[Engine-devel] [Design for 3.2 RFE] Improving proxy selection algorithm for Power Management operations
Eli Mesika
emesika at redhat.com
Sun Nov 11 16:24:39 UTC 2012
----- Original Message -----
> From: "Simon Grinberg" <simon at redhat.com>
> To: "Eli Mesika" <emesika at redhat.com>
> Cc: "engine-devel" <engine-devel at ovirt.org>, "Dan Kenigsberg" <danken at redhat.com>
> Sent: Sunday, November 11, 2012 5:45:41 PM
> Subject: Re: [Engine-devel] [Design for 3.2 RFE] Improving proxy selection algorithm for Power Management operations
>
> Trying to answer open questions + provide feedback
>
> -1. We need to change the term Power Management, we only do fencing
> here so why not call it by name, it may confuse with real power
> modes management that we'll probably do via VDSM and not via OOB
> management. Especially as some of the devices external to the host
> can only do fencing anyhow.
>
> I'll change the requirement page, to reflect that + I'll split the
> proxy from dual card support, as the design should.
This was already done:
http://wiki.ovirt.org/wiki/Features/Design/HostPMProxyPreferences
http://wiki.ovirt.org/wiki/Features/Design/HostPMMultipleAgents
Have to move, will comment on other issues later on, please modify the new slitted wiki pages
>
>
> -2. Default value should be 'cluster, dc, engine' not the other way
> around. Actually most users I've been talking to will just use
> 'cluster' since this matches the classic cluster definition where
> host could only be fenced by another host in the cluster.
>
> I'll change requirements to reflect that.
>
> -3. The directly selected hosts comes to accommodate two use cases:
> -3.1- Switch failure - if the fence network for hosts in a
> DC/Cluster have to split between two switches. Then you will
> prefer to use hosts that are for sure on the other switch
> -3.2- Legacy clusters merged into larger clusters due to a move to
> oVirt then the infrastructural may still fit to the legacy
> connectivity - lot's of firewalls rules or direct connections
> that limit access to fencing devices to specific hosts.
> -3.3- Clustered applications within the VMs, you only want your
> pears to be allowed to fence you. This is limited for VMs running
> on specific host group (affinity management that we don't have
> yet, but we can lock VMs to specific hosts).
>
> Note that the above was not meant to accommodate any random
> server, just hosts in the setup, hosts that already run VDSM.
> Meaning that maybe instead of the FQDN we can just use hostname -
> so the UUID will be registered in the tables
> I don't why it's so complex, if a host provided is removed from
> the system you either get a canDoAction to remove it from the
> configuration as well (or a warning that this will remove the
> host from the fencing configuration). Your only risk if all of
> them are removed, then you need to set the exclamation mark again
> (power management is not configured for this host)
>
> - 4. Assumption that every host will have all elements is wrong. In
> the requirement page I've gave combinations where it isn't.
> Like said there are use cases where you don't want to diverge from
> hosts in the same cluster. Reason is that if the last host in the
> cluster (assuming clustered VMs running on this host) you may
> actually prefer it won't be fenced. Similar to -3.3-
>
> - 5. Thinking about it more, Though the chain is more generic and
> flexible, I would like to return to my original suggestion, of
> having just primary and secondary proxy:
> Primary Proxy 1 => Drop down -> Any cluster host / Any DC host /
> RHEV Manager / Named host out of the list of all the hosts
> Secondary Proxy 2 => Drop down -> Any cluster host / Any DC host
> / RHEV Manager / Named host out of the list of all the hosts
> I think is simpler as far as a user is concerned and it's
> simpler for us to implement two fields single value in each.
> And I don't believe we really need more, even in the simple
> case of cluster only hosts, for clusters larger then 4 hosts by
> the time you get to the secondary it may be too late. Secondary
> is more critical for the 'Named host' option or small clusters.
>
> I'll look at it some more later today, but sending now to get as much
> feedback as possible.
