2018-10-14 02:01:35 -04:00
|
|
|
#!/usr/bin/env python3
|
|
|
|
|
|
|
|
# Daemon.py - Node daemon
|
|
|
|
# Part of the Parallel Virtual Cluster (PVC) system
|
|
|
|
#
|
2020-01-08 19:38:02 -05:00
|
|
|
# Copyright (C) 2018-2020 Joshua M. Boniface <joshua@boniface.me>
|
2018-10-14 02:01:35 -04:00
|
|
|
#
|
|
|
|
# This program is free software: you can redistribute it and/or modify
|
|
|
|
# it under the terms of the GNU General Public License as published by
|
|
|
|
# the Free Software Foundation, either version 3 of the License, or
|
|
|
|
# (at your option) any later version.
|
|
|
|
#
|
|
|
|
# This program is distributed in the hope that it will be useful,
|
|
|
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
# GNU General Public License for more details.
|
|
|
|
#
|
|
|
|
# You should have received a copy of the GNU General Public License
|
|
|
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
|
|
|
#
|
|
|
|
###############################################################################
|
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Version string for startup output
|
2020-02-15 23:24:22 -05:00
|
|
|
version = '0.7'
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
import kazoo.client
|
|
|
|
import libvirt
|
|
|
|
import sys
|
|
|
|
import os
|
|
|
|
import signal
|
|
|
|
import atexit
|
|
|
|
import socket
|
|
|
|
import psutil
|
|
|
|
import subprocess
|
|
|
|
import uuid
|
|
|
|
import time
|
|
|
|
import re
|
|
|
|
import configparser
|
2018-10-22 20:20:27 -04:00
|
|
|
import threading
|
2019-03-11 01:44:26 -04:00
|
|
|
import yaml
|
2018-10-29 17:51:08 -04:00
|
|
|
import json
|
2019-03-11 01:44:26 -04:00
|
|
|
import ipaddress
|
2018-10-14 02:01:35 -04:00
|
|
|
import apscheduler.schedulers.background
|
|
|
|
|
2020-01-09 10:53:27 -05:00
|
|
|
from distutils.util import strtobool
|
|
|
|
|
2020-02-08 19:16:19 -05:00
|
|
|
import pvcnoded.log as log
|
|
|
|
import pvcnoded.zkhandler as zkhandler
|
|
|
|
import pvcnoded.fencing as fencing
|
|
|
|
import pvcnoded.common as common
|
|
|
|
|
|
|
|
import pvcnoded.VMInstance as VMInstance
|
|
|
|
import pvcnoded.NodeInstance as NodeInstance
|
|
|
|
import pvcnoded.VXNetworkInstance as VXNetworkInstance
|
|
|
|
import pvcnoded.DNSAggregatorInstance as DNSAggregatorInstance
|
|
|
|
import pvcnoded.CephInstance as CephInstance
|
|
|
|
import pvcnoded.MetadataAPIInstance as MetadataAPIInstance
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# PVCD - node daemon startup program
|
|
|
|
###############################################################################
|
2019-06-18 12:36:53 -04:00
|
|
|
#
|
2018-10-14 02:01:35 -04:00
|
|
|
# The PVC daemon starts a node and configures all the required components for
|
|
|
|
# the node to run. It determines which of the 3 daemon modes it should be in
|
|
|
|
# during initial setup based on hostname and the config file, and then starts
|
|
|
|
# any required services. The 3 daemon modes are:
|
|
|
|
# * leader: the cluster leader, follows the Zookeeper leader
|
|
|
|
# * coordinator: a Zookeeper cluster member
|
|
|
|
# * hypervisor: a hypervisor without any cluster intelligence
|
|
|
|
#
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# Daemon functions
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Create timer to update this node in Zookeeper
|
|
|
|
def startKeepaliveTimer():
|
2018-11-18 00:55:04 -05:00
|
|
|
# Create our timer object
|
|
|
|
update_timer = apscheduler.schedulers.background.BackgroundScheduler()
|
2018-10-14 02:01:35 -04:00
|
|
|
interval = int(config['keepalive_interval'])
|
|
|
|
logger.out('Starting keepalive timer ({} second interval)'.format(interval), state='s')
|
|
|
|
update_timer.add_job(update_zookeeper, 'interval', seconds=interval)
|
|
|
|
update_timer.start()
|
2019-03-17 12:52:23 -04:00
|
|
|
update_zookeeper()
|
2018-11-18 00:55:04 -05:00
|
|
|
return update_timer
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
def stopKeepaliveTimer():
|
|
|
|
global update_timer
|
|
|
|
try:
|
|
|
|
update_timer.shutdown()
|
|
|
|
logger.out('Stopping keepalive timer', state='s')
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# PHASE 1a - Configuration parsing
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Get the config file variable from the environment
|
|
|
|
try:
|
2020-02-08 19:16:19 -05:00
|
|
|
pvcnoded_config_file = os.environ['PVCD_CONFIG_FILE']
|
2018-10-14 02:01:35 -04:00
|
|
|
except:
|
2020-02-08 19:16:19 -05:00
|
|
|
print('ERROR: The "PVCD_CONFIG_FILE" environment variable must be set before starting pvcnoded.')
