On 02/22/2012 03:38 PM, Itamar Heim wrote:
> On 02/22/2012 07:23 PM, Perry Myers wrote:
>>>> Well, if the network is busted which leads to the bridge rename
>>>> failing,
>>>> wouldn't the fact that the network is broken cause other problems
>>>> anyhow?
>>> Perry, my point is that we're increasing the chances to get
>>> into these holes. Network is not busted most of the time, but
>>> occasionally
>>> there's a glitch and we'd like to stay away from it. I'm sure
>>> you know what I'm talking about.
>> What if oVirt Node creates ifcfg-ovirt (instead of ifcfg-br0) by default
>> as part of bringing up the network on each boot (via either DHCP or
>> kernel args)?
> what if admin wants this bonded, or bridgeless, or jumbo frames?

Right now those aren't things you can configure via oVirt Node, they're
things you configure via oVirt Engine/vdsm.  If we want to add things
like this to oVirt Node, we can (just file some RFEs for us) and then
we'll expose this sort of stuff via the kernel cmd line args as we do
with all of our other config params

> stateless doesn't mean you can't save configuration somewhere on the
> network, right (could be on engine, could be just on some nfs or http
> location).

Correct.  Our present thinking is that oVirt Node specific stuff us
saved via kernel cmd line args persisted either on PXE server or
directly on boot media.  Anything else (oVirt Engine specific for
example) would be stored in the mgmt server (OE) itself

> if you have a tpm, just encrypt all the data to make sure no one
> tampered with your config, or if you don't care, just download your
> config (well, you trust the network to download your image without
> encryption, so no need to be fanatic i guess).

> so in short:
> 1. pxe boot the image
> 2. download from known location (kernerl param) the rest of the config
> you care about, certificates, etc.
> 3. use tpm for private key (or get the password to keystore in config
> via kernel parameter if you don't want/have tpm.

Agreed, though w/ vdsm you can simplify by just encrypting the certs

1. boot up, network and basics are configured via kernel cmd args or
2. vdsm retrieves cert from OE and decrypts via locally stored key
   (TPM or embedded in ISO)
3. vdsm now can securely communicate with OE, so it retrieves config
   for network/storage from OE and applies that config

> I guess my main question is why does stateless implies no saved config
> for all the various issues

It doesn't imply no saved config, it implies no saved config on the
local node itself.  Config absolutely will need to be retrieved from a
remote server.

Right now, oVirt Node config (outside of vdsm) consists of:

* network config (dhcp vs. static)
* logging/rsyslog config/collectd
* mgmt server config (oVirt Engine IP/port)
* kdump remote config
* auth info (admin password, etc)

All of that can be handled through some combination of:
* kernel command line args
* embedding things in the ISO pre-deployment (passwords for example)

The remaining config is what vdsm does after the node has the above
configured, so things like bonding, add'l interfaces, storage, should
all be configured by vdsm on each boot by retrieving the configuration
details from oVirt Engine and applying them on vdsm startup


vdsm-devel mailing list

Reply via email to