[
https://issues.apache.org/jira/browse/CLOUDSTACK-3535?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13719176#comment-13719176
]
Marcus Sorensen edited comment on CLOUDSTACK-3535 at 7/25/13 2:49 AM:
----------------------------------------------------------------------
Sounds like this is not KVM specific.
Not to be blunt, but I don't think Logan's solution works, at all. We have no
way of knowing what's running on a host or not, simply by whether or not we can
ping it on the management network. A host may be running with 20 VMs, all
healthy, but the management nic went out on the host. Relying on ping presents
too many assumptions (Storage is ethernet based, and the same interface/network
is serving both management and storage).
The only way to go is with proper fencing. For those storage types that support
it, revoke access to other hosts when a VM starts, so that even if it was
running elsewhere, you basically pull the power cord when you start up the VM
in the known good location. Meaning that a host starting a VM has an exclusive
lock on the volumes associated with the VM. Additionally/alternatively, an IPMI
service that will power off a host if the agent isn't in maintenance mode and
is non-communicative.
In the mean time, like the short term solution mentions, if we can put the host
into maintenance mode manually when it's known-down, and allow vms to migrate,
that would at least allow people to get their system working again without DB
hacks.
was (Author: mlsorensen):
Sounds like this is not KVM specific.
Not to be blunt, but I don't think Logan's solution works, at all. We have no
way of knowing what's running on a host or not, simply by whether or not we can
ping it on the management network. A host may be running with 20 VMs, all
healthy, but the management nic went out on the host. Relying on ping presents
too many assumptions (Storage is ethernet based, and the same interface/network
is serving both management and storage).
The only way to go is with proper fencing. For those storage types that support
it, revoke access to other hosts when a VM starts, so that even if it was
running elsewhere, you basically pull the power cord when you start up the VM
in the known good location. Additionally/alternatively, an IPMI service that
will power off a host if the agent isn't in maintenance mode and is
non-communicative.
In the mean time, like the short term solution mentions, if we can put the host
into maintenance mode manually when it's known-down, and allow vms to migrate,
that would at least allow people to get their system working again without DB
hacks.
> No HA actions are performed when a KVM host goes offline
> --------------------------------------------------------
>
> Key: CLOUDSTACK-3535
> URL: https://issues.apache.org/jira/browse/CLOUDSTACK-3535
> Project: CloudStack
> Issue Type: Bug
> Security Level: Public(Anyone can view this level - this is the
> default.)
> Components: Hypervisor Controller, KVM, Management Server
> Affects Versions: 4.1.0, 4.1.1, 4.2.0
> Environment: KVM (CentOS 6.3) with CloudStack 4.1
> Reporter: Paul Angus
> Priority: Blocker
>
> If a KVM host 'goes down', CloudStack does not perform HA for instances which
> are marked as HA enabled on that host (including system VMs)
> CloudStack does not show the host as disconnected.
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators
For more information on JIRA, see: http://www.atlassian.com/software/jira