Abstract:
Systems for high-performance computing. A storage control architecture is implemented by a plurality of nodes, where a node comprises combinations of executable containers that execute in cooperation with virtual machines running above a hypervisor. The containers run in a virtual machine above a hypervisor, and/or can be integrated directly into the operating system of a host node. Sensitive information such as credit card information may be isolated from the containers in a separate virtual machine that is configured to be threat resistant, and which can be accessed through a threat resistant interface module. One of the virtual machines of the node may be a node-specific control virtual machine that is configured to operate as a dedicated storage controller for a node. One of the virtual machines of the node may be a node-specific container service machine that is configured to provide storage-related and other support to a hosted executable container.
Abstract:
Examples of systems are described herein which may dynamically allocate compute resources to recovery clusters. Accordingly, a recovery site may utilize fewer compute resources in maintaining recovery clusters for multiple associate clusters, while ensuring that, during use, compute resources are allocated to a particular cluster. This may reduce and/or avoid vulnerabilities arising from a use of shared resources in a virtualized and/or cloud environment.
Abstract:
Performing a hot-swap of a storage device for a node in a virtualization environment having a plurality of storage devices, includes performing pass-thru of a storage manager managing the plurality of storage devices to a service virtual machine, such that the service virtual machine communicates with the plurality of storage devices without going through a storage software layer of its corresponding hypervisor, booting the hypervisor from a device other than the plurality of storage devices and performing the hot-swap of the storage device.
Abstract:
A method for providing backup to a networked virtualization environment for storage management by a remote storage environment having a block storage device and an object storage device, includes deploying a controller virtual machine at the remote storage environment, wherein the controller virtual machine provides a block storage device interface, receiving, at the controller virtual machine, a write request for data in a block-based format, translating the data from the block-based format to an object-based format, writing the data in the object-based format to the object storage device, and updating metadata corresponding to the write request in the block storage device.
Abstract:
Described is an architecture for providing access to administrative functionality in a virtualization system using implied authentication. This approach avoids the problems associated with the requirements to use a user ID and password to access an admin console. The user ID and password can be rendered completely unnecessary, or where the user ID and password combination is only used as a supplement to the implied authentication.
Abstract:
A method for providing real time replication status for a networked virtualization environment for storage management, includes scanning metadata to identify replication status for all virtual disks (vDisks) in the networked virtualization environment, generating replication tasks for vDisks that are identified as under replicated based on the scan, performing the replication tasks, monitoring the progress of the replication tasks and determining the real time replication status of the networked virtualization environment based on the scanned metadata and the monitored progress of the replication tasks.
Abstract:
A method for implementing quality of service (QoS) for network communications sharing a network in a networked virtualization environment for storage management, includes receiving a network communication from a controller VM, identifying whether the network communication is a data communication type issued by a user VM or a control communication type issued by the controller VM, applying a set of rules to the network communication based on its communication type, and placing the network communication in a prioritization class queue based on a result of applying the set of rules to the network communication.
Abstract:
Methods, systems and computer program products for deploying a virtualization system onto cloud computing infrastructure. Virtual machines of a virtualization system are deployed onto computing nodes that are interconnected via a cloud provider's networking infrastructure. When migrating a virtual machine from a source computing node to a target computing node that is also interconnected to the cloud provider's networking infrastructure, the addressing of the to-be-migrated virtual machine changes. Dynamically-updated media access control translation tables are maintained at the computing nodes. The media access control translation tables are populated with cloud provider media access control addresses received from the cloud provider. A virtual switch at each computing node modifies incoming and outgoing packets of a to-be-migrated virtual machine based on contents of that node's media access control translation table. On an ongoing basis, addressing information for migrated virtual machines is received at the computing nodes by operation of address resolution protocols.
Abstract:
Upon receiving a request to hibernate a hypervisor of a virtualization system running on a first computer, acts are carried out to capture a state of the hypervisor, where the state of the hypervisor comprises hypervisor logical resource parameters and an execution state of the hypervisor. After hibernating the hypervisor by quiescing the hypervisor and storing the state of the hypervisor into a data structure, the data structure is moved to a different location. At a later moment in time, the data structure is loaded onto a second computing machine and restored. The restore operation restores the hypervisor and all of its state, including all of the virtual machines of the hypervisor as well as all of the virtual disks and other virtual devices of the virtual machines. Differences between the first computing machine and the second computing machine are reconciled before execution of the hypervisor on the second machine.