Network beacon for hypervisor installations

ABSTRACT

A system and method for configuring components added to a network is disclosed. The method includes detecting, by a first hypervisor of a first host machine, that a second host machine having a second hypervisor is being added to a cluster of host machines comprising the first host machine, and identifying a plurality of network connections of the first hypervisor, each network connection being associated with one of a plurality of networks connecting hypervisors on host machines in the cluster, each network connection of the first hypervisor having a set of configuration settings. The method also includes generating, for each network connection, a message including a set of configuration settings of a corresponding network connection of the first hypervisor, and transmitting the message on a respective network to a second hypervisor to facilitate configuration of a corresponding network connection of the second hypervisor.

RELATED APPLICATIONS

This application is a continuation application of co-pending U.S. patentapplication Ser. No. 15/604,559, filed May 24, 2017, which is hereinincorporated by reference.

TECHNICAL FIELD

Aspects of the present disclosure are generally related to computingsystems, and more particularly to the configuration of host machines ina data center.

BACKGROUND

Data centers may include clusters consisting of multiple hosts (e.g.,physical servers) in racks. Hypervisors may be added to each host tocreate and run virtual machines. Virtual machines emulate computersystems and may be referred to as guest machines. To add a hypervisor toa host, an administrator may perform procedures using software toinstall specific software applications and apply specific networkconfigurations, security configurations, power managementconfigurations, and the like based on the specification of the host. Thehypervisors may be connected to and managed by a virtualizationmanagement system.

BRIEF DESCRIPTION OF THE DRAWINGS

The present disclosure is illustrated by way of examples, and not by wayof limitation, and may be more fully understood with references to thefollowing detailed description when considered in connection with thefigures, in which: FIG. 1 illustrates an example system architecture inwhich implementations of the disclosure may operate.

FIG. 2 is a flow diagram of one example of a method for facilitating anautomatic configuration of network connections on a host machine via anetwork, in accordance with one or more aspects of the presentdisclosure.

FIG. 3 is a flow diagram of another example of a method for facilitatingan automatic configuration of network connections on a host machine viaa network, in accordance with one or more aspects of the presentdisclosure.

FIG. 4 is a flow diagram of one example of a method for automaticallyconfiguring network connections on a host machine, in accordance withone or more aspects of the present disclosure.

FIG. 5 illustrates an example apparatus in which implementations of thedisclosure may operate.

FIG. 6 illustrates another example apparatus in which implementations ofthe disclosure may operate.

FIG. 7 illustrates yet another example apparatus in whichimplementations of the disclosure may operate.

FIG. 8 depicts a block diagram of a computing system operating inaccordance with one or more aspects of the present disclosure.

DETAILED DESCRIPTION

Data centers may include clusters that consist of numerous host systems(e.g., physical servers) included in an enclosure (e.g., rack). A datacenter may include one or more networks to enable communication betweenthe host machines of the same cluster and from cluster to cluster. Ahost machine in a cluster may include a hypervisor that is configured byan administrator. For example, an administrator can configure ahypervisor by installing certain software packages and applying specificnetwork configurations, security configurations (e.g., firewalls), powermanagement settings, and the like.

As new host machines are added to the cluster, administrators may plugthe new host machine physically into the racks and connect the variouscables to provide electricity to and/or enable communication between thehost machines of the cluster. The administrator then typically manuallyinstalls and configures the hypervisor of the new host machine for thenetwork connections of the cluster. Repeating the process of installingand configuring the hypervisor manually and individually on each newhost machine is cumbersome, error-prone, and inefficient.

Aspects of the present disclosure address the above and otherdeficiencies by facilitating an automatic configuration of networkconnections on a host machine using another device or host machine inthe data center. In particular, according to some aspects of thedisclosure, the other device (e.g., a device designated to providenetwork configuration information or the other host machine in thecluster) can have network connections previously configured by a user(e.g., an administrator) and can broadcast, on a respective network, amessage that includes configuration settings for a corresponding networkconnection. Such a message can be broadcasted periodically or upondetecting that a new hypervisor is being added to the cluster, asdescribed more fully below.

When a new hypervisor is installed on a host machine connected to one ormore networks in the data center, the new hypervisor may listen for amessage on a respective network to obtain configuration settings for itsconnection to that network. Upon receipt of the message over thecorresponding network connection, the new hypervisor may configure thenetwork connection using the configuration settings included in themessage and store the configuration settings in a data store. Thisprocess may be repeated for all network connections of the newhypervisor.