|
2018-10-14 02:01:35 -04:00
|
|
|
exit(1)
|
|
|
|
|
|
|
|
# Set local hostname and domain variables
|
|
|
|
myfqdn = socket.gethostname()
|
|
|
|
#myfqdn = 'pvc-hv1.domain.net'
|
|
|
|
myhostname = myfqdn.split('.', 1)[0]
|
|
|
|
mydomainname = ''.join(myfqdn.split('.', 1)[1:])
|
2019-03-11 01:44:26 -04:00
|
|
|
try:
|
|
|
|
mynodeid = re.findall(r'\d+', myhostname)[-1]
|
|
|
|
except IndexError:
|
|
|
|
mynodeid = 1
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2020-01-09 10:53:27 -05:00
|
|
|
# Maintenance mode off by default
|
|
|
|
maintenance = False
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
# Gather useful data about our host
|
|
|
|
# Static data format: 'cpu_count', 'arch', 'os', 'kernel'
|
|
|
|
staticdata = []
|
|
|
|
staticdata.append(str(psutil.cpu_count()))
|
|
|
|
staticdata.append(subprocess.run(['uname', '-r'], stdout=subprocess.PIPE).stdout.decode('ascii').strip())
|
|
|
|
staticdata.append(subprocess.run(['uname', '-o'], stdout=subprocess.PIPE).stdout.decode('ascii').strip())
|
|
|
|
staticdata.append(subprocess.run(['uname', '-m'], stdout=subprocess.PIPE).stdout.decode('ascii').strip())
|
|
|
|
|
|
|
|
# Read and parse the config file
|
2020-02-08 19:16:19 -05:00
|
|
|
def readConfig(pvcnoded_config_file, myhostname):
|
|
|
|
print('Loading configuration from file "{}"'.format(pvcnoded_config_file))
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2020-02-08 19:16:19 -05:00
|
|
|
with open(pvcnoded_config_file, 'r') as cfgfile:
|
2018-10-14 02:01:35 -04:00
|
|
|
try:
|
2019-03-11 01:44:26 -04:00
|
|
|
o_config = yaml.load(cfgfile)
|
2018-10-14 02:01:35 -04:00
|
|
|
except Exception as e:
|
2019-03-11 01:44:26 -04:00
|
|
|
print('ERROR: Failed to parse configuration file: {}'.format(e))
|
2018-10-14 02:01:35 -04:00
|
|
|
exit(1)
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Handle the basic config (hypervisor-only)
|
|
|
|
try:
|
|
|
|
config_general = {
|
|
|
|
'coordinators': o_config['pvc']['cluster']['coordinators'],
|
|
|
|
'enable_hypervisor': o_config['pvc']['functions']['enable_hypervisor'],
|
|
|
|
'enable_networking': o_config['pvc']['functions']['enable_networking'],
|
|
|
|
'enable_storage': o_config['pvc']['functions']['enable_storage'],
|
2019-07-06 02:42:56 -04:00
|
|
|
'enable_api': o_config['pvc']['functions']['enable_api'],
|
2019-03-11 01:44:26 -04:00
|
|
|
'dynamic_directory': o_config['pvc']['system']['configuration']['directories']['dynamic_directory'],
|
|
|
|
'log_directory': o_config['pvc']['system']['configuration']['directories']['log_directory'],
|
2019-04-11 19:06:06 -04:00
|
|
|
'console_log_directory': o_config['pvc']['system']['configuration']['directories']['console_log_directory'],
|
2019-03-11 01:44:26 -04:00
|
|
|
'file_logging': o_config['pvc']['system']['configuration']['logging']['file_logging'],
|
|
|
|
'stdout_logging': o_config['pvc']['system']['configuration']['logging']['stdout_logging'],
|
2019-07-10 21:39:25 -04:00
|
|
|
'log_colours': o_config['pvc']['system']['configuration']['logging']['log_colours'],
|
|
|
|
'log_dates': o_config['pvc']['system']['configuration']['logging']['log_dates'],
|
2019-06-18 12:44:07 -04:00
|
|
|
'log_keepalives': o_config['pvc']['system']['configuration']['logging']['log_keepalives'],
|
2019-06-18 19:54:42 -04:00
|
|
|
'log_keepalive_cluster_details': o_config['pvc']['system']['configuration']['logging']['log_keepalive_cluster_details'],
|
|
|
|
'log_keepalive_storage_details': o_config['pvc']['system']['configuration']['logging']['log_keepalive_storage_details'],
|
2019-04-11 19:06:06 -04:00
|
|
|
'console_log_lines': o_config['pvc']['system']['configuration']['logging']['console_log_lines'],
|
2019-07-28 19:33:08 -04:00
|
|
|
'keepalive_interval': o_config['pvc']['system']['intervals']['keepalive_interval'],
|
|
|
|
'fence_intervals': o_config['pvc']['system']['intervals']['fence_intervals'],
|
|
|
|
