Patent classifications
G06F2009/45566
Method for accessing application logs within virtual machines based on operator-defined criteria
Log information is retrieved from a log of a container running in a virtual machine in response to a request for the log information, by accessing a virtual disk of the virtual machine, reading the log of the container from the virtual disk and preparing the requested log information from the log, and transmitting the requested log information to a virtual machine (VM) management process running in a host computer of the virtual machine for the VM management process to forward to a requestor of the log information. Alternatively, log data of the container running in the virtual machine may be streamed to the VM management process over a virtual socket communication channel that is established between the virtual machine and the VM management process.
SESSION RECONNECTS AND DYNAMIC RESOURCE ALLOCATION
The disclosed computer-implemented method may include detecting, by a cloud-based software distribution host providing cloud-based access to an application to a client device, a pause in a user session of the application and in response to the detection, saving a user session state of the user session. The method may also include determining, based on one or more session characteristics relating to the user session, a session preservation time for preserving the user session state. The session preservation time may correspond to a predicted time for keeping the user session alive. The method may further include storing the saved user session state in a session state buffer for at least the determined session preservation time, and removing the user session state from the session state buffer after the session preservation time elapses. Various other methods, systems, and computer-readable media are also disclosed.
Adaptive resource management of a cluster of host computers using predicted data
A resource management system and method for performing resource management operations in a distributed computer system uses predicted resource demands for a specified time in the future to change a resource management option of a resource management analysis algorithm prior to the specified time so that the resource management analysis algorithm can be executed in anticipation of the predicted resource demands at the specified time.
Method for generating nested container with no intersection and full coverage in the same layer and readable storage medium
A method for generating a nested container with no intersection and same layer full coverage, including: giving a right undirected graph G(V, E, W) and network measurement index set {Ti} for dividing nodes in G, each network measurement index Ti corresponding to a Ci layer container set {Ci k}; deleting an edge weighing greater than Ti, and segmenting G into subgraphs, each a connected component; setting all nodes in the subgraph Gcm not in the Ci layer container as set L; selecting one node from set L as current anchor aj; starting with anchor aj, performing breadth-first search on all nodes in L and Ci+1 layer container containing aj with the path communicated therewith less than Ti forming a Ci layer container with anchor aj; setting j′=j+1, determining whether L is a null set; setting m=m+1, determining whether all subgraphs are processed; setting i=i−1, and determining whether i=1 is satisfied.
Fault tolerant hyper-converged infrastructure upgrades in an environment with no additional physical infrastructure
In a computer-implemented method for upgrading a fault tolerant hyper-converged infrastructure in an environment with no additional physical infrastructure, a workload domain having a plurality of hosts is chosen for an upgrade. One or more conflict groups are calculated for each host, and a physical host in the workload domain is selected. A number and a size of one or more nested hosts is determined and a different nested host is created in a management cluster for each of the one more conflict groups in the physical host. A communication network provides communication between a virtual machine (VM) on the different nested host and a VM in the physical host. The physical host is put into a maintenance mode, upgraded, and then returned from the maintenance mode to an operational mode.
HYPERCALL ACCELERATION FOR NESTED VIRTUAL MACHINES
Systems and methods for accelerating hypercalls for nested virtual machines. An example method may comprise executing, by a host computer system, a Level 0 hypervisor managing a Level 1 virtual machine (VM). The Level 0 hypervisor receives a first function component from a Level 2 hypervisor managing a Level 3 VM, where the first function component performs a first functionality associated with a hypercall issued by the Level 3 VM; stores the first function component in a memory space associated with the Level 0 hypervisor; detects the hypercall issued by the Level 3 VM; and responsive to detecting the hypercall, executes the first function component to modify a VM context for the Level 3 VM.
HYPERCALL ACCELERATION FOR NESTED VIRTUAL MACHINES
Systems and methods for accelerating hypercalls for nested virtual machines. An example method comprises: executing, by a host computer system, a Level 0 hypervisor managing a Level 1 virtual machine (VM); receiving, by a Level 1 hypervisor managing a Level 2 VM, a first function component from a Level 2 hypervisor managing a Level 3 VM, wherein the first function component performs a first functionality associated with a hypercall issued by the Level 3 VM; generating, by the Level 1 hypervisor, a second function component that performs a second functionality associated with the hypercall issued by the Level 2 VM; and responsive to detecting the hypercall issued by the Level 3 VM, causing the Level 0 hypervisor to execute at least one of: the first function component or the second function component.
Scalable virtual machine operation inside trust domains within the trust domain architecture
Implementations describe a computing system that implements a plurality of virtual machines inside a trust domain (TD), enabled via a secure arbitration mode (SEAM) of the processor. A processor includes one or more registers to store a SEAM range of memory, a TD key identifier of a TD private encryption key. The processor is capable of initializing a trust domain resource manager (TDRM) to manage the TD, and a virtual machine monitor within the TD to manage the plurality of virtual machines therein. The processor is further capable of exclusively associating a plurality of memory pages with the TD, wherein the plurality of memory pages associated with the TD is encrypted with a TD private encryption key inaccessible to the TDRM. The processor is further capable of using the SEAM range of memory, inaccessible to the TDRM, to provide isolation between the TDRM and the plurality of virtual machines.
Event notification support for nested virtual machines
Systems and methods for event notification support for nested virtual machines. An example method may comprise running, by a host computer system, a Level 0 hypervisor managing a Level 1 virtual machine running a Level 1 hypervisor, wherein the Level 1 hypervisor manages a Level 2 virtual machine. The Level 1 hypervisor may generate a virtual device and an input/output (I/O) translation table comprising an I/O translation table entry associated with the virtual device, and associate the I/O translation table entry with a Level 1 virtual machine context maintained by at least one of the Level 0 hypervisor or Level 1 hypervisor. The method may further responsive to detecting, by the Level 0 hypervisor, an event notification from the Level 2 virtual machine, cause a central processing unit (CPU) to use the I/O translation table to execute access to the Level 1 guest virtual address.
AUTOMATED LOCAL SCALING OF COMPUTE INSTANCES
At a first compute instance run on a virtualization host, a local instance scaling manager is launched. The scaling manager determines, based on metrics collected at the host, that a triggering condition for redistributing one or more types of resources of the first compute instance has been met. The scaling manager causes virtualization management components to allocate a subset of the first compute instance's resources to a second compute instance at the host.