There isn't anything I can think of wrt reliability. If the usage is limited to VR boot, then I don't see anything on the surface to limit performance.
In other words, xenstore as a solution seems a reasonable approach. -tim On Mon, Jan 15, 2018 at 8:26 PM, Pierre-Luc Dion <pd...@cloudops.com> wrote: > Hi Tim, > > As long as it work, since it's only used to for the initial instruction set > at the VR boot so eth0 can be configure, I think xenstore would work just > fine. > unless you are saying we could just not rely on xenstore in terms of > reliability? > > > *Pierre-Luc DION* > Architecte de Solution Cloud | Cloud Solutions Architect > t 855.652.5683 > > *CloudOps* Votre partenaire infonuagique* | *Cloud Solutions Experts > 420 rue Guy *|* Montreal *|* Quebec *|* H3J 1S6 > w cloudops.com *|* tw @CloudOps_ > > On Fri, Jan 12, 2018 at 7:34 PM, Tim Mackey <tmac...@gmail.com> wrote: > > > > We found that we can use xenstore-read / xenstore-write to send data > from > > dom0 to domU which are in our case VRs or SVMs. Any reason not using > this > > approach ? > > > > xenstore has had some issues in the past. The most notable of which were > > limitations on the number of event channels in use, followed by overall > > performance impact. iirc, the event channel stuff was fully resolved with > > XenServer 6.5, but they do speak to a need to test if there are any > changes > > to the maximum number of VMs which can be reliably supported. It also > > limits legacy support (in case that matters). > > > > Architecturally I think this is a reasonable approach to the problem. One > > other thing to note is that xapi replicates xenstore information to all > > members of a pool. That might impact RVRs. > > > > -tim > > > > [1] "xenstore is not a high-performance facility and should beused only > for > > small amounts of control plane data." > > https://xenbits.xen.org/docs/4.6-testing/misc/xenstore.txt > > > > On Fri, Jan 12, 2018 at 4:56 PM, Pierre-Luc Dion <pd...@cloudops.com> > > wrote: > > > > > After some verification with Syed and Khosrow, > > > > > > We found that we can use xenstore-read / xenstore-write to send data > from > > > dom0 to domU which are in our case VRs or SVMs. Any reason not using > > this > > > approach ? that way we would not need a architectural change for > > XenServer > > > pods, and this would support HVM and PV virtual-router. more test > > required, > > > for sure, VR would need to have xentools pre-installed. > > > > > > > > > *Pierre-Luc DION* > > > Architecte de Solution Cloud | Cloud Solutions Architect > > > t 855.652.5683 > > > > > > *CloudOps* Votre partenaire infonuagique* | *Cloud Solutions Experts > > > 420 rue Guy *|* Montreal *|* Quebec *|* H3J 1S6 > > > w cloudops.com *|* tw @CloudOps_ > > > > > > On Fri, Jan 12, 2018 at 4:07 PM, Syed Ahmed <sah...@cloudops.com> > wrote: > > > > > > > KVM uses a VirtIO channel to send information about the IP address > and > > > > other params to the SystemVMs. We could use a similar strategy in > > > XenServer > > > > using XenStore. This would involve minimal changes to the code while > > > > keeping backward compatibility. > > > > > > > > > > > > > > > > On Fri, Jan 12, 2018 at 3:07 PM, Simon Weller > <swel...@ena.com.invalid > > > > > > > wrote: > > > > > > > > > They do not. They receive a link-local ip address that is used for > > host > > > > > agent to VR communication. All VR commands are proxied through the > > host > > > > > agent. Host agent to VR communication is over SSH. > > > > > > > > > > > > > > > ________________________________ > > > > > From: Rafael Weingärtner <rafaelweingart...@gmail.com> > > > > > Sent: Friday, January 12, 2018 1:42 PM > > > > > To: dev > > > > > Subject: Re: [DISCUSS] running sVM and VR as HVM on XenServer > > > > > > > > > > but we are already using this design in vmware deployments (not > sure > > > > about > > > > > KVM). The management network is already an isolated network only > used > > > by > > > > > system vms and ACS. Unless we are attacked by some internal agent, > we > > > are > > > > > safe from customer attack through management networks. Also, we can > > (if > > > > we > > > > > don't do yet) restrict access only via these management interfaces > in > > > > > system VMs(VRs, SSVM, console proxy and others to come). > > > > > > > > > > > > > > > > > > > > Can someone confirm if VRs receive management IPs in KVM > deployments? > > > > > > > > > > On Fri, Jan 12, 2018 at 5:36 PM, Syed Ahmed <sah...