Virtual machine recovery in shared memory architecture

    公开(公告)号:US10853121B2

    公开(公告)日:2020-12-01

    申请号:US16361010

    申请日:2019-03-21

    Applicant: VMWARE, INC.

    Abstract: Examples provide for virtual machine recovery using pooled memory. A shared partition is created on pooled memory accessible by a plurality of virtual machine hosts. A set of memory pages for virtual machines running on the hosts is moved to the shared partition. A master agent polls memory page tables associated with the plurality of hosts for write access. If the master agent obtains write access to a memory page table of a given host, the given host that previously held the write access is identified as a failed host or an isolated host. The virtual machines of the given host enabled to resume from pooled memory are respawned on a new host while maintaining memory state of the virtual machines using data within the pooled memory, including the virtual machine memory pages, memory page table, host profile data, and/or host-to-VM table data.

    Peripheral device sharing for virtual machines

    公开(公告)号:US10719349B2

    公开(公告)日:2020-07-21

    申请号:US16102938

    申请日:2018-08-14

    Applicant: VMware, Inc.

    Abstract: Aspects of peripheral device sharing for virtual machines are described. In some aspects, a virtual machine requires access to a peripheral device. The virtual machine is executed in a first host computing system. A table is accessed, and includes a list of peripheral devices, an indication that the peripheral device is connected to a second host computing system, a bandwidth requirement of the peripheral device, and a network bandwidth allocated to the virtual machine. The virtual machine is provided with access to the peripheral device based on a comparison between the bandwidth requirement of the peripheral device, and a threshold percentage of the network bandwidth allocated to the virtual machine.

    Container data offline and online scan in a cloud environment

    公开(公告)号:US10581890B2

    公开(公告)日:2020-03-03

    申请号:US15967494

    申请日:2018-04-30

    Applicant: VMware, Inc.

    Inventor: Jinto Antony

    Abstract: Techniques for security scanning of containers executing within VMs. A virtualization system maintains container disk files that store data for containers. The container disk files are stored separate from, and not included within, virtual machine disk files that store data for the virtual machines. To scan data for any particular container, a scanning module scans the container disk file associated with the container. If a threat is found, a container scan catalog is updated to indicate this fact. A container may be disconnected from the network if identified security threats cannot be removed from the container. An entire VM may be disconnected from the network if all containers within the VM have threats that cannot be cleaned. The use of container disk files for security threat scanning allows for data for individual containers to be scanned.

    Resolving network address conflicts

    公开(公告)号:US09756010B2

    公开(公告)日:2017-09-05

    申请号:US14042370

    申请日:2013-09-30

    Applicant: VMware, Inc.

    Inventor: Jinto Antony

    CPC classification number: H04L61/2007 G06F2009/45595 H04L61/103 H04L61/2046

    Abstract: Exemplary systems and methods resolve an IP address conflict in a network system, including network systems in a virtual computing environment. An IP address monitor receives a message from a first device connected to a network or a second device connecting to the network. The message includes an indication of a network address conflict between the first and second devices. The IP address monitor detects the IP address conflict from the message, selects one of the first and second devices to disconnect from the network, and sends a message to disconnect the selected device from the network. A new IP address is received for the selected device, and the IP address monitor sends a message to reconnect the selected device to the network.

    Storage tiering based on virtual machine operations and virtual volume type
    19.
    发明授权
    Storage tiering based on virtual machine operations and virtual volume type 有权
    基于虚拟机操作和虚拟卷类型的存储分层

    公开(公告)号:US09477427B2

    公开(公告)日:2016-10-25

    申请号:US14534227

    申请日:2014-11-06

    Applicant: VMWARE, INC.

    Abstract: To optimize front-end operations performed on virtual machines, a storage tiering module preemptively guides the placement of virtual volumes in storage tiers within a storage system. Upon detecting a front-end operation request, the storage tiering module identifies a storage requirement, such as an expected provisioning activity level during the front-end operation. Based on the identified storage requirement, the storage tiering module selects an appropriate storage tier. Subsequently, in preparation for the front-end operation, the storage tiering module places the virtual volume at the selected storage tier. Because the storage tiering module places the virtual volume in a tier that reflects the resource consumption expected during the front-end operation, the storage system does not incur the performance degradation that often precedes tier movement in conventional, reactive approaches to storage tiering.

    Abstract translation: 为了优化在虚拟机上执行的前端操作,存储分层模块抢占性地引导虚拟卷在存储系统中的存储层中的放置。 在检测到前端操作请求时,存储分级模块识别存储需求,例如在前端操作期间的预期供应活动级别。 基于所识别的存储要求,存储分层模块选择适当的存储层。 随后,为了准备前端操作,存储分层模块将虚拟卷放置在所选择的存储层。 由于存储分层模块将虚拟卷放置在反映前端操作中预期的资源消耗的层中,因此存储系统不会导致在常规的反应性存储分层方法中层次移动之前的性能下降。

    Securing virtual machines with virtual volumes
    20.
    发明授权
    Securing virtual machines with virtual volumes 有权
    使用虚拟卷保护虚拟机

    公开(公告)号:US09189609B1

    公开(公告)日:2015-11-17

    申请号:US13914618

    申请日:2013-06-10

    Applicant: VMware, Inc.

    Inventor: Jinto Antony

    Abstract: Embodiments provide virtual volumes to virtual machines based on configuration information to secure the virtual machines. Each virtual volume, without a file system, represents a portion of a storage array and is associated with at least one of the virtual machines. A host computing device attaches the virtual volume to the virtual machine based on the configuration information. Security software executing on the virtual machine accesses security information (e.g., encryption keys, etc.) stored in the virtual volume to provide security to the virtual machine (e.g., during bootup). In some embodiments, the virtual volume is attached and detached from the virtual machine as a universal serial bus (USB) device via an application programming interface to the storage array.

    Abstract translation: 实施例基于配置信息向虚拟机提供虚拟卷以保护虚拟机。 没有文件系统的每个虚拟卷代表存储阵列的一部分,并且与至少一个虚拟机相关联。 主机计算设备基于配置信息将虚拟卷附加到虚拟机。 在虚拟机上执行的安全软件访问存储在虚拟卷中的安全信息(例如,加密密钥等)以向虚拟机提供安全性(例如,在启动期间)。 在一些实施例中,将虚拟卷作为通用串行总线(USB)设备通过应用程序编程接口与虚拟机相连并分离到存储阵列。

Patent Agency Ranking