| CPC G06F 21/44 (2013.01) [G06F 16/313 (2019.01); G06F 16/3329 (2019.01); G06F 16/3335 (2019.01); G06F 16/951 (2019.01); G06F 40/20 (2020.01)] | 20 Claims |

|
1. A computer-implemented method comprising:
collecting by one or more computing systems of a multi-tenant trusted domain, metadata describing data stored in data sources of a plurality of tenant trusted domains;
hosting by the multi-tenant trusted domain, a first set of services for processing metadata received from a tenant trusted domain, wherein the services from the first set of services interact with a second set of services hosted by each of the plurality of tenant trusted domain, the second set of services processing the data stored in one or more data sources of the tenant trusted domain;
in response to receiving a data analysis request, executing a data analysis pipeline by (1) using services of the first set of services of the multi-tenant trusted domain to analyze the collected metadata to determine a data source and one or more services of the second set of services of a particular tenant trusted domain associated with the data analysis request, and (2) using the determined one or more services of the second set of services of a particular tenant trusted domain to query the determined data source to generate a data analysis result, wherein services of the first set of services process metadata obtained from the particular tenant trusted domain and the second set of services of the particular tenant trusted domain process data stored in data sources of the particular tenant trusted domain;
for each of the plurality of tenant trusted domains, receiving by the one or more computing systems of the multi-tenant trusted domain, credentials for interacting with one or more computing systems of the tenant trusted domain, the credentials providing access for modifying services from the second set of services of the tenant trusted domain;
for each of the plurality of tenant trusted domains, causing modification of a particular service of the second set of services using the credentials obtained from the tenant trusted domain, the modification comprising installation of executable instructions for the particular service; and
in response to receiving a new data analysis request, executing a new data analysis pipeline (1) using services of the first set of services of the multi-tenant trusted domain to analyze the collected metadata to determine a data source and one or more services of the second set of services of a particular tenant trusted domain associated with the data analysis request, including the modified particular services, and (2) using the determined one or more services of the second set of services of the particular tenant trusted domain including the modified particular service to query the determined data source to generate a new data analysis result.
|