@cloudops.com> > > > wrote: > > > > > > > > > > > The reason why we used link local in the first place was to > isolate > > > the > > > > > VR > > > > > > from directly accessing the management network. This provides > > another > > > > > layer > > > > > > of security in case of a VR exploit. This will also have a side > > > effect > > > > of > > > > > > making all VRs visible to each other. Are we okay accepting this? > > > > > > > > > > > > Thanks, > > > > > > -Syed > > > > > > > > > > > > On Fri, Jan 12, 2018 at 11:37 AM, Tim Mackey <tmac...@gmail.com> > > > > wrote: > > > > > > > > > > > > > dom0 already has a DHCP server listening for requests on > internal > > > > > > > management networks. I'd be wary trying to manage it from an > > > external > > > > > > > service like cloudstack lest it get reset upon XenServer patch. > > > This > > > > > > alone > > > > > > > makes me favor option #2. I also think option #2 simplifies > > network > > > > > > design > > > > > > > for users. > > > > > > > > > > > > > > Agreed on making this as consistent across flows as possible. > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Fri, Jan 12, 2018 at 9:44 AM, Rafael Weingärtner < > > > > > > > rafaelweingart...@gmail.com> wrote: > > > > > > > > > > > > > > > It looks reasonable to manage VRs via management IP network. > We > > > > > should > > > > > > > > focus on using the same work flow for different deployment > > > > scenarios. > > > > > > > > > > > > > > > > > > > > > > > > On Fri, Jan 12, 2018 at 12:13 PM, Pierre-Luc Dion < > > > > > pd...@cloudops.com> > > > > > > > > wrote: > > > > > > > > > > > > > > > > > Hi, > > > > > > > > > > > > > > > > > > We need to start a architecture discussion about running > > > SystemVM > > > > > and > > > > > > > > > Virtual-Router as HVM instances in XenServer. With recent > > > > > > > > Meltdown-Spectre, > > > > > > > > > one of the mitigation step is currently to run VMs as HVM > on > > > > > > XenServer > > > > > > > to > > > > > > > > > self contain a user space attack from a guest OS. > > > > > > > > > > > > > > > > > > Recent hotfix from Citrix XenServer (XS71ECU1009) enforce > VMs > > > to > > > > > > start > > > > > > > > has > > > > > > > > > HVM. This is currently problematic for Virtual Routers and > > > > SystemVM > > > > > > > > because > > > > > > > > > CloudStack use PV "OS boot Options" to preconfigure the VR > > > eth0: > > > > > > > > > cloud_link_local. While using HVM the "OS boot Options" is > > not > > > > > > > accessible > > > > > > > > > to the VM so the VR fail to be properly configured. > > > > > > > > > > > > > > > > > > I currently see 2 potential approaches for this: > > > > > > > > > 1. Run a dhcpserver in dom0 managed by cloudstack so VR > eth0 > > > > would > > > > > > > > receive > > > > > > > > > is network configuration at boot. > > > > > > > > > 2. Change the current way of managing VR, SVMs on > XenServer, > > > > > > potentiall > > > > > > > > do > > > > > > > > > same has with VMware: use pod management networks and > assign > > a > > > > POD > > > > > IP > > > > > > > to > > > > > > > > > each VR. > > > > > > > > > > > > > > > > > > I don't know how it's implemented in KVM, maybe cloning KVM > > > > > approach > > > > > > > > would > > > > > > > > > work too, could someone explain how it work on this thread? > > > > > > > > > > > > > > > > > > I'd a bit fan of a potential #2 aproach because it could > > > > facilitate > > > > > > VR > > > > > > > > > monitoring and logging, although a migration path for an > > > existing > > > > > > cloud > > > > > > > > > could be complex. > > > > > > > > > > > > > > > > > > Cheers, > > > > > > > > > > > > > > > > > > > > > > > > > > > Pierre-Luc > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > > > Rafael Weingärtner > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > Rafael Weingärtner > > > > > > > > > > > > > > >