[ 
https://issues.apache.org/jira/browse/CLOUDSTACK-3535?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13719176#comment-13719176
 ] 

Marcus Sorensen edited comment on CLOUDSTACK-3535 at 7/25/13 2:49 AM:
----------------------------------------------------------------------

Sounds like this is not KVM specific.

Not to be blunt, but I don't think Logan's solution works, at all.  We have no 
way of knowing what's running on a host or not, simply by whether or not we can 
ping it on the management network. A host may be running with 20 VMs, all 
healthy, but the management nic went out on the host. Relying on ping presents 
too many assumptions (Storage is ethernet based, and the same interface/network 
is serving both management and storage).

The only way to go is with proper fencing. For those storage types that support 
it, revoke access to other hosts when a VM starts, so that even if it was 
running elsewhere, you basically pull the power cord when you start up the VM 
in the known good location. Meaning that a host starting a VM has an exclusive 
lock on the volumes associated with the VM. Additionally/alternatively, an IPMI 
service that will power off a host if the agent isn't in maintenance mode and 
is non-communicative.

In the mean time, like the short term solution mentions, if we can put the host 
into maintenance mode manually when it's known-down, and allow vms to migrate, 
that would at least allow people to get their system working again without DB 
hacks.
                
      was (Author: mlsorensen):
    Sounds like this is not KVM specific.

Not to be blunt, but I don't think Logan's solution works, at all.  We have no 
way of knowing what's running on a host or not, simply by whether or not we can 
ping it on the management network. A host may be running with 20 VMs, all 
healthy, but the management nic went out on the host. Relying on ping presents 
too many assumptions (Storage is ethernet based, and the same interface/network 
is serving both management and storage).

The only way to go is with proper fencing. For those storage types that support 
it, revoke access to other hosts when a VM starts, so that even if it was 
running elsewhere, you basically pull the power cord when you start up the VM 
in the known good location. Additionally/alternatively, an IPMI service that 
will power off a host if the agent isn't in maintenance mode and is 
non-communicative.

In the mean time, like the short term solution mentions, if we can put the host 
into maintenance mode manually when it's known-down, and allow vms to migrate, 
that would at least allow people to get their system working again without DB 
hacks.
                  
> No HA actions are performed when a KVM host goes offline
> --------------------------------------------------------
>
>                 Key: CLOUDSTACK-3535
>                 URL: https://issues.apache.org/jira/browse/CLOUDSTACK-3535
>             Project: CloudStack
>          Issue Type: Bug
>      Security Level: Public(Anyone can view this level - this is the 
> default.) 
>          Components: Hypervisor Controller, KVM, Management Server
>    Affects Versions: 4.1.0, 4.1.1, 4.2.0
>         Environment: KVM (CentOS 6.3) with CloudStack 4.1
>            Reporter: Paul Angus
>            Priority: Blocker
>
> If a KVM host 'goes down', CloudStack does not perform HA for instances which 
> are marked as HA enabled on that host (including system VMs)
> CloudStack does not show the host as disconnected.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira

Reply via email to