environment) transmits a request to the multi-cloud infrastructure (e.g., via the multi-cloud console) to create/manage resources in the user's lease in the first cloud environment, the multi-cloud infrastructure uses the token included in the request to authenticate the user. Since the token is generated by the second cloud environment, it cannot be recognized by the services provided by the first cloud environment. Therefore, the cloud-link adapter 1030 creates a resource principal (which serves as a deputy or effective identity information corresponding to the resource and is generated by the multi-cloud infrastructure included in the first cloud environment), and the downstream services of the first cloud environment use the resource principal to execute the request.
为了让资源主体能够以无缝的方式使下游得以执行,基于用户在第二云环境中的凭证/令牌将许可与资源主体相关联。对于设立资源主体的同意是在用户经由多云控制台向多云基础设施发出请求时由用户提供的。此外,在一些实施方式中,资源主体使第一云环境1020能够访问用户在第二云环境中的账户。例如,资源主体可以被用于设立在不同的云环境中的两个用户账户之间的联合。In order for the resource principal to enable downstream execution in a seamless manner, permissions are associated with the resource principal based on the user's credentials/token in the second cloud environment. Consent to establish the resource principal is provided by the user when the user issues a request to the multi-cloud infrastructure via the multi-cloud console. In addition, in some embodiments, the resource principal enables the first cloud environment 1020 to access the user's account in the second cloud environment. For example, the resource principal can be used to establish a federation between two user accounts in different cloud environments.
另外,在步骤7中,如图10B中所示,可以在第一云环境和第二云环境中用户的账户之间建立联合。作为联合的结果,与第二云环境中的活动目录1073相关联的用户和组被同步到包括在第一云环境中的租赁1022。例如,如图10B中所示,通过复制包括在第二云环境中的管理员组1006中所包括的信息,在第一云环境的租赁中生成管理员组1025。另外,可以创建策略并将其与经同步的组相关联,这些策略为该组的用户提供了访问第一云环境的资源/服务的许可(例如,完全访问)。In addition, in step 7, as shown in FIG10B , a federation may be established between the accounts of users in the first cloud environment and the second cloud environment. As a result of the federation, users and groups associated with the active directory 1073 in the second cloud environment are synchronized to the tenancy 1022 included in the first cloud environment. For example, as shown in FIG10B , an administrator group 1025 is generated in the tenancy of the first cloud environment by copying the information included in the administrator group 1006 included in the second cloud environment. In addition, policies may be created and associated with the synchronized group, which provide permissions (e.g., full access) for users of the group to access resources/services of the first cloud environment.
参考图10C,描绘了图示根据某些实施例的在部署资源时使用云-链路资源对象的示例过程的流程图。图10C中所描绘和下面描述的过程是作为示例提供的,并不意味着限制。在某些实施方式中,该过程可以有所不同。当客户在第一云环境中的账户(例如,租赁1022)成功链接到客户在第二云环境中的租赁/账户(例如,租赁1072)后,用户可以发起创建、使用和管理由第一云环境提供的资源的过程。在一些实施方式中,用户可以向多云控制台发起请求,以在第一云环境中与用户相关联的租赁中创建资源。这种请求由多云控制台路由到包括在第一云环境中的多云基础设施。可替代地,在一些实施方式中,用户可以调用或访问由多云基础设施提供的一个或多个端点。例如,用户A可以使用在第二云环境中生成的令牌来调用由多云基础设施提供的API。用户A可以使用可公开访问的REST API来向多云基础设施端点发出这种API调用。Referring to FIG. 10C , a flowchart illustrating an example process of using a cloud-link resource object when deploying resources according to certain embodiments is depicted. The process depicted in FIG. 10C and described below is provided as an example and is not meant to be limiting. In some embodiments, the process may be different. After a customer's account in a first cloud environment (e.g., lease 1022) is successfully linked to a customer's lease/account in a second cloud environment (e.g., lease 1072), a user may initiate a process of creating, using, and managing resources provided by the first cloud environment. In some embodiments, a user may initiate a request to a multi-cloud console to create a resource in a lease associated with the user in the first cloud environment. Such a request is routed by the multi-cloud console to a multi-cloud infrastructure included in the first cloud environment. Alternatively, in some embodiments, a user may call or access one or more endpoints provided by a multi-cloud infrastructure. For example, user A may use a token generated in the second cloud environment to call an API provided by the multi-cloud infrastructure. User A may use a publicly accessible REST API to issue such an API call to a multi-cloud infrastructure endpoint.
如图10C中所示,用户A发起请求将资源部署在第一云环境中与用户相关联的租赁中的调用(步骤1)。这种请求可以从多云控制台路由到包括在第一云环境中的账户服务模块1021。作为请求的一部分,用户A可以提供识别用户A和/或任何其他相关账户、组或客户信息的令牌(由第二云环境生成)。一般而言,当用户从客户的(在第二云环境中的)账户1072调用由第一云环境提供的端点以针对资源执行某一操作时,在第一云环境侧,在执行所请求的操作之前,第一云环境执行验证以:(a)检查请求操作的用户是否是与客户的账户1072相关联的正确用户,以及(b)检查用户与允许用户执行所请求的操作的角色相关联。As shown in FIG10C , user A initiates a call requesting that a resource be deployed in a lease associated with the user in the first cloud environment (step 1). Such a request can be routed from the multi-cloud console to the account service module 1021 included in the first cloud environment. As part of the request, user A can provide a token (generated by the second cloud environment) that identifies user A and/or any other relevant account, group, or customer information. In general, when a user calls an endpoint provided by the first cloud environment from a customer's account 1072 (in the second cloud environment) to perform an operation on a resource, on the first cloud environment side, before performing the requested operation, the first cloud environment performs verification to: (a) check whether the user requesting the operation is the correct user associated with the customer's account 1072, and (b) check that the user is associated with a role that allows the user to perform the requested operation.
在步骤2,在用户A发出创建新资源(例如,数据库资源)的请求之后,账户服务1021将请求转发到多云基础设施1050以通过检查用户A是否与第二云环境侧的特定角色相关联来验证该请求,其中该角色允许用户创建所请求的资源。在图10C的步骤2中执行的验证过程类似于在图10B的步骤2中执行的验证过程。例如,多云基础设施1050的权限模块检查用户是否与客户的租赁1072中的在多云应用1009下创建的管理角色相关联,并进一步检查该管理角色允许创建该资源。如果多云基础设施确定用户A与活动目录1073中的管理角色相关联并且该角色允许创建资源(例如,数据库),那么认为该用户已被成功验证。要注意的是,在上述验证过程中,为了让多云基础设施获得与给定令牌相关联的角色有关的信息,包括在多云基础设施中的权限模块可以与第二云环境中的活动目录通信以获得该信息。In step 2, after user A issues a request to create a new resource (e.g., a database resource), the account service 1021 forwards the request to the multi-cloud infrastructure 1050 to verify the request by checking whether user A is associated with a specific role on the second cloud environment side, where the role allows the user to create the requested resource. The verification process performed in step 2 of FIG. 10C is similar to the verification process performed in step 2 of FIG. 10B. For example, the permission module of the multi-cloud infrastructure 1050 checks whether the user is associated with an administrative role created under the multi-cloud application 1009 in the customer's lease 1072, and further checks that the administrative role allows the creation of the resource. If the multi-cloud infrastructure determines that user A is associated with an administrative role in the active directory 1073 and the role allows the creation of resources (e.g., a database), then the user is considered to have been successfully verified. It should be noted that in the above verification process, in order for the multi-cloud infrastructure to obtain information about the role associated with a given token, the permission module included in the multi-cloud infrastructure can communicate with the active directory in the second cloud environment to obtain the information.
在成功验证用户后,包括在多云基础设施中的代理模块可以将令牌(其包括在经由多云控制台做出的请求中)传输到适配器(例如,与用户请求的服务对应的数据库适配器)。数据库适配器1037进而查询云-链路适配器1030(在步骤4中)以获得两个云环境中的用户账户的映射信息。然后,云-链路适配器1030可以(基于令牌)识别与令牌(例如,客户身份、用户身份等)相关联的适当租赁1022。因此,可以使用包括用户相对于第二云环境的身份信息(例如,令牌)且不包括与第一云环境相关的特定身份信息的API调用来查找第一云环境中的对应租赁1022。在识别出链接到第二云环境中的租赁/账户1072的特定租赁1022后,云-链路适配器1030还可以从租赁1022中检索与云-链路资源对象相关联的云-链路资源主体。云-链路适配器1030将检索到的信息传输回数据库适配器1037。After successfully authenticating the user, the proxy module included in the multi-cloud infrastructure can transmit the token (which is included in the request made via the multi-cloud console) to an adapter (e.g., a database adapter corresponding to the service requested by the user). The database adapter 1037 in turn queries the cloud-link adapter 1030 (in step 4) to obtain mapping information of the user account in the two cloud environments. The cloud-link adapter 1030 can then identify (based on the token) the appropriate lease 1022 associated with the token (e.g., customer identity, user identity, etc.). Therefore, an API call that includes the user's identity information (e.g., token) relative to the second cloud environment and does not include specific identity information related to the first cloud environment can be used to find the corresponding lease 1022 in the first cloud environment. After identifying the specific lease 1022 linked to the lease/account 1072 in the second cloud environment, the cloud-link adapter 1030 can also retrieve the cloud-link resource principal associated with the cloud-link resource object from the lease 1022. The cloud-link adapter 1030 transmits the retrieved information back to the database adapter 1037.
在步骤5,数据库适配器1037向由第一云环境提供的对应下游服务(例如,DBaaS1060)传输请求。该请求涉及在第一云环境中与用户相关联的租赁中创建资源(例如,数据库)。可以认识到的是,该请求包括(由数据库适配器在步骤4中获得的)资源主体。然后,DBaaS服务1060可以基于资源主体(即,基于与资源主体相关联的策略)确定是否允许为该用户在第一云环境中创建数据库。要注意的是,根据一些实施例,存储在第一云环境中的客户的租赁1022中的同一资源主体可以被用于与该客户的账户1072相关联的所有用户。In step 5, the database adapter 1037 transmits a request to a corresponding downstream service (e.g., DBaaS 1060) provided by the first cloud environment. The request is related to creating a resource (e.g., a database) in a lease associated with the user in the first cloud environment. It can be appreciated that the request includes a resource principal (obtained by the database adapter in step 4). The DBaaS service 1060 can then determine whether to allow the creation of a database for the user in the first cloud environment based on the resource principal (i.e., based on the policy associated with the resource principal). It should be noted that according to some embodiments, the same resource principal stored in the customer's lease 1022 in the first cloud environment can be used for all users associated with the customer's account 1072.
另外,在步骤6中,当DBaaS服务1060成功授权用户后,DBaaS服务1060继续在第一云环境中与用户相关联的租赁中创建期望的资源(例如,数据库)。在一些实施方式中,当资源被部署在第一云环境中的客户租赁中后,多云基础设施向第二云环境中的用户提供与所创建的资源对应的web链接。例如,web链接可以被显示在用户在第二云环境中执行的应用中(在订阅/账户中)。以这种方式,用户可以直接(在第二云环境中)监视与部署在第一云环境中的资源相关的性能评估参数(例如,数据库使用情况度量)。Additionally, in step 6, after the DBaaS service 1060 successfully authorizes the user, the DBaaS service 1060 proceeds to create the desired resources (e.g., databases) in the lease associated with the user in the first cloud environment. In some embodiments, after the resources are deployed in the customer lease in the first cloud environment, the multi-cloud infrastructure provides a web link corresponding to the created resources to the user in the second cloud environment. For example, the web link may be displayed in an application executed by the user in the second cloud environment (in a subscription/account). In this manner, the user may directly (in the second cloud environment) monitor performance evaluation parameters (e.g., database usage metrics) associated with the resources deployed in the first cloud environment.
因此,本公开的实施例提供了一种使用云-链路资源对象连接两个云环境的过程,使得第一云的用户可以从第一云的用户界面内使用来自第二云的服务。用户可以向第一云进行认证,然后访问第二云的服务,而无需在第二云处单独进行认证或提供身份信息。而且,用户在第一云处的访问级别和许可(例如,管理员级别与读者级别)可以有效地转换成第二云处下游的访问许可(例如,云-链路资源主体)。存储链接两个云账户的元数据(并详细说明用户访问级别)的云-链路数据对象可以被用于自动地允许用户访问第二云和所允许的第二云资源,而无需用户提供进一步的认证或身份信息。此外,实施例提供了用于在第二云处为用户建立租赁或账户的框架,而无需用户直接建立账户或设立第二组凭证。换句话说,可以自动地代表用户(向第二云)创建第二个账户,而无需用户参与。Therefore, an embodiment of the present disclosure provides a process of connecting two cloud environments using a cloud-link resource object so that users of the first cloud can use services from the second cloud from within the user interface of the first cloud. Users can authenticate to the first cloud and then access the services of the second cloud without having to authenticate or provide identity information separately at the second cloud. Moreover, the user's access level and permission (e.g., administrator level and reader level) at the first cloud can be effectively converted into downstream access permissions (e.g., cloud-link resource subject) at the second cloud. A cloud-link data object that stores metadata linking two cloud accounts (and details the user's access level) can be used to automatically allow users to access the second cloud and the allowed second cloud resources without the user providing further authentication or identity information. In addition, an embodiment provides a framework for establishing a lease or account for a user at the second cloud without the user directly establishing an account or setting up a second set of credentials. In other words, a second account can be automatically created on behalf of the user (to the second cloud) without user participation.
多云控制平面(MCCP)-可观察性Multi-Cloud Control Plane (MCCP) - Observability
如前面参考图7所描述的,多云控制平面700的体系架构使(由外部云服务提供商提供的)外部云环境的客户能够通过利用(包括在第一云环境中的)多云基础设施和多云控制台721在第一云环境中部署资源(例如,数据库资源)、执行服务等。如参考图10A-图10C所描述的,为了让第二云环境的客户使用由第一云环境提供的服务,将第一云环境中的客户租赁链接到第二云环境中客户的账户/订阅。换句话说,创建云-链路资源对象,该对象存储用于识别客户在所链接的不同云环境中的两个租户的元数据信息。例如,云-链路资源对象存储元数据信息,该元数据信息包括与在第一云基础设施中创建的租赁(即,账户)相关联的第一标识符和与用户在第二云服务提供商的账户相关联的第二标识符的映射。此外,云-链路适配器(图7的722D)为第二云基础设施的用户想要使用的资源创建资源主体(本文中称为云-链路资源主体)。As described above with reference to FIG. 7 , the architecture of the multi-cloud control plane 700 enables customers of an external cloud environment (provided by an external cloud service provider) to deploy resources (e.g., database resources), execute services, etc. in the first cloud environment by utilizing the multi-cloud infrastructure (included in the first cloud environment) and the multi-cloud console 721. As described with reference to FIG. 10A-FIG. 10C , in order for customers of the second cloud environment to use the services provided by the first cloud environment, the customer lease in the first cloud environment is linked to the customer's account/subscription in the second cloud environment. In other words, a cloud-link resource object is created that stores metadata information for identifying two tenants of the customer in the linked different cloud environments. For example, the cloud-link resource object stores metadata information that includes a mapping of a first identifier associated with a lease (i.e., an account) created in the first cloud infrastructure and a second identifier associated with the user's account in the second cloud service provider. In addition, the cloud-link adapter (722D of FIG. 7 ) creates a resource principal (referred to herein as a cloud-link resource principal) for the resources that the user of the second cloud infrastructure wants to use.
根据一些实施例,可观察性框架使得与在第一云环境中创建的资源相关联的可观察性数据能够被传输(例如,经由高带宽网络链路)到第二云环境。可以认识到的是,需要将这种可观察性数据被传送到第二云环境,以便客户可以从第二云环境内管理和控制(例如,排除故障)部署在第一云环境中的客户资源。部署在第一云环境中的资源可以与一种类型的数据库对应,例如,Exa数据库、共享自主数据库、专用自主数据库或虚拟机数据库。According to some embodiments, the observability framework enables observability data associated with resources created in a first cloud environment to be transmitted (e.g., via a high-bandwidth network link) to a second cloud environment. It can be appreciated that such observability data needs to be transmitted to the second cloud environment so that customers can manage and control (e.g., troubleshoot) customer resources deployed in the first cloud environment from within the second cloud environment. The resources deployed in the first cloud environment can correspond to a type of database, such as an Exa database, a shared autonomous database, a dedicated autonomous database, or a virtual machine database.
要注意的是,可观察性数据可以包括与资源的执行相关联的一个或多个度量(例如,与数据库的类型相关联的平均处理器利用率、与数据库的类型相关联的平均执行计数、或与数据库的类型相关联的平均事务计数)。此外,可观察性数据可以包括审计日志或第一云环境的数据平面中发生的一个或多个事件。该一个或多个事件可以包括与服务相关联的资源的故障转移、在第一云环境中部署备份资源或与资源的容量相关联的关键事件。It is noted that the observability data may include one or more metrics associated with the execution of the resource (e.g., average processor utilization associated with the type of database, average execution count associated with the type of database, or average transaction count associated with the type of database). In addition, the observability data may include one or more events occurring in an audit log or a data plane of the first cloud environment. The one or more events may include a failover of a resource associated with the service, deployment of a backup resource in the first cloud environment, or a critical event associated with the capacity of a resource.
下面,提供可观察性框架的详细描述,该框架使得能够将与资源相关的可观察性数据从第一云环境导出到第二云环境。在高层次上,并且根据一些实施例,可观察性数据的导出包括以下三步供应处理:Below, a detailed description of an observability framework is provided that enables exporting observability data related to resources from a first cloud environment to a second cloud environment. At a high level, and according to some embodiments, the export of observability data includes the following three-step provisioning process:
步骤1(一次性设置:在服务构建期间)——这个步骤包括配置用于将可观察性数据发布到第二云环境的监视服务中的功能(本文中称为“度量-功能处理器”或“度量处理器”)。该功能将被用作所有服务-连接器枢纽(SCH)的目的地,用于导出可观察性数据。SCH在本文中被定义为第一云环境的服务,该服务使得能够在服务之间移动/运输数据。Step 1 (One-time setup: during service build) - This step involves configuring a function (referred to herein as the "metrics-function handler" or "metric handler") for publishing observability data to the monitoring service of the second cloud environment. This function will be used as the destination for all Service-Connector Hubs (SCHs) for exporting observability data. SCHs are defined herein as services of the first cloud environment that enable the movement/transportation of data between services.
步骤2(云-链路设置:在创建将第二云环境中客户的订阅/账户与第一云环境中客户的租赁相关联的云-链路期间)——当客户创建云-链路时:(a)作为为第二云环境的客户创建云-链路资源对象的一部分,创建资源主体;(b)云-链路适配器获得客户同意并为资源主体配置管理资源所必需的角色,包括管理网络资源、发布度量和创建应用洞察的角色;以及(c)云-链路适配器将特定于客户的凭证(即,云-链路资源对象、资源主体等)持久化在第一云环境中的客户的租赁中所包括的客户保险库中。Step 2 (Cloud-Link Setup: During creation of a Cloud-Link that associates the customer's subscription/account in the second cloud environment with the customer's tenancy in the first cloud environment) - When the customer creates a Cloud-Link: (a) a resource principal is created as part of creating a Cloud-Link resource object for the customer of the second cloud environment; (b) the Cloud-Link adapter obtains customer consent and configures the resource principal with roles necessary to manage resources, including roles for managing network resources, publishing metrics, and creating application insights; and (c) the Cloud-Link adapter persists customer-specific credentials (i.e., Cloud-Link resource objects, resource principals, etc.) in the customer vault included in the customer's tenancy in the first cloud environment.
步骤3(可观察性设置:在创建多云资源(例如,数据库)期间-在客户创建多云数据库实例之后,数据库适配器执行两个功能:(1)为数据库供应度量,这些度量被发射到第一云环境的监视服务中(即,使得来自数据库的度量被生成到该监视服务中),以及(2)调用多云平台控制平面,该平面创建包括多个属性的可观察性实例数据对象(在本文中也称为实例-可观察性资源或可观察性配置)。在一些实施方式中,可观察性实例数据对象可以包括以下多个属性:部署在第一云环境中的资源的第一标识符、托管资源的第一客户租赁的隔间标识符、第二云环境的第二客户租赁的第二标识符以及与资源相关联的云-链路对象,云-链路对象包括将第一云环境中的第一客户租赁链接到第二云环境的第二客户租赁的信息。如下文参考图11所描述的,实例-可观察性资源设立了导出可观察性数据所需的所有组件。 Step 3 (Observability Setup: During creation of a multi-cloud resource (e.g., a database) - After the customer creates a multi-cloud database instance, the database adapter performs two functions: (1) provisions the database with metrics that are emitted into the monitoring service of the first cloud environment (i.e., causes metrics from the database to be generated into the monitoring service), and (2) invokes the multi-cloud platform control plane, which creates an observability instance data object (also referred to herein as an instance-observability resource or observability configuration) that includes a plurality of properties. In some embodiments, the observability instance data object may include the following plurality of properties: a first identifier of a resource deployed in the first cloud environment, a compartment identifier of the first customer tenancy hosting the resource, a second identifier of the second customer tenancy of the second cloud environment, and a cloud-link object associated with the resource, the cloud-link object including information linking the first customer tenancy in the first cloud environment to the second customer tenancy in the second cloud environment. As described below with reference to FIG. 11 , the instance-observability resource sets up all components required to export observability data.
图11描绘了根据一些实施例的用于导出可观察性数据的示例性可观察性框架。为了说明,图11中的可观察性框架参考第一云环境1101进行描述,该第一云环境向第二云环境1102的客户提供一个或多个服务。在这样的设置中,可观察性框架使得能够将(与部署在第一云环境中的资源对应的)可观察性数据运输到第二云环境。FIG11 depicts an exemplary observability framework for exporting observability data according to some embodiments. For illustration, the observability framework in FIG11 is described with reference to a first cloud environment 1101 that provides one or more services to customers of a second cloud environment 1102. In such a setting, the observability framework enables observability data (corresponding to resources deployed in the first cloud environment) to be transported to the second cloud environment.
