Patent classifications
G06F9/45541
Honoring resource scheduler constraints during maintenances
The present disclosure describes a technique for honoring virtual machine placement constraints established on a first host implemented on a virtualized computing environment by receiving a request to migrate one or more virtual machines from the first host to a second host and without violating the virtual machine placement constraints, identifying an architecture of the first host, provisioning a second host with an architecture compatible with that of the first host, adding the second host to the cluster of hosts, and migrating the one or more virtual machines from the first host to the second host.
Upgrade of a distributed service in a virtualized computing system
An example method of performing an upgrade operation for a distributed service in a virtualized computing system is described. The virtualized computing system includes a host cluster, the host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts. The method includes: receiving, at a controller of the distributed service, a first upgrade operation from a user, the distributed service including the controller and a plurality of service engine groups, each of the plurality of service engine groups including a plurality of service engines; and performing, by the controller, the first upgrade operation on software of the controller exclusive of software of the service engines in each of the service engine groups, the software of the controller and the software of the plurality of service engines in each of the plurality of service engine groups executing in a plurality of hosts.
METHOD, APPARATUS AND DEVICE FOR GENERATING BARE METAL SERVER LINUX SYSTEM
Provided are a method, apparatus, and device for generating a bare metal server Linux system image, and a memory medium. The method includes: analyzing a received bare metal server Linux system image generation request so as to obtain a target configuration parameter of a target bare metal server Linux system image to be generated and a target operating system model; selecting, from a redundant array of independent disks driver library, a target redundant array of independent disks driver that matches the target configuration parameter and the target operating system model; adding the target redundant array of independent disks driver to a boot file of a virtual machine to generate a target boot file; and exporting, from the virtual machine, a virtual machine disk image file containing the target boot file, as the target bare metal server Linux system image.
Dynamically updating logical identifiers of cores of a processor
In one embodiment, a processor includes a plurality of cores each including a first storage to store a physical identifier for the core and a second storage to store a logical identifier associated with the core; a plurality of thermal sensors to measure a temperature at a corresponding location of the processor; and a power controller including a dynamic core identifier logic to dynamically remap a first logical identifier associated with a first core to associate the first logical identifier with a second core, based at least in part on a temperature associated with the first core, the dynamic remapping to cause a first thread to be migrated from the first core to the second core transparently to an operating system. Other embodiments are described and claimed.
Automated host management service
A recovery workflow is part of an automated management service for bare metal hosts allocated for single-tenant operation in a multi-tenant environment. The health of the hosts is monitored using a set of health criteria. If it is detected that one of the host machines fails a health check then a host recovery workflow can be initiated. As part of the workflow, the failed host can be repurposed or retired. A spare host class can be used to obtain a new host to take over for the failed host. Once deployed, the operation of the new host can be tested. Upon passing the test, the new host can take over for the failed host. A new host resource can be automatically requested to be added to the spare host class in order to ensure that there are sufficient resources available in case of an additional failure.
HARDWARE-ASSISTED PARAVIRTUALIZED HARDWARE WATCHDOG
A hardware-assisted paravirtualized hardware watchdog is described that is used to detect and recover from computer malfunctions. A computing device determines that a hardware-implemented watchdog of the computing device does not comply with predetermined watchdog criteria, where the hardware-implemented watchdog is configured to send a reset signal when a first predetermined amount of time elapses without receipt of a first refresh signal. If the hardware-implemented watchdog does not comply with the predetermined watchdog criteria, a runtime watchdog service is initialized using a second predetermined amount of time. The runtime watchdog service is directed to periodically send the refresh signal to the hardware-implemented watchdog before an expiration of the first predetermined amount of time that causes the hardware-implemented watchdog to expire. The hardware-implemented watchdog is directed to send the reset signal when the second predetermined amount of time elapses without receipt of a second refresh signal.
BOOT FAILURE PROTECTION ON SMARTNICS AND OTHER COMPUTING DEVICES
Boot failure protection on smartNICs and other computing devices is described. During a power-on stage of a booting process for a computing device, a boot loading environment is directed to install an application programming interface (API) able to be invoked to control operation of a hardware-implemented watchdog. During an operating system loading stage of the booting process, the application programming interface is invoked to enable the hardware-implemented watchdog. During an operating system hand-off stage of the booting process, a last watchdog refresh of the hardware-implemented watchdog is performed, and execution of the boot loading environment is handed off to a kernel boot loader of an operating system. The application programming interface may not be accessible after the hand off to the kernel boot loader.
CONTAINER-AS-A-SERVICE (CAAS) CONTROLLER FOR SELECTING A BARE-METAL MACHINE OF A PRIVATE CLOUD FOR A CLUSTER OF A MANAGED CONTAINER SERVICE
Embodiments described herein are generally directed to a controller of a managed container service that facilitates selection among bare metal machines available within a private cloud. According to an example, a request is received by a Container-as-a-Service controller from a CaaS portal to create a cluster based at least in part on resources of a private cloud of a customer of a managed container service. An inventory of bare-metal machines available within the private cloud is received from a Bare-Metal-as-a-Service (BMaaS) provider associated with the private cloud. A particular bare metal machine is identified for the cluster by selecting among the available bare-metal machines based on cluster information associated with the request, the inventory, and a best fit algorithm configured in accordance with a policy established by the customer.
Productivity platform providing user specific functionality
An apparatus in one embodiment comprises at least one processing platform including a plurality of processing devices. The processing platform is configured to receive a request to deploy one or more applications of a plurality of selected applications, wherein the plurality of selected applications are selected based on a determined role of an individual within an enterprise, and to deploy the one or more applications for at least one user device responsive to the request. The processing platform is further configured to monitor execution of the one or more applications in connection with the at least one user device, to receive and analyze data corresponding to the execution of the one or more applications, and to automatically generate one or more recommendations in connection with the deployment of the one or more applications for the at least one user device based on the received and analyzed data.
AGGREGATION OF USER AUTHORIZATIONS FROM DIFFERENT PROVIDERS IN A HYBRID CLOUD ENVIRONMENT
An example method of aggregating authorization information for a user accessing a service executing in a virtualized computing system includes: receiving, at an authorities aggregating service (AAS) executing in the virtualized computing system, a request for an authorization context for the user from the service; requesting, by the AAS, authorization information from at least one authorization source registered with the AAS for the user; generating the authorization context by aggregating the authorization information; and returning the authorization context to the service.