Upgrading a hypervisor can involve shutting down the virtual-machines hosted by the hypervisor. Depending on the mission(s) to which the virtual machines have been dedicated, the shutdown may be costly or otherwise unacceptable. To avoid the shutdown, the virtual machines can be migrated to a standby machine, e.g., using a product such as vMotion, available from VMware, Inc. For example, when upgrading the ESX, a hypervisor available from VMware, Inc., the host is put in a maintenance mode that migrates all the virtual machines from the host machine to a standby machine. While the virtual machines execute on the standby machine, the original host machine can be provided with an updated hypervisor. The virtual machines can be migrated back, completing the upgrade. Of course, if the standby machine has an instance of the updated hypervisor, the return migration may be omitted.
Relying on migration to a standby machine to avoid shutting down virtual machines can be problematic. First of all, the required standby machine may not be available. Also, if the number of virtual machines is great and/or if their average size is large, each migration may consume considerable network bandwidth for an extended duration, depriving other network nodes of the bandwidth they may need. For example, a large virtual-machine system can include more than 100 gigabytes (GB) that must be migrated. Accordingly, there remains a need for a less burdensome approach to upgrading (or otherwise updating or exchanging) a hypervisor.
In accordance with the present invention, hypervisors are exchanged without removing or shutting down virtual machines. For example, an upgraded version of a hypervisor can replace a previous version of the hypervisor. To simplify the exchange, the virtual machines are “consolidated” to reduce the number of virtual machines running on the old hypervisor as the exchange begins.
For example, in the chart of
Thus, during a hypervisor exchange from old hypervisor 102 to new hypervisor 108 there is, in effect, only one virtual machine (VM0) to “worry about”. The importance of this is explained further below in the context of the various ways of effecting exchange 152. In any event, as a result of exchange 152, computer system 100 assumes the configuration associated with time T3 in
At 153, virtual machines VM1-VMN are “dissociated” in that they are no longer presented to a hypervisor as a single virtual machine. The dissociation is accomplished by migrating the virtual machines from guest hypervisor 106 to new hypervisor 108. Virtual machine VM0 is then terminated. The result is shown in
A hypervisor exchange process 200 is flow-charted in
At 204,
At 207, virtual machines VM1-VMN are migrated from the guest hypervisor to the new hypervisor, effecting dissociation 153 of
An alternative hypervisor exchange process 300 is flow-charted in
At 304,
At 308,
In the case that the hypervisors are versions of VMware's ESX, process 300 uses a technique called loadESX to side-load the new hypervisor on a partition of the machine and to issue a fast migration from the source partition to the target partition. During this migration, if the virtual machines were not consolidated, an error could leave the computer system in a state that from which there was no practical recovery. However, because of the consolidation, there is only one virtual machine being migrated; therefore, a failed migration can be resolved by simply destroying the second partition which will revert the system to a known state.
One giant advantage of virtualization is that a virtual machine can run anywhere and the underneath hardware can change at any time without the virtual machine being aware of it. Thus, one can easily transform a system with N virtual machines to a system with only one virtual machine by simply creating a nested ESX VM and migrating all the other virtual machines onto it. Once the consolidation is complete, a new partition can be created with a fresh ESX. One can then migrate the nested ESX from the old partition to the new one. Lastly, the source partition can be destroyed, and all the nested ESX virtual machines can be migrated to the host ESX. Here is process 300 in algorithmic form, where the hypervisors are versions of ESX.
def upgradeESX( ):
Computer system 100 is shown in greater detail in
Machine 102 includes memory 406, and storage controllers 408 and 410 for accessing external storage 412. Collectively, memory 406 and external storage 412 store substantially all the information defining virtual machines VM0 and VM1-VMN. Migrating the virtual machine is effected by transferring information from source partition P1 to target partition P2. The virtual machine images in memory and storage are not moved, rather pointers to memory and storage locations of the images are communicated by source partition P1 to target partition P2.
Memory 406 includes source-partition memory 414, target partition memory 416, and shared memory 418. Partition P1 informs target partition P2 of the locations within memory 414 that contain information needed to migrate a virtual machine. The target partition P2 then claims that memory so that, in effect, the claimed memory exits source-partition memory 414 and becomes part of target-partition memory 416, even though no memory physically moves with machine 102. Source partition P1 can prepare a list of memory pages and ranges freed as virtual machines are migrated from source partition P1. The list can be stored in shared memory 418, which can be accessed by both partitions. Target partition P2 can read the list and claim the listed memory. In an alternative embodiment, memory contents are physically moved from memory in source partition P1 to memory in target partition P2.
