Re: [ClusterLabs] [Question] About log collection of crm_report.

2017-01-24 Thread renayama19661014
Hi Ken,

Thank you for comment.

For example, our user does not use pacemaker.log and corosync.log.

Via a syslog, the user makes setting to output all log to /var/log/ha-log.

-
(/etc/corosycn/corosync.conf)
logging {
        syslog_facility: local1
        debug: off
}

(/etc/sysconfig/pacemaker)
PCMK_logfile=none
PCMK_logfacility=local1
PCMK_logpriority=info
PCMK_fail_fast=yes

(/etc/rsyslog.conf)
# Log anything (except mail) of level info or higher.
# Don't log private authentication messages!
*.info;mail.none;authpriv.none;cron.none;local1.none                
/var/log/messages
(snip)
# Save boot messages also to boot.log
local7.*                                                /var/log/boot.log
local1.info /var/log/ha-log
-

In present crm_report, in the case of the user who output log in a different 
file, the log is not collected in sosreport.

Is this not a problem?
Possibly is all /var/log going to collect it in future in sosreport?

Of course I know that "/var/log/ha-log" is collected definitely when I carry 
out crm_report alone.
I want to know why collection of log of this crm_report was stopped in 
sosreport.

For REDHAT, will it be to be enough for collection of sosreport contents?
If it is such a thing, we can understand.

- And I test crm_report at the present, but seem to have some problems.
- I intend to report the problem by Bugzilla again.

Best Regards,
Hideo Yamauchi.




- Original Message -
> From: Ken Gaillot 
> To: users@clusterlabs.org
> Cc: 
> Date: 2017/1/24, Tue 08:15
> Subject: Re: [ClusterLabs] [Question] About log collection of crm_report.
> 
> On 01/23/2017 04:17 PM, renayama19661...@ybb.ne.jp wrote:
>>  Hi All,
>> 
>>  When I carry out Pacemaker1.1.15 and Pacemaker1.1.16 in RHEL7.3, log in 
> conjunction with pacemaker is not collected in the file which I collected in 
> sosreport.
>>   
>> 
>>  This seems to be caused by the next correction and pacemaker.py script of 
> RHEL7.3.
>> 
>>   - 
> https://github.com/ClusterLabs/pacemaker/commit/1bcad6a1eced1a3b6c314b05ac1d353adda260f6
>>   - 
> https://github.com/ClusterLabs/pacemaker/commit/582e886dd8475f701746999c0093cd9735aca1ed#diff-284d516fab648676f5d93bc5ce8b0fbf
>> 
>> 
>>  ---
>>  (/usr/lib/python2.7/site-packages/sos/plugins/pacemaker.py)
>>  (snip)
>>          if not self.get_option("crm_scrub"):
>>              crm_scrub = ""
>>              self._log_warn("scrubbing of crm passwords has been 
> disabled:")
>>              self._log_warn("data collected by crm_report may 
> contain"
>>                             " sensitive values.")
>>          self.add_cmd_output('crm_report --sos-mode %s -S -d '
>>                              ' --dest %s --from "%s"' %
>>                              (crm_scrub, crm_dest, crm_from),
>>                              chroot=self.tmp_in_sysroot())
>>  (snip)
>>  ---
>> 
>> 
>>  When a user carries out crm_report in sosreport, what is the reason that 
> set search_logs to 0?
>> 
>>  We think that the one where search_logs works with 1 in sosreport is right.
>> 
>> 
>>  Best Regards,
>>  Hideo Yamauchi.
> 
> Hi Hideo,
> 
> The --sos-mode option is intended for RHEL integration, so it is only
> guaranteed to work with the combination of pacemaker and sosreport
> packages delivered with a particular version of RHEL (and its derivatives).
> 
> That allows us to make assumptions about what sosreport features are
> available. It might be better to detect those features, but we haven't
> seen enough usage of sosreport + pacemaker outside RHEL to make that
> worth the effort.
> 
> In this case, the version of sosreport that will be in RHEL 7.4 will
> collect pacemaker.log and corosync.log on its own, so the crm_report in
> pacemaker 1.1.16 doesn't need to collect the logs itself.
> 
> It might work if you build the latest sosreport:
> https://github.com/sosreport/sos
> 
> ___
> Users mailing list: Users@clusterlabs.org
> http://lists.clusterlabs.org/mailman/listinfo/users
> 
> Project Home: http://www.clusterlabs.org
> Getting started: http://www.clusterlabs.org/doc/Cluster_from_Scratch.pdf
> Bugs: http://bugs.clusterlabs.org
> 

___
Users mailing list: Users@clusterlabs.org
http://lists.clusterlabs.org/mailman/listinfo/users

Project Home: http://www.clusterlabs.org
Getting started: http://www.clusterlabs.org/doc/Cluster_from_Scratch.pdf
Bugs: http://bugs.clusterlabs.org


[ClusterLabs] How to Fence Virtualbox VM with Windows 10 as host.

