US 11,055,012 B2
Systems and methods for performing live migrations of software containers
Gaurav Makin, Shoreview, MN (US); Kody Kantor, Saint Paul, MN (US); Hao Wen, Falcon Heights, MN (US); Zhichao Cao, Falcon Heights, MN (US); and Vallari Mehta, Mountain View, CA (US)
Assigned to Veritas Technologies LLC, Santa Clara, CA (US)
Filed by Veritas Technologies LLC, Santa Clara, CA (US)
Filed on Apr. 20, 2020, as Appl. No. 16/853,197.
Application 16/853,197 is a continuation of application No. 16/197,344, filed on Nov. 20, 2018, granted, now 10,664,186.
Application 16/197,344 is a continuation of application No. 15/261,596, filed on Sep. 9, 2016, granted, now 10,162,559, issued on Dec. 25, 2018.
Prior Publication US 2020/0249864 A1, Aug. 6, 2020
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 12/00 (2006.01); G06F 3/06 (2006.01); G06F 9/48 (2006.01); H04L 29/08 (2006.01); G06F 11/14 (2006.01); G06F 11/36 (2006.01)
CPC G06F 3/0647 (2013.01) [G06F 3/0604 (2013.01); G06F 3/067 (2013.01); G06F 3/0644 (2013.01); G06F 9/4856 (2013.01); H04L 67/142 (2013.01); H04L 67/34 (2013.01); G06F 11/1438 (2013.01); G06F 11/1446 (2013.01); G06F 11/3688 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
migrating a software container from a source computing system to a target computing system while a process executes within the software container, the migrating comprising:
creating a checkpoint comprising a representation of a state of the process;
transferring the checkpoint to the target computing system;
subsequent to creating the checkpoint, creating an incremental checkpoint comprising a representation of at least one change in the state of the process;
determining, based on the incremental checkpoint, that migrating the software container from the source computing system to the target computing system will be completed within a specified time objective; and
based on the determining:
transferring the incremental checkpoint to the target computing system;
merging the incremental checkpoint with the checkpoint; and
transferring the software container from the source computing system to the target computing system.