Thus, the technology discussed herein may be advantageous because itsignificantly simplifies and improves the process of configuring networkconnections of a hypervisor being added to a cluster by making theprocess less time consuming, more convenient for a user and notsusceptible to human errors.

FIG. 1 illustrates an example system architecture 100 in whichimplementations of the disclosure may operate. The system architecture100 may include a virtualization manager 110, a plurality of hostmachines 120A and 120B, and a device 130 coupled via a network 140. Thenetwork 140 may be a public network (e.g., the Internet), a privatenetwork (e.g., a local area network (LAN) or wide area network (WAN)),or a combination thereof. Network 140 may include a wirelessinfrastructure, which may be provided by one or more wirelesscommunications systems, such as a wireless fidelity (WiFi) hotspotconnected with the network 140 and/or a wireless carrier system that canbe implemented using various data processing equipment, communicationtowers, etc. Additionally or alternatively, networks 140 may include awired infrastructure (e.g., Ethernet).

Each of the host machines 120A and 120B may comprise one or moreprocessors communicatively coupled to memory devices and input/output(I/O) devices as described in more details below with references to FIG.8 . Each of the host systems 120A and 120B may run a network connectionmanager 124A and 124B (which may be components of a hypervisor 122A and122B, respectively) to manage and configure one or more networkconnections of the host machine. The network connection managers 124Aand 124B may generate, transmit and/or receive messages including setsof configuration settings for the one or more network connections of thehost machine. Examples of configuration settings include, but are notlimited to, network identifiers, network names and network mapping. Forexample, the message may identify one or more of the network connectionsas virtual local area networks (VLANs), which may cause a hypervisor toimplement a software bridge that all VLAN connections may connectthrough. In another example, the group of host machines may be a cloudsystem and the set of configuration settings may cause the hypervisor122A or 122B to implement a virtual switch. In another implementation,the set of configuration settings may cause the hypervisor to configureits network connections once the hypervisor is installed on the hostsystem. In an illustrative example, hypervisors 122A and 122B may beprovided by a Virtual Desktop and Server Management (VDSM) daemon (notshown). The VDSM daemon may include an application programming interface(API) with which the virtualization manager 110 interfaces.

In certain implementations, host systems 120A and 120B may be groupedinto one or more logical groups that may be also referred to as a “datacenter”. Each data center may be communicatively coupled, via thenetwork 140, to one or more storage domains storing disk images formachines. In one implementation, host machine 120A may be a host machinethat was previously configured for the one or more network connections,and host machine 120B may be a host machine that has been added to thecluster and has not yet been configured for the one or more networkconnections.

The virtualization manager 110 may be hosted by a computer system(described in more details herein below with references to FIG. 8 ) andinclude one or more computer programs executed by the computer systemfor centralized management of the system architecture 100. In oneimplementation, the virtualization manager 110 may comprise variousinterfaces, including administrative interface, reporting interface,and/or application programming interface (API) to communicate with hostmachines 120A and 120B of system architecture 100, as well as to userportals, directory servers, and various other components, which areomitted from FIG. 1 for clarity.

Virtualization manager 110 may detect changes in the clusterconfiguration and send a notification. In one example, virtualizationmanager 110 may include a cluster change notifier 112 and a hypervisordatabase 114. The cluster change notifier 112 may extract certaininformation, such as identification information (e.g., hypervisor name,hypervisor IP address, etc.), a set of configuration parameters (e.g.,software packages, network settings, security settings, power managementsettings, etc.), and the like, and store the information in thehypervisor database 114 for each existing host machine, such as hostmachine 120A. Further, the cluster change notifier 112 may detect that ahost machine, such as host machine 120B, has been added to the clusterand send a notification over network 140 to another host machine such ashost machine 120A and/or to device 130. The cluster change notifier 112may also detect changes in components of host machines 120A and/or 120B.For example, the cluster change notifier may detect that a new networkinterface card (NIC) has been installed on host machines 120A and/or120B. Although host systems 120A and 120B are shown, it should beunderstood that any number of host systems may be included in a datacenter.