如图11中所示,包括在第一云环境1101中的可观察性框架包括数据库适配器1103、多云服务控制平面1109、服务连接器枢纽1113和客户租赁1111。在一些实施方式中,第二云环境1102的客户1105向多云控制台1110发出创建资源(例如,数据库资源)的请求。如前面参考图7所描述的,这样的请求最终由数据库适配器1103处理,该数据库适配器(经由第一云环境的下游服务)在第一云环境中客户的租赁中部署数据库实例1107。As shown in FIG11 , the observability framework included in the first cloud environment 1101 includes a database adapter 1103, a multi-cloud service control plane 1109, a service connector hub 1113, and a customer tenancy 1111. In some embodiments, a customer 1105 of the second cloud environment 1102 issues a request to create a resource (e.g., a database resource) to the multi-cloud console 1110. As described above with reference to FIG7 , such a request is ultimately processed by the database adapter 1103, which deploys a database instance 1107 in the customer's tenancy in the first cloud environment (via a downstream service of the first cloud environment).
响应于数据库实例1107被部署在客户租赁中,数据库适配器1103向多云服务控制平面1109传输请求。该请求与为数据库实例1107创建可观察性配置对应。响应于从数据库适配器1103接收到该请求,多云服务控制平面1109设立工作流,该工作流配置可观察性框架的多个组件(例如,服务连接器枢纽1113)。换句话说,发起工作流以收集与在第一云环境1101中为第二云环境1102的客户执行服务(例如,数据库实例)相关联的可观察性数据。In response to the database instance 1107 being deployed in the customer tenancy, the database adapter 1103 transmits a request to the multi-cloud service control plane 1109. The request corresponds to creating an observability configuration for the database instance 1107. In response to receiving the request from the database adapter 1103, the multi-cloud service control plane 1109 sets up a workflow that configures multiple components of the observability framework (e.g., the service connector hub 1113). In other words, a workflow is initiated to collect observability data associated with executing a service (e.g., a database instance) in the first cloud environment 1101 for a customer of the second cloud environment 1102.
在一些实施方式中,多云服务控制平面1109发起创建服务连接器枢纽1113以与资源(例如,数据库实例)相关联的工作流。另外,多云服务控制平面1109创建要与第一云环境中的客户租赁1111相关联的访问策略。访问策略使部署在第一云环境1101中的服务连接器枢纽1113能够检索与该服务所关联的资源对应的可观察性数据。要注意的是,由第一云环境提供的服务可以与数据库服务对应,并且服务的执行可以与在第一云环境1101中的客户1111的租赁中实例化一种类型的数据库对应。此外,在一些实施方式中,要注意的是,多云服务控制平面1109为部署在第一云环境中的每个多云资源实例化唯一的SCH(在数据库适配器的租赁中)。注意的是,SCH是被配置用于收集/读取该资源的度量信息并将收集到的信息传输到第二云环境1102的组件。In some embodiments, the multi-cloud service control plane 1109 initiates a workflow to create a service connector hub 1113 to be associated with a resource (e.g., a database instance). Additionally, the multi-cloud service control plane 1109 creates an access policy to be associated with the customer's tenancy 1111 in the first cloud environment. The access policy enables the service connector hub 1113 deployed in the first cloud environment 1101 to retrieve observability data corresponding to the resource associated with the service. Note that the service provided by the first cloud environment may correspond to a database service, and the execution of the service may correspond to instantiating a type of database in the tenancy of the customer 1111 in the first cloud environment 1101. Additionally, in some embodiments, note that the multi-cloud service control plane 1109 instantiates a unique SCH (in the tenancy of the database adapter) for each multi-cloud resource deployed in the first cloud environment. Note that the SCH is a component configured to collect/read metric information for the resource and transmit the collected information to the second cloud environment 1102.
由多云服务控制平面1109发起的工作流进一步在第二云环境1102的客户租赁1115中实例化资源组1117。可以认识到的是,资源1117是在第二云环境中按每资源实例而实例化的并且包括多个资源,每个资源被配置为持久化可观察性数据的至少一些部分。例如,资源组1117包括以下组件:(i)分析工作区1121,其被配置用于将所生成的数据平面事件存储为日志,以便它们是可搜索的,例如“数据库自动备份开始”或“自主数据库-关键”事件,(ii)应用洞察组件1123,其被配置用于存储由资源实例生成的所有度量相关信息,以及(iii)事件网格组件1125,其被配置用于发布所有生成的数据平面事件,以便第二云环境的客户可以触发自动化。The workflow initiated by the multi-cloud service control plane 1109 further instantiates a resource group 1117 in a customer tenancy 1115 of the second cloud environment 1102. It can be appreciated that the resource 1117 is instantiated per resource instance in the second cloud environment and includes a plurality of resources, each of which is configured to persist at least some portion of the observability data. For example, the resource group 1117 includes the following components: (i) an analysis workspace 1121 configured to store the generated data plane events as logs so that they are searchable, such as "database automatic backup started" or "autonomous database-critical" events, (ii) an application insight component 1123 configured to store all metric-related information generated by the resource instances, and (iii) an event grid component 1125 configured to publish all generated data plane events so that customers of the second cloud environment can trigger automation.
以这种方式,可观察性框架被设立,用于在第一云环境中收集与为第二云环境的客户在第一云环境中执行服务相关联的可观察性数据,并将从第一云环境收集的可观察性数据传输到第二云环境(例如,经由高带宽网络链路),以使与第二云环境的客户相关联的用户能够经由第二云环境访问该可观察性数据。In this manner, an observability framework is established to collect, in a first cloud environment, observability data associated with execution of services in the first cloud environment for customers of a second cloud environment, and to transmit the observability data collected from the first cloud environment to the second cloud environment (e.g., via a high-bandwidth network link) so that users associated with the customers of the second cloud environment can access the observability data via the second cloud environment.
图12描绘了图示根据某些实施例的在导出可观察性数据时执行的过程的流程图。图12中描绘的过程可以在由相应系统的一个或多个处理单元(例如,处理器、核心)执行的软件(例如,代码、指令、程序)中、使用硬件或其组合实现。软件可以存储在非暂态存储介质上(例如,存储器设备上)。图12中呈现的和下面描述的方法旨在是说明性和非限制性的。虽然图12描绘了以特定顺序或次序发生的各种处理步骤,但这并不旨在限制。在某些替代实施例中,这些步骤可以以某种不同的次序执行,或者一些步骤也可以并行执行。Figure 12 depicts a flowchart illustrating a process performed when exporting observability data according to certain embodiments. The process depicted in Figure 12 can be implemented in software (e.g., code, instructions, program) executed by one or more processing units (e.g., processors, cores) of the corresponding system, using hardware or a combination thereof. The software can be stored on a non-transitory storage medium (e.g., on a memory device). The methods presented in Figure 12 and described below are intended to be illustrative and non-restrictive. Although Figure 12 depicts various processing steps that occur in a particular order or sequence, this is not intended to be limiting. In certain alternative embodiments, these steps may be performed in a different order, or some steps may also be performed in parallel.
该过程在步骤1205中开始,其中为第二云环境的客户在第一云环境中执行服务。在步骤1210中,该过程收集与在第一云环境中执行该服务相关联的可观察性数据。例如,如前面参考图11所描述的,图11中与资源实例相关联的SCH组件1113可以被配置为收集可观察性数据。可以认识到的是,可观察性数据可以包括与服务的执行相关联的一个或多个度量。The process begins in step 1205, where a service is executed in a first cloud environment for a customer of a second cloud environment. In step 1210, the process collects observability data associated with the execution of the service in the first cloud environment. For example, as described above with reference to FIG. 11, the SCH component 1113 associated with the resource instance in FIG. 11 can be configured to collect observability data. It can be appreciated that the observability data can include one or more metrics associated with the execution of the service.
此后,该过程移至步骤1215,其中从第一云环境收集的可观察性数据被传送到第二云环境(例如,传送到之前在第二云环境中为部署在第一云环境中的资源所创建的资源组)。可观察性数据从第一云环境到第二云环境的传送使得与第二云环境的客户相关联的用户能够在第二云环境中访问可观察性数据。Thereafter, the process moves to step 1215, where the observability data collected from the first cloud environment is transmitted to the second cloud environment (e.g., to a resource group previously created in the second cloud environment for resources deployed in the first cloud environment). The transmission of the observability data from the first cloud environment to the second cloud environment enables users associated with customers of the second cloud environment to access the observability data in the second cloud environment.
现在转到图13,描绘了图示根据一些实施例的用于导出可观察性数据(例如,度量)的持续过程的泳道图。该泳道图描绘了服务连接器枢纽1301、度量处理器1303、多云服务控制平面1305、多云基础设施的数据存储库1307、第一云环境1309、第二云环境的身份系统1311和第二云环境的监视服务1313之间的交互。根据一些实施例,度量处理器1303是可观察性框架的组件,该度量处理器将(与部署在第一云环境中的资源相关联的)度量映射到第二云环境的度量。度量处理器1303是无服务器组件,其部署在适配器池(例如,图7的适配器池722E)中包括的每个适配器上。度量处理器1303还被配置为(基于客户凭证)检索适当的可观察性数据并在适当的目的地中(例如,在每资源实例化的适当资源组中)发布检索到的数据。Turning now to FIG. 13 , a swim lane diagram illustrating a continuous process for exporting observability data (e.g., metrics) according to some embodiments is depicted. The swim lane diagram depicts interactions between a service connector hub 1301, a metric processor 1303, a multi-cloud service control plane 1305, a data repository 1307 for a multi-cloud infrastructure, a first cloud environment 1309, an identity system 1311 for a second cloud environment, and a monitoring service 1313 for the second cloud environment. According to some embodiments, the metric processor 1303 is a component of the observability framework that maps metrics (associated with resources deployed in the first cloud environment) to metrics of the second cloud environment. The metric processor 1303 is a serverless component that is deployed on each adapter included in an adapter pool (e.g., adapter pool 722E of FIG. 7 ). The metric processor 1303 is also configured to retrieve appropriate observability data (based on customer credentials) and publish the retrieved data in an appropriate destination (e.g., in an appropriate resource group instantiated per resource).
图13中描绘的过程在步骤1中开始,其中SCH连接器枢纽1301触发对度量处理器1303的调用。度量处理器1303进而执行分组过程(在步骤2中),其中它基于与每个数据库相关联的标识符对所有资源(例如,数据库)进行分组。另外,在步骤3中,度量处理器1303(针对每个资源)将请求传输到多云服务控制平面1305,以获得与该资源对应的可观察性实例数据对象。要注意的是,该请求与由度量处理器1303执行的确定该资源是否是多云资源的检查对应。The process depicted in Figure 13 begins in step 1, where the SCH connector hub 1301 triggers a call to the metrics processor 1303. The metrics processor 1303 in turn performs a grouping process (in step 2), where it groups all resources (e.g., databases) based on an identifier associated with each database. Additionally, in step 3, the metrics processor 1303 transmits a request (for each resource) to the multi-cloud service control plane 1305 to obtain the observability instance data object corresponding to the resource. Note that this request corresponds to a check performed by the metrics processor 1303 to determine whether the resource is a multi-cloud resource.
在步骤4中,多云服务控制平面1305针对每个资源标识符检索存储在多云基础设施的数据存储库1307中的对应可观察性实例(OI)数据对象。在步骤6中,在步骤5中获得用于每个标识符的OI数据对象后,多云服务控制平面1305将(步骤5的)检索到的信息转发到度量处理器1303。在(基于资源的可观察性实例数据对象)核实特定资源是多云资源后,步骤7中的度量处理器将请求传输到多云服务控制平面1305以获得能够在第二云环境中使用的令牌。In step 4, the multi-cloud service control plane 1305 retrieves, for each resource identifier, a corresponding observability instance (OI) data object stored in the multi-cloud infrastructure data repository 1307. In step 6, after obtaining the OI data object for each identifier in step 5, the multi-cloud service control plane 1305 forwards the retrieved information (of step 5) to the metrics processor 1303. After verifying (based on the resource's observability instance data object) that the particular resource is a multi-cloud resource, the metrics processor in step 7 transmits a request to the multi-cloud service control plane 1305 to obtain a token that can be used in the second cloud environment.
进而,多云服务控制平面1305(在步骤8和步骤9中)获得与资源相关联并存储在例如第一云环境中客户的租赁的根隔间中的云-链路资源主体。在获得资源主体后,多云服务控制平面1305将请求传输到第二云环境1311的身份系统,以便获得能够在第二云环境中使用的令牌(例如,身份令牌)。要注意的是,身份令牌可以被用于将(从第一云环境获得的)度量信息发布到包括在第二云环境中的资源组中。如图13中所示,身份令牌由多云服务控制平面1305在步骤11中获得,并在步骤12中进一步转发到度量处理器1305。Furthermore, the multi-cloud service control plane 1305 (in steps 8 and 9) obtains a cloud-link resource principal associated with the resource and stored in, for example, a root compartment of a lease of a customer in a first cloud environment. After obtaining the resource principal, the multi-cloud service control plane 1305 transmits a request to the identity system of the second cloud environment 1311 to obtain a token (e.g., an identity token) that can be used in the second cloud environment. It should be noted that the identity token can be used to publish metric information (obtained from the first cloud environment) to a resource group included in the second cloud environment. As shown in Figure 13, the identity token is obtained by the multi-cloud service control plane 1305 in step 11 and further forwarded to the metric processor 1305 in step 12.
在一些实施方式中,度量处理器在步骤13中执行过滤操作。具体而言,过滤操作涉及过滤仅从多云资源获得的信息。在这样做时,度量处理器1303确保防止与带外数据库(即,非多云资源)有关的信息泄露到第二云环境。在步骤14中,在执行过滤操作后,度量处理器发布/传输与第一云环境中部署的每个资源有关的、要迁移到第二云环境的度量信息。在完成图13中所示的步骤1-14后,迭代重复该过程以执行导出一个或多个度量信息的持续过程。In some embodiments, the metric processor performs a filtering operation in step 13. Specifically, the filtering operation involves filtering information obtained only from multi-cloud resources. In doing so, the metric processor 1303 ensures that information related to the out-of-band database (i.e., non-multi-cloud resources) is prevented from leaking to the second cloud environment. In step 14, after performing the filtering operation, the metric processor publishes/transmits metric information related to each resource deployed in the first cloud environment to be migrated to the second cloud environment. After completing steps 1-14 shown in Figure 13, the process is iteratively repeated to perform an ongoing process of exporting one or more metric information.
此外,要注意的是,该过程可以在固定时间间隔之后重复,例如,每隔几分钟一次。而且,可以认识到的是,图12中描绘的可观察性框架和用于导出度量相关的可观察性数据的持续过程也可以被用于将数据平面事件相关数据从第一云环境导出到第二云环境。例如,可以在第一云环境中的客户租赁中创建一个或多个管理规则,以在包括在第二云环境中的资源组中的事件网格组件(例如,图11的组件1125)中收集和发布事件。该一个或多个事件可以包括诸如与服务相关联的资源的故障转移、在第一云环境中部署备份资源、与资源的容量相关联的关键事件(例如,数据库已满)等事件。Additionally, it is noted that the process can be repeated after fixed time intervals, for example, every few minutes. Moreover, it can be appreciated that the observability framework depicted in Figure 12 and the ongoing process for exporting metric-related observability data can also be used to export data plane event-related data from a first cloud environment to a second cloud environment. For example, one or more management rules can be created in a customer tenancy in the first cloud environment to collect and publish events in an event grid component (e.g., component 1125 of Figure 11) included in a resource group in the second cloud environment. The one or more events can include events such as failover of resources associated with the service, deployment of backup resources in the first cloud environment, critical events associated with the capacity of the resources (e.g., a database is full), and the like.
图14图示了根据一些实施例用于导出审计日志信息的另一个示例性可观察性框架。客户与多云控制台交互以对他们的多云资源执行控制平面操作。例如,客户可以执行诸如创建数据库、列出现有数据库或删除数据库等操作。此类操作生成审计日志。在一些实施方式中,审计日志将作为事件和作为可搜索日志而对客户可用。图14中描绘的可观察性框架使得能够将审计日志信息导出到客户的云环境。为了说明,图14是参考第一云环境1101进行描述的,该第一云环境向第二云环境1102的客户提供一个或多个服务。在这样的设置中,图14的可观察性框架使得能够将可观察性数据(例如,与客户对部署在第一云环境中的资源执行的操作对应的审计日志信息)传输到第二云环境。Figure 14 illustrates another exemplary observability framework for exporting audit log information according to some embodiments. Customers interact with the multi-cloud console to perform control plane operations on their multi-cloud resources. For example, customers can perform operations such as creating a database, listing existing databases, or deleting a database. Such operations generate audit logs. In some embodiments, the audit logs will be available to customers as events and as searchable logs. The observability framework depicted in Figure 14 enables the export of audit log information to the customer's cloud environment. For illustration, Figure 14 is described with reference to a first cloud environment 1101, which provides one or more services to customers of a second cloud environment 1102. In such a setting, the observability framework of Figure 14 enables observability data (e.g., audit log information corresponding to operations performed by customers on resources deployed in the first cloud environment) to be transmitted to the second cloud environment.
如图14中所示,包括在第一云环境1401中的可观察性框架包括云-链路适配器1403、多云服务控制平面1409、事件控制平面1413和客户租赁1411。在一些实施方式中,第二云环境1402的客户1405向多云控制台1410发出创建资源(例如,数据库资源)的请求。如前面参考图7所描述的,在部署资源之前,由云-链路适配器1403创建云-链路对象(即,链路-资源对象)。链路-资源对象包括将第一云环境中用户的租赁链接到第二云环境中用户的账户的信息。链路-资源对象使客户能够利用由第一云基础设施提供的服务。As shown in FIG. 14 , the observability framework included in the first cloud environment 1401 includes a cloud-link adapter 1403, a multi-cloud service control plane 1409, an event control plane 1413, and a customer lease 1411. In some embodiments, a customer 1405 of the second cloud environment 1402 issues a request to create a resource (e.g., a database resource) to the multi-cloud console 1410. As described above with reference to FIG. 7 , before the resources are deployed, a cloud-link object (i.e., a link-resource object) is created by the cloud-link adapter 1403. The link-resource object includes information linking the lease of a user in the first cloud environment to an account of a user in the second cloud environment. The link-resource object enables a customer to utilize services provided by the first cloud infrastructure.
响应于云-链路适配器1403建立第一云环境中客户的租赁与第二云环境中客户的账户之间的链接,云-链路适配器1403向多云服务控制平面1409传输发起将审计日志信息导出到第二云环境的工作流的请求。多云服务控制平面1409设立配置可观察性框架的多个组件(例如,事件控制平面1413)的工作流。在一些实施方式中,多云服务控制平面1109发起在事件控制平面1413中创建事件管理规则的工作流,其中管理规则与要在第一云环境中捕获的事件的类型对应。要注意的是,此类事件的被管理的规则是在云-链路适配器1403的租赁中被实例化的。In response to cloud-link adapter 1403 establishing a link between the customer's lease in the first cloud environment and the customer's account in the second cloud environment, cloud-link adapter 1403 transmits to multi-cloud service control plane 1409 a request to initiate a workflow to export audit log information to the second cloud environment. Multi-cloud service control plane 1409 sets up a workflow to configure multiple components of the observability framework (e.g., event control plane 1413). In some embodiments, multi-cloud service control plane 1109 initiates a workflow to create event management rules in event control plane 1413, where the management rules correspond to the types of events to be captured in the first cloud environment. Note that the managed rules for such events are instantiated in the lease of cloud-link adapter 1403.
另外,多云服务控制平面1109创建一个或多个访问策略,这些访问策略将与第一云环境中的客户租赁1411相关联。访问策略使多云服务能够根据被管理的规则处理(与客户相关联的)事件。以这种方式,(与客户有关的)审计日志信息在第一云环境中被捕获。In addition, the multi-cloud service control plane 1109 creates one or more access policies that will be associated with the customer lease 1411 in the first cloud environment. The access policies enable the multi-cloud service to handle events (associated with the customer) according to the managed rules. In this way, audit log information (related to the customer) is captured in the first cloud environment.
由多云服务控制平面1409发起的工作流进一步在第二云环境1402的客户租赁1415中实例化资源组1417。可以认识到的是,资源组1417是在第二云环境中按每云-链路实例(例如,按客户)实例化的。资源组1417包括以下组件:(i)分析工作区1421,其被配置为将所生成的数据平面事件存储为日志,以便它们是可搜索的,例如“数据库自动备份开始”或“自主数据库-关键”事件,以及(ii)事件网格组件1125,其被配置用于发布所有生成的数据平面事件,以便第二云环境的客户可以触发自动化。以这种方式,可观察性框架被设立以用于在第一云环境中收集与客户相关联的审计日志信息,并进一步将从第一云环境收集的审计日志信息传送到第二云环境(例如,经由高带宽网络链路)。通过这样做,使得与第二云环境的客户相关联的用户能够在第二云环境中访问可观察性数据(例如,审计日志信息)。The workflow initiated by the multi-cloud service control plane 1409 further instantiates a resource group 1417 in a customer tenancy 1415 in the second cloud environment 1402. It can be appreciated that the resource group 1417 is instantiated per cloud-link instance (e.g., per customer) in the second cloud environment. The resource group 1417 includes the following components: (i) an analysis workspace 1421 configured to store the generated data plane events as logs so that they are searchable, such as "database automatic backup started" or "autonomous database-critical" events, and (ii) an event grid component 1125 configured to publish all generated data plane events so that customers of the second cloud environment can trigger automation. In this way, the observability framework is set up to collect audit log information associated with customers in the first cloud environment, and further transmit the audit log information collected from the first cloud environment to the second cloud environment (e.g., via a high-bandwidth network link). By doing so, users associated with customers of the second cloud environment are enabled to access observability data (e.g., audit log information) in the second cloud environment.
