System and method for live migration of a virtualized networking stack

ABSTRACT

A method and apparatus are provided in which a source and target perform bidirectional forwarding of traffic while a migration guest is being transferred from the source to the target. In some examples, the migration guest is exposed to the impending migration and takes an action in response. A virtual network programming controller informs other devices in the network of the change, such that those devices may communicate directly with the migration guest on the target host. According to some examples, an “other” virtual network device in communication with the controller and the target host facilitates the seamless migration. In such examples, the forwarding may be performed only until the other virtual machine receives an incoming packet from the target host, and then the other virtual machine resumes communication with the migration guest on the target host.

CROSS-REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of U.S. patent applicationSer. No. 14/310,492, filed Jun. 20, 2014, the disclosure of which isincorporated herein by reference.

BACKGROUND

Live migration is the act of moving an actively running virtual machinefrom one host machine to another, preserving virtual deviceconnectivity, network connections, and virtual machine health statusreporting. During the migration, performance may be affected by, forexample, pausing the virtual machine to copy memory or by establishingconnections with the virtual machine's new host.

SUMMARY

One aspect of the disclosure provides a method of facilitating livemigration by a virtualized network device, comprising sending, by thevirtualized network device, packets to a migration guest on a sourcehost, the packets to be forwarded by the source host to a target host,receiving, through the source host, packets from the migration guest onthe target host, determining, by the virtualized network device, whethera migration of the migration guest from the source host to the targethost is complete, and sending packets directly from the virtualizednetwork device to the migration guest on the target host when it isdetermined that the migration is complete. Determining whether amigration of the migration guest is complete may include receiving, atthe virtualized network device, one or more packets directly from theguest on the target host, and identifying, based on the received one ormore packets, that migration is complete.

Another aspect of the disclosure provides a system, comprising a sourcehost, a migration guest running on the source host, a target host incommunication with the source host, and an other virtualized networkdevice in communication with the migration guest on the source host. Thesource host is configured to forward traffic received from the othernetwork device to the target host, and to forward traffic received fromthe target host to the other network device. The target host isconfigured to send packets directly to the other network device uponcompletion of migration of the migration guest. The other network deviceis configured to determine when a packet is received directly from thetarget host, and to send packets directly to the migration guest on thetarget host in response. The system may further include a networkcontroller configured to provide a token to the other virtualizednetwork device for communicating directly with the migration guest onthe target host. In some examples, the migration guest is notified ofthe migration prior to a start of the migration, and may be configuredto change its state in response to the notification. For example, themigration guest may place itself into a mode wherein it closes outexisting connections and denies future processing requests. As anotherexample, the migration guest may communicate with another system, thecommunication causing the another system to direct future processingrequests to other resources on the network for the duration of themigration.

Yet another aspect of the disclosure provides a method, comprisingreceiving, at a migration guest on a source host, an indication that themigration guest will be migrated from the source host to a target host.The migration guest takes a predetermined action in response toreceiving the indication. Further, the migration guest is transferredfrom the source to the target. The source host forwards traffic receivedfrom other network devices for the migration guest on the source host tothe target host, and also forwards traffic received from the target hoston behalf of the migration guest to the other network devices.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an example system according to aspects of the disclosure.

FIG. 2 is a block diagram of components of the system of FIG. 1according to aspects of the disclosure.

FIG. 3 is another example system according to aspects of the disclosure.

FIG. 4 is a block diagram of components of the system of FIG. 3according to aspects of the disclosure.

FIG. 5 is a flow diagram of an example method according to aspects ofthe disclosure.

FIG. 6 is a flow diagram of another example method according to aspectsof the disclosure.

DETAILED DESCRIPTION Overview

This disclosure provides a system and method for live migration of avirtualized networking stack.

The live migration takes place without interrupting a network connectionbetween a first virtualized or non-virtualized network computing deviceand the migrating virtual networking stack. The first virtualized ornon-virtualized network computing device may be a virtual machine, aswitch, a host, or any other network device. The virtual networkingstack may be a virtual machine, linux container, or any other type ofvirtual networking stack. In the following examples, the firstvirtualized or non-virtualized network computing device is referred toas a first device, and the migrating virtual networking stack isreferred to as a virtual machine, but it should be understood that theseexamples are not limiting. Moreover, it should be understood that theseare merely examples, and the concepts described may be applied invarious scenarios. For example, multiple first devices may communicatewith the migrating virtual machine using the techniques described below.

