摘要:
Failover of blade servers in a data center, including powering off by a system management server a failing blade server, the failing blade server characterized by a machine type, the failing blade server mapped to remote computer boot storage administered through a Storage Management Initiative-Specification (‘SMI-S’) provider; identifying, by the system management server by use of the SMI-S provider from a pool of standby blade servers, a replacement blade server; remapping by the system management server through the SMI-S provider the remote computer boot storage of the failing blade server to the replacement blade server; and powering on the replacement blade server by the system management server.
摘要:
Failover of blade servers in a data center, including powering off by a system management server a failing blade server, the failing blade server characterized by a machine type, the failing blade server mapped to remote computer boot storage administered through a Storage Management Initiative—Specification (‘SMI-S’) provider; identifying, by the system management server by use of the SMI-S provider from a pool of standby blade servers, a replacement blade server; remapping by the system management server through the SMI-S provider the remote computer boot storage of the failing blade server to the replacement blade server; and powering on the replacement blade server by the system management server.
摘要:
A method for adding a server to a storage area network, the method comprising identifying a set comprising one or more communication protocols for connecting a second server to a first storage device configured to communicate with a first server using a first protocol, wherein the set of protocols comprises protocols that are supported by both the second server and the first storage device; selecting a second protocol from the set of protocols; and configuring the first storage device, the second server, and associated connection devices, wherein the second server may communicate with the first storage device using the second protocol.
摘要:
A method for adding a server to a storage area network, the method comprising identifying a set comprising one or more communication protocols for connecting a second server to a first storage device configured to communicate with a first server using a first protocol, wherein the set of protocols comprises protocols that are supported by both the second server and the first storage device; selecting a second protocol from the set of protocols; and configuring the first storage device, the second server, and associated connection devices, wherein the second server may communicate with the first storage device using the second protocol.
摘要:
According to one embodiment of the present disclosure, an approach is provided in which a policy server receives a request for a policy from a requestor. The policy server identifies an initiating virtual machine; the initial virtual machine's corresponding virtual network; and a destination virtual machine. Next, a policy corresponding to sending data from the first virtual machine to the second virtual machine is selected. The policy includes one or more logical references to the virtual network and does not include a physical reference to a physical entity located on a physical network. In turn, a physical path translation corresponding to the selected policy is identified and sent to the requestor.
摘要:
An approach is provided in which a local module receives a discovery message from a virtual network endpoint that is devoid of a corresponding virtual IP address. The local module sends one or more unicast network configuration messages to a dynamic configuration service and, in turn, the local module receives one or more unicast network configuration responses from the dynamic configuration service. One of the unicast network configuration responses includes one or more network configuration parameters. The local module configures the virtual network endpoint according to one or more of the network configuration parameters.
摘要:
According to one embodiment of the present disclosure, an approach is provided in which a policy module receives data that is initiated by a first virtual machine and has a destination at a second virtual machine. The policy module selects a policy that corresponds to sending the data from the first virtual machine to the second virtual machine. The policy includes one or more logical references to one or more virtual networks, and does not include a physical reference to a physical entity located on a physical network. In turn, the policy module encapsulates the data with a physical path translation that is based upon the selected policy, and sends the encapsulated data over the physical network to a second policy module that corresponds to the second virtual machine.
摘要:
An approach is provided in which a local module receives a discovery message from a virtual network endpoint that is devoid of a corresponding virtual IP address. The local module sends one or more unicast network configuration messages to a dynamic configuration service and, in turn, the local module receives one or more unicast network configuration responses from the dynamic configuration service. One of the unicast network configuration responses includes one or more network configuration parameters. The local module configures the virtual network endpoint according to one or more of the network configuration parameters.
摘要:
An approach is provided in which a local module receives a discovery message from a virtual network endpoint that is devoid of a corresponding virtual IP address. The local module sends one or more unicast network configuration messages to a dynamic configuration service and, in turn, the local module receives one or more unicast network configuration responses from the dynamic configuration service. One of the unicast network configuration responses includes one or more network configuration parameters. The local module configures the virtual network endpoint according to one or more of the network configuration parameters.
摘要:
An approach is provided in which a computer system selects a virtual domain from multiple virtual domains, which are each overlayed onto a physical network and are independent of physical topology constraints of the physical network. The computer system selects, from the selected virtual domain, a first virtual group that includes one or more first virtual network endpoints. Next, the computer system selects, from the selected virtual domain, a second virtual group that includes one or more second virtual network endpoints. In turn, the computer system creates a logical link policy that includes one or more actions corresponding to sending data between the first virtual group and the second virtual group.