主权项 |
1. A computer-implemented method comprising:
accessing, using one or more processors, a virtual machine (VM) configuration of a virtual machine, wherein
the VM is to be hosted by a host node, andthe VM configuration comprises one or more requirements that are necessary for hosting the VM; accessing a first cluster configuration of a first cluster, wherein
an n-ary tree comprises a first leaf level and a second leaf level,the first leaf level comprises at least a root node of the first cluster,the second leaf level comprises a first plurality of potential nodes (second leaf nodes) of the first cluster,the first plurality of second leaf nodes are configured to host at least one VM, andthe first cluster configuration comprises configuration information for one or more nodes of the first plurality of second leaf nodes, wherein
each second leaf node of the one or more second leaf nodes generates configuration information corresponding to the each second leaf node; and comparing the configuration information corresponding to the each second leaf node with the VM configuration, wherein
the each second leaf node performs the comparing with respect to itself,the comparing determines whether the each second leaf node is capable of satisfying the one or more requirements that are necessary for hosting the VM,the each second leaf node transmits a result of its respective comparison to the root node, andthe result is one of a set of such results; and provisioning the VM to be hosted at one of the second leaf nodes, wherein
the provisioning is based, at least in part, on the set of such results. |