The first device communicates with the virtual machine residing on asource host. The first device continues to communicate with the virtualmachine on the source host during migration. Until migration iscomplete, the source virtual machine and target virtual machine performforwarding (e.g., bidirectional or unidirectional forwarding) of proxiedtraffic. For example, the source virtual machine proxies all incomingtraffic from the first device and forwards it to the target virtualmachine. The target virtual machine is configured to accept the proxiedingress traffic, and also to proxy all egress traffic through the sourcevirtual machine. Such bidirectional forwarding may continue from a timewhen the virtual machine moves from the source to the target untilaffected nodes on the network are reprogrammed A centralized virtualnetwork programming controller informs the first device that the virtualmachine has migrated to the target host, such that the first device mayresume communication with the virtual machine on the target host.Moreover, the controller may also inform the rest of the network of thechange.

According to one example, as an alternative or in addition to proxyingall traffic at the source and performing bidirectional forwarding, an“other” virtual machine (VM) in communication with the controller andthe target host facilitates the seamless migration. For example, thetarget VM host contacts the controller to subscribe to network updates.The controller provides the other VM with a token for communicatingdirectly with the VM on the target host. The other VM, source host, andtarget host may perform triangular routing from a time when the virtualmachine is transferred to the target host until, for example, thenetwork is updated. For example, the other VM sends traffic to thesource VM host, which is forwarded to the target VM host, until theother VM receives an incoming packet from the target VM host. At thispoint, using the token received from the controller to authenticate andspecify the egress path, the other VM sends packets directly to the VMon the target host. As another example, upon receiving a packet from anunrecognized sender, the other VM host queries the controller so that itcan switch to sending packets directly to the target VM.

To support smooth transitioning from the source host to the target hostin either of the examples above, one or more rules may be installed onnetwork devices such as the source and/or the host of the “other” VM.For example, the rules may be installed by the controller. The rules maybe specific to particular phases of the migration, such as brownout(e.g., when migration target is starting and virtual machine state istransferring from source host to target host), blackout (e.g., when thevirtual machine is paused so the remaining VM state can be moved fromsource to target in preparation for VM resuming on target),post-blackout (e.g., when migration is complete and the target isresponsible for all processing), and cancellation (e.g., allmigration-related set-ups are removed).

During brownout, the virtual machine resides on the source host. Themigration source can receive and send traffic to any other virtualmachine (VM). Also, any other VM can receive traffic from the migrationsource; any other VM will send traffic only to the migration source. Thecontroller will also change the migration source's forwarding table andinstall a migration table on the migration source for forwardingtraffic. The source host and target host both have host agent processesrunning locally, or as part of the virtual machine manager process, thataid in the reprogramming of the network. The migration source's hostagent is enabled to switch from forwarding traffic locally to forwardingto the migration target.

During blackout, any network state that needs to be migrated from thesource to the target is migrated (e.g., stateful firewall state). Onlythe migration source's host agent is involved in doing the switching.The controller does not need to do anything. While in someimplementations the switching may be performed at a start of blackoutperiod, in other implementations traffic is not forwarded untilpost-blackout in case migration is canceled before or during blackout.

During post-blackout, the controller provides routes that are direct tothe migration target. In addition, traffic from the migration source isstill forwarded to the migration target. For example, the source hostand target host may perform bidirectional forwarding, unidirectionalforwarding, or triangular routing. As a result, most flows on themigration source will be un-installed, except for the migrationforwarding flow. Moreover, in the case of triangular routing, responsesfrom the migration target will be sent directly to the first device,which can then communicate directly with the virtual machine on thetarget host, as opposed to forwarding traffic through the source host.

Cancellation occurs when the migration is canceled. For example, duringbrownout or blackout the target host may crash, or some other event mayoccur, which results in cancellation of the migration. Duringcancellation, the controller removes all flows set up for migration. Forexample, rules on first devices enabling them to receive packets fromeither the source host or the target host would be reprogrammed tosupport only the rule corresponding to the source. Any networkprogramming on the target host is removed and any forwarding-relatedprogramming on the source host is removed.