'suicide_intervals': o_config['pvc']['system']['intervals']['suicide_intervals'],
|
2019-03-11 01:44:26 -04:00
|
|
|
'successful_fence': o_config['pvc']['system']['fencing']['actions']['successful_fence'],
|
|
|
|
'failed_fence': o_config['pvc']['system']['fencing']['actions']['failed_fence'],
|
|
|
|
'migration_target_selector': o_config['pvc']['system']['migration']['target_selector'],
|
|
|
|
'ipmi_hostname': o_config['pvc']['system']['fencing']['ipmi']['host'],
|
|
|
|
'ipmi_username': o_config['pvc']['system']['fencing']['ipmi']['user'],
|
|
|
|
'ipmi_password': o_config['pvc']['system']['fencing']['ipmi']['pass']
|
|
|
|
}
|
|
|
|
except Exception as e:
|
2020-01-22 12:09:31 -05:00
|
|
|
print('ERROR: Failed to load configuration: {}'.format(e))
|
2019-03-11 01:44:26 -04:00
|
|
|
exit(1)
|
|
|
|
config = config_general
|
|
|
|
|
2019-07-09 14:41:07 -04:00
|
|
|
# Handle debugging config
|
|
|
|
try:
|
|
|
|
config_debug = {
|
2019-08-01 11:22:27 -04:00
|
|
|
'debug': o_config['pvc']['debug']
|
2019-07-09 14:41:07 -04:00
|
|
|
}
|
|
|
|
except:
|
|
|
|
config_debug = {
|
|
|
|
'debug': False
|
|
|
|
}
|
|
|
|
config = {**config, **config_debug}
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Handle the networking config
|
|
|
|
if config['enable_networking']:
|
2018-10-14 02:01:35 -04:00
|
|
|
try:
|
2019-03-11 01:44:26 -04:00
|
|
|
config_networking = {
|
|
|
|
'cluster_domain': o_config['pvc']['cluster']['networks']['cluster']['domain'],
|
|
|
|
'vni_floating_ip': o_config['pvc']['cluster']['networks']['cluster']['floating_ip'],
|
|
|
|
'vni_network': o_config['pvc']['cluster']['networks']['cluster']['network'],
|
|
|
|
'storage_domain': o_config['pvc']['cluster']['networks']['storage']['domain'],
|
|
|
|
'storage_floating_ip': o_config['pvc']['cluster']['networks']['storage']['floating_ip'],
|
|
|
|
'storage_network': o_config['pvc']['cluster']['networks']['storage']['network'],
|
|
|
|
'upstream_domain': o_config['pvc']['cluster']['networks']['upstream']['domain'],
|
|
|
|
'upstream_floating_ip': o_config['pvc']['cluster']['networks']['upstream']['floating_ip'],
|
|
|
|
'upstream_network': o_config['pvc']['cluster']['networks']['upstream']['network'],
|
2019-03-17 00:39:08 -04:00
|
|
|
'upstream_gateway': o_config['pvc']['cluster']['networks']['upstream']['gateway'],
|
2019-05-20 22:40:07 -04:00
|
|
|
'pdns_postgresql_host': o_config['pvc']['coordinator']['dns']['database']['host'],
|
|
|
|
'pdns_postgresql_port': o_config['pvc']['coordinator']['dns']['database']['port'],
|
|
|
|
'pdns_postgresql_dbname': o_config['pvc']['coordinator']['dns']['database']['name'],
|
|
|
|
'pdns_postgresql_user': o_config['pvc']['coordinator']['dns']['database']['user'],
|
|
|
|
'pdns_postgresql_password': o_config['pvc']['coordinator']['dns']['database']['pass'],
|
2019-12-14 15:55:30 -05:00
|
|
|
'metadata_postgresql_host': o_config['pvc']['coordinator']['metadata']['database']['host'],
|
|
|
|
'metadata_postgresql_port': o_config['pvc']['coordinator']['metadata']['database']['port'],
|
|
|
|
'metadata_postgresql_dbname': o_config['pvc']['coordinator']['metadata']['database']['name'],
|
|
|
|
'metadata_postgresql_user': o_config['pvc']['coordinator']['metadata']['database']['user'],
|
|
|
|
'metadata_postgresql_password': o_config['pvc']['coordinator']['metadata']['database']['pass'],
|
2020-01-06 14:44:56 -05:00
|
|
|
'bridge_dev': o_config['pvc']['system']['configuration']['networking']['bridge_device'],
|
2019-06-17 23:44:41 -04:00
|
|
|
'vni_dev': o_config['pvc']['system']['configuration']['networking']['cluster']['device'],
|
2019-06-17 23:41:07 -04:00
|
|
|
'vni_mtu': o_config['pvc']['system']['configuration']['networking']['cluster']['mtu'],
|
|
|
|
'vni_dev_ip': o_config['pvc']['system']['configuration']['networking']['cluster']['address'],
|
2019-06-17 23:44:41 -04:00
|
|
|
'storage_dev': o_config['pvc']['system']['configuration']['networking']['storage']['device'],
