The differences are mild at this point.  Generally speaking:
Lenovo has a test cycle.  When we enter a test cycle, we start with the last 
‘released’ version and backport or create fixes against that for release.

It happened because for a time there we were just going with the latest release 
and we got blindsided by some issues so we stopped adopting new xcat.org 
releases mid test cycle, and just take what was there when we start and cherry 
pick to close the gap.

I don’t know if it’s still the case, but one major difference was that we took 
our Genesis base to CentOS7 and xcat.org was at CentOS6.  I don’t know if 
that’s still a difference.

Another difference is we don’t have ‘snap’ in our version numbers, if it is 
tagged then it is a simple version and development builds incorporate count of 
commits since last release and part of a git commit.

So in short, the difference practically speaking is pretty much a slightly 
different cadence for releases.  The concept of a different meta-package is a 
bit more than I would like to deviate.

In terms of xCAT ‘3.0’ I can’t commit to whether it will be called as such, but 
it at least intends to cover at least a large chunk of the capability ‘real 
soon now’.

Currently it can do:
-Discovery based on switch or serial number/spreadsheet or blade-topology in 
ThinkSystem D2
-Hardware management (power on/off eventlogs, firmware updates, raid config, 
bios settings, etc) using redfish or ipmi
-Text console management and logging
-Web and CLI access
-Some quick shorthands that aren’t too special (nodeshell is psh but with some 
expressions, noderun is the same but for running commands locally rather than 
on the target nodes, nodersync, etc)
-‘Service node’ equivalent behavior through collective (no external DB or other 
prereqs required at the moment, a clustered filesystem may start being needed 
for OS install repository when that time comes)

What it almost certainly will do:
-Essential deployment bootstrapping (networking and ssh or similar, with fewer 
deviations from a default configuration)
-OS install of Linux distributions to disk (CentOS7+8, SuSE 15, Ubuntu 18.04+) 
from pxe or secure methods (with a filesystem-based ‘osimage’ repository rather 
than a database-oriented one)
-Boot customized OS payloads (pass through kernel/initrd with some basic 
parameterization)
-Update DNS records through DDNS as requested

What it shouldn’t have to do anymore:
-Update dhcp configuration (integrated DHCP packet handling, better DHCP 
interoperability, more front and center support for static without DHCP)

Things that are not currently prioritized:
-Virtual machine management: Perhaps some for test, but we have not received a 
lot of feedback on interest in our take on VM management for day to day 
operations
-Stateless (well, this one is a long story, but essentially if desired we’d 
probably do the most straightforward usage of the current genimage combined 
with the ‘customized’ payloads.  In short we don’t have any particularly useful 
ideas beyond the current wrapping of yum/zypper/debootstrap).  Also we may put 
more effort into ostree type approaches as an alternative with more outside 
backing than xCAT stateless.
-Open ended postscript framework: Here the thought would be to see whether 
recommending salt or ansible and enabling that would get the same value with 
more alignment with the current internet consensus.  This would have us making 
a bit more ‘integrated’ support for networking and remote shell, perhaps some 
other select content, and delegating the open ended portions to other scripts.

Overall a lot of focus on having the liberty to change things to address some 
annoyances, such as:
-There are currently several different candidate places to indicate the 
credentials for devices, some group compatible some not.  In confluent 
everything is a node/group attribute and no more ‘site’ or ‘passwd’ tables (an 
‘everything’ automatic group is provided as a conceptually compatible stand-in 
for the concepts)
-OS image content split between filesystem and database. We want to fix this by 
having the filesystem be everything and no DB indexing required
-Tighter and more explicit security behaviors.  No more loop mounting, more 
ability to run as non-root, narrowing to a few opt-in controls for security 
judgement calls, tighter link between some security related things during 
deployment, support for no-local-password deployment, context-aware blocking of 
‘self’ calls from nodes
-Pain of SSL over localhost: confluent uses unix domain sockets and adds 
support for system passwords for remote socket and web ui access instead of TLS 
client certs, though practically no one would use the remote CLI support 
instead of the collective mode.

Many of those little annoyances are wallpapered over by xcatconfig and rpm 
install, but it would be better to have the behaviors be ‘natural’ and not 
require too much be done automatically to make up for the superfluous 
complexity.


Anyway, that’s my personal thoughts, feedback is of course always welcome.

From: Vinícius Ferrão <fer...@versatushpc.com.br>
Sent: Monday, October 14, 2019 1:14 PM
To: Jarrod Johnson <jjohns...@lenovo.com>
Cc: xCAT Users Mailing list <xcat-user@lists.sourceforge.net>
Subject: Re: [External] [xcat-user] xCAT forcibly disabling SELinux and 
firewalld

Thanks Jarrod.

