Abstract:
The subject matter described herein is generally directed towards detection and remediation of virtual computing instance (VCI) failure on host devices. Monitoring is performed to detect suspected failures of different guest operating systems, identify failure information, and perform remediation to provide high availability for the VCI.
Abstract:
The subject matter described herein is generally directed towards detection and remediation of virtual computing instance (VCI) failure on host devices. Monitoring is performed to detect suspected failures of different guest operating systems, identify failure information, and perform remediation to provide high availability for the VCI.
Abstract:
Systems and methods for performing backups to a storage device are provided. For virtual disks of a virtual machine, snapshots are used to backup data periodically to a storage device. A disk virtualization layer “retires” data blocks associated with a snapshot, while retaining a list of block addresses, for comparison in future backup operations. The retired snapshot can be compared against future snapshots to generate incremental backups without occupying storage space with data blocks that have already been copied to another storage device.
Abstract:
A process for lazy checkpointing is enhanced to reduce the number of read/write accesses to the checkpoint file and thereby speed up the checkpointing process. The process for restoring a state of a virtual machine (VM) running in a physical machine from a checkpoint file that is maintained in persistent storage includes the steps of detecting access to a memory page of the virtual machine that has not been read into physical memory of the VM from the checkpoint file, determining a storage block of the checkpoint file to which the accessed memory page maps, writing contents of the storage block in a buffer, and copying contents of a block of memory pages that includes the accessed memory page from the buffer to corresponding locations of the memory pages in the physical memory of the VM. The storage block of the checkpoint file may be compressed or uncompressed.
Abstract:
Systems and methods for performing backups to a storage device are provided. For virtual disks of a virtual machine, snapshots are used to backup data periodically to a storage device. A disk virtualization layer “retires” data blocks associated with a snapshot, while retaining a list of block addresses, for comparison in future backup operations. The retired snapshot can be compared against future snapshots to generate incremental backups without occupying storage space with data blocks that have already been copied to another storage device.
Abstract:
A process for lazy checkpointing a virtual machine is enhanced to reduce the number of read/write accesses to the checkpoint file and thereby speed up the checkpointing process. The process for saving a state of a virtual machine running in a physical machine to a checkpoint file maintained in persistent storage includes the steps of copying contents of a block of memory pages, which may be compressed, into a staging buffer, determining after the copying if the buffer is full, and upon determining that the buffer is full, saving the buffer contents in a storage block of the checkpoint file.
Abstract:
A method of enabling remote access to a console of a virtual machine (VM) running in a host and managed by a VM management server, from a remote computing device, includes the steps of: in response to a request to access the console of the VM from the remote computing device, issuing a request for a first ticket, the first ticket including an identifier of the host in which the VM is running; upon receiving the first ticket, issuing a request for a second ticket to access a proxy server; and upon receiving the second ticket, transmitting a uniform resource locator (URL) identifying the proxy server and the second ticket to the remote computing device. The remote computing device accesses the console of the VM through the URL and the proxy server.
Abstract:
Disclosed are various embodiments for providing content to virtual machines. A request for content can be received, wherein the request originates from a virtual machine hosted by the computing device, comprises a unique identifier for the content, and is received from the virtual machine through an inter-process communication mechanism. The unique identifier can be validated. Content can then be retrieved using the unique identifier. A copy of the content can then be provided to the virtual machine in response to validation of the unique identifier, the content being provided to the virtual machine through the inter-process communication mechanism.
Abstract:
Disclosed are various embodiments for providing content to virtual machines. A request for content can be received, wherein the request originates from a virtual machine hosted by the computing device, comprises a unique identifier for the content, and is received from the virtual machine through an inter-process communication mechanism. The unique identifier can be validated. Content can then be retrieved using the unique identifier. A copy of the content can then be provided to the virtual machine in response to validation of the unique identifier, the content being provided to the virtual machine through the inter-process communication mechanism.