In some implementations, instead of (or in addition to) facilitatingautomatic configuration of network connections of host machines via anetwork connection manager running on a host machine, aspects of thepresent disclosure use device 130 coupled host machines in the clustervia a network 140. Device 130 may be a designated device or another hostmachine that is communicatively coupled to the cluster and may includeany suitable computing device, such as a router, smartphone, tablet,laptop, desktop, server, system on a chip, or the like. As such, device130 may include one or more non-transitory, machine-readable storagemedia that store computer instructions and one or more processingdevices that execute the stored computer instructions. For example, thedevice 130 may execute a network connection agent 132 that has one ormore network connections for one or more networks in the data center.The network connections may be initially configured by a user (e.g., anadministrator) with particular configuration settings, and the networkconnection agent 132 may generate messages including the configurationsettings and broadcast the messages on respective networks usingcorresponding network connections. In one example, the data centerincludes a single designated device 130 with network connections to allnetworks in the data center. In another example, each cluster has asingle designated device 130 with network connections to all networksused by the cluster. In yet another example, multiple devices 130 areprovided, where each of these devices is associated with a particularnetwork in the data center and/or cluster, and has a configured networkconnection for that network.

FIG. 2 is a flow diagram of one example of a method 200 for facilitatingan automatic configuration of network connections on a host machine viaa network, in accordance with one or more aspects of the presentdisclosure. Method 200 and each of its individual functions, routines,subroutines, or operations may be performed by one or more processingdevices of the computer device executing the method. In certainimplementations, method 200 may be performed by a single processingthread. Alternatively, method 200 may be performed by two or moreprocessing threads, each thread executing one or more individualfunctions, routines, subroutines, or operations of the method. In anillustrative example, the processing threads implementing method 200 maybe synchronized (e.g., using semaphores, critical sections, and/or otherthread synchronization mechanisms). Alternatively, the processesimplementing method 200 may be executed asynchronously with respect toeach other.

For simplicity of explanation, the methods of this disclosure aredepicted and described as a series of acts. However, acts in accordancewith this disclosure can occur in various orders and/or concurrently,and with other acts not presented and described herein. Furthermore, notall illustrated acts may be required to implement the methods inaccordance with the disclosed subject matter. In addition, those skilledin the art will understand and appreciate that the methods couldalternatively be represented as a series of interrelated states via astate diagram or events. Additionally, it should be appreciated that themethods disclosed in this specification are capable of being stored onan article of manufacture to facilitate transporting and transferringsuch methods to computing devices. The term “article of manufacture,” asused herein, is intended to encompass a computer program accessible fromany computer-readable device or storage media. In one implementation,method 200 may be performed by the network connection agent 132 executedby one or more processing devices of device 130. Alternatively, method200 may be performed by the network connection manager 124A executed byone or more processing devices of host system 120A.

Method 200 may begin at block 210. At block 210, a device (e.g., hostmachine 120A or designated device 130) associated with a network mayreceive a set of configuration settings for the network. In oneimplementation, an administrator may input the set of configurationsettings on the device via a command-line interface or a graphical userinterface. For example, the set of configuration settings may include anetwork identifier, a network name, network mapping, or any combinationthereof, for the network. In some implementations, the device mayreceive multiple sets of configuration settings for multiple networkconnections. At block 220, the device may use the received set ofconfiguration settings to configure the network connection(s). The setof configuration settings may be stored in a data store of device 130.

At block 230, the device may generate a message that includes the set ofconfiguration settings received at block 210. At block 240, the devicemay periodically broadcast the message on the respective network toprovide the set of configuration settings to a hypervisor that isconfiguring a corresponding network connection on a host machine. In oneimplementation, the device may periodically broadcast the message on thenetwork in response to a command. For example, an administrator mayissue a command for the device to periodically broadcast the message onthe network. In another implementation, the device may periodicallybroadcast the message on the network according to a timing schedule thatspecifies an amount of time between broadcasts of the message on thenetwork. For example, the timing schedule may specify that the amount oftime between broadcasts of the message is 10 seconds. Thus, when 10seconds has elapsed since the most recent broadcast of the message, themessage may be broadcast on the network. In a further implementation,the device may periodically broadcast the message on the network inresponse to receiving a notification from the virtualization manager(e.g., the cluster change notifier 112) indicating a change in theconfiguration of the cluster. For example, the device 130 may receive anotification from cluster change notifier 112 indicating that a new hostmachine or a new hypervisor is being added to the cluster. In anotherexample, the device 130 may receive a notification from cluster changenotifier 112 indicating that a new network interface card (NIC) has beeninstalled on a host machine in the cluster. In response to receiving thenotification, the device may begin to periodically broadcast the messageon the respective network. As discussed above, the device may beconnected to multiple networks, and may broadcast a correspondingmessage on each of those networks. In one implementation, the messagemay be periodically broadcast using an address resolution protocol (ARP)that maps an internet protocol (IP) address to a physical machineaddress. Using the ARP may allow the message to be broadcast on anetwork without having an IP address.