图15描绘了图示根据一些实施例的用于导出审计日志信息的持续过程的泳道图。泳道图描绘了服务连接器枢纽1501、度量处理器1503、多云服务控制平面1505、多云基础设施的数据存储库1507、第二云环境中的分析工作区1509、第二云环境中的事件网格资源1511和重试流1513之间的交互。15 depicts a swim lane diagram illustrating an ongoing process for exporting audit log information according to some embodiments. The swim lane diagram depicts the interaction between a service connector hub 1501, a metrics processor 1503, a multi-cloud service control plane 1505, a data repository 1507 for a multi-cloud infrastructure, an analytics workspace 1509 in a second cloud environment, an event grid resource 1511 in a second cloud environment, and a retry flow 1513.
图15中描绘的过程在步骤1中开始,其中SCH连接器枢纽1501触发对度量处理器1503的调用。度量处理器1503进而执行分组过程(在步骤2中),其中它基于与每个客户相关联的云-链路的标识符对客户进行分组。另外,在步骤3中,度量处理器1503(针对每个客户的每个资源)将请求传输到多云服务控制平面1505,以获得与该资源对应的可观察性实例数据对象。要注意的是,该请求与度量处理器1503执行的确定该资源是否是多云资源的检查对应。The process depicted in Figure 15 begins in step 1, where the SCH connector hub 1501 triggers a call to the metrics processor 1503. The metrics processor 1503 in turn performs a grouping process (in step 2), where it groups customers based on the identifier of the cloud-link associated with each customer. Additionally, in step 3, the metrics processor 1503 transmits a request (for each resource of each customer) to the multi-cloud service control plane 1505 to obtain the observability instance data object corresponding to the resource. Note that this request corresponds to a check performed by the metrics processor 1503 to determine whether the resource is a multi-cloud resource.
在步骤4中,多云服务控制平面1505对于每个资源标识符检索对应的可观察性实例(OI)数据对象,该数据对象存储在多云基础设施的数据存储库1507中。在步骤6中,在步骤5中获得用于每个标识符的OI数据对象后,多云服务控制平面1505将(步骤5的)检索到的信息转发到度量处理器1503。在(基于资源的可观察性实例数据对象)核实特定资源是多云资源后,度量处理器1503在步骤7中向多云服务控制平面1305传输获得能够在第二云环境中使用的密钥的请求。In step 4, the multi-cloud service control plane 1505 retrieves the corresponding observability instance (OI) data object for each resource identifier, which is stored in the multi-cloud infrastructure data repository 1507. In step 6, after obtaining the OI data object for each identifier in step 5, the multi-cloud service control plane 1505 forwards the retrieved information (of step 5) to the metrics processor 1503. After verifying that the particular resource is a multi-cloud resource (based on the observability instance data object of the resource), the metrics processor 1503 transmits a request to the multi-cloud service control plane 1305 in step 7 to obtain a key that can be used in the second cloud environment.
进而,多云服务控制平面1505(在步骤8和步骤9中)从第二云环境中的分析工作区1509获得密钥。在获得密钥后,多云服务控制平面1505将(能够在第二云环境中使用的)密钥转发到度量处理器1503(步骤10)。在一些实施方式中,度量处理器在步骤11中执行过滤操作。具体而言,过滤操作涉及过滤掉非多云事件。在这样做时,度量处理器1503确保防止带外事件(即,与非多云资源相关的事件)泄漏到第二云环境。在步骤12中,在执行过滤操作后,度量处理器1503将第一云环境中发生的事件发布/传输到第二云环境。在步骤13中,度量处理器1503向重试流1513传输请求,以便重试任何未能传送到第二云环境的事件的传输。在完成如图15中描绘的步骤1-步骤13后,迭代地重复该过程,以执行导出审计信息的持续过程。此外,要注意的是,该过程可以在固定时间间隔之后重复,例如,每几十分钟一次。In turn, the multi-cloud service control plane 1505 obtains the key from the analysis workspace 1509 in the second cloud environment (in steps 8 and 9). After obtaining the key, the multi-cloud service control plane 1505 forwards the key (which can be used in the second cloud environment) to the metric processor 1503 (step 10). In some embodiments, the metric processor performs a filtering operation in step 11. Specifically, the filtering operation involves filtering out non-multi-cloud events. In doing so, the metric processor 1503 ensures that out-of-band events (i.e., events related to non-multi-cloud resources) are prevented from leaking to the second cloud environment. In step 12, after performing the filtering operation, the metric processor 1503 publishes/transmits the events that occurred in the first cloud environment to the second cloud environment. In step 13, the metric processor 1503 transmits a request to the retry stream 1513 to retry the transmission of any events that failed to be transmitted to the second cloud environment. After completing steps 1-13 as depicted in Figure 15, the process is iteratively repeated to perform a continuous process of exporting audit information. Furthermore, it is noted that this process may be repeated after fixed time intervals, for example, once every tens of minutes.
图形用户界面Graphical User Interface
如前面参考图7所描述的,多云控制台721为外部云环境(例如,第二云环境710)的用户提供网关,以便与包括在第一云环境720中的多云基础设施720B通信。经由控制台721,第二云环境710的用户可以在第一云环境的客户租赁中实例化资源(例如,数据库)。接下来,提供针对多云控制台生成的不同图形用户界面的描述。As described above with reference to FIG7 , the multi-cloud console 721 provides a gateway for users of an external cloud environment (e.g., the second cloud environment 710) to communicate with the multi-cloud infrastructure 720B included in the first cloud environment 720. Via the console 721, users of the second cloud environment 710 can instantiate resources (e.g., databases) in a customer tenancy of the first cloud environment. Next, a description of different graphical user interfaces generated for the multi-cloud console is provided.
多云基础设施720B向第二云环境710的用户提供由(第一云环境的)第一云基础设施提供的一个或多个服务。根据一些实施例,生成专门为第二云环境的用户设计的多云控制台,以便与第一云环境通信。因此,为多云控制台721生成/设计图形用户界面的目标是,图形用户界面应当为第二云环境的用户提供与由第二云环境提供的原生图形用户界面类似的外观和感觉。此外,可以认识到的是,图7的多云基础设施可以为由多个外部云服务提供商(例如,第二云服务提供商)提供的多个外部云环境(例如,第二云环境)中的每一个云环境生成并提供一组一个或多个图形用户界面。基于由外部云环境提供的原生图形用户界面,为多个外部云环境中的外部云环境生成一组一个或多个图形用户界面。另外,在接收到来自特定外部云环境的请求后,多云基础设施可以被配置为提供专门为该特定外部云环境生成的一个或多个图形用户界面。The multi-cloud infrastructure 720B provides one or more services provided by the first cloud infrastructure (of the first cloud environment) to the users of the second cloud environment 710. According to some embodiments, a multi-cloud console designed specifically for the users of the second cloud environment is generated to communicate with the first cloud environment. Therefore, the goal of generating/designing a graphical user interface for the multi-cloud console 721 is that the graphical user interface should provide a look and feel similar to the native graphical user interface provided by the second cloud environment to the users of the second cloud environment. In addition, it can be appreciated that the multi-cloud infrastructure of FIG. 7 can generate and provide a set of one or more graphical user interfaces for each of the multiple external cloud environments (e.g., the second cloud environment) provided by multiple external cloud service providers (e.g., the second cloud service provider). Based on the native graphical user interface provided by the external cloud environment, a set of one or more graphical user interfaces is generated for the external cloud environment in the multiple external cloud environments. In addition, after receiving a request from a specific external cloud environment, the multi-cloud infrastructure can be configured to provide one or more graphical user interfaces generated specifically for the specific external cloud environment.
为了生成用于多云控制台的提供与由原生图形用户界面(即,由外部云提供商提供的界面)类似的外观和感觉的图形用户界面,多云基础设施获得原生图形用户界面的设计规则。这些设计规则可以包括与原生图形用户界面的布局、原生图形用户界面中包括的文本信息的字体大小和/或原生图形用户界面的背景颜色有关的信息,等等。可以认识到的是,多云基础设施可以以多种方式获得与外部云服务提供商的原生图形用户界面相关联的设计规则。In order to generate a graphical user interface for the multi-cloud console that provides a look and feel similar to that provided by a native graphical user interface (i.e., an interface provided by an external cloud provider), the multi-cloud infrastructure obtains design rules of the native graphical user interface. These design rules may include information related to the layout of the native graphical user interface, the font size of text information included in the native graphical user interface, and/or the background color of the native graphical user interface, etc. It can be appreciated that the multi-cloud infrastructure can obtain design rules associated with the native graphical user interface of the external cloud service provider in a variety of ways.
例如,获得设计规则的一种方法可以与视觉分析技术对应,其中第一云环境的管理员可以视觉分析外部云环境的一个或多个原生图形用户界面,以得出与(一个或多个)原生图形用户界面的设计规则有关的信息。可替代地,在某些实施例中,第一云环境可以利用机器学习模型来自动得出与外部云环境的(一个或多个)原生图形用户界面的设计规则有关的信息。例如,可以利用机器学习视觉技术、自动工具(诸如web爬虫等)来自动识别(和提取)与外部云环境的原生图形用户界面相关联的GUI元素。提取出的设计规则信息可以由第一云环境的多云基础设施用来生成专门针对外部云环境的用户的一个或多个图形用户界面(例如,在为外部云环境生成的控制台上提供)。接下来,参考图16A-图16L,提供了为特定外部云环境生成的一组一个或多个图形用户界面的详细描述,例如,提供给为特定外部云环境设计的多云控制台。For example, a method of obtaining design rules may correspond to a visual analysis technique, wherein an administrator of a first cloud environment may visually analyze one or more native graphical user interfaces of an external cloud environment to derive information related to the design rules of (one or more) native graphical user interfaces. Alternatively, in some embodiments, the first cloud environment may utilize a machine learning model to automatically derive information related to the design rules of (one or more) native graphical user interfaces of an external cloud environment. For example, machine learning visual techniques, automatic tools (such as web crawlers, etc.) may be utilized to automatically identify (and extract) GUI elements associated with the native graphical user interface of an external cloud environment. The extracted design rule information may be used by the multi-cloud infrastructure of the first cloud environment to generate one or more graphical user interfaces specifically for users of the external cloud environment (e.g., provided on a console generated for the external cloud environment). Next, with reference to FIGS. 16A-16L, a detailed description of a set of one or more graphical user interfaces generated for a specific external cloud environment is provided, for example, provided to a multi-cloud console designed for a specific external cloud environment.
图16A描绘了为由外部云服务提供商提供的外部云环境生成的示例性图形用户界面。值得注意的是,可以为外部云环境生成一组一个或多个图形用户界面,其中图16A中描绘的图形用户界面是该组一个或多个图形用户界面中的第一图形用户界面。如前所述,该第一图形用户界面是基于与外部云环境的原生图形用户界面相关联的一个或多个设计规则生成的。这样做是为了使第一图形用户界面的视觉呈现类似于与外部云环境相关联的原生图形用户界面的视觉呈现。因此,为外部云环境的用户提供了熟悉的(GUI)使用。FIG. 16A depicts an exemplary graphical user interface generated for an external cloud environment provided by an external cloud service provider. It is noteworthy that a set of one or more graphical user interfaces can be generated for the external cloud environment, wherein the graphical user interface depicted in FIG. 16A is the first graphical user interface in the set of one or more graphical user interfaces. As previously described, the first graphical user interface is generated based on one or more design rules associated with the native graphical user interface of the external cloud environment. This is done to make the visual presentation of the first graphical user interface similar to the visual presentation of the native graphical user interface associated with the external cloud environment. Therefore, a familiar (GUI) use is provided for users of the external cloud environment.
如图16A中所示,第一图形用户界面1600包括名称标签1610“用于第一外部云环境的服务”。用户可以使用他/她的凭证登录到(与第一外部云环境相关联的)多云控制台。此类凭证1605可以显示在第一图形用户界面上的预定位置。可以认识到的是,用户的凭证信息是与第一外部云环境相关联的。另外,如图16A中所示,第一图形用户界面包括第一多个资源创建图标1607,每个图标与由第一云环境提供的特定服务对应。服务出售物包括创建资源(诸如自主数据库、Exadata数据库等)的选项。As shown in FIG. 16A , the first graphical user interface 1600 includes a name tag 1610 “Services for a first external cloud environment”. A user may log into the multi-cloud console (associated with the first external cloud environment) using his/her credentials. Such credentials 1605 may be displayed at a predetermined location on the first graphical user interface. It may be appreciated that the user's credential information is associated with the first external cloud environment. Additionally, as shown in FIG. 16A , the first graphical user interface includes a first plurality of resource creation icons 1607, each corresponding to a specific service provided by the first cloud environment. The service offerings include options to create resources such as autonomous databases, Exadata databases, and the like.
第一图形用户界面还包括第二多个导航图标1609,每个导航图标与管理与资源相关联的功能对应。导航图标包括:(i)部署——提供在部署过程中的资源的列表,(ii)计费图标——与提供管理用户账户计费相关事项的功能相关,(iii)订阅管理图标——与为用户提供管理他/她的账户的手段相关,以及(iv)支持图标——为用户提供提交支持票据的手段。此外,图形用户界面1600包括与由第一云环境提供的多个服务相关的一个或多个web链接1608。The first graphical user interface also includes a second plurality of navigation icons 1609, each corresponding to a function associated with managing resources. The navigation icons include: (i) deployment - providing a list of resources in the process of being deployed, (ii) billing icon - associated with providing functions for managing matters related to billing of a user's account, (iii) subscription management icon - associated with providing a means for a user to manage his/her account, and (iv) support icon - providing a means for a user to submit a support ticket. In addition, the graphical user interface 1600 includes one or more web links 1608 related to a plurality of services provided by the first cloud environment.
图16B描绘了与用户的(一个或多个)自主数据库资源相关的示例性图形用户界面。在点击(包括在图16A的多个服务1607中的)图标“自主数据库”后,将向用户呈现图16B中描绘的图形用户界面。如图16B中所示,图形用户界面1620的子名称标签1621是“自主数据库”。在这个图形用户界面中,为用户提供了多个选项1622,用于创建自主数据库、刷新与用户相关联的(一个或多个)自主数据库列表的显示、删除数据库的选项以及用于搜索特定数据库的搜索栏。另外,如图16B中所示,图形用户界面还列出了与该用户相关联的所有自主数据库1625。还可以显示与每个数据库相关联的元数据。可以认识到的是,元数据可以包括与数据库的名称、用户的订阅、资源所属的资源组、资源的位置信息以及资源的当前状态相关的信息。FIG. 16B depicts an exemplary graphical user interface associated with a user's (one or more) autonomous database resources. Upon clicking on the icon "Autonomous Database" (included in the plurality of services 1607 of FIG. 16A), the graphical user interface depicted in FIG. 16B will be presented to the user. As shown in FIG. 16B, the sub-name label 1621 of the graphical user interface 1620 is "Autonomous Database". In this graphical user interface, the user is provided with a plurality of options 1622 for creating an autonomous database, refreshing the display of the list of (one or more) autonomous databases associated with the user, the option to delete a database, and a search bar for searching for a particular database. In addition, as shown in FIG. 16B, the graphical user interface also lists all autonomous databases 1625 associated with the user. Metadata associated with each database may also be displayed. It will be appreciated that the metadata may include information related to the name of the database, the user's subscription, the resource group to which the resource belongs, the location information of the resource, and the current state of the resource.
图16C描绘了与为用户创建(一个或多个)自主数据库资源相关的示例性图形用户界面。在点击(包括在图16B的选项1622中的)图标“创建”后,可以向用户呈现图16C的图形用户界面。如图16C中所示,创建自主数据库图形用户界面1630包括多个选项卡1631,包括“基本”、“配置”、“联网”、“安全性”、“标签”和“审查+创建”。注意的是,这些选项卡与数据库的构造相关联。图形用户界面1630还包括项目详细信息部分1632,其提供与以下两者相关的细节:与第一外部云环境相关的构造1632A,以及与托管多云基础设施的第一云环境相关的构造1632B。根据一些实施例,多云基础设施的控制平面查询第一外部云环境的控制平面以及第一云环境的控制平面两者(例如,同时查询)以提供与第一外部云环境的构造1632A相关的信息(诸如订阅ID、资源组ID等),以及与第一云环境的构造1632B相关的信息(诸如用户的名称、部署的区域等)。FIG. 16C depicts an exemplary graphical user interface associated with creating (one or more) autonomous database resources for a user. Upon clicking the icon "Create" (included in option 1622 of FIG. 16B), the graphical user interface of FIG. 16C may be presented to the user. As shown in FIG. 16C, the create autonomous database graphical user interface 1630 includes a plurality of tabs 1631, including "Basic," "Configuration," "Networking," "Security," "Tags," and "Review + Create." Note that these tabs are associated with the construction of the database. The graphical user interface 1630 also includes a project details section 1632 that provides details associated with both: a construction 1632A associated with the first external cloud environment, and a construction 1632B associated with the first cloud environment hosting the multi-cloud infrastructure. According to some embodiments, the control plane of the multi-cloud infrastructure queries both the control plane of the first external cloud environment and the control plane of the first cloud environment (e.g., simultaneously) to provide information associated with the construction 1632A of the first external cloud environment (such as a subscription ID, a resource group ID, etc.), and information associated with the construction 1632B of the first cloud environment (such as the name of the user, the region of deployment, etc.).
转向图16D,描绘了图示根据一些实施例的资源(例如,自主数据库)的配置的图形用户界面1635。图形用户界面1635包括图形用户界面1635的标题或名称1637。可以认识到的是,在点击(包括在图16C的选项1631中的)“配置”选项卡后,将向用户呈现图16D中描绘的图形用户界面1635。如图16D中所示,配置屏幕捕获与工作负载的类型、CPU计数、数据库版本、数据库的名称(即,与数据库相关的参数)、数据库的存储容量以及与正在创建的资源相关的其他元数据信息相关的信息。图16E描绘了图示根据一些实施例的自主数据库的联网信息的另一个图形用户界面1638。在点击(包括在图16C的选项1631中的)“联网”选项卡后,将向用户呈现图16E中描绘的图形用户界面。此外,通过按下图16D的图形用户界面底部的“下一步”图标,用户可以被指引到图16E的图形用户界面1638。如图16E中所示,数据库的联网相关参数可以包括用于访问数据库的选项,例如,经由从任何地方进行安全访问(即,面向公共互联网的DB入口)或从允许的IP地址进行安全访问(例如,公共DB入口,这可能会限制某些IP地址)。联网相关信息还包括让客户必须进行认证才能访问数据库的选项(例如,选择要求认证的选项的图标)。Turning to FIG. 16D , a graphical user interface 1635 illustrating configuration of a resource (e.g., an autonomous database) in accordance with some embodiments is depicted. The graphical user interface 1635 includes a title or name 1637 of the graphical user interface 1635. It can be appreciated that upon clicking on the “Configuration” tab (included in option 1631 of FIG. 16C ), the graphical user interface 1635 depicted in FIG. 16D will be presented to the user. As shown in FIG. 16D , the configuration screen captures information related to the type of workload, CPU count, database version, name of the database (i.e., parameters related to the database), storage capacity of the database, and other metadata information related to the resource being created. FIG. 16E depicts another graphical user interface 1638 illustrating networking information for an autonomous database in accordance with some embodiments. Upon clicking on the “Networking” tab (included in option 1631 of FIG. 16C ), the graphical user interface depicted in FIG. 16E will be presented to the user. In addition, by pressing the “Next” icon at the bottom of the graphical user interface of FIG. 16D , the user can be directed to the graphical user interface 1638 of FIG. 16E . As shown in FIG. 16E , the networking-related parameters of the database may include options for accessing the database, such as via secure access from anywhere (i.e., a DB portal facing the public Internet) or secure access from an allowed IP address (e.g., a public DB portal, which may restrict certain IP addresses). The networking-related information also includes an option for requiring a client to authenticate before accessing the database (e.g., selecting an icon for an option requiring authentication).
图16F描绘了图示根据一些实施例的自主数据库的安全性相关信息的图形用户界面1641。在点击(包括在图16C的选项1631中的)“安全性”选项卡后,向用户呈现图16F中描绘的图形用户界面1641。此外,通过按下图16E的图形用户界面底部的“下一步”图标,用户可以被指引到图16F的图形用户界面。图16F中描绘的图形用户界面包括登录凭证1642,例如,用户名和密码框,供用户输入相关登录信息以访问资源。图16G描绘了图示与资源相关联的标签信息的另一个图形用户界面1645。在一些实施方式中,标签是名称/值对,例如,使得能够进行资源分类并提供跨资源的合并视图的名称-值对1646。例如,可以为组织的部门(例如,人力资源部门)创建标签,并且可以基于与该部门相关联的标签来合并来自该部门的所有账单/发票。FIG. 16F depicts a graphical user interface 1641 illustrating security-related information of an autonomous database according to some embodiments. Upon clicking the “Security” tab (included in option 1631 of FIG. 16C ), the graphical user interface 1641 depicted in FIG. 16F is presented to the user. In addition, by pressing the “Next” icon at the bottom of the graphical user interface of FIG. 16E , the user can be directed to the graphical user interface of FIG. 16F . The graphical user interface depicted in FIG. 16F includes login credentials 1642 , e.g., a username and password box, for the user to enter relevant login information to access the resource. FIG. 16G depicts another graphical user interface 1645 illustrating tag information associated with a resource. In some embodiments, a tag is a name/value pair, e.g., a name-value pair 1646 that enables resource classification and provides a consolidated view across resources. For example, tags can be created for a department of an organization (e.g., a human resources department), and all bills/invoices from the department can be consolidated based on the tags associated with the department.