>
> Regards,
> Simon
>
>
> ----- Original Message -----
> > From: "Eli Mesika" <emesika at redhat.com>
> > To: "Dan Kenigsberg" <danken at redhat.com>
> > Cc: "engine-devel" <engine-devel at ovirt.org>
> > Sent: Sunday, November 11, 2012 1:18:53 PM
> > Subject: Re: [Engine-devel] [Design for 3.2 RFE] Improving proxy
> > selection algorithm for Power Management operations
> >
> >
> >
> > ----- Original Message -----
> > > From: "Eli Mesika" <emesika at redhat.com>
> > > To: "Itamar Heim" <iheim at redhat.com>
> > > Cc: "engine-devel" <engine-devel at ovirt.org>
> > > Sent: Friday, November 9, 2012 12:06:05 PM
> > > Subject: Re: [Engine-devel] [Design for 3.2 RFE] Improving proxy
> > > selection algorithm for Power Management operations
> > >
> > >
> > >
> > > ----- Original Message -----
> > > > From: "Itamar Heim" <iheim at redhat.com>
> > > > To: "Eli Mesika" <emesika at redhat.com>
> > > > Cc: "engine-devel" <engine-devel at ovirt.org>, "Michael
> > > > Pasternak"
> > > > <mpastern at redhat.com>, "Simon Grinberg"
> > > > <sgrinber at redhat.com>, "Dan Kenigsberg" <danken at redhat.com>
> > > > Sent: Friday, November 9, 2012 12:02:37 PM
> > > > Subject: Re: [Engine-devel] [Design for 3.2 RFE] Improving
> > > > proxy
> > > > selection algorithm for Power Management operations
> > > >
> > > > On 11/09/2012 10:52 AM, Eli Mesika wrote:
> > > >
> > > > >> >
> > > > >> > > FenceWrapper
> > > > >> >
> > > > >> >i understand danken suggested going this way, rather than
> > > > >> >than
> > > > >> >another
> > > > >> >instance of vdsm.
> > > > >> >is vdsm only calling these scripts today and all logic is
> > > > >> >in
> > > > >> >engine,
> > > > >> >or
> > > > >> >does vdsm has any logic in wrapping these scripts (not a
> > > > >> >blocker
> > > > >> >to
> > > > >> >doing FenceWrapper, just worth extracting that logic from
> > > > >> >vdsm
> > > > >> >to
> > > > >> >such a
> > > > >> >script, then using it in both. i hope answer is 'no
> > > > >> >logic'...)
> > > > > vdsm has some logic that maps between the call passed to it
> > > > > from
> > > > > engine and the actual parameters generated for the script.
> > > > > AFAIK, this logic only "builds" the correct arguments for the
> > > > > command according to the agent type
> > > > >
> > > >
> > > > can we extract it to an external wrapper?
> > > > I'd hate to fix bugs/changes twice for this.
> > >
> > > I'll check it with danken on SUN
> >
> > Well, looked at it a bit , the VDSM code is in fenceNote function
> > in
> > API.py
> > What I think is that we can exclude the fenceNote implementation to
> > a
> > separate fence.py file and call it from the API.py
> > Then we can use one of the following in Java to call the method
> > from
> > fence.py
> > 1) jython
> > 2) org.python.util.PythonInterpreter
> >
> > See
> > http://stackoverflow.com/questions/8898765/calling-python-in-java
> >
> > danken, what do you think ?
> >
> > >
> > > >
> > > _______________________________________________
> > > Engine-devel mailing list
> > > Engine-devel at ovirt.org
> > > http://lists.ovirt.org/mailman/listinfo/engine-devel
> > >
> > _______________________________________________
> > Engine-devel mailing list
> > Engine-devel at ovirt.org
> > http://lists.ovirt.org/mailman/listinfo/engine-devel
> >
>
More information about the Engine-devel
mailing list