> Well, you can't as far as I've looked in the source of panic.c. So I'm > thinking of > investigating of adding -1 as an option and seeing if I can push halt in, > let's hope > the guys that do kernel stuff find this useful too..... > So it seems the patch, I conjured up for panic.c, is seen as not so useful, there is however another way to achieve the same result. This would mean that we load a crash kernel with our own .sh script as init to do our bidding.
Would that be a plan ? Cheers, Funs Sent from my iPhone On 4 sep. 2013, at 23:35, "Marcus Sorensen" <shadow...@gmail.com> wrote: > What would work as a quick fix for this sort of situation would be if > the machine could be configured to power off rather than rebooting on > oom. Then the HA system would restart the VM, applying all configs. > > Anyone know how to do that? :-) > > On Wed, Sep 4, 2013 at 1:14 PM, Darren Shepherd > <darren.s.sheph...@gmail.com> wrote: >> On 09/04/2013 11:37 AM, Roeland Kuipers wrote: >>> >>> Hi Darren, >>> >>> Thanks for your reply! Could you share a bit more on your plans/ideas? >>> >>> We also have been braining on other approaches of managing the >>> systemvm's, especially small customizations for specific tenants. >>> And maybe even leveraging a config mgmt tools like chef or puppet >>> with the ability to integrate CS with that in some way. >> >> I'll have to send the full details later but here's a rough idea. >> The basic approach is this. Logical changes to the VRs (or system >> vms in general) get mapped to configuration items. So add a LB rule >> maps to iptables config and haproxy config. When you change a LB >> rule we then bump up the requested version of the configuration for >> iptables/haproxy. So the requested version will be 4 maybe. The >> applied version will be 3 as the VR still has the old configuration. >> Since 4 != 3, the VR will be signaled to pull the latest >> iptables/haproxy config. So it will pull the configuration. Say in >> the mean time somebody else adds four other LB rules. So the >> requested version is now at 8. So when the VR pulls the config it >> will get version 8, and then reply back saying it applied version 8. >> The applied version is now 8 which is greater than 4 (the version the >> first LB rule change was waiting >> for) so basically all async jobs waiting for the LB change will be done. >> >> To pull the configuration from the VR, the VR will be hitting a >> templating configuration system. So it pulls the full iptables and haproxy >> config. >> Not incremental changes. >> >> So if the VR ever reboots itself, it can easily just pull the latest >> config of everything and apply it. So it will be consistent. >> >> I'd be interested to hear what type of customizations you would like to add. >> It will definitely be an extensible system, but the problem is if >> your extensions wants to touch the same configuration files that ACS >> wants to manage. That gets a bit tricky as its really easy for each >> to break each other. But I can definitely add some hooks that users >> can use to mess up things and "void the warranty." >> >> I've thought about chef and puppet for this, but basically it comes >> down to two things. I'm really interested in this being fast and light >> weight. >> Ruby is neither of those. So the core ACS stuff will probably remain >> as very simple shell scripts. Simple in that they really just need >> to download configuration and restart services. They know nothing >> about the nature of the changes. If, as an extension, you want to do >> something with puppet, chef, I'd be open to that. That's your deal. >> >> This approach has many other benefits. Like, for example, we can >> ensure that as we deploy a new ACS release existing system VMs can be >> updated (without a reboot, unless the kernel changes). Additionally, >> its fast and updates happen in near constant time. So most changes >> will be just a couple of seconds, even if you have 4000 LB rules. >> >> Darren >>