On Mon, Feb 22, 2016 at 8:58 PM, Rene Moser <m...@renemoser.net> wrote:

> Erik
>
> On 02/22/2016 01:50 PM, Erik Weber wrote:
> > Adding a boilerplate in the install/admin docs that says "If you have no
> > other tools in place to handle system vm updates, consider enabling this
> > option: x.y.z" is good enough for me.
> > This is supposed to be a way for all those who don't have any
> other/better
> > means of doing this, not a mandatory/forced way of doing it for everyone
> > else.
>
> Sounds good. :)
>
>
> >> I would like to see an api for download and update latest system-vm
> >> template. AFAIK this is still not solved (without touching DB) to update
> >> system-vm templates having same version.
>
> What do you think about security updating system VM templates?
> Up-to-date system vm templates would be needed anyway.
>
> >> This way it would be up to the user to handle the upgrade and to think a
> >> bit further we could also define a rollback scenario (use previous
> >> template).
> >>
> >>
> > This thread is ment to discuss varies ways to achieve the goal, I did not
> > mean to propose a single way of doing it.
> > Pushing an ansible inventory script (that works with all major ACS
> > hypervisors) and a playbook is another option.
>
> It is a shame but I have no experience with "other hypervisors" with
> ACS, just VMware. :( How are KVM/XEN different in VRs then VMware, isn't
> there a VR accessible by SSH (by so called "linklocal" IP) from ACS
> management node?
>

No, with vmware you use a routable network that is directly accessible from
the mgmt server, but for xenserver and kvm we use a link local network
(169.254.x.x), that is not wired to any physical interface.

Connection to system vms is done by using the actual hypervisor as a SSH
jumpstation.
I think I actually hacked your dynamic inventory script at one time to
support this, I can see if I can find it again.

-- 
Erik

Reply via email to