Management of a virtual machine in a virtualized computing environment based on a fabric limit

ABSTRACT

An apparatus and program product manage virtual machines in a virtualized computing environment based at least in part on limitations associated with storage fabrics through which virtual machines may access one or more storage systems in such an environment. The storage fabric limitations may be used, for example, in connection with placing virtual machines on hosts in a virtualized computing environment. As another example, storage fabric limitations may be used in connection with deploying virtual machines into a virtualized computing environment to reduce the likelihood of boot errors. As still another example, storage fabric limitations may be used in connection with load balancing across multiple fabrics in a virtualized computing environment.

FIELD OF THE INVENTION

The invention is generally related to computers and computer software,and in particular, to logically-partitioned and virtualized computingenvironments.

BACKGROUND OF THE INVENTION

Computing technology has advanced at a remarkable pace, with eachsubsequent generation of computing system increasing in performance,functionality, and storage capacity, often at reduced cost. In addition,workload allocation of computing and other hardware resources is oftenemployed to maximize the utilization of hardware resources such asprocessors, memories, networks, storage devices, etc., and therebyreduce the overall costs necessary for supporting a desired workloadcapacity. Optimizing workload allocation can also have a positive impacton power costs and environmental concerns due to a reduction in theamount of hardware resources required to support a given workload.

Many computer systems employ virtualization, also referred to as logicalpartitioning, which enables a computer be utilized to run severaloperating environments, or operating systems, at once. In a typicalembodiment, a single physical computer or data processing system can runa plurality of operating systems in a corresponding plurality of virtualmachines (VMs), also referred to as logical partitions (VMs). Eachoperating system resides in its own virtual machine, with each virtualmachine allocated a part of a physical processor, an entire physicalprocessor, or multiple physical processors from the computer.Additionally, a portion of the computer's memory may be allocated toeach virtual machine. An underlying partition manager, often referred toas a hypervisor or virtual machine monitor (VMM), manages and controlsthe virtual machines. The hypervisor is typically a part of the systemfirmware and manages the allocation of resources to the operatingsystems and virtual machines. As such, one physical computer may run oneor more virtual machines and thus virtualize the underlying hardwareresources used by the applications, operating systems, and other programcode configured to operate in those virtual machines.

Virtualization is increasingly used in data centers and cloud computingapplications, which may provide for cost efficiencies through elasticcomputing, whereby hardware resources are provisioned and de-provisionedbased on workload changes. In such applications, individual workloadsmay change over time, and as such virtualization may be employed toeffectively multiplex hardware resources over multiple workloads toprovide an overall greater resource utilization. In order to balancecosts, an assumption may be made that not all workloads will run withmaximum resource requirements at the same time, so fewer hardwareresources than the sum of all maximum resource requirements forworkloads may be allocated for a given set of workflows, resulting inthe hardware resources being overcommitted. As one example, a cloudprovider may allocate more virtual processors (CPUs) across multiplevirtual machines on a particular host computer under the assumption thatsome of the virtual machines will only run at off-peak hours when othervirtual machines are shut down or otherwise deactivated.

Some data centers and cloud computing applications may also support thevirtualization of other types of hardware resources, such as storagedevices and networks, which may enable virtual machines to accessvirtual networks and/or storage devices, and with the particulars of theunderlying hardware supporting such virtual entities managed in a mannerthat is effectively hidden from the virtual machines. The allocation ofsuch hardware resources to virtual machines may also impact performanceand efficiency, as overloading networks and/or storage devices can leadto slow response times, and in some instances, to an inability of avirtual machine to connect to an underlying hardware resource.

SUMMARY OF THE INVENTION

The invention addresses these and other problems associated with theprior art by providing a method, apparatus and program product thatmanage virtual machines in a virtualized computing environment based atleast in part on limitations associated with storage fabrics throughwhich virtual machines may access one or more storage systems in such anenvironment. The storage fabric limitations, referred to herein asfabric limits, may be used, for example, in connection with placingvirtual machines on hosts in a virtualized computing environment. Asanother example, fabric limits may be used in connection with deployingvirtual machines into a virtualized computing environment to reduce thelikelihood of boot errors. As still another example, fabric limits maybe used in connection with load balancing across multiple fabrics in avirtualized computing environment.

Therefore, consistent with one aspect of the invention, virtualizationin a computing environment of the type including one or more fabricscoupling a plurality of hosts to one or more storage systems may bemanaged by determining a fabric limit for a limited fabric resource of afirst fabric among the one or more fabrics, determining an allocation ofthe limited fabric resource for the first fabric, and controllingplacement of a virtual machine on a first host among the plurality ofhosts using at least one processor based at least in part upon thedetermined fabric limit and determined allocation of the limited fabricresource for the first fabric.

These and other advantages and features, which characterize theinvention, are set forth in the claims annexed hereto and forming afurther part hereof. However, for a better understanding of theinvention, and of the advantages and objectives attained through itsuse, reference should be made to the Drawings, and to the accompanyingdescriptive matter, in which there is described exemplary embodiments ofthe invention.

BRIEF DESCRIPTION OF THE DRAWINGS

FIGS. 1A and 1B are block diagrams of an example hardware (FIG. 1A) andsoftware (FIG. 1B) environment suitable for implementing a virtualizedcomputing environment consistent with the invention.

FIG. 2 is a block diagram of an example virtualized computingenvironment in which a plurality of hosts are coupled to a storage areanetwork (SAN) through a Fibre Channel-based storage fabric.

FIG. 3 is a flowchart illustrating an example deploy virtual machineroutine that may be performed by the virtualized computing environmentof FIG. 2.

FIG. 4 is a flowchart illustrating an example implementation of theplace virtual machine routine referenced in FIG. 3.

FIG. 5 is a flowchart illustrating an example implementation of the bootvirtual machine routine referenced in FIG. 3.

FIG. 6 is a flowchart illustrating an example delayed boot monitorroutine that may be performed by the virtualized computing environmentof FIG. 2.

FIG. 7 is a flowchart illustrating an example load balancing routinethat may be performed by the virtualized computing environment of FIG.2.

DETAILED DESCRIPTION

Embodiments consistent with the invention may manage virtualization in avirtualized or logically-partitioned computing environment of the typeincluding one or more fabrics coupling a plurality of hosts to one ormore storage systems based in part on a fabric limit for a limitedfabric resource such as an active fabric login limit.

A virtualized or logically-partitioned computing environment, in thisregard, may be considered to include one or more computers or dataprocessing systems supporting logical partitioning or virtualization,with at least some of the data processing systems incorporating one ormore processor nodes representing hardware resources capable of hostingone or more virtual machines. A host, in this regard, may therefore beconsidered to include any subset of the available hardware resources ina data processing system capable of hosting a virtual machine, andgenerally, though not necessarily, includes one or more processors, oneor more memory devices, and in some instances additional hardwareresources such as input/output (I/O) resources, network resources, orother types of resources capable of being allocated to a virtualmachine. Hosts in some embodiments may be implemented as multi-chipmodules, circuit boards or cards, books, drawers, racks, slots, chassis,or even combinations thereof. Hosts may also be self-contained computersystems and/or multiple networked computer systems in some embodiments.Furthermore, hosts may be nested in some embodiments. In general, anycombination of hardware resources in a virtualized computing environmentcapable of hosting a virtual machine may be considered a host for thepurposes of the disclosure herein.