|
2019-06-17 23:41:07 -04:00
|
|
|
'storage_mtu': o_config['pvc']['system']['configuration']['networking']['storage']['mtu'],
|
|
|
|
'storage_dev_ip': o_config['pvc']['system']['configuration']['networking']['storage']['address'],
|
2019-06-17 23:44:41 -04:00
|
|
|
'upstream_dev': o_config['pvc']['system']['configuration']['networking']['upstream']['device'],
|
2019-06-17 23:41:07 -04:00
|
|
|
'upstream_mtu': o_config['pvc']['system']['configuration']['networking']['upstream']['mtu'],
|
|
|
|
'upstream_dev_ip': o_config['pvc']['system']['configuration']['networking']['upstream']['address'],
|
2019-03-11 01:44:26 -04:00
|
|
|
}
|
|
|
|
except Exception as e:
|
2020-01-22 12:09:31 -05:00
|
|
|
print('ERROR: Failed to load configuration: {}'.format(e))
|
2019-03-11 01:44:26 -04:00
|
|
|
exit(1)
|
|
|
|
config = {**config, **config_networking}
|
|
|
|
|
|
|
|
# Create the by-id address entries
|
|
|
|
for net in [ 'vni',
|
|
|
|
'storage',
|
|
|
|
'upstream' ]:
|
|
|
|
address_key = '{}_dev_ip'.format(net)
|
|
|
|
floating_key = '{}_floating_ip'.format(net)
|
|
|
|
network_key = '{}_network'.format(net)
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Verify the network provided is valid
|
2018-10-14 02:01:35 -04:00
|
|
|
try:
|
2019-03-11 01:44:26 -04:00
|
|
|
network = ipaddress.ip_network(config[network_key])
|
|
|
|
except Exception as e:
|
|
|
|
print('ERROR: Network address {} for {} is not valid!'.format(config[network_key], network_key))
|
|
|
|
exit(1)
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# If we should be autoselected
|
|
|
|
if config[address_key] == 'by-id':
|
|
|
|
# Construct an IP from the relevant network
|
|
|
|
# The NodeID starts at 1, but indexes start at 0
|
|
|
|
address_id = int(mynodeid) - 1
|
|
|
|
# Grab the nth address from the network
|
2019-03-16 23:27:51 -04:00
|
|
|
config[address_key] = '{}/{}'.format(list(network.hosts())[address_id], network.prefixlen)
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Verify that the floating IP is valid
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
try:
|
|
|
|
# Set the ipaddr
|
|
|
|
floating_addr = ipaddress.ip_address(config[floating_key].split('/')[0])
|
|
|
|
# Verify we're in the network
|
|
|
|
if not floating_addr in list(network.hosts()):
|
|
|
|
raise
|
|
|
|
except Exception as e:
|
|
|
|
print('ERROR: Floating address {} for {} is not valid!'.format(config[floating_key], floating_key))
|
2018-10-14 02:01:35 -04:00
|
|
|
exit(1)
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Handle the storage config
|
|
|
|
if config['enable_storage']:
|
|
|
|
try:
|
|
|
|
config_storage = dict()
|
|
|
|
except Exception as e:
|
2020-01-22 12:09:31 -05:00
|
|
|
print('ERROR: Failed to load configuration: {}'.format(e))
|
2019-03-11 01:44:26 -04:00
|
|
|
exit(1)
|
|
|
|
config = {**config, **config_storage}
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Handle an empty ipmi_hostname
|
|
|
|
if config['ipmi_hostname'] == '':
|
|
|
|
config['ipmi_hostname'] = myshorthostname + '-lom.' + mydomainname
|
|
|
|
|
|
|
|
return config
|
|
|
|
|
|
|
|
# Get the config object from readConfig()
|
2020-02-08 19:16:19 -05:00
|
|
|
config = readConfig(pvcnoded_config_file, myhostname)
|
2019-07-09 14:41:07 -04:00
|
|
|
debug = config['debug']
|
|
|
|
if debug:
|
|
|
|
print('DEBUG MODE ENABLED')
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Handle the enable values
|
|
|
|
enable_hypervisor = config['enable_hypervisor']
|
|
|
|
enable_networking = config['enable_networking']
|
|
|
|
enable_storage = config['enable_storage']
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# PHASE 1b - Prepare filesystem directories
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Define our dynamic directory schema
|
|
|
|
# <dynamic_directory>/
|
|
|
|
# dnsmasq/
|
|
|
|
# pdns/
|
|
|
|
# nft/
|
|
|
|