FIG. 3 is a flow diagram of another example of a method 300 forfacilitating an automatic configuration of network connections on a hostmachine via a network, in accordance with one or more aspects of thepresent disclosure. Method 300 and each of its individual functions,routines, subroutines, or operations may be performed by one or moreprocessing devices of the computer device executing the method. Incertain implementations, method 300 may be performed by a singleprocessing thread. Alternatively, method 300 may be performed by two ormore processing threads, each thread executing one or more individualfunctions, routines, subroutines, or operations of the method. In anillustrative example, the processing threads implementing method 300 maybe synchronized (e.g., using semaphores, critical sections, and/or otherthread synchronization mechanisms). Alternatively, the processesimplementing method 300 may be executed asynchronously with respect toeach other.

In one implementation, method 300 may be performed by the networkconnection manager 124A executed by one or more processing devices ofhost machine 120A.

Method 300 may begin at block 310. At block 310, hypervisor 124A of hostmachine 120A may detect that a second host machine having a secondhypervisor (e.g., host machine 120B and hypervisor 122B) is being addedto the cluster of host machines. The cluster of host machines mayinclude host machines 124A and 124B. In one implementation, hypervisor124A may detect the second most machine is being added to the cluster byreceiving a notification from the cluster change notifier 112 overnetwork 140. The notification may indicate that a second host machine(e.g., host machine 120B) has been added to the cluster. At block 320,hypervisor 124A may identify one or more network connections ofhypervisor 124A. Each network connection may be associated with anetwork that connects hypervisors on host machines in the cluster andeach network connection may have a set of configuration settings. Forexample, the set of configuration settings may include a networkidentifier, a network name, network mapping or any combination thereof.In one implementation, the hypervisor 124A may identify the networkconnections and corresponding sets of configuration settings bysearching and identifying the network connections and theircorresponding sets of configuration settings in a data store of hostmachine 120A. In some implementations, the cluster may include multiplenetworks connecting hypervisors on host machines in the cluster. Infurther implementations, a subset of the multiple networks connectinghypervisors on host machines in the cluster may be virtual networks,such as VLANs.

At block 330, hypervisor 122A may generate a message for each identifiednetwork connection at block 320 that includes the set of configurationsettings associated with each identified network connection. In oneimplementation, the hypervisor 122A may receive an input that selects asubset of the set of configuration settings for each of the identifiednetworks and the selected subset of the set of configuration settingswill be included in the generated message.

At block 340, hypervisor 122A may transmit the message on a respectivenetwork to the second hypervisor (e.g., hypervisor 122B) to facilitateconfiguration of a corresponding network connection of the secondhypervisor. In one implementation, hypervisor 122A may periodicallybroadcast the message on the respective network in response to a commandto transmit the message. For example, an administrator may input acommand to hypervisor 122A to periodically broadcast the message on therespective network. In another implementation, hypervisor 122A maytransmit the message on the respective network according to a timingschedule that specifies an amount of time between broadcasts of themessage on the respective network. For example, the timing schedule mayspecify that the amount of time between broadcasts of the message is 10seconds. Thus, when 10 seconds has elapsed since the most recenttransmission of the message on the respective network, the message maybe transmitted on the respective network. In a further implementation,hypervisor 122A may determine how frequently changes are made to therespective network and transmit the message in view of the determinedfrequency. For example, if the configuration of the respective networkis changed more frequently relative to other networks of the cluster,then the message may be transmitted more often. Conversely, if theconfiguration of the respective network is changed less frequentlyrelative to other networks of the cluster, then the message may betransmitted less often. In one implementation, the message may betransmitted using an ARP that maps an IP address to a physical machineaddress.

FIG. 4 is a flow diagram of one example of a method 400 forautomatically configuring network connections on a host machine, inaccordance with one or more aspects of the present disclosure. Method400 and each of its individual functions, routines, subroutines, oroperations may be performed by one or more processing devices of thecomputer device executing the method. In certain implementations, method400 may be performed by a single processing thread. Alternatively,method 400 may be performed by two or more processing threads, eachthread executing one or more individual functions, routines,subroutines, or operations of the method. In an illustrative example,the processing threads implementing method 400 may be synchronized(e.g., using semaphores, critical sections, and/or other threadsynchronization mechanisms). Alternatively, the processes implementingmethod 400 may be executed asynchronously with respect to each other.

In one implementation, method 400 may be performed by the networkconnection manager 124B executed by one or more processing devices ofhost machine 120B.

Method 400 may begin at block 410. At block 410, hypervisor 122B of hostmachine 120B may determine that network identifying information of oneor more networks that the hypervisor 122B is connected to is unknown.For example, when hypervisor 122B is first connected to the networks ofa cluster, it may search a data store of host machine 120B for networkidentifying information associated with the connected networks of thecluster. If the network identifying information is not found in the datastore, then the hypervisor 122B may determine that the networkidentifying information of the connected networks of the cluster isunknown. Alternatively, the hypervisor 122B may detect that a new NIChas been installed on the host machine and may determine that networkidentifying information of the network associated with the new NIC isunknown.

At block 420, the hypervisor 122B may listen for messages on thenetworks in order to obtain network identifying information for therespective networks. In one implementation, the hypervisor 122B maylisten for messages in response to receiving a command to beginlistening for messages on the networks of the cluster. For example, anadministrator may input a command for hypervisor 122B to begin listeningfor messages over the networks of the cluster.

At block 430, hypervisor 122B may receive a message over one of thenetworks of the cluster. The message may include a network identifierand a set of configuration settings for the network the message isreceived on. At block 440, hypervisor 122B may configure a networkconnection of the host machine 120B for the network the message wasreceived over. The network connection may be configured in view of thenetwork identifier and the set of configuration settings that wereincluded in the received message. The hypervisor 122B may store thenetwork identifier and the set of configuration settings in a data storeof host machine 120B. In some implementations, hypervisor 122B mayreceive a second message on the network that includes an updated networkidentifier and/or an updated set of configuration settings. Hypervisor122B may re-configure the network connection of the host machine 120B inview of the updated network identifier and/or the updated set ofconfiguration settings from the message. For example, an administratormay update network configuration settings for one or more networks andhypervisor 122B may receive a message including the updatedconfiguration settings. The hypervisor 122B may store the updatedconfiguration settings in a data store of host machine 120B.

FIG. 5 illustrates an example apparatus 500 in which implementations ofthe disclosure may operate. The apparatus 500 may be the same or similarto one of the distributed computing system, a network, or othercomputing devices. Data stores 510 and 550 may include anynon-persistent data storage (e.g., memory), persistent data storage(e.g., flash storage, hard drive, tape), another medium, or combinationthereof that is capable of storing instructions for carrying out theoperations of the components and module discussed herein. Furthermore,the data stores 510 and 550 may store information (e.g., policymanagement information).

The apparatus 500 may include a first host machine 505 having aprocessing device 520 that executes a first hypervisor 525. The firsthypervisor 525 may include a settings receiving component 530, a messagegenerating component 532, and a message broadcasting component 534.

The settings receiving component 530 may receive a set of configurationsettings for a network of a cluster that are to be included in agenerated message. The message generating component 532 may generate themessage that includes the set of configuration settings received by thesettings receiving component 530. The message broadcasting component 534may periodically broadcast the message generated by the messagegenerating component 532 over the network of the cluster to provide theset of configuration settings to a hypervisor that is configuring acorresponding network connection on a host machine from the cluster. Themessage broadcasting component 534 may also determine when to transmitthe message. For example, the message broadcasting component 534 mayperiodically broadcast the message in response to receiving a command tobroadcast the message. In one implementation, the message broadcastingcomponent 534 may broadcast the message according to a timing schedule.In a further implementation, the message broadcasting component 534 maybroadcast the message in view of how frequently a network is changed.

The apparatus 500 may include a second host machine 545 having aprocessing device 560 that executes a second hypervisor 565. The secondhost machine 545 may be communicatively coupled to the first hostmachine 505 via one or more networks 540.

FIG. 6 illustrates another example apparatus 600 in whichimplementations of the disclosure may operate. The apparatus 600 may bethe same or similar to one of the distributed computing system, anetwork, or other computing devices. Data stores 610 and 650 may includeany non-persistent data storage (e.g., memory), persistent data storage(e.g., flash storage, hard drive, tape), another medium, or combinationthereof that is capable of storing instructions for carrying out theoperations of the components and module discussed herein. Furthermore,the data stores 610 and 650 may store information (e.g., policymanagement information).

The apparatus 600 may include a first host machine 605 having aprocessing device 620 that executes a first hypervisor 625. The firsthypervisor 625 may include a network identifying component 630, amessage receiving component 632, and a network configuration component634.

The network identifying component 630 may determine that networkidentifying information of one or more networks that a hypervisor isconnected to is unknown. The message receiving component 632 may listenand receive a message that includes a network identifier and set ofconfiguration settings for each of the one or more networks. The networkconfiguration component 634 may configure a network connection of thehypervisor for a respective network in view of the network identifierand the set of configuration settings from the message received by themessage receiving component 632.

The apparatus 600 may include a second host machine 645 having aprocessing device 660 that executes a second hypervisor 665. The secondhost machine 645 may be communicatively coupled to the first hostmachine 605 via one or more networks 640.

FIG. 7 illustrates yet another example apparatus 700 in whichimplementations of the disclosure may operate. The apparatus 700 may bethe same or similar to one of the distributed computing system, anetwork, or other computing devices. Data stores 710 and 750 may includeany non-persistent data storage (e.g., memory), persistent data storage(e.g., flash storage, hard drive, tape), another medium, or combinationthereof that is capable of storing instructions for carrying out theoperations of the components and module discussed herein. Furthermore,the data stores 710 and 750 may store information (e.g., policymanagement information).

The apparatus 700 may include a first host machine 705 having aprocessing device 720 that executes a first hypervisor 725. The firsthypervisor 725 may include a network identification component 730, amessage generating component 732, and a message transmitting component734.

The network identification component 730 may identify a set ofconfiguration settings for a network of a cluster that are to beincluded in a generated message. The message generating component 732may generate the message that includes the set of configuration settingsidentified by the network identification component 730. The messagetransmitting component 734 may transmit the message generated by themessage generating component 732 over a respective network to a secondhypervisor to facilitate configuration of a corresponding networkconnection of the second hypervisor. The message transmitting component734 may also determine when to transmit the message. For example, themessage transmitting component 734 may transmit the message in responseto receiving a command to transmit the message. In one implementation,the message transmitting component 734 may transmit the messageaccording to a timing schedule. In a further implementation, the messagetransmitting component 734 may transmit the message in view of howfrequently a network is changed.

The apparatus 700 may include a second host machine 745 having aprocessing device 760 that executes a second hypervisor 765. The secondhost machine 745 may be communicatively coupled to the first hostmachine 705 via one or more networks 740.

FIG. 8 depicts a block diagram of a computing system operating inaccordance with one or more aspects of the present disclosure. Invarious illustrative examples, computing system 800 may correspond toone or more of the network system, the application, the DNS server, thedata centers, the load balancers, the client device, or other computingdevices.

In certain implementations, computing system 800 may be connected (e.g.,via a network, such as a Local Area Network (LAN), an intranet, anextranet, or the Internet) to other computing systems. Computing system800 may operate in the capacity of a server or a client computer in aclient-server environment, or as a peer computer in a peer-to-peer ordistributed network environment. Computing system 800 may be provided bya personal computer (PC), a tablet PC, a set-top box (STB), a PersonalDigital Assistant (PDA), a cellular telephone, a web appliance, aserver, a network router, switch or bridge, or any device capable ofexecuting a set of instructions (sequential or otherwise) that specifyactions to be taken by that device. Further, the term “computer” shallinclude any collection of computers that individually or jointly executea set (or multiple sets) of instructions to perform any one or more ofthe methods described herein.

In a further aspect, the computing system 800 may include a processor802, a volatile memory 804 (e.g., random access memory (RAM)), anon-volatile memory 806 (e.g., read-only memory (ROM) orelectrically-erasable programmable ROM (EEPROM)), and a data storagedevice 816, which may communicate with each other via a bus 808.

