Abstract:
Examples provide a fault tolerant virtual machine (VM) using pooled memory. When fault tolerance is enabled for a VM, a primary VM is created on a first host in a server cluster. A secondary VM is created on a second host in the server cluster. Memory for the VMs is maintained on a shared partition in pooled memory. The pooled memory is accessible to all hosts in the cluster. The primary VM has read and write access to the VM memory in the pooled memory. The secondary VM has read-only access to the VM memory. If the second host fails, a new secondary VM is created on another host in the cluster. If the first host fails, the secondary VM becomes the new primary VM and a new secondary VM is created on another host in the cluster.
Abstract:
A system and method for responding to a virtual machine (VM) network failure for a host in a network partition in a high availability (HA) cluster. The method includes providing a plurality of network partition response options; and receiving a selection of a first network partition response option from the plurality of network partition response options, the selected first network partition response option causing a processor to transfer execution of a VM on the host to a second host that has VM network connectivity upon detecting a VM network failure for the host.
Abstract:
Examples provide for virtual machine recovery using pooled memory. A shared partition is created on pooled memory accessible by a plurality of virtual machine hosts. A set of memory pages for virtual machines running on the hosts is moved to the shared partition. A master agent polls memory page tables associated with the plurality of hosts for write access. If the master agent obtains write access to a memory page table of a given host, the given host that previously held the write access is identified as a failed host or an isolated host. The virtual machines of the given host enabled to resume from pooled memory are respawned on a new host while maintaining memory state of the virtual machines using data within the pooled memory, including the virtual machine memory pages, memory page table, host profile data, and/or host-to-VM table data.
Abstract:
A method to enable container access to a peripheral device, where the container is hosted by a virtual machine running in a first host and the peripheral device is directly connected to a second host, is provided. The method includes determining a bandwidth requirement of the peripheral device, and comparing the bandwidth requirement of the peripheral device to bandwidth allocated to the virtual machine that is hosting the container. If the bandwidth requirement of the peripheral device is higher than a threshold percentage of the bandwidth allocated to the virtual machine, the virtual machine is migrated from the first host computer to the second host computer. On the other hand, if the bandwidth requirement of the peripheral device is lower than the threshold percentage of the bandwidth allocated to the virtual machine, processes are launched to establish a network channel by which the container communicates with the peripheral device.
Abstract:
An example method is provided to perform power management for a distributed storage system accessible by a cluster in a virtualized computing environment. The method may comprise, in response to detecting that a power-off requirement of a host from the cluster is satisfied, retrieving virtual machine data from a first storage resource of the host, storing the virtual machine data on a second storage resource of the host, and powering off one or more components of the host. The second storage resource is configured to be accessible when the one or more components of the host are powered off.
Abstract:
In an example, a method of replication between computing systems includes replicating virtual machine files from primary storage in a primary computing system to secondary storage in a secondary computing system. The virtual machine files implement a plurality of virtual machines in the primary computing system and a plurality of replica virtual machines in the secondary computing system. The method further includes replicating configuration data, from virtualization software in the primary computing system to secondary virtualization software installed on a host computer in the secondary computing system, through a platform management system in the host computer while the host computer is in a low-power state.
Abstract:
Techniques for sharing a peripheral device connected to a first host computing system in a cluster are disclosed. In one embodiment, a request to access the peripheral device connected to the first host computing system is received from a virtual machine running on a second host computing system. Further, a bandwidth requirement associated with the peripheral device is determined. Furthermore, one of enabling the virtual machine to remotely access the peripheral device over a network and recommending migration of the virtual machine to the first host computing system to locally access the peripheral device is performed based on the bandwidth requirement of the peripheral device.
Abstract:
Techniques for managing networking components in a host computing system in a virtual computing environment are described. The networking components include virtual switches and physical network interface cards (NICs). In one embodiment, a virtual switch that is not coupled to any running virtual machines in a host computing system is identified. Further, physical NICs associated with the virtual switch are identified. Furthermore, the virtual switch and the physical NICs associated with the virtual switch are placed into a standby mode.
Abstract:
Techniques for placing a first fibre channel (FC) switch into maintenance mode in a virtualized computing environment in which each data store is connected to at least one host computing system via at least two FC switches are described. In one embodiment, a first active input/output (I/O) path from a data store to a host computing system via the first FC switch is identified. Further, a path change is initiated from the data store to the host computing system via any other FC switch coupled to the data store and the host computing system.
Abstract:
Exemplary systems and methods resolve an IP address conflict in a network system, including network systems in a virtual computing environment. An IP address monitor receives a message from a first device connected to a network or a second device connecting to the network. The message includes an indication of a network address conflict between the first and second devices. The IP address monitor detects the IP address conflict from the message, selects one of the first and second devices to disconnect from the network, and sends a message to disconnect the selected device from the network. A new IP address is received for the selected device, and the IP address monitor sends a message to reconnect the selected device to the network.