Resource categorization for policy framework

ABSTRACT

Some embodiments provide a method for managing a set of computing resources. The method imports descriptions of computing resources from several heterogeneous sources. The descriptions specify categories for the computing resources. The different sources use different types of categories for the resource descriptions. Based on the categories specified for the computing resources in the set, the method derives additional categories for at least a subset of the computing resources. The method stores each imported computing resource tagged according to its specified and derived categories, wherein the category tags are used for binding policies to the computing resources.

BACKGROUND

Policies can be a powerful tool for managing complex environments withvast numbers of resources, such as a software-defined datacenter (SDDC).If a business' requirements, intentions, rules, etc. can be captured ina set of policies, these policies can be used to drive automatedprocesses that enact and enforce the business' will. This improvesaccuracy and efficiency by removing manual human intervention andguarantees corporate governance is maintained. Because automation iscentral to the idea of the SDDC, policy-based management is critical tothe realization of the SDDC.

However, across the various platforms used to manage the SDDC, policymay mean different things, and policies are implemented in verydifferent ways. For instance, virtual machine (VM) placement may beperformed in part based on one type of policy, networking configurationsare constrained based on a different type of policy, etc. FIG. 1illustrates an example of the policy sources and types of policies thatmight govern a set of computing resources. A storage manager 105 definesplacement, configuration, and security policies for storage, a networkmanager 110 defines its own placement, configuration and securitypolicies relating to the network, and a compute manager 115 also has itsplacement, configuration, and security policies relating to the datacompute nodes (e.g., VMs, containers, physical machines) in thedatacenter. In addition, an application manager 120 defines itsplacement, configuration, provisioning, and role-based access control(RBAC) policies, while an infrastructure manager 125 definesconfiguration and placement policies. Industry standards 130 alsoregulate the datacenter, defining various configuration, remediation,security, and best practice policies relating to a particular industry.Though six specific policy sources are shown in this figure, it shouldbe understood that in many cases, different datacenters may include manyother policy sources and/or policy types than those shown in thisfigure.

These divergent policies may pose significant challenges to thedatacenter managers. In addition to confusion, higher-level businessrequirements may be difficult and complex to implement as policies.Multiple configurations, across multiple components, administered bymultiple user roles must be coordinated. As an example, if a companyrequires that all of its “Mission Critical” applications exhibitspecific availability, quality-of-service, and security requirements,this could potentially require configurations across numerous componentsthat manage different aspects of the SDDC. Ideally, a datacenteradministrator/owner should be able to manage the entire SDDC withoutsuch confusion and complexity, while still having the freedom to choosefrom various different policy options to accomplish their goals.

BRIEF SUMMARY

Some embodiments provide a policy unification framework for managing aset of computing resources, such as those in a datacenter (e.g., asoftware-defined datacenter) or a set of datacenters (e.g., a singledatacenter, multiple datacenters, a hybrid of an enterprise datacenterand resources in cloud datacenters, etc.). The policy unificationframework of some embodiments imports policies and resource descriptionsfrom various sources, binds (i.e., applies) the policies to theresources according to binding rules and categories to which theresources belong, and provides the policy bindings to a set of policyengines (which may overlap with the sources of the policies and/orresource descriptions).

In some embodiments, the policy unification framework includes a policystore for automatically ingesting and storing policies fromheterogeneous sources (e.g., network managers, storage managers, computeserver managers, industry standards, etc.). These imported policies maybe written in a variety of different languages (usually standards basedor proprietary domain-specific languages) with different encodings(e.g., XML, JSON, plaintext, etc.), but upon import are stored in anormalization wrapper such that all policies have the samerepresentation within the unified framework. The normalization wrapperof some embodiments provides the policy with a name and group (ornamespace, which allows multiple different policies to have the samename so long as they do not also share a common namespace), and storesthe content of the policy (e.g., the policy as written in the datalog,XML schema, JSON schema, etc. used by the policy provider) as anotherfield of the wrapped policy.

The imported policies, in some embodiments, are stored as primitive(also called atomic) policies. The primitive policies represent a singlepolicy, with the policy content defined within the policy wrapper. Fromthese primitive policies, users of the policy unification framework candefine composite policies, that refer to the primitive policies. Acomposite policy, in some embodiments, may involve a reference to asingle primitive policy (e.g., in order to provide parameters for theprimitive policy) or to multiple primitive policies. In addition,composite policies may refer to other composite policies.

In addition to the policy store, the policy unification framework ofsome embodiments also includes a resource store for ingesting andstoring descriptions of the computing resources being managed from a setof heterogeneous sources, which may overlap with the sources ofpolicies. These resources may include any entity that either constitutesa datacenter or operates (as hardware or software) either within themanaged datacenter or outside of a managed datacenter but in concertwith the managed datacenter (e.g., a cloud resource). Examples of suchresources may include VMs, containers, servers, server racks, powercircuits, datacenters and/or subsections of datacenters, users, usergroups, applications, operating systems, services, etc., though thislisting is not meant in any way to be limiting. From each source, theresource store reads in the descriptions of the computing resourcesmanaged by the source, which includes categories to which the resourcesbelong. For instance, for a particular VM, the categories could includein which datacenter and/or rack and/or server it is located, whichoperating system it is running, whether it is an app server/webserver/database server, etc.

Furthermore, the resource store of some embodiments may use a resourcecategorization service that derives additional categories for theresources. For example, the categorization service might detect whencertain individual categories from various different sources areeffectively the same, and create an amalgamated category for anyresources that fall into any of the individual categories. Thecategorization service might also derive categories for resources thatare categorized in a first category by a first source and a secondcategory by a second source.

The policies (both primitive imported policies and user-definedcomposite policies) are then applied to the resources based on a set ofbinding rules that are stored with the policies. These binding rules maybe defined by the user of the policy framework (e.g., a datacenteradministrator) or may be built-in to the framework. In some embodiments,each binding rule specifies, for a policy or set of policies, one ormore categories of resources to which the policies will be bound. Forinstance, a policy might be bound to all VMs in a particular datacenter,all servers that host a particular type of VM, etc. The binding rulesmay specify bindings of primitive policies or composite policies.

A compiler of the policy unification framework of some embodiments usesthe binding rules to generate, for each resource for which informationis stored by the system, a set of effective policies to apply to theresource. This compilation process flattens the composite policies thatare applied to the resource, such that the effective policies specifyall of the primitive policies to apply to the resource. These effectivepolicies can then be consumed by various policy engines (which may bethe same as the sources that provided some of the policies and/orresource descriptions in the first place). In addition, some embodimentsallow for the inclusion of specific exceptions to policy binding rules(i.e., to not apply policy X to resource A). In some cases, adequateexplanations may be required as documentation for those exceptions(e.g., for audit-related purposes).

In some embodiments, as mentioned, the policies are wrapped in anormalization wrapper in order for policies from a variety ofheterogeneous sources to be treated in the same manner by the policyframework, and easily composed into composite policies and applied toresources. In addition to treating the policy definition (e.g., thepolicy as written in its standards based or domain-specific language,etc.) as a blob of content, the wrapper allows for easy composition anduse of parameters to customize policies. In some embodiments, aprimitive policy may include unspecified parameters, while compositepolicies that refer to that primitive policy specify the values of theparameters for a particular instance of the primitive policy. As anexample, a policy specifying limits on VMs for a group might leave openthe min/max memory, processor usage, disk space, etc. allowed for a VM.Different groups can then define composite policies that refer to theprimitive policy, specifying different values for these parameters. Inaddition, the composition language of some embodiments allows theparameters to be defined by references to values found elsewhere (e.g.,passed down from a higher-level composite policy, defined by a resourceto which the policy is applied, etc.) or be a function of one or morevalues (e.g., a Max or Min function of multiple values that may beprovided to the policy). Furthermore, the composition language allowsconditional policy references in some embodiments. For instance, acomposite policy might refer to a first primitive policy if a conditionis met and a second primitive policy if the condition is not met.Similarly, the composite policy might refer to the same primitivepolicy, but pass different parameters depending on whether or not thecondition is met.

The policy unification framework of some embodiments provides a userinterface that allows an administrator of a system (e.g., an enterprisenetwork) to view the policies, binding rules, and resources of thesystem. In some embodiments, the administrator can use the UI to createand edit composite policies, binding rules, and resource categoryderivation rules. When creating and editing the composite policies, theuser may define how the policies are composed according to the policycomposition features allowed by the composition language (e.g., defineconditions for referencing policies, provide the parameters for thepolicy references, etc.).

Some embodiments also provide a policy validation engine within thepolicy unification framework. The application of heterogeneous policiesfrom several frameworks may create conflicts, and the policy validationengine provides rules for resolving such issues within the framework(e.g., deciding which policy supersedes the other, notifying theadministrator of the issue, etc.).

The preceding Summary is intended to serve as a brief introduction tosome embodiments of the invention. It is not meant to be an introductionor overview of all inventive subject matter disclosed in this document.The Detailed Description that follows and the Drawings that are referredto in the Detailed Description will further describe the embodimentsdescribed in the Summary as well as other embodiments. Accordingly, tounderstand all the embodiments described by this document, a full reviewof the Summary, Detailed Description and the Drawings is needed.Moreover, the claimed subject matters are not to be limited by theillustrative details in the Summary, Detailed Description and theDrawing, but rather are to be defined by the appended claims, becausethe claimed subject matters can be embodied in other specific formswithout departing from the spirit of the subject matters.

BRIEF DESCRIPTION OF THE DRAWINGS

The novel features of the invention are set forth in the appendedclaims. However, for purpose of explanation, several embodiments of theinvention are set forth in the following figures.

FIG. 1 illustrates an example of the policy sources and types ofpolicies that might govern a set of computing resources.

FIG. 2 conceptually illustrates a policy unification framework of someembodiments.

FIG. 3 conceptually illustrates the architecture of the policyunification framework of some embodiments in more detail.

FIG. 4 conceptually illustrates a process performed by the policy storeinterface of some embodiments for importing policies and ensuring thatthe policies are stored in the policy store with a policy normalizationwrapper.

FIG. 5 conceptually illustrates a policy store interface that importspolicies from various heterogeneous sources and stores policies importedfrom these sources into a policy store.

FIGS. 6 and 7 conceptually illustrate the receipt by the policy store ofnetwork policies and the subsequent policy normalization wrappingapplied by the interface to these policies.

FIG. 8 illustrates an example of a composite policy and its variouscomponent policies.

FIG. 9 conceptually illustrates a process performed by a resourcecategorization service of some embodiments for ingesting resourcecategory specifications from various sources and deriving additionalcategories for the resources.

FIG. 10 conceptually illustrates an example of two different types ofprovisioning managers providing resource information to the resourceingest service of a policy unification framework, and that data beingstored in a resource store of the policy framework.

FIG. 11 conceptually illustrates an example of a resource ingest servicethat also uses a category derivation engine to generate additionalcategories to which resources ingested from various sources belong.

FIG. 12 conceptually illustrates another example of the resource ingestservice of FIG. 11 using the category derivation engine to generateadditional categories for resources ingested from two different sources.

FIG. 13 conceptually illustrates the links within the policy unificationframework between policies and resources, as provided by binding rulesand exceptions to those rules.

FIG. 14 conceptually illustrates a process performed by the compiler ofsome embodiments to perform the binding of policies to resources.

FIG. 15 illustrates an example of the policy bindings resulting from aninput set of policies, resource definitions, and binding rules.

FIG. 16 conceptually illustrates an example of two composite policiesthat refer to an atomic policy using different parameters.

FIG. 17 illustrates the mapping of a parameter through multiple levelsof references to the atomic policy.

FIG. 18 illustrates an example of using functions to complete an atomicpolicy during compilation.

FIG. 19 illustrates the use of references to three different policiesdepending on the value of a parameter.

FIG. 20 illustrates a composite policy with three different conditionalreferences to the same atomic policy.

FIG. 21 conceptually illustrates a process performed by the validationengine of some embodiments for determining whether effective policiesapplied to a particular resource result in any violations of validationrules and correcting such violations.

FIG. 22 conceptually illustrates an example of a validation engineapplying a validation rule to a set of conflicting effective policiesthat are bound to a VM.

FIG. 23 illustrates a policy framework GUI of some embodiments that iscurrently highlighting the policies available for binding to resourcesin the policy unification framework.

FIG. 24 illustrates a window for editing a selected composite policy.

FIG. 25 illustrates an editing window for an atomic policy.

FIG. 26 illustrates the GUI of FIG. 23 with the resources tab selected,so that the GUI presents information about the resources operating inthe computing environment managed by the policy framework.

FIG. 27 illustrates the GUI of FIG. 23 with the bindings tab selected,so that the GUI presents information about the variouspolicy-to-resource bindings defined for the policy unificationframework.

FIG. 28 illustrates such a window for editing a selected binding rule.

FIG. 29 conceptually illustrates an electronic system with which someembodiments of the invention are implemented.

DETAILED DESCRIPTION

In the following detailed description of the invention, numerousdetails, examples, and embodiments of the invention are set forth anddescribed. However, it will be clear and apparent to one skilled in theart that the invention is not limited to the embodiments set forth andthat the invention may be practiced without some of the specific detailsand examples discussed.

Some embodiments provide a policy unification framework for managing aset of computing resources, such as those in a datacenter (e.g., asoftware-defined datacenter) or a set of datacenters. The policyunification framework of some embodiments imports policies and resourcedescriptions from various sources, binds (i.e., applies) the policies tothe resources according to binding rules and categories to which theresources belong, and provides the policy bindings to a set of policyengines (which may overlap with the sources of the policies and/orresource descriptions).

FIG. 2 conceptually illustrates such a policy unification framework 200of some embodiments. Rather than the various management entities (e.g.,management software) of FIG. 1 enforcing their own disparate policies,in this case all of these various services connect into the unifiedframework 200. That is, a compute manager 205, storage manager 210,network manager 215, applications manager 220, infrastructure manager225, industry policies and standards manager 230, platform manager 235,and business services manager 240 all provide policies to the policyunification framework 200. The policy unification framework importsthese policies (which may be written in various different descriptive ordeclarative languages), normalizes them, and binds the policies tovarious resources (descriptions of which may also be imported from thevarious services 205-240) according to sets of binding rules. The boundpolicies are then provided to the services 205-240, in order for theseservices to enforce the policies as bound to the resources. In somecases, some of the services 205-240 may act only as sources of thepolicies and/or resources, while other of the service may act only aspolicy engines to enforce the bound policies.

