Abstract:
Systems for rule-based data protection of virtualized computing entities. A method embodiment commences upon receiving specification parameters that correspond to one or more data protection schemes or data protection configurations such as schemes for making backups or snapshots. Based on the specification parameters and the data protection configurations, one or more resource entities associated with the data protection configurations are identified. Each of the resource entities are accessed and one or more applicable data protection administration rules that correspond to the respective resource entities are applied. The resource entities might be organized hierarchically. Determination of which data protection administration rules are applicable to the resource entities is based on the type of resource entity being considered. The combination of the resource entity type and respective applicable rules is used to generate entity-specific data protection commands. The entity-specific commands to administer the data protection configurations over the resource entities are executed.
Abstract:
A method for providing real time replication status for a networked virtualization environment for storage management, includes scanning metadata to identify replication status for all virtual disks (vDisks) in the networked virtualization environment, generating replication tasks for vDisks that are identified as under replicated based on the scan, performing the replication tasks, monitoring the progress of the replication tasks and determining the real time replication status of the networked virtualization environment based on the scanned metadata and the monitored progress of the replication tasks.
Abstract:
Methods, systems and computer program products for bringing-up a computing cluster on a public cloud infrastructure with techniques utilizing expressed intents (high level descriptions of desired configuration) and asynchronously receiving configuration status messages from the public cloud infrastructure. The method includes a cloud management computing system transmitting to the public cloud infrastructure a first expressed intent for bringing-up a computing cluster. The cloud management computing system asynchronously receiving periodic status messages comprising cluster status data from the public cloud infrastructure reflecting a current configuration state of the computing cluster. The system determines, based on the cluster status data, whether the first expressed intent for the computing cluster has been achieved.
Abstract:
Systems for high-performance computing. A storage control architecture is implemented by a plurality of nodes, where a node comprises combinations of executable containers that execute in cooperation with virtual machines running above a hypervisor. The containers run in a virtual machine above a hypervisor, and/or can be integrated directly into the operating system of a host node. Sensitive information such as credit card information may be isolated from the containers in a separate virtual machine that is configured to be threat resistant, and which can be accessed through a threat resistant interface module. One of the virtual machines of the node may be a node-specific control virtual machine that is configured to operate as a dedicated storage controller for a node. One of the virtual machines of the node may be a node-specific container service machine that is configured to provide storage-related and other support to a hosted executable container.
Abstract:
Systems for high-performance computing. A storage control architecture is implemented by a plurality of nodes, where a node comprises combinations of executable containers that execute in cooperation with virtual machines running above a hypervisor. The containers run in a virtual machine above a hypervisor, and/or can be integrated directly into the operating system of a host node. Sensitive information such as credit card information may be isolated from the containers in a separate virtual machine that is configured to be threat resistant, and which can be accessed through a threat resistant interface module. One of the virtual machines of the node may be a node-specific control virtual machine that is configured to operate as a dedicated storage controller for a node. One of the virtual machines of the node may be a node-specific container service machine that is configured to provide storage-related and other support to a hosted executable container.
Abstract:
A method for time series analysis of time-oriented usage data pertaining to computing resources of a computing system. A method embodiment commences upon collecting time series datasets, individual ones of the time series datasets comprising time-oriented usage data of a respective individual computing resource. A plurality of prediction models are trained using portions of time-oriented data. The trained models are evaluated to determine quantitative measures pertaining to predictive accuracy. One of the trained models is selected and then applied over another time series dataset of the individual resource to generate a plurality of individual resource usage predictions. The individual resource usage predictions are used to calculate seasonally-adjusted resource usage demand amounts over a future time period. The resource usage demand amounts are compared to availability of the resource to form a runway that refers to a future time period when the resource is predicted to be demanded to its capacity.
Abstract:
Disclosed is an approach for implementing disaster recovery for virtual machines. Consistency groups are implemented for virtual machines, where the consistency group link together two or more VMs. The consistency group includes any set of VMs which need to be managed on a consistent basis in the event of a disaster recovery scenario.
Abstract:
Performing a hot-swap of a storage device for a node in a virtualization environment having a plurality of storage devices, includes performing pass-thru of a storage manager managing the plurality of storage devices to a service virtual machine, such that the service virtual machine communicates with the plurality of storage devices without going through a storage software layer of its corresponding hypervisor, booting the hypervisor from a device other than the plurality of storage devices and performing the hot-swap of the storage device.
Abstract:
A method for providing real time replication status for a networked virtualization environment for storage management, includes scanning metadata to identify replication status for all virtual disks (vDisks) in the networked virtualization environment, generating replication tasks for vDisks that are identified as under replicated based on the scan, performing the replication tasks, monitoring the progress of the replication tasks and determining the real time replication status of the networked virtualization environment based on the scanned metadata and the monitored progress of the replication tasks.