In addition, a virtualized computing environment in the illustratedembodiments includes one or more storage systems accessible via one ormore storage fabrics. A storage system may include one or more storagedevices upon which data may be stored and/or retrieved by a virtualmachine, while a storage fabric may be considered to incorporate one ormore networks, buses, or other communication links coupling one or moredata processing systems with one or more storage systems. Further, astorage fabric may also include one or more hardware components capableof arbitrating access to a storage system or otherwise routingcommunications between data processing systems and storage systems,e.g., one or more network switches.

In the illustrated embodiment discussed hereinafter, a storage systemand storage fabric may be collectively implemented using a FibreChannel-based Storage Area Network (SAN), whereby the storage fabric maybe implemented using a Fibre Channel Switched Fabric (FC-SW) topologyincorporating one or more Fibre Channel-compatible switches. It will beappreciated, however, that other storage systems and/or storage fabricsmay be used in other embodiments, as well as that multiple types ofstorage systems and/or storage fabrics may be incorporated into the samevirtualized environment.

As noted above, in embodiments consistent with the invention, storagefabric limitations, referred to herein as fabric limits, may be used inconnection with the placement, deployment and/or allocation of one ormore virtual machines, such that the availability of limited fabricresources may be considered when making such decisions. A limited fabricresource, in this regard, may be considered to be related to therelative load and/or capacity of a storage fabric, and a fabric limitmay be considered to be a limitation placed upon an associated limitedfabric resource. In a Fibre Channel-based SAN, for example, a limitedfabric resource may be an active login to a fabric switch, and a fabriclimit may be an active fabric login limit for a fabric switch, e.g.,limits on active fabric logins (FLOGIs) and/or active fabric discoveries(FDISCs) in the case of N_Port ID Virtualization (NPIV). Other types offabric limits may be associated with both Fibre Channel-based SANs aswell as other types of storage fabrics, e.g., numbers of logins, numbersof virtual machines, numbers of accounts, zone limits such as numbers ofzone members or numbers of zones, host limits such as numbers of hostsconnected to a storage system, numbers of virtual storage area networks(VSANs) per physical fabric, numbers of host ports per storage system,maximum simultaneous IOs, etc.

As will also become more apparent below, in some embodiments a fabriclimit may be modified or adjusted by a fabric overcommit parameter suchas a fabric overcommit ratio and used to adjust a fabric capacity andthereby overcommit a limited fabric resource, e.g., a number of activefabric logins supported by a Fibre Channel switch.

Therefore, fabric limits may be used in some embodiments to assist inoptimally placing virtual machines on hosts. In some embodiments, forexample, virtualization in a computing environment of the type includingone or more fabrics coupling a plurality of hosts to one or more storagesystems may be managed by determining a fabric limit for a limitedfabric resource of a first fabric among the one or more fabrics,determining an allocation of the limited fabric resource for the firstfabric, and controlling placement of a virtual machine on a first hostamong the plurality of hosts using at least one processor based at leastin part upon the determined fabric limit and determined allocation ofthe limited fabric resource for the first fabric.

In some embodiments, the fabric includes a Fibre Channel switch, and thefabric limit is an active Fabric Login (FLOGI) limit, an active FabricDiscovery (FDISC) limit, a zone limit, or a host limit. In addition, insome embodiments, the limited fabric resource comprises a fabric loginfor a storage switch in the first fabric, and the fabric limit comprisesan active login limit of the storage switch. Further, in someembodiments, determining the fabric limit comprises querying the storageswitch to retrieve the fabric limit, and in some embodiments,determining the allocation of the limited fabric resource comprisesaccessing the storage switch to retrieve a current allocation of fabriclogins for the storage switch. In some embodiments, determining theallocation of the limited fabric resource comprises tracking activefabric logins in the computing environment, and some embodiments includedetermining an overcommitted fabric capacity for the first fabric fromthe fabric limit, where controlling placement of the virtual machine onthe host is based at least in part on the determined overcommittedfabric capacity for the first fabric. In some embodiments, determiningthe overcommitted fabric capacity includes adjusting the fabric limit bya fabric overcommit ratio, while in some embodiments, setting the fabricovercommit ratio is performed in response to user input.

In some embodiments, controlling placement of the virtual machine on thefirst host includes determining a plurality of candidate host, fabricand storage system combinations from among the plurality of hosts, oneor more fabrics and one or more storage systems, scoring each of theplurality of candidate host, fabric and storage system combinationsbased at least in part on the determined fabric limit and determinedallocation of the limited fabric resource for the first fabric, andplacing the virtual machine on the first host based upon a score of afirst candidate host, fabric and storage system combination includingthe first host.

In some embodiments, scoring each of the plurality of candidate host,fabric and storage system combinations is further based at least in parton one or more of a host processor capacity, a host memory capacity,network capacity, or a storage system capacity, and in some embodiments,determining the plurality of candidate host, fabric and storage systemcombinations is based upon at least one requirement of the virtualmachine. Some embodiments also include selecting an alternate fabric oralternate storage access technology for the virtual machine in responseto determining a lack of capacity in the first fabric. Further, in someembodiments, controlling placement of the virtual machine on the firsthost includes deploying the virtual machine on the first host.

Furthermore, fabric limits may be used in connection with deployingvirtual machines on hosts to reduce the likelihood of boot errors. Insome embodiments, for example, a virtual machine may be deployed on ahost in a computing environment of the type including a fabric couplingthe host to a storage system, by, in response to initiation of adeployment of the virtual machine, and using at least one processor,determining, for a storage volume allocated for the virtual machine onthe storage system, an allocation of a limited fabric resource of thefabric, determining, based upon the determined allocation, whether thefabric has capacity to boot the virtual machine, in response todetermining that the fabric has sufficient capacity to boot the virtualmachine, initiating a boot of the virtual machine on the host, and inresponse to determining that the fabric does not have sufficientcapacity to boot the virtual machine, delaying the boot of the virtualmachine on the host.

In some embodiments, the fabric includes a Fibre Channel switch, and thefabric limit is an active Fabric Login (FLOGI) limit, an active FabricDiscovery (FDISC) limit, a zone limit, or a host limit. Further, in someembodiments, determining whether the fabric has capacity to boot thevirtual machine includes determining a fabric limit for the limitedfabric resource, and in some embodiments, the limited fabric resourcecomprises a fabric login for a storage switch in the fabric, and thefabric limit comprises an active login limit of the storage switch. Insome embodiments, determining the fabric limit comprises querying thestorage switch to retrieve the fabric limit, and in some embodiments,determining the allocation of the limited fabric resource comprisesaccessing the storage switch to retrieve a current allocation of fabriclogins for the storage switch.

In some embodiments, determining the allocation of the limited fabricresource comprises tracking active fabric logins in the computingenvironment, and in some embodiments, delaying the boot of the virtualmachine on the host includes queuing the virtual machine, with suchembodiments further including, after queuing the virtual machine,determining, for a storage volume allocated for the virtual machine onthe storage system, whether the fabric has capacity to boot the queuedvirtual machine, and in response to determining that the fabric hascapacity to boot the queued virtual machine, dequeuing the queuedvirtual machine and initiating the boot of the queued virtual machine onthe host. In some embodiments, determining whether the fabric hascapacity to boot the queued virtual machine, dequeuing the queuedvirtual machine and initiating the boot of the queued virtual machine onthe host are performed by a monitor process. In some embodiments, thequeued virtual machine is among a plurality of queued virtual machines,and such embodiments further include prioritizing an order of theplurality of queued virtual machines to be booted once the fabric hascapacity to boot at least one of the plurality of queued virtualmachines.

