Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-20 Thread Jiri Belka
On Sat, 18 Oct 2014 14:39:12 -0400 (EDT)
Alon Bar-Lev alo...@redhat.com wrote:

 
 Please read [1].
 
 I am unsure about concurrent access, this should be done using ssh bridge and 
 now low level solution.
 
 Thanks,
 Alon
 
 [1] http://www.ovirt.org/Features/Serial_Console

How will it behave when:

- VM is being snapshotted?
- VM is being migrated?
- VM is suspended?
- VM is being (cold)rebooted?

At least for last two I suppose the serial console session will be
interrupted.

VMWare uses extended communication to inform virtual serial port
concentrator about various action of a VM, thus proxy doesn't drop
serial connections.

http://www.vmware.com/support/developer/vc-sdk/visdk41pubs/vsp41_usingproxy_virtual_serial_ports.pdf

j.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-20 Thread Alon Bar-Lev


- Original Message -
 From: Jiri Belka jbe...@redhat.com
 To: Alon Bar-Lev alo...@redhat.com
 Cc: users@ovirt.org
 Sent: Monday, October 20, 2014 2:40:01 PM
 Subject: Re: [ovirt-users] Thinking loud about VM's serial console access
 
 On Sat, 18 Oct 2014 14:39:12 -0400 (EDT)
 Alon Bar-Lev alo...@redhat.com wrote:
 
  
  Please read [1].
  
  I am unsure about concurrent access, this should be done using ssh bridge
  and now low level solution.
  
  Thanks,
  Alon
  
  [1] http://www.ovirt.org/Features/Serial_Console
 
 How will it behave when:
 
 - VM is being snapshotted?
 - VM is being migrated?
 - VM is suspended?
 - VM is being (cold)rebooted?
 
 At least for last two I suppose the serial console session will be
 interrupted.
 
 VMWare uses extended communication to inform virtual serial port
 concentrator about various action of a VM, thus proxy doesn't drop
 serial connections.

there is no reason why the proxy cannot retry for a while and reconnect to the 
new instance.
however this will not be provided at first nor it is that important as client 
can always implement reconnect at its side, and handle this just like any other 
network failure.

 
 http://www.vmware.com/support/developer/vc-sdk/visdk41pubs/vsp41_usingproxy_virtual_serial_ports.pdf
 
 j.
 
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-20 Thread Jiri Belka
On Mon, 20 Oct 2014 08:40:34 -0400 (EDT)
Alon Bar-Lev alo...@redhat.com wrote:

 
 
 - Original Message -
  From: Jiri Belka jbe...@redhat.com
  To: Alon Bar-Lev alo...@redhat.com
  Cc: users@ovirt.org
  Sent: Monday, October 20, 2014 2:40:01 PM
  Subject: Re: [ovirt-users] Thinking loud about VM's serial console access
  
  On Sat, 18 Oct 2014 14:39:12 -0400 (EDT)
  Alon Bar-Lev alo...@redhat.com wrote:
  
   
   Please read [1].
   
   I am unsure about concurrent access, this should be done using ssh bridge
   and now low level solution.
   
   Thanks,
   Alon
   
   [1] http://www.ovirt.org/Features/Serial_Console
  
  How will it behave when:
  
  - VM is being snapshotted?
  - VM is being migrated?
  - VM is suspended?
  - VM is being (cold)rebooted?
  
  At least for last two I suppose the serial console session will be
  interrupted.
  
  VMWare uses extended communication to inform virtual serial port
  concentrator about various action of a VM, thus proxy doesn't drop
  serial connections.
 
 there is no reason why the proxy cannot retry for a while and reconnect to 
 the new instance.
 however this will not be provided at first nor it is that important as client 
 can always implement reconnect at its side, and handle this just like any 
 other network failure.

OK, I'm reading this as you haven't tested it with these actions.

With real serial console one doesn't need to re-plug cable to get the
console... Thus I'm not interested anymore in the topic.

j.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-20 Thread Alon Bar-Lev


- Original Message -
 From: Jiri Belka jbe...@redhat.com
 To: Alon Bar-Lev alo...@redhat.com
 Cc: users@ovirt.org
 Sent: Monday, October 20, 2014 3:56:12 PM
 Subject: Re: [ovirt-users] Thinking loud about VM's serial console access
 
 On Mon, 20 Oct 2014 08:40:34 -0400 (EDT)
 Alon Bar-Lev alo...@redhat.com wrote:
 
  
  
  - Original Message -
   From: Jiri Belka jbe...@redhat.com
   To: Alon Bar-Lev alo...@redhat.com
   Cc: users@ovirt.org
   Sent: Monday, October 20, 2014 2:40:01 PM
   Subject: Re: [ovirt-users] Thinking loud about VM's serial console access
   
   On Sat, 18 Oct 2014 14:39:12 -0400 (EDT)
   Alon Bar-Lev alo...@redhat.com wrote:
   

Please read [1].

I am unsure about concurrent access, this should be done using ssh
bridge
and now low level solution.

Thanks,
Alon

[1] http://www.ovirt.org/Features/Serial_Console
   
   How will it behave when:
   
   - VM is being snapshotted?
   - VM is being migrated?
   - VM is suspended?
   - VM is being (cold)rebooted?
   
   At least for last two I suppose the serial console session will be
   interrupted.
   
   VMWare uses extended communication to inform virtual serial port
   concentrator about various action of a VM, thus proxy doesn't drop
   serial connections.
  
  there is no reason why the proxy cannot retry for a while and reconnect to
  the new instance.
  however this will not be provided at first nor it is that important as
  client can always implement reconnect at its side, and handle this just
  like any other network failure.
 
 OK, I'm reading this as you haven't tested it with these actions.

how can I test something that is not implemented?

 With real serial console one doesn't need to re-plug cable to get the
 console... Thus I'm not interested anymore in the topic.

once you tunnel serial over network protocol, every failure of network protocol 
applies to the tunnel. this is just like modem hangup or any other hardware 
failure. unless you wish to implement proprietary client side component instead 
of standard ssh utility, a component that retry to establish connection, this 
custom component can be provided regardless of the solution.

a software that assumes that a connection is always available will fail to 
provide service after failure, at any medium.

Alon
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-18 Thread Alon Bar-Lev

Please read [1].

I am unsure about concurrent access, this should be done using ssh bridge and 
now low level solution.

Thanks,
Alon

[1] http://www.ovirt.org/Features/Serial_Console

- Original Message -
 From: Jiri Belka jbe...@redhat.com
 To: users@ovirt.org
 Sent: Friday, October 17, 2014 6:15:43 PM
 Subject: [ovirt-users] Thinking loud about VM's serial console access
 
 Hi,
 
 on KVM forum VM's serial console access was raised. I'd like to make
 some comments, hopefully it would help to think about how we would
 access VM's serial consoles in oVirt.
 
 1. encrypted access (ssh preferable) is a must
 
 2. not to type any automatically generated password to access
serial console should be possible (like for spice)
 
i can imagine a centralized console server could be used to
manage all serial console accesses. usually such console servers are
access via ssh and then a connection is spawned and sysadmin's ssh
session is connected to remote serial console without any action
 
 3. not to see a interactive menu should be possible
 
there can be serial console output parser/monitor persistently
running to catch kernel outputs and alerts in console. if kernel
crashes, the output is on console and thus a monitoring can catch it
 
 4. access to VM's serial console should not require to know where a VM
is running (thus to know host fqdn/IP)
 
this is obvious, a sysadmin wants to just get serial console without
manual kung-fu
 
 5. multi-user access to one VM's serial console
 
in some paranoid environment there must be two people working
together, each controlling other. whatever. multi-user concurrency
should be possible, there can be passive serial console output
parser/monitor and sysadmin's interactive session
 
 Hopefully the above will contribute to implementation design. All above
 is possible with open source tools while using real hw serial consoles,
 thus it would be expected that implementation for VM's serial console
 would work similarly.
 
 FYI I created RFE for qemu for TLS mode for chardev socket
  https://bugzilla.redhat.com/show_bug.cgi?id=1154115, so there could be
 a way not to use ssh to host as this has been not preferred by
 alonbl@ for other functionality in the past :)
 
 j.
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users
 
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


[ovirt-users] Thinking loud about VM's serial console access

2014-10-17 Thread Jiri Belka
Hi,

on KVM forum VM's serial console access was raised. I'd like to make
some comments, hopefully it would help to think about how we would
access VM's serial consoles in oVirt.

1. encrypted access (ssh preferable) is a must

2. not to type any automatically generated password to access
   serial console should be possible (like for spice)

   i can imagine a centralized console server could be used to
   manage all serial console accesses. usually such console servers are
   access via ssh and then a connection is spawned and sysadmin's ssh
   session is connected to remote serial console without any action

3. not to see a interactive menu should be possible

   there can be serial console output parser/monitor persistently
   running to catch kernel outputs and alerts in console. if kernel
   crashes, the output is on console and thus a monitoring can catch it

4. access to VM's serial console should not require to know where a VM
   is running (thus to know host fqdn/IP)

   this is obvious, a sysadmin wants to just get serial console without
   manual kung-fu

5. multi-user access to one VM's serial console

   in some paranoid environment there must be two people working
   together, each controlling other. whatever. multi-user concurrency
   should be possible, there can be passive serial console output
   parser/monitor and sysadmin's interactive session

Hopefully the above will contribute to implementation design. All above
is possible with open source tools while using real hw serial consoles,
thus it would be expected that implementation for VM's serial console
would work similarly.

FYI I created RFE for qemu for TLS mode for chardev socket
 https://bugzilla.redhat.com/show_bug.cgi?id=1154115, so there could be
a way not to use ssh to host as this has been not preferred by
alonbl@ for other functionality in the past :)

j.
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-17 Thread Dan Yasny
I have posted a ready script and a VDSM hook for this exact use case a
couple of years ago.

http://www.ovirt.org/Features/Serial_Console_in_CLI

The actual locateVM.py script is missing from there, but it's an elementary
API script that will receive a VM name, find the VM's host location and
start the shell


Hope this helps,
Dan

On Fri, Oct 17, 2014 at 11:15 AM, Jiri Belka jbe...@redhat.com wrote:

 Hi,

 on KVM forum VM's serial console access was raised. I'd like to make
 some comments, hopefully it would help to think about how we would
 access VM's serial consoles in oVirt.

 1. encrypted access (ssh preferable) is a must

 2. not to type any automatically generated password to access
serial console should be possible (like for spice)

i can imagine a centralized console server could be used to
manage all serial console accesses. usually such console servers are
access via ssh and then a connection is spawned and sysadmin's ssh
session is connected to remote serial console without any action

 3. not to see a interactive menu should be possible

there can be serial console output parser/monitor persistently
running to catch kernel outputs and alerts in console. if kernel
crashes, the output is on console and thus a monitoring can catch it

 4. access to VM's serial console should not require to know where a VM
is running (thus to know host fqdn/IP)

this is obvious, a sysadmin wants to just get serial console without
manual kung-fu

 5. multi-user access to one VM's serial console

in some paranoid environment there must be two people working
together, each controlling other. whatever. multi-user concurrency
should be possible, there can be passive serial console output
parser/monitor and sysadmin's interactive session

 Hopefully the above will contribute to implementation design. All above
 is possible with open source tools while using real hw serial consoles,
 thus it would be expected that implementation for VM's serial console
 would work similarly.

 FYI I created RFE for qemu for TLS mode for chardev socket
  https://bugzilla.redhat.com/show_bug.cgi?id=1154115, so there could be
 a way not to use ssh to host as this has been not preferred by
 alonbl@ for other functionality in the past :)

 j.
 ___
 Users mailing list
 Users@ovirt.org
 http://lists.ovirt.org/mailman/listinfo/users

___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users


Re: [ovirt-users] Thinking loud about VM's serial console access

2014-10-17 Thread Jiri Belka
 I have posted a ready script and a VDSM hook for this exact use case a
 couple of years ago.
 
 http://www.ovirt.org/Features/Serial_Console_in_CLI
 
 The actual locateVM.py script is missing from there, but it's an elementary
 API script that will receive a VM name, find the VM's host location and
 start the shell

Hi,

well this is no way IMHO.

1. libvirt/virsh doesn't provide concurrent access to console
2. during migration there would be probably some issue with pty device
3. looks scary to do ssh via root to host (ssh via root should be eliminated
   as much as possible)

Avocent has been selling to enteprise customers their console servers for ages,
and they also have been selling a virtual console server appliance to operate
with VMWare vCenter technology. The way how they do it is that VM's IP-enabled 
serial
devices act as clients and connect to virtual serial port concentrator over 
network.

This way there's active session opened during migration and VSPC allows 
temporary
disconnected IP-enabled serial devices from its clients.

I think we should do similar. If this is supposed to be a standard and vendors
sell applicances for this, why not to use it?

There's OSS alternative to Avocent virtual serial port concentrator, but it
still acts only as plain concentrator, not as full console server.

Some reading:

https://github.com/isnotajoke/vSPC.py
http://kb.vmware.com/selfservice/microsites/search.do?language=en_UScmd=displayKCexternalId=1022303
http://www.emersonnetworkpower.com/en-US/Products/InfrastructureManagement/SerialConsoles/Pages/AvocentACSv6000VirtualAdvancedConsoleServer.aspx

 On Fri, Oct 17, 2014 at 11:15 AM, Jiri Belka jbe...@redhat.com wrote:
 
  Hi,
 
  on KVM forum VM's serial console access was raised. I'd like to make
  some comments, hopefully it would help to think about how we would
  access VM's serial consoles in oVirt.
 
  1. encrypted access (ssh preferable) is a must
 
  2. not to type any automatically generated password to access
 serial console should be possible (like for spice)
 
 i can imagine a centralized console server could be used to
 manage all serial console accesses. usually such console servers are
 access via ssh and then a connection is spawned and sysadmin's ssh
 session is connected to remote serial console without any action
 
  3. not to see a interactive menu should be possible
 
 there can be serial console output parser/monitor persistently
 running to catch kernel outputs and alerts in console. if kernel
 crashes, the output is on console and thus a monitoring can catch it
 
  4. access to VM's serial console should not require to know where a VM
 is running (thus to know host fqdn/IP)
 
 this is obvious, a sysadmin wants to just get serial console without
 manual kung-fu
 
  5. multi-user access to one VM's serial console
 
 in some paranoid environment there must be two people working
 together, each controlling other. whatever. multi-user concurrency
 should be possible, there can be passive serial console output
 parser/monitor and sysadmin's interactive session
 
  Hopefully the above will contribute to implementation design. All above
  is possible with open source tools while using real hw serial consoles,
  thus it would be expected that implementation for VM's serial console
  would work similarly.
 
  FYI I created RFE for qemu for TLS mode for chardev socket
   https://bugzilla.redhat.com/show_bug.cgi?id=1154115, so there could be
  a way not to use ssh to host as this has been not preferred by
  alonbl@ for other functionality in the past :)
___
Users mailing list
Users@ovirt.org
http://lists.ovirt.org/mailman/listinfo/users