Machine 102 includes processors (CPUs) 431, 432, 433, and 434, which are divided among partitions P1 and P2 when the partitions are created. Eventually, however, all memory and devices (storage controllers, NICs, etc.) are to be transferred to the target partition P2. However, at least one processor, e.g., 431, and some memory 414 is required until very near the end to execute code of old hypervisor 104 to complete the transfer. The last processor 431 makes a final list of memory locations, stores it in shared memory 418, and shuts down. Target partition P2 reads the list and claims the memory and the last processor. Also, the target partition P2 can reinitialize and claim shared memory. The source partition P1 is terminated and new hypervisor 108 takes control of all of machine 102. The resident virtual-machines are migrated to the new hypervisor, and the host VM is destroyed to complete the hypervisor upgrade/exchange process.
Some devices, such as an inter-processor interrupt controller (IPIC) 440 and an input/output memory management unit (IOMMU) 442 may be required by both partitions during VM migration. To avoid conflicts, access to these devices may be controlled by respective semaphores (i.e., locks). Whichever partition “owns” the semaphore, can use the device. The other partition is excluded until the previous owner releases the semaphore. Once the hypervisor update is complete, the semaphores can be dissolved. It should be noted that process 200 can be implemented on computer system 100 without the partitioning.
When the virtual machines are transferred to the nested ESXi virtual machine, its storage and networking settings remain the same. For networking, a virtual switch on the underlying ESXi host and the ESXi VM is configured to provide equivalent functionality. For the case of storage, the same storage is mounted into the virtual machine, assuming that the storage is remote like NFS or some other network share. If the storage is local, a small translation layer can be used so that the blocks in the virtual disks of the virtual machines VM1-VMN are the same before and after the migration.
In an alternate arrangement, there can be more than one nested ESXi virtual machine. (i.e., there can be an m:n mapping of the number of virtual machines to the number of nested ESXi virtual machines created). There may be situations where moving all the virtual machines into one nested ESX virtual machine causes performance issues. In those cases, the resident virtual machines can be distributed among two or more such ESXi virtual machines. This will still drastically reduce the number of virtual machines that are to be dealt with when switching over from the old version to the new version of ESXi on the physical machine.
Herein, art labelled “prior art”, if any, is admitted prior art; art not labelled “prior art” is not admitted prior art. The illustrated embodiments as well as variations thereupon and modifications thereto are provided for by the present invention, the scope of which is limited by the following claims.
This application claims priority to and is a continuation of the co-pending U.S. patent application Ser. No. 15/189,108, filed on Jun. 22, 2016, entitled “HYPERVISOR EXCHANGE WITH VIRTUAL-MACHINE CONSOLIDATION”, by Xavier Deguillard, et al., which is herein incorporated by reference in its entirety and assigned to the assignee of the present application. The application with Ser. No. 15/189,108 is a continuation-in-part of and claims the benefit of U.S. patent application Ser. No. 14/642,656, filed on Mar. 9, 2015, entitled “HOT-SWAPPING OPERATING SYSTEMS USING INTER-PARTITION APPLICATION MIGRATION”, by Mukund Gunti, et al., which is herein incorporated by reference and assigned to the assignee of the present application. The application with Ser. No. 14/642,656 claims priority to and benefit of U.S. Provisional Application No. 62/105,128, filed on Jan. 19, 2015, entitled “HOT-SWAPPING OPERATING SYSTEMS USING INTER-PARTITION APPLICATION MIGRATION”, by Mukund Gunti, et al., which is herein incorporated by reference and assigned to the assignee of the present application.