FIG. 3 conceptually illustrates the architecture of the policyunification framework 300 of some embodiments in more detail. As shown,the framework includes a policy management service 305, a resourcecategorization service 310, a compiler 315, validation engines 320, anda result evaluation service 325. In addition, some embodiments includeone or more adapters 330 for ensuring that policies bound to resourcesare consumable by policy engines 370. The policy unification frameworkalso stores various data, including derived categorization definitions340, policies and binding rules 345, categorized resources 350,effective policies applied to resources 355, and results 375.

The policy management service 305 of some embodiments automaticallyingests policies from various heterogeneous policy providers 360 (e.g.,network managers, storage managers, compute server managers, industrystandards, etc.) and stores these policies in the policies and bindingrules store 345. The policy management service also handles otheroperations on the policies, such as responding to queries regarding thepolicies, updating policies, adding/removing policies, etc.

These imported policies may be written in a variety of differentlanguages (usually standards based or proprietary domain-specificlanguages, such as datalog, various different XML or JSON schemas, SCAP,rule languages, etc.) with different encodings (e.g., XML, JSON,plaintext, etc.), but upon import are stored in a normalization wrappersuch that all policies have the same representation within the unifiedframework. The normalization wrapper of some embodiments provides thepolicy with a name and group (or namespace, which allows multipledifferent policies to have the same name so long as they do not alsoshare a common namespace), and stores the content of the policy (e.g.,the policy as written in the datalog, XML schema, JSON schema, etc. usedby the policy provider) as another field of the wrapped policy. In someembodiments, the normalization also includes a version number, whichallows for multiple versions of the same policy to be stored by thesystem.

The imported policies, in some embodiments, are stored as primitive(also called atomic) policies. The primitive policies represent a singlepolicy, with the policy content defined within a field of the policywrapper. From these primitive policies, users of the policy unificationframework can define composite policies, that refer to the primitivepolicies. A composite policy, in some embodiments, may involve areference to a single primitive policy (e.g., in order to provideparameters for the primitive policy) or to multiple primitive policies.In addition, composite policies may refer to other composite policies.

The policies and binding rules store 345 stores these primitivepolicies, as well as the composite policies that reference the primitivepolicies. The compositions, in some embodiments, may be part of thepolicy framework as acquired by a datacenter manager (e.g., part of ashipped product), or may be generated by the datacenter manager (e.g.,through a user interface provided by the framework). For instance, anenterprise might acquire the policy framework customized for aparticular industry in which the enterprise participates, with a set ofcomposite policy rules customized for the industry (generated based on aknowledge of the type of policies that will be imported from the variouspolicy providers 360). In addition, the datacenter manager (or anyauthorized user of the policy framework, such as a networkadministrator, etc.) may generate additional composite policies bydefining the composites through a user interface. As described below, insome embodiments the policy unification framework provides astandardized composition language that allows the user definingcomposite policies to easily reference other policies, pass parametersbetween policies, apply functions to those parameters, and make policiesconditional on various criteria. The policies and binding rules store345 also stores binding rules for binding policies to resources, whichwill be described below.

In addition to the policy management service 305, the policy unificationframework 300 of some embodiments also includes a resourcecategorization service 310 for ingesting and storing descriptions of thecomputing resources being managed from a set of heterogeneous resourceproviders 365. These resource providers 365 may overlap with the policyproviders 360. For example, a network manager or compute manager mightprovide both policies defined within the management system as well as alist of resources managed by the management system. From each of theresource providers, the resource categorization service 310 reads in thedescriptions of the computing resources managed by the source, whichincludes categories to which the resources belong. For instance, for aparticular VM, the categories could include in which datacenter and/orrack and/or server it is located, which operating system it is running,whether it is an app server/web server/database server, etc., dependingon from which resource provider the information about the VM isreceived. These resources may include any entity that either constitutesa managed datacenter or operates (as hardware or software) either withinthe managed datacenter or outside of a managed datacenter but in concertwith the managed datacenter (e.g., a cloud resource). Examples of suchresources may include VMs, containers, servers, server racks, powercircuits, datacenters and/or subsections of datacenters, users, usergroups, applications, operating systems, services, etc., though thislisting is not meant in any way to be limiting.

Furthermore, the resource categorization service 310 of some embodimentsderives additional categories for the resources based on the derivedclassification definitions 340. Like the policy compositions and bindingrules, these definitions may be provided with the policy unificationframework as acquired (e.g., as part of industry-specific or businesssize-specific content), or may be defined by the user (administrator) ofthe policy framework. One such type of derived category is for thecategorization service to create an amalgamated category for resourcesthat fall into any of several different individual categories that areeffectively the same. For instance, multiple different types of resourceproviders might specify the datacenter in which a VM is located. Whilethese would appear as different categories in the resource store 350,all of the resources could be tagged with a same derived category, whichthe binding rules can use to apply policies to all VMs tagged with thederived datacenter category. Similarly, the categorization service 310might derive categories for resources that are categorized in a firstcategory by a first source and a second category by a second source. Asan example, an applications manager might provide a list of all VMs thatoperate a particular type of application, while the compute managermight identify on which host machines each VM operates, and a businessservices tracker or other data source might identify the manufacturer ofeach host machines. Using this data, the policy unification frameworkcould create a derived category of host machines made by a particularmanufacturer on which VMs running the particular application operate, ifthe manager desired to apply policies to this specific category of hostmachines.

The policies (both primitive imported policies and user-definedcomposite policies) are then applied to the resources by the compiler315 based on a set of binding rules that are stored with the policies inthe store 345. These binding rules may be defined by the user of thepolicy framework (e.g., a datacenter administrator) or may be built-into the framework (e.g., as content provided along with the compositepolicy and derived category definitions. In some embodiments, eachbinding rule specifies, for a policy or set of policies (e.g., one ormore composite and/or primitive policies), one or more categories ofresources to which the policies will be bound. For instance, a policymight be bound to all VMs in a particular datacenter, all servers thathost a particular type of VM, etc. The binding rules may specifybindings of both primitive policies and composite policies to theresources.

The compiler 315 of some embodiments uses the binding rules to generate,for each resource for which information is stored by the system, a setof effective policies 355 to apply to the resource. This compilationprocess flattens the composite policies that are applied to theresource, such that the effective policies specify all of the primitivepolicies to apply to the resource. These effective policies can then beconsumed by various policy engines 370 (which may be the same as thesources that provided some of the policies and/or resource descriptionsin the first place). In addition, some embodiments allow for theinclusion of specific exceptions to policy binding rules (i.e., to notapply policy X to a specific resource A, even if A belongs to a categoryof resources to which the policy is otherwise applied). In some cases,adequate explanations may be required as documentation for thoseexceptions (e.g., for audit-related purposes). This allows thedatacenter administrator to primarily use the binding rules to easilyapply policies to large classes of resources and only provide specificsfor the exceptions, rather than the administrator needing to specify toapply the policy to each separate resource in the category.

In some embodiments, as mentioned, the policies are wrapped in anormalization wrapper in order for policies from a variety ofheterogeneous sources to be treated in the same manner by the policyframework, and easily composed into composite policies and applied toresources. The composition language used for this normalization wrapperallows for the compiler 315 to easily determine how to flatten acomposite policy, as it need only read the information in thenormalization wrapper, and does not need to delve into the specificcontent of the policy (e.g., the policy as written in the datalog, XMLschema, JSON schema, etc. used by the policy provider and consumer).

In addition to treating the policy definition as a blob of content, thewrapper allows for easy composition and use of parameters to customizepolicies. In some embodiments, a primitive policy may includeunspecified parameters, while composite policies that refer to thatprimitive policy specify the values of the parameters for a particularinstance of the primitive policy. As an example, a policy specifyinglimits on VMs for a group might leave open the min/max memory, processorusage, disk space, etc. allowed for a VM. Different groups that haveresources in the datacenter can then define composite policies thatrefer to the primitive policy, specifying different values for theseparameters. In addition, the composition language of some embodimentsallows the parameters to be defined by references to values foundelsewhere (e.g., passed down from a higher-level composite policy,defined by a resource to which the policy is applied, etc.) or be afunction of one or more values (e.g., a Max or Min function of multiplevalues that may be provided to the policy. Furthermore, the compositionlanguage allows conditional policy references in some embodiments. Forinstance, a composite policy might refer to a first primitive policy ifa condition is met and a second primitive policy if the condition is notmet. Similarly, the composite policy might refer to the same primitivepolicy, but pass different parameters depending on whether or not thecondition is met. When computing the effective policies, the compiler315 of some embodiments identifies these parameters to map from thecomposite policies to the applied primitives contained by thosecomposite policies (or queries a specified source or the user for theparameter values), evaluates any functions or conditional operationsspecified in the composite policy wrapper, etc.

As shown, the policy unification framework of some embodiments alsoincludes a policy validation engine 320 within the policy unificationframework. The application of heterogeneous policies from severalframeworks may create conflicts, and the policy validation engineprovides rules for resolving such issues within the framework (e.g.,deciding which policy supersedes the other, notifying the administratorof the issue, etc.). As with the other input data, these validationrules may be content provided with the product, input by theadministrator, or a combination thereof. As an example, a first policymight require a certain type of VM to be allocated at least 32 GB ofRAM, while a second policy caps the maximum amount of RAM allocated toany VM at 16 GB. In this case, these policies would conflict, and thevalidation engine would have to either remove both policies, have a rulefor which policy should supersede the other or have a remediation rulethat takes a custom action to resolve the conflict.

The effective policies 355 bound to the resources are provided by theframework 300 to the policy engines 370, using adapters 330 if necessaryto translate the policy bindings in a manner readable by the differentpolicy engines 370. At least some of these policy engines 370 may be thesame management systems that provided policies and/or resources. In somecases, a policy provided by a first policy provider 360 is enforced bythat same provider as a policy engine 370, applied to a resource basedon information provided by a different resource provider 365.

As the policy engines 370 apply the policies within the datacenter orother computing environment, the results are fed back into the frameworkand stored in the results storage 375 for evaluation by the resultsevaluation engine 325. In some embodiments, the results evaluationengine 325 determines whether the policies are being applied correctlyby the policy engines 370 in the operating environment, and whether theenvironment is compliant with the policies in force. In someembodiments, the results evaluation engine 325 provides reports to theuser (e.g., the datacenter administrator) indicating any issues with theenforcement of policies. This allows the user to make any necessarychanges to the policy definitions and compositions, binding rules,validation rules, etc.

The policy unification framework of some embodiments also provides auser interface that allows an administrator of the system to view thepolicies, binding rules, and resources of the system. In someembodiments, the administrator can use the UI to create and editcomposite policies, binding rules, resource category derivation rules,and validation rules. When creating and editing the composite policies,the user may define how the policies are composed according to thepolicy composition features allowed by the composition language (e.g.,define conditions for referencing policies, provide the parameters forthe policy references, etc.).

The above description introduces the policy unification framework ofsome embodiments. Several more detailed embodiments are described below.First, Section I describes the import of policies from multiple sources,while Section II describes the import of resource information frommultiple sources. Section III then describes binding rules and thecompilation of the policy and resource information to arrive ateffective policies for the resources. Next, Section IV describes thecomposition language of some embodiments. Section V then describes thevalidation of effective policies, and Section VI describes the userinterface of the policy unification framework of some embodiments.Finally, Section IV describes an electronic system with which someembodiments of the invention are implemented.

I. Policy Import

As described above, the policy unification framework of some embodimentsimports primitive (or atomic) policies from a variety of heterogeneoussources and stores them in a normalized fashion in a policy store. FIG.4 conceptually illustrates a process 400 performed by the policy storeinterface (e.g., the policy management service 305) of some embodimentsfor importing policies and ensuring that the policies are stored in thepolicy store with a policy normalization wrapper. Though shown as asingle linear process for importing all policies from a variety ofsources, it should be understood that in some embodiments the policyframework performs an initial import of policies when a policy provideris connected to the framework, but also continues to monitor the sourcefor changes to the policies (e.g., additional policies, removal ofpolicies, changes of policy definitions, etc.) in case they are modifiedvia the interface of the policy source.

As shown, the process 400 begins by identifying (at 405) heterogeneoussources of policy. In some embodiments, the policy unification frameworkis part of a suite of products for managing a computing environment suchas a software-defined datacenter (SDDC), and easily connects to thesesources of the policies. The policy framework of some embodiments can beconfigured to accept policies from any other types of sources as well.In addition, separate from the automatic import, in some embodiments anadministrator may write policies directly through the user interface ofthe policy framework. Some examples of the heterogeneous policy sourcesinclude various management software, such as a network manager, storagemanager, compute manager, specific network policy evaluation engines, aswell as other sources such as industry standards, infrastructure andfinance tracking software, business services, etc.

The process then selects (at 410) one of the policy sources from whichto import policy definitions, and identifies (at 415) the policiesmaintained by the source. Different sources may store their policydefinitions in different manners, and thus the import process may bedifferent depending on the source. For instance, some policy providersstore each policy as a separate entity in the system, while other policyproviders require parsing to identify the separate policies. Thepolicies, as stored by the individual policy providers, may be usercreated or be part of the policy provider system.

The process 400 selects (at 420) one of the policies stored by thecurrent policy source for import. If necessary (i.e., if not handled bythe policy source), the process adds (at 425) a normalization wrapper tothe policy. Some policy sources supply their policies to the unifiedframework as content written in the native language understood by thepolicy source, and an adapter is required for ingesting policy from thesource. In some cases, the policies are provided as a single stream ofcontent, and the adapter module of the policy framework parses thepolicies into discrete policy units (based on, e.g., indicators in thenative policy language that mark the end of one discrete policy and thebeginning of another). Other sources are configured for easy interactionwith the policy framework, and provide the policies in the unifiedrepresentation format of the policy framework, with the policy contentalready embedded in a field of the policy normalization wrapper. In suchcases, the process does not need to add the normalization wrapperitself.

The process 400 then stores (at 430) the wrapped policy as an atomicpolicy for use in composite policies, and so that the atomic policy maybe bound to resources. The normalization wrapper of some embodimentsincludes fields for a name as well as a namespace, a version number, andthe policy content. The namespace allows for multiple policies to havethe same name, so long as the namespace is different (i.e., no twopolicies within the same namespace may have the same name). Thus,multiple policies with the name “Firewall” or “Security Settings” couldexist, so long as these policies were maintained in different namespaces(e.g., “Finance:Firewall” and “R&D:Firewall”.