config['dnsmasq_dynamic_directory'] = config['dynamic_directory'] + '/dnsmasq'
|
|
|
|
config['pdns_dynamic_directory'] = config['dynamic_directory'] + '/pdns'
|
|
|
|
config['nft_dynamic_directory'] = config['dynamic_directory'] + '/nft'
|
|
|
|
|
|
|
|
# Create our dynamic directories if they don't exist
|
|
|
|
if not os.path.exists(config['dynamic_directory']):
|
|
|
|
os.makedirs(config['dynamic_directory'])
|
|
|
|
os.makedirs(config['dnsmasq_dynamic_directory'])
|
|
|
|
os.makedirs(config['pdns_dynamic_directory'])
|
|
|
|
os.makedirs(config['nft_dynamic_directory'])
|
|
|
|
|
|
|
|
# Define our log directory schema
|
|
|
|
# <log_directory>/
|
|
|
|
# dnsmasq/
|
|
|
|
# pdns/
|
|
|
|
# nft/
|
|
|
|
config['dnsmasq_log_directory'] = config['log_directory'] + '/dnsmasq'
|
|
|
|
config['pdns_log_directory'] = config['log_directory'] + '/pdns'
|
|
|
|
config['nft_log_directory'] = config['log_directory'] + '/nft'
|
|
|
|
|
2018-10-25 23:36:25 -04:00
|
|
|
# Create our log directories if they don't exist
|
2018-10-14 02:01:35 -04:00
|
|
|
if not os.path.exists(config['log_directory']):
|
|
|
|
os.makedirs(config['log_directory'])
|
|
|
|
os.makedirs(config['dnsmasq_log_directory'])
|
|
|
|
os.makedirs(config['pdns_log_directory'])
|
|
|
|
os.makedirs(config['nft_log_directory'])
|
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# PHASE 1c - Set up logging
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
logger = log.Logger(config)
|
|
|
|
|
|
|
|
# Print our startup messages
|
|
|
|
logger.out('Parallel Virtual Cluster node daemon v{}'.format(version))
|
|
|
|
logger.out('FQDN: {}'.format(myfqdn))
|
|
|
|
logger.out('Host: {}'.format(myhostname))
|
|
|
|
logger.out('ID: {}'.format(mynodeid))
|
|
|
|
logger.out('IPMI hostname: {}'.format(config['ipmi_hostname']))
|
|
|
|
logger.out('Machine details:')
|
|
|
|
logger.out(' CPUs: {}'.format(staticdata[0]))
|
|
|
|
logger.out(' Arch: {}'.format(staticdata[3]))
|
|
|
|
logger.out(' OS: {}'.format(staticdata[2]))
|
|
|
|
logger.out(' Kernel: {}'.format(staticdata[1]))
|
2020-02-08 19:16:19 -05:00
|
|
|
logger.out('Starting pvcnoded on host {}'.format(myfqdn), state='s')
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2019-07-10 21:39:25 -04:00
|
|
|
# Define some colours for future messages if applicable
|
|
|
|
if config['log_colours']:
|
|
|
|
fmt_end = logger.fmt_end
|
|
|
|
fmt_bold = logger.fmt_bold
|
|
|
|
fmt_blue = logger.fmt_blue
|
2019-07-12 09:31:42 -04:00
|
|
|
fmt_cyan = logger.fmt_cyan
|
2019-07-10 21:39:25 -04:00
|
|
|
fmt_green = logger.fmt_green
|
|
|
|
fmt_yellow = logger.fmt_yellow
|
|
|
|
fmt_red = logger.fmt_red
|
|
|
|
fmt_purple = logger.fmt_purple
|
|
|
|
else:
|
|
|
|
fmt_end = ''
|
|
|
|
fmt_bold = ''
|
|
|
|
fmt_blue = ''
|
2020-05-08 18:15:02 -04:00
|
|
|
fmt_cyan = ''
|
2019-07-10 21:39:25 -04:00
|
|
|
fmt_green = ''
|
|
|
|
fmt_yellow = ''
|
|
|
|
fmt_red = ''
|
|
|
|
fmt_purple = ''
|
|
|
|
|
2018-10-14 02:58:02 -04:00
|
|
|
###############################################################################
|
2019-03-17 20:05:58 -04:00
|
|
|
# PHASE 2a - Create local IP addresses for static networks
|
2019-03-17 00:53:11 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
if enable_networking:
|
|
|
|
# VNI configuration
|
|
|
|
vni_dev = config['vni_dev']
|
2019-06-17 23:28:02 -04:00
|
|
|
vni_mtu = config['vni_mtu']
|
2019-03-17 00:53:11 -04:00
|
|
|
vni_dev_ip = config['vni_dev_ip']
|
2020-01-12 19:04:31 -05:00
|
|
|
logger.out('Setting up VNI network interface {} with MTU {}'.format(vni_dev, vni_mtu), state='i')
|
2019-06-17 23:28:02 -04:00
|
|
|
common.run_os_command('ip link set {} mtu {} up'.format(vni_dev, vni_mtu))
|
2019-03-17 00:53:11 -04:00
|
|
|
|
|
|
|
# Cluster bridge configuration
|
2019-05-21 23:19:19 -04:00
|
|
|
logger.out('Setting up Cluster network bridge on interface {} with IP {}'.format(vni_dev, vni_dev_ip), state='i')
|
2019-03-17 00:53:11 -04:00
|
|
|
common.run_os_command('brctl addbr brcluster')
|
|
|
|
common.run_os_command('brctl addif brcluster {}'.format(vni_dev))
|
2019-06-17 23:28:02 -04:00
|
|
|
common.run_os_command('ip link set brcluster mtu {} up'.format(vni_mtu))
|
2019-03-17 00:53:11 -04:00
|
|
|
common.run_os_command('ip address add {} dev {}'.format(vni_dev_ip, 'brcluster'))
|
|
|
|
|
|
|
|
# Storage configuration
|
|
|
|
storage_dev = config['storage_dev']
|
2019-06-17 23:28:02 -04:00
|
|
|
storage_mtu = config['storage_mtu']
|
2019-03-17 00:53:11 -04:00
|
|
|
storage_dev_ip = config['storage_dev_ip']
|
2020-01-12 19:04:31 -05:00
|
|
|
logger.out('Setting up Storage network interface {} with MTU {}'.format(storage_dev, vni_mtu), state='i')
|
2019-06-17 23:28:02 -04:00
|
|
|
common.run_os_command('ip link set {} mtu {} up'.format(storage_dev, storage_mtu))
|
2020-01-12 19:04:31 -05:00
|
|
|
|
|
|
|
# Storage bridge configuration
|
|
|
|
if storage_dev == vni_dev:
|
|
|
|
logger.out('Adding Storage network IP {} to VNI Cluster bridge brcluster'.format(storage_dev_ip), state='i')
|
|
|
|
common.run_os_command('ip address add {} dev {}'.format(storage_dev_ip, 'brcluster'))
|
|
|
|
else:
|
|
|
|
logger.out('Setting up Storage network bridge on interface {} with IP {}'.format(vni_dev, vni_dev_ip), state='i')
|
|
|
|
common.run_os_command('brctl addbr brstorage')
|
|
|
|
common.run_os_command('brctl addif brstorage {}'.format(storage_dev))
|
|
|
|
common.run_os_command('ip link set brstorage mtu {} up'.format(storage_mtu))
|
|
|
|
common.run_os_command('ip address add {} dev {}'.format(storage_dev_ip, 'brstorage'))
|
2019-03-17 00:53:11 -04:00
|
|
|
|
|
|
|
# Upstream configuration
|
2020-01-12 19:04:31 -05:00
|
|
|
upstream_dev = config['upstream_dev']
|
|
|
|
upstream_mtu = config['upstream_mtu']
|
|
|
|
upstream_dev_ip = config['upstream_dev_ip']
|
|
|
|
logger.out('Setting up Upstream network interface {} with MTU {}'.format(upstream_dev, upstream_mtu), state='i')
|
|
|
|
common.run_os_command('ip link set {} mtu {} up'.format(upstream_dev, upstream_mtu))
|
|
|
|
|
|
|
|
# Upstream bridge configuration
|
|
|
|
if upstream_dev == vni_dev:
|
|
|
|
logger.out('Adding Upstream network IP {} to VNI Cluster bridge brcluster'.format(upstream_dev_ip), state='i')
|
|
|
|
common.run_os_command('ip address add {} dev {}'.format(upstream_dev_ip, 'brcluster'))
|
|
|
|
else:
|
|
|
|
logger.out('Setting up Upstream network bridge on interface {} with IP {}'.format(vni_dev, vni_dev_ip), state='i')
|
|
|
|
common.run_os_command('brctl addbr brupstream')
|
|
|
|
common.run_os_command('brctl addif brupstream {}'.format(upstream_dev))
|
|
|
|
common.run_os_command('ip link set brupstream mtu {} up'.format(upstream_mtu))
|
|
|
|
common.run_os_command('ip address add {} dev {}'.format(upstream_dev_ip, 'brupstream'))
|
|
|
|
|
|
|
|
# Add upstream default gateway
|
|
|
|
upstream_gateway = config.get('upstream_gateway', None)
|
|
|
|
if upstream_gateway:
|
|
|
|
logger.out('Setting up Upstream default gateway IP {}'.format(upstream_gateway), state='i')
|
|
|
|
if upstream_dev == vni_dev:
|
|
|
|
common.run_os_command('ip route add default via {} dev {}'.format(upstream_gateway, 'brcluster'))
|
|
|
|
else:
|
|
|
|
common.run_os_command('ip route add default via {} dev {}'.format(upstream_gateway, 'brupstream'))
|
2019-03-17 00:53:11 -04:00
|
|
|
|
2019-03-17 20:05:58 -04:00
|
|
|
###############################################################################
|
2020-02-08 19:16:19 -05:00
|
|
|
# PHASE 2b - Prepare sysctl for pvcnoded
|
2019-03-17 20:05:58 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
if enable_networking:
|
|
|
|
# Enable routing functions
|
|
|
|
common.run_os_command('sysctl net.ipv4.ip_forward=1')
|
|
|
|
common.run_os_command('sysctl net.ipv6.ip_forward=1')
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-17 20:05:58 -04:00
|
|
|
# Send redirects
|
|
|
|