图16H描绘了图示自主数据库的摘要信息的另一个图形用户界面1651。具体而言,图16H提供了与图16C的几个选项1631相关的信息。图16G的图形用户界面中描绘的信息包括如上文参考图16B-图16G所述的资源的每个选项的细节(例如,基本信息、配置信息、联网信息、安全性信息、标签信息等)。在成功审查图16H中描绘的图形用户界面1651上的信息后,用户可以通过利用位于图形用户界面1651底部的创建图标来发起资源的创建。FIG16H depicts another graphical user interface 1651 illustrating summary information of an autonomous database. Specifically, FIG16H provides information related to several options 1631 of FIG16C. The information depicted in the graphical user interface of FIG16G includes details of each option of the resource as described above with reference to FIG16B-FIG16G (e.g., basic information, configuration information, networking information, security information, tag information, etc.). After successfully reviewing the information on the graphical user interface 1651 depicted in FIG16H, the user can initiate the creation of the resource by utilizing the create icon located at the bottom of the graphical user interface 1651.
在创建数据库后(例如,经由按下图16H中的创建图标),将向用户提供图16I的图形用户界面1655。如图16I中所示,图形用户界面1655描绘了与数据库的创建状态相关的元数据信息1656。在一个示例中,如图16I中所示,状态被描绘为“供应”,以及用于两个云环境(例如,第一云环境(诸如Oracle的OCI)和第一外部云环境(例如,Microsoft的Azure云环境))的信息。具体而言,1656中包括的信息包括来自两个云环境的构造。例如,如图16I中所示,元数据信息包括自动缩放特征,其与要分配给正在创建的数据库资源的CPU数量对应。After the database is created (e.g., via pressing the create icon in FIG. 16H ), the user will be provided with the graphical user interface 1655 of FIG. 16I . As shown in FIG. 16I , the graphical user interface 1655 depicts metadata information 1656 related to the creation state of the database. In one example, as shown in FIG. 16I , the state is depicted as "provisioning," along with information for two cloud environments (e.g., a first cloud environment (such as Oracle's OCI) and a first external cloud environment (e.g., Microsoft's Azure cloud environment)). Specifically, the information included in 1656 includes configurations from the two cloud environments. For example, as shown in FIG. 16I , the metadata information includes an auto-scaling feature that corresponds to the number of CPUs to be allocated to the database resources being created.
此外,图16I的图形用户界面1655包括与资源相关联的连接字符串相关的进一步元数据信息。在一些实施方式中,连接字符串与部署在第一云环境中的资源所关联的web链接对应。连接字符串使得与第一外部云环境中的客户租赁相关联的用户能够从第一外部云环境访问(部署在第一云环境中的)资源。如图16I中所示,由于数据库处于被供应状态,因此连接字符串元数据信息暂时为空白。在创建资源后,并且如图16J中所示,连接字符串元数据信息将填充与所创建的资源对应的web链接。In addition, the graphical user interface 1655 of FIG. 16I includes further metadata information related to the connection string associated with the resource. In some embodiments, the connection string corresponds to a web link associated with the resource deployed in the first cloud environment. The connection string enables users associated with the customer tenancy in the first external cloud environment to access the resource (deployed in the first cloud environment) from the first external cloud environment. As shown in FIG. 16I, the connection string metadata information is temporarily blank because the database is in a provisioned state. After the resource is created, and as shown in FIG. 16J, the connection string metadata information will be populated with the web link corresponding to the created resource.
图16J描绘了图示根据一些实施例在创建资源时显示的信息的图形用户界面。如图16J中所示,资源的状态在元数据信息部分1663中被描绘为“活动”。此外,元数据信息部分1665包括与资源相关的连接字符串信息。另外,如图16J中描绘的图形用户界面包括显示在图形用户界面左侧的面板1666。面板1666包括多个选项卡,包括“概述”选项卡、“标签设置”选项卡、“联网资源”选项卡和“备份”选项卡。在点击备份选项卡后,可以向用户提供新创建的资源的备份资源的列表。FIG. 16J depicts a graphical user interface illustrating information displayed when creating a resource according to some embodiments. As shown in FIG. 16J , the status of the resource is depicted as “active” in metadata information section 1663. In addition, metadata information section 1665 includes connection string information associated with the resource. In addition, the graphical user interface as depicted in FIG. 16J includes panel 1666 displayed on the left side of the graphical user interface. Panel 1666 includes multiple tabs, including an “Overview” tab, a “Tag Settings” tab, a “Networking Resources” tab, and a “Backup” tab. After clicking the Backup tab, a list of backup resources for the newly created resource can be provided to the user.
图16K描绘了图示与新创建/供应的资源对应的仪表板应用的创建的示例性图形用户界面1671。在一些实施方式中,仪表板应用在第一外部云环境中创建并与工作区对应,在该工作区中,可以监视(部署在第一云环境中的)资源并快速启动日常操作的任务(例如,设置与资源使用情况相关的警报、与资源的故障转移相关的警报等)。根据一些实施例,在创建资源(例如,数据库)后,调用第一外部云环境的API来为新创建的资源创建仪表板应用。在一些实施方式中,仪表板是只读仪表板并包括与客户相关的信息。例如,如图16K中所示,与资源相关联的连接字符串信息1672被插入到这个API中,从而为另一个云环境(例如,第一外部云环境)的客户提供访问部署在第一云环境中的资源的灵活性,而无需访问与第一云环境相关联的构造/凭证。FIG. 16K depicts an exemplary graphical user interface 1671 illustrating the creation of a dashboard application corresponding to a newly created/provisioned resource. In some embodiments, a dashboard application is created in a first external cloud environment and corresponds to a workspace in which resources (deployed in the first cloud environment) can be monitored and tasks for daily operations (e.g., setting alarms related to resource usage, alarms related to failover of resources, etc.) can be quickly initiated. According to some embodiments, after creating a resource (e.g., a database), an API of the first external cloud environment is called to create a dashboard application for the newly created resource. In some embodiments, the dashboard is a read-only dashboard and includes information related to the customer. For example, as shown in FIG. 16K, connection string information 1672 associated with a resource is inserted into this API, thereby providing customers of another cloud environment (e.g., the first external cloud environment) with the flexibility to access resources deployed in the first cloud environment without having to access the structures/credentials associated with the first cloud environment.
转到图16L,该图描绘了图示与新创建的资源相关联的一个或多个度量的显示的另一个示例性图形用户界面1680。根据一些实施例,在所构造的仪表板应用中显示与新创建的资源的性能相关联的几个度量(例如,执行计数、平均CPU利用率、事务计数等)。例如,如图16L中所示,在图形用户界面1680中针对一个或多个度量中的每一个显示了曲线图1671、1673和1675。在一些实施方式中,每个度量可以显示在单独的显示窗口/窗格中(如图16L中所示),其中窗口与过滤器1677(显示在窗口的左上角)相关联,其中过滤器用于基于用户输入来配置度量的显示,例如,配置由用户选择的某个时间段内的度量的显示。Turning to FIG. 16L , another exemplary graphical user interface 1680 illustrating the display of one or more metrics associated with the newly created resource is depicted. According to some embodiments, several metrics associated with the performance of the newly created resource (e.g., execution count, average CPU utilization, transaction count, etc.) are displayed in the constructed dashboard application. For example, as shown in FIG. 16L , graphs 1671 , 1673 , and 1675 are displayed in the graphical user interface 1680 for each of the one or more metrics. In some implementations, each metric can be displayed in a separate display window/pane (as shown in FIG. 16L ), where the window is associated with a filter 1677 (displayed in the upper left corner of the window), where the filter is used to configure the display of the metric based on user input, for example, to configure the display of the metric for a certain time period selected by the user.
转到图17,描绘了图示根据某些实施例的在生成用于多云控制台的示例性图形用户界面时执行的过程的流程图。图17中描绘的过程可以在由相应系统的一个或多个处理单元(例如,处理器、核心)执行的软件(例如,代码、指令、程序)中、使用硬件或其组合实现。软件可以存储在非暂态存储介质上(例如,存储器设备上)。图17中呈现的和下面描述的方法旨在是说明性和非限制性的。虽然图17描绘了以特定顺序或次序发生的各种处理步骤,但这并不旨在限制。在某些替代实施例中,这些步骤可以以某种不同的次序执行,或者一些步骤也可以并行执行。Turning to Figure 17, a flowchart illustrating a process performed when generating an exemplary graphical user interface for a multi-cloud console according to certain embodiments is depicted. The process depicted in Figure 17 can be implemented in software (e.g., code, instructions, programs) executed by one or more processing units (e.g., processors, cores) of the corresponding system, using hardware or a combination thereof. The software can be stored on a non-transitory storage medium (e.g., on a memory device). The methods presented in Figure 17 and described below are intended to be illustrative and non-limiting. Although Figure 17 depicts various processing steps occurring in a particular order or sequence, this is not intended to be limiting. In some alternative embodiments, these steps may be performed in a different order, or some steps may also be performed in parallel.
图17中描绘的过程在步骤1710中开始,其中由第一云服务提供商提供的第一云环境中包括的多云基础设施为由多个外部云服务提供商提供的多个外部云环境中的每一个云环境生成一组一个或多个图形用户界面。例如,参考图7,包括在第一云环境720中的多云基础设施720B为外部云环境(例如,图7的第二云环境710)生成一个或多个图形用户界面(如图16A-图16L中所描绘的)。可以认识到的是,用于外部云环境的一组一个或多个图形用户界面是基于由该外部云环境提供的原生图形用户界面生成的。这样做是为了向第二云环境的用户提供与由第二云环境的原生图形用户界面(例如,与图7的第二云门户711相关联的原生图形用户界面)类似的外观和感觉。The process depicted in FIG. 17 begins in step 1710, where a multi-cloud infrastructure included in a first cloud environment provided by a first cloud service provider generates a set of one or more graphical user interfaces for each of a plurality of external cloud environments provided by a plurality of external cloud service providers. For example, with reference to FIG. 7 , a multi-cloud infrastructure 720B included in a first cloud environment 720 generates one or more graphical user interfaces (as depicted in FIG. 16A-FIG. 16L) for an external cloud environment (e.g., a second cloud environment 710 of FIG. 7 ). It can be appreciated that a set of one or more graphical user interfaces for an external cloud environment is generated based on a native graphical user interface provided by the external cloud environment. This is done to provide a user of the second cloud environment with a look and feel similar to that provided by a native graphical user interface of the second cloud environment (e.g., a native graphical user interface associated with the second cloud portal 711 of FIG. 7 ).
随后,该过程进行到步骤1715,其中响应于第一云环境接收到(从第一外部云环境传输的)请求,提供对该请求的响应。响应可以包括来自为第一外部云环境生成的一组一个或多个图形用户界面的第一图形用户界面(例如,图16A的图形用户界面)。在一些实施方式中,经由可以在控制台(例如,图7的多云控制台721)上显示的第一图形用户界面,第一外部云环境(例如,图7的第二云环境720)的用户可以对部署在第一云环境中的一个或多个资源进行创建、管理、更新、删除,等等。换句话说,第一外部云环境的用户可以管理部署在第一云环境中的资源,而无需显式地记住或使用第一云环境的任何凭证。Subsequently, the process proceeds to step 1715, where, in response to the first cloud environment receiving the request (transmitted from the first external cloud environment), a response to the request is provided. The response may include a first graphical user interface (e.g., the graphical user interface of FIG. 16A ) from a set of one or more graphical user interfaces generated for the first external cloud environment. In some embodiments, via a first graphical user interface that can be displayed on a console (e.g., the multi-cloud console 721 of FIG. 7 ), a user of the first external cloud environment (e.g., the second cloud environment 720 of FIG. 7 ) can create, manage, update, delete, and the like one or more resources deployed in the first cloud environment. In other words, a user of the first external cloud environment can manage resources deployed in the first cloud environment without explicitly remembering or using any credentials of the first cloud environment.
云基础设施的示例Examples of cloud infrastructure
如以上所指出的,基础设施即服务(IaaS)是一种特定类型的云计算。IaaS可以被配置为通过公共网络(例如,互联网)提供虚拟化计算资源。在IaaS模型中,云计算提供商可以托管基础设施组件(例如,服务器、存储设备、网络节点(例如,硬件)、部署软件、平台虚拟化(例如,管理程序层)等)。在一些情况下,IaaS提供商还可以提供各种服务来伴随这些基础设施组件(例如,计费、监视、记载、安全性、负载平衡和聚类等)。因此,由于这些服务可能是策略驱动的,因此IaaS用户可以能够实现策略来驱动负载平衡,以维持应用的可用性和性能。As noted above, Infrastructure as a Service (IaaS) is a specific type of cloud computing. IaaS can be configured to provide virtualized computing resources over a public network (e.g., the Internet). In the IaaS model, a cloud computing provider can host infrastructure components (e.g., servers, storage devices, network nodes (e.g., hardware), deployment software, platform virtualization (e.g., hypervisor layer), etc.). In some cases, IaaS providers can also provide various services to accompany these infrastructure components (e.g., billing, monitoring, logging, security, load balancing, and clustering, etc.). Therefore, since these services may be policy-driven, IaaS users may be able to implement policies to drive load balancing to maintain the availability and performance of applications.
在一些情况下,IaaS客户可以通过诸如互联网之类的广域网(WAN)访问资源和服务,并且可以使用云提供商的服务来安装应用栈的剩余元素。例如,用户可以登录到IaaS平台以创建虚拟机(VM)、在每个VM上安装操作系统(OS)、部署诸如数据库之类的中间件、为工作负载和备份创建存储桶、甚至将企业软件安装到那个VM中。然后,客户可以使用提供商的服务来执行各种功能,包括平衡网络流量、解决应用问题、监视性能、管理灾难恢复等。In some cases, IaaS customers can access resources and services over a wide area network (WAN) such as the Internet, and can use the cloud provider's services to install the remaining elements of the application stack. For example, a user can log in to the IaaS platform to create a virtual machine (VM), install an operating system (OS) on each VM, deploy middleware such as a database, create storage buckets for workloads and backups, and even install enterprise software into that VM. The customer can then use the provider's services to perform a variety of functions, including balancing network traffic, troubleshooting application problems, monitoring performance, managing disaster recovery, and more.
在大多数情况下,云计算模型将需要云提供商的参与。云提供商可以但不一定是专门提供(例如,提供、出租、销售)IaaS的第三方服务。实体也可能选择部署私有云,从而成为其自己的基础设施服务提供商。In most cases, the cloud computing model will require the involvement of a cloud provider. A cloud provider may, but need not, specialize in (e.g., provide, rent, sell) third-party IaaS services. An entity may also choose to deploy a private cloud, thereby becoming its own infrastructure service provider.
在一些示例中,IaaS部署是将新应用或应用的新版本放置到准备好的应用服务器等上的处理。它还可以包括准备服务器(例如,安装库、守护进程等)的处理。这通常由云提供商管理,位于管理程序层之下(例如,服务器、存储装置、网络硬件和虚拟化)。因此,客户可以负责处理(OS)、中间件和/或应用部署(例如,在(例如,可以按需启动的)自助服务虚拟机等上)。In some examples, IaaS deployment is the process of placing a new application or a new version of an application onto a prepared application server, etc. It may also include the process of preparing the server (e.g., installing libraries, daemons, etc.). This is typically managed by the cloud provider, below the hypervisor layer (e.g., servers, storage, network hardware, and virtualization). Thus, the customer may be responsible for handling (OS), middleware, and/or application deployment (e.g., on a self-service virtual machine (e.g., that can be started on demand), etc.).
在一些示例中,IaaS供应可以指获取计算机或虚拟主机以供使用,甚至在它们上安装所需的库或服务。大多数情况下,部署不包括供应,并且供应可能需要被首先执行。In some examples, IaaS provisioning can refer to obtaining computers or virtual hosts for use, and even installing required libraries or services on them. In most cases, deployment does not include provisioning, and provisioning may need to be performed first.
在一些情况下,IaaS供应存在两个不同的问题。首先,在任何东西运行之前供应初始基础设施集存在最初的挑战。其次,一旦所有东西已被供应,就存在演进现有基础设施(例如,添加新服务、更改服务、移除服务等)的挑战。在一些情况下,可以通过启用以声明方式定义基础设施的配置来解决这两个挑战。换句话说,基础设施(例如,需要哪些组件以及它们如何交互)可以由一个或多个配置文件来定义。因此,基础设施的总体拓扑(例如,哪些资源依赖于哪些资源,以及它们如何协同工作)可以以声明的方式描述。在一些情况下,一旦定义了拓扑,就可以生成创建和/或管理配置文件中描述的不同组件的工作流。In some cases, there are two distinct problems with IaaS provisioning. First, there is the initial challenge of provisioning the initial set of infrastructure before anything is running. Second, once everything has been provisioned, there is the challenge of evolving the existing infrastructure (e.g., adding new services, changing services, removing services, etc.). In some cases, both of these challenges can be addressed by enabling configuration that defines the infrastructure in a declarative manner. In other words, the infrastructure (e.g., which components are required and how they interact) can be defined by one or more configuration files. Thus, the overall topology of the infrastructure (e.g., which resources depend on which resources, and how they work together) can be described in a declarative manner. In some cases, once the topology is defined, workflows can be generated to create and/or manage the different components described in the configuration files.
在一些示例中,基础设施可以具有许多互连的元素。例如,可能存在一个或多个虚拟私有云(VPC)(例如,可配置的和/或共享的计算资源的潜在按需池),也称为核心网络。在一些示例中,还可以供应一个或多个安全性组规则以定义如何设置网络的安全性以及一个或多个虚拟机(VM)。也可以供应其他基础设施元素,诸如负载平衡器、数据库等。随着期望和/或添加越来越多的基础设施元素,基础设施可以逐步演进。In some examples, the infrastructure may have many interconnected elements. For example, there may be one or more virtual private clouds (VPCs) (e.g., a potential on-demand pool of configurable and/or shared computing resources), also referred to as a core network. In some examples, one or more security group rules may also be provisioned to define how to set up security for the network and one or more virtual machines (VMs). Other infrastructure elements may also be provisioned, such as load balancers, databases, etc. The infrastructure may evolve gradually as more and more infrastructure elements are desired and/or added.
在一些情况下,可以采用连续部署技术来使得能够跨各种虚拟计算环境部署基础设施代码。此外,所描述的技术可以使得能够在这些环境内进行基础设施管理。在一些示例中,服务团队可以编写期望部署到一个或多个但通常许多个不同的生产环境(例如,跨各种不同的地理位置,有时跨越整个世界)的代码。但是,在一些示例中,必须首先设立将在其上部署代码的基础设施。在一些情况下,供应可以手动完成,可以利用供应工具供应资源,和/或一旦供应基础设施就可以利用部署工具部署代码。In some cases, continuous deployment techniques can be employed to enable deployment of infrastructure code across various virtual computing environments. In addition, the described techniques can enable infrastructure management within these environments. In some examples, a service team can write code that is expected to be deployed to one or more but typically many different production environments (e.g., across various geographic locations, sometimes across the world). However, in some examples, the infrastructure on which the code will be deployed must first be established. In some cases, provisioning can be done manually, resources can be provisioned using provisioning tools, and/or code can be deployed using deployment tools once the infrastructure is provisioned.
图18是图示根据至少一个实施例的IaaS体系架构的示例模式的框图1800。服务运营商1802可以通信地耦合到可以包括虚拟云网络(VCN)1806和安全主机子网1808的安全主机租赁1804。在一些示例中,服务运营商1802可以使用一个或多个客户端计算设备,其可以是便携式手持设备(例如,蜂窝电话、计算平板、个人数字助理(PDA))或可穿戴设备(例如,Google 头戴式显示器),运行软件(诸如Microsoft Windows)和/或各种移动操作系统(诸如iOS、Windows Phone、Android、BlackBerry 8、Palm OS等),并且支持互联网、电子邮件、短消息服务(SMS)、或其他通信协议。替代地,客户端计算设备可以是通用个人计算机,包括例如运行各种版本的Microsoft Apple 和/或Linux操作系统的个人计算机和/或膝上型计算机。客户端计算设备可以是运行各种商业上可获得的或类UNIX操作系统,包括但不限于各种GNU/Linux操作系统(诸如例如Google Chrome OS)中的任何一种的工作站计算机。替代地或附加地,客户端计算设备可以是任何其他电子设备,诸如瘦客户端计算机、支持互联网的游戏系统(例如,具有或不具有手势输入设备的Microsoft Xbox游戏控制台),和/或能够通过可以访问VCN 1806和/或互联网的网络进行通信的个人消息传递设备。18 is a block diagram 1800 illustrating an example schema of an IaaS architecture in accordance with at least one embodiment. A service operator 1802 can be communicatively coupled to a secure host lease 1804 that can include a virtual cloud network (VCN) 1806 and a secure host subnet 1808. In some examples, the service operator 1802 can use one or more client computing devices, which can be portable handheld devices (e.g., Cellular phone, computing tablets, personal digital assistants (PDAs), or wearable devices (e.g., Google head mounted display), running software such as Microsoft Windows ) and/or various mobile operating systems (such as iOS, Windows Phone, Android, BlackBerry 8, Palm OS, etc.), and supports Internet, email, short message service (SMS), or other communication protocols. Alternatively, the client computing device may be a general-purpose personal computer, including, for example, a computer running various versions of Microsoft Apple The client computing device may be a personal computer and/or laptop computer running various commercially available or UNIX-like operating systems, including but not limited to any of the various GNU/Linux operating systems (such as, for example, Google Chrome OS). Alternatively or additionally, the client computing device may be any other electronic device, such as a thin client computer, an Internet-enabled gaming system (e.g., with or without gesture input device), and/or a personal messaging device capable of communicating over a network that can access VCN 1806 and/or the Internet.