2017-01-24 Thread durwin
This is my first attempt at clustering, just so you know the level 
required to convey ideas.

I have Windows 10 running Virtualbox with 2 VMs running Fedora 25.  I have 
followed 'Pacemaker 1.1 Clusters from Scratch' 9th edition up through 
chapter 7.  It works.  I am uncertain as how to fence the VMs with Windows 
10 as host.  The output from 'pcs stonith describe fence_vbox' is below.

I have Cygwin installed with sshd configured and running.  I can remotely 
ssh into the Windows 10 machine.  I can add the keys from the machines 
into Windows authorized_keys so no user/password is required.  I however 
do not know which of the options are *required*.  Nor do I know what the 
options should be set to.  Some of the options *are* obvious.  If I use 
*only* required ones, ipaddr is obvious, login is obvious, but not sure 
what port is.  Would it be the name of the VM as Virtualbox knows it?

ipaddr (required): IP address or hostname of fencing device
login (required): Login name
port (required): Physical plug number on device, UUID or 
identification of machine

Does the host require anything running on it to support the fence?  Do I 
require any other options in addition to 'required'?  How do I test it 
from a nodes commandline?


Thank you,

Durwin


fc25> pcs stonith describe fence_vbox
fence_vbox - Fence agent for VirtualBox

fence_vbox is an I/O Fencing agent which can be used with the virtual 
machines managed by VirtualBox. It logs via ssh to a dom0 where it runs 
VBoxManage to do all of the work.
.P
By default, vbox needs to log in as a user that is a member of the 
vboxusers group. Also, you must allow ssh login in your sshd_config.

Resource options:
  action: Fencing action WARNING: specifying 'action' is deprecated and 
not necessary with current Pacemaker versions
  cmd_prompt: Force Python regex for command prompt
  identity_file: Identity file (private key) for SSH
  inet4_only: Forces agent to use IPv4 addresses only
  inet6_only: Forces agent to use IPv6 addresses only
  ipaddr (required): IP address or hostname of fencing device
  ipport: TCP/UDP port to use for connection with device
  login (required): Login name
  passwd: Login password or passphrase
  passwd_script: Script to run to retrieve password
  port (required): Physical plug number on device, UUID or identification 
of machine
  secure: Use SSH connection
  ssh_options: SSH options to use
  separator: Separator for CSV created by 'list' operation
  delay: Wait X seconds before fencing is started
  login_timeout: Wait X seconds for cmd prompt after login
  missing_as_off: Missing port returns OFF instead of failure
  power_timeout: Test X seconds for status change after ON/OFF
  power_wait: Wait X seconds after issuing ON/OFF
  shell_timeout: Wait X seconds for cmd prompt after issuing command
  retry_on: Count of attempts to retry power on
  sudo: Use sudo (without password) when calling 3rd party software
  ssh_path: Path to ssh binary
  sudo_path: Path to sudo binary
  priority: The priority of the stonith resource. Devices are tried in 
order of highest priority to lowest.
  pcmk_host_map: A mapping of host names to ports numbers for devices that 
do not support host names. Eg. node1:1;node2:2,3 would tell the cluster to 
use port 1 for node1 and ports 2 and 3 for node2
  pcmk_host_list: A list of machines controlled by this device (Optional 
unless pcmk_host_check=static-list).
  pcmk_host_check: How to determine which machines are controlled by the 
device. Allowed values: dynamic-list (query the device), static-list 
(check the pcmk_host_list attribute), none (assume every device can fence 
every machine)
  pcmk_delay_max: Enable random delay for stonith actions and specify the 
maximum of random delay This prevents double fencing when using slow 
devices such as sbd. Use this to enable random delay for stonith actions 
and specify the maximum of random delay.
  pcmk_action_limit: The maximum number of actions can be performed in 
parallel on this device Pengine property concurrent-fencing=true needs to 
be configured first. Then use this to specify the maximum number of 
actions can be performed in parallel on this device. -1 is unlimited.

Durwin F. De La Rue
Management Sciences, Inc.
6022 Constitution Ave. NE
Albuquerque, NM  87110
Phone (505) 255-8611


This email message and any attachments are for the sole use of the 
intended recipient(s) and may contain proprietary and/or confidential 
information which may be privileged or otherwise protected from 
disclosure. Any unauthorized review, use, disclosure or distribution is 
prohibited. If you are not the intended recipient(s), please contact the 
sender by reply email and destroy the original message and any copies of 
the message as well as any attachments to the original message.___
Users mailing list: Users@clusterlabs.org
http://lists.clusterlabs.org/mailman/listinfo/users

Project Home: