Abstract:
In a cloud environment that provides both virtual environment and non-virtual environment, in order to address a problem in that monitoring items that vary depending on usage cases must be managed, the present invention proposes a management method in which whether each server brings about a virtual environment or a non-virtual environment is managed by performing registration processing in cooperation with image management and a service resource registration task. In addition, user manager monitoring profile item management information for virtual/no-virtual environment is prepared, and with reference to this information, calculation methods, which specify monitoring items to be monitored out of monitoring items and infra monitoring items for each environment, are managed. With the use of these calculation methods, a user manager and an infrastructure manager may perform optimal monitorings.
Abstract:
Provided are a computer program product, system, and method for hypervisor agnostic interchangeable backup recovery and file level recovery from virtual disks. Data is stored for a first virtual disk that represents data in a first format and metadata for the first virtual disk in a common data format in a storage having a fixed block length. A virtual disk file represents data in a second format that allows variable size blocks. Multiple instances of the fixed block length of blocks of data for the second virtual disk indicated in the virtual disk file are read. Each instance of the read fixed block length of blocks is written to the storage in the common data format with metadata describing the format of the blocks in the second virtual disk, and can be restored to a third virtual disk in the first or second format.
Abstract:
Intelligent monitoring systems and methods for virtual environments are disclosed that understand various components of a virtual infrastructure and how the components interact to provide improved performance analysis to users. In certain examples, a monitoring system assesses the performance of virtual machine(s) in the context of the overall performance of the physical server(s) and the environment in which the virtual machine(s) are running. For instance, the monitoring system can track performance metrics over a determined period of time to view changes to the allocation of resources to virtual machines and their location(s) on physical platforms. Moreover, monitoring systems can utilize past performance information from separate virtual environments to project a performance impact resulting from the migration of a virtual machine from one physical platform to another.
Abstract:
A system and method for tracing individual transactions on method call granularity is disclosed. The system uses instrumentation based transaction tracing mechanisms to enhance thread call stack sampling mechanisms by a) only sampling threads executing monitored transactions while execution is ongoing b) tagging sampled call stacks with a transaction id for correlation of sampled call stacks with instrumentation bases tracing data. The combination of instrumentation based tracing with thread call stack sampling reduces sampling generated overhead by only sampling relevant thread, and reduces instrumentation generated overhead because it allows reducing instrumentation.
Abstract:
Concepts and technologies disclosed herein are directed to virtual zones for Open Systems Interconnection (“OSI”) communication model layers 4-7 services in a cloud computing system. According to one aspect of the concepts and technologies disclosed herein, a cloud computing system can include a hardware resource and a virtual zone. The virtual zone can include a virtual network function (“VNF”) that is executable by the hardware resource. The VNF can support a service that operates within one of layers 4-7 of the OSI communication model. A computing system can detect new subscribers to the service within the virtual zone. The computing system also can determine that a capacity constraint exists within the virtual zone as a result of the new subscribers. The computing system also can home the new subscribers to the further virtual zone so that the further VNF can provide the service to the new subscribers.
Abstract:
Some of the methods provided herein may include periodically revising a mirror of the target computing system, according to a predetermined backup schedule, the mirror being stored on the virtual failover volume resident on an appliance that is operatively associated with the target computing system, by periodically comparing the mirror to a configuration of the target computing system to determine changed data blocks relative to the mirror, storing the changed data blocks as one or more differential files in the virtual failover volume, and incorporating the changed data blocks into the mirror. In some embodiments, the systems and methods may be utilized to resparsify the virtual failover volume.
Abstract:
Remote computing resource service providers allow customers to execute one or more applications in a virtual environment on computer systems provided by the computing resource service provider. The virtual machines may be managed by a hypervisor executing on computer systems operated by the service provider. The virtual machines' memory may be protected by a memory obfuscation service and the hypervisor. The memory obfuscation service may enable the virtual machines to maintain at least a portion of sensitive information in an obfuscated format. The virtual machines may request access to the virtual machines' memory, the memory obfuscation service may obtain the requested memory in an obfuscated format and un-obfuscate the memory such that it may be used by the virtual machines.
Abstract:
Methods and systems configured to provide hash-based snapshot services for a virtual storage are provided. The system includes a processor and memory coupled with the processor. The memory is configured to provide the processor with instructions for maintaining, by a hash-based snapshot module executing on the system, a file system of the virtual storage. The file system is associated with a plurality of data blocks. The virtual storage is supported by a hash-storage having a hash base-file and a hash-database. The hash-database is configured for storing the plurality of data blocks. And the hash base-file includes hash codes generated by applying a hash function to the plurality of data blocks. The memory is further configured to provide the processor with instructions for accessing, by the hash-based snapshot module, the file system using hash codes contained in the hash base-file to identify data blocks stored in the hash-database; creating, by the hash-based snapshot module, a first snapshot for the file system, wherein the first snapshot is associated with a first hash snapshot file copied based on the hash base-file; and accessing, by the hash-based snapshot module, the first snapshot using hash codes contained in the first hash snapshot file to identify data blocks stored in the hash-database.
Abstract:
Example apparatus and methods process virtual machine image level backups that may include files that are compressed and files that are not compressed. Example apparatus and methods may produce virtual machine image level backups by selectively compressing some files associated with the image while leaving other files in their uncompressed state. Example apparatus and methods may selectively recover a file or even an entire disk image from an image level backup that may include both compressed files and files that are not compressed. The file recovery or image recovery may be performed at the file level by accessing files in the image and selectively decompressing files that are compressed in the image while passing through files that are not compressed in the image. Different files in a single image may be compressed or decompressed using different techniques.
Abstract:
An administrator provisions a virtual disk in a remote storage platform and defines policies for that virtual disk. A virtual machine writes to and reads from the storage platform using any storage protocol. Virtual disk data within a failed storage pool is migrated to different storage pools while still respecting the policies of each virtual disk. Snapshot and revert commands are given for a virtual disk at a particular point in time and overhead is minimal. A virtual disk is cloned utilizing snapshot information and no data need be copied. Any number of Zookeeper clusters are executing in a coordinated fashion within the storage platform, thus increasing overall throughput. A timestamp is generated that guarantees a monotonically increasing counter, even upon a crash of a virtual machine. Any virtual disk has a “hybrid cloud aware” policy in which one replica of the virtual disk is stored in a public cloud.