Embodiments of the invention generally relate to information technology, and, more particularly, to virtual machines.
Virtual machines are independent machines with separate operating systems (OS) and their software stacks are created within a hosting OS. Each of the virtual machines behaves like any other machine on the network. They have their own network identity (for example, internet protocol (IP) address, net mask, gateway and domain name system (DNS) settings). These virtual machines, as they reside inside a host operating system, do not expose their media access control (MAC) address in non-bridged mode. These are all virtual MAC addresses. The host operating systems use an internal book-keeping mechanism between the virtual MAC address and its own MAC address so that communication can be enabled between the virtual machines and outside machines.
In non-bridged mode, as the MAC addresses of the virtual machines are not exposed to the outside world, obtaining IP addresses in a zero network configuration is a non-trivial task. Zero network configuration refers to the state when no information about the network is available, which typically happens the first time the virtual machines are booted. Challenges exist in the allocation of internet protocol (IP) addresses in a zero network configuration in a virtualized environment. During the bootstrapping of virtual machines, an IP address has to be assigned.
In existing approaches, this requires human intervention where a human is involved in either manually assigning the IP addresses to the machines after booting up or in assigning a central server where the virtual machines can obtain an IP address and pointing the virtual machines to the central server. Another approach which also involves human intervention is to populate a file with the new IP address and copy it to the host OS. In certain kinds of virtualized environments, the virtual machines might have access to restricted parts of the host OS and can also access the file and obtain the IP address.
All of the above approaches, as they involve human intervention, require that an expert is required to understand the details of the machine configuration and how to assign the IP address to these virtual machines. It is also a major limiting step towards automation of migration of the virtual machines to a new environment, rendering the automation a challenging task.
Principles and embodiments of the invention provide techniques for providing network identity for virtual machines.
An exemplary method (which may be computer-implemented) for assigning an internet protocol (IP) address to a virtual machine, according to one aspect of the invention, can include steps of tunneling a request for an IP address to a boot-strapping initialization protocol server, using the server to mask an identity of one or more guest virtual machines and obtain an IP address for the virtual machine based on a media access control (MAC) address of the virtual machine, and tunneling the IP address to the virtual machine.
One or more embodiments of the invention or elements thereof can be implemented in the form of a computer product including a computer usable medium with computer usable program code for performing the method steps indicated. Furthermore, one or more embodiments of the invention or elements thereof can be implemented in the form of an apparatus or system including a memory and at least one processor that is coupled to the memory and operative to perform exemplary method steps. Yet further, in another aspect, one or more embodiments of the invention or elements thereof can be implemented in the form of means for carrying out one or more of the method steps described herein; the means can include hardware module(s), software module(s), or a combination of hardware and software modules.
These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings.
Principles of the invention include automatically providing network identity for virtual machines in zero configuration networks. The techniques described herein automatically assign internet protocol (IP) addresses to virtual nodes (for example, on boot-up) in a zero network configuration state of the IP addresses.
One or more embodiments of the invention include techniques that tunnel the requests to a boot strapping initialization protocol server such as, for example, a dynamic host configuration protocol (DHCP). The media access control (MAC) address of the virtual nodes is exposed through these tunneling servers to the outside world and an IP address is requested which is again tunneled back to the virtual machine (VM) nodes. In contrast to the disadvantageous existing approaches noted above, the techniques described here reduce human intervention by configuring the DHCP to provide an IP address.
As described herein, in one or more embodiments of the invention, a DHCP server can generate an IP address for the virtual machine based on the MAC address of the virtual machine. As such, the IP address thus generated is tunneled back to the virtual machine.
As noted above, challenges exist in that distributed virtual machines, at boot-up, require an IP address to be assigned thereto. Problems can occur, for example, when boot-up is mis-configured due to invalid network identity or non availability of the IP address. As such, as described herein, one or more embodiments of the invention automatically assign and provide IP addresses for virtual machines upon boot-up, minimizing human intervention for setting up the IP address in the zero network configuration. By way of example, one or more embodiments of the invention automatically assign and provide IP addresses for virtual machines configured in modes that do not expose MAC address to the outside world.
One or more embodiments of the invention install agents on host machines before taking an image. Agents interact with the host machine and obtain the virtual MAC address of the guest machines and develop a host MAC to virtual MAC address. The techniques described herein also set up a virtual tunnel server that interacts with a DHCP server configurable by the administrator to provide the new IP address. Before taking the image, an agent sends the table to the virtual tunnel server and registers the guest host operating system MAC identifier (ID) to the host operating system MAC ID.