According to some examples, the duration of the blackout may be reducedby starting execution at the target before the entire virtual machinestate has been transferred. For example, during a brownout phase thevirtual machine state may be pre-copied, followed by a blackout whereexecution of the virtual machine tasks is transferred to the target hostand the remaining state may or may not be transferred. Moreover, apost-copy brownout phase may exist where the remaining state is copiedafter the blackout.

One aspect of the disclosure provides for exposing the impending livemigration to guest VMs, thereby enabling the guest VMs to take anaction. One such action may be changing the health state of the guestVMs prior to their migration. For example, the guest VM may place itselfinto a “lame duck” state, wherein it communicates to other systems thatit is not accepting new tasks or connections, but completes any tasksthat are already underway. In this regard, the guest VMs can, forexample, remove themselves from load-balancing pools and close outexisting connections. This may facilitate load balancing throughout thenetworks. Moreover, this may be especially helpful to customers that aresensitive to blackout delay, such as online gaming systems.

Example Systems

FIG. 1 illustrates an example system 100, in which an actively runningguest is being migrated from a source host to a target host. As shown,network computing device 120, source host 130, and target host 160 areelements of network 150. The network also include network controller180, which communicates with one or more of the devices in the network150.

The network 150 may be a datacenter, a load-balanced server farm, or anyother type of computing environment, including a backplane ofinterconnected peripherals or a system of components on a motherboard.The network 150, and intervening nodes, may comprise variousconfigurations and protocols including the Internet, World Wide Web,intranets, virtual private networks, wide area networks, local networks,private networks using communication protocols proprietary to one ormore companies, Ethernet, WiFi (such as 802.11, 802.11b, g, n, or othersuch standards), and HTTP, and various combinations of the foregoing.

The network controller 180 may be linked directly or indirectly to eachnode of the network 150, and may be used to establish connectionsbetween the nodes or to provide information to specific nodes. Forexample, the network controller 180 may be used to provide networkupdates, to facilitate the transfer of information from one node toanother, etc. In some examples, the network controller 180 may store andprocess information about the topology of the network 150, or individualtopologies of other various networks that may be connected to network150. The network controller 180 may be, for example, a conventional orspecialized network interface controller (NIC). The NIC may beimplemented on and connected to the network through, for example, anexpansion card, a motherboard, an Ethernet chip, or any other medium.

The network computing device 120 may be a virtualized or non-virtualizedcomputing device. For example, the network computing device 120 may be acentral processing unit (CPU), virtual machine, linux container, router,switch, or any other network device capable of sending and receivingpackets. The network computing device 120 may communicate with thesource host 130 and guest 110 by, for example, wired or wirelessconnection.

The source host 130 may be any type of computing device or system ofcomputing devices capable of hosting the guest 110. For example, thesource host 130 may include a hypervisor (not shown) with one or morevirtual machines or other guests operating thereon. While only the guest110 is shown in FIG. 1, it should be understood that multiple guests maybe running on the source host 130 at any given time. In some examples,the source host 130 may be virtualized, such as in nestedvirtualization. For example, the source host 130 can be a virtualmachine, linux container, or the like.

The target host 160, similar to the source host 130, may also be anytype of computing device capable of hosting the guest 110. In someexamples, the target host may be virtualized.

To initiate the live migration, the target host 160 contacts a virtualmachine manager (VMM) on the source host 130. For example, a VMM taskmay be started on the target host 160. Such task may contact the VMM onthe source host 130, including, for example, performing authentication.A blackout phase may then begin, in which the specification and state ofthe guest 110 is transferred from the source host 130 to the target host160.

According to some examples, the guest 110 may take a predeterminedaction in response to being notified (e.g., by the target 160 or thesource 130) about its impending migration. One example of such an actionis changing its state, such as a health state. For example, the guest110 may put itself into a “lame duck” state, which state may berecognized in addition to other states, such as healthy or unhealthy. Inthe lame duck state, the guest 110 may close out any existing connectionand remove itself from load-balancing pools. For example, the guest 110may complete pending tasks, and not accept any new tasks.