In some embodiments, the storage volume comprises a boot volume, and insome embodiments, the virtual machine further includes a data volumeallocated thereto, and determining whether the fabric has capacity toboot the virtual machine further includes determining whether the fabrichas capacity to connect the virtual machine to the data volume. In someembodiments, determining whether the fabric has capacity to boot thevirtual machine further includes determining from a configurationsetting whether boot of the virtual machine is permitted when the fabricdoes not have capacity to connect the virtual machine to the datavolume, and in some embodiments, the host is among a plurality of aplurality of hosts in the computing environment, determining whether thefabric has capacity to boot the virtual machine is performed in responseto an instruction to boot the virtual machine, and such embodimentsfurther include, prior to the instruction to boot the virtual machine,placing the virtual machine on the host, creating the virtual machine,and copying an image for the virtual machine to the storage volume.

Fabric limits may also be used in connection with load balancing acrossfabrics. For example, in some embodiments, load balancing may beperformed in a computing environment of the type including a pluralityof fabrics coupling a plurality of hosts to one or more storage systemsby determining a fabric limit for a limited fabric resource of each ofthe plurality of fabrics, determining an allocation of the limitedfabric resource for each of the plurality of fabrics, and balancingutilization of the limited fabric resource across the plurality offabrics using at least one processor based at least in part upon thedetermined fabric limits and determined allocations of the limitedfabric resource for the plurality of fabrics, where balancingutilization of the limited fabric resource includes migrating at leastone virtual machine that utilizes a first fabric among the plurality offabrics to use a second fabric among the plurality of fabrics.

In some embodiments, the fabric includes a Fibre Channel switch, andwherein the fabric limit is an active Fabric Login (FLOGI) limit, anactive Fabric Discovery (FDISC) limit, a zone limit, or a host limit,and in some embodiments, the limited fabric resource comprises a fabriclogin for a storage switch in the first fabric, and wherein the fabriclimit comprises an active login limit of the storage switch. In someembodiments, determining the fabric limit comprises querying the storageswitch to retrieve the fabric limit, in some embodiments, determiningthe allocation of the limited fabric resource comprises accessing thestorage switch to retrieve a current allocation of fabric logins for thestorage switch, and in some embodiments, determining the allocation ofthe limited fabric resource comprises tracking active fabric logins inthe computing environment.

Some embodiments include determining an overcommitted fabric capacityfor each of the plurality of fabrics from the fabric limits, wherebalancing utilization of the limited fabric resource across theplurality of fabrics is based at least in part on the determinedovercommitted fabric capacity for each of the plurality of fabrics. Inaddition, in some embodiments, determining the overcommitted fabriccapacity includes adjusting the fabric limit by a fabric overcommitratio.

In some embodiments, migrating at least one virtual machine thatutilizes a first fabric among the plurality of fabrics to use a secondfabric among the plurality of fabrics includes, for a first virtualmachine powering down the first virtual machine, reconfiguring the firstvirtual machine to utilize the second fabric instead of the firstfabric, and powering up the first virtual machine such that the firstvirtual machine utilizes the second fabric instead of the first fabric.Further, in some embodiments, balancing utilization of the limitedfabric resource across the plurality of fabrics further comprisesmigrating at least one virtual machine to an alternate storage accesstechnology to free up fabric resources on at least one of the pluralityof fabrics. In some embodiments, migrating the at least one virtualmachine to the alternate storage access technology is based at least inpart on the at least one virtual machine having a low priority, and insome embodiments, the fabric comprises a Fibre Channel-based network,and wherein the alternate storage access technology comprises vSCSI.

In some embodiments, determining the fabric limit, determining theallocation of the limited fabric resource, and balancing utilization ofthe limited fabric resource across the plurality of fabrics areperformed periodically, while in some embodiments, determining thefabric limit, determining the allocation of the limited fabric resource,and balancing utilization of the limited fabric resource across theplurality of fabrics are performed in response to a virtual machinedeployment operation performed when at least one fabric lacks capacity.

In addition, some embodiments include an apparatus with at least oneprocessor and program code configured upon execution by the at least oneprocessor to perform any of the aforementioned methods. Some embodimentsalso include a program product including a non-transitory computerreadable medium and program code stored on the non-transitory computerreadable medium and configured upon execution by at least one processorto perform any of the aforementioned methods.

Numerous variations and modifications will be apparent to one ofordinary skill in the art, as will become apparent from the descriptionbelow. Therefore, the invention is not limited to the specificimplementations discussed herein.

Hardware and Software Environment

Turning to the Drawings, wherein like parts denote like numbersthroughout the several views, FIGS. 1A-1B illustrate the principalhardware and software components in a virtualized computing environmentor apparatus 10 consistent with the invention. As shown in FIG. 1A,apparatus 10 may include a multi-node data processing system 12 wherethe physical hardware is distributed among a plurality of physicalprocessor nodes 14 disposed in a plurality of computer systems 16, withthe computer systems 16 disposed in one or more pools 18. Each processornode 14 includes one or more processors 20, one or more memory devices22, and in some embodiments, additional hardware such as input/output(I/O) hardware 24 (e.g., one or more input/output (I/O) adapters) and/ornetworking hardware 26. Appropriate networking functionality (not shown)may also be used to provide data communication between the variousprocessor nodes 14 and computer systems 16, as well as other externalsystems.

Apparatus 10 may be implemented using any of a number of differentarchitectures suitable for implementing a virtualized environment. Forexample, in one embodiment, apparatus 10 may include one or more of aPower 770, 780 or 795 system available from International BusinessMachines Corporation, the configuration of which will be apparent to oneof ordinary skill in the art having the benefit of the instantdisclosure. It will be appreciated, however, that other architecturessuitable for executing virtualized environments may be used in otherembodiments of the invention, so the invention is not limited to theparticular architecture disclosed herein.

Each processor 20 may be implemented as a single or multi-threadedprocessor and/or as a single or multi-core processor, while each memory22 may be considered to include one or more levels of memory devices,e.g., a DRAM-based main storage, as well as one or more levels of data,instruction and/or combination caches, with certain caches eitherserving individual processors or multiple processors as is well known inthe art. In addition, the memory of apparatus 10 may be considered toinclude memory storage physically located elsewhere in apparatus 10,e.g., any cache memory in a processor, as well as any storage capacityused as a virtual memory, e.g., as stored on a mass storage device or onanother computer coupled to apparatus 10.

Apparatus 10 operates under the control of one or more kernels,hypervisors, operating systems, etc., and executes or otherwise reliesupon various computer software applications, components, programs,objects, modules, data structures, etc., as will be described in greaterdetail below. Moreover, various applications, components, programs,objects, modules, etc. may also execute on one or more processors inanother computer coupled to apparatus 10 via network, e.g., in adistributed or client-server computing environment, whereby theprocessing required to implement the functions of a computer program maybe allocated to multiple computers over a network.

For example, FIG. 1B illustrates various software components 28-42 thatmay be resident within a system 16 in apparatus 10. A hypervisor orvirtual machine monitor (VMM) 28 may host one or more virtual machines(VMs) 30 and may allocate to each virtual machine 30 a portion of thephysical hardware resources of system 16 (e.g., processor, memory and/orIO resources associated with one or more processor nodes 14),represented here by one or more virtual processors (VPs) 32, a virtualmemory (VMem) 34 and virtual input/output (VIO) resources 36. Eachvirtual machine 30 may in turn host an operating system 38 andoptionally middleware 40, as well as one or more jobs and/orapplications 42. It will be appreciated that each virtual machine 30,which may also be referred to as a logical partition, virtual server orvirtual computer, may operate in a manner that emulates a separatephysical computer, and as such, may host practically any softwarecomponents capable of being hosted by a computer.

