System and Method for File Injection in Virtual Machine Configuration
First Claim
1. A method for virtual machine file injection, comprising:
- receiving a request for a first image having an operating system and a first set of injected files for a virtual machine;
comparing the first set of injected files with second sets of injected files in second images stored on a non-transitory computer readable medium; and
transmitting, in response to the first set of injected files and second set of injected files not exactly matching, a nearest non-complete candidate image and third files from the first set of injected files that are not in the second set of injected files of the nearest non-complete candidate image.
1 Assignment
0 Petitions
Accused Products
Abstract
An embodiment method for virtual machine file injection includes receiving a request for a first image having an operating system and a first set of injected files for a virtual machine. The first set of injected files is compared with second sets of injected files in second images stored on a non-transitory computer readable medium. In response to the first set and second set of injected files not exactly matching, a nearest non-complete candidate image and third files are transmitted, with the third files being files from the first set of injected files that are not in the second set of injected files of the nearest non-complete candidate image.
-
Citations
20 Claims
-
1. A method for virtual machine file injection, comprising:
-
receiving a request for a first image having an operating system and a first set of injected files for a virtual machine; comparing the first set of injected files with second sets of injected files in second images stored on a non-transitory computer readable medium; and transmitting, in response to the first set of injected files and second set of injected files not exactly matching, a nearest non-complete candidate image and third files from the first set of injected files that are not in the second set of injected files of the nearest non-complete candidate image. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for virtual machine file injection comprising:
-
sending a request to an image service, wherein the request identifies a first image of an operating system and a first set of files; receiving, from the image service, a nearest non-complete candidate image and second files, wherein the second files are files from the first set files that are not in the nearest non-complete candidate image; starting the nearest non-complete candidate image as a first virtual machine on a cloud computing platform; and modifying the nearest non-complete candidate image with the second files to form a second image. - View Dependent Claims (11, 12, 13, 14)
-
-
15. A system comprising:
an image service device comprising a first processor and a first non-transitory computer readable medium connected to the first processor and having stored thereon instructions for causing the first processor to; receive a request for a first image identifying an operating system and a first set of files that are not part of the operating system; access one or more second images stored on a second non-transitory computer readable medium; compare the first set of files with a second set of files in each of the second images; determine whether one or more the second sets of files matches the first set of files; and transmit, in response to none of the second sets of files matching the first set of files, a nearest non-complete candidate image and third files, wherein the third files are files from the first set of files that are not in the second set of files of the nearest non-complete candidate image. - View Dependent Claims (16, 17, 18, 19, 20)
Specification