The version number allows for multiple versions of policies to bestored, with the composition language of some embodiments providing amechanism for referencing the different versions. In addition, thenormalization wrapper may also contain metadata, to encode additionalinformation such as the source of the policy or other information (whichmay be customized by the user of the policy framework, in someembodiments). In some embodiments, when the policy source does notprovide the policy in the normalized format, the adapter of the policyingest service that handles adding the normalization wrapper reads thenamespace, name, and version information from the content in its nativeformat. When the name, namespace, and/or version are not available inthe imported policy data, the adapter of the policy ingest service ofsome embodiments requests that a user of the policy framework providethe info. Some embodiments, after performing an import, present a listof missing data to the user through the user interface, or store such alist so that the user can access (and edit) the information uponrequest. In some embodiments, when the name, namespace, and/or version(or other required or expected metadata) are not available for anadapter to read, the adapter generates this information. For instance,all information from a particular source might be given the samenamespace, with naming done incrementally (e.g., “Network_Policy_1”,“Network_Policy_2”, etc.). Some embodiments automatically refer to theversion number as 1.0 when the information is not provided orextractable from the policy. In addition, in some embodiments a policymay require parameters to be filled in at the time of import (althoughas described below, some embodiments store policies without theparameters filled in, and these parameters are completed at compilationtime). In this case, the import service may request these parametersfrom the user interface, or store the policy without the parameters butmaintain a flag that the policy requires the parameters to be complete.

After importing and storing the current policy, the process 400determines (at 435) whether any additional policies remain to beimported from the current source. When additional policies remain, theprocess returns to 420 to import the next policy. Otherwise, the processdetermines (at 440) whether any additional policy sources remain fromwhich to import policies. If there are more sources, the process returnsto 410 to import the policies from the next source. Otherwise theprocess 400 ends.

It should be understood that, though a policy store interfaceimplementing the process 400 operates in an active manner by pullingpolicy content from the various policy sources, in some embodiments thepolicy store interface operates more passively, responding to commandsreceived from the policy sources (e.g., the policy providers 360).Rather than requesting policy information from these various sources,the policy store interface of some embodiments acts in response toimport (or similar) commands from the policy providers to store theirpolicies. These policies, as in the above-described case, may alreadyhave normalization wrappers added by the policy provider. When thepolicy source does not have the functionality to wrap its policies, thepolicy source interacts with an adapter which performs the metadataextraction and policy normalization. The adapter then interacts with thepassive interface in the same way as a policy provider would otherwise,sending commands to the interface to store the wrapped policies. Such apassive policy store interface may also respond to queries from thepolicy providers with information from the policy store, as well asmodifying or removing the policies based on commands from the provider.

FIG. 5 conceptually illustrates a policy store interface (policy ingestservice) 500 that receives policies from various heterogeneous sources505-520 and stores policies ingested from these sources into a policystore 525. As shown, the policy sources in this case include at least anetwork manager 505 (e.g., the VMware NSX network managementcontrollers), a storage manager 50 (e.g., the VMware vSan controllers),a network policy evaluation engine 515 (e.g., the OpenStack serviceCongress), and a compute manager 520 (e.g., the VMware vSpherecontrollers). Each of these sources provides policies (eitheruser-defined policies or policies that come with the product) to thepolicy store 525 of the policy unification framework through the policystore interface 500. In this case, the network manager 505 and computemanager 520 require adapters 530 and 535 respectively, because theyprovide policy without the normalization wrapper. This could be due tothe network manager 505 and compute manager 520 being non-standardproducts for the policy framework (e.g., not specifically designed tointerface with the policy framework). However, due to the extensibilityof the policy framework, in most cases an adapter for such policysources can be designed, so long as there is a way to identify thediscrete policies from the source.

In this example, the policy store 525 indicates that two networkpolicies (Policy A and Policy B) have been imported from the networkmanager 505 (e.g., stateful firewall policies, port security rules,etc.), a storage policy (Policy C) has been imported from the storagemanager 510 (e.g., replication requirements for different types ofdata), valid and invalid network states (Invalid State D and Valid StateE) have been imported from the network policy evaluation engine 515(e.g., definitions of valid and invalid network group membershipconfigurations), two compute policies (Policy F and Policy G) have beenimported from the compute manager 520 (e.g., VM resource requirements),and an industry standard (Standard H) has been imported from anothersource (not shown). In this case, all of the illustrated policies areatomic policies, containing the content of the policy. These atomicpolicies are wrapped in a normalization wrapper such that the policystore and the various modules of the policy unification framework treatall of the policies in the same manner, even if the policies are writtenin different languages (e.g., the invalid network state D and validnetwork state E could be written in datalog while the compute policiesare written in a specific XML schema).

FIGS. 6 and 7 conceptually illustrate the receipt by the policy store ofnetwork policies and the subsequent policy normalization wrappingapplied by the interface to these policies. FIG. 6 specificallyillustrates a policy store interface 600 receiving a network policy 605from a network manager 610 and storing the policy in a policy store 620.The policy store interface 600 also includes an adapter for readingpolicies received from the network manager 610 and translating the datacontained in the policy into the wrapper used by the policy framework.

As shown, the policy store interface 600 receives the network policy 605written in a language used by the network manager 610. Shown as apseudocode in this example, the policy data indicates that the policy iscreated by the user (e.g., a group) com.vmware.networking, is version1.3 of this policy, and has a name of “Allow 10/8”. The content of thepolicy sets a value for the subnet “A” as 10.0.0.0/8, and then includesa firewall rule to allow incoming packets only if the destination IPaddress is in this subnet A.

Upon receiving the network policy 605, the network manager policyadapter 615 built into the policy store interface 600 (or operating as aseparate entity from the policy store interface, in other embodiments)parses the policy to identify the relevant details and puts thisinformation into the policy wrapper to create a normalized atomic policy625. The atomic policy 625, as shown, includes fields for the namespace(com.vmware.networking), the name (Allow 10/8), the version (1.3),additional metadata (e.g., the source of the policy, which wouldindicate the name of the network manager 610), and the policy content(the actual firewall rule definition). The adapter 615, in this example,is designed to identify this information in the language received fromthe network manager 610 specifically (whereas adapters for other policysources are designed to parse differently formatted policy information).

FIG. 7 illustrates the policy store interface 600 and network managerpolicy adapter 615 receiving a second network policy 705 from thenetwork manager 610, written in the policy definition language of thenetwork manager. The policy 705 is similar to the policy 605 in that ithas the same namespace, name, and version number, which the networkmanager policy adapter 615 uses to generate a policy wrapper for thepolicy content received from the network manager.

However, unlike the policy 605 in the previous figure, the policy 705also has two variables to be filled in as parameters. In someembodiments, as described in greater detail below, this information maybe filled in later via a reference to the atomic policy that passes theparameters to the policy. Thus, the network manager policy adapter 615identifies the language in the policy content 705 that indicatesparameters to be exposed, and exposes these parameters within thenormalization wrapper for the policy 710. In some other embodiments,either the adapter or a more active policy store interface will querythe user interface to provide values for these parameters at the time ofingest.

FIG. 8 illustrates an example of a composite policy 800 and its variouscomponent policies. As shown, the composite policy 800 includes anamespace, name, and version, similar to the atomic policies describedabove. In some embodiments, only atomic policies are given these fields,while in other embodiments each policy definition, whether atomic orcomposite, includes a namespace, name, and version (which allow othercomposite policies to accurately refer to it). The composite policy 800also includes a reference to a first atomic policy 805, a reference to asecond composite policy 810, and an inline atomic policy definition 815.

The inline atomic policy definition 815 is written in a first policydefinition language (e.g., a first XML schema). The administrator, whendefining the composite policies, may include both references to atomicpolicies as well as inline definitions of policy. Inline definitionsprovide the advantage of not cluttering the policy store with policiesthat are only used within the context of a single composite policy.However, the inline policy cannot be referred to by other policieswithout reference to the entire composite. As such, policies that arestored without parameters and get their parameter values through thereference from a composite policy are better written as separate atomicpolicies.

The atomic policy reference in the first composite policy 800 refers (byname, namespace, and version) to an atomic policy 805. As shown, theatomic policy 805 includes these identifying fields as well as a policycontent field, with the policy definition written in the same languageas that of the inline atomic policy 815. The composite policy referencein the first composite policy 800 refers (by name, namespace, andversion) to a composite policy 810. This composite policy 810 includesthe identifying fields as well as a reference to a second atomic policy815, and an its own inline atomic policy definition 820, written in asecond language (e.g., datalog). The second atomic policy 815 includesthe identifying fields as well as its own policy definition, in a thirddifferent policy definition language (e.g., a second XML schema). Asshown, different atomic policies may be written in various differentlanguages, but are easily composed using the normalization wrappers thatprovide an abstraction on top of the actual policy definition. Inaddition, this figure indicates that composite policies may refer toother composite policies, which can be grouped ad infinitum in someembodiments. The policy composition language of some embodiments will bedescribed in greater detail below in Section IV.

II. Resource Categorization

In addition to importing policy definitions, the policy unificationframework of some embodiments imports resource specifications from avariety of heterogeneous sources, which may partially or completelyoverlap with the sources of policy (but may also include other sourcesthat do not provide policies to the framework). These resourcespecification identify the resource (e.g., by a UUID or other name), aswell as provide category information about the resource. The categoryinformation may specify the type of resource (e.g., VM, host machine,switch, router, application, etc.) as well as additional informationabout the resource (e.g., whether a VM is a webserver, app server, etc.,what type of VMs are hosted on a host machine, whether a host machine iscompliant with a set of standards, whether an application is stand-aloneor distributed, or any other categorization information that may bestored by the various resource management tools.

FIG. 9 conceptually illustrates a process 900 performed by the resourcecategorization service (e.g., the resource categorization service 310 ofFIG. 3) of some embodiments for ingesting resource categoryspecifications from various sources and deriving additional categoriesfor the resources. Though shown as a single linear process for ingestingall of the resource information from multiple sources, it should beunderstood that in some embodiments the policy framework performs aninitial ingest of resource information when a particular resourceprovider is connected to the framework, but also continues to monitorthe source for additional resource information (e.g., new resources,removal of resources, changes in the categorization of a resource,etc.).

As shown, the process 900 begins by identifying (at 905) heterogeneoussources of resources to which policies may be applied. In someembodiments, the policy unification framework is part of a suite ofproducts for managing a computing environment such as a SDDC, and easilyconnects to these managers of resources. The policy framework of someembodiments can be configured to ingest resource definitions from othertypes of sources as well, such as non-standard products, databases ofresource information not directly involved in the management of theresources (e.g., financial tracking information, business servicedesignations, etc.), user input, or other sources.

The process then selects (at 910) one of the sources of resourcedefinitions, and imports (at 915) from the selected source the resourcedefinitions with categories for each resource specified. The variousdifferent sources may provide this information about their resources indifferent manners. For instance, in some embodiments the managementsoftware may store a database of the resources that it manages, andimports the information via this database. As an example, a computemanager might have a first database table of all of the hosts in thecomputing environment, a second database table of all of the VMs in theenvironment, and a third database table of all of the non-VM containersoperating in the environment. Each row in a particular table mightrepresent a resource, and at least some of the columns providecategorization information about the resource (for a VM, for example,the categories could specify which operating system the VM runs, whetherthe VM is an app server, web server, etc., the server and/or rack and/ordatacenter in which the VM operates, etc.

In other cases, the resource providers might store the resourceinformation as objects, with an object created for each resource and thecategorization information stored as variables of the object. A networkmanager, as an example, might store VM objects, and include informationsuch as its location in the network, the logical network to which the VMbelongs, the MAC and IP addresses of the VM, etc. In some embodiments,the resource ingest system is easily extensible to accommodate differentsources of resource information. For any data format provided by a newsource, the administrator can create an adapter for translating datareceived in the new format into resources stored in a homogeneous mannerby the policy framework.

As with the policy store interface, in some embodiments the resourcecategorization interface that implements the process 900 (or at leastthe import operations 905-920) may be a more passive interface that doesnot actively pull resource definitions from the resource informationsources. That is, instead of pulling the resource definitions, theresource categorization interface acts in response to import (orsimilar) commands from the resource information providers to store theirpolicies. In addition, some embodiments have a specific format orrepresentation for the resource information, to which the sourcesconvert their resource data. If necessary, the resource store interfaceof some embodiments uses an adapter to read the resource information andconvert the information to the appropriate format. As with the policystore, some embodiments respond to queries regarding the resources fromthe resource information providers, as well as modify or remove resourceinformation based on commands from the providers.

After importing the resource information from a particular selectedsource, the process 900 determines (at 920) whether there are anyadditional sources of resource information from which to ingest resourcecategorization data. When additional sources remain, the process returnsto 910 to ingest data from another source of resource information.

Otherwise, the process consolidates (at 925) categories for resourcesingested from multiple sources. As noted above, in some embodiments thevarious sources of resources identify the resources via a name, UID(unique identifier), etc. In some cases, the resources have names thatare unique within a namespace (as in the case of policies), or namesunique within a type of resource (e.g., VM, server, switch, etc.).Ideally, the name or UID for a particular resource is the same acrossdifferent sources, allowing for the unified framework to identify thatthe resource information from a first source and the resourceinformation from a second source in fact apply to the same resource. Inthis case, the resource categorization service consolidates thisinformation into a single resource definition (e.g., a single row in adatabase table, or a single object), such that a single resource recordhas information from multiple sources.

Next, the process 900 determines whether to derive additional categoriesfor the resources. The process selects (at 930) one of the importedresource definitions, and tags (at 935) the resource with any derivativecategories that apply to the resource based on its existing categories.One such type of derived category is for the categorization service tocreate a category for resources that fall into any of several differentindividual categories that are effectively the same. For instance,multiple different types of resource providers might specify thedatacenter in which a VM is located. While these would appear asdifferent categories in the resource store 350, all of the resourcescould be tagged with a same derived category, which the binding rulescan use to apply policies to all VMs tagged with the derived datacentercategory. Similarly, the categorization service 310 might derivecategories for resources that are categorized in a first category by afirst source and a second category by a second source. As an example, anapplications manager might provide a list of all VMs that operate aparticular type of application, while the compute manager might identifyon which host machines each VM operates, and a business services trackeror other data source might identify the manufacturer of each hostmachines. Using this data, the administrator of the policy unificationframework could create a derived category of host machines made by aparticular manufacturer on which VMs running the particular applicationoperate, if the administrator desired to have policies applied to thisspecific category of host machines. Like the policy composition rules,derived category definitions may be provided with the policy unificationframework as acquired (e.g., as part of industry-specific or businesssize-specific content), or may be defined by the user (administrator) ofthe policy framework.