Additional hardware and/or software components may also be resident inapparatus 10, e.g., mass storage hardware, external input/output devicessuch as printers or displays, and management hardware and/or software,e.g., a hardware management console (HMC) through which the hardwareand/or software configuration of the apparatus may be managed by anadministrator. Further, in the illustrated embodiments, connectivity toone or more external networks 44 may also be supported, as mayconnectivity to one or more storage systems 46 through one or morestorage fabrics 48. Virtualized environments may be implemented in aninnumerable number of manners, and may include an innumerable number ofhardware and/or software variations, and as such, the invention is notlimited to the particular implementation disclosed herein.

It will be appreciated that the present invention may be a system, amethod, and/or a computer program product. The computer program productmay include a computer readable storage medium (or media) havingcomputer readable program instructions thereon for causing one or moreprocessors to carry out aspects of the present invention.

The computer readable storage medium can be a tangible device that canretain and store instructions for use by an instruction executiondevice. The computer readable storage medium may be, for example, but isnot limited to, an electronic storage device, a magnetic storage device,an optical storage device, an electromagnetic storage device, asemiconductor storage device, or any suitable combination of theforegoing. A non-exhaustive list of more specific examples of thecomputer readable storage medium includes the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a static random access memory (SRAM), a portablecompact disc read-only memory (CD-ROM), a digital versatile disk (DVD),a memory stick, a floppy disk, a mechanically encoded device such aspunch-cards or raised structures in a groove having instructionsrecorded thereon, and any suitable combination of the foregoing. Acomputer readable storage medium, as used herein, is not to be construedas being transitory signals per se, such as radio waves or other freelypropagating electromagnetic waves, electromagnetic waves propagatingthrough a waveguide or other transmission media (e.g., light pulsespassing through a fiber-optic cable), or electrical signals transmittedthrough a wire.

Computer readable program instructions described herein can bedownloaded to respective computing/processing devices from a computerreadable storage medium or to an external computer or external storagedevice via a network, for example, the Internet, a local area network, awide area network and/or a wireless network. The network may comprisecopper transmission cables, optical transmission fibers, wirelesstransmission, routers, firewalls, switches, gateway computers and/oredge servers. A network adapter card or network interface in eachcomputing/processing device receives computer readable programinstructions from the network and forwards the computer readable programinstructions for storage in a computer readable storage medium withinthe respective computing/processing device.

Computer readable program instructions for carrying out operations ofthe present invention may be assembler instructions,instruction-set-architecture (ISA) instructions, machine instructions,machine dependent instructions, microcode, firmware instructions,state-setting data, or either source code or object code written in anycombination of one or more programming languages, including an objectoriented programming language such as Java, Smalltalk, C++ or the like,and conventional procedural programming languages, such as the “C”programming language or similar programming languages. The computerreadable program instructions may execute entirely on the user'scomputer, partly on the user's computer, as a stand-alone softwarepackage, partly on the user's computer and partly on a remote computeror entirely on the remote computer or server. In the latter scenario,the remote computer may be connected to the user's computer through anytype of network, including a local area network (LAN) or a wide areanetwork (WAN), or the connection may be made to an external computer(for example, through the Internet using an Internet Service Provider).In some embodiments, electronic circuitry including, for example,programmable logic circuitry, field-programmable gate arrays (FPGA), orprogrammable logic arrays (PLA) may execute the computer readableprogram instructions by utilizing state information of the computerreadable program instructions to personalize the electronic circuitry,in order to perform aspects of the present invention.

Aspects of the present invention are described herein with reference toflowchart illustrations and/or block diagrams of methods, apparatus(systems), and computer program products according to embodiments of theinvention. It will be understood that each block of the flowchartillustrations and/or block diagrams, and combinations of blocks in theflowchart illustrations and/or block diagrams, can be implemented bycomputer readable program instructions.

These computer readable program instructions may be provided to aprocessor of a general purpose computer, special purpose computer, orother programmable data processing apparatus to produce a machine, suchthat the instructions, which execute via the processor of the computeror other programmable data processing apparatus, create means forimplementing the functions/acts specified in the flowchart and/or blockdiagram block or blocks. These computer readable program instructionsmay also be stored in a computer readable storage medium that can directa computer, a programmable data processing apparatus, and/or otherdevices to function in a particular manner, such that the computerreadable storage medium having instructions stored therein comprises anarticle of manufacture including instructions which implement aspects ofthe function/act specified in the flowchart and/or block diagram blockor blocks.

The computer readable program instructions may also be loaded onto acomputer, other programmable data processing apparatus, or other deviceto cause a series of operational steps to be performed on the computer,other programmable apparatus or other device to produce a computerimplemented process, such that the instructions which execute on thecomputer, other programmable apparatus, or other device implement thefunctions/acts specified in the flowchart and/or block diagram block orblocks.

The flowchart and block diagrams in the drawings illustrate thearchitecture, functionality, and operation of possible implementationsof systems, methods, and computer program products according to variousembodiments of the present invention. In this regard, each block in theflowchart or block diagrams may represent a module, segment, or portionof instructions, which comprises one or more executable instructions forimplementing the specified logical function(s). In some alternativeimplementations, the functions noted in the block may occur out of theorder noted in the figures. For example, two blocks shown in successionmay, in fact, be executed substantially concurrently, or the blocks maysometimes be executed in the reverse order, depending upon thefunctionality involved. It will also be noted that each block of theblock diagrams and/or flowchart illustration, and combinations of blocksin the block diagrams and/or flowchart illustration, can be implementedby special purpose hardware-based systems that perform the specifiedfunctions or acts or carry out combinations of special purpose hardwareand computer instructions.

In addition, computer readable program instructions, of which one ormore may collectively be referred to herein as “program code,” may beidentified herein based upon the application within which suchinstructions are implemented in a specific embodiment of the invention.However, it should be appreciated that any particular programnomenclature that follows is used merely for convenience, and thus theinvention should not be limited to use solely in any specificapplication identified and/or implied by such nomenclature. Furthermore,given the typically endless number of manners in which computer programsmay be organized into routines, procedures, methods, modules, objects,and the like, as well as the various manners in which programfunctionality may be allocated among various software layers that areresident within a typical computer (e.g., operating systems, libraries,API's, applications, applets, etc.), it should be appreciated that theinvention is not limited to the specific organization and allocation ofprogram functionality described herein.

Those skilled in the art will recognize that the example environmentillustrated in FIGS. 1A-1B is not intended to limit the presentinvention. Indeed, those skilled in the art will recognize that otheralternative hardware and/or software environments may be used withoutdeparting from the scope of the invention.

Virtual Machine Management Based on Fabric Limit

When a server connects to a storage system in a Fiber Channel-based SAN,a fabric login (FLOGI) is generally performed on a fabric switch. Afabric login is conceptually similar to obtaining an IP address from aDHCP server. Similarly, when a virtual server connects to a storagesystem in a SAN, e.g., using N_Port ID Virtualization (NPIV), a loginoperation similar to a FLOGI and referred to as a Fabric Discovery(FDISC), may be performed. NPIV may be used, for example, to assignstorage to virtual machines directly. Fabric switches may havelimitations on the number of active FLOGIs and FDISCs, and generally themaximum number of active fabric logins (FLOGI and/or FDISC) is much lessthan the number of zone members the switch can handle. For example, somecommercially-available fabric switches have a limit of 400 active FLOGIsor FDISC, despite supporting up to 16,000 zone members functioning ashosts or storage devices on the fabric. As such, a fabric switchgenerally may have many more hosts and storage devices configured to theswitch than can be actively communicating through the switch at a giventime.