VCN 1806可以包括本地对等网关(LPG)1810,其可以经由包含在SSH VCN 1812中的LPG 1810通信地耦合到安全壳(SSH)VCN 1812。SSH VCN 1812可以包括SSH子网1814,并且SSH VCN 1812可以经由包含在控制平面VCN 1816中的LPG 1810通信地耦合到控制平面VCN 1816。而且,SSH VCN 1812可以经由LPG 1810通信地耦合到数据平面VCN 1818。控制平面VCN 1816和数据平面VCN 1818可以包含在可以由IaaS提供商拥有和/或操作的服务租赁1819中。VCN 1806 may include a local peer gateway (LPG) 1810, which may be communicatively coupled to a secure shell (SSH) VCN 1812 via LPG 1810 contained in SSH VCN 1812. SSH VCN 1812 may include an SSH subnet 1814, and SSH VCN 1812 may be communicatively coupled to control plane VCN 1816 via LPG 1810 contained in control plane VCN 1816. Also, SSH VCN 1812 may be communicatively coupled to data plane VCN 1818 via LPG 1810. Control plane VCN 1816 and data plane VCN 1818 may be contained in a service lease 1819, which may be owned and/or operated by an IaaS provider.
控制平面VCN 1816可以包括充当外围网络(例如,公司内部网和外部网络之间的公司网络的部分)的控制平面非军事区(DMZ)层1820。基于DMZ的服务器可以承担有限责任并有助于控制安全性漏洞。此外,DMZ层1820可以包括一个或多个负载平衡器(LB)子网1822、可以包括(一个或多个)应用子网1826的控制平面应用层1824、可以包括(一个或多个)数据库(DB)子网1830(例如,(一个或多个)前端DB子网和/或(一个或多个)后端DB子网)的控制平面数据层1828。包含在控制平面DMZ层1820中的(一个或多个)LB子网1822可以通信地耦合到包含在控制平面应用层1824中的(一个或多个)应用子网1826和可以包含在控制平面VCN 1816中的互联网网关1834,并且(一个或多个)应用子网1826可以通信地耦合到包含在控制平面数据层1828中的(一个或多个)DB子网1830以及服务网关1836和网络地址转换(NAT)网关1838。控制平面VCN 1816可以包括服务网关1836和NAT网关1838。The control plane VCN 1816 may include a control plane demilitarized zone (DMZ) layer 1820 that acts as a perimeter network (e.g., a portion of a corporate network between a corporate intranet and an external network). DMZ-based servers may have limited liability and help control security vulnerabilities. In addition, the DMZ layer 1820 may include one or more load balancer (LB) subnets 1822, a control plane application layer 1824 that may include (one or more) application subnets 1826, and a control plane data layer 1828 that may include (one or more) database (DB) subnets 1830 (e.g., (one or more) front-end DB subnets and/or (one or more) back-end DB subnets). The LB subnet(s) 1822 included in the control plane DMZ layer 1820 may be communicatively coupled to the application subnet(s) 1826 included in the control plane application layer 1824 and the Internet gateway 1834 that may be included in the control plane VCN 1816, and the application subnet(s) 1826 may be communicatively coupled to the DB subnet(s) 1830 included in the control plane data layer 1828 and the service gateway 1836 and the network address translation (NAT) gateway 1838. The control plane VCN 1816 may include the service gateway 1836 and the NAT gateway 1838.
控制平面VCN 1816可以包括数据平面镜像应用层1840,其可以包括(一个或多个)应用子网1826。包含在数据平面镜像应用层1840中的(一个或多个)应用子网1826可以包括可以执行计算实例1844的虚拟网络接口控制器(VNIC)1842。计算实例1844可以将数据平面镜像应用层1840的(一个或多个)应用子网1826通信地耦合到可以包含在数据平面应用层1846中的(一个或多个)应用子网1826。The control plane VCN 1816 may include a data plane mirror application layer 1840, which may include application subnet(s) 1826. The application subnet(s) 1826 contained in the data plane mirror application layer 1840 may include a virtual network interface controller (VNIC) 1842 that may execute a compute instance 1844. The compute instance 1844 may communicatively couple the application subnet(s) 1826 of the data plane mirror application layer 1840 to the application subnet(s) 1826 that may be contained in the data plane application layer 1846.
数据平面VCN 1818可以包括数据平面应用层1846、数据平面DMZ层1848和数据平面数据层1850。数据平面DMZ层1848可以包括(一个或多个)LB子网1822,其可以通信地耦合到数据平面应用层1846的(一个或多个)应用子网1826和数据平面VCN 1818的互联网网关1834。(一个或多个)应用子网1826可以通信地耦合到数据平面VCN 1818的服务网关1836和数据平面VCN 1818的NAT网关1838。数据平面数据层1850还可以包括可以通信地耦合到数据平面应用层1846的(一个或多个)应用子网1826的(一个或多个)DB子网1830。The data plane VCN 1818 may include a data plane application layer 1846, a data plane DMZ layer 1848, and a data plane data layer 1850. The data plane DMZ layer 1848 may include (one or more) LB subnets 1822, which may be communicatively coupled to (one or more) application subnets 1826 of the data plane application layer 1846 and an Internet gateway 1834 of the data plane VCN 1818. The (one or more) application subnets 1826 may be communicatively coupled to a service gateway 1836 of the data plane VCN 1818 and a NAT gateway 1838 of the data plane VCN 1818. The data plane data layer 1850 may also include (one or more) DB subnets 1830, which may be communicatively coupled to (one or more) application subnets 1826 of the data plane application layer 1846.
控制平面VCN 1816和数据平面VCN 1818的互联网网关1834可以通信地耦合到元数据管理服务1852,元数据管理服务1852可以通信地耦合到公共互联网1854。公共互联网1854可以通信地耦合到控制平面VCN 1816和数据平面VCN 1818的NAT网关1838。控制平面VCN 1816和数据平面VCN 1818的服务网关1836可以通信地耦合到云服务1856。The internet gateway 1834 of the control plane VCN 1816 and the data plane VCN 1818 may be communicatively coupled to the metadata management service 1852, and the metadata management service 1852 may be communicatively coupled to the public Internet 1854. The public Internet 1854 may be communicatively coupled to the NAT gateway 1838 of the control plane VCN 1816 and the data plane VCN 1818. The service gateway 1836 of the control plane VCN 1816 and the data plane VCN 1818 may be communicatively coupled to the cloud service 1856.
在一些示例中,控制平面VCN 1816或数据平面VCN 1818的服务网关1836可以对云服务1856进行应用编程接口(API)调用,而无需通过公共互联网1854。从服务网关1836到云服务1856的API调用可以是单向的:服务网关1836可以对云服务1856进行API调用,并且云服务1856可以将请求的数据发送到服务网关1836。但是,云服务1856可以不发起对服务网关1836的API调用。In some examples, service gateway 1836 of control plane VCN 1816 or data plane VCN 1818 can make application programming interface (API) calls to cloud services 1856 without going through public internet 1854. API calls from service gateway 1836 to cloud services 1856 can be one-way: service gateway 1836 can make API calls to cloud services 1856, and cloud services 1856 can send requested data to service gateway 1836. However, cloud services 1856 may not initiate API calls to service gateway 1836.
在一些示例中,安全主机租赁1804可以直接连接到服务租赁1819,服务租赁1819否则可以被隔离。安全主机子网1808可以通过LPG 1810与SSH子网1814通信,LPG 1810可以使得能够在以其它方式隔离的系统上进行双向通信。将安全主机子网1808连接到SSH子网1814可以使安全主机子网1808访问服务租赁1819内的其他实体。In some examples, secure host lease 1804 can be directly connected to service lease 1819, which can otherwise be isolated. Secure host subnet 1808 can communicate with SSH subnet 1814 through LPG 1810, which can enable two-way communication on otherwise isolated systems. Connecting secure host subnet 1808 to SSH subnet 1814 can enable secure host subnet 1808 to access other entities within service lease 1819.
控制平面VCN 1816可以允许服务租赁1819的用户设置或以其他方式供应期望的资源。在控制平面VCN 1816中供应的期望资源可以在数据平面VCN 1818中部署或以其他方式使用。在一些示例中,控制平面VCN 1816可以与数据平面VCN 1818隔离,并且控制平面VCN 1816的数据平面镜像应用层1840可以经由VNIC 1842与数据平面VCN 1818的数据平面应用层1846通信,VNIC 1842可以包含在数据平面镜像应用层1840和数据平面应用层1846中。Control plane VCN 1816 may allow a user of service lease 1819 to set up or otherwise provision desired resources. Desired resources provisioned in control plane VCN 1816 may be deployed or otherwise used in data plane VCN 1818. In some examples, control plane VCN 1816 may be isolated from data plane VCN 1818, and a data plane mirror application layer 1840 of control plane VCN 1816 may communicate with a data plane application layer 1846 of data plane VCN 1818 via a VNIC 1842, which may be included in both data plane mirror application layer 1840 and data plane application layer 1846.
在一些示例中,系统的用户或客户可以通过可以将请求传送到元数据管理服务1852的公共互联网1854来做出请求,例如创建、读取、更新或删除(CRUD)操作。元数据管理服务1852可以通过互联网网关1834将请求传送到控制平面VCN 1816。请求可以被包含在控制平面DMZ层1820中的(一个或多个)LB子网1822接收。(一个或多个)LB子网1822可以确定请求是有效的,并且响应于该确定,(一个或多个)LB子网1822可以将请求传输到包含在控制平面应用层1824中的(一个或多个)应用子网1826。如果请求被验证并且需要对公共互联网1854的调用,那么对公共互联网1854的调用可以被传输到可以对公共互联网1854进行调用的NAT网关1838。请求可能期望存储的存储器可以存储在(一个或多个)DB子网1830中。In some examples, a user or customer of the system may make a request, such as a create, read, update, or delete (CRUD) operation, through the public internet 1854, which may transmit the request to the metadata management service 1852. The metadata management service 1852 may transmit the request to the control plane VCN 1816 through the internet gateway 1834. The request may be received by the LB subnet(s) 1822 contained in the control plane DMZ layer 1820. The LB subnet(s) 1822 may determine that the request is valid, and in response to the determination, the LB subnet(s) 1822 may transmit the request to the application subnet(s) 1826 contained in the control plane application layer 1824. If the request is validated and a call to the public internet 1854 is required, the call to the public internet 1854 may be transmitted to the NAT gateway 1838, which may make the call to the public internet 1854. The storage that the request may desire to be stored may be stored in the DB subnet(s) 1830.
在一些示例中,数据平面镜像应用层1840可以促进控制平面VCN 1816和数据平面VCN 1818之间的直接通信。例如,可能期望对包含在数据平面VCN 1818中的资源应用对配置的更改、更新或其他适当的修改。经由VNIC 1842,控制平面VCN 1816可以直接与包含在数据平面VCN 1818中的资源通信,并且从而可以执行对配置的更改、更新或其他适当的修改。In some examples, data plane mirror application layer 1840 may facilitate direct communication between control plane VCN 1816 and data plane VCN 1818. For example, it may be desirable to apply changes, updates, or other appropriate modifications to the configuration to the resources contained in data plane VCN 1818. Control plane VCN 1816 may communicate directly with the resources contained in data plane VCN 1818 via VNIC 1842 and may thereby perform changes, updates, or other appropriate modifications to the configuration.
在一些实施例中,控制平面VCN 1816和数据平面VCN 1818可以包含在服务租赁1819中。在这种情况下,系统的用户或客户可能不拥有或操作控制平面VCN 1816或数据平面VCN 1818。替代地,IaaS提供商可以拥有或操作控制平面VCN 1816和数据平面VCN 1818,这两者平面都可以包含在服务租赁1819中。这个实施例可以使得能够隔离可能阻止用户或客户与其他用户或其他客户的资源交互的网络。而且,这个实施例可以允许系统的用户或客户私自存储数据库,而无需依赖可能不具有期望威胁预防级别的公共互联网1854进行存储。In some embodiments, control plane VCN 1816 and data plane VCN 1818 may be included in service lease 1819. In this case, a user or customer of the system may not own or operate control plane VCN 1816 or data plane VCN 1818. Alternatively, an IaaS provider may own or operate control plane VCN 1816 and data plane VCN 1818, both of which may be included in service lease 1819. This embodiment may enable isolation of networks that may prevent a user or customer from interacting with the resources of other users or other customers. Furthermore, this embodiment may allow a user or customer of the system to store databases privately without relying on the public Internet 1854 for storage, which may not have the desired level of threat prevention.
在其他实施例中,包含在控制平面VCN 1816中的(一个或多个)LB子网1822可以被配置为从服务网关1836接收信号。在这个实施例中,控制平面VCN 1816和数据平面VCN1818可以被配置为由IaaS提供商的客户调用而无需调用公共互联网1854。IaaS提供商的客户可能期望这个实施例,因为客户使用的(一个或多个)数据库可以由IaaS提供商控制并且可以存储在服务租赁1819上,服务租赁1819可能与公共互联网1854隔离。In other embodiments, the LB subnet(s) 1822 contained in the control plane VCN 1816 can be configured to receive signals from the service gateway 1836. In this embodiment, the control plane VCN 1816 and the data plane VCN 1818 can be configured to be called by customers of the IaaS provider without calling the public Internet 1854. Customers of the IaaS provider may desire this embodiment because the database(s) used by the customer can be controlled by the IaaS provider and can be stored on the service lease 1819, which may be isolated from the public Internet 1854.
图19是图示根据至少一个实施例的IaaS体系架构的另一个示例模式的框图1900。服务运营商1902(例如,图18的服务运营商1802)可以通信地耦合到安全主机租赁1904(例如,图18的安全主机租赁1804),该安全主机租赁1904可以包括虚拟云网络(VCN)1906(例如,图18的VCN 1806)和安全主机子网1908(例如,图18的安全主机子网1808)。VCN 1906可以包括本地对等网关(LPG)1910(例如,图18的LPG 1810),其可以经由包含在SSH VCN 1912中的LPG 1810通信地耦合到安全壳(SSH)VCN 1912(例如,图18的SSH VCN 1812)。SSH VCN1912可以包括SSH子网1914(例如,图18的SSH子网1814),并且SSH VCN 1912可以经由包含在控制平面VCN 1916中的LPG 1910通信地耦合到控制平面VCN 1916(例如,图18的控制平面VCN 1816)。控制平面VCN 1916可以包含在服务租赁1919(例如,图18的服务租赁1819)中,并且数据平面VCN 1918(例如,图18的数据平面VCN 1818)可以包含在可能由系统的用户或客户拥有或操作的客户租赁1921中。FIG19 is a block diagram 1900 illustrating another example mode of an IaaS architecture according to at least one embodiment. A service operator 1902 (e.g., service operator 1802 of FIG18 ) may be communicatively coupled to a secure host lease 1904 (e.g., secure host lease 1804 of FIG18 ), which may include a virtual cloud network (VCN) 1906 (e.g., VCN 1806 of FIG18 ) and a secure host subnet 1908 (e.g., secure host subnet 1808 of FIG18 ). VCN 1906 may include a local peer gateway (LPG) 1910 (e.g., LPG 1810 of FIG18 ), which may be communicatively coupled to a secure shell (SSH) VCN 1912 (e.g., SSH VCN 1812 of FIG18 ) via LPG 1810 contained in SSH VCN 1912. SSH VCN 1912 may include SSH subnet 1914 (e.g., SSH subnet 1814 of FIG. 18 ), and SSH VCN 1912 may be communicatively coupled to control plane VCN 1916 (e.g., control plane VCN 1816 of FIG. 18 ) via LPG 1910 contained in control plane VCN 1916. Control plane VCN 1916 may be contained in service lease 1919 (e.g., service lease 1819 of FIG. 18 ), and data plane VCN 1918 (e.g., data plane VCN 1818 of FIG. 18 ) may be contained in customer lease 1921 that may be owned or operated by a user or customer of the system.
控制平面VCN 1916可以包括控制平面DMZ层1920(例如,图18的控制平面DMZ层1820),其可以包括(一个或多个)LB子网1922(例如,图18的(一个或多个)LB子网1822)、可以包括(一个或多个)应用子网1926(例如,图18的(一个或多个)应用子网1826)的控制平面应用层1924(例如,图18的控制平面应用层1824)、可以包括(一个或多个)数据库(DB)子网1930(例如,类似于图18的(一个或多个)DB子网1830)的控制平面数据层1928(例如,图18的控制平面数据层1828)。包含在控制平面DMZ层1920中的(一个或多个)LB子网1922可以通信地耦合到包含在控制平面应用层1924中的(一个或多个)应用子网1926和可以包含在控制平面VCN 1916中的互联网网关1934(例如,图18的互联网网关1834),并且(一个或多个)应用子网1926可以通信地耦合到包含在控制平面数据层1928中的(一个或多个)DB子网1930以及服务网关1936(例如,图18的服务网关)和网络地址转换(NAT)网关1938(例如,图18的NAT网关1838)。控制平面VCN 1916可以包括服务网关1936和NAT网关1938。The control plane VCN 1916 may include a control plane DMZ layer 1920 (e.g., the control plane DMZ layer 1820 of FIG. 18 ), which may include (one or more) LB subnets 1922 (e.g., the (one or more) LB subnets 1822 of FIG. 18 ), a control plane application layer 1924 (e.g., the control plane application layer 1824 of FIG. 18 ) may include (one or more) application subnets 1926 (e.g., the (one or more) application subnets 1826 of FIG. 18 ), and a control plane data layer 1928 (e.g., the control plane data layer 1828 of FIG. 18 ) may include (one or more) database (DB) subnets 1930 (e.g., similar to the (one or more) DB subnets 1830 of FIG. 18 ). The LB subnet(s) 1922 included in the control plane DMZ layer 1920 may be communicatively coupled to the application subnet(s) 1926 included in the control plane application layer 1924 and the internet gateway 1934 (e.g., the internet gateway 1834 of FIG. 18 ) that may be included in the control plane VCN 1916, and the application subnet(s) 1926 may be communicatively coupled to the DB subnet(s) 1930 included in the control plane data layer 1928 and the service gateway 1936 (e.g., the service gateway of FIG. 18 ) and the network address translation (NAT) gateway 1938 (e.g., the NAT gateway 1838 of FIG. 18 ). The control plane VCN 1916 may include the service gateway 1936 and the NAT gateway 1938.
控制平面VCN 1916可以包括可包括(一个或多个)应用子网1926的数据平面镜像应用层1940(例如,图18的数据平面镜像应用层1840)。包含在数据平面镜像应用层1940中的(一个或多个)应用子网1926可以包括可以执行计算实例1944(例如,类似于图18的计算实例1844)的虚拟网络接口控制器(VNIC)1942(例如,1842的VNIC)。计算实例1944可以促进数据平面镜像应用层1940的(一个或多个)应用子网1926和可以包含在数据平面应用层1946(例如,图18的数据平面应用层1846)中的(一个或多个)应用子网1926之间经由包含在数据平面镜像应用层1940中的VNIC 1942和包含在数据平面应用层1946中的VNIC 1942的通信。The control plane VCN 1916 may include a data plane mirroring application layer 1940 (e.g., data plane mirroring application layer 1840 of FIG. 18 ) that may include application subnet(s) 1926. The application subnet(s) 1926 included in the data plane mirroring application layer 1940 may include a virtual network interface controller (VNIC) 1942 (e.g., VNIC of 1842 ) that may execute a compute instance 1944 (e.g., similar to compute instance 1844 of FIG. 18 ). The compute instance 1944 may facilitate communication between the application subnet(s) 1926 of the data plane mirroring application layer 1940 and the application subnet(s) 1926 that may be included in a data plane application layer 1946 (e.g., data plane application layer 1846 of FIG. 18 ) via the VNIC 1942 included in the data plane mirroring application layer 1940 and the VNIC 1942 included in the data plane application layer 1946.
包含在控制平面VCN 1916中的互联网网关1934可以通信地耦合到元数据管理服务1952(例如,图18的元数据管理服务1852),该元数据管理服务1952可以通信地耦合到公共互联网1954(例如,图18的公共互联网1854)。公共互联网1954可以通信地耦合到控制平面VCN 1916中包括的NAT网关1938。包含在控制平面VCN 1416中的服务网关1936可以通信地耦合到云服务1956(例如,图18的云服务1856)。The internet gateway 1934 included in the control plane VCN 1916 can be communicatively coupled to a metadata management service 1952 (e.g., metadata management service 1852 of FIG. 18 ), which can be communicatively coupled to a public internet 1954 (e.g., public internet 1854 of FIG. 18 ). The public internet 1954 can be communicatively coupled to a NAT gateway 1938 included in the control plane VCN 1916. The service gateway 1936 included in the control plane VCN 1416 can be communicatively coupled to a cloud service 1956 (e.g., cloud service 1856 of FIG. 18 ).
在一些示例中,数据平面VCN 1918可以包含在客户租赁1921中。在这种情况下,IaaS提供商可以为每个客户提供控制平面VCN 1916,并且IaaS提供商可以为每个客户设置包含在服务租赁1919中的唯一计算实例1944。每个计算实例1944可以允许包含在服务租赁1919中的控制平面VCN 1916和包含在客户租赁1921中的数据平面VCN 1918之间的通信。计算实例1944可以允许在包含在服务租赁1919中的控制平面VCN 1916中供应的资源被部署或以其他方式在包含在客户租赁1921中的数据平面VCN 1918中使用。In some examples, the data plane VCN 1918 may be contained in a customer lease 1921. In this case, the IaaS provider may provide a control plane VCN 1916 for each customer, and the IaaS provider may provision each customer with a unique compute instance 1944 contained in a service lease 1919. Each compute instance 1944 may allow communication between the control plane VCN 1916 contained in the service lease 1919 and the data plane VCN 1918 contained in the customer lease 1921. The compute instance 1944 may allow resources provisioned in the control plane VCN 1916 contained in the service lease 1919 to be deployed or otherwise used in the data plane VCN 1918 contained in the customer lease 1921.
