[zones-discuss] per-zone SNMP?

2010-10-22 Thread Richard L. Hamilton
What's the status of SNMP in zones?  Does it work, and
if so, as of what build?

Was playing with a limited version of an SNMP browser and
network monitoring tool, and realized that my non-global
zone (this is all at home, now) wasn't set up for SNMP.
(Of course, this is with other distractions like a Mac, a
network printer, another Sun (Solaris 9), and other gadgets.)

Wondering how much is possible along those lines: getting
the ifTable would be basic, system id info, per-zone performance,
process, disk space, process monitoring, etc would be wonderful.

Small words please, haven't been working with SNMP for all
that long...
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


Re: [zones-discuss] Is it possible to determine from the zone as the global zone is called

2010-08-05 Thread Richard L. Hamilton
 Hi,
 i'm new here and i have a question:
 Is it possible to determine from the zone as the
 global zone is called?
 
 Is there a command in the zone  like zoneadm list ,
 which show me the name of the global-zone.
 
 I need it for a script in the zone.

AFAIK, there is no standard way to do that.

Some people create zones with a file containing the
hostname of the global zone.

Others might put that in oem-banner, or use sneep
to put it in nvramrc, along with hardware serial numbers
and such.http://wikis.sun.com/display/sneep/Home

But none of those are a built-in solution.

I like the idea of putting it in nvram better than putting it
in a file, since if the zone is moved to another server, it should
then show the new location without having to update a file.
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


Re: [zones-discuss] Branded zones and external hardware

2010-08-05 Thread Richard L. Hamilton
 hello,
 
 I would like to upgrade a Thumper we use as a staging
 server for backups 
 form Solaris 10 to OpenSolaris.  The backup
 application (NetVault) is 
 only supported on Solaris.
 
 So my question is: can a branded Solaris 10 zone
 access the external 
 tape vault?  If so are there likely to be any issues
 with running an 
 application like NetVault within a branded zone?

Devices can be assigned to zones.  With a disk, that could
be a security issue (a corrupted filesystem could crash the whole
system, for example).  A tape probably wouldn't be as much
of a threat, but that's not the same as saying it would be safe.
In general, one should consider very carefully the security and
reliability implications of assigning devices to zones.

I don't know if anyone has used NetVault within a zone, let alone
a branded zone.
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


[zones-discuss] Can a guest LDOM discover the identity of the host system?

2010-07-02 Thread Richard L. Hamilton
That is...is there a mechanism provided to do this?

As an afterthought, this also applies to non-global zones, although
one can stick something in the oem-banner eeprom variable that is identically 
visible on all the zones, which is not the case on LDOMs.
However, that's not a supported mechanism.  Having something that
was would be better.  Ideal if the same mechanism (on what might
or might not be a zone, LDOM, or virtualized instance running under
for example Xvm (xen) or VirtualBox) could be used for a guest of any
of those sorts to determine its current host for informational purposes
only - and for no other purpose, if one wishes to leave
migration of guests unaffected!  If such a mechanism existed, I
imagine that a null string response could be construed as running
directly on hardware.  If a situation were to exist where both LDOMs
and zones within a guest LDOM were in effect (or some other hypothetical
nested virtualization), it should only be report its parent.  Come to
think of it, this facility could even be applicable to dynamic domains,
although less important there, since AFAIK there's no mechanism
for moving them from one frame to another.


In a support situation, we may have monitoring software
(perhaps BigBrother or Hobbit, or something more; but those
are extensible and more or less open).  Even if a monitored
system is down, the monitoring history can still be seen.

If a client could report where it was running, and had problems,
that would simplify investigating whether the host was having
problems, how to obtain console access (dynamic if guests get
moved around), etc.

If there were a standard mechanism that worked with multiple
virtualization situations, it would also be helpful in that it could
make it possible for the monitoring software to look up the
details of providing remote console access.

I really think this would help to make virtualization more manageable,
particularly if it applied equally to all the different techniques.
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


[zones-discuss] Do sparse root zones share pages of inherited files in the page cache?

2009-10-03 Thread Richard L. Hamilton
Do sparse root zones share pages of inherited files in the page cache
across zones?

If so, doesn't that mean that, even though whole root on cloned zfs
would result in the same _disk_ savings as a sparse zone, it wouldn't
get similar savings in the page cache?  Has anyone actually measured
the impact of this, i.e. of having multiple rather than single copies
of libc and various other OS libs and programs resident at once?
If that works the way I think it might, I imagine that systems with
lots of sparse zones might be likely to take a noticable hit changing
over to the whole root plus zfs clone approach.