When virtualization is employed, fabric limitations may present uniquedifficulties. In particular, in some applications, if a fabric switchactive login limit (e.g., a limit on the number of active FLOGIs and/orFDISCs) is exceeded, a virtual machine may not be able to connect to astorage volume, and if the storage volume happens to be a boot disk, thevirtual machine may fail when attempting to boot.

In some virtualized environments, virtual machine images are created toinclude logic to perform an initial sequence of operations when avirtual machine first boots. This initial sequence may performoperations such as assigning hostnames and IP addresses to the virtualmachine and setting credentials. This sequence may be run once, and ifit fails, it may not be run again. As a result, if a boot disk is notaccessible to a virtual machine because a fabric active login limit orother fabric limit is exceeded, the virtual machine may be marked as anerror. Generally, virtual machines are booted as a part of beingcreated/deployed, and as a result, the FLOGI/FDISC limits of a switchmay be considered to be a substantial constraint and cost factor forscaling the number of virtual machines in cloud environments with NPIV.

In some embodiments of the invention, therefore, fabric limits, e.g.,the active fabric login limits of one or more switches in a fabric, maybe used in the management of virtual machines. For example, in someembodiments, fabric limits may be used when determining where to place avirtual machine, e.g., on a particular host among a plurality of hoststhat are capable of hosting the virtual machine. As such, in someembodiments, fabric limits may be used in connection with a process offiltering hosts for virtual machine placement, as well as in connectionwith a process of selecting an alternative fabric if the capacity of afirst fabric is exceeded and/or a process of determining when a fabrichas capacity for additional logins.

In some embodiments, fabric limits may also be used in connection withload balancing, e.g., to distribute limited fabric resources acrossmultiple fabrics in a virtualized environment in such a manner thatstorage performance is balanced and fabric limits are obeyed. As such,in some embodiments, fabric limits may be used in connection with loadbalancing fabric use by migrating virtual machines from one fabric toanother. In addition, in some embodiments fabric limits may be used inconnection with a process of selecting an alternative storage attachmenttype (e.g., to use vSCSI instead of NPIV) if the capacity of all or someof the fabrics in a virtualized environment is exceeded and/or inconnection with a process of load balancing fabric use by migratingvirtual machines from NPIV connections to vSCSI connections (e.g., sothat lower priority virtual machines are migrated from NPIV to vSCSI tofree up active logins for higher priority virtual machines).

Moreover, in some embodiments, fabric limits may also be used inconnection with the deployment and boot up of virtual machines toaddress the risks of virtual machine boot errors. For example, in someembodiments, fabric limits may be used in connection with a process ofdelaying the power-up of a virtual machine during the deployment of thevirtual machine when the capacity of the fabric has been exceeded,and/or in connection with a process of specifying if a virtual machineshould be booted when a data disk fabric has reached a fabric limit. Asanother example, in some embodiments, fabric limits may be used inconnection with a process of scheduling the power-up of a virtualmachine when additional capacity of a fabric becomes available and/or inconnection with a process of prioritizing an order of virtual machinesto be booted when additional capacity of a fabric becomes available.

Moreover, the invention may be used in some embodiments in connectionwith virtualized environments employed for cloud computing. Cloudcomputing often provides for cost efficiencies via elastic computingwhere resources are provisioned and de-provisioned based on workloadchanges. As resource requirements of workloads generally change overtime, multiplexing cloud resources over multiple workloads often resultsin higher overall resource utilization. In addition, in order to becost-efficient, a risk may be taken that not all workloads will run attheir maximum resource requirements at the same time, such that fewerresources than the sum of all maximum resource requirements forworkloads may be allocated, resulting in resources that are said to be“overcommitted.” For example, a cloud provider may allocate more virtualCPUs across their virtual machines on a host assuming that some of thevirtual machines only run at off-peak hours when other virtual machinesare shut-down.

Resources may be overcommitted in some environments by using overcommitparameters referred to as overcommit ratios, which may be used todetermine capacity by multiplying the amount of available resources bythe ratio. For example, the processor capacity when the processorovercommit ratio is 4 for a system with 16 processor cores may be4*16=64 virtual processors. Provisioning logic, e.g., filters, may thenuse the calculated capacity when determining if a virtual machine iscapable of being deployed to a host.

In some embodiments of the invention, overcommit parameters such asovercommit ratios may also be used in connection with fabric limits, andthereby improve the capacity and optimize the utilization of a storagefabric and any storage system attached thereto. It should be noted thatthe concept of a limit, as used herein, is distinct from the concept ofcapacity. Within the context of this discussion, limit may be used torefer to an actual limit, e.g., a maximum number of active logins afabric switch allows, whereas capacity may be used to refer to a limitafter modification by an overcommit parameter, e.g., the number ofactive logins that are allowed by a fabric switch after taking intoaccount an overcommit ratio. In some embodiments, fabric overcommitparameters may be defined for a fabric, for multiple fabrics, or forindividual components in a fabric.

Moreover, it will be appreciated that different overcommit parametersmay be optimal for different operating environments. For example, wherea virtualized environment primarily hosts long-lived virtual machines,the benefits of overcommitting limited fabric resources may not be asgreat as in environments that primarily host short-lived virtualmachines. Thus, for environments that primarily host short-lived virtualmachines that are more likely to come and go over time, a higherovercommit ratio, for example, may be justified.

In one embodiment discussed in greater detail below, fabric limit-basedvirtual machine management may be used in connection withcloud/virtualization management software, e.g., OpenStack-basedmanagement software, and may use a configured overcommit ratio andinformation about fabric limits such as active login limits for one ormore fabric switches to control the placement of virtual machines on oneor more hosts attached to a storage fabric. Furthermore, in thisembodiment, and with respect to an NPIV boot disk, the boot up of avirtual machine may be selectively delayed when a storage fabricdetermined to be overcommitted until a later time in which the activelogins of the storage fabric drop below the active login limit.

In the illustrated embodiment, as part of the configuration of a fabricbeing managed by cloud/virtualization management software, an overcommitratio may be specified for each fabric under management, representing amultiplier of a fabric's active login limit. For example, suchfunctionality may be supported in cloud/virtualization managementsoftware such as the Power Virtualization Center (PowerVC) enterprisevirtualization management software used for Power systems and based onthe OpenStack framework, and available from International BusinessMachines.

FIG. 2, for example, illustrates an example virtualized environment 60including a plurality of hosts 62 coupled to a Fibre Channel-basedstorage area network (SAN) 64 including a plurality of storage devices66 coupled to the plurality of hosts 62 through one or more fabrics,represented by a plurality of SAN switches 68. It will be appreciatedthat SAN switches 68 may define a single fabric, or may define multiplefabrics that each interconnect all or a subset of hosts to all or asubset of storage devices. Moreover, in the illustrated embodiment, eachSAN switch 68 has an active login limit representing a fabric limit ofSAN 64.