Opened the issue: https://github.com/xcat2/xcat-core/issues/6445

Just for the sake of completude: what’s the difference between the upstream and 
the Lenovo build? Theres nothing explaining on 
hpc.lenovo.com<http://hpc.lenovo.com>.

It appears to be tight with Confluent. I heard that Confluent would eventually 
replace xcatd and become the xCAT 3.0 release. Is this still true?

Thanks.


On 14 Oct 2019, at 09:38, Jarrod Johnson 
<jjohns...@lenovo.com<mailto:jjohns...@lenovo.com>> wrote:

I think it is fine, but on the other hand, I can only personally provide such a 
meta package in the lenovo branches.  I could open a pull request but I can't 
guarantee that it would be accepted.

________________________________
From: Vinícius Ferrão 
<fer...@versatushpc.com.br<mailto:fer...@versatushpc.com.br>>
Sent: Saturday, October 12, 2019 11:13 PM
To: Jarrod Johnson
Cc: xCAT Users Mailing list
Subject: Re: [External] [xcat-user] xCAT forcibly disabling SELinux and 
firewalld

Jarrod, do you think it’s okay to raise an issue on 
https://github.com/xcat2/xcat-core/issues to request this new meta package?
[Image removed by sender.]<https://github.com/xcat2/xcat-core/issues>

Issues · xcat2/xcat-core · GitHub<https://github.com/xcat2/xcat-core/issues>
github.com<http://github.com/>
Code repo for xCAT core packages. Contribute to xcat2/xcat-core development by 
creating an account on GitHub.


Thanks,


On 26 Sep 2019, at 03:54, Jarrod Johnson 
<jjohns...@lenovo.com<mailto:jjohns...@lenovo.com>> wrote:

I've been considering removing all of that from executing on rpm install (also 
enabling services to start on boot just by installing rpm)

It was added for convenience of not asking to run a setup after install but it 
is inconsistent with general rpm behavior and limits ability to use flags to 
customize behavior.

On the flip side, this would be a change that people would have to learn and 
would surprise new installs.

I might make variant of the xCAT meta package with no auto setup so that people 
won't be surprised unless they opt into the other package.

Looking for thoughts.

For wider information, it doesn't yet have os deployment, but confluent has 
been developing and designing specifically with firewall and selinux in mind, 
as well as trying to mitigate the initial setup complexity that drove us to 
create xcatconfig in the first place.  For example no more tls certs required 
for local access and os import will no longer loop mount isos (one of the 
biggest selinux problems) and avoid rewriting other service etc files in daemon 
context.  More straightforward network usage and a documented set of firewalld 
commands.
________________________________
From: Vinícius Ferrão via xCAT-user 
<xcat-user@lists.sourceforge.net<mailto:xcat-user@lists.sourceforge.net>>
Sent: Thursday, September 26, 2019 2:27:10 AM
To: xCAT Users Mailing list
Cc: Vinícius Ferrão
Subject: [External] [xcat-user] xCAT forcibly disabling SELinux and firewalld

Hello,

When installing xCAT in EL7 with yum install xCAT it’s just put SELinux in 
permissive mode and disables firewalld.

It does not even ask about it. It just does.

[root@headnode ~]# getenforce
Permissive
[root@headnode ~]# systemctl status firewalld
● firewalld.service - firewalld - dynamic firewall daemon
   Loaded: loaded (/usr/lib/systemd/system/firewalld.service; disabled; vendor 
preset: enabled)
   Active: inactive (dead)
     Docs: man:firewalld(1)

Sep 26 02:55:55 
headnode.cluster.iq.ufrj.br<http://headnode.cluster.iq.ufrj.br/> systemd[1]: 
Starting firewalld - dynamic firewall daemon...
Sep 26 02:55:56 
headnode.cluster.iq.ufrj.br<http://headnode.cluster.iq.ufrj.br/> systemd[1]: 
Started firewalld - dynamic firewall daemon.
Sep 26 03:09:18 
headnode.cluster.iq.ufrj.br<http://headnode.cluster.iq.ufrj.br/> systemd[1]: 
Stopping firewalld - dynamic firewall daemon...
Sep 26 03:09:21 
headnode.cluster.iq.ufrj.br<http://headnode.cluster.iq.ufrj.br/> systemd[1]: 
Stopped firewalld - dynamic firewall daemon.

There’s a way to avoid this behaviour?

Thanks,

PS: I’m aware of the consequences of firewalld and SELinux in xCAT environments.
_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net<mailto:xCAT-user@lists.sourceforge.net>
https://lists.sourceforge.net/lists/listinfo/xcat-user



_______________________________________________
xCAT-user mailing list
xCAT-user@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/xcat-user

Reply via email to