The process then determines (at 940) whether any additional resourcesare in the system for which derived categories have not yet beendetermined. When additional resources remain, the process returns to 930to select the next resource and perform the category derivationoperations for the selected resource. Otherwise the process 900 ends.

FIG. 10 conceptually illustrates an example of two different types ofprovisioning managers 1005 and 1010 providing resource information tothe resource ingest service 1000 of a policy unification framework, andthat data being stored in a resource store 1015 of the policy framework.As shown, the first provisioning manager 1005 provides information onthree resources A-C. Specifically, according to the data, all three ofthese resources belong to Category 1, which might represent a high-leveltype of resource, such as VM, server, etc. Resource A also belongs tocategories 2 and 5, resource B also belongs to categories 3 and 4, andResource C also belongs to categories 5 and 6 (i.e., there is someoverlap in the additional categories, but also disparity between thecategorization of the resources.

The second provisioning manager 1010 provides information on threeresources X-Z. There is no single high-level resource type category towhich all three of these resources belong, as they may include resourcesfrom different tables in the provisioning manager 1010 (e.g., one VM,one physical (software) switch, and one logical switch). Specifically,Resource X belongs to categories i, iv, and v, Resource Y belongs tocategories ii, iv, and vi, and Resource Z belongs to categories iii, vi,and vii.

Each of the two provisioning managers 1005 and 1010 may provide theinformation about their respective computing resources in differentformats. For instance, the information about Resources A-C is shownusing dashed lines to indicate that this information is received theresource ingest service 1000 in a first format (e.g., as a set ofobjects), while the information about Resources X-Z is shown usingdotted lines to indicate that this information is received by theresource ingest service 1000 in a second format (e.g., as database tablerecords). However, as shown in the resource storage 1015, the resourceingest service stores all six of these records in the same format(indicated by the solid lines). As shown in the subsequent figures, ifinformation about the same resource is received from both of thesources, then some embodiments consolidate this information into asingle record.

FIG. 11 conceptually illustrates an example of a resource ingest service1100 that also uses a category derivation engine 1115 to generateadditional categories to which resources ingested from various sourcesbelong. In addition, this figure shows examples of the resource ingestservice consolidating resource information from multiple sources beforehaving the category derivation engine use its derived category rules toprovide additional categories.

As shown, the resource ingest service 1100 receives resource informationin a first format from a compute manager 1105 and resource informationin a second format from a networking manager 1110. The compute manager1105 provides information about three VMs: VM A, VM B, and VM C (whereA, B, and C represent UIDs, in some embodiments). Specifically, thecompute manager 1105 indicates that VM A is located in datacenter K andis an application server, that VM B is also an application server, andthat VM C is located in datacenter L and is a webserver. The datacenterinformation for VMs A and C is provided in a first format, shown as“DC”.

The networking manager 1110 provides information about three VMs aswell: VM A, VM B, and VM D. In this case, the networking manager 1110indicates that VM A belongs to logical switch 1 and is located in zoneK−1 (i.e., the zone 1 of datacenter K), that VM B belongs to logicalswitch 1 and is located in zone K−2, and that VM D belongs to logicalswitch 2 and is located in zone L−1.

The resource ingest service 1100 consolidates this information from sixrecords (or objects, etc., depending on the format of the received data)into four records 1125-1140 in the resource information storage 1120.The first record 1125, for VM A, includes the categories indicating thatthe VM is located in DC K, that the VM is an application server, thatthe VM is on logical switch 1, and that that the VM is located in zoneK−1. The second record 1130, for VM B, includes categories indicatingthat the VM is an application server, that the VM belongs to logicalswitch 1, and that the VM is in zone K−2. The third record 1115, for VMC, only includes the information from the compute manager 1105, whilethe fourth record 1140, for VM D, only includes the categories from thenetworking manager.

In addition to consolidating the category information, the resourceingest service 1100 also passes the consolidated data to the derivedcategory engine 1115 to determine, for each resource, whether anyderived categories apply to the resource. In this case, the computemanager 1105 indicates the datacenter in which a VM is located in afirst manner while the networking manager 1110 indicates the datacenterin which a VM is located in a second manner (identifiable based on thezone). However, a computing environment administrator will typicallywant to have the policy unification framework apply policies to allresources (or all VMs) located in a datacenter (or any other categorythat is provided differently by different resource information sources),irrespective of what specific management software identifies that theresource is located in the datacenter. Rather than facing the cumbersometask of creating binding rules for all of the separate categories thatindicate the same thing (for each policy that needs the binding rules),some embodiments allow the administrator to create derived categories(or come pre-configured with such derived categories).

In this case, as shown with pseudocode in the derived category rulestorage 1150, if a resource belongs to either the “DC K” category fromthe compute manager OR the “zone K−*” category (where * indicates awildcard number) from the networking manager OR any other categoryindicative of location in datacenter K, then the record for the resourceis tagged as belonging to the category Datacenter K. As a result, therecords 1125 and 1130 include the category of “Datacenter K” to indicatethat both of these resources are located in that datacenter. If thederived category definitions included a separate rule for datacenter L,then the records 1135 and 1140 would be tagged as such.

FIG. 12 conceptually illustrates another example of the resource ingestservice 1100 using the category derivation engine 1115 to generateadditional categories for resources ingested from two different sources.In this case, the sources are an operations manager 1205 that monitorsserver usage (among other things) and payment card industry (PCI)standards compliance information 1210. The PCI standards information maybe a separate database or integrated into a computing resource managerthat performs other monitoring and management functionality as well.

As shown, the resource ingest service 1100 receives resource informationin a first format from the operations manager 1205 and in a secondformat from the PCI standards compliance information 1210. Theoperations manager 1205 indicates that Servers A and C are overloadedwhile Server B has regular usage. The PCI standards compliance info 1210indicates that Servers A and B are PCI-compliant, while Server C is notPCI compliant. Although these sets of records are received from twodifferent sources, because they identify the same servers (e.g., usingthe same UID) the resource ingest service can consolidate theinformation into three records 1215-1225.

While the previous figure showed an example of multiple category tagsfrom different sources indicating the same real-world category, in somecases the computing environment administrator will want to use derivedcategories that indicate the intersection of orthogonal categories. Inthis example, it may be useful to know which PCI-compliant servers areoverloaded in case specific policies need to be applied to theseresources (e.g., so that the compute manager can take actions to removesome of their load). As such, the derived category rules storage 1150shows (again in pseudocode) a rule that if the operation managerindicates that a server is overloaded and the server is PCI-compliant,the server will be tagged as “Stressed/PCI” to indicate thiscombination. Policies can then be bound to the servers tagged as such,without the need to write both categories into multiple separate bindingrules. While shown in this example as an intersection of two categories,some embodiments may use much more complex tag grouping, withcombinations of Boolean logic (e.g., all PCI-compliant servers that areunderutilized in a particular datacenter (with multiple different inputsthat could indicate the particular datacenter, as in the previousfigure)).

III. Compiling Policy Bindings

Once the policies and the resource information is stored by the policyframework, the policies (both primitive policies and composite policies)can then be applied to the resources based on a set of binding rulesthat are stored with the policies. These binding rules may be defined bythe user of the policy framework (e.g., a datacenter administrator) ormay be built-in to the framework. In some embodiments, each binding rulespecifies, for a policy or set of policies, one or more categories ofresources to which the policies will be bound. For instance, a policymight be bound to all VMs in a particular datacenter, all servers thathost a particular type of VM, etc. The binding rules may specifybindings of primitive policies or composite policies.

A compiler of the policy unification framework of some embodiments usesthe binding rules to generate, for each resource for which informationis stored by the system, a set of effective policies to apply to theresource. This compilation process flattens the composite policies thatare applied to the resource, such that the effective policies specifyall of the primitive policies to apply to the resource. These effectivepolicies can then be consumed by various policy engines (which may bethe same as the sources that provided some of the policies and/orresource descriptions in the first place). In addition, some embodimentsallow for the inclusion of specific exceptions to policy binding rules(i.e., to not apply policy X to resource A), so long as adequateexplanations are documented for those exceptions. This allows thedatacenter administrator to primarily use the binding rules to easilyapply policies to large classes of resources and only provide specificsfor the exceptions, rather than the administrator needing to specify toapply the policy to each separate resource in the category.

In some embodiments, as mentioned, the policies are wrapped in anormalization wrapper in order for policies from a variety ofheterogeneous sources to be treated in the same manner by the policyframework, and easily composed into composite policies and applied toresources. The composition language used for this normalization wrapperallows for the compiler 315 to easily determine how to flatten acomposite policy, as it need only read the information in thenormalization wrapper, and does not need to delve into the specificcontent of the policy.

Furthermore, as will be described in more detail in Section IV below,when computing the effective policies, the compiler of some embodimentsidentifies parameters to map from the composite policies to the appliedprimitives contained by those composite policies (or queries a specifiedsource or the user for the parameter values), evaluates any functions orconditional operations specified in the composite policy wrapper, etc.,so that the effective policies are complete useable policies.

FIG. 13 conceptually illustrates the links within the policy unificationframework between policies and resources, as provided by binding rulesand exceptions to those rules. As illustrated conceptually by thisfigure, the binding rules may be used to bind both atomic and compositepolicies to individual resources and to categories of resources. Inaddition, the binding rules may include various specializations, whichallow the administrator to modify how a particular policy is applied toa particular resource or category of resources (e.g., imposing certainparameters on the policy for the category). In addition, the figureillustrates that exceptions may be defined to exempt certain resourcesor sub-categories of resources from the application of one or morepolicies.

As shown, the figure illustrates a first resource category 1305 thatcontains a second resource category 1310, as well as a set of individualresources 1313. The resources 1313 could be separate resources, or theresources contained in the first category 1305 or the sub-category 1310.Both of the categories 1305 and 1310 contain resources; however, theseresources are shown using dashed lines as they are tagged as part of thecategories, but also exist as individual resources that can be bound topolicies either individually or based on other categories to which theresources belong. In this example, the first category 1305 contains allresources that are part of a second category 1310, as well as additionalresources. For instance, the first category 1305 might be all VMs in adatacenter, while the second category 1310 is a derived category thatincludes all VMs in the datacenter that run a particular operatingsystem (or meet some other additional criteria).

Whereas the resource categories 1305 and 1310 are based on tags in someembodiments, such that each resource also exists outside of the category(and can be bound to policies based on other category tags, etc.), thepolicies may include inline atomic policies that only exist within thecomposite policy in which the atomic policy is defined. As shown, thefigure illustrates a first composite policy 1315 that contains an inlineatomic policy 1320, a referenced atomic policy 1325, and a secondcomposite policy 1330. The inline atomic policy 1320 is a policydefinition contained within the composite policy 1315, while the atomicpolicy 1325 and the composite policy 1330 are referenced by thecomposite policy 1305, but also exist separately (and can thus be boundseparately to resources). Whereas the resource category 1310 is definedto be a sub-category of the resource category 1305 based on theproperties of the resources, the composite policy 1330 could also existseparately, be referenced by other composite policies, and have itsreference in the first composite policy 1315 removed. In addition tothese composite policies, the atomic policies 1335 also exist on theirown and can be separately bound to resources via the binding rules.

As mentioned, the binding rules 1340 are used by the compiler of thepolicy unification framework of some embodiments to bind policies toresources. The lines drawn from the resources to the binding rules showthat the various resource categories 1305 and 1310 can be bound topolicies through the binding rules, as can the individual resources1313. Binding the category 1305 to a particular policy or group ofpolicies effectively means that each resource that belongs to thecategory will be bound to each policy specified by the binding rule.When a binding rule specifies that one of the individual resources 1313is bound to a policy or group of policies, only that resource isaffected by the rule.

When a binding rule 1340 specifies that an atomic policy 1325 is boundto a resource or category of resources, the compiler binds that atomicpolicy to each resource tagged with the particular category (or theindividual resource). In addition, as shown, the composite policies 1315and 1330 can be bound to the resources. A rule that binds the compositepolicy 1315 to a particular category of resources effectively binds theinline atomic policy 1320, referenced atomic policy 1325, as well as allatomic policies of the referenced composite 1330 to the specifiedresources. On the other hand, a rule binding the composite policy 1330only binds its referenced atomic policies to the specified resources.

Each of the binding rules 1340 has at least a rule 1345, and possiblyone or more specializations 1350. The rules 1345 specify the actual bindbetween resources (e.g., by category) and policy or policies. Thespecializations 1350, in some embodiments, allow the administrator toput special handling into the binding rules, in order to tailor thespecifics of the policies to the requirements of the resources. Forexample, if an atomic policy listed six rules, but the administratoronly wanted five of those six rules to apply to resources in aparticular category, the binding rule for that category could specify tomodify the policy content in such a way that the sixth rule did notapply. In complex systems, this can prevent policy explosion (i.e., fromhaving to create new policies for every minor change in how the policywill be applied. In some embodiments, some types of specializations areconceptually part of the binding rules because they are handled by thecompiler, but are actually written into the policy wrapper (e.g., asparameters that are filled in, conditional statements, etc.).

In addition to the binding rules, the policy unification framework ofsome embodiments allows for exceptions 1355. These exceptions 1355 allowfor a binding of a policy to a particular resource or group of resourcesto be negated. As an example, the administrator might want the policiesreferenced by composite policy 1315 to apply to the resources in thecategory 1310, except for the atomic policy 1325 to one of theindividual resources in that category. The administrator could thendefine an exception stating that the policy 1325 should not apply to theparticular resource. The compiler of some embodiments would create thebinding, but effectively negate the binding such that the policy engineswould not apply the policy. In some embodiments, any exceptions requirethe creator to document a reason for the exception, so that theexception can be tracked and understood at a later time (e.g., in caseof an audit of the system).