在其他示例中,IaaS提供商的客户可以具有存在于客户租赁1921中的数据库。在这个示例中,控制平面VCN 1916可以包括数据平面镜像应用层1940,其可以包括(一个或多个)应用子网1926。数据平面镜像应用层1940可以驻留在数据平面VCN 1918中,但数据平面镜像应用层1940可能不在数据平面VCN 1918中。即,数据平面镜像应用层1940可以访问客户租赁1921,但是数据平面镜像应用层1940可能不存在于数据平面VCN 1918中或者由IaaS提供商的客户拥有或操作。数据平面镜像应用层1940可以被配置为对数据平面VCN 1918进行调用,但可以不被配置为对包含在控制平面VCN 1916中的任何实体进行调用。客户可能期望在数据平面VCN 1918中部署或以其他方式使用在控制平面VCN 1916中供应的资源,并且数据平面镜像应用层1940可以促进客户的期望部署或资源的其他使用。In other examples, a customer of the IaaS provider may have a database that exists in the customer tenancy 1921. In this example, the control plane VCN 1916 may include a data plane mirror application layer 1940, which may include (one or more) application subnets 1926. The data plane mirror application layer 1940 may reside in the data plane VCN 1918, but the data plane mirror application layer 1940 may not be in the data plane VCN 1918. That is, the data plane mirror application layer 1940 may access the customer tenancy 1921, but the data plane mirror application layer 1940 may not exist in the data plane VCN 1918 or be owned or operated by the customer of the IaaS provider. The data plane mirror application layer 1940 may be configured to make calls to the data plane VCN 1918, but may not be configured to make calls to any entity contained in the control plane VCN 1916. A customer may desire to deploy or otherwise use resources provisioned in control plane VCN 1916 in data plane VCN 1918, and data plane mirror application layer 1940 may facilitate the customer's desired deployment or other use of resources.
在一些实施例中,IaaS提供商的客户可以将过滤器应用到数据平面VCN 1918。在这个实施例中,客户可以确定数据平面VCN 1918可以访问什么,并且客户可以限制从数据平面VCN 1918对公共互联网1954的访问。IaaS提供商可能无法应用过滤器或以其他方式控制数据平面VCN 1918对任何外部网络或数据库的访问。客户将过滤器和控制应用到包含在客户租赁1921中的数据平面VCN 1918上可以帮助将数据平面VCN 1918与其他客户和公共互联网1954隔离开。In some embodiments, a customer of an IaaS provider may apply filters to the data plane VCN 1918. In this embodiment, the customer may determine what the data plane VCN 1918 may access, and the customer may restrict access to the public Internet 1954 from the data plane VCN 1918. The IaaS provider may not apply filters or otherwise control access to any external network or database by the data plane VCN 1918. The customer applying filters and controls to the data plane VCN 1918 contained in the customer lease 1921 may help isolate the data plane VCN 1918 from other customers and the public Internet 1954.
在一些实施例中,云服务1956可以由服务网关1936调用以访问公共互联网1954、控制平面VCN 1916或数据平面VCN 1918上可能不存在的服务。云服务1956与控制平面VCN1916或数据平面VCN 1918之间的连接可以不是实时的或连续的。云服务1956可以存在于由IaaS提供商拥有或操作的不同网络上。云服务1956可以被配置为接收来自服务网关1936的调用并且可以被配置为不接收来自公共互联网1954的调用。一些云服务1956可以与其他云服务1956隔离,并且控制平面VCN 1916可以与可能与控制平面VCN 1916不在同一区域的云服务1956隔离。例如,控制平面VCN 1916可能位于“区域1”,并且云服务“部署13”可能位于区域1和“区域2”。如果包含在位于区域1中的控制平面VCN 1916中的服务网关1936对部署13进行调用,那么该调用可以被传输到区域1中的部署13。在这个示例中,控制平面VCN1916或区域1中的部署13可能不与区域2中的部署13通信地耦合或以其他方式通信。In some embodiments, cloud services 1956 may be called by service gateway 1936 to access services that may not exist on public Internet 1954, control plane VCN 1916, or data plane VCN 1918. The connection between cloud services 1956 and control plane VCN 1916 or data plane VCN 1918 may not be real-time or continuous. Cloud services 1956 may exist on different networks owned or operated by IaaS providers. Cloud services 1956 may be configured to receive calls from service gateway 1936 and may be configured not to receive calls from public Internet 1954. Some cloud services 1956 may be isolated from other cloud services 1956, and control plane VCN 1916 may be isolated from cloud services 1956 that may not be in the same region as control plane VCN 1916. For example, control plane VCN 1916 may be located in "Region 1", and cloud service "Deployment 13" may be located in Region 1 and "Region 2". If a service gateway 1936 contained in a control plane VCN 1916 located in region 1 makes a call to deployment 13, the call may be transmitted to deployment 13 in region 1. In this example, control plane VCN 1916 or deployment 13 in region 1 may not be communicatively coupled or otherwise in communication with deployment 13 in region 2.
图20是图示根据至少一个实施例的IaaS体系架构的另一个示例模式的框图2000。服务运营商2002(例如,图18的服务运营商1802)可以通信地耦合到安全主机租赁2004(例如,图18的安全主机租赁1804),该安全主机租赁2004可以包括虚拟云网络(VCN)2006(例如,图18的VCN 1806)和安全主机子网2008(例如,图18的安全主机子网1808)。VCN 2006可以包括LPG 2010(例如,图18的LPG 1810),其可以经由包含在SSH VCN 2012中的LPG 2010通信地耦合到SSH VCN 2012(例如,图18的SSH VCN 1812)。SSH VCN 2012可以包括SSH子网2014(例如,图18的SSH子网1814),并且SSH VCN 1812可以经由包含在控制平面VCN 2016中的LPG 2010通信地耦合到控制平面VCN 2016(例如,图18的控制平面VCN 1816)并且经由包含在数据平面VCN 2018中的LPG 2010耦合到数据平面VCN 2018(例如,图18的数据平面1818)。控制平面VCN 2016和数据平面VCN 2018可以包含在服务租赁2019(例如,图18的服务租赁1819)中。FIG20 is a block diagram 2000 illustrating another example mode of an IaaS architecture according to at least one embodiment. A service operator 2002 (e.g., service operator 1802 of FIG18 ) may be communicatively coupled to a secure host lease 2004 (e.g., secure host lease 1804 of FIG18 ), which may include a virtual cloud network (VCN) 2006 (e.g., VCN 1806 of FIG18 ) and a secure host subnet 2008 (e.g., secure host subnet 1808 of FIG18 ). VCN 2006 may include an LPG 2010 (e.g., LPG 1810 of FIG18 ), which may be communicatively coupled to an SSH VCN 2012 (e.g., SSH VCN 1812 of FIG18 ) via the LPG 2010 contained in the SSH VCN 2012. SSH VCN 2012 may include SSH subnet 2014 (e.g., SSH subnet 1814 of FIG. 18 ), and SSH VCN 1812 may be communicatively coupled to control plane VCN 2016 (e.g., control plane VCN 1816 of FIG. 18 ) via LPG 2010 included in control plane VCN 2016 and coupled to data plane VCN 2018 (e.g., data plane 1818 of FIG. 18 ) via LPG 2010 included in data plane VCN 2018. Control plane VCN 2016 and data plane VCN 2018 may be included in service lease 2019 (e.g., service lease 1819 of FIG. 18 ).
控制平面VCN 1816可以包括可包括(一个或多个)负载平衡器(LB)子网1822(例如,图18的(一个或多个)LB子网1822)的控制平面DMZ层1820(例如,图18的控制平面DMZ层1820)、可以包括(一个或多个)应用子网2026(例如,类似于图18的(一个或多个)应用子网1826)的控制平面应用层2024(例如,图18的控制平面应用层1824)、可以包括(一个或多个)DB子网2030的控制平面数据层2028(例如,图18的控制平面数据层1828)。包含在控制平面DMZ层2020中的(一个或多个)LB子网2022可以通信地耦合到包含在控制平面应用层2024中的(一个或多个)应用子网2026和可以包含在控制平面VCN 2016中的互联网网关1834(例如,图18的互联网网关1834),并且(一个或多个)应用子网2026可以通信地耦合到包含在控制平面数据层1828中的(一个或多个)DB子网1830以及服务网关1836(例如,图18的服务网关)和网络地址转换(NAT)网关1838(例如,图18的NAT网关1838)。控制平面VCN 2016可以包括服务网关2036和NAT网关2038。The control plane VCN 1816 may include a control plane DMZ layer 1820 (e.g., the control plane DMZ layer 1820 of FIG. 18 ) that may include (one or more) load balancer (LB) subnets 1822 (e.g., the (one or more) LB subnets 1822 of FIG. 18 ), a control plane application layer 2024 (e.g., the control plane application layer 1824 of FIG. 18 ) that may include (one or more) application subnets 2026 (e.g., similar to the (one or more) application subnets 1826 of FIG. 18 ), and a control plane data layer 2028 (e.g., the control plane data layer 1828 of FIG. 18 ) that may include (one or more) DB subnets 2030. The LB subnet(s) 2022 included in the control plane DMZ layer 2020 may be communicatively coupled to the application subnet(s) 2026 included in the control plane application layer 2024 and the internet gateway 1834 (e.g., the internet gateway 1834 of FIG. 18 ) that may be included in the control plane VCN 2016, and the application subnet(s) 2026 may be communicatively coupled to the DB subnet(s) 1830 included in the control plane data layer 1828 and the service gateway 1836 (e.g., the service gateway of FIG. 18 ) and the network address translation (NAT) gateway 1838 (e.g., the NAT gateway 1838 of FIG. 18 ). The control plane VCN 2016 may include the service gateway 2036 and the NAT gateway 2038.
数据平面VCN 2018可以包括数据平面应用层2046(例如,图18的数据平面应用层1846)、数据平面DMZ层2048(例如,图18的数据平面DMZ层1848),以及数据平面数据层2050(例如,图18的数据平面数据层1850)。数据平面DMZ层2048可以包括可以通信地耦合到数据平面应用层2046的(一个或多个)可信应用子网2060和(一个或多个)不可信应用子网2062以及包含在数据平面VCN 2018中的互联网网关2034的(一个或多个)LB子网2022。(一个或多个)可信应用子网2060可以通信地耦合到包含在数据平面VCN 2018中的服务网关2036、包含在数据平面VCN 2018中的NAT网关2038以及包含在数据平面数据层2050中的(一个或多个)DB子网2030。(一个或多个)不可信应用子网2062可以通信地耦合到包含在数据平面VCN 2018中的服务网关2036和包含在数据平面数据层2050中的(一个或多个)DB子网2030。数据平面数据层2050可以包括可以通信地耦合到包含在数据平面VCN 2018中的服务网关2036的(一个或多个)DB子网2030。The data plane VCN 2018 may include a data plane application layer 2046 (e.g., the data plane application layer 1846 of FIG. 18 ), a data plane DMZ layer 2048 (e.g., the data plane DMZ layer 1848 of FIG. 18 ), and a data plane data layer 2050 (e.g., the data plane data layer 1850 of FIG. 18 ). The data plane DMZ layer 2048 may include (one or more) trusted application subnets 2060 and (one or more) untrusted application subnets 2062 that may be communicatively coupled to the data plane application layer 2046 and (one or more) LB subnets 2022 of the Internet gateway 2034 included in the data plane VCN 2018. The (one or more) trusted application subnets 2060 may be communicatively coupled to the service gateway 2036 included in the data plane VCN 2018, the NAT gateway 2038 included in the data plane VCN 2018, and (one or more) DB subnets 2030 included in the data plane data layer 2050. The untrusted application subnet(s) 2062 may be communicatively coupled to the service gateway 2036 included in the data plane VCN 2018 and the DB subnet(s) 2030 included in the data plane data layer 2050. The data plane data layer 2050 may include the DB subnet(s) 2030 that may be communicatively coupled to the service gateway 2036 included in the data plane VCN 2018.
(一个或多个)不可信应用子网2062可以包括可以通信地耦合到租户虚拟机(VM)2066(1)-(N)的一个或多个主VNIC 2064(1)-(N)。每个租户VM 2066(1)-(N)可以通信地耦合到可以包含在相应容器出口VCN 2068(1)-(N)中的相应应用子网2067(1)-(N),相应容器出口VCN 2068(1)-(N)可以包含在相应客户租赁2070(1)-(N)中。相应的辅助VNIC 2072(1)-(N)可以促进数据平面VCN 2018中包含的(一个或多个)不可信应用子网2062与容器出口VCN 2068(1)-(N)中包含的应用子网之间的通信。每个容器出口VCN2068(1)-(N)可以包括NAT网关2038,该NAT网关2038可以通信地耦合到公共互联网2054(例如,图18的公共互联网1854)。The untrusted application subnet(s) 2062 may include one or more primary VNICs 2064(1)-(N) that may be communicatively coupled to tenant virtual machines (VMs) 2066(1)-(N). Each tenant VM 2066(1)-(N) may be communicatively coupled to a respective application subnet 2067(1)-(N) that may be contained in a respective container egress VCN 2068(1)-(N), which may be contained in a respective customer tenancy 2070(1)-(N). A respective secondary VNIC 2072(1)-(N) may facilitate communication between the untrusted application subnet(s) 2062 contained in the data plane VCN 2018 and the application subnets contained in the container egress VCN 2068(1)-(N). Each container egress VCN 2068 ( 1 )-(N) may include a NAT gateway 2038 that may be communicatively coupled to a public Internet 2054 (eg, public Internet 1854 of FIG. 18 ).
包含在控制平面VCN 2016中并且包含在数据平面VCN 2018中的互联网网关2034可以通信地耦合到元数据管理服务2052(例如,图18的元数据管理系统1852),该元数据管理服务2052可以通信地耦合到公共互联网2054。公共互联网2054可以通信地耦合到包含在控制平面VCN 2016中并且包含在数据平面VCN 2018中的NAT网关2038。包含在控制平面VCN2016中和包含在数据平面VCN 2018中的服务网关2036可以通信地耦合到云服务2056。An internet gateway 2034 included in the control plane VCN 2016 and included in the data plane VCN 2018 may be communicatively coupled to a metadata management service 2052 (e.g., metadata management system 1852 of FIG. 18 ), which may be communicatively coupled to a public internet 2054. The public internet 2054 may be communicatively coupled to a NAT gateway 2038 included in the control plane VCN 2016 and included in the data plane VCN 2018. A service gateway 2036 included in the control plane VCN 2016 and included in the data plane VCN 2018 may be communicatively coupled to a cloud service 2056.
在一些实施例中,数据平面VCN 2018可以与客户租赁2070集成。在一些情况下,诸如在执行代码时可能期望支持的情况下,这种集成对于IaaS提供商的客户可能是有用的或期望的。客户可能提供可能具有破坏性、可能与其他客户资源通信或可能以其他方式导致非期望效果的代码来运行。作为对此的响应,IaaS提供商可以确定是否运行由客户给与IaaS提供商的代码。In some embodiments, data plane VCN 2018 may be integrated with customer lease 2070. In some cases, such integration may be useful or desirable for customers of the IaaS provider, such as where support may be desired when executing code. A customer may provide code to run that may be destructive, may communicate with other customer resources, or may otherwise cause undesirable effects. In response to this, the IaaS provider may determine whether to run code given to the IaaS provider by the customer.
在一些示例中,IaaS提供商的客户可以向IaaS提供商授予临时网络访问,并请求附加到数据平面层应用2046的功能。运行该功能的代码可以在VM 2066(1)-(N)中执行,并且该代码可以不被配置为在数据平面VCN 2018上的其他任何地方运行。每个VM 2066(1)-(N)可以连接到一个客户租赁2070。包含在VM 2066(1)-(N)中的相应容器2071(1)-(N)可以被配置为运行代码。在这种情况下,可以存在双重隔离(例如,容器2071(1)-(N)运行代码,其中容器2071(1)-(N)可能至少包含在(一个或多个)不可信应用子网2062中包含的VM2066(1)-(N)中),这可以帮助防止不正确的或以其他方式非期望的代码损坏IaaS提供商的网络或损坏不同客户的网络。容器2071(1)-(N)可以通信地耦合到客户租赁2070并且可以被配置为传输或接收来自客户租赁2070的数据。容器2071(1)-(N)可以不被配置为从数据平面VCN 2018中的任何其他实体传输或接收数据。在运行代码完成后,IaaS提供商可以终止或以其他方式处置容器2071(1)-(N)。In some examples, a customer of an IaaS provider may grant temporary network access to the IaaS provider and request functionality attached to a data plane layer application 2046. Code running the functionality may be executed in a VM 2066(1)-(N), and the code may not be configured to run anywhere else on the data plane VCN 2018. Each VM 2066(1)-(N) may be connected to a customer tenancy 2070. The corresponding container 2071(1)-(N) contained in the VM 2066(1)-(N) may be configured to run the code. In this case, there may be double isolation (e.g., the container 2071(1)-(N) runs the code, where the container 2071(1)-(N) may be contained at least in a VM 2066(1)-(N) contained in (one or more) untrusted application subnets 2062), which may help prevent incorrect or otherwise undesirable code from damaging the IaaS provider's network or damaging the network of a different customer. Containers 2071(1)-(N) may be communicatively coupled to customer lease 2070 and may be configured to transmit or receive data from customer lease 2070. Containers 2071(1)-(N) may not be configured to transmit or receive data from any other entity in data plane VCN 2018. After running the code is complete, the IaaS provider may terminate or otherwise dispose of containers 2071(1)-(N).
在一些实施例中,(一个或多个)可信应用子网2060可以运行可以由IaaS提供商拥有或操作的代码。在这个实施例中,(一个或多个)可信应用子网2060可以通信地耦合到(一个或多个)DB子网2030并且被配置为在(一个或多个)DB子网2030中执行CRUD操作。(一个或多个)不可信应用子网2062可以通信地耦合到(一个或多个)DB子网2030,但是在这个实施例中,(一个或多个)不可信应用子网可以被配置为在(一个或多个)DB子网2030中执行读取操作。可以包含在每个客户的VM 2066(1)-(N)中并且可以运行来自客户的代码的容器2071(1)-(N)可以不与(一个或多个)DB子网2030通信地耦合。In some embodiments, the trusted application subnet(s) 2060 may run code that may be owned or operated by the IaaS provider. In this embodiment, the trusted application subnet(s) 2060 may be communicatively coupled to the DB subnet(s) 2030 and configured to perform CRUD operations in the DB subnet(s) 2030. The untrusted application subnet(s) 2062 may be communicatively coupled to the DB subnet(s) 2030, but in this embodiment, the untrusted application subnet(s) may be configured to perform read operations in the DB subnet(s) 2030. The containers 2071(1)-(N) that may be included in each customer's VM 2066(1)-(N) and that may run code from the customer may not be communicatively coupled to the DB subnet(s) 2030.
在其他实施例中,控制平面VCN 2016和数据平面VCN 2018可以不直接通信地耦合。在这个实施例中,控制平面VCN 2016和数据平面VCN 2018之间可能没有直接通信。但是,通信可以通过至少一种方法间接发生。LPG 2010可以由IaaS提供商建立,其可以促进控制平面VCN 2016和数据平面VCN 2018之间的通信。在另一个示例中,控制平面VCN 2016或数据平面VCN 2018可以经由服务网关2036调用云服务2056。例如,从控制平面VCN 2016对云服务2056的调用可以包括对可以与数据平面VCN 2018通信的服务的请求。In other embodiments, the control plane VCN 2016 and the data plane VCN 2018 may not be coupled in direct communication. In this embodiment, there may be no direct communication between the control plane VCN 2016 and the data plane VCN 2018. However, communication may occur indirectly through at least one method. The LPG 2010 may be established by an IaaS provider, which may facilitate communication between the control plane VCN 2016 and the data plane VCN 2018. In another example, the control plane VCN 2016 or the data plane VCN 2018 may call the cloud service 2056 via the service gateway 2036. For example, the call from the control plane VCN 2016 to the cloud service 2056 may include a request for a service that can communicate with the data plane VCN 2018.
图21是图示根据至少一个实施例的IaaS体系架构的另一个示例模式的框图2100。服务运营商2102(例如,图18的服务运营商1802)可以通信地耦合到安全主机租赁2104(例如,图18的安全主机租赁1804),该安全主机租赁2104可以包括虚拟云网络(VCN)2106(例如,图18的VCN 1806)和安全主机子网2108(例如,图18的安全主机子网1808)。VCN 2106可以包括LPG 2110(例如,图18的LPG 1810),该LPG 2110可以经由包含在SSH VCN 2112(例如,图18的SSH VCN 1812)中的LPG 2110通信地耦合到SSH VCN 2112。SSH VCN 2112可以包括SSH子网2114(例如,图18的SSH子网1814),并且SSH VCN 2112可以经由包含在控制平面VCN 2116中的LPG 2110通信地耦合到控制平面VCN 2116(例如,图18的控制平面VCN 1816)并且经由包含在数据平面VCN 2118中的LPG 2110耦合到数据平面VCN 2118(例如,图18的数据平面1818)。控制平面VCN 2116和数据平面VCN 2118可以包含在服务租赁2119(例如,图18的服务租赁1819)中。FIG21 is a block diagram 2100 illustrating another example mode of an IaaS architecture according to at least one embodiment. A service operator 2102 (e.g., service operator 1802 of FIG18 ) may be communicatively coupled to a secure host lease 2104 (e.g., secure host lease 1804 of FIG18 ), which may include a virtual cloud network (VCN) 2106 (e.g., VCN 1806 of FIG18 ) and a secure host subnet 2108 (e.g., secure host subnet 1808 of FIG18 ). VCN 2106 may include an LPG 2110 (e.g., LPG 1810 of FIG18 ), which may be communicatively coupled to an SSH VCN 2112 (e.g., SSH VCN 1812 of FIG18 ) via the LPG 2110 contained in the SSH VCN 2112. SSH VCN 2112 may include SSH subnet 2114 (e.g., SSH subnet 1814 of FIG. 18 ), and SSH VCN 2112 may be communicatively coupled to control plane VCN 2116 (e.g., control plane VCN 1816 of FIG. 18 ) via LPG 2110 included in control plane VCN 2116 and coupled to data plane VCN 2118 (e.g., data plane 1818 of FIG. 18 ) via LPG 2110 included in data plane VCN 2118. Control plane VCN 2116 and data plane VCN 2118 may be included in service lease 2119 (e.g., service lease 1819 of FIG. 18 ).