In moving the guest 110 to the target host 160, communication betweenthe network computing device 120 and the guest 110 may be maintained,for example, through the source host 130. For example, the source host130 may serve as a bidirectional forwarding agent between the networkcomputing device 120 and the target host 160. The target host 160 isconfigured to accept proxied ingress traffic from the guest 110 on thesource 130, and to proxy egress traffic through the source 130.

When migration is complete, at least one of the target 160 and thesource 130 may notify the network controller 180. The network controller180 may in turn change the physical host IP address of the guest 110 tocorrespond to its new location on the target host 160. As such, clientsthat want to communicate with the guest 110 can send packets to theproper physical host machine. Moreover, in some examples the networkcontroller 180 may notify the network computing device 120, and othercomputing devices in the network 150, of the change of location of theguest 110. For example, the controller 180 may provide the networkdevices with the new address of the guest 110. Accordingly, the networkcomputing device 120, and other devices, may resume communicationdirectly with the guest 110 on the target host 160.

Once the network device 120 begins communicating with the guest 110 onthe target 160, the source 130 may exit and the target 160 may tear downingress and egress forwarding configurations. For example, forwardingrules on the source 130 and target 160 may be deleted. According to oneexample, the source 130 and target 160 may wait for a predeterminedperiod of time, such as one minute, after traffic forwarded through thesource 130 drops to zero before deleting the forwarding rules. This mayaccommodate variations in timing in updating the network devices withthe new address of the guest 110 on the target 160. According to anotherexample, a feedback-based mechanism is used, such that forwarding isonly stopped when it is explicitly known that all clients have beennotified of the change to the target 160.

FIG. 2 provides a block diagram of particular components of the system100, including the source 130 and the controller 180.

The source 130 includes a memory 132 and one or more processors 139 incommunication with the memory 132. Memory 132 stores informationaccessible by processor 139, including instructions 138 that may beexecuted by the processor 139. The memory also includes data 134 thatmay be retrieved, manipulated or stored by the processor. The memory maybe of any type capable of storing information accessible by theprocessor, such as a hard-drive, memory card, ROM, RAM, DVD, CD-ROM,write-capable, and read-only memories.

The processor 139 may be any conventional processor, such as acommercially available central processing unit (“CPU”) or a graphicsprocessing unit (“GPU”). Alternatively, the processor may be a dedicatedcomponent such as an application-specific integrated circuit (“ASIC”), afield programmable gate array (“FPGA”), or other hardware-basedprocessor. As another example, the processor 139 may be a quantumcomputer.

The memory 132 includes data 134 that may be retrieved, manipulated orstored by the processor in accordance with the instructions 138. Forinstance, although the system and method is not limited by anyparticular data structure, the data may be stored in computer registers,in a relational database as a table having a plurality of differentfields and records, or XML documents. The data may also be formatted inany computer-readable format such as, but not limited to, binary values,ASCII or Unicode. Moreover, the data 134 may comprise any informationsufficient to identify the relevant information, such as numbers,descriptive text, proprietary codes, pointers, references to data storedin other memories (including other network locations) or informationthat is used by a function to calculate the relevant data.

The instructions 138 may be any set of instructions to be executeddirectly (such as machine code) or indirectly (such as scripts) by theprocessor(s) 139. In that regard, the terms “instructions,” “steps” and“programs” may be used interchangeably herein. The instructions may bestored in object code format for direct processing by the processor, orin any other computer language including scripts or collections ofindependent source code modules that are interpreted on demand orcompiled in advance.

The instructions 138 may be executed by the processor, for example, toreceive information associated with migration of the guest, for example,from the migration target. In some examples, the guest may take anaction in response to receiving the information. For example, the guest110 may update its state, such as by changing its health state to a“lame duck” state. In this state, the guest may complete any pendingtasks without accepting any new tasks. The instructions 138 may furtherprovide for handling bidirectional forwarding between the network device120 and the target 160. For example, the data 134 may include a flowtable with one or more forwarding rules for handling traffic receivedfrom the network device 120 destined for the migrating guest 110, andfor handling traffic received from the target 160 destined for thenetwork device 120. The instructions 138 may even further provide fortearing down connections once migration is complete. For example, thesource 130 may wait a predetermined amount of time after migration iscomplete for traffic to drop off, and then remove the bidirectionalforwarding rules from the flow table. As another example, forwardingrules set upon the source 130 may be torn down once all network devicescommunicating with the migrated guest 110 confirm that they haveswitched over to communicating with the target 160.