I ask since with SXCE going away, and sparse root zones AFAIK not
(yet?) supported in OpenSolaris, that might catch some folks by surprise.
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


Re: [zones-discuss] Do sparse root zones share pages of inherited files in the page cache?

2009-10-03 Thread Richard L. Hamilton
FWIW, I would imagine that the ideal solution, if possible,
would be that pages backed by multiply-referenced
blocks (snapshots, clones, or maybe even de-duping) would
be internally handled like copy-on-write pages, so that
the page and its backing store diverge together.  I wouldn't
be surprised if that's already happening, in which case there's
no loss of page cache efficiency that I was worrying about.

This is way more complicated than I think I could answer for
myself from the code in a reasonable amount of time...
-- 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


[zones-discuss] nice if pgrep had a -Z flag...

2007-09-28 Thread Richard L. Hamilton
...to print the zone name as well as whatever other output.  That's because
ps ORs multiple selection options together, but pgrep ANDs them together,
which sure would be nice in the global zone; for example, it would be
handy to be able to do something like

pgrep -Z -x -z zone01,zone02 -u user01,user02 -l -x process_name

and get back
   123  zone01  process_name
 4567  zone02  process_name

and so on.

But more than that, I think there would be some use for either a new
ps option to tell it to combine selection options like pgrep does (ANDing
distinct options, while ORing multiple values in a list), or better,
an entirely new command; say a pfind command, with find-like syntax
(plus format specification of capability comparable to what ps has).
That would allow much more complicated selection and output in
a variety of situations.
 
 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org


[zones-discuss] Re: Re: [nfs-discuss] NFS server in zones

2007-06-29 Thread Richard L. Hamilton
 Tom Haynes wrote:
 
  What about the case where the customer wants to
 administer the zone they purchased
  and they do not want the global zone admins to have
 local access to 
  their data?
 
 That would violate basics of the zones model.  The
 global zone admin has 
 complete access to all devices attached to the
 system.  How would you prevent 
 the GZ admin from halting the zone, manually mounting
 the non-global zone's 
 disk partitions into the global zone, and accessing
 the data?
 
 Preventing the global zone from accessing certain
 hardware components would 
 open a very large can of worms.

In terms of that sort of isolation, even hardware domain config (on
something like an E25K for example) has to be controlled by _someone_;
and said someone probably also has physical access to the hardware, which
trumps everything else.  I suppose you can have guarded datacenters and
complicated two-man rules for hardware or SC/Dom0/global zone root
access; short of that, keeping out the folks that control the overall config
is a pipe dream.

Filesystem encryption would help a little, but top-level privs plus advanced
tracing facilities could capture the data in unencrypted form,
since to process it, it has to be decrypted sometime.

Ultimately everything comes down to minutes required for someone
sufficiently capable and well-equipped to get away undetected (at least
in the short term) with accessing or modifying something they're not
supposed to.  That even applies to bank vaults.  It's just how much
you're willing to pay to protect data of value x from threat y; managed
risk (assuming a proper understanding of the factors and available methods
for dealing with them), nothing more.

Maybe a deity can provide absolute security in some metaphysical sense
(although evidence suggests that doesn't usually keep their supporters from
getting killed); nothing less than omni-everything is up to the job.

The point of that rant is that the _customer_ needs to be made to understand
that _nothing_ provides that absolute security, that _they_ should be
expected to pay for the level of security they want, and maybe that
it would probably be useful if there were a standard approximation of an
answer to their obvious question how much more security does the next
more expensive approach actually get me? (not neglecting that perhaps
spending more on background checks for your global zone admins,
rigorous procedures, configuration control, tripwire/ASET/auditing with
offsite logs, etc might be a good idea too...)

Maybe there's even a legal angle; think of the warning labels on everything
including disposable lighters that basically say that if it's abused, bad things
can happen.  So you don't want to fail to warn the customer if their
expectations are grossly unreasonable.

Short of separate boxes not sharing SAN (i.e. something with _no_
single point of control), I'd say it's more fault isolation that goes up with
more expensive choices (zones, virtualization, logical domains, hardware 
domains) than it is overall security isolation.
 
 
This message posted from opensolaris.org
___
zones-discuss mailing list
zones-discuss@opensolaris.org