控制平面VCN 2116可以包括可包括(一个或多个)LB子网2122(例如,图18的(一个或多个)LB子网1822)的控制平面DMZ层2120(例如,图18的控制平面DMZ层1820)、可以包括(一个或多个)应用子网2126(例如,图18的(一个或多个)应用子网1826)的控制平面应用层2124(例如,图18的控制平面应用层1824)、可以包括(一个或多个)DB子网2130(例如,图20的(一个或多个)DB子网2030)的控制平面数据层2128(例如,图18的控制平面数据层1828)。包含在控制平面DMZ层2120中的(一个或多个)LB子网2122可以通信地耦合到包含在控制平面应用层2112中的(一个或多个)应用子网2126和可以包含在控制平面VCN 2116中的互联网网关2134(例如,图18的互联网网关1834),并且(一个或多个)应用子网2126可以通信地耦合到包含在控制平面数据层2128中的(一个或多个)DB子网2130以及服务网关2136(例如,图18的服务网关)和网络地址转换(NAT)网关2138(例如,图18的NAT网关1838)。控制平面VCN 2116可以包括服务网关2136和NAT网关2138。The control plane VCN 2116 may include a control plane DMZ layer 2120 (e.g., control plane DMZ layer 1820 of FIG. 18 ) that may include (one or more) LB subnets 2122 (e.g., (one or more) LB subnets 1822 of FIG. 18 ), a control plane application layer 2124 (e.g., control plane application layer 1824 of FIG. 18 ) that may include (one or more) application subnets 2126 (e.g., (one or more) application subnets 1826 of FIG. 18 ), and a control plane data layer 2128 (e.g., control plane data layer 1828 of FIG. 18 ) that may include (one or more) DB subnets 2130 (e.g., (one or more) DB subnets 2030 of FIG. 20 ). The LB subnet(s) 2122 included in the control plane DMZ layer 2120 may be communicatively coupled to the application subnet(s) 2126 included in the control plane application layer 2112 and the internet gateway 2134 (e.g., the internet gateway 1834 of FIG. 18 ) that may be included in the control plane VCN 2116, and the application subnet(s) 2126 may be communicatively coupled to the DB subnet(s) 2130 included in the control plane data layer 2128 and the service gateway 2136 (e.g., the service gateway of FIG. 18 ) and the network address translation (NAT) gateway 2138 (e.g., the NAT gateway 1838 of FIG. 18 ). The control plane VCN 2116 may include the service gateway 2136 and the NAT gateway 2138.
数据平面VCN 2118可以包括数据平面应用层2146(例如,图18的数据平面应用层1846)、数据平面DMZ层2148(例如,图18的数据平面DMZ层2148)),以及数据平面数据层2150(例如,图18的数据平面数据层1850)。数据平面DMZ层2148可以包括可以通信地耦合到数据平面应用层2146的(一个或多个)可信应用子网2160(例如,图20的(一个或多个)可信应用子网2060)和(一个或多个)不可信应用子网2162(例如,图20的(一个或多个)不可信应用子网2062)以及包含在数据平面VCN 2118中的互联网网关2134的(一个或多个)LB子网2122。(一个或多个)可信应用子网2160可以通信地耦合到包含在数据平面VCN 2118中的服务网关2136、包含在数据平面VCN 2118中的NAT网关2138以及包含在数据平面数据层2150中的(一个或多个)DB子网2130。(一个或多个)不可信应用子网2162可以通信地耦合到包含在数据平面VCN 2118中的服务网关2136和包含在数据平面数据层2150中的(一个或多个)DB子网2130。数据平面数据层2150可以包括可以通信地耦合到包含在数据平面VCN 2118中的服务网关2136的(一个或多个)DB子网2130。The data plane VCN 2118 may include a data plane application layer 2146 (e.g., the data plane application layer 1846 of FIG. 18 ), a data plane DMZ layer 2148 (e.g., the data plane DMZ layer 2148 of FIG. 18 ), and a data plane data layer 2150 (e.g., the data plane data layer 1850 of FIG. 18 ). The data plane DMZ layer 2148 may include (one or more) trusted application subnets 2160 (e.g., the (one or more) trusted application subnets 2060 of FIG. 20 ) and (one or more) untrusted application subnets 2162 (e.g., the (one or more) untrusted application subnets 2062 of FIG. 20 ) that may be communicatively coupled to the data plane application layer 2146 and (one or more) LB subnets 2122 of the Internet gateway 2134 included in the data plane VCN 2118. The trusted application subnet(s) 2160 may be communicatively coupled to the service gateway 2136 included in the data plane VCN 2118, the NAT gateway 2138 included in the data plane VCN 2118, and the DB subnet(s) 2130 included in the data plane data layer 2150. The untrusted application subnet(s) 2162 may be communicatively coupled to the service gateway 2136 included in the data plane VCN 2118 and the DB subnet(s) 2130 included in the data plane data layer 2150. The data plane data layer 2150 may include the DB subnet(s) 2130 that may be communicatively coupled to the service gateway 2136 included in the data plane VCN 2118.
(一个或多个)不可信应用子网2162可以包括可以通信地耦合到驻留在(一个或多个)不可信应用子网2162内的租户虚拟机(VM)2166(1)-(N)的主VNIC 2164(1)-(N)。每个租户VM 2166(1)-(N)可以在相应的容器2167(1)-(N)中运行代码,并且可通信地耦合到可以包含在容器出口VCN 2168中包含的数据平面应用层2146中的应用子网2126。相应的辅助VNIC 2172(1)-(N)可以促进包含在数据平面VCN 2118中的(一个或多个)不可信应用子网2162和包含在容器出口VCN 2168中的应用子网之间的通信。容器出口VCN可以包括可以通信地耦合到公共互联网2154(例如,图18的公共互联网1854)的NAT网关2138。The untrusted application subnet(s) 2162 may include primary VNICs 2164(1)-(N) that may be communicatively coupled to tenant virtual machines (VMs) 2166(1)-(N) residing within the untrusted application subnet(s) 2162. Each tenant VM 2166(1)-(N) may run code in a corresponding container 2167(1)-(N) and may be communicatively coupled to an application subnet 2126 that may be contained in a data plane application layer 2146 contained in a container egress VCN 2168. Corresponding secondary VNICs 2172(1)-(N) may facilitate communications between the untrusted application subnet(s) 2162 contained in the data plane VCN 2118 and the application subnets contained in the container egress VCN 2168. The container egress VCN may include a NAT gateway 2138 that may be communicatively coupled to a public Internet 2154 (e.g., public Internet 1854 of FIG. 18).
包含在控制平面VCN 2116中和包含在数据平面VCN 2118中的互联网网关2134可以通信地耦合到元数据管理服务2152(例如,图18的元数据管理系统1852),该元数据管理服务2152可以通信地耦合到公共互联网2154。公共互联网2154可以通信地耦合到包含在控制平面VCN 2116中并且包含在数据平面VCN 2118中的NAT网关2138。包含在控制平面VCN2116中并且包含在数据平面VCN 2118中的服务网关2136可以通信地耦合到云服务2156。An internet gateway 2134 included in the control plane VCN 2116 and included in the data plane VCN 2118 may be communicatively coupled to a metadata management service 2152 (e.g., metadata management system 1852 of FIG. 18 ), which may be communicatively coupled to a public internet 2154. The public internet 2154 may be communicatively coupled to a NAT gateway 2138 included in the control plane VCN 2116 and included in the data plane VCN 2118. A service gateway 2136 included in the control plane VCN 2116 and included in the data plane VCN 2118 may be communicatively coupled to a cloud service 2156.
在一些示例中,图21的框图2100的体系架构所示的模式可以被认为是图20的框图2000的体系架构所示的模式的例外,并且如果IaaS提供商不能直接与客户通信(例如,断开连接的区域),那么这种模式可能是IaaS提供商的客户所期望的。客户可以实时访问每个客户的VM 2166(1)-(N)中包含的相应容器2167(1)-(N)。容器2167(1)-(N)可以被配置为对包含在数据平面应用层2146的(一个或多个)应用子网2126中的相应辅助VNIC 2172(1)-(N)进行调用,该数据平面应用层2146可以包含在容器出口VCN 2168中。辅助VNIC 2172(1)-(N)可以将调用传输到NAT网关2138,NAT网关2138可以将调用传输到公共互联网2154。在这个示例中,可以由客户实时访问的容器2167(1)-(N)可以与控制平面VCN 2116隔离,并且可以与数据平面VCN 2118中包含的其他实体隔离。容器2167(1)-(N)也可以与来自其他客户的资源隔离。In some examples, the mode illustrated by the architecture of block diagram 2100 of FIG. 21 may be considered an exception to the mode illustrated by the architecture of block diagram 2000 of FIG. 20 and may be desirable to customers of the IaaS provider if the IaaS provider cannot communicate directly with the customer (e.g., a disconnected region). The customer may access the corresponding container 2167(1)-(N) contained in each customer's VM 2166(1)-(N) in real time. The container 2167(1)-(N) may be configured to make calls to the corresponding secondary VNIC 2172(1)-(N) contained in the application subnet(s) 2126 of the data plane application layer 2146, which may be contained in the container egress VCN 2168. The secondary VNIC 2172(1)-(N) may transmit the call to the NAT gateway 2138, which may transmit the call to the public Internet 2154. In this example, containers 2167(1)-(N), which may be accessed by customers in real time, may be isolated from control plane VCN 2116 and may be isolated from other entities contained in data plane VCN 2118. Containers 2167(1)-(N) may also be isolated from resources from other customers.
在其他示例中,客户可以使用容器2167(1)-(N)来调用云服务2156。在这个示例中,客户可以运行容器2167(1)-(N)中从云服务2156请求服务的代码。容器2167(1)-(N)可以将该请求传输到辅助VNIC 2172(1)-(N),辅助VNIC 2172(1)-(N)可以将请求传输到NAT网关,该NAT网关可以将请求传输到公共互联网2154。公共互联网2154可以经由互联网网关2134将请求传输到包含在控制平面VCN 2116中的(一个或多个)LB子网2122。响应于确定请求有效,(一个或多个)LB子网可以将请求传输到(一个或多个)应用子网2126,该(一个或多个)应用子网2126可以经由服务网关2136将请求传输到云服务2156。In other examples, a customer can use containers 2167(1)-(N) to call cloud service 2156. In this example, a customer can run code in containers 2167(1)-(N) to request a service from cloud service 2156. Containers 2167(1)-(N) can transmit the request to secondary VNICs 2172(1)-(N), which can transmit the request to a NAT gateway, which can transmit the request to the public Internet 2154. The public Internet 2154 can transmit the request to LB subnet(s) 2122 contained in control plane VCN 2116 via Internet gateway 2134. In response to determining that the request is valid, the LB subnet(s) can transmit the request to application subnet(s) 2126, which can transmit the request to cloud service 2156 via service gateway 2136.
应当认识到的是,各图中描绘的IaaS体系架构1800、1900、2000、2100可以具有除所描绘的那些之外的其他组件。另外,各图中所示的实施例仅仅是可以结合本公开的实施例的云基础设施系统的一些示例。在一些其他实施例中,IaaS系统可以具有比各图中所示更多或更少的组件、可以组合两个或更多个组件,或者可以具有不同的配置或组件布置。It should be appreciated that the IaaS architectures 1800, 1900, 2000, 2100 depicted in the various figures may have other components in addition to those depicted. In addition, the embodiments shown in the various figures are merely some examples of cloud infrastructure systems that may be combined with embodiments of the present disclosure. In some other embodiments, the IaaS system may have more or fewer components than shown in the various figures, may combine two or more components, or may have a different configuration or component arrangement.
在某些实施例中,本文描述的IaaS系统可以包括以自助服务、基于订阅、弹性可扩展、可靠、高度可用和安全的方式交付给客户的应用套件、中间件和数据库服务产品。此类IaaS系统的示例是本受让人提供的Oracle云基础设施(OCI)。In certain embodiments, the IaaS system described herein may include application suites, middleware, and database service offerings delivered to customers in a self-service, subscription-based, elastically scalable, reliable, highly available, and secure manner. An example of such an IaaS system is Oracle Cloud Infrastructure (OCI) provided by the assignee.
图22图示了其中可以实现本公开的各种实施例的示例计算机系统2200。系统2200可以用于实现上述任何计算机系统。如图所示,计算机系统2200包括经由总线子系统2202与多个外围子系统通信的处理单元2204。这些外围子系统可以包括处理加速单元2206、I/O子系统2208、存储子系统2218和通信子系统2224。存储子系统2218包括有形计算机可读存储介质2222和系统存储器2210。FIG. 22 illustrates an example computer system 2200 in which various embodiments of the present disclosure may be implemented. System 2200 may be used to implement any of the computer systems described above. As shown, computer system 2200 includes a processing unit 2204 that communicates with multiple peripheral subsystems via a bus subsystem 2202. These peripheral subsystems may include a processing acceleration unit 2206, an I/O subsystem 2208, a storage subsystem 2218, and a communication subsystem 2224. Storage subsystem 2218 includes a tangible computer-readable storage medium 2222 and a system memory 2210.
总线子系统2202提供用于让计算机系统2200的各种部件和子系统按意图彼此通信的机制。虽然总线子系统2202被示意性地示出为单条总线,但是总线子系统的替代实施例可以利用多条总线。总线子系统2202可以是若干种类型的总线结构中的任何一种,包括存储器总线或存储器控制器、外围总线、以及使用任何各种总线体系架构的局部总线。例如,这种体系架构可以包括工业标准体系架构(ISA)总线、微通道体系架构(MCA)总线、增强型ISA(EISA)总线、视频电子标准协会(VESA)局部总线和外围部件互连(PCI)总线,其可以被实现为按IEEE P1386.1标准制造的Mezzanine总线。The bus subsystem 2202 provides a mechanism for allowing the various components and subsystems of the computer system 2200 to communicate with each other by intention. Although the bus subsystem 2202 is schematically shown as a single bus, the alternative embodiment of the bus subsystem can utilize multiple buses. The bus subsystem 2202 can be any of several types of bus structures, including a memory bus or a memory controller, a peripheral bus, and a local bus using any various bus architectures. For example, this architecture can include an industrial standard architecture (ISA) bus, a microchannel architecture (MCA) bus, an enhanced ISA (EISA) bus, a video electronics standard association (VESA) local bus, and a peripheral component interconnect (PCI) bus, which can be implemented as a Mezzanine bus manufactured by the IEEE P1386.1 standard.
可以被实现为一个或多个集成电路(例如,常规微处理器或微控制器)的处理单元2204控制计算机系统2200的操作。一个或多个处理器可以被包括在处理单元2204中。这些处理器可以包括单核或多核处理器。在某些实施例中,处理单元2204可以被实现为一个或多个独立的处理单元2232和/或2234,其中在每个处理单元中包括单核或多核处理器。在其他实施例中,处理单元2204也可以被实现为通过将两个双核处理器集成到单个芯片中形成的四核处理单元。The processing unit 2204, which may be implemented as one or more integrated circuits (e.g., conventional microprocessors or microcontrollers), controls the operation of the computer system 2200. One or more processors may be included in the processing unit 2204. These processors may include single-core or multi-core processors. In certain embodiments, the processing unit 2204 may be implemented as one or more independent processing units 2232 and/or 2234, wherein a single-core or multi-core processor is included in each processing unit. In other embodiments, the processing unit 2204 may also be implemented as a quad-core processing unit formed by integrating two dual-core processors into a single chip.
在各种实施例中,处理单元2204可以响应于程序代码执行各种程序并且可以维护多个并发执行的程序或进程。在任何给定的时间,要被执行的程序代码中的一些或全部代码可以驻留在(一个或多个)处理器2204中和/或存储子系统2218中。通过适当的编程,(一个或多个)处理器2204可以提供上述各种功能。计算机系统2200可以附加地包括处理加速单元2206,其可以包括数字信号处理器(DSP)、专用处理器,等等。In various embodiments, the processing unit 2204 can execute various programs in response to the program code and can maintain multiple concurrently executed programs or processes. At any given time, some or all of the program code to be executed may reside in (one or more) processors 2204 and/or in the storage subsystem 2218. Through appropriate programming, (one or more) processors 2204 can provide the various functions described above. The computer system 2200 can additionally include a processing acceleration unit 2206, which can include a digital signal processor (DSP), a special processor, and the like.
I/O子系统2208可以包括用户接口输入设备和用户接口输出设备。用户接口输入设备可以包括键盘、诸如鼠标或轨迹球的定点设备、结合到显示器中的触摸板或触摸屏、滚动轮、点击轮、拨盘、按钮、开关、键盘、具有语音命令识别系统的音频输入设备、麦克风以及其他类型的输入设备。用户接口输入设备可以包括,例如,运动感测和/或手势识别设备,诸如的Microsoft 运动传感器,其使得用户能够使用手势和语音命令通过自然用户接口来控制诸如的Microsoft 360游戏控制器的输入设备并与之交互。用户接口输入设备也可以包括眼睛姿势识别设备,诸如从用户检测眼睛活动(例如,当拍摄照片和/或做出菜单选择时的“眨眼”)并且将眼睛姿势转换为到输入设备(例如,Google)中的输入的Google 眨眼检测器。此外,用户接口输入设备可以包括使用户能够通过语音命令与语音识别系统(例如,导航器)交互的语音识别感测设备。I/O subsystem 2208 may include user interface input devices and user interface output devices. User interface input devices may include a keyboard, a pointing device such as a mouse or trackball, a touch pad or touch screen incorporated into a display, a scroll wheel, a click wheel, a dial, buttons, switches, a keyboard, an audio input device with a voice command recognition system, a microphone, and other types of input devices. User interface input devices may include, for example, motion sensing and/or gesture recognition devices such as Microsoft Motion sensors that enable users to control apps such as Microsoft 360 game controller. The user interface input device may also include an eye gesture recognition device, such as detecting eye activity from the user (e.g., a "wink" when taking a picture and/or making a menu selection) and translating eye gestures to the input device (e.g., Google ) in Google In addition, the user interface input device may include a device that enables the user to communicate with the voice recognition system (e.g., Navigator) interactive voice recognition sensing device.
用户接口输入设备也可以包括但不限于三维(3D)鼠标、操纵杆或指向棒、游戏面板和绘图板,以及音频/视频设备,诸如扬声器、数码相机、数码摄像机、便携式媒体播放器、网络摄像头、图像扫描仪、指纹扫描仪、条形码阅读器3D扫描仪、3D打印机、激光测距仪和视线跟踪设备。此外,用户接口输入设备可以包括,例如,医学成像输入设备,诸如计算机断层扫描、磁共振成像、正电子发射断层摄影术、医疗超声设备。用户接口输入设备也可以包括,例如,诸如MIDI键盘、数字乐器等的音频输入设备。The user interface input device may also include, but is not limited to, a three-dimensional (3D) mouse, a joystick or pointing stick, a game panel and a drawing board, and audio/video equipment such as a speaker, a digital camera, a digital video camera, a portable media player, a webcam, an image scanner, a fingerprint scanner, a barcode reader 3D scanner, a 3D printer, a laser rangefinder, and a sight tracking device. In addition, the user interface input device may include, for example, a medical imaging input device such as a computer tomography, a magnetic resonance imaging, a positron emission tomography, a medical ultrasound device. The user interface input device may also include, for example, an audio input device such as a MIDI keyboard, a digital musical instrument, etc.
用户接口输出设备可以包括显示子系统、指示灯,或者诸如音频输出设备的非可视显示器,等等。显示子系统可以是阴极射线管(CRT)、诸如使用液晶显示器(LCD)或等离子显示器的平板设备、投影设备、触摸屏,等等。一般而言,术语“输出设备”的使用意在包括用于从计算机系统2200向用户或其他计算机输出信息的所有可能类型的设备和机制。例如,用户接口输出设备可以包括,但不限于,可视地传达文本、图形和音频/视频信息的各种显示设备,诸如监视器、打印机、扬声器、耳机、汽车导航系统、绘图仪、语音输出设备,以及调制解调器。The user interface output devices may include a display subsystem, indicator lights, or non-visual displays such as audio output devices, etc. The display subsystem may be a cathode ray tube (CRT), a flat panel device such as using a liquid crystal display (LCD) or plasma display, a projection device, a touch screen, etc. In general, the use of the term "output device" is intended to include all possible types of devices and mechanisms for outputting information from the computer system 2200 to a user or other computers. For example, the user interface output devices may include, but are not limited to, various display devices that visually convey text, graphics, and audio/video information, such as monitors, printers, speakers, headphones, car navigation systems, plotters, voice output devices, and modems.
计算机系统2200可以包括包含软件元件、被示为当前位于系统存储器2210中的存储子系统2218。系统存储器2210可以存储可加载并且可在处理单元2204上执行的程序指令,以及在这些程序的执行期间所产生的数据。Computer system 2200 may include a storage subsystem 2218 containing software elements, shown as currently located in system memory 2210. System memory 2210 may store program instructions that may be loaded and executed on processing unit 2204, as well as data generated during execution of these programs.