Although FIG. 2 functionally illustrates the processor 139 and memory132 as being within the same block, it will be understood that theprocessor and memory may actually comprise multiple processors andmemories that may or may not be stored within the same physical housing.For example, some of the instructions and data may be stored onremovable CD-ROM and others within a read-only computer chip. Some orall of the instructions and data may be stored in a location physicallyremote from, yet still accessible by, the processor 139. Similarly, theprocessor 139 may actually comprise a collection of processors which mayor may not operate in parallel. In some examples, the memory 132 and/orthe one or more processors 139 may be part of a hypervisor.

The controller 180 also includes memory 182 and one or more processors189, similar to the source 130. The one or more processors 189 may alsotake any of the forms described above in connection with the sourceprocessor(s) 139. The memory 182 includes data 184 and instructions 188.The memory 182 may be any of the types and may include any of thefeatures described above in connection with the source memory 132. Theinstructions 188 provide for detecting completion of live migration andfor updating an address of the guest on the target host. Detection ofcompletion of the live migration may include, for example, receiving anotification from one of the source 130 and the target 160 indicatingthat the migration is complete. Updating the address may includeprogramming the target and source to prepare for migration andprogramming the rest of the network to be aware of the source andtarget. The instructions 188 may further provide for informing othernetwork devices, such as the network device 120, that live migration iscomplete. This may further include providing the updated address for theguest on the target to the network devices.

FIG. 3 illustrates another example system 300. The system 300, similarto the system 100 of FIG. 1, may include a number of connected networkcomponents, such as a source 330, target 360, and controller 380. Thesource 330, target 360, and controller 380 may be similar to the source130, target 160, and controller 180 described above in connection withFIGS. 1-2.

The system 300 may further include “other” guest 325, residing on“other” host 320, communicatively coupled to the source 330, target 360,and controller 380. The other host 320 may, in conjunction with thesource 330 and target 360, perform triangular routing as describedabove. This may be performed, for example, in addition or in thealternative to the bidirectional forwarding described above in FIG. 1.Similar to the source host and target host, the other host may be anytype of virtualized or non-virtualized network device. While only oneother host and other guest are shown, multiple other hosts and guestsmay be implemented.

In this example, the target host 360 contacts the controller 380, asshown for example by communication 342, to subscribe to network updates.In response to a lookup request 344, the controller provides the otherhost 320 with a token, as shown by communication 346. The token may beused for communicating directly with the guest 310 on the target host360.

While the example of FIG. 3 illustrates performing a lookup request 344,in other examples flows for communicating with the migration guest 310on the target host 360 may be pushed to the other hosts beforeforwarding needs to take place. For example, the flows may be pushed tothe other hosts during brownout and/or blackout.

The other guest 325 sends traffic 352 to the source host 330, which isforwarded to the target host 360, as shown by communication 354. Thesource host 330 continues to forward such traffic until the other guest325 receives an incoming packet (shown by 356) from the target host 360.When the other guest 325 receives the packet 356 from the guest 310 onthe target host 360, the other guest 325 begins communicating directlywith the guest 310 on the target 360, as represented by communication358. For example, the other host 320 uses the token received from thecontroller 380 to authenticate and specify an egress path from the otherguest 325 to the guest 310 on the target host 360. In this regard, theother guest 325 is enabled to “learn” of the new location of the guest310 and automatically switch over to directly communicating with theguest 310 on the target 360 after receiving the first incoming packetfrom the guest 310 on that target 360.

FIG. 4 provides an example block diagram of the other guest 320. Asmentioned above, the other guest 325 may be a virtual machine or anyother virtualized networking component. The other guest 320 may run on ahypervisor residing on any host device in the network.

The other guest 325 includes memory 422, including data 424 andinstruction 428, and one or more processors 429. These components may besimilar to the memory and processors described above in connection withFIG. 2. The instructions 428 may provide for receiving a token forcommunication with the guest on the target host, sending traffic to theguest on the source host, and detecting incoming packets from the gueston the target host. When the incoming packet is detected, theinstructions 428 may further provide for using the received token toauthenticate and specify an egress path, and for sending packetsdirectly to the guest on the target host over the specified egress path.