When an image is booted-up, it raises a request (by the agent) and is sent to the virtual tunnel server. The virtual tunnel server requests the DHCP server to provide an IP address to the MAC address (configured by the administrator). Also, the virtual tunnel server tunnels these packets to the respective host machine agents. The agents, in-turn, set the MAC address of the individual guest virtual machines. Additionally, in one or more embodiments of the invention, the process steps are done internal to the system and only the administrator is exposed to the interface to configure the IP address.
Also, by way of example, the techniques described herein can be implemented by providing software components that act as an agent on the client machine and also a tunnel server component. The implementation can be performed using any of the languages such as, for example, C/C++/Java, and can be easily deployed on the machines that require the functionality.
As detailed herein, unlike the disadvantageous existing approaches, one or more embodiments of the invention include using an agent to masquerade the identity of the machine for the purpose of obtaining a valid IP address in virtual machines, as well as using the concept of DHCP to enable one to obtain an identity for virtual machines.
In
When the individual virtual machine boots up, it raises a DHCP request for obtaining a new IP address (for example, element 110). The agent traps this DHCP request and raises a request to the tunnel server for a new IP address providing the MAC address of the virtual machines (for example, element 112). The tunnel server (for example, component 118), in turn, maintains another mapping between the VM's MAC and host MAC for exposing it to the DHCP server (for example, component 120). It raises a request to the DHCP server for obtaining a IP address for the MAC of the guest VM, which the tunnel server returns back to the agent and the agent, in turn, returns it back to the guest machine that raised the DHCP request.
Step 204 includes using the server to mask an identity of one or more guest virtual machines and obtain an IP address for the virtual machine based on a media access control (MAC) address of the virtual machine. The MAC address of the virtual machine can be exposed through the server (that is, the tunneling server). Step 206 includes tunneling the IP address to the virtual machine.
The techniques depicted in
A variety of techniques, utilizing dedicated hardware, general purpose processors, software, or a combination of the foregoing may be employed to implement the present invention. At least one embodiment of the invention can be implemented in the form of a computer product including a computer usable medium with computer usable program code for performing the method steps indicated. Furthermore, at least one embodiment of the invention can be implemented in the form of an apparatus including a memory and at least one processor that is coupled to the memory and operative to perform exemplary method steps.
At present, it is believed that the preferred implementation will make substantial use of software running on a general-purpose computer or workstation. With reference to
Accordingly, computer software including instructions or code for performing the methodologies of the invention, as described herein, may be stored in one or more of the associated memory devices (for example, ROM, fixed or removable memory) and, when ready to be utilized, loaded in part or in whole (for example, into RAM) and executed by a CPU. Such software could include, but is not limited to, firmware, resident software, microcode, and the like.
Furthermore, the invention can take the form of a computer program product accessible from a computer-usable or computer-readable medium (for example, media 318) providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer usable or computer readable medium can be any apparatus for use by or in connection with the instruction execution system, apparatus, or device.
The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or solid-state memory (for example, memory 304), magnetic tape, a removable computer diskette (for example, media 318), a random access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD-ROM), compact disk-read and/or write (CD-R/W) and DVD.
A data processing system suitable for storing and/or executing program code will include at least one processor 302 coupled directly or indirectly to memory elements 304 through a system bus 310. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code in order to reduce the number of times code must be retrieved from bulk storage during execution.
Input and/or output or I/O devices (including but not limited to keyboards 308, displays 306, pointing devices, and the like) can be coupled to the system either directly (such as via bus 310) or through intervening I/O controllers (omitted for clarity).
Network adapters such as network interface 314 may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.
In any case, it should be understood that the components illustrated herein may be implemented in various forms of hardware, software, or combinations thereof, for example, application specific integrated circuit(s) (ASICS), functional circuitry, one or more appropriately programmed general purpose digital computers with associated memory, and the like. Given the teachings of the invention provided herein, one of ordinary skill in the related art will be able to contemplate other implementations of the components of the invention.
At least one embodiment of the invention may provide one or more beneficial effects, such as, for example, using an agent to masquerade the identity of a machine for the purpose of obtaining a valid IP address in virtual machines.
Although illustrative embodiments of the present invention have been described herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various other changes and modifications may be made by one skilled in the art without departing from the scope or spirit of the invention.