Number | Name | Date | Kind |
---|---|---|---|
6961941 | Nelson et al. | Nov 2005 | B1 |
7814495 | Lim et al. | Oct 2010 | B1 |
7818726 | Snover et al. | Oct 2010 | B2 |
8027354 | Portolani | Sep 2011 | B1 |
8181007 | Liu | May 2012 | B2 |
9195401 | Li | Nov 2015 | B2 |
9244710 | Bacher | Jan 2016 | B2 |
9396016 | Marquardt et al. | Jul 2016 | B1 |
9672054 | Gupta | Jun 2017 | B1 |
10324743 | Tsirkin | Jun 2019 | B2 |
20050071811 | Appavoo et al. | Mar 2005 | A1 |
20060242442 | Armstrong et al. | Oct 2006 | A1 |
20060294337 | Hartung et al. | Dec 2006 | A1 |
20070061372 | Appavoo et al. | Mar 2007 | A1 |
20080184373 | Traut et al. | Jul 2008 | A1 |
20080320194 | Vega et al. | Dec 2008 | A1 |
20090288087 | Ringseth et al. | Nov 2009 | A1 |
20100125845 | Sugumar et al. | May 2010 | A1 |
20110119670 | Sugumar et al. | May 2011 | A1 |
20110153872 | Nath | Jun 2011 | A1 |
20120011520 | Filali-Adib et al. | Jan 2012 | A1 |
20120017029 | Santos et al. | Jan 2012 | A1 |
20120017031 | Mashtizadeh et al. | Jan 2012 | A1 |
20120054486 | Lakkavalli | Mar 2012 | A1 |
20120216187 | Ben-Yehuda et al. | Aug 2012 | A1 |
20120254860 | Bozek et al. | Oct 2012 | A1 |
20120254865 | Saeki | Oct 2012 | A1 |
20120291021 | Banerjee et al. | Nov 2012 | A1 |
20130061224 | Reumann | Mar 2013 | A1 |
20130139154 | Shah | May 2013 | A1 |
20130139155 | Shah | May 2013 | A1 |
20130227551 | Tsirkin | Aug 2013 | A1 |
20130232486 | Chen et al. | Sep 2013 | A1 |
20130263118 | Kannan et al. | Oct 2013 | A1 |
20140019968 | Deng et al. | Jan 2014 | A1 |
20140101657 | Bacher | Apr 2014 | A1 |
20140149635 | Bacher et al. | May 2014 | A1 |
20140229943 | Tian et al. | Aug 2014 | A1 |
20140282539 | Sonnek | Sep 2014 | A1 |
20150135173 | Bacher | May 2015 | A1 |
20150169329 | Barrat et al. | Jun 2015 | A1 |
20150212844 | Tsirkin et al. | Jul 2015 | A1 |
20150324227 | Sizemore | Nov 2015 | A1 |
20150331692 | Schekochikhin et al. | Nov 2015 | A1 |
20160026489 | Maislos et al. | Jan 2016 | A1 |
20160092678 | Probert et al. | Mar 2016 | A1 |
20160139946 | Gardner et al. | May 2016 | A1 |
20160277308 | Challa et al. | Sep 2016 | A1 |
20160277309 | Challa et al. | Sep 2016 | A1 |
20160277311 | Challa et al. | Sep 2016 | A1 |
20170004001 | Bacher | Jan 2017 | A1 |
20170090964 | Tsirkin | Mar 2017 | A1 |
Number | Date | Country |
---|---|---|
2014149583 | Sep 2014 | WO |
Entry |
---|
Alford, “AIX 6.1 Workload Partitions, Basic management of Workload Partitions in AIX”, IBM developerWorks, Nov. 20, 2007, downloaded from https://www.ibm.com/developerworks/aix/library/au-workload/. |
Ball, “What's the difference between a Virtual Machine and a Container?”, InfoSec Musings, Apr. 27, 2015, downloaded from http://security-musings.blogspot.com/2015/04/whats-difference-between-virtual.html. |
Grasser, et al., “Swap and Play Live Updating Hypervisors and Its Application to Xen”, 2014. |
Chen, et al., “Live Updating Operating Systems using Virtualization”, 2006. |
Griffiths, “The LPAR term is dead—Long live the Virtual Server/Machine”, AIXpert Blog, Apr. 27, 2011, downloaded from: https://www.ibm.com/developerworks/community/blogs/aixpert/entry/the_lpar_term_is_dead_long_live_the_virtual_server_machine42?lang=en. |
IBM, “Mainframe hardware:Logical partitions (LPARs)”, IBM Knowledge Center,2010, p. 30, USA, downloaded from https://www.ibm.com/support/knowledgecenter/zosbasics/com.ibm.zos.zmainframe/zconc_mfhwlpar.htm. |
Lambert, “What-s the difference between an LPAR and a Virtual Machine?”, Quora, Apr. 5, 2016, downloaded from https://www.quora.com/Whats-the-difference-between-an-LPAR-and-a-Virtual-Machine. |
Appavoo, et al., “Enabling autonomic behavior in systems software with hot swapping, 2003”, IBM Systems, Journal, Year: 2003, p. 60-76. |
Number | Date | Country | |
---|---|---|---|
20200026544 A1 | Jan 2020 | US |
Number | Date | Country | |
---|---|---|---|
62105128 | Jan 2015 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15189108 | Jun 2016 | US |
Child | 16585701 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 14642656 | Mar 2015 | US |
Child | 15189108 | US |