Example Methods

FIG. 5 provides an example flow diagram illustrating a method 500 forlive migration of a virtualized networking stack from a source to atarget. It should be understood that the operations involved in thebelow methods need not be performed in the precise order described.Rather, various operations may be handled in a different order orsimultaneously, and operations may be added or omitted.

In block 510, the target sends information to the source regarding themigration. For example, a virtual machine manager (VMM) may be startedon the target host to trigger the live migration. The target VMM maycontact the source VMM to initiate the migration. According to otherexamples, the contact may be initiated by the target host, and/or may bedirected to the source host or the source guest. Further examplesinclude the source contacting the target, a third party devicecontacting both the source and the target, or any other mechanism forinitiating migration.

In block 520, the source receives the information from the target. Forexample, the source host, source VMM, and/or source guest may receivethe information. In some examples the information may serve as anotification to the guest that it is about to be migrated.

In some examples, the guest on the source host may take an action inresponse to being notified of the impending migration. One such actionmay be to change its health state, such as by placing itself into a lameduck mode.

In block 540, the source forwards received traffic from a virtualized ornon-virtualized network device, such as another guest, host, or otherdevice, to the target. For example, a network controller may installforwarding rules in a flow table on the source for forwarding thetraffic. Similarly, the target may receive the forwarded traffic andforward egress traffic destined for the network device to the source(block 550). As such, the source may receive the traffic forwarded fromthe target and provide it to the network device.

In block 560, it may be determined whether the migration is complete.Migration may be considered to be complete when, for example, the guesthas finished moving from the source to the target, or when the networkdevices are updated to communicate with the guest on the target host.According to one example, the source host may detect that the guest hasbeen migrated to the target host. As another example, the source may benotified of the completed migration by, for example, the networkcontroller. If migration is not yet complete, the source will continueto perform forwarding between the network device and the target.

If it is determined in block 560 that the migration is complete, inblock 550 processing is resumed on the target host and the guest on thetarget host receives packets directly from the network device. Forexample, the controller may provide the network device with an updatedaddress for the guest on the target host, thereby enabling the directcommunication.

FIG. 6 provides another example flow diagram illustrating a method 600for live migration of a virtualized networking stack facilitated by an“other” guest. Similar to the method 500 of FIG. 5, the operationsinvolved in the method 600 may be handled in a different order orsimultaneously, and operations may be added or omitted.

In block 610, the other guest receives a token for communicating themigration guest on the target host. The token may be received from anetwork controller, for example, in response to a lookup request. Thetoken may provide for authenticating and specifying an egress path tothe target. For example, the token may be used to authenticate packetsreceived directly from the target, to authenticate packets to beegressed directly to the target, to authenticate packets on the ingresspath from the target to the other guest, etc.

In block 620, the other guest sends network traffic to the migrationguest on the source host. Such traffic is received at the source (block630), and forwarded to the target (bock 640).

In block 650, the target receives the forwarded traffic from the source,and also forwards egress traffic destined for the other guest to thesource.

In block 660, the other guest determines whether it has received anincoming packet from the migration guest on the target host. If not, thesource and target continue to forward traffic to/from the other guest.However, when the other guest receives an incoming packet from thetarget, this may signal to the other guest that migration is complete.

Accordingly, in block 670, the other guest sends packets directly to themigration guest on the target. For example, the other guest uses thetoken received from the network controller to authenticate and specifyan egress path for the communication.

The method 600 may provide for a more seamless transition, in that theother guest is ready to begin sending packets to the guest on the targetonce migration is complete. For example, the other guest has the tokenfrom the controller for setting up an egress path to the target, andtherefore does not have to wait for an update from the controller oncemigration is complete.

The foregoing techniques are further advantageous in that they providefor moving the active processes of the guest virtual machine from thesource host to the target host with minimal impact on the guest. Theguest processes may be subject to minimal or no delay or termination.Moreover, exposing the migration guest to the impending live migration,and allowing the migration guest to take action in response, is alsoadvantageous. For example, placing the migration guest into lame duckmode helps to minimize impact on load balancing operations, andtherefore allows for continuous running of applications. This may beparticularly advantageous for applications that are sensitive toblackout delay.

