VIRTUAL MACHINE PLACEMENT
First Claim
1. A method comprising:
- determining, by a processor, a shared threat potential for a virtual machine based, at least in part, on a degree of co-location the virtual machine has with a current virtual machine operating on a physical machine;
determining, by the processor, a workload threat potential for the virtual machine based, at least in part, on a level of advantage associated with placing the virtual machine on the physical machine;
determining, by the processor, a threat potential for the virtual machine based, at least in part, on a combination of the shared threat potential and the workload threat potential; and
placing, by the processor, the virtual machine on the physical machine based on the threat potential.
3 Assignments
0 Petitions
Accused Products
Abstract
Technologies for virtual machine placement within a data center are described herein. An example method may include determining a shared threat potential for a virtual machine based, at least in part, on a degree of co-location the virtual machine has with a current virtual machine operating on a physical machine, determining a workload threat potential for the virtual machine based, at least in part, on a level of advantage associated with placing the virtual machine on the physical machine, determining a threat potential for the virtual machine based, at least in part, on a combination of the shared threat potential and the workload threat potential, and placing the virtual machine on the physical machine based on the threat potential.
97 Citations
24 Claims
-
1. A method comprising:
-
determining, by a processor, a shared threat potential for a virtual machine based, at least in part, on a degree of co-location the virtual machine has with a current virtual machine operating on a physical machine; determining, by the processor, a workload threat potential for the virtual machine based, at least in part, on a level of advantage associated with placing the virtual machine on the physical machine; determining, by the processor, a threat potential for the virtual machine based, at least in part, on a combination of the shared threat potential and the workload threat potential; and placing, by the processor, the virtual machine on the physical machine based on the threat potential. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory, computer-readable medium that includes computer executable instructions stored thereon to perform a virtual machine placement procedure, the procedure comprising:
-
identify a plurality of physical machines; determine a shared threat potential for placing the virtual machine on each of the plurality of physical machines; determine a threat potential associated with placing the virtual machine on each of the plurality of physical machines based on the respective shared threat potential and an advantage of placing the virtual machine on each of the plurality of physical machines; and place the virtual machine on a selected physical machine of the plurality of physical machines based on the respective threat potential. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A method, comprising:
-
receiving, at a virtual machine placement system, an identification of a virtual machine to place into a data center including a plurality of physical machines coupled to a virtual machine placement interface; determining, by the virtual machine placement system, a plurality of available physical machines to place the virtual machine based, at least in part, on a profile of the virtual machine; estimating, by the virtual machine placement system, a respective risk level for placing the virtual machine with each of the plurality of available physical machines; and placing, by the virtual machine placement system, the virtual machine on a physical machine of the plurality of available physical machines based on the respective risk level. - View Dependent Claims (18, 19, 20)
-
-
21. A virtual machine placement system comprising at least one processing unit and at least one computer executable media encoded with instructions, the instructions comprising instructions causing the at least one processing unit to:
-
determine a plurality of available physical machines on which a virtual machine may be placed; determine a shared threat potential for placing the virtual machine on each of the plurality of available physical machines; determine a threat potential associated with placing the virtual machine on each of the plurality of available physical machines based on the respective shared threat potential and an advantage of placing the virtual machine on each of the plurality of available physical machines; and place the virtual machine on an available physical machine based on the respective threat potential. - View Dependent Claims (22, 23, 24)
-
Specification