Abstract:
Examples provide for virtual machine recovery using pooled memory. A shared partition is created on pooled memory accessible by a plurality of virtual machine hosts. A set of memory pages for virtual machines running on the hosts is moved to the shared partition. A master agent polls memory page tables associated with the plurality of hosts for write access. If the master agent obtains write access to a memory page table of a given host, the given host that previously held the write access is identified as a failed host or an isolated host. The virtual machines of the given host enabled to resume from pooled memory are respawned on a new host while maintaining memory state of the virtual machines using data within the pooled memory, including the virtual machine memory pages, memory page table, host profile data, and/or host-to-VM table data.
Abstract:
Aspects of peripheral device sharing for virtual machines are described. In some aspects, a virtual machine requires access to a peripheral device. The virtual machine is executed in a first host computing system. A table is accessed, and includes a list of peripheral devices, an indication that the peripheral device is connected to a second host computing system, a bandwidth requirement of the peripheral device, and a network bandwidth allocated to the virtual machine. The virtual machine is provided with access to the peripheral device based on a comparison between the bandwidth requirement of the peripheral device, and a threshold percentage of the network bandwidth allocated to the virtual machine.
Abstract:
Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The container disk files are stored separate from, and not included within, virtual machine disk files that store data for the virtual machines. To scan data for any particular container, a scanning module scans the container disk file associated with the container. If a threat is found, a container scan catalog is updated to indicate this fact. A container may be disconnected from the network if identified security threats cannot be removed from the container. An entire VM may be disconnected from the network if all containers within the VM have threats that cannot be cleaned. The use of container disk files for security threat scanning allows for data for individual containers to be scanned.
Abstract:
In an example, a method of managing virtualization software installed on a host computer includes connecting to a platform management system in the host computer while a hardware platform in the host computer is in a low-power state; and accessing files of the virtualization software on a storage device in the platform management system through a distributed file system service executing on a controller of the platform management system.
Abstract:
Aspects of peripheral device sharing for virtual machines are described. In some aspects, a virtual machine requires access to a peripheral device. The virtual machine is executed in a first host computing system. A table is accessed, and includes a list of peripheral devices, an indication that the peripheral device is connected to a second host computing system, a bandwidth requirement of the peripheral device, and a network bandwidth allocated to the virtual machine. The virtual machine is provided with access to the peripheral device based on a comparison between the bandwidth requirement of the peripheral device, and a threshold percentage of the network bandwidth allocated to the virtual machine.
Abstract:
Examples provide a fault tolerant virtual machine (VM) using pooled memory. When fault tolerance is enabled for a VM, a primary VM is created on a first host in a server cluster. A secondary VM is created on a second host in the server cluster. Memory for the VMs is maintained on a shared partition in pooled memory. The pooled memory is accessible to all hosts in the cluster. The primary VM has read and write access to the VM memory in the pooled memory. The secondary VM has read-only access to the VM memory. If the second host fails, a new secondary VM is created on another host in the cluster. If the first host fails, the secondary VM becomes the new primary VM and a new secondary VM is created on another host in the cluster.
Abstract:
Exemplary systems and methods resolve an IP address conflict in a network system, including network systems in a virtual computing environment. An IP address monitor receives a message from a first device connected to a network or a second device connecting to the network. The message includes an indication of a network address conflict between the first and second devices. The IP address monitor detects the IP address conflict from the message, selects one of the first and second devices to disconnect from the network, and sends a message to disconnect the selected device from the network. A new IP address is received for the selected device, and the IP address monitor sends a message to reconnect the selected device to the network.
Abstract:
Techniques for placing a first fiber channel (FC) switch into maintenance mode in a virtualized computing environment in which each data store is connected to at least one host computing system via at least two FC switches are described. In one embodiment, a first active input/output (I/O) path from a data store to a host computing system via the first FC switch is identified. Further, a path change is initiated from the data store to the host computing system via any other FC switch coupled to the data store and the host computing system.
Abstract:
To optimize front-end operations performed on virtual machines, a storage tiering module preemptively guides the placement of virtual volumes in storage tiers within a storage system. Upon detecting a front-end operation request, the storage tiering module identifies a storage requirement, such as an expected provisioning activity level during the front-end operation. Based on the identified storage requirement, the storage tiering module selects an appropriate storage tier. Subsequently, in preparation for the front-end operation, the storage tiering module places the virtual volume at the selected storage tier. Because the storage tiering module places the virtual volume in a tier that reflects the resource consumption expected during the front-end operation, the storage system does not incur the performance degradation that often precedes tier movement in conventional, reactive approaches to storage tiering.
Abstract:
Embodiments provide virtual volumes to virtual machines based on configuration information to secure the virtual machines. Each virtual volume, without a file system, represents a portion of a storage array and is associated with at least one of the virtual machines. A host computing device attaches the virtual volume to the virtual machine based on the configuration information. Security software executing on the virtual machine accesses security information (e.g., encryption keys, etc.) stored in the virtual volume to provide security to the virtual machine (e.g., during bootup). In some embodiments, the virtual volume is attached and detached from the virtual machine as a universal serial bus (USB) device via an application programming interface to the storage array.