Each host 62 includes a virtual machine manager or hypervisor 70 thatmanages one or more virtual machines (VMs) 72. One or more virtualinput/output servers (VIOSs) 74 may also be supported in each host 62,and among other functions, each VIOS 74 may support virtualization ofone or more physical I/O adapters, such as a plurality of Fibre Channel(FC) adapters 76 coupled to SAN switches 68. When virtualizing an FCadapter 76, one or more virtual Fibre Channel (VFC) adapters 78 may becreated for access by a virtual machine 72, and it is through the VFCadapters 78 that a virtual machine 74 may effectively log in and connectto SAN 64 for accessing a storage device 66, which is likewise coupledto a SAN switch 68 through an FC adapter 80. It will be appreciated thatin other embodiments, no VIOS may be used, and virtualization ofadapters may be performed by other logic.

Management of virtualized environment 60 may be provided bycloud/virtualization management software 82, which is coupled to SAN 64as well as each host 62. In some embodiments, a hardware managementconsole (HMC) may also be used. In some embodiments, the functionalityof cloud/virtualization management software 82 and/or an HMC may beallocated in part to other components in environment 60 (e.g., to ahypervisor 70, VIOS 74, etc.) and/or may be partitioned into othersoftware components. Therefore, the invention is not limited to theparticular allocation of functionality described herein.

Cloud/virtualization management software 82, e.g., PowerVC-compatiblesoftware in some embodiments, may be provided with fabric limits and/orovercommit parameters, and may also be configured to track or acquireinformation on current resource allocation for comparison against thefabric limits and/or capacities. For example, in some embodiments,fabric limits may be collected by using APIs provided by fabric switches(e.g., SAN switches 68), other fabric components and/or any other fabricmanagement hardware and/or software. In another embodiment, a user maymanually enter limits based upon documented limits provided by acomponent vendor. In addition, in some embodiments, current resourceallocation may be collected by cloud/virtualization management softwareby querying fabric switches (e.g., SAN switches 68) and other fabrichardware and/or software components, while in other embodiments countsmay be maintained by the software and incremented/decremented as virtualmachines are powered-on and powered-off.

Using the limit information (e.g., active login fabric limits), currentresource allocation information (e.g., active login counts) and anovercommit parameter (e.g., an overcommit ratio), thecloud/virtualization management software may filter out possible hostsand/or fabrics capable of being targets of a virtual machine deployment.For example, if a fabric A has an overcommit ratio of 2 and has a limitof 400 active fabric logins, the cloud/virtualization managementsoftware may not allow any virtual machines to be deployed to hosts onfabric A if the current count of active logins is 800. In addition, iffabric B has not reached capacity, hosts on that fabric may beconsidered by the cloud/virtualization management software to becandidates for the deployment.

In addition, in some embodiments, the cloud/virtualization managementsoftware may be configurable to specify for a virtual machine, whetherthe virtual machine should boot regardless of whether a fabric limit hasbeen exceeded or if a disk is required, e.g., for NPIV attached datadisks. Further, in some embodiments, an environment may be configurableto specify what, if any, other storage access technology may be used ifa fabric is either at a fabric limit or at a capacity (e.g., to switchto using vSCSI if an NPIV fabric is at capacity).

Now turning to FIG. 3, a deploy virtual machine routine 100, capable ofbeing executed in environment 60, is illustrated in greater detail.Routine 100 may be executed, for example, in response to anadministrator request to deploy a new virtual machine to theenvironment, and may be performed, for example, in response tointeraction via a graphical user interface, which may be run locally inenvironment or remotely in an external computer coupled to theenvironment.

Deployment of a virtual machine, in this context, refers to the creationand boot up/power on of a new virtual machine in environment 60, and assuch, routine 100 begins in block 102 by receiving any requiredresources and/or other configuration settings for the virtual machine tobe deployed. A user may specify, for example, a desired number ofvirtual processors, a desired amount of virtual memory, a desired amountof virtual storage, desired network and/or storage connections, etc., aswell as settings such as performance tunings, virtual machine name, typeof storage, number of storage disks or volumes, etc.

Next, in block 104, the virtual machine to be deployed is placed on ahost, i.e., a host for the virtual machine is selected from a pluralityof hosts in the virtualized environment. A host may selected based uponvarious factors, including compatibility with the virtual machinerequirements and settings specified by the administrator as well asoptimizing the overall performance of the virtualized environment bybalancing workloads. A further discussion of one suitable virtualmachine placement operation is discussed below in connection with FIG.4.

Next, once a host is selected for the virtual machine, the virtualmachine is created in block 106, e.g., by instructing virtual machinemanagement functionality on the host to create a new virtual machine onthat host. Next, in block 108, one or more virtual adapters may be addedto the virtual machine, e.g., to create network and/or storageconnectivity. In one embodiment, for example, virtual adapters such asone or more virtual Ethernet adapters and one or more virtual FibreChannel adapters may be added. In some embodiments, blocks 106 and 108may be implemented by software 82 of FIG. 2 instructing an HMC to createa virtual machine on a particular host and to create particular virtualadapters on the created virtual machine.

Next, in block 110, one or more virtual storage volumes may be added forthe virtual machine. Software 82, for example, may create the volumes,communicate with a storage fabric to set up a zone and thereby provide amechanism through which the virtual machine may communicate withstorage. Then, in block 112, a virtual machine image is copied to theboot volume, e.g., from a collection of pre-stored images including theoperating system and application(s) to execute in the virtual machine.

Block 114 next obtains system configuration information for theoperating system of the virtual machine, e.g., information such as hostname, IP address, etc. In some embodiments, for example, a virtualoptical drive may be added to the virtual machine with the systemconfiguration information provided on a virtual optical disc. In otherembodiments, the system configuration information may be obtained inanother manner, e.g., via a networked metadata service.

Then, in block 116, the virtual machine is booted, e.g., by software 82instructing an HMC to boot the virtual machine. The virtual machinethereafter attempts to boot, and routine 100 is complete. Booting avirtual machine is analogous to powering on a physical computer andbringing it into a fully active state, and thus may be considered toincorporate the initialization and execution of program code of thevirtual machine to bring the virtual machine into a fully active state.Moreover, the terms “booting” and “powering up” may be usedinterchangeably herein.

It will be appreciated that the deployment of virtual machines may beimplemented in a number of different manners in different virtualizedenvironments. As such, a number of different alternative processes maybe used in other embodiments, as will be appreciated by one of ordinaryskill in the art having the benefit of the instant disclosure.

As noted above in connection with block 104, a virtual machine placementoperation may be performed to select a host upon which to deploy thevirtual machine. Furthermore, consistent with some embodiments of theinvention, fabric limitations may be considered in a virtual machineplacement operation. FIG. 4, for example, illustrates a place virtualmachine routine 120 that may be used to implement block 104 of FIG. 3 insome embodiments of the invention.

Routine 120 begins in block 122 by determining pools of hosts, storagesystems and fabrics that meet the requirements of the virtual machine tobe deployed, e.g., based upon any particular storage, architectures,protocols, network resources, resource capacity requirements, etc. thatthe virtual machine will need in order to handle its workload. Next,block 124 determines candidate combinations of hosts, storage andfabrics from the pools that are compatible with one another and thathave sufficient capacity to host the virtual machine. In determiningwhether a particular combination is a suitable candidate, block 124 mayconsider capacities/limits of hardware resources on a host, e.g.,processor resources, memory resources, adapter resources, etc., and insome embodiments, overcommit ratios may be used in the determination ofcapacities of such hardware resources. Likewise, block 124 may considercapacities/limits of storage systems when determining whether acombination is a suitable candidate.

Moreover, in some embodiments, block 124 may consider fabric limitsand/or capacities when determining whether a host/fabric/storage systemcombination is a suitable candidate. For example, active login limits ofone or more fabric switches may be considered in the determination of acandidate combination, whereby if a fabric switch active login limit hasbeen exceeded for a switch in a particular fabric, any combinationincorporating the fabric may be excluded as a candidate.