取决于计算机系统2200的配置和类型,系统存储器2210可以是易失性的(诸如随机存取存储器(RAM))和/或非易失性的(诸如只读存储器(ROM)、闪存存储器,等等)。RAM通常包含可被处理单元2204立即访问和/或目前正被处理单元2204操作和执行的数据和/或程序模块。在一些实现中,系统存储器2210可以包括多种不同类型的存储器,例如静态随机存取存储器(SRAM)或动态随机存取存储器(DRAM)。在一些实现中,诸如包含有助于在启动期间在计算机系统2200的元件之间传送信息的基本例程的基本输入/输出系统(BIOS),通常可以被存储在ROM中。作为示例,但不是限制,系统存储器2210也示出了可以包括客户端应用、web浏览器、中间层应用、关系数据库管理系统(RDBMS)等的应用程序2212,程序数据2214,以及操作系统2216。作为示例,操作系统2216可以包括各种版本的MicrosoftApple 和/或Linux操作系统、各种可商业获得的或类UNIX操作系统(包括但不限于各种GNU/Linux操作系统、Google 操作系统等)和/或诸如iOS、Phone、OS、17OS和OS操作系统的移动操作系统。Depending on the configuration and type of computer system 2200, system memory 2210 may be volatile (such as random access memory (RAM)) and/or non-volatile (such as read-only memory (ROM), flash memory, etc.). RAM typically contains data and/or program modules that are immediately accessible to and/or currently being operated and executed by processing unit 2204. In some implementations, system memory 2210 may include multiple different types of memory, such as static random access memory (SRAM) or dynamic random access memory (DRAM). In some implementations, a basic input/output system (BIOS), such as one that contains basic routines that help transfer information between elements of computer system 2200 during startup, may typically be stored in ROM. By way of example, but not limitation, system memory 2210 also illustrates application programs 2212 that may include client applications, web browsers, middle-tier applications, relational database management systems (RDBMS), etc., program data 2214, and an operating system 2216. By way of example, operating system 2216 may include various versions of Microsoft Apple and/or Linux operating systems, various commercially available or UNIX-like operating systems (including but not limited to various GNU/Linux operating systems, Google operating systems, etc.) and/or such as iOS, Phone, OS, 17OS and OS operating system's mobile operating system.
存储子系统2218也可以提供用于存储提供一些实施例的功能的基本编程和数据结构的有形计算机可读存储介质。当被处理器执行时提供上述功能的软件(程序、代码模块、指令)可以被存储在存储子系统2218中。这些软件模块或指令可以被处理单元2204执行。存储子系统2218也可以提供用于存储根据本公开被使用的数据的储存库。The storage subsystem 2218 may also provide a tangible computer-readable storage medium for storing basic programming and data structures that provide the functionality of some embodiments. Software (programs, code modules, instructions) that provide the above-described functionality when executed by the processor may be stored in the storage subsystem 2218. These software modules or instructions may be executed by the processing unit 2204. The storage subsystem 2218 may also provide a repository for storing data used in accordance with the present disclosure.
存储子系统2200也可以包括可被进一步连接到计算机可读存储介质2222的计算机可读存储介质读取器2220。与系统存储器2210一起并且,可选地,与其相结合,计算机可读存储介质2222可以全面地表示用于临时和/或更持久地包含、存储、发送和检索计算机可读信息的远程、本地、固定和/或可移除存储设备加存储介质The storage subsystem 2200 may also include a computer-readable storage medium reader 2220 that may be further connected to a computer-readable storage medium 2222. Together with the system memory 2210 and, optionally, in conjunction therewith, the computer-readable storage medium 2222 may comprehensively represent remote, local, fixed, and/or removable storage devices and storage media for temporarily and/or more permanently containing, storing, transmitting, and retrieving computer-readable information.
包含代码或代码的部分的计算机可读存储介质2222也可以包括本领域已知或使用的任何适当的介质,包括存储介质和通信介质,诸如但不限于,以用于信息的存储和/或传输的任何方法或技术实现的易失性和非易失性、可移除和不可移除介质。这可以包括有形的计算机可读存储介质,诸如RAM、ROM、电可擦除可编程ROM(EEPROM)、闪存存储器或其他存储器技术、CD-ROM、数字多功能盘(DVD)或其他光学储存器、磁带盒、磁带、磁盘储存器或其他磁存储设备,或者其他有形的计算机可读介质。这还可以包括非有形的计算机可读介质,诸如数据信号、数据传输或可以被用于传输期望信息并可由计算系统2200访问的任何其他介质。The computer-readable storage medium 2222 containing the code or portions of the code may also include any suitable media known or used in the art, including storage media and communication media, such as, but not limited to, volatile and non-volatile, removable and non-removable media implemented in any method or technology for storage and/or transmission of information. This may include tangible computer-readable storage media, such as RAM, ROM, electrically erasable programmable ROM (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disk (DVD) or other optical storage, cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or other tangible computer-readable media. This may also include non-tangible computer-readable media, such as data signals, data transmissions, or any other media that can be used to transmit the desired information and can be accessed by the computing system 2200.
举例来说,计算机可读存储介质2222可以包括从不可移除的非易失性磁介质读取或写到其的硬盘驱动器、从可移除的非易失性磁盘读取或写到其的磁盘驱动器、以及从可移除的非易失性光盘(诸如CD ROM、DVD和盘或其他光学介质)读取或写到其的光盘驱动器。计算机可读存储介质2222可以包括,但不限于,驱动器、闪存卡、通用串行总线(USB)闪存驱动器、安全数字(SD)卡、DVD盘、数字音频带,等等。计算机可读存储介质2222也可以包括基于非易失性存储器的固态驱动器(SSD)(诸如基于闪存存储器的SSD、企业闪存驱动器、固态ROM等)、基于易失性存储器的SSD(诸如固态RAM、动态RAM、静态RAM)、基于DRAM的SSD,磁阻RAM(MRAM)SSD,以及使用基于DRAM和闪存存储器的SSD的组合的混合SSD。盘驱动器及其关联的计算机可读介质可以为计算机系统2200提供计算机可读指令、数据结构、程序模块及其他数据的非易失性存储。By way of example, computer-readable storage media 2222 may include a hard drive that reads from or writes to non-removable nonvolatile magnetic media, a magnetic disk drive that reads from or writes to removable nonvolatile magnetic disks, and a magnetic disk drive that reads from or writes to removable nonvolatile optical disks (such as CD ROMs, DVDs, and optical drives). Computer readable storage media 2222 may include, but are not limited to, The computer readable storage medium 2222 may include a solid-state drive (SSD) based on non-volatile memory (such as a flash memory-based SSD, an enterprise flash drive, a solid-state ROM, etc.), a volatile memory-based SSD (such as a solid-state RAM, a dynamic RAM, a static RAM), a DRAM-based SSD, a magnetoresistive RAM (MRAM) SSD, and a hybrid SSD using a combination of DRAM and flash memory-based SSDs. The disk drive and its associated computer-readable media may provide non-volatile storage of computer-readable instructions, data structures, program modules, and other data for the computer system 2200.
通信子系统2224提供到其他计算机系统和网络的接口。通信子系统2224用作用于从其他系统接收数据和从计算机系统2200向其他系统发送数据的接口。例如,通信子系统2224可以使计算机系统2200能够经由互联网连接到一个或多个设备。在一些实施例中,通信子系统2224可以包括用于访问无线语音和/或数据网络的射频(RF)收发器部件(例如,使用蜂窝电话技术,诸如3G、4G或EDGE(用于全球演进的增强型数据速率)的先进数据网络技术,Wi-Fi(IEEE 802.11系列标准),或其他移动通信技术,或其任何组合)、全球定位系统(GPS)接收器部件和/或其他部件。在一些实施例中,作为无线接口的附加或者替代,通信子系统2224可以提供有线网络连接(例如,以太网)。The communication subsystem 2224 provides an interface to other computer systems and networks. The communication subsystem 2224 is used as an interface for receiving data from other systems and sending data from the computer system 2200 to other systems. For example, the communication subsystem 2224 can enable the computer system 2200 to be connected to one or more devices via the Internet. In some embodiments, the communication subsystem 2224 may include a radio frequency (RF) transceiver component for accessing a wireless voice and/or data network (e.g., using cellular phone technology, advanced data network technology such as 3G, 4G or EDGE (Enhanced Data Rates for Global Evolution), Wi-Fi (IEEE 802.11 series standards), or other mobile communication technologies, or any combination thereof), a global positioning system (GPS) receiver component and/or other components. In some embodiments, as an addition or replacement of a wireless interface, the communication subsystem 2224 may provide a wired network connection (e.g., Ethernet).
在一些实施例中,通信子系统2224也可以代表可以使用计算机系统2200的一个或多个用户接收结构化和/或非结构化数据馈送2226、事件流2228、事件更新2230等形式的输入通信。In some embodiments, the communication subsystem 2224 may also receive input communications in the form of structured and/or unstructured data feeds 2226 , event streams 2228 , event updates 2230 , and the like on behalf of one or more users who may use the computer system 2200 .
举例来说,通信子系统2224可以被配置为实时地从社交网络和/或其他通信服务的用户接收数据馈送2226,诸如馈送、更新、诸如丰富站点摘要(RSS)馈送的web馈送和/或来自一个或多个第三方信息源的实时更新。For example, the communication subsystem 2224 may be configured to receive data feeds 2226 in real time from users of social networks and/or other communication services, such as feed, Updates, web feeds such as Rich Site Summary (RSS) feeds, and/or real-time updates from one or more third-party information sources.
此外,通信子系统2224也可以被配置为接收连续数据流形式的数据,这可以包括本质上可以是连续的或无界的没有明确终止的实时事件的事件流2228和/或事件更新2230。产生连续数据的应用的示例可以包括,例如,传感器数据应用、金融报价机、网络性能测量工具(例如,网络监视和流量管理应用)、点击流分析工具、汽车流量监视,等等。Additionally, the communication subsystem 2224 may also be configured to receive data in the form of a continuous data stream, which may include event streams 2228 and/or event updates 2230, which may be continuous or unbounded in nature, real-time events without explicit termination. Examples of applications that generate continuous data may include, for example, sensor data applications, financial quote machines, network performance measurement tools (e.g., network monitoring and traffic management applications), clickstream analysis tools, automotive traffic monitoring, and the like.
通信子系统2224也可以被配置为向一个或多个数据库输出结构化和/或非结构化数据馈送2226、事件流2228、事件更新2230,等等,这一个或多个数据库可以与耦合到计算机系统2200的一个或多个流式数据源计算机通信。The communication subsystem 2224 can also be configured to output structured and/or unstructured data feeds 2226, event streams 2228, event updates 2230, etc. to one or more databases, which can communicate with one or more streaming data source computers coupled to the computer system 2200.
计算机系统2200可以是各种类型之一,包括手持便携式设备(例如,蜂窝电话、计算平板电脑、PDA)、可穿戴设备(例如,Glass头戴式显示器)、PC、工作站、大型机、信息站、服务器机架、或任何其他数据处理系统。Computer system 2200 may be one of various types, including a handheld portable device (e.g., Cellular phone, computing tablets, PDAs), wearable devices (e.g. Glass head mounted display), PC, workstation, mainframe, kiosk, server rack, or any other data processing system.
由于计算机和网络的不断变化的本质,在图中绘出的计算机系统2200的描述仅仅要作为具体的示例。具有比图中绘出的系统更多或更少部件的许多其他配置是可能的。例如,定制的硬件也可以被使用和/或特定的元素可以用硬件、固件、软件(包括applets)或其组合来实现。另外,也可以采用到诸如网络输入/输出设备之类的其他计算设备的连接。基于本文提供的公开内容和示教,本领域普通技术人员将认识到实现各种实施例的其他方式和/或方法。Due to the ever-changing nature of computers and networks, the description of the computer system 2200 depicted in the figure is intended only as a specific example. Many other configurations with more or fewer components than the system depicted in the figure are possible. For example, customized hardware may also be used and/or specific elements may be implemented with hardware, firmware, software (including applets), or a combination thereof. In addition, connections to other computing devices such as network input/output devices may also be employed. Based on the disclosure and teachings provided herein, one of ordinary skill in the art will recognize other ways and/or methods of implementing various embodiments.
虽然已经描述了本公开的具体实施例,但是各种修改、变更、替代构造和等效形式也包含在本公开的范围内。本公开的实施例不限于在某些特定数据处理环境内操作,而是可以在多个数据处理环境内自由操作。此外,虽然已经使用特定系列的事务和步骤描述了本公开的实施例,但是本领域技术人员应该清楚本公开的范围不限于所描述系列的事务和步骤。上述实施例的各种特征和方面可以单独或联合使用。Although specific embodiments of the present disclosure have been described, various modifications, changes, alternative constructions and equivalent forms are also included in the scope of the present disclosure. The embodiments of the present disclosure are not limited to operating in certain specific data processing environments, but can be freely operated in multiple data processing environments. In addition, although the embodiments of the present disclosure have been described using a specific series of transactions and steps, it should be clear to those skilled in the art that the scope of the present disclosure is not limited to the described series of transactions and steps. The various features and aspects of the above-mentioned embodiments can be used alone or in combination.
另外,虽然已经使用硬件和软件的特定组合描述了本公开的实施例,但是应当认识到硬件和软件的其他组合也在本公开的范围内。本公开的实施例可以仅用硬件、或仅用软件、或使用它们的组合来实现。本文描述的各种处理可以以任何组合在相同的处理器或在不同的处理器上实现。因而,在组件或模块被描述为被配置为执行某些操作的情况下,可以通过例如设计电子电路来执行操作、通过对可编程电子电路(诸如微处理器)进行编程来执行操作,或其任何组合来完成这样的配置。处理可以使用多种技术进行通信,包括但不限于用于处理间通信的常规技术,并且不同的处理对可以使用不同的技术,或者同一对处理可以在不同时间使用不同的技术。In addition, although the embodiments of the present disclosure have been described using a specific combination of hardware and software, it should be appreciated that other combinations of hardware and software are also within the scope of the present disclosure. The embodiments of the present disclosure can be implemented using only hardware, or only software, or using a combination thereof. The various processes described herein can be implemented in any combination on the same processor or on different processors. Thus, in the case where a component or module is described as being configured to perform certain operations, such configurations can be accomplished by, for example, designing an electronic circuit to perform the operation, by programming a programmable electronic circuit (such as a microprocessor) to perform the operation, or any combination thereof. Processes can communicate using a variety of techniques, including but not limited to conventional techniques for inter-process communication, and different pairs of processes can use different techniques, or the same pair of processes can use different techniques at different times.
因而,说明书和附图被认为是说明性的而不是限制性的。但是,显然可以对其进行添加、减少、删除和其他修改和改变而不背离权利要求中阐述的更广泛的精神和范围。因此,虽然已经描述了具体的公开实施例,但这些并不旨在进行限制。各种修改和等效形式都在以下权利要求的范围内。The description and drawings are therefore to be regarded as illustrative rather than restrictive. However, additions, subtractions, deletions and other modifications and changes may be made without departing from the broader spirit and scope set forth in the claims. Therefore, although specific disclosed embodiments have been described, these are not intended to be limiting. Various modifications and equivalent forms are within the scope of the following claims.
在描述所公开的实施例的上下文中(尤其在以下权利要求的上下文中)使用术语“一”和“一个”和“该”以及类似的指称要被解释为涵盖单数和复数,除非本文另有指示或与上下文明显矛盾。除非另有说明,否则术语“包括”、“具有”、“包含(including)”和“包含(containing)”要被解释为开放式术语(即,意思是“包括但不限于”)。术语“连接”应被解释为部分或全部包含在、附加到或连接在一起,即使中间存在一些东西。除非本文另有指示,否则本文中值范围的列举仅旨在用作个别引用落入该范围内的每个单独值的速记方法,并且每个单独值被并入说明书中,就好像它在本文中个别列举一样。除非本文另有指示或与上下文明显矛盾,否则本文所述的所有方法都可以以任何合适的顺序执行。本文提供的任何和所有示例或示例性语言(例如,“诸如”)的使用仅旨在更好地阐明本公开的实施例并且不对本公开的范围构成限制,除非另有声明。说明书中的任何语言都不应被解释为指示任何未要求保护的元素对于本公开的实践是必不可少的。The use of the terms "one" and "an" and "the" and similar references in the context of describing the disclosed embodiments (especially in the context of the following claims) is to be interpreted as covering the singular and the plural, unless otherwise indicated herein or clearly contradicted by the context. Unless otherwise stated, the terms "include", "have", "include (including)" and "include (containing)" are to be interpreted as open terms (i.e., meaning "including but not limited to"). The term "connected" should be interpreted as being partially or completely contained in, attached to or connected together, even if there is something in the middle. Unless otherwise indicated herein, the enumeration of the value range herein is intended only to be used as a shorthand method for individually citing each individual value falling within the range, and each individual value is incorporated into the specification as if it were individually listed herein. Unless otherwise indicated herein or clearly contradicted by the context, all methods described herein can be performed in any suitable order. The use of any and all examples or exemplary language (e.g., "such as") provided herein is intended only to better illustrate the embodiments of the present disclosure and is not intended to limit the scope of the present disclosure, unless otherwise stated. No language in the specification should be construed as indicating any non-claimed element as essential to the practice of the disclosure.
析取语言,诸如短语“X、Y或Z中的至少一个”,除非另有明确说明,否则旨在在一般用于表示项目、术语等的上下文中理解,可以是X、Y或Z,或它们的任何组合(例如,X、Y和/或Z)。因此,这种析取语言通常不旨在也不应暗示某些实施例需要X中的至少一个、Y中的至少一个或Z中的至少一个各自存在。Disjunctive language, such as the phrase "at least one of X, Y, or Z," is intended to be understood in the context generally used to indicate that an item, term, or the like, can be X, Y, or Z, or any combination thereof (e.g., X, Y, and/or Z), unless expressly stated otherwise. Thus, such disjunctive language is generally not intended to, and should not, imply that certain embodiments require that at least one of X, at least one of Y, or at least one of Z each be present.
本文描述了本公开的优选实施例,包括发明人已知用于实施本公开的最佳模式。那些优选实施例的变型对于本领域普通技术人员在阅读上述描述后会变得显而易见。发明人预期技术人员能够适当地采用这样的变型并且发明人预期以不同于本文具体描述的方式来实践本公开。因而,本公开包括在适用法律允许的情况下对所附权利要求中记载的主题的所有修改和等效形式。此外,除非在本文中另有指示或者以其他方式与上下文明显矛盾,否则本公开包括在其所有可能的变化中的上述元素的任何组合。Preferred embodiments of the present disclosure are described herein, including the best mode known to the inventor for implementing the present disclosure. Variations of those preferred embodiments will become apparent to those of ordinary skill in the art after reading the above description. The inventor expects that the skilled person will be able to appropriately adopt such variations and the inventor expects to practice the present disclosure in a manner different from that specifically described herein. Thus, the present disclosure includes all modifications and equivalent forms of the subject matter recorded in the appended claims where permitted by applicable law. In addition, unless otherwise indicated herein or otherwise clearly contradictory to the context, the present disclosure includes any combination of the above-mentioned elements in all possible variations thereof.
本文引用的所有参考文献,包括出版物、专利申请和专利,均以相同的程度通过引用并入本文,就好像每个参考文献个别且具体地指示通过引用并入并在本文中全文阐述一样。在前述的说明书中,本公开的各方面参考其具体实施例进行了描述,但本领域技术人员将认识到的是,本公开不限于此。上述公开的各个特征和方面可以被单独或联合使用。此外,在不脱离本说明书的更广泛精神和范围的情况下,实施例可以在除本文所述的那些之外的任何数量的环境和应用中被使用。因而,本说明书和附图应当被认为是说明性而不是限制性的。All references cited herein, including publications, patent applications and patents, are incorporated herein by reference to the same extent, as if each reference is individually and specifically indicated to be incorporated by reference and set forth in full herein. In the aforementioned specification, various aspects of the present disclosure are described with reference to their specific embodiments, but it will be appreciated by those skilled in the art that the present disclosure is not limited thereto. Each feature and aspect disclosed above can be used individually or in combination. In addition, without departing from the broader spirit and scope of this specification, embodiments can be used in any number of environments and applications other than those described herein. Thus, this specification and accompanying drawings should be considered illustrative rather than restrictive.
Claims (20)
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US63/306,007 | 2022-02-02 | ||
US63/306,918 | 2022-02-04 | ||
US63/321,614 | 2022-03-18 | ||
US63/333,965 | 2022-04-22 | ||
US63/336,811 | 2022-04-29 | ||
US63/339,297 | 2022-05-06 | ||
US63/350,212 | 2022-06-08 | ||
US202263416784P | 2022-10-17 | 2022-10-17 | |
US63/416,784 | 2022-10-17 | ||
PCT/US2023/061721 WO2023150530A1 (en) | 2022-02-02 | 2023-02-01 | Observability framework for a multi-cloud infrastructure |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118696301A true CN118696301A (en) | 2024-09-24 |
Family
ID=92766981
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202380019796.2A Pending CN118696301A (en) | 2022-02-02 | 2023-02-01 | Observability framework for multi-cloud infrastructure |
CN202380019801.XA Pending CN118696302A (en) | 2022-02-02 | 2023-02-01 | Generate graphical user interfaces for multi-cloud applications |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202380019801.XA Pending CN118696302A (en) | 2022-02-02 | 2023-02-01 | Generate graphical user interfaces for multi-cloud applications |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN118696301A (en) |
-
2023
- 2023-02-01 CN CN202380019796.2A patent/CN118696301A/en active Pending
- 2023-02-01 CN CN202380019801.XA patent/CN118696302A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN118696302A (en) | 2024-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP2025507288A (en) | Identity propagation across different cloud service providers | |
US20230244540A1 (en) | Multi-cloud control plane architecture | |
US20230244505A1 (en) | Generating graphical user interfaces for multi-cloud applications | |
JP2025506394A (en) | Configuring network links to establish communication between different cloud environments | |
JP2025506396A (en) | Network technology to enable communication between different cloud environments | |
US20240129242A1 (en) | Network link establishment for saas applications in a multi-cloud infrastructure | |
US20250086001A1 (en) | Token exchange service | |
CN118696301A (en) | Observability framework for multi-cloud infrastructure | |
CN118647978A (en) | Multi-cloud control plane architecture | |
CN118633082A (en) | Configure the network-link used to establish communication between different cloud environments | |
WO2024233126A1 (en) | Architecture of a multicloud network link | |
CN118661160A (en) | Using Cloud-Link Adapter for consumption of cloud services |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |