Patent attributes
A request is received, from a tenant by a cluster management proxy, to perform a cluster management operation within a cluster that is storing data from multiple tenants that include the tenant. In response to determining that the request is within a group of admissible cluster management requests for the cluster, the request is modified, by the cluster management proxy, to restrict access of the cluster management operation based on an identity of the tenant. The cluster is accessed, by the cluster management proxy, based on the modified request that has restricted access of the cluster management operation. In response to determining that the request is not within the group, the request is tunneled to a Storage Virtual Machine (SVM) assigned to the tenant. The SVM is configured to access the cluster based on the request.