While FIG. 13 conceptually illustrates the structure of the bindingsused by the compiler to generate effective policies for the resources ina computing environment, FIG. 14 conceptually illustrates a process 1400performed by the compiler of some embodiments (e.g., the compiler 315)to perform this binding of policies to resources. This process 1400illustrates the policies bound on a per-binding rule basis. However, itshould be understood that the compilers of different embodiments maybind policies on a per-category basis, a per-resource basis, or aper-policy basis, depending on how the code is written for the compiler,so long as the end result is that all of the policy bindings areevaluated.

As shown, the process 1400 begins by receiving (at 1405) a binding rule.In some embodiments, though not shown in this figure, the compiler loopsover the set of binding rules when compiling all of the policies for thepolicy framework. As mentioned by reference to FIG. 13, each bindingrule includes at least a rule that binds one or more policies to one ormore resources or categories of resources (it is possible that noresources are bound, if there are no resources in the system tagged withthe bound category).

The process then identifies (at 1410) the resources bound by the bindingrule. As described in detail in Section II, resources may be tagged asbelonging to multiple categories, with the categories both received fromone or more sources of information about the resource as well as derivedbased on these received categories. A binding rule specifies one or moreof these categories, and binds policies to the resources that belong tothe category. Thus, for each category specified by the binding rule, thecompiler identifies all of the resources tagged as belonging to thecategory. If a resource belongs to multiple categories to which a policyis bound by a rule, the compiler removes these duplicates in someembodiments (i.e., the policies need only be bound once). However, bothcategory tags may be used to apply exceptions, fill in parameters, etc.if needed.

The process also determines (at 1415) the policies that apply to theidentified resources based on the current binding rule. In some cases,the binding rule identifies a specific atomic policy or a singlecomposite policy that is to be applied to each of the resources(identifying the policy by, e.g., namespace, name, and version). Otherbinding rules may identify several policies, including atomic and/orcomposite policies.

The process then determines (at 1420) whether any evaluation is requiredby the applied policies. Specifically, policies may require parametersto be filled into policies, or for functions and conditional statementsto be evaluated during compilation. For instance, a composite policymight refer to an atomic policy and provide parameters for that atomicpolicy. The parameter values are not included with the atomic policydefinition because other references to the atomic policy could includedifferent parameter values. At compilation time, the compiler fills inthese parameters to the atomic policy so that the atomic policy iscomplete. Similarly, the parameter values might be determined byfunctions (based on other parameters, resource factors, etc.), which thecompiler evaluates in order to come up with a value for the parameter.In addition, some policies include conditional statements that apply onereferenced policy or the other depending on a parameter value, an aspectof a resource to which the policy is applied, etc. When the policiesapplied by the binding rule require this type of evaluation, the process1400 fills in (at 1425) parameter, and applies functions and conditionalevaluations as necessary according to the information in the policywrapper. These operations will be described in more detail in thefollowing section IV.

The process 1400 also determines (at 1430) whether the policies appliedby the binding rule include any composite policies. If so, the processflattens (at 1435) the composite policies to identify all of the atomicpolicies applied to each of the resources by the binding rule. That is,for a composite policy applied to a resource by the binding rule, thecompiler identifies each atomic policy (either inline or referenced)contained within the composite policy and binds this to the resource. Anatomic policy may be directly referenced by the composite policy, orcould be referenced by a nested composite policy that is in turnreferenced by the composite policy specified in the binding rule. Theoutput of the compiler, in some embodiments, is a set of effectivepolicies that are applied to each resource. Each such effective policyis an atomic policy that is bound to the resource and has had all of itsparameters filled in, functions evaluated, etc. That is, each effectivepolicy as bound to a resource could be published to its policyengine(s), which monitors the computing environment and enforces thepolicy, without requiring the policy engine to evaluate any of thepolicy composition language. Instead, the policy engine need only readthe actual policy content contained within the content field of thepolicy normalization wrapper.

Next, the process 1400 determines (at 1405) whether any exceptions applyto the policy-resource bindings generated by the compiler. As describedabove, exceptions allow for a binding of a policy to a particularresource or group of resources to be negated. For instance, theadministrator of a computing environment might want a specific atomicpolicy contained within a composite policy to not apply to one resourcein a category to which the composite policy is otherwise bound. In thiscase, the administrator would define an exception for the resource andspecific atomic policy. Similarly, categories or sub-categories ofresources could have exceptions to atomic or composite policies (thoughas the exceptions get larger, it may be preferred in some embodiments toinstead refine the binding rules). In some embodiments, any exceptionsrequire the creator to document a reason for the exception, so that theexception can be tracked and understood at a later time (e.g., in caseof an audit of the system). If any exceptions apply to the bindings, theprocess disables (at 1445) the effective policies as bound to aparticular resource or resources based on the specified exception. Insome embodiments, the policy is disabled via the compiler annotatingeither the effective policy or the resource with a flag that specifiesto not apply the effective policy to the resource.

Lastly, the process 1400 determines (at 1450) whether any of thepolicies require handling of the policy content to generate theeffective content. Specifically, the parameter values may need to beautomatically edited into the policy content, and potentially otheroperations may be applied to the policy content as well. For example,some embodiments use symbolic substitution to edit the parameter valuesinto the policy content. That is, an atomic policy that exposes aparameter “dst_IP” might receive as a value 192.168.0.4. While thecompilation process would associate this value with the parameter in thepolicy wrapper, some embodiments use a special policy content handler toactually write the parameter into the content itself so that the contentcan then be consumed by a policy engine.

Some embodiments use a symbolic substitution handler that identifies thestring in the policy content for each parameter and substitutes theparameter value. Thus, in the previous example, the phrase “drop packetssent to dst_IP” would be modified to read “drop packets sent to192.168.0.4”. In addition, some embodiments allow for other types ofpolicy content handlers to be used during the compilation process. Thesepolicy handlers, for example, could provide processing required forpolicies written in a particular policy language, or could translate apolicy language written in a higher-level language into instances in alower-level language (which would be consumed by one or more of thepolicy engines).

As an example of specific processing, the administrator might choose touse code written in a programming language (e.g., Javascript, C, etc.)to perform the functions, lookups, mappings, etc. that would otherwisebe performed within the normalization wrapper. In this case, theadministrator could write this code as a policy content handler, andjust use the policy composition language to pass parameter values. As anexample of translation, such a translation algorithm might translatepseudocode written in a simple language that uses commonly-understoodterminology into a more abstract rule language or XML schema that can beread by the policy engines, or a domain-specific language into astandards based language. In some embodiments, the policy unificationframework is provided with the symbolic substitution handler, but withthe ability for the administrator to add any other handlers (i.e., as anextensibility point in the framework). If any such policy contenthandling is required, the process performs (at 1455) the contenthandling (e.g., by handing the policies off to the appropriate handlers.The process 1400 then ends.

The compiler of some embodiments may also perform additional actions onthe effective policies in some embodiments. For example, someembodiments include intelligence to handle when the same atomic policyis applied several times to a single resource as the result of multiplebinding rules applying to the resource. In some cases, if no parametersare exposed by the atomic policy, or if all exposed parameters have thesame value, then only one of the effective policies is required, as allof the effective policies will be exactly the same. When the parametersare different, some embodiments may attempt to merge the effectivepolicies, when possible. For instance, if one effective policy allowspackets on ports 1-80 and another packet allows packets on ports 81-160(with all other properties the same), then these can be merged into asingle policy allowing packets on ports 1-160.

On the other hand, in some cases, the policies cannot or should not bemerged. For example, if a first instance of an atomic policy applied toa particular resource defines a maximum VM storage size as 4 GB while asecond instance of the same atomic policy defines the maximum VM storagesize as 8 GB, these cannot be merged. Instead, some embodiments selectone of the effective policies and remove the other based on either anexplicit rule, intelligence that selects either the larger or smallerpolicy instance, etc.

FIG. 15 illustrates an example of the policy bindings resulting from aninput set of policies 1505, resource definitions 1510, and binding rules1515. This information is evaluated by a compiler 1500 in order toidentify a set of effective policies for each of the resources in theresource definitions store 1510. In addition, the compiler 1500 uses aset of content handlers 1525 to perform any required editing of thepolicy content (i.e., the policy as written in policy language).

As shown, the system includes two resources, Resource A and Resource B.Resource A belongs to category 1 and category 3, while Resource Bbelongs to category 2. The policies, meanwhile, include four compositepolicies C1-C4. The first composite policy C1 includes references to anatomic policy A1 and the second composite policy C2, which in turnrefers to two atomic policies A2 and A3. In addition, the firstcomposite policy C1 includes a parameter value of 1 defined for theatomic policy A1, which exposes a parameter P. The third compositepolicy C3 includes references to atomic policies A2 and A6, while thefourth composite policy C4 includes references to the atomic policiesA1, A4, and A5.

Lastly, the inputs also include the binding rules 1515. As shown, thereare four binding rules shown, each of which binds a category to one ormore policies. These rules bind policies C1 and A4 to category 1, policyC3 to category 2, policies A3 and C4 to category 3, and policies C2 andC3 to category 4. The compiler 1500 evaluates each of these bindingrules to identify the effective policies 1520 that apply to each of theresources in the system.

The output of the compiler is a set of effective policies for eachresource in the system. In this case, the Resource A belongs to category1, and therefore composite policy C1 and atomic policy A4 apply.Composite policy C1 includes atomic policy A1 and composite policy C2,which includes references to atomic policies A2 and A3. Thus, based onits inclusion in category 1, Resource A has atomic policies A1, A2, A3,and A4 applied. The atomic policy A1 is filled in with the parametervalue 1, because it is applied through the composite policy C1. Inaddition, Resource A belongs to category 3, and therefore is also boundto atomic policy A3 and composite policy C4 through this category. Theatomic policy A3 is a duplicate (i.e., it is already bound to Resource Avia the binding rule for category 1), as are atomic policies A2 and A4of the composite policy C4. This composite policy also includes areference to atomic policy A5, so that this policy is bound to ResourceA as well. Thus, atomic policies A1, A2, A3, A4, and A5 are all appliedto the first resource.

Resource B belongs to category 2, and therefore only composite policy C3applies. This composite policy includes references to A1 (with adifferent parameter value 2) and A6, with no additional nesting ofpolicies. Thus, only these two policies A1 and A6 are the effectivepolicies applied to Resource B, with policy A1 as applied having aparameter value 2.

As shown, during the compilation process, the compiler 1500 passes thetwo instances of atomic policy A1 to one of the content handlers 1525.In this case, the content handler 1525 performs symbolic substitution onthe two instances of policy A1. Specifically, for the policy instancebound to Resource A, the content handler 1525 substitutes the value 1into the policy content for the parameter P, whereas for the policyinstance bound to Resource B, the content handler substitutes the value2 into the policy content for the parameter P.

IV. Policy Composition Details

As mentioned above, the policy unification framework of some embodimentsprovides a composition language that allows content developers for theframework (either the providers of the framework, computing environmentadministrators, and/or third party developers) to not only easilycompose groups of policies, but also to provide for policydifferentiation via parameterization, enable the use of functions forcalculating parameters, allow conditional policy references, etc. Thissection provides various examples of policy composition according tosome embodiments in FIGS. 16-20

FIG. 16 conceptually illustrates an example of two composite policies1605 and 1610 that refer to an atomic policy 1600 using differentparameters. In this case, both of the composite policies 1605 and 1610only refer to the one atomic policy 1600, and do not contain additionalpolicies (either inline policies or additional references). However, itshould be understood that composite policies such as those shown in thisfigure could contain additional policy references (or inline policydefinitions).

The atomic policy 1600, as illustrated, includes a namespace(“Networking”) and name (“FW app”), as well as a version number (“1.4”).In this and subsequent figures, the namespace and name fields are shownas “namespace:name”. In addition, the atomic policy 1600 includes apolicy definition for a firewall rule, with two parameters that arecustomizable for each reference to the atomic policy 1600. Specifically,the firewall rule specifies to allow packets sent to all VMs governed bythe policy when the layer 4 protocol matches the protocol parameter andthe destination port matches one of the ports in the allow-portsparameter. Thus, this atomic policy 1600 exposes two parameters that areneeded for a complete effective policy. As shown, these parameters areexposed as part of the policy wrapper in some embodiments. Someembodiments also provide details on the type of value that eachparameter takes (e.g., string, integer, floating-point decimal, etc.)and/or a list of allowable values (e.g., 0-65535 for the layer 4 ports).

Each of the two composite policies 1605 and 1610 provides differentvalues for these parameters. The first composite policy 1605 has anamespace and name of “Networking:Firewalls 1”, and includes a referenceto the atomic policy 1600. This reference specifies the version asversion “1.*”, which in some embodiments refers to the newest versionthat starts with a 1. Thus, if a version 1.5 of the atomic policy 1600was input to the system, the composite policy 1605 would automaticallyrefer to that version; however, if a version 2.0 was input to thesystem, the composite policy 1605 would continue to refer to the policy1600. In addition, the composite policy 1605 specifies values for thetwo parameters of the atomic policy 1600, namely that the protocol fieldis “tcp” and that the allow-ports field is the set {80, 443, 8081}.Thus, when compiled, the effective firewall policy as applied to one ormore resources specifies to allow all TCP packets on ports 80, 443, and8081.

The second composite policy 1610, on the other hand, has a namespace andname of “Networking:Firewalls 2”, and also includes a reference to theatomic policy 1600. This reference does not specify a version, which insome embodiments means that it will always refer to the latest versionof the policy “Networking:FW app”. The policy 1610 specifies that theprotocol field is “udp” and the allow-ports field is the set {20, 47}.Thus, when compiled, the effective firewall policy as applied to theresources to which the policy 1605 is bound specifies to allow all UDPpackets on ports 20 and 47. Thus, only the single atomic policy 1600need be defined, and the parameterization allows for the administratorto define various different firewall policies without a need tounderstand the language in which the policies are actually written solong as the parameters are exposed by the atomic policy.

FIG. 17 illustrates the mapping of a parameter through multiple levelsof references to the atomic policy 1600. Specifically, a first compositepolicy 1705 having the name “Networking:Firewalls 1” references theatomic policy 1600 in a similar manner to the references shown in theprevious figure. In this case, while the protocol field specifies “tcp”as the parameter value, the allow-ports field parameter value is areference “config.ports”. In this manner, the parameter passed by thepolicy 1705 requires the compiler to look elsewhere for the parametervalue. This might require the evaluation of a function (shown below inFIG. 18), a reference to an aspect of the resource to which the policyis being applied, or in this case a parameter exposed by the compositepolicy 1705 and passed through another policy reference to thatcomposite policy. Specifically, the composite policy 1705 exposes aparameter (config.ports) that is then used as one of the parametervalues passed to a referenced atomic policy.

