Patent application number | Description | Published |
20140068127 | SHARED LOCKING MECHANISM FOR STORAGE CENTRIC LEASES - A computing device receives a request from a host for a shared lock on a resource. The computing device obtains an exclusive lock on the resource using a locking data structure that is stored on the storage domain. The computing device subsequently obtains a shared lock on the resource for the host by writing a flag to the locking data structure, wherein the flag indicates that the host has the shared lock on the resource. The computing device then releases the exclusive lock on the resource. | 03-06-2014 |
20140181502 | DYNAMICALLY MANIPULATING RULES FOR ADDING NEW DEVICES - An exemplary system may allow new devices to be added. In one embodiment, upon receiving information associated with a device event, the system generates a first rule for a device based on the information and a system state. The system determines determine an updated system state based on the first rule. The system determines whether a second rule is required for the updated system state. Upon determining that the second rule is required for the updated system state, the system generates the second rule. | 06-26-2014 |
20140181809 | CREATING MULTIPLE RULES FOR A DEVICE TO ALLOW CONCURRENT ACCESS TO THE DEVICE BY DIFFERENT VIRTUAL MACHINES - An exemplary system may allow concurrent access to a device by different virtual machines. In one embodiment, the system receives a request to add a virtual machine (VM) of a plurality of virtual machines to a host, the request identifying a device that is shared by the plurality of virtual machines. The system creates a VM-specific rule for the device based on the VM. The system stores the VM-specific rule for the device in association with the VM. | 06-26-2014 |
20140181810 | AUTOMATIC DISCOVERY OF EXTERNALLY ADDED DEVICES - An exemplary system may automatically discovery externally added devices. In one embodiment, the system obtains initial device information for a virtual machine running on a host computing system. The system determines whether an external event occurred on the host computing system. A management computing system associated with the host computing system does not receive notification of the external event. Upon determining that the external event occurred on the host computing system, the system obtains updated device information for the virtual machine running on the host computing system. | 06-26-2014 |
20140208045 | MANAGING METADATA FOR LOGICAL VOLUME MANAGERS - A logical volume manager (LVM) may manage a plurality of logical volumes and a plurality of drives in a logical data storage using metadata stored on the plurality of drives. The LVM may operate in one of two modes. In the first mode, the LVM may deleted uncommitted metadata on a drive and may use committed metadata on the drive when accessing a logical volume. In a second mode, the LVM may use committed metadata on the drive when accessing the logical volume and may refrain from deleting the uncommitted metadata. | 07-24-2014 |
20150177997 | CREATING NEW VIRTUAL MACHINES BASED ON POST-BOOT VIRTUAL MACHINE SNAPSHOTS - Systems and methods for creating new virtual machines based on post-boot virtual machine snapshots. An example method may include: receiving a request to create a new virtual machine, identifying, in view of the request, a virtual machine snapshot, the virtual machine snapshot including one or more elements of an initialized virtual machine, determining an update efficiency metric with respect to the virtual machine snapshot, and in response to a determination that the update efficiency metric reflects that updating the virtual machine snapshot is relatively more efficient than creating a new virtual machine in lieu of the virtual machine snapshot, creating the new virtual machine in view of the virtual machine snapshot. | 06-25-2015 |
20150178106 | VIRTUAL MACHINE DATA REPLICATION WITH SHARED RESOURCES - Systems and methods for virtual machine data replication with shared resources. An example method may include: identifying resources that are shared across a plurality of virtual machines, storing a copy of the resources, receiving, an indication of a portion of virtual storage of a virtual machine to be replicated, determining that the portion of virtual storage is not included in the resources, in response to the determination, updating a replicated copy of the virtual machine in view of the portion of virtual storage, the replicated copy further including the resources that are shared across a plurality of virtual machines, determining an initialization efficiency metric in relation to the replicated copy, and in response to the determination that the initialization efficiency metric exceeds an efficiency threshold, storing a copy of the virtual storage. | 06-25-2015 |
20150178111 | HYPERVISOR MANAGED SCHEDULING OF VIRTUAL MACHINES - A hypervisor determines that a virtual machine is important. In response, the hypervisor selects one or more processing devices of a multiprocessor computer system and pins the virtual machine to the selected processing devices. The virtual machine exclusively executes in the selected processing devices resulting in an unfair resource allocation. | 06-25-2015 |
20150180709 | CONFIGURING NETWORK SETTINGS OF AN UNREACHABLE HOST - An exemplary system may configure network settings of an unreachable host. In one embodiment, the system determines that a first host on a network is unreachable using a first communication protocol. The system selects a second host on the network that is reachable using the first communication protocol. The second host on the network can reach the first host using a second communication protocol. The system provides a communication to the second host on the network using the first communication protocol. The communication causes the second host to access the first host on the network using the second communication protocol. | 06-25-2015 |