Number | Name | Date | Kind |
---|---|---|---|
6101543 | Alden et al. | Aug 2000 | A |
6684243 | Euget et al. | Jan 2004 | B1 |
6697377 | Ju et al. | Feb 2004 | B1 |
6832321 | Barrett | Dec 2004 | B1 |
6992994 | Das et al. | Jan 2006 | B2 |
7002932 | Young et al. | Feb 2006 | B1 |
7039008 | Howes et al. | May 2006 | B1 |
7111065 | Davidson et al. | Sep 2006 | B2 |
7117258 | Lee et al. | Oct 2006 | B2 |
7165258 | Kuik et al. | Jan 2007 | B1 |
7197585 | Farrell et al. | Mar 2007 | B2 |
7254119 | Jiang et al. | Aug 2007 | B2 |
7298702 | Jones et al. | Nov 2007 | B1 |
7349412 | Jones et al. | Mar 2008 | B1 |
7373661 | Smith et al. | May 2008 | B2 |
7383327 | Tormasov et al. | Jun 2008 | B1 |
7383374 | Yamada et al. | Jun 2008 | B2 |
7437477 | Kuik et al. | Oct 2008 | B2 |
7478173 | Delco | Jan 2009 | B1 |
7489659 | Siorpaes et al. | Feb 2009 | B2 |
7515589 | Bacher et al. | Apr 2009 | B2 |
7529867 | McCrory et al. | May 2009 | B2 |
7554967 | Varadhan et al. | Jun 2009 | B1 |
7577722 | Khandekar et al. | Aug 2009 | B1 |
7633909 | Jones et al. | Dec 2009 | B1 |
7660322 | Kiel et al. | Feb 2010 | B2 |
7778189 | Valli et al. | Aug 2010 | B2 |
7793307 | Gokhale et al. | Sep 2010 | B2 |
7802000 | Huang et al. | Sep 2010 | B1 |
7873012 | Sadot et al. | Jan 2011 | B2 |
20040249960 | Hardy et al. | Dec 2004 | A1 |
20050120247 | Barrett | Jun 2005 | A1 |
20060045089 | Bacher et al. | Mar 2006 | A1 |
20060106939 | Cha et al. | May 2006 | A1 |
20070064661 | Sood et al. | Mar 2007 | A1 |
20070079307 | Dhawan et al. | Apr 2007 | A1 |
20070101323 | Foley et al. | May 2007 | A1 |
20070201490 | Mahamuni | Aug 2007 | A1 |
20070223489 | Larson et al. | Sep 2007 | A1 |
20070248085 | Volpano | Oct 2007 | A1 |
20080059556 | Greenspan et al. | Mar 2008 | A1 |
20080080519 | Park et al. | Apr 2008 | A1 |
20080086725 | Boss et al. | Apr 2008 | A1 |
20080133208 | Stringham | Jun 2008 | A1 |
20080147925 | Brahmaroutu | Jun 2008 | A1 |
20080155208 | Hiltgen et al. | Jun 2008 | A1 |
20080163211 | Mizuno | Jul 2008 | A1 |
20080295095 | Watanabe et al. | Nov 2008 | A1 |
20080320594 | Jiang | Dec 2008 | A1 |
20090003828 | So | Jan 2009 | A1 |
20090077552 | Sekiguchi et al. | Mar 2009 | A1 |
20090106405 | Mazarick et al. | Apr 2009 | A1 |
20090113073 | Koide et al. | Apr 2009 | A1 |
20090125901 | Swanson | May 2009 | A1 |
20090125902 | Ghosh et al. | May 2009 | A1 |
20090150463 | Sekiguchi et al. | Jun 2009 | A1 |
20090204964 | Foley et al. | Aug 2009 | A1 |
20090210427 | Eidler et al. | Aug 2009 | A1 |
20090216970 | Basler et al. | Aug 2009 | A1 |
20090228629 | Gebhart et al. | Sep 2009 | A1 |
20100094990 | Ben-Yehuda et al. | Apr 2010 | A1 |
20100095297 | Sethi et al. | Apr 2010 | A1 |
20100100878 | Otani | Apr 2010 | A1 |
20100125667 | Soundararajan | May 2010 | A1 |
20100180014 | Kannan et al. | Jul 2010 | A1 |
20100199277 | Galal et al. | Aug 2010 | A1 |
Number | Date | Country |
---|---|---|
WO 9805146 | Feb 1998 | WO |
WO 2006104324 | Oct 2006 | WO |
Number | Date | Country | |
---|---|---|---|
20100180014 A1 | Jul 2010 | US |