As these and other variations and combinations of the features discussedabove can be utilized without departing from the subject matter asdefined by the claims, the foregoing description of exemplary aspectsshould be taken by way of illustration rather than by way of limitationof the subject matter as defined by the claims. It will also beunderstood that the provision of the examples described herein (as wellas clauses phrased as “such as,” “e.g.”, “including” and the like)should not be interpreted as limiting the claimed subject matter to thespecific examples; rather, the examples are intended to illustrate onlysome of many possible aspects.

1. A method of facilitating live migration of a migration guest from asource host to a target host, comprising: sending, by an other guest onanother host, packets to the migration guest on the source host, theother guest being a virtual machine; receiving at the other guest atoken for communicating directly with the migration guest on the targethost; receiving, at the other guest, one or more packets directly fromthe migration guest on the target host, and identifying, based on thereceived one or more packets, that migration is complete; and sending,from the other guest, after identifying that the migration is complete,packets directly to the migration guest on the target host using thereceived token to authenticate and specify an egress path from the otherguest to the migration guest on the target host.
 2. The method of claim1, further comprising: sending a lookup request from the other guest toa network controller; wherein the token is sent by the networkcontroller and received at the other guest in response to the lookuprequest.
 3. The method of claim 1, further comprising notifying themigration guest of the migration prior to a start of the migration. 4.The method of claim 3, further comprising changing a state of themigration guest in response to the notification.
 5. The method of claim3, further comprising communicating, by the migration guest, withanother system causing the another system to direct future processingrequests to other resources on a network for a duration of themigration.
 6. A system, comprising: a source host; a migration guestrunning on the source host; a target host in communication with thesource host; and an other guest in communication with the migrationguest on the source host, the other guest being a virtual machine;wherein: the other guest is configured to receive a token forcommunicating directly with the migration guest on the target host; thetarget host is configured to send packets directly to the other guestupon completion of migration of the migration guest; and the other guestis configured to determine when a packet is received directly from thetarget host, to use the token to authenticate and set up an egress pathfrom the other guest to the target host in response, and to send packetsdirectly to the migration guest on the target host.
 7. The system ofclaim 6, further comprising a network controller, wherein the networkcontroller is configured to provide the token to the other guest forcommunicating directly with the migration guest on the target host. 8.The system of claim 6, wherein the migration guest is notified of themigration prior to a start of the migration.
 9. The system of claim 8,wherein the migration guest is configured to change its state inresponse to the notification.
 10. The system of claim 9, wherein themigration guest places itself into a mode wherein it closes out existingconnections and denies future processing requests.
 11. The system ofclaim 10, wherein the migration guest places itself into the modefurther comprises enabling another task to service requests during themigration.
 12. The system of claim 10, wherein the migration guestplaces itself into the mode further comprises removing the migrationguest from load-balancing pools.
 13. The system of claim 8, wherein themigration guest communicates with another system, the communicationcausing the another system to direct future processing requests to otherresources on a network for a duration of the migration.
 14. A method,comprising: receiving, at a migration guest on a source host, anindication that the migration guest will be migrated from the sourcehost to a target host; changing, by the migration guest, a state of themigration guest from a first state to a second state in response toreceiving the indication, wherein in the second state the migrationguest completes existing tasks without accepting new task; copying themigration guest from the source host to the target host; sending, by themigration guest on the target host, one or more packets directly to another guest, the one or more packets indicating to the other guest thatmigration is complete, the other guest being a virtual machine; andreceiving, by the migration guest on the target host, packets directlyfrom the other guest through an egress path specified by a token at theother guest.
 15. The method of claim 14, wherein changing the state ofthe migration guest from the first state to the second state furthercomprises enabling another task to service requests during themigration.
 16. The method of claim 14, wherein changing the state of themigration guest from the first state to the second state furthercomprises removing the migration guest from load-balancing pools. 17.The method of claim 14, wherein copying the migration guest from thesource host to the target host is at least partially performed while themigration guest is in the second state.
 18. The method of claim 14,further comprising: sending a lookup request from the other guest to anetwork controller; wherein the token is sent by the network controllerand received at the other guest in response to the lookup request.