Patent classifications
G06F2201/815
Live migration of virtual devices in a scalable input/output (I/O) virtualization (S-IOV) architecture
Examples include a method of live migrating a virtual device by creating a virtual device in a virtual machine, creating first and second interfaces for the virtual device, transferring data over the first interface, detecting a disconnection of the virtual device from the virtual machine, switching data transfers for the virtual device from the first interface to the second interface, detecting a reconnection of the virtual device to the virtual machine, and switching data transfers for the virtual device from the second interface to the first interface.
Communication between independent containers
Techniques related to communication between independent containers are provided. In an embodiment, a first programmatic container includes one or more first namespaces in which an application program is executing. A second programmatic container includes one or more second namespaces in which a monitoring agent is executing. The one or more first namespaces are independent of the one or more second namespaces. A monitoring agent process hosts the monitoring agent. The monitoring agent is programmed to receive an identifier of the application program. The monitoring agent is further programmed to switch the monitoring agent process from the one or more second namespaces to the one or more first namespaces. After the switch, the monitoring agent process continues to execute in the second programmatic container, but communication is enabled between the application program and the monitoring agent via the monitoring agent process.
MEASURING PERFORMANCE OF VIRTUAL DESKTOP EVENT REDIRECTION
The disclosure provides an approach for measuring performance between a virtualized desktop infrastructure (VDI) client running on a client device and a remote computing device. Embodiments include generating, by a performance client on the client device, an event and storing a time associated with generating the event. Embodiments include transmitting, by the VDI client to the remote computing device, a message based on the OS event. Embodiments include determining, by a performance agent on the remote computing device, a time associated with receiving the message at the remote computing device and causing an indication of the time to be displayed in a virtual desktop screen. Embodiments include extracting, by the performance client, from the virtual desktop screen, the time, and determining a performance metric based on the extracted time and the time associated with receiving the message at the remote computing device.
DIFFERENTIATED WORKLOAD TELEMETRY
In an approach for generating differentiated workload telemetry data, a processor corresponds one or more services with a workload related telemetry generating an event emitter. A processor performs a correlation analysis of corresponding relationship and connection among connected resources and current traffic into and out of the one or more services. A processor labels domain context for each telemetry event. A processor communicates each telemetry event to a global event handler. A processor performs a cross-correlation in real-time of telemetry data with the global event handler. A processor updates a real-time differentiated workload report.
Virtualized file server
In one embodiment, a system for managing communication connections in a virtualization environment includes a plurality of host machines implementing a virtualization environment, wherein each of the host machines includes a hypervisor, at least one user virtual machine (user VM), and a distributed file server that includes file server virtual machines (FSVMs) and associated local storage devices. Each FSVM and associated local storage device are local to a corresponding one of the host machines, and the FSVMs conduct I/O transactions with their associated local storage devices based on I/O requests received from the user VMs. Each of the user VMs on each host machine sends each of its respective I/O requests to an FSVM that is selected by one or more of the FSVMs for each I/O request based on a lookup table that maps a storage item referenced by the I/O request to the selected one of the FSVMs.
Methods, systems, and computer readable mediums for implementing a data protection policy for a transferred enterprise application
Methods, systems, and computer readable mediums for logically remediating infrastructure resource components are disclosed. According to one example, the method includes capturing metadata specifying both a data protection policy applied to an enterprise application supported by a host computing system and a location of backup file data associated with the enterprise application and transferring the enterprise application and the metadata from the host computing system to a target computing system. The method further includes utilizing the metadata to reconstruct the data protection policy for the transferred enterprise application on the target computing system, wherein the metadata specifies a data protection solution for each of a plurality of resource components supporting the transferred enterprise application on the target computing system.
Application-specific policies for failover from an edge site to a cloud
Example implementations relate to application-specific policies for failing over from an edge site to a cloud. When an application becomes operational within an edge site, a discovery phase is performed by a local disaster recovery (DR) agent. I/O associated with a workload of the application is monitored. An I/O rate for data replication that satisfies latency characteristics of the application is predicted based on the incoming I/O. Based on results of tests against multiple clouds indicative of their respective RTO/RPO values, information regarding a selected cloud to serve as a secondary system is stored in an application-specific policy. The application-specific policy is transferred to a remote DR agent running in the selected cloud. Responsive to a failover event, infrastructure within a virtualized environment of the selected cloud is enabled to support a failover workload for the application based on the application-specific policy.
Cloud restart for VM failover and capacity management
A method of restarting a virtual machine (VM) running in a cluster in a first data center, in a second data center, includes: transmitting images of VMs, including a first VM, running in the cluster of hosts at a first point in time to the second data center for replication in the second data center; generating difference data representing a difference in an image of the first VM at a second point in time and the image of the first VM at the first point in time; transmitting the difference data to the second data center; setting the first VM to be inactive in the first data center; and communicating with a control plane in the second data center to set as active, and power on, a VM in the second data center using the replicated image of the first VM updated with the difference data.
Agentless distributed monitoring of microservices through a virtual switch
Disclosed are systems, computer-readable media and methods for monitoring performance data across microservices. One example method includes establishing a service policy configured on a centralized switch controller, applying the service profile to a virtual interface associated with a microservice, mapping a microservice name for the microservice to an IP address and a port number, tracking a protocol flow for the microservice, wherein the protocol flow is associated with a virtual switch, to yield data, aggregating the data to yield aggregated data and presenting the aggregated data on a user interface.
VERTICAL TRANSISTOR AND METHOD OF FORMING THE VERTICAL TRANSISTOR
A method of forming a vertical transistor includes forming a fin structure on a substrate, forming a gate structure on the fin structure, and forming a bottom source/drain (S/D) region on the fin structure, such that an air gap is formed between the bottom S/D region and the gate structure.