Processor 802 may be provided by one or more processing devices such asa general purpose processor (such as, for example, a complex instructionset computing (CISC) microprocessor, a reduced instruction set computing(RISC) microprocessor, a very long instruction word (VLIW)microprocessor, a microprocessor implementing other types of instructionsets, or a microprocessor implementing a combination of types ofinstruction sets) or a specialized processor (such as, for example, anapplication specific integrated circuit (ASIC), a field-programmablegate array (FPGA), a digital signal processor (DSP), or a networkprocessor).

Computing system 800 may further include a network interface device 822.Computing system 800 also may include a video display unit 810 (e.g., anLCD), an alphanumeric input device 812 (e.g., a keyboard), a cursorcontrol device 814 (e.g., a mouse), and a signal generation device 820.

Data storage device 816 may include a non-transitory computer-readablestorage medium 824 on which may be stored instructions 826 encoding anyone or more of the methods or functions described herein, includinginstructions for implementing methods 200, 300 and 400.

Instructions 826 may also reside, completely or partially, withinvolatile memory 804 and/or within processor 802 during execution thereofby computing system 800, hence, volatile memory 804 and processor 802may also constitute machine-readable storage media.

While computer-readable storage medium 824 is shown in the illustrativeexamples as a single medium, the term “computer-readable storage medium”shall include a single medium or multiple media (e.g., a centralized ordistributed database, and/or associated caches and servers) that storethe one or more sets of executable instructions. The term“computer-readable storage medium” shall also include any tangiblemedium that is capable of storing or encoding a set of instructions forexecution by a computer that causes the computer to perform any one ormore of the methods described herein. The term “computer-readablestorage medium” shall include, but not be limited to, solid-statememories, optical media, and magnetic media.

The methods, components, and features described herein may beimplemented by discrete hardware components or may be integrated intothe functionality of other hardware components such as ASICS, FPGAs,DSPs or similar devices. In addition, the methods, components, andfeatures may be implemented by program modules or functional circuitrywithin hardware devices. Further, the methods, components, and featuresmay be implemented in any combination of hardware devices and programcomponents, or only in programs.

Unless specifically stated otherwise, terms such as “loading,”“transmitting,” “receiving,” “overwriting,” “initiating,” “discovering,”“analyzing,” or the like, refer to actions and processes performed orimplemented by computing systems that manipulate and transform datarepresented as physical (electronic) quantities within the computingsystem registers and memories into other data similarly represented asphysical quantities within the computing system memories or registers orother such information storage, transmission or display devices. Also,the terms “first,” “second,” “third,” “fourth,” etc. as used herein aremeant as labels to distinguish among different elements and may not havean ordinal meaning according to their numerical designation.

Examples described herein also relate to an apparatus for performing themethods described herein. This apparatus may be specially constructedfor performing the methods described herein, or it may comprise ageneral-purpose computing system selectively programmed by a programstored in the computing system. Such a program may be stored in acomputer-readable tangible storage medium.

The methods and illustrative examples described herein are notinherently related to any particular computer or other apparatus.Various general-purpose systems may be used in accordance with theteachings described herein, or it may prove convenient to construct morespecialized apparatus to perform methods 200, 300 and 400 and/or each ofits individual functions, routines, subroutines, or operations. Examplesof the structure for a variety of these systems are set forth in thedescription above.

The above description is intended to be illustrative, and notrestrictive. Although the present disclosure has been described withreferences to specific illustrative examples and implementations, itwill be recognized that the present disclosure is not limited to theexamples and implementations described. The scope of the disclosureshould be determined with reference to the following claims, along withthe full scope of equivalents to which the claims are entitled.

