Abstract:
A method is provided for a plug-in manager in a virtual machine (VM) system to install or update a plug-in at a web client server in the VM system. The plug-in extends the web client server with a user interface element to interact with a management entity implemented as a VM in the VM system. The method includes receiving, from the management entity, a request to register or update the plug-in, wherein the request includes an address and authentication information for the management entity, recording the address and the authentication information, transmitting, to the web client server, an instruction to install or update the plug-in, receiving, from the plug-in at the web client server, a request for the address and the authentication information for the management entity, and transmitting, to the plug-in at the web client server, the address and the authentication information for the management entity.
Abstract:
An example method to deploy a web client plugin in a virtualized computing environment may include obtaining information identifying a virtual machine at a management entity and generating configuration information that includes the information identifying the virtual machine. The method may further include registering, with the management entity, the configuration information to deploy the web client plugin as a web client extension. The registration is performed such that, in response to an access to the virtual machine via the web client plugin, the web client plugin is able to automatically identify the virtual machine based on the configuration information.
Abstract:
One example method for a host in a virtual storage area network (vSAN) cluster to support vSAN Internet small computer system interface (iSCSI) target services in a distributed storage system of a virtualization system is disclosed. The method includes obtaining ownership information of a target and determining, from the ownership information, whether the host is an owner of the target. In response to determining that the host is the owner of the target, the method further includes determining whether the host commits to a policy provided by the vSAN to support the vSAN iSCSI target services. In response to determining that the host fails to commit to the policy, the method includes reporting a warning message.
Abstract:
Example methods and systems associated with dynamic configuration of a statistics endpoint in a virtualized computing environment have been disclosed. One example method includes in response to receiving a first request, by a host in the virtualized computing environment, accepting a configuration file specified in the first request; in response to receiving a second request, by the host, parsing a rule based on the configuration file and collecting statistics based on the rule; processing, by the host, the statistics collected based on the rule; and sending, by the host, the processed statistics to a monitoring terminal.
Abstract:
Intelligent capacity planning is provided for storage in a hyperconverged infrastructure environment. The storage may be a logical storage unit that is supported by storage space of a plurality of hardware disks in a virtualized computing environment. Failure predictions can be obtained for each individual hardware disk, and a failure prediction for a number of hardware disk in a hardware disk set can also be obtained. A failure prediction and/or a reduced availability prediction for the logical storage unit can be generated based at least on a configuration state of the logical storage unit, a prediction for one or more hardware disks of the logical storage unit, and a prediction time. Predictions based on what-if operations are also able to be generated.
Abstract:
A decentralized method for generation and management of health monitoring related tasks in a hyperconverged infrastructure (HCl) environment is provided. The hosts in the HCl environment each include a health agent and a task manager. The health agent collects health results from health checks and stores the health results in a shared database that is shared by the hosts. The task manager generates a health monitoring related task in response to the health results being indicative of a change in health status, and stores the health monitoring related task in a task pool that is also shared by the hosts. Any of the hosts can obtain and execute the health monitoring related tasks in the task pool based on a task priority and load balancing criteria.
Abstract:
Certain Embodiments described herein relate to configuring the network-storage stack of two devices (e.g., physical or virtual) communicating together (e.g., an initiator and a target, as defined below) with Internet Small Computer Systems Interface (iSCSI) extension for remote direct memory access (RDMA) iSER, which is a protocol designed to utilize RDMA to accelerate iSCSI data transfer. The iSER protocol is implemented as an iSER datamover layer that acts as an interface between an iSCSI layer and an RDMA layer of the network-storage stacks of the two devices. Using iSER in conjunction with RDMA allows for bypassing the existing traditional network protocol layers (e.g., TCP/IP protocol layers) of the devices and permits data to be transferred directly, between the two devices, using certain memory buffers, thereby avoiding memory copies taking place when the existing network protocol layers are used.
Abstract:
A method is provided for an agent in a virtual machine (VM) and an application policy manager to implement application monitoring and remediation. The application policy manager provides a user interface for defining policies for applications running on VMs where each policy includes monitoring conditions and remediation for the monitoring conditions. The application policy manager receives a policy for an application on the VM and sends it to the agent. The agent monitors the application based on the policy. When the agent detects a monitoring condition, the agent sends an alert identifying the application and the monitoring condition directly or indirectly to an events and alarms manager that records the alert, sends a log generated by the application to an email address or to an log analyzer that analyzes the log to determine a cause of the monitoring condition, and performs a remediation for the monitoring condition.