Abstract:
A system and method for performing an operational metric analysis for a virtual appliance uses application operational data from multiple instances of the virtual appliance. The application operational data is then used to generate an operational metric prediction for the virtual appliance.
Abstract:
One or more techniques and/or systems are provided for hosting a virtual machine from a snapshot. In particular, a snapshot of a virtual machine hosted on a primary computing device may be created. The virtual machine may be hosted on a secondary computing device using the snapshot, for example, when a failure of the virtual machine on the primary computing device occurs. If a virtual machine type (format) of the snapshot is not supported by the secondary computing device, then the virtual machine within the snapshot may be converted to a virtual machine type supported by the secondary computing device. In this way, the virtual machine may be operable and/or accessible on the secondary computing device despite the failure. Hosting the virtual machine on the secondary computing device provides, among other things, fault tolerance for the virtual machine and/or applications comprised therein.
Abstract:
Methods and apparatus to manage monitoring agents. A disclosed example involves determining if a virtual machine has a first service installed that corresponds to a service rule, the service rule to specify a service identifier and a configuration for a monitoring agent. The method also involves determining if the virtual machine has the monitoring agent corresponding to the first service. The method also involves, in response to determining if the first service matches the service identifier specified by the service rule and that the monitoring agent is not installed on the virtual machine, initiating installation of the monitoring agent on the virtual machine.
Abstract:
Mapping computer resources to consumers in a computer system is described. In an example, a method of mapping computer resources to consumers in a computer system includes: receiving tags assigned to the computer resources at a resource manager executing in the computer system, where the resource manager: identifies a first tag assigned to a first computer resource; determines whether a first consumer is associated with the first tag; enables the first consumer to access the first computer resource if the first consumer is associated with the first tag; and prevents the first consumer from accessing the first computer resource if the first consumer is not associated with the first tag.
Abstract:
A technique for cloud infrastructure backup in a virtualized environment utilizing shared storage includes obtaining a workload input/output (I/O) profile to the shared storage over a time period. An attempt to locate one or more time windows in the workload I/O profile for which a cloud infrastructure backup can be staged is initiated. In response to determining the cloud infrastructure backup can be staged during at least one of the time windows, staging of the cloud infrastructure backup is scheduled during a selected one of the time windows. In response to determining the cloud infrastructure backup cannot be staged during at least one of the time windows, an interference tolerance approach is employed for accessing the shared storage for active workloads and the cloud infrastructure backup during the staging of the cloud infrastructure backup.
Abstract:
Methods, systems, and computer readable media for providing precise timing in a virtual data network or storage network test environment are provided. One method includes providing at least one peripheral device or peripheral device emulator including a timing source. The method further includes connecting the at least one peripheral or peripheral device emulator to a peripheral interface of a computing platform hosting a hypervisor on which at least one test or application under test virtual machine executes. The method further includes making the timing source available to the at least one virtual machine. The method further includes executing a test and using the timing source to provide precise timing for the test.
Abstract:
A method and system for restoring a computing environment from a secondary data store, and facilitating such restoration, is described. In some examples, the system copies the configuration parameters of a computing environment, such as a file system, as well as the data within the file system, and transfers the copies to secondary storage for later restoration. For example, the system may generate an xml file of the configuration parameters of the computing environment when a backup operation of the computing environment is performed, and store the xml file along with copies of the data from the computing environment in secondary storage.
Abstract:
A method to create virtual machines is provided. An initially empty primary copy-on-write (COW) image of a base disk image is created, and an initially empty secondary COW image of the primary COW image is created. A virtual machine is booted from the secondary COW image. Writes by the virtual machine are stored in the secondary COW image. When the secondary COW image reaches a capacity threshold, data of the secondary COW image is committed into the primary COW image and then the secondary COW is cleared of data.
Abstract:
A method in a host arrangement for communicating with a terminal connected to an IP communication network. The arrangement comprises at least two hosts, one operating as active host and the remaining at least one host operating as backup host(s). The arrangement is connected to the IP communication network by means of a switch, wherein each host of the arrangement is connected to the switch by means of an individual link, the active host being associated with an IP and a MAC address. The method comprises detecting a link failure between the active host and the switch, or a malfunction of the active host, and determining a backup host to take over. The method comprises associating the IP and the MAC address of the active host to the determined backup host to take over, and triggering a MAC learning process in the switch.
Abstract:
In one embodiment, a computer-implemented method includes the step of communicatively coupling with an application-server local area network (LAN). The physical servers are discovered in the application-server LAN. The applications running in one or more physical servers in the application-server LAN are discovered. The application data and the application metadata are captured. The application data and the application metadata are parsed. The unique data blocks of the application data and the application metadata are identified. The unique data blocks are uploaded to a cloud-computing platform. It is determined that the one or more physical servers running the application data and the application metadata is no longer available in the application-server LAN. A cloud-based appliance in the cloud-computing platform is placed in an operational state. An application associated with the application data and the application metadata is identified.