What is claimed is:
 1. A method comprising: detecting, by a firsthypervisor of a first host machine, that a second host machine is beingadded to a cluster of host machines comprising the first host machine,the second host machine having a second hypervisor; identifying, by aprocessing device executing the first hypervisor, a plurality of networkconnections of the first hypervisor, each of the plurality of networkconnections being associated with one of a plurality of networksconnecting hypervisors on host machines in the cluster, each of theplurality of network connections of the first hypervisor having a set ofconfiguration settings; generating, for each of the plurality of networkconnections, a message including a set of configuration settings of acorresponding network connection of the first hypervisor; andtransmitting the message on a respective network of the plurality ofnetworks to the second hypervisor to facilitate configuration of acorresponding network connection of the second hypervisor.
 2. The methodof claim 1, further comprising generating the message in response toreceiving an input identifying the set of configuration settings.
 3. Themethod of claim 1, wherein a subset of the plurality of networksconnecting the hypervisors on the cluster of host machines comprisevirtual networks.
 4. The method of claim 1, further comprising:determining how frequently changes are made to the respective network,and transmitting the message in view of the determined frequency.
 5. Themethod of claim 1, wherein the message is transmitted in response to acommand to transmit the message over the respective network.
 6. Themethod of claim 1, wherein transmitting the message comprises using anaddress resolution protocol to map an internet protocol address to aphysical machine address.
 7. The method of claim 1, wherein the messageis transmitted on each network according to a timing schedule thatspecifies an amount of time between broadcasts of the message onnetwork.
 8. The method of claim 1, wherein identifying the plurality ofnetwork connections of the first hypervisor comprises: searching a datastore for the plurality of network connections of the first hypervisor;and identifying the set of configuration settings corresponding to eachof the plurality of network connections of the first hypervisor.
 9. Asystem comprising: a memory; and a processing device of a first hostmachine operatively coupled to the memory, wherein the processing deviceis to: detect, by a first hypervisor of the first host machine, that asecond host machine is being added to a cluster of host machinescomprising the first host machine, the second host machine having asecond hypervisor; identify, by the processing device executing thefirst hypervisor, a plurality of network connections of the firsthypervisor, each of the plurality of network connections beingassociated with one of a plurality of networks connecting hypervisors onhost machines in the cluster, each of the plurality of networkconnections of the first hypervisor having a set of configurationsettings; generate, for each of the plurality of network connections, amessage including a set of configuration settings of a correspondingnetwork connection of the first hypervisor; and transmit the message ona respective network of the plurality of networks to the secondhypervisor to facilitate configuration of a corresponding networkconnection of the second hypervisor.
 10. The system of claim 9, whereinthe processing device is to generate the message in response toreceiving an input identifying the set of configuration settings. 11.The system of claim 9, wherein a subset of the plurality of networksconnecting the hypervisors on the cluster of host machines comprisevirtual networks.
 12. The system of claim 9, wherein the processingdevice is further to: determine how frequently changes are made to therespective network, and wherein the processing device is to transmit themessage in view of the determined frequency.
 13. The system of claim 9,wherein the processing device is to transmit the message in response toa command to transmit the message over the respective network.
 14. Thesystem of claim 9, wherein transmitting the message comprises using anaddress resolution protocol to map an internet protocol address to aphysical machine address.
 15. The system of claim 9, wherein theprocessing device is to transmit the message on each network accordingto a timing schedule that specifies an amount of time between broadcastsof the message on network.
 16. The system of claim 9, wherein toidentify the plurality of network connections of the first hypervisor,the processing device is further to: search a data store for theplurality of network connections of the first hypervisor; and identifythe set of configuration settings corresponding to each of the pluralityof network connections of the first hypervisor.
 17. A non-transitorycomputer readable medium comprising instructions, which when executed bya processing device, cause the processing device to: detect, by a firsthypervisor of a first host machine, that a second host machine is beingadded to a cluster of host machines comprising the first host machine,the second host machine having a second hypervisor; identify, by thefirst hypervisor, a plurality of network connections of the firsthypervisor, each of the plurality of network connections beingassociated with one of a plurality of networks connecting hypervisors onhost machines in the cluster, each of the plurality of networkconnections of the first hypervisor having a set of configurationsettings; generate, for each of the plurality of network connections, amessage including a set of configuration settings of a correspondingnetwork connection of the first hypervisor; and transmit the message ona respective network of the plurality of networks to the secondhypervisor to facilitate configuration of a corresponding networkconnection of the second hypervisor.
 18. The non-transitory computerreadable medium of claim 17, wherein the processing device is togenerate the message in response to receiving an input identifying theset of configuration settings.
 19. The non-transitory computer readablemedium of claim 17, wherein a subset of the plurality of networksconnecting the hypervisors on the cluster of host machines comprisevirtual networks.
 20. The non-transitory computer readable medium ofclaim 17, wherein the processing device is further to: determine howfrequently changes are made to the respective network, and wherein theprocessing device is to transmit the message in view of the determinedfrequency.