In addition, in some embodiments an overcommit parameter, e.g., anovercommit ratio, may be used in determining whether a fabric hassufficient capacity. Thus, if a fabric switch has a limit of 400 activelogins, and an overcommit ratio of 2 is specified for the fabric, thefabric will be considered to have sufficient capacity of the currentnumber of active logins is less than 800.

Next, block 126 determines whether at least one candidate combinationhas been found. If so, block 128 determines whether more than onecandidate combination has been found, and if only one candidatecombination has been found, control passes to block 130 to return thesingle candidate combination as the combination selected by theplacement operation.

If more than one candidate combination has been found, however, block128 passes control to block 132 to score each candidate combination, andthen to block 134 to select the highest scored candidate combination.Control then passes to block 130 to return the selected candidatecombination.

When scoring candidate combinations, various factors may be considered,and various weights may be applied to those factors, in order tooptimize the placement of a virtual machine within a virtualizedenvironment. For example, various load balancing algorithms may beapplied to place the virtual machine in order to balance workloads, tomaximize performance, to minimize communication costs with otherresources used by the virtual machine, to optimize power consumption ina data center (e.g., to locate virtual machines on a subset of hosts andenable other hosts to be powered down), to co-locate the virtual machinewith other related virtual machines, to anti-collocate the virtualmachine with other related virtual machines for disaster or highavailability planning, etc. Moreover, in some embodiments consistentwith the invention, fabric limits and/or capacities, whether or notbased on an overcommit parameter, may also be considered when scoringcandidate combinations.

Therefore, in some embodiments of the invention, a score S may becalculated for a combination in some embodiments as follows:

$S = {\sum\limits_{i = 1}^{n}{f_{i}w_{i}}}$

where f_(i) is a factor among a total of n factors and w_(i) is a weightto be applied to that factor, and where at least one factor f_(i) isrelated to a fabric limit and/or fabric capacity.

Returning to block 126, if no candidate combinations are found, controlpasses to block 136 to determine whether other configuration settingsare possible, e.g., to enable a virtual machine to potentially bedeployed to any other combinations. If so, control passes to block 138to modify one or more requirements of the virtual machine, and then toblock 122 to determine pools of hosts, storage and fabrics that meet theupdated virtual machine requirements, and attempt to identify one ormore candidate combinations. If block 136 determines that no otherconfiguration settings are possible, control is instead passed to block140, whereby routine 120 returns with an error, indicating that nosuitable combination was identified.

Returning to block 138, among other modifications that may be made to avirtual machine's requirements, some embodiments may include variousfabric-related modifications. For example, in some embodiments, block138 may select an alternate fabric and/or select an alternate storageattachment type or technology (e.g., selecting vSCSI instead of NPIV,connecting a SAN volume to a host and virtualizing the storage to thevirtual machine using Virtio technology, etc.) In some embodiments,configuration preferences may be specified to prioritize one type offabric or storage access technology over another, or to select one typeof fabric or storage access technology only when another type of fabricor storage access technology is over capacity or otherwise unavailable.

As such, in some embodiments of the invention, fabric limits and/orcapacity may be considered within a placement routine both whendetermining whether a fabric and/or a combination incorporating a fabricis a candidate for placement of a virtual machine, and when scoring acandidate combination. In each instance, a determination may generallybe made of a fabric limit of one or more fabrics as well as of anallocation of a limited fabric resource with which the fabric limit isassociated. Placement of a virtual machine on a host may therefore beconditioned on such determinations.

Returning again to FIG. 3, fabric limits may also be considered inconnection with the boot up of a virtual machine in block 116, e.g., inorder to delay power-up of a virtual machine during deployment if thecapacity of a fabric has been exceeded. In some embodiments, forexample, if an overcommit parameter is used to determine a capacity thatexceeds the actual fabric limit (e.g., to provide a capacity of activefabric logins that exceeds the actual fabric login limit of a switch), arisk may exist that a boot volume coupled to the virtual machine overthe fabric may not be accessible when the virtual machine is booted,resulting in a failure to boot. In some instances, a virtual machineimage will perform an initial sequence of operations to assign hostnamesand IP addresses, set credentials, and attempt to boot off the bootvolume, and if the boot volume is inaccessible due to a fabric limit,the virtual machine may be marked as an error. Furthermore, in someinstances, manual intervention may be required to attempt a reboot inthe event of a failure of a virtual machine to boot, and as such,additional administrative overhead may be required to ensure a virtualmachine properly boots.

In some embodiments consistent with the invention, on the other hand, afabric limit may be checked prior to booting a virtual machine todetermine whether a fabric has sufficient capacity to boot the virtualmachine, and if not, delay the boot of the virtual machine. As such, thevirtual machine will have been created on the host, but will not bebooted up until sufficient capacity exists.

In some embodiments, a virtual machine for which a boot has been delayedmay be queued, e.g., in a first-in-first-out (FIFO) queue, and thevirtual machine may later be booted once sufficient capacity exists onthe fabric. Once the sufficient capacity is found to exist, the virtualmachine may then be dequeued from the queue and booted on the host. Amonitor process may be used in some embodiments to determine when adelayed virtual machine is capable of being booted, and then initiatingthe actual boot up of the virtual machine.

In some embodiments, a virtual machines may be dequeued from the queuein a FIFO basis, while in other embodiments, virtual machines may beprioritized, e.g., by setting a priority on each virtual machine inconnection with creating and/or deploying the virtual machine, such thatvirtual machines with higher priorities will be booted before virtualmachines having lower priorities. Further, in some embodiments, if aconfiguration setting for a virtual machine specifies an alternativestorage access technology for one or more volumes, the deploy may attachthe volume(s) with the alternative storage access technology based onthe configuration setting and whether the active fabric logins are atthe limit or capacity.

FIG. 5, for example, illustrates an implementation of block 116 of FIG.3 as a boot virtual machine routine 150. Routine 150 is executed inresponse to a request or instruction to boot the virtual machine, andbegins in block 152 by determining whether a fabric capacity has beenexceeded for the boot volume of the virtual machine, i.e., whethersufficient capacity exists in the fabric to enable the virtual machineto connect to the boot volume through the fabric. The capacity, in thisregard, may be based upon an actual fabric limit in some embodiments, soa determination of whether sufficient capacity exists may be based upona comparison of an actual fabric limit and a current allocation of thelimited fabric resource with which the fabric limit is associated, e.g.,by a comparison of an active login limit for a fabric switch with acurrent number of active logins for that fabric switch.

If the fabric capacity is not exceeded for the boot volume, block 152passes control to block 154 to similarly determine whether the fabriccapacity has been exceeded for any other data volume for the virtualmachine. If not, control passes to block 156 to boot/power up thevirtual machine, e.g., by signaling an HMC to boot the virtual machine,and routine 150 is complete.

Returning to block 154, if the fabric capacity for any data volume forthe virtual machine is exceeded, control passes to block 158 todetermining whether the virtual machine is still permitted to boot. Insome embodiments, for example, it may be desirable to permit a virtualmachine that has access to a boot volume to boot irrespective of whetherany other data volume is accessible. Furthermore, in some embodiments,it may be desirable to provide a configurable setting that specifieswhether a virtual machine is able to boot in the absence of access to adata volume. As such, if a boot is still allowed, block 158 passescontrol to block 156 to power up the virtual machine.

