Abstract:
A method to enable container access to a peripheral device, where the container is hosted by a virtual machine running in a first host and the peripheral device is directly connected to a second host, is provided. The method includes determining a bandwidth requirement of the peripheral device, and comparing the bandwidth requirement of the peripheral device to bandwidth allocated to the virtual machine that is hosting the container. If the bandwidth requirement of the peripheral device is higher than a threshold percentage of the bandwidth allocated to the virtual machine, the virtual machine is migrated from the first host computer to the second host computer. On the other hand, if the bandwidth requirement of the peripheral device is lower than the threshold percentage of the bandwidth allocated to the virtual machine, processes are launched to establish a network channel by which the container communicates with the peripheral device.
Abstract:
Techniques for managing networking components in a host computing system in a virtual computing environment are described. The networking components include virtual switches and physical network interface cards (NICs). In one embodiment, a virtual switch that is not coupled to any running virtual machines in a host computing system is identified. Further, physical NICs associated with the virtual switch are identified. Furthermore, the virtual switch and the physical NICs associated with the virtual switch are placed into a standby mode.
Abstract:
A virtualized environment includes a pool of VMs, each VM configured to run one or more virtual containers. Each virtual container runs as an isolated process in userspace on a guest operating system. A virtualization management module performs resource management operations to place containers within the pool of VMs according to performance metrics, and also perform high availability functionality for containers with critical containers.
Abstract:
Techniques for selectively utilizing memory available in a redundant host system of a cluster are described. In one embodiment, a cluster of host systems, with at least one redundant host system, with each host system having a plurality of virtual machines with associated virtual machine (VM) reservation memory is provided. A portion of a data store is used to store a base file, the base file accessed by all the plurality of virtual machines. A portion of the memory available in the redundant host system is assigned as spare VM reservation memory. A copy of the base file is selectively stored in the spare VM reservation memory for access by all the plurality of virtual machines.
Abstract:
In an example, a method of replication between computing systems includes replicating virtual machine files from primary storage in a primary computing system to secondary storage in a secondary computing system. The virtual machine files implement a plurality of virtual machines in the primary computing system and a plurality of replica virtual machines in the secondary computing system. The method further includes replicating configuration data, from virtualization software in the primary computing system to secondary virtualization software installed on a host computer in the secondary computing system, through a platform management system in the host computer while the host computer is in a low-power state.
Abstract:
Examples provide a pooled memory heartbeat for virtual machine hosts. A virtual controller creates a pooled memory heartbeat file system in a shared memory partition of a pooled memory. An agent running on each host in a plurality of virtual machine hosts updates a heartbeat file at an update time interval to lock the heartbeat file. The lock indicates the heartbeat status for a given host is active. A master agent accesses the shared memory partition to check the heartbeat status of each host in the pooled memory file system. The heartbeat status is used to determine whether a host that has lost pooled memory access, is network isolated, or failed. If the pooled memory heartbeat status for a given host indicates the host is a failed host, the set of virtual machines running on the given host are respawned on another healthier host.
Abstract:
A method and system include compatibly interfacing a suitably adapted central switch in a computer network virtualization environment to one or more user-end peripheral device(s) to dispense with a need for a user-end thin client. The method and system also include appropriately routing a data associated with a direct and exclusive communication between a virtual machine on a host server including a number of virtual machines and the one or more user-end peripheral device(s) using the central switch.
Abstract:
A method for managing tools on a virtual machine includes provisioning a virtual machine. The method also includes, before powering part the virtual machine, collecting a list of one or more tools on the virtual machine, and a version associated with each of the one or more tools. The method also includes determining if one or more new tools should be installed on the virtual machine. Responsive to determining if one or more new tools should be installed, the method includes retrieving, a tool image for each new tool to be installed. The method further includes installing the one or more new tools on a virtual disk file of the provisioned virtual machine using the tool images.
Abstract:
An example method is provided to maintain state information of a virtual machine in a virtualized computing environment through a self-triggered approach. The method may comprise detecting, by a first host from a cluster in the virtualized computing environment, that the first host is disconnected from a network connecting the first host to a distributed storage system accessible by the cluster. The method may also comprise suspending, by the first host, a virtual machine supported by the first host and storing state information associated with the virtual machine. The method may further comprise selecting a second host from the cluster and migrating the suspended virtual machine to the second host such that the suspended virtual machine is able to resume from suspension on the second host based on the stored state information.
Abstract:
Techniques for virtual machine (VM) availability during migration network failure and VM network failure in a first host computing system in a failover cluster are described. In one example embodiment, migration and VM network failure in the first host computing system is identified, wherein the first host computing system being configured to migrate VMs using the migration network and to route network traffic of VMs via the VM network. A migration network is then temporarily configured for the first host computing system over a management network in the virtual datacenter, wherein the management network being used to manage host computing systems by virtual management software (VMS) residing in a management server. The VMs running on the first host computing system are then migrated to at least one other host computing system in the failover cluster via the migration network temporarily configured on the management network.