common.run_os_command('sysctl net.ipv4.conf.all.send_redirects=1')
|
|
|
|
common.run_os_command('sysctl net.ipv4.conf.default.send_redirects=1')
|
|
|
|
common.run_os_command('sysctl net.ipv6.conf.all.send_redirects=1')
|
|
|
|
common.run_os_command('sysctl net.ipv6.conf.default.send_redirects=1')
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-17 20:05:58 -04:00
|
|
|
# Accept source routes
|
|
|
|
common.run_os_command('sysctl net.ipv4.conf.all.accept_source_route=1')
|
|
|
|
common.run_os_command('sysctl net.ipv4.conf.default.accept_source_route=1')
|
|
|
|
common.run_os_command('sysctl net.ipv6.conf.all.accept_source_route=1')
|
|
|
|
common.run_os_command('sysctl net.ipv6.conf.default.accept_source_route=1')
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2020-01-12 19:04:31 -05:00
|
|
|
# Disable RP filtering on the VNI Cluster and Upstream interfaces (to allow traffic pivoting)
|
2019-03-20 12:01:26 -04:00
|
|
|
common.run_os_command('sysctl net.ipv4.conf.{}.rp_filter=0'.format(config['vni_dev']))
|
|
|
|
common.run_os_command('sysctl net.ipv4.conf.{}.rp_filter=0'.format(config['upstream_dev']))
|
2019-03-17 20:05:58 -04:00
|
|
|
common.run_os_command('sysctl net.ipv4.conf.brcluster.rp_filter=0')
|
2020-01-12 19:04:31 -05:00
|
|
|
common.run_os_command('sysctl net.ipv4.conf.brupstream.rp_filter=0')
|
2019-03-20 12:01:26 -04:00
|
|
|
common.run_os_command('sysctl net.ipv6.conf.{}.rp_filter=0'.format(config['vni_dev']))
|
|
|
|
common.run_os_command('sysctl net.ipv6.conf.{}.rp_filter=0'.format(config['upstream_dev']))
|
2019-03-17 20:05:58 -04:00
|
|
|
common.run_os_command('sysctl net.ipv6.conf.brcluster.rp_filter=0')
|
2020-01-12 19:04:31 -05:00
|
|
|
common.run_os_command('sysctl net.ipv6.conf.brupstream.rp_filter=0')
|
2019-03-17 20:05:58 -04:00
|
|
|
|
2019-03-17 00:53:11 -04:00
|
|
|
###############################################################################
|
2019-03-17 01:45:17 -04:00
|
|
|
# PHASE 3a - Determine coordinator mode
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# What is the list of coordinator hosts
|
2019-03-11 01:44:26 -04:00
|
|
|
coordinator_nodes = config['coordinators']
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2018-10-30 09:17:41 -04:00
|
|
|
if myhostname in coordinator_nodes:
|
2018-10-14 02:01:35 -04:00
|
|
|
# We are indeed a coordinator host
|
|
|
|
config['daemon_mode'] = 'coordinator'
|
|
|
|
# Start the zookeeper service using systemctl
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('Node is a ' + fmt_blue + 'coordinator' + fmt_end, state='i')
|
2018-10-14 02:01:35 -04:00
|
|
|
else:
|
|
|
|
config['daemon_mode'] = 'hypervisor'
|
|
|
|
|
2019-03-17 01:45:17 -04:00
|
|
|
###############################################################################
|
|
|
|
# PHASE 3b - Start system daemons
|
|
|
|
###############################################################################
|
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
logger.out('Starting Zookeeper daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start zookeeper.service')
|
|
|
|
|
|
|
|
if enable_hypervisor:
|
|
|
|
logger.out('Starting Libvirt daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start libvirtd.service')
|
|
|
|
|
|
|
|
if enable_networking:
|
|
|
|
if config['daemon_mode'] == 'coordinator':
|
2019-05-20 22:40:07 -04:00
|
|
|
logger.out('Starting Patroni daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start patroni.service')
|
2019-03-17 01:45:17 -04:00
|
|
|
logger.out('Starting FRRouting daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start frr.service')
|
|
|
|
|
|
|
|
if enable_storage:
|
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
logger.out('Starting Ceph monitor daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start ceph-mon@{}'.format(myhostname))
|
|
|
|
logger.out('Starting Ceph manager daemon', state='i')
|
|
|
|