A second composite policy 1710, having the name “Networking:ConfigPorts”refers to the first composite policy 1705, as well as a different atomicpolicy 1715. The composite policy 1710 includes a set of values for theparameter “config.ports”, with the set including ports 80, 443, and8081. This parameter is used not only by the composite policy 1705 tocomplete the definition of the FW app policy 1600, but also by theatomic policy 1715, which requires a set of ports for its policydefinition as well. In this case, the atomic policy 1715(“Networking”NATP2”) specifies to not use these ports for the translatedsource port (presumably when performing network address and porttranslation). As such, the effective policies applied to one or moreresources based on a rule that binds the policy 1710 to the resourceswill have a firewall rule to allow tcp packets on ports 80, 443, and8081, as well as to not use ports 80, 443, and 8081 for the translatedsource port when NAT is performed.

As mentioned, some embodiments use functions to compute values forparameters. FIG. 18 illustrates an example of using such functions tocomplete an atomic policy 1800 during compilation. As shown in thefigure, the atomic policy 1800 has a name and namespace of“Compute:BiggestVM”, and includes a policy content definition thatstates that a VM is in error if either its storage exceeds a parameter“maxdisk” or if its memory exceeds a parameter “maxmem”, two parametersexposed by the policy 1800. Such a policy could be used by a computemanager or other monitoring system to ensure that VMs stay within aspecified size and report (or automatically correct) when VMs violatethe policy.

The atomic policy 1800 is referred to by a composite policy 1805 with anamespace and name of “Group1:MaxVM”. In some embodiments, multipledifferent groups (e.g., tenants, sub-organizations within an enterprise,etc.) that have networks (e.g., logical networks) within a computingenvironment may utilize the same policies, with the parameters allowingthe different groups to customize the policies to their respective needs(or a datacenter administrator to customize the policies for differentgroups). The composite policy 1805 defines values for the parametersmaxdisk and maxmem using functions. Specifically, both of the parametersare calculated using the max function, which takes as inputs one or morevalues and outputs the maximum of those values. The maxdisk parameter iscalculated as the maximum of the set “DiskSizeOptions”, while the maxmemparameter is calculated as the maximum of the set “MemOptions”. Thesetwo sets are exposed as parameters by the composite policy 1805.

These sets (“DiskSizeOptions” and “MemOptions”) are provided via asecond composite policy 1810 called (“Group1:VM_settings”) that refersto the “Group1:MaxVM” policy 1805 as well as another composite policycalled “Group1:MinVM” (not shown in the figure). This composite policy1810 defines the parameter DiskSizeOptions as having the values {4, 8,16}, and the parameter MemOptions as having the values {1, 2, 48, 8,32}. Thus, Group 1 VMs are allowed to have 4,8, or 16 GB of disk space,and 1, 2, 4, 8, or 32 GB of RAM. The result of compiling these policies,when the Group1:VM_settings policy is bound to a particular resource, isthat the atomic policy 1800 is defined to specify that a VM is inviolation if its storage space is greater than 16 GB or if its allocatedmemory is greater than 32 GB.

While FIGS. 16-18 illustrate different ways in which parameter valuescan be set during compilation using the policy composition language ofsome embodiments, FIGS. 19 and 20 conceptually illustrate the use ofconditional policy references in two different manners. Specifically,FIG. 19 illustrates the use of references to three different policiesdepending on the value of a parameter. This figure shows a compositepolicy 1900 having a namespace and name of “Group1:QOS_Settings”, andcontaining three references to different atomic policies 1905-1915inside a set of conditional statements.

The references depend on the value of the parameter app.config.tier. Asan example, the parameter app.config.tier could be a parameterdetermined by the resource (e.g., a VM, an application) to which thepolicy 1900 is applied. That is, the resource has a value of 1, 2, 3,etc. for the app.config.tier parameter, which is used to determine whichatomic policy will be applied to the resource. In some embodiments, theapp.config.tier is a category to which the resource belongs that iseither ingested from a resource information provider or derived based onsuch ingested information. For instance, a binding rule could apply thepolicy 1900 to all resources of the category application, while usingthe other categories (app.config.tier==1, app.config.tier==2, etc.) as adifferentiator within the applied policy.

As shown, if the parameter app.config.tier has a value of 1, then thepolicy 1900 (as applied to the resource) refers to the atomic policy1905 (named “Networking:QOS-Gold”), which provides a policy outliningthe highest quality of service for the resource to which it is applied.The effective policy applied to that resource will just be the atomicpolicy 1905. If the parameter app.config.tier has a value of 2, then thepolicy 1900 (as applied to the resource) refers to the atomic policy1910 (named “Networking:QOS-Silver”), which provides a policy outlininga medium-tier quality of service for the resource to which it isapplied. The effective policy applied to such a resource would be theatomic policy 1910. On the other hand, if the app.config.tier parameterhas a different value (or no value at all), then the policy 1900 asapplied to a resource refers to the atomic policy 1915 (named“Network:QOS-Bronze”), which provides a policy outlining the lowest-tierquality of service for the resource to which it is applied. Theeffective policy applied to such a resource would be the atomic policy1915. Thus, the conditional statement within a composite policy allowsthe policy to refer to different atomic policies (or other compositepolicies), depending on the value of a parameter passed from anotherpolicy reference, computed using a function, determined based on acharacteristic of the resource to which it is applied, etc.

FIG. 20, on the other hand, illustrates a composite policy 2000 withthree different conditional references to the same atomic policy 2005.The composite policy 2000 has the namespace and name“Group2:QOS_Settings”, and includes a similar set of conditionalstatements to that of the composite policy 1900. As in the previousexample, the references depend on the value of a parameterapp.config.tier, which could be a property of the resource to which thepolicy is applied, a value set by a policy that refers to the policy2000, etc.

As shown, if the parameter app.config.tier has a value of 1 for aparticular resource, then the policy 2000 as applied to the resourcerefers to the atomic policy 2005, and passes a level parameter with thevalue “gold”. Though not shown, the policy content contained within theatomic policy 2005 presumably has different effects depending on thevalue of the level parameter. In addition to setting this parametervalue for the referenced policy, the composite policy 2000 sets an aliasof “QOS-Gold” for the effective policy created by this reference. Insome embodiments, the effective policies as applied are assigned aderived identity which reflect their definition and position within thelarger composite policy that caused their application, in order foradministrators to track the effects of the policies more easily. Inorder to avoid ambiguities (especially in cases like this, where theeffective policy will always be the policy 2005 referenced by thecomposite policy 2000), the policy creators may assign aliases to eachof the component policies of a composite. The alias gives the effectivepolicy a persistent identity which can outlive changes to the policycontent of the atomic policy.

If the parameter app.config.tier has a value of 2 for a particularresource, then the policy 2000 as applied to the resource again refersto the atomic policy 2005, but with a level parameter value of “silver”,and sets an alias of “QOS-Silver” for the effective policy created bythis reference. Lastly, if the app.config.tier parameter has a valueother than 1 or 2 (or no value at all) for a particular resource, thenthe policy 2000 as applied to the resource still refers to the atomicpolicy 2005, but with a level parameter value of “bronze”, and sets analias of “QOS-Bronze” for the effective policy created by the reference.

V. Validation of Effective Policies

Once the policy-to-resource bindings are compiled to create a set ofeffective policies bound to each resource managed by the policyunification framework, some embodiments perform a validation check onthe policy bindings to ensure that the policies do not violate any rulesset by the administrator. Because the policies may be created by variousdifferent users (e.g., at the individual level, business group level,datacenter owner level, etc.) and imported from a multitude of sources,the possibility of conflicts may occur. As a simple example, a firstpolicy might specify that a VM can have a maximum disk space of 8 GB,while a second policy specifies that the same VM must have at least 16GB of disk space. Clearly, both policies cannot be enforced for the sameVM at the same time.

FIG. 21 conceptually illustrates a process 2100 performed by thevalidation engine (e.g., the validation engine 320) of some embodimentsfor determining whether effective policies applied to a particularresource result in any violations of validation rules and correctingsuch violations. This process 2100 illustrates the validation checkbeing performed for a single resource. However, it should be understoodthat the validation engines of different embodiments may perform theprocess for each different resource (serially or in parallel) to whichpolicies are bound. In addition, some embodiments also includevalidation rules that detect violations when a first policy is appliedto a first resource and a second policy is applied to a second resource(e.g., a first policy applied to a VM mandating at least 32 GB of diskspace and a second policy applied to the server on which the VM residesmandating that no VM on the server be allocated more than 16 GB of diskspace). Thus, some embodiments perform validation on aper-validation-rule basis, with the validation engine searching throughthe effective policies to identify violations of each rule.

As shown, the process begins by receiving (at 2105) a resource with theeffective policies applied to that resource. In some embodiments, asdescribed above, after compilation, the binding rules bind policies toresources resulting in a set of zero or more effective policies for eachresource. The effective policies are atomic policies from the policystore with any details completed. That is, the parameter values arefilled in, functions are evaluated, etc.

The process then determines (at 2110) whether the effective policiesbound to the resource violate any validation rules. Validation rules maybe set by the provider of the policy unification framework (e.g., aspart of a content package along with sets of binding rules, policies,and/or category derivation rules). The validation rules may also be setby an administrator of the computing environment (e.g., through a userinterface provided by the framework). The rules may be recognitions ofclearly problematic policy combinations, such as two policies that putincompatible restraints on a resource (e.g., conflicting disk size ormemory constraints, conflicting bandwidth constraints, etc.). Inaddition, validation rules may simply be based on a decision by theadministrator to disallow certain policy combinations within thecomputing environment. For example, an administrator might want toprevent certain firewall rules from being applied to resources that havethe highest tier of quality of service applied. Rather than trying toidentify all of the policies and binding rules, which may be institutedby different entities (users, groups, etc.), the administrator cansimply create a validation rule to identify resources with theproblematic combination. If no violations are found for the currentresource, then the process ends.

Otherwise, if any violations of the validation rules exist, the process2100 selects (at 2115) one of the violations to correct. The processdetermines (at 2120) whether the validation engine has an explicit rulespecifying which of the policies that create the violation should bedisabled for the resource. In some embodiments, a violation rule mayexplicitly state that if policy A and policy B are both applied to aresource, to disable policy A and leave policy B in effect (or viceversa). For example, when the administrator of a computing environmentcreates a validation rule such as the one mentioned above, they may havein mind a specific solution that they prefer (e.g., disabling one of thepolicies or the other). In other cases, such as when the policies are indirect conflict (e.g., policy A specifies a maximum of X for some valueX while policy B specifies a minimum greater than X for that value), thevalidation rule may not specify which of the policies to disable as thatmay be context-sensitive.

When such an explicit rule exists, the process disables (at 2125) thespecified policy. In some embodiments, disabling an effective policyremoves the binding of the effective policy from the resourcecompletely. However, in other embodiments (as described above regardingexceptions to the binding rules), disabling an effective policy onlyentails negating the binding. In this manner, the effective policy isstill bound to the resource, but this binding is not exported to thepolicy engines. This allows an administrator to view the negatedbindings in order to identify the reasons for the negation. The processthen proceeds to 2145 to determine whether additional violations requirecorrection for the resource.

When there is no explicit rule governing which of the two or moreconflicting policies should be disabled, the process 2100 determines (at2130) whether any other remediation is available to correct theviolation. This remediation could still involve disabling one of thepolicies based on the precedence of one policy over the other (e.g., ahierarchy of policies). For example, a network administrator for a groupmight set default policies for resources owned by that group, but alsoallow for those policies to be overwritten by specific sub-groups. Inthis case, if a conflict exists, the sub-group policy would takeprecedence and the validation engine would disable the default policy.On the other hand, the network administrator could set policies thatautomatically take precedence over sub-group policies. Similarly, thesome sources of policy templates could be preferred over others,resulting in precedence based on the policy source. On the other hand,certain violations might be recognized as business rule violations butwhich do not actually create a conflict for the policy engines, in whichcase some embodiments will allow the policies to be applied in violationof the rule. In yet other cases, some embodiments identify when a policycan be modified in such a way that will alleviate the conflict (e.g., bychanging a parameter value), and perform this modification when allowed.When such a remediation is available for the conflicting policies, theprocess performs (at 2135) the remediation to correct or accept theconflict.

If there is no clear determiner as to how to resolve the violation, theprocess 2100 of some embodiments notifies (at 2140) the computingenvironment administrator of the policy violation. Some embodimentscreate a list of notifications regarding validation rule violations (andother issues in some such embodiments, such as policies in force butbeing violated in the computing environment) and present this list tothe administrator or other users in the user interface of the policyframework (or at least make the list accessible through the userinterface).

Some embodiments, as an alternative, disable all of the policies thecombination of which creates the violation when there is no explicitrule as to which policy should be disabled and there is no hierarchicalsolution. In addition, some embodiments notify the administrator of theviolation and any remediation performed anytime there is a violation,irrespective of whether the violation was corrected.

After processing the violation, the process determines (at 2145) whetherany additional violations require correction. In some embodiments, thisinvolves rechecking the current policies bound to the resource and ineffect to ensure that the disabling of any policies in operations 2125or 2135 cured the violation. If additional violations of the validationrules require correction, the process returns to 2115 to select the nextviolation. Otherwise, the process 2100 ends.

FIG. 22 conceptually illustrates an example of a validation engine 2200applying a validation rule 2205 to a set of conflicting effectivepolicies 2210 and 2215 that are bound to a VM. As shown, the validationengine 2200 receives a set of resources 2220, each with a set of zero ormore effective policies applied. Specifically, the resources include aVM 1 with two effective policies applied: Policy A 2210 and Policy B2215.

The validation engine 2200 checks the sets of effective policies for theresources, including VM 1, against a set of validation rules 2225. Asshown, these include a rule 2205 that identifies a violation if bothPolicy A and Policy B are applied to a resource of the type VM. As VM 1matches this description, the validation engine 2200 identifies thisresource to be in violation of the rule. This rule explicitly statesthat Policy B should be disabled for a resource meeting theseconditions, so the validation engine disables Policy B 2215 in thisexample.

