On Nov 6, 2007, at 9:46 PM, Alan Robertson wrote:

Andrew Beekhof wrote:
On Nov 6, 2007, at 6:25 PM, Alan Robertson wrote:
We now have the ComponentFail test in CTS. Thanks Lars for getting it going!

And, in the process, it's showing up some kinds of problems that we hadn't been looking for before. A couple examples of such problems can be found here:

http://old.linux-foundation.org/developer_bugzilla/show_bug.cgi?id=1762
It is very rare for a stonith action to be actually initiated in this case. But having stonith disabled results in very dangerous yet unavoidable assumptions being made.
Which is why stonith is so highly encouraged.

http://old.linux-foundation.org/developer_bugzilla/show_bug.cgi?id=1732

The question that comes up is this:

For problems that should "never" happen like death of one of our core/key processes, is an immediate reboot of the machine the right recovery technique?

The advantages of such a choice include:
It is fast
It will invoke recovery paths that we exercise a lot in testing
It is MUCH simpler than trying to recover from all these cases,
   therefore almost certainly more reliable

The disadvantages of such a choice include:
It is crude, and very annoying
It probably shouldn't be invoked for single-node clusters (?)
It could be criticized as being lazy
It shouldn't be invoked if there is another simple and correct method

Continual rebooting becomes a possibility...
Assuming continual re-failure of one of our processes, yes.
We do not have a policy of doing this throughout the project, what we have is a few places where we do it.

I propose that we should consider making a uniform policy decision for the project - and specifically decide to use ungraceful reboots as our recovery method for "key" processes dying (for example: CCM, heartbeat, CIB, CRM). It should work for those cases where people don't configure in watchdogs or explicitly define any STONITH devices, and also independently of quorum policies - because AFAIK it seems like the right choice, there's no technical reason not to do so. My inclination is to think that this is a good approach to take for problems that in our best-guess judgment "shouldn't happen".
I dislike it for the reason that node suicide provides a false sense of security. You end up making the window of opportunity for "something bad" to happen smaller, but it still exists.

If you have STONITH configured, the two methods are equally safe.

I can't agree, STONITH is a clear winner.
You get more options in case of things like failed stops and a 100% guarantee that resources will never be active on more than one node.

If you don't have STONITH configured, then my suggested approach is significantly superior.

Superior than nothing isn't a tough-ask.

The window for damage is very small - heartbeat is a realtime process, and it is also the same process that is sending out the "death of child" notices. Suitable adjustment of event priorities could eliminate the window of possibility in the "don't have stonith- configured" case.

You can't eliminate it.
The death of the machine is not instantaneous and in that time the rest of the cluster _could_ have started the resource for the second time.

You can reduce the possibility to almost nothing, but its still not nothing.

I certainly wouldn't ever stop encouraging people to configure and use STONITH.

There are numerous good reasons not to use ssh stonith in production. It is not reliable, only works in a development environment,

Actually there a plenty of people using it today.
I'd much prefer they had a real device, but they are aware of the risks and seem happy enough.

and IMHO can't be made reliable (I spent some time trying when I wrote it), and relies on having ssh and at installed and ssh ports open inbound and outbound, and having "at" running.

These are all things one can verify beforehand. They're not reasons to invent something new - after-all one can also misconfigure a real stonith device.

Where ssh does have problems is when the node is sick, but it is no less reliable than suicide in such situations

It's just too fragile.

In fact, it's almost impossible to write a stonith of this form and have it both work reliably and report on its success reliably. After all, if it waits until it succeeds to report success, then it's not there to do the reporting. This is why the current code uses "at".

I don't believe that the ssh stonith approach is going to work.

If that were true then it wouldn't work for real stonith devices either.
Its no co-incidence that you don't see the same problems when using CTS with stonith enabled.

In addition, your suggestion suffers from the "top of the stack" reliability problem I mentioned in my previous email. The lower in the stack that this happens, the fewer components are involved, and the more reliable the result. The higher in the stack you try and make this, the more things have to be working, and the less reliable the result.

Um... you're bashing your own fencing subsystem here.
If its reliable enough for all other the reasons it was created for, then it is also reliable for this scenario.

With the advantage that there is a single code-path and zero new lines of code.

Unless you're talking about the v1 resource manager, in which case I'll completely butt out of the conversation.

Both your approach and mine are reasonably fail-fast. As a failure recovery mechanism however, recovering reliably is more important than exactly how fast the code fails in these error cases. The fewer things that have to work the more reliable it is. Given how many components have to work for the failure to be detected, reported, decision made, and actions queued up and carried out, the difference in recovery failure probabilities differ by several orders of magnitude.

To put this in perspective, what we're arguing over is how to implement method (a) from my previous reply to Kevin Tomlinson.

So, I don't hear you arguing for a general approach of (b), (c), or (d).

Actually what I'm saying is that most of (d) already happens^ and that the only "missing" piece is enabling STONITH so the cluster can do something about it. I'm also arguing that any implementation of (a) can be no more reliable than simply adding an ssh STONITH agent and is inherently less safe^^

^ The "propagate the failure to the top layer of the cluster" part
^^ because the subsystem put in charge of managing resources is operating in parallel and without any idea of what's going on

_______________________________________________
Linux-HA mailing list
[email protected]
http://lists.linux-ha.org/mailman/listinfo/linux-ha
See also: http://linux-ha.org/ReportingProblems

Reply via email to