On the other hand, if the fabric capacity is determined to be exceededfor the boot volume in block 152, or if the fabric capacity isdetermined to be exceeded for a data volume and the virtual machine isnot permitted to boot in blocks 154 and 158, control passes to block 160to queue the virtual machine on a queue associated with the fabric, androutine 150 is complete.

Now turning to FIG. 6, a delayed boot monitor routine 170 isillustrated. Routine 170 may be executed in a background or persistentprocess, and may monitor the queue upon which virtual machines areenqueued by routine 150 of FIG. 5. Routine 170 may begin in block 172 bydetermining whether the queue is empty, and if it is, control passes toblock 174 to wait for a next monitoring interval, after which controlreturns to block 172 to again check the status of the queue.

If, however, one or more virtual machines are enqueued on the queue,block 172 passes control to block 176 to determine whether, for anyvirtual machine on the queue, sufficient fabric capacity is available onany necessary fabric in order to boot the virtual machine. If not, block176 passes control to block 174 to wait for the next monitoringinterval.

However, if sufficient fabric capacity does exist for any virtualmachine to boot, block 176 passes control to bock 178 to prioritize thevirtual machines on the queue, or in some embodiments, only the virtualmachines capable of being booted based upon a fabric's availablecapacity. The priorities may be based upon a configuration settingassociated with each virtual machine, or based on other factors such asvirtual machine type or other characteristic of a virtual machine, host,fabric, storage system, etc. In other embodiments, however, virtualmachines may be ordered in a first in-first out (FIFO) manner.

Next, in block 180, one or more virtual machines are selected anddequeued from the queue based upon the order determined in block 178,and then in block 182, the selected virtual machine or machines arepowered up. Control then returns to block 174 to wait for a nextmonitoring interval.

Fabric limits may also be used in some embodiments in connection withload balancing across fabrics. In particular, in some embodiments, morethan one fabric may be used for a given host and storage systemcombination by configuring multiple ports. Cloud/virtualizationmanagement software consistent with the invention may use the currentlyactive logins and active login limits of a plurality of fabrics andprovision virtual machines to use fabrics that either haven't reachedtheir limit or that have the most remaining capacity. In addition, insome embodiments ongoing monitoring of a fabric and load balancing of afabric may be performing by powering down one or more virtual machines,reassigning the virtual machines to other fabrics, and powering thevirtual machines back up to use the other fabrics. In addition, in someembodiments, if a configuration setting for a virtual machine specifiesan alternative storage access technology (e.g., vSCSI instead of NPIV),storage for that virtual machine may be migrated to the alternativestorage access technology to free up additional fabric resources. It mayeven be desirable in some embodiments to migrate one or more lowerpriority virtual machines to alternate storage access technologies tofree up additional fabric resources for higher priority virtualmachines.

FIG. 7, for example, illustrates a load balancing routine 200 that maybe executed, for example, on a periodic basis, in response to a requestto balance loads, in response to detecting a sub-optimal load balanced,etc. Routine 200 may also be executed in connection with a virtualmachine deployment, e.g., if a particular fabric needed by a virtualmachine being deployed is unavailable for use by that virtual machine.Routine 200 begins in block 202 by obtaining fabric resource allocationfor each fabric over which to balance load. For example, the fabricresource allocation in some embodiments may relate to the current activelogins for the switches in each fabric. Block 204 then obtains fabriclimits for each fabric, e.g., the active login limits for each switch ineach fabric. In addition, in some embodiments, an overcommit parametersuch as an overcommit ratio may be used in adjusting the determinedfabric limits and thereby determining an overcommitted capacity for eachfabric.

Block 206 next attempts to rebalance the load across the fabrics, e.g.,by migrating one or more virtual machines to a different fabric byselecting one or more virtual machines to be powered down, reconfiguredto use a different fabric, and powered back up. Various load balancingalgorithms may be used to rebalance the load, and various factors, e.g.,virtual machine priorities, fabric requirements of particular virtualmachines, etc., may be used in connection with such algorithms, as willbe appreciated by those of ordinary skill in the art having the benefitof the instant disclosure.

Block 208 next determines whether the load balancing operation wassuccess, based upon any of a number of different metrics. If so, routine200 is complete. If not, however, control passes to block 210 todetermine whether any virtual machine is capable of being migrated to analternative fabric and/or storage technology, e.g., to a differentstorage access technology such as vSCSI instead of NPIV. Such adetermination may be based, for example, on whether any virtual machinehas a configuration setting that specifies that an alternate technologymay be used for that virtual machine.

If no suitably-configured virtual machine exists, block 210 terminatesroutine 200. If so, however, block 210 passes control to block 212 tomigrate one or more virtual machines to alternate fabric and/or storagetechnologies, e.g., using logic to unmap the storage, drop the zoning,and remove any associated adapters, and then proceed through operationssimilar to those used during deployment to add adapters and storage andmap and zone the storage, as will be appreciated by one of ordinaryskill in the art having the benefit of the instant disclosure. Controlthen passes to block 206 to attempt to rebalance the fabric loads withthe one or more virtual machines migrated to the alternate technologies.

It will therefore be appreciated that fabric limits may be used in anumber of aspects of a virtualized computing environment to optimize theperformance of one or more virtual machines coupled to one or morestorage systems through one or more fabrics. Various modifications maybe made to the illustrated embodiments consistent with the invention.Therefore, the invention lies in the claims hereinafter appended.

1.-14. (canceled)
 15. An apparatus, comprising: at least one processor;and program code configured upon execution by the at least one processorto manage virtualization in a computing environment of the typeincluding one or more fabrics coupling a plurality of hosts to one ormore storage systems, the program code configured to: determine a fabriclimit for a limited fabric resource of a first fabric among the one ormore fabrics; determine an allocation of the limited fabric resource forthe first fabric; and control placement of a virtual machine on a firsthost among the plurality of hosts using at least one processor based atleast in part upon the determined fabric limit and determined allocationof the limited fabric resource for the first fabric.
 16. The apparatusof claim 15, wherein the limited fabric resource comprises a fabriclogin for a storage switch in the first fabric, and wherein the fabriclimit comprises an active login limit of the storage switch.
 17. Theapparatus of claim 15, wherein the program code is further configured todetermine an overcommitted fabric capacity for the first fabric from thefabric limit, and control placement of the virtual machine on the hostbased at least in part on the determined overcommitted fabric capacityfor the first fabric.
 18. The apparatus of claim 17, wherein the programcode is configured to determine the overcommitted fabric capacity byadjusting the fabric limit by a fabric overcommit ratio.
 19. Theapparatus of claim 15, wherein the program code is configured to controlplacement of the virtual machine on the first host by: determining aplurality of candidate host, fabric and storage system combinations fromamong the plurality of hosts, one or more fabrics and one or morestorage systems; scoring each of the plurality of candidate host, fabricand storage system combinations based at least in part on the determinedfabric limit and determined allocation of the limited fabric resourcefor the first fabric; and placing the virtual machine on the first hostbased upon a score of a first candidate host, fabric and storage systemcombination including the first host.
 20. A program product, comprising:a non-transitory computer readable medium; and program code stored onthe non-transitory computer readable medium and configured uponexecution by at least one processor to manage virtualization in acomputing environment of the type including one or more fabrics couplinga plurality of hosts to one or more storage systems by determining afabric limit for a limited fabric resource of a first fabric among theone or more fabrics, determining an allocation of the limited fabricresource for the first fabric, and controlling placement of a virtualmachine on a first host among the plurality of hosts based at least inpart upon the determined fabric limit and determined allocation of thelimited fabric resource for the first fabric.