VI. Policy Framework User Interface

As discussed with regard to several features above, the policyunification framework of some embodiments provides a user interface thatallows an administrator of the computing environment managed by thepolicy framework to view and edit the resources, policies, and bindings.In some embodiments, the administrator can use the UI to create and editcomposite policies, binding rules, and resource category derivationrules. When creating and editing the composite policies, the user maydefine how the policies are composed according to the policy compositionfeatures allowed by the composition language (e.g., define conditionsfor referencing policies, provide the parameters for the policyreferences, etc.).

FIG. 23-28 illustrate features of an example graphical user interface(GUI) of the policy unification framework of some embodiments. It shouldbe understood that the GUI features shown in these figures are merelyexamples, and that the GUIs with different layouts, appearances, andfeatures are all possible within the scope of the invention. Forinstance, while the example figures show policies and binding rulesbeing edited in pop-up windows that appear over the background GUI,other embodiments provide these editing features in a different page ofthe same GUI, rather than as a separate window.

FIG. 23 illustrates a policy framework GUI 2300 of some embodiments thatis currently highlighting the policies available for binding toresources in the policy unification framework. As shown, the policyframework GUI 2300 includes three tabs 2305-2315 for policies, bindings,and resources. Each of these tabs allows the user to view a list of therespective entities stored by the system, as well as to view and/or editadditional details regarding those entities. Currently, the policies tab2305 is selected, so that the GUI presents information about thepolicies stored by the policy framework.

As shown, the GUI 2300 presents a list 2320 of the policies stored inthe policy store of the framework when the policies tab 2305 isselected. Though this examples shows eight policies in the list, atypical enterprise datacenter or multi-tenant datacenter might havehundreds or even thousands of policies. In addition, list 2320 providesinformation about the policies. In some embodiments, the providedinformation depends on what type of metadata is stored in the policywrapper fields for the policies (e.g., in addition to the namespace,name, and version fields).

In this example, the list indicates the source of the policy, which maybe a management software product (shown here as Networking, Compute,Storage, etc., some embodiments use the product name), a specificdatabase, etc. for atomic policies. For composite policies, someembodiments identify the source as “composite”, as those policies aregenerated within the system. However, other embodiments mightdifferentiate between composite policies provided as part of a contentpackage and composite policies developed by an administrator. Inaddition, other embodiments may present other information for eachpolicy in the policy list 2320. For example, some embodiments include adescription of the policy, or other additional metadata provided withinthe policy wrapper.

The GUI 2300 with the policies tab 2305 selected also includes a section2325 for displaying information about a selected policy. At the moment,a policy named “Dev/Test Storage” is selected in the list 2320, so theGUI section 2325 displays information about this policy. Thisinformation includes the full namespace, name, and version(“Development:Dev/Test Storage”, version 1.4), as well as informationabout the policy's use in the computing environment. As shown, thisinformation includes the binding rules that bind the policy tocategories of resources, as well as the resources to which the policy isbound based on these rules. In this case, the Dev/Test Storage policy isbound to resources via a “Bind Dev/Test” binding rule (i.e., as one ofseveral policies in the composite “Dev/Test” policy specified by thebinding rule). The affected resources are three VMs that presumablysatisfy the category requirements of this binding rule. Again, theinformation displayed about the policy could include additional or otherinformation in some embodiments, such as the parameters exposed by thepolicy (if any), the component policies of a composite, the policydescription for atomic policies, etc.

With the policies tab 2305 selected, the GUI 2300 also includes an Editbutton 2330. Selection of this button (or a different GUI construct inother embodiments) allows the user to edit the policy currently selectedin the list 2320. FIG. 24 illustrates a window 2400 for editing aselected composite policy that is displayed over the GUI 2300 (e.g., inresponse to a selection of the Edit button 2330. As shown, the user hasselected version 1.4 of the Development:Dev/Test composite policy forediting. The policy editing window 2400 includes basic information aboutthe policy (namespace, name, version, and description, and in otherembodiments may include other metadata stores in the policy wrapper forthe policy.

In addition, the policy editing window 2400 includes various tools fordefining the policy. The window includes selectors 2405 and 2410 thatallow the user to view and modify whether the policy is a compositepolicy or an atomic policy, with different policy content editinginterfaces depending on the type of policy. In this case, the selectedpolicy is a composite policy, so the composite policy editing tools aredisplayed. The content window 2415 for a composite policy displays thecomponent policies of the composite policy, which in this case includesthree policies (a storage policy, a networking policy, and a VMrequirements policy). In some embodiments, the listed policies areselectable to enable the user to edit the selected policy (e.g., bydisplaying a new editing window for the selected policy, by expandingthe policies within the content window to allow for editing within thewindow 2400, etc.). The editing window additionally provides selectableitems 2417 and 2419 that enable the user to add and remove componentpolicies from the composite policy. Selecting the add policy item 2419,for example, brings up a dialog box in some embodiments that allows theuser to search for and select a policy (either an atomic or compositepolicy) to add to the current composite policy.

The editing window also provides editing tools 2420-2430 that allow theuser to add conditional statements to their composite policy, exposeparameters for the policy, and provide parameter values to the componentpolicies. For example, selecting the add conditional button 2420 in someembodiments provides an interface for the user to input the conditionsrequired and the policies referenced if those conditions are met.Selecting the expose parameters button 2425 allows the user to provide aname for the parameter or parameters that will be exposed by thecomposite policy (and therefore required for a policy that referencesthe composite). Similarly, the provide parameter values button 2430enables a user to provide parameter values for references to one or moreof the component policies. These parameter values may be provided in theform of a number or string, a function (e.g., of an exposed parametervalue, of a resource-driven value, etc.). As an alternative to theseediting tools, or in conjunction with such tools, some embodimentsprovide a code editor option for window 2415 that allows the user todirectly edit the composite policy using the composition language. Forinstance, some embodiments provide a color-coded editor similar to thosecommonly used for computer program or mark-up language coding, to enableeasy direct editing of the composite policy.

FIG. 25 illustrates an editing window 2500 for an atomic policy in someembodiments, which is also displayed over the GUI 2300. To view thiswindow, the user would have selected the Networking:FW_BlockIPs (version3.0) policy from a list of policies in the system (e.g., the list 2320shown in FIG. 23). The basic layout of the editing window 2500 issimilar to that of the composite policy editing window 2400, but withdifferences to account for the currently selected policy being an atomicpolicy. Again, the window includes two selector 2505 and 2510 that allowthe user to identify that the policy is an atomic rather than compositepolicy. In addition, the content window displays the policy content, asthis is an atomic policy and therefore contains a policy content field.In some embodiments, when the policy content is written in a languagerecognized by the policy framework (e.g., standards based languages orknown proprietary domain-specific languages), the editor provides thepolicy content in an organized manner such as would be shown by a codeeditor (e.g., with color-coding of tags and end-tags, conditionalstatements, etc.). The editing tools also include a selectable button2515 that allows the user to expose parameters for the policy (or toview the parameters that are exposed based on analysis performed atimport of the policy). For instance, in the policy shown in this figure,the parameter “VM_subnet” might be exposed by the selected atomicpolicy.

As noted, the policy unification framework GUI 2300 of some embodimentsalso includes tabs for viewing the binding rules and resourceinformation stored by the system. FIG. 26 illustrates the GUI 2300 withthe resources tab 2315 selected, so that the GUI presents informationabout the resources operating in the computing environment managed bythe policy framework.

As shown, the GUI 2300 presents a list 2605 of the resources about whichinformation is stored by the policy framework when the resources tab2315 is selected. Though this example shows a list of eight resources, atypical enterprise or multi-tenant datacenter might have thousands ofresources, or even millions for a larger datacenter. The list 2605identifies the resources by name (e.g., using a UID provided by thesource of the resource information, a name given to the resource by auser, etc.), and also provides additional information about theresource. In this case, the list 2605 identifies the type of eachresource. For instance, the list shows three VMs, two applications, twodatacenters, and a sensitivity level. Other types of resources includeoperating system, host machines, forwarding elements (e.g., switches,routers, software virtual switches, etc.), logical forwarding elementsand logical networks, etc. In addition to (or as an alternative to) thetype of resource, some embodiments display the source of the resourceinformation (or multiple sources, if the resource information isconsolidated from multiple sources.

With the resources tab 2315 selected, the GUI 2300 also displays asection 2610 for information about a currently selected resource. Inthis figure, the resource “GB App Server” is selected in the list 2605,so the GUI section 2610 displays information about this resource. Forresources, this information in some embodiments includes the categoriesto which the resource belongs (other than the resource type, shown inthe list 2605) as well as the effective policies applied to the resourceby the compiler of the policy unification framework. The currentresource belongs to the categories “New York datacenter” and“application server”. In addition, GUI provides two selectable items2620 and 2625 that allow the user to add new category tags for theresource or remove the resource from a category. To remove a categorytag, the user in some embodiments selects the category tag and thenselects the remove category item 2625. When the user selects the addcategory item 2620, some embodiments display a GUI construct throughwhich the user can select a category tag or create a new category tag toapply to the resource.

The GUI section 2610 also includes information about the effectivepolicies applied to the selected resource. In this case, three policiesare currently bound to the resource “GB App Server” based on itscategory tags and the binding rules. For each of these effectivepolicies, the GUI also displays the path that was used to arrive at thebinding. This path is the path of references from a policy specified ina binding rule to the atomic policy actually bound to the resource. Thefirst effective policy (Valid VM (1 GB, 16 GB)) is an atomic policy thatis directly bound to the selected resource. On the other hand, thelatter two policies (IP Rules, Prod FW) are both atomic policies boundthe selected resource based on the same derivation path. A binding rulespecified to bind the composite policy Prod App Servers, which includesa composite policy Prod Networking, which in turn includes the twoatomic policies bound as effective policies to the selected applicationserver resource.

FIG. 27 illustrates the GUI 2300 with the bindings tab 2310 selected, sothat the GUI presents information about the various policy-to-resourcebindings defined for the policy unification framework. As shown, the GUI2300 presents a list 2705 of binding rules that includes variousinformation about the bindings. Specifically, in the example, this list2705 provides, for each binding, a name and description (when such adescription exists in the system). In addition, for each binding rule,the GUI displays the policies that are bound by the rule and theresources or resource categories to which those policies are bound. Forexample, the binding rule “Validate DevOps” binds the policies“Memory<=4 GB” and “Lease<=10” to VMs that are in the DevOps category.

The GUI 2300 also includes three selectable GUI items 2710-2720 foradding, editing, and removing binding rules. The user can remove bindingrules in some embodiments by selecting a rule in the displayed list andselecting the GUI item 2720 (or performing a similar interaction throughdifferent GUI constructs in different embodiments). In addition,selecting either of the items 2710 or 2715 causes a pop-up window to bedisplayed in some embodiments that lets the user either edit an existingbinding rule or create a new binding rule (depending on which of the GUIitems was selected).

FIG. 28 illustrates such a window 2800 for editing a selected bindingrule that is displayed over the GUI 2300 (e.g., in response to aselection of the GUI item 2715). As shown, the user has selected thebinding rule “Bind Dev/Test”, which binds policies to VMs in theDev/Test group. The binding rule editing window 2800 includes basicinformation about the binding rule, such as its name and description(and potentially other data stored by the policy framework for bindingrules).

In addition, the binding rule editing window 2800 includes various toolsfor (i) defining the policies that are bound to resources via thebinding rule and (ii) defining the categories of resources to which theselected policies are bound. As shown, the editing window includes afirst section 2805 that lists the policies bound via the rule andthrough which policies can be added or removed by selecting the GUIitems 2810 and 2815. In some embodiments, selecting the add policy item2810 presents the user with a searchable list of policies to apply. Someembodiments organize the policies based on source or other factors. Theediting window also includes a second section 2820 that lists thecategories of resources (or individual resources) to which the rulebinds policies, and through which categories can be added or removed byselecting the GUI items 2825 and 2830. In some embodiments, selectingthe add category item 2825 presents the user with a searchable list ofcategories to use, which may be sorted based on source, applicableresource type, etc.

In addition to the features shown in these figures, it should beunderstood that various other actions may be taken by a user through thepolicy framework GUI. For example, some embodiments provide an interfacefor viewing and editing category derivation rules. The categoryderivation rules interface, in some embodiments, is similar to thatshown for binding rules, with the user able to edit which categoriescombine to form new categories, and which categories from differentsources can be viewed as equivalents (and define a new category toconsolidate these equivalent categories).

As another example, some embodiments provide an interface for viewingand editing policy validation rules. The policy validation rulesinterface, in some embodiments, is similar to that shown for bindingrules, with the user able to edit which policies cause a conflict aswell as what actions to take in order to resolve such policy conflicts.Similarly, the GUI of some embodiments includes an interface fordefining exceptions to the binding rules. In some embodiments, thisinterface is accessible through the binding rule editing window (or asimilar construct), and allows the user to view the resources to which apolicy would be applied based on the binding rule. The user can thenselect any of the resources to be excepted from one or more atomicpolicies. Some embodiments mandate that the user provide an explanationfor the exception that can be saved and viewed at a later date.

Some embodiments also provide an interface through which the user canview notifications of violations of validation rules, and disablepolicies if need be. Some embodiments provide a list of all violations,even when the violation was corrected by automatically disabling one ormore of the applied policies. This allows the administrator to determinewhether any of the issues causing the violation need correction (e.g.,removing a policy or resource category from a binding rule, creating anexception, etc.). In addition, when the policy framework has notautomatically corrected the violation, some embodiments require the userto select one or more policies to disable from a resource. A similarinterface in some embodiments allows the administrator to view theactual application of the policies in the results store.

VII. Electronic System

Many of the above-described features and applications are implemented assoftware processes that are specified as a set of instructions recordedon a computer readable storage medium (also referred to as computerreadable medium). When these instructions are executed by one or moreprocessing unit(s) (e.g., one or more processors, cores of processors,or other processing units), they cause the processing unit(s) to performthe actions indicated in the instructions. Examples of computer readablemedia include, but are not limited to, CD-ROMs, flash drives, RAM chips,hard drives, EPROMs, etc. The computer readable media does not includecarrier waves and electronic signals passing wirelessly or over wiredconnections.

In this specification, the term “software” is meant to include firmwareresiding in read-only memory or applications stored in magnetic storage,which can be read into memory for processing by a processor. Also, insome embodiments, multiple software inventions can be implemented assub-parts of a larger program while remaining distinct softwareinventions. In some embodiments, multiple software inventions can alsobe implemented as separate programs. Finally, any combination ofseparate programs that together implement a software invention describedhere is within the scope of the invention. In some embodiments, thesoftware programs, when installed to operate on one or more electronicsystems, define one or more specific machine implementations thatexecute and perform the operations of the software programs.

FIG. 29 conceptually illustrates an electronic system 2900 with whichsome embodiments of the invention are implemented. The electronic system2900 can be used to execute any of the control, virtualization, oroperating system applications described above. The electronic system2900 may be a computer (e.g., a desktop computer, personal computer,tablet computer, server computer, mainframe, a blade computer etc.),phone, PDA, or any other sort of electronic device. Such an electronicsystem includes various types of computer readable media and interfacesfor various other types of computer readable media. Electronic system2900 includes a bus 2905, processing unit(s) 2910, a system memory 2925,a read-only memory 2930, a permanent storage device 2935, input devices2940, and output devices 2945.

The bus 2905 collectively represents all system, peripheral, and chipsetbuses that communicatively connect the numerous internal devices of theelectronic system 2900. For instance, the bus 2905 communicativelyconnects the processing unit(s) 2910 with the read-only memory 2930, thesystem memory 2925, and the permanent storage device 2935.

From these various memory units, the processing unit(s) 2910 retrieveinstructions to execute and data to process in order to execute theprocesses of the invention. The processing unit(s) may be a singleprocessor or a multi-core processor in different embodiments.

The read-only-memory (ROM) 2930 stores static data and instructions thatare needed by the processing unit(s) 2910 and other modules of theelectronic system. The permanent storage device 2935, on the other hand,is a read-and-write memory device. This device is a non-volatile memoryunit that stores instructions and data even when the electronic system2900 is off. Some embodiments of the invention use a mass-storage device(such as a magnetic or optical disk and its corresponding disk drive) asthe permanent storage device 2935.

Other embodiments use a removable storage device (such as a floppy disk,flash drive, etc.) as the permanent storage device. Like the permanentstorage device 2935, the system memory 2925 is a read-and-write memorydevice. However, unlike storage device 2935, the system memory is avolatile read-and-write memory, such a random access memory. The systemmemory stores some of the instructions and data that the processor needsat runtime. In some embodiments, the invention's processes are stored inthe system memory 2925, the permanent storage device 2935, and/or theread-only memory 2930. From these various memory units, the processingunit(s) 2910 retrieve instructions to execute and data to process inorder to execute the processes of some embodiments.

The bus 2905 also connects to the input and output devices 2940 and2945. The input devices enable the user to communicate information andselect commands to the electronic system. The input devices 2940 includealphanumeric keyboards and pointing devices (also called “cursor controldevices”). The output devices 2945 display images generated by theelectronic system. The output devices include printers and displaydevices, such as cathode ray tubes (CRT) or liquid crystal displays(LCD). Some embodiments include devices such as a touchscreen thatfunction as both input and output devices.

Finally, as shown in FIG. 29, bus 2905 also couples electronic system2900 to a network 2965 through a network adapter (not shown). In thismanner, the computer can be a part of a network of computers (such as alocal area network (“LAN”), a wide area network (“WAN”), or an Intranet,or a network of networks, such as the Internet. Any or all components ofelectronic system 2900 may be used in conjunction with the invention.

Some embodiments include electronic components, such as microprocessors,storage and memory that store computer program instructions in amachine-readable or computer-readable medium (alternatively referred toas computer-readable storage media, machine-readable media, ormachine-readable storage media). Some examples of such computer-readablemedia include RAM, ROM, read-only compact discs (CD-ROM), recordablecompact discs (CD-R), rewritable compact discs (CD-RW), read-onlydigital versatile discs (e.g., DVD-ROM, dual-layer DVD-ROM), a varietyof recordable/rewritable DVDs (e.g., DVD-RAM, DVD-RW, DVD+RW, etc.),flash memory (e.g., SD cards, mini-SD cards, micro-SD cards, etc.),magnetic and/or solid state hard drives, read-only and recordableBlu-Ray® discs, ultra density optical discs, any other optical ormagnetic media, and floppy disks. The computer-readable media may storea computer program that is executable by at least one processing unitand includes sets of instructions for performing various operations.Examples of computer programs or computer code include machine code,such as is produced by a compiler, and files including higher-level codethat are executed by a computer, an electronic component, or amicroprocessor using an interpreter.

While the above discussion primarily refers to microprocessor ormulti-core processors that execute software, some embodiments areperformed by one or more integrated circuits, such as applicationspecific integrated circuits (ASICs) or field programmable gate arrays(FPGAs). In some embodiments, such integrated circuits executeinstructions that are stored on the circuit itself.

As used in this specification, the terms “computer”, “server”,“processor”, and “memory” all refer to electronic or other technologicaldevices. These terms exclude people or groups of people. For thepurposes of the specification, the terms display or displaying meansdisplaying on an electronic device. As used in this specification, theterms “computer readable medium,” “computer readable media,” and“machine readable medium” are entirely restricted to tangible, physicalobjects that store information in a form that is readable by a computer.These terms exclude any wireless signals, wired download signals, andany other ephemeral signals.

This specification refers throughout to computational and networkenvironments that include virtual machines (VMs). However, virtualmachines are merely one example of data compute nodes (DNCs) or datacompute end nodes, also referred to as addressable nodes. DCNs mayinclude non-virtualized physical hosts, virtual machines, containersthat run on top of a host operating system without the need for ahypervisor or separate operating system, and hypervisor kernel networkinterface modules.

VMs, in some embodiments, operate with their own guest operating systemson a host using resources of the host virtualized by virtualizationsoftware (e.g., a hypervisor, virtual machine monitor, etc.). The tenant(i.e., the owner of the VM) can choose which applications to operate ontop of the guest operating system. Some containers, on the other hand,are constructs that run on top of a host operating system without theneed for a hypervisor or separate guest operating system. In someembodiments, the host operating system isolates the containers fordifferent tenants and therefore provides operating-system levelsegregation of the different groups of applications that operate withindifferent containers. This segregation is akin to the VM segregationthat is offered in hypervisor-virtualized environments, and thus can beviewed as a form of virtualization that isolates different groups ofapplications that operate in different containers. Such containers aremore lightweight than VMs.

Hypervisor kernel network interface modules, in some embodiments, is anon-VM DCN that includes a network stack with a hypervisor kernelnetwork interface and receive/transmit threads. One example of ahypervisor kernel network interface module is the vmknic module that ispart of the ESX hypervisor of VMware Inc.

One of ordinary skill in the art will recognize that while thespecification refers to VMs, the examples given could be any type ofDCNs, including physical hosts, VMs, non-VM containers, and hypervisorkernel network interface modules. In fact, the example networks couldinclude combinations of different types of DCNs in some embodiments.

While the invention has been described with reference to numerousspecific details, one of ordinary skill in the art will recognize thatthe invention can be embodied in other specific forms without departingfrom the spirit of the invention. In addition, a number of the figures(including FIGS. 4, 9, 14, and 21) conceptually illustrate processes.The specific operations of these processes may not be performed in theexact order shown and described. The specific operations may not beperformed in one continuous series of operations, and different specificoperations may be performed in different embodiments. Furthermore, theprocess could be implemented using several sub-processes, or as part ofa larger macro process. Thus, one of ordinary skill in the art wouldunderstand that the invention is not to be limited by the foregoingillustrative details, but rather is to be defined by the appendedclaims.

We claim:
 1. A method for managing a set of computing resources, themethod comprising: storing an imported policy rule of a virtual machinecomputing environment as a first primitive policy, the first primitivepolicy including a policy data structure that includes a set of fields,the imported policy rule written in a first language, wherein a firstfield of the set of fields stores the imported policy rule in the firstlanguage and a second field of the set of fields stores the importedpolicy rule in a second language for the first primitive policy;generating a first composite policy, wherein the first composite policyincludes a first reference identifying the first primitive policy and asecond reference identifying a second primitive policy or a secondcomposite policy; importing descriptions of computing resources from aplurality of heterogeneous sources, wherein the descriptions specifycategories for the computing resources, wherein different sources usedifferent types of categories for the resource descriptions; based on afirst category specified for a first one of the computing resources inthe set, deriving a second category for the first one of the computingresources; binding the first composite policy to the first one of thecomputing resources based on a binding rule identifying the firstcomposite policy and the second category; and transmitting the firstcomposite policy to a policy engine of the virtual machine computingenvironment responsible for managing the first one of the computingresources, the transmitting including transmitting the first primitivepolicy and at least one of the second primitive policy or the secondcomposite policy, the policy engine to apply the first primitive policyby reading the primitive policy using the second language.
 2. The methodof claim 1, wherein the plurality of heterogeneous sources includes atleast one of a network manager, a storage manager, and a compute managerfor a datacenter.
 3. The method of claim 1, wherein the set of computingresources includes at least one of physical servers, virtual servers,physical forwarding elements, software forwarding elements, logicalforwarding elements of a logical network, hardware resources of aphysical server, applications, and datacenters.
 4. The method of claim1, wherein a description of the first one of the computing resources isimported from both first and second sources, wherein the description ofthe first one of the computing resources from the first source specifiesa first category for the one of the computing resources and thedescription of the one of the computing resources from the second sourcespecifies a second, different category for the one of the computingresources.
 5. The method of claim 4, wherein the first category is notspecified by the description of the first one of the computing resourcesfrom the second source and the second category is not specified by thedescription of the one of the computing resources from the first source.6. The method of claim 4, wherein the first category is not specified bythe description of the one of the computing resources from the secondsource, while the second category is specified by the description of theone of the computing resources from the first source.
 7. The method ofclaim 1, further including: determining that a description of a secondone of the computing resources specifies a third category for the secondone of the computing resources; and assigning both the first one of thecomputing resources and second one of the computing resources to secondcategory.
 8. The method of claim 7, wherein the first and thirdcategories have a same meaning expressed in different identifiers,wherein the third category provides a normalization for this meaning. 9.The method of claim 1, wherein deriving the second category for thefirst one of the computing resources includes: determining that thedescription of the first one of the computing resources specifies thatthe first one of the computing resources belongs to both a firstcategory and a third category; and based on the determination, assigningthe first one of the computing resources to the second category.
 10. Themethod of claim 9, wherein the first category is specified for the firstone of the computing resources in a first description of the first oneof the computing resources received from a first source and the thirdcategory is specified for the first one of the computing resources in asecond description of the first one of the computing resources receivedfrom a second source.
 11. The method of claim 1 further includingidentifying that a description of the first one of the computingresources received from a first source and a description of a second oneof the computing resources received from a second source aredescriptions of the first one of the computing resources, wherein only asingle description is stored for the first one of the computingresources tagged with categories from the descriptions from both thefirst and second sources.
 12. A non-transitory machine readable mediumstoring a program which when executed by at least one processing unitmanages a set of computing resources, the program comprising sets ofinstructions for: storing an imported policy rule of a virtual machinecomputing environment as a first primitive policy, the first primitivepolicy including a policy data structure that includes a set of fields,the imported policy rule written in a first language, wherein a firstfield of the set of fields stores the imported policy rule in the firstlanguage and a second field of the set of fields stores the importedpolicy rule in a second language for the first primitive policy;generating a first composite policy, wherein the first composite policyincludes a first reference identifying the first primitive policy and asecond reference identifying a second primitive policy or a secondcomposite policy; importing descriptions of computing resources from aplurality of heterogeneous sources, wherein the descriptions specifycategories for the computing resources, wherein different sources usedifferent types of categories for the resource descriptions; based on afirst category specified for a first one of the computing resources inthe set, deriving a second category for the first one of the computingresources; binding the first composite policy to the first one of thecomputing resources based on a binding rule identifying the firstcomposite policy and the second category; and transmitting the firstcomposite policy to a policy engine of the virtual machine computingenvironment responsible for managing the first one of the computingresources, the transmitting including transmitting the first primitivepolicy and at least one of the second primitive policy or the secondcomposite policy, the policy engine to apply the first primitive policyby reading the primitive policy using the second language.
 13. Themachine readable medium of claim 12, wherein the plurality ofheterogeneous sources includes at least one of a network manager, astorage manager, and a compute manager for a datacenter.
 14. The machinereadable medium of claim 12, wherein the set of computing resourcesincludes at least one of physical servers, virtual servers, physicalforwarding elements, software forwarding elements, logical forwardingelements of a logical network, hardware resources of a physical server,applications, and datacenters.
 15. The machine readable medium of claim12, wherein a description of the first one of the computing resources isimported from both first and second sources, wherein the description ofthe first one of the computing resources from the first source specifiesa first category for the first one of the computing resources and thedescription of the one of the computing resources from the second sourcespecifies a second, different category for the one of the computingresources.
 16. The machine readable medium of claim 15, wherein thefirst category is not specified by the description of the one of thecomputing resources from the second source and the second category isnot specified by the description of the first one of the computingresources from the first source.
 17. The machine readable medium ofclaim 15, wherein the first category is not specified by the descriptionof the one of the computing resources from the second source, while thesecond category is specified by the description of the one of thecomputing resources from the first source.
 18. The machine readablemedium of claim 12, further including: determining that a description ofa second one of the computing resources specifies a third category forthe second one of the computing resources; and assigning both the firstone of the computing resources and second one of the computing resourcesto second category.
 19. The machine readable medium of claim 18, whereinthe first and third categories have a same meaning expressed indifferent identifiers, wherein the third category provides anormalization for this meaning.
 20. The machine readable medium of claim12, wherein the set of instructions for deriving the second category forthe first one of the computing resources includes sets of instructionsfor: determining that the description of the first one of the computingresources specifies that the first one of the computing resourcesbelongs to both a first category and a third category; and based on thedetermination, assigning the first one of the computing resources to thesecond category.
 21. The machine readable medium of claim 20, whereinthe first category is specified for the first one of the computingresources in a first description of the first one of the computingresources received from a first source and the third category isspecified for the first one of the computing resources in a seconddescription of the first one of the computing resources received from asecond source.
 22. The machine readable medium of claim 12, wherein theprogram further includes a set of instructions for identifying that adescription of the first one of the computing resources received from afirst source and a description of a second one of the computingresources received from a second source are descriptions of a sameparticular the first one of the computing resources, wherein only asingle description is stored for the first one of the computingresources tagged with categories from the descriptions from both thefirst and second sources.