common.run_os_command('systemctl start ceph-mgr@{}'.format(myhostname))
|
|
|
|
|
2019-06-17 21:56:06 -04:00
|
|
|
logger.out('Waiting 5s for daemons to start', state='s')
|
|
|
|
time.sleep(5)
|
2019-03-17 01:45:17 -04:00
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
2019-03-17 00:53:11 -04:00
|
|
|
# PHASE 4 - Attempt to connect to the coordinators and start zookeeper client
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Start the connection to the coordinators
|
|
|
|
zk_conn = kazoo.client.KazooClient(hosts=config['coordinators'])
|
|
|
|
try:
|
2018-10-30 09:17:41 -04:00
|
|
|
logger.out('Connecting to Zookeeper cluster nodes {}'.format(config['coordinators']), state='i')
|
2018-10-14 02:01:35 -04:00
|
|
|
# Start connection
|
|
|
|
zk_conn.start()
|
|
|
|
except Exception as e:
|
|
|
|
logger.out('ERROR: Failed to connect to Zookeeper cluster: {}'.format(e), state='e')
|
|
|
|
exit(1)
|
|
|
|
|
|
|
|
# Handle zookeeper failures
|
|
|
|
def zk_listener(state):
|
|
|
|
global zk_conn, update_timer
|
2018-11-18 00:55:04 -05:00
|
|
|
if state == kazoo.client.KazooState.CONNECTED:
|
|
|
|
logger.out('Connection to Zookeeper restarted', state='o')
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2018-11-18 00:55:04 -05:00
|
|
|
# Start keepalive thread
|
|
|
|
if update_timer:
|
|
|
|
update_timer = startKeepaliveTimer()
|
|
|
|
else:
|
2018-10-14 02:01:35 -04:00
|
|
|
# Stop keepalive thread
|
|
|
|
if update_timer:
|
|
|
|
stopKeepaliveTimer()
|
|
|
|
|
2018-11-18 00:55:04 -05:00
|
|
|
logger.out('Connection to Zookeeper lost; retrying', state='w')
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
while True:
|
2019-08-07 13:49:33 -04:00
|
|
|
time.sleep(1)
|
2019-07-09 19:14:53 -04:00
|
|
|
|
2018-10-22 23:11:04 -04:00
|
|
|
_zk_conn = kazoo.client.KazooClient(hosts=config['coordinators'])
|
2018-10-14 02:01:35 -04:00
|
|
|
try:
|
2018-10-22 23:11:04 -04:00
|
|
|
_zk_conn.start()
|
2018-10-14 02:01:35 -04:00
|
|
|
except:
|
2019-07-09 19:14:53 -04:00
|
|
|
del _zk_conn
|
|
|
|
continue
|
|
|
|
|
|
|
|
zk_conn = _zk_conn
|
|
|
|
break
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
zk_conn.add_listener(zk_listener)
|
|
|
|
|
|
|
|
###############################################################################
|
2019-03-17 00:53:11 -04:00
|
|
|
# PHASE 5 - Gracefully handle termination
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Cleanup function
|
|
|
|
def cleanup():
|
2019-08-07 13:49:33 -04:00
|
|
|
global zk_conn, update_timer, d_domain
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2020-04-08 21:58:19 -04:00
|
|
|
logger.out('Terminating pvcnoded and cleaning up', state='s')
|
2019-05-23 23:18:43 -04:00
|
|
|
|
2019-06-19 14:52:47 -04:00
|
|
|
# Set shutdown state in Zookeeper
|
|
|
|
zkhandler.writedata(zk_conn, { '/nodes/{}/daemonstate'.format(myhostname): 'shutdown' })
|
|
|
|
|
2020-04-08 21:58:19 -04:00
|
|
|
# Waiting for any flushes to complete
|
2020-04-08 22:00:51 -04:00
|
|
|
logger.out('Waiting for any active flushes', state='s')
|
2020-04-08 21:58:19 -04:00
|
|
|
while this_node.flush_thread is not None:
|
|
|
|
time.sleep(0.5)
|
|
|
|
|
2019-04-11 19:06:06 -04:00
|
|
|
# Stop console logging on all VMs
|
|
|
|
logger.out('Stopping domain console watchers', state='s')
|
|
|
|
for domain in d_domain:
|
|
|
|
if d_domain[domain].getnode() == myhostname:
|
|
|
|
try:
|
|
|
|
d_domain[domain].console_log_instance.stop()
|
|
|
|
except NameError as e:
|
|
|
|
pass
|
|
|
|
except AttributeError as e:
|
|
|
|
pass
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2020-04-08 21:58:19 -04:00
|
|
|
# Force into secondary coordinator state if needed
|
2020-02-19 13:18:38 -05:00
|
|
|
try:
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
is_primary = True
|
|
|
|
zkhandler.writedata(zk_conn, {
|
|
|
|
'/primary_node': 'none'
|
|
|
|
})
|
|
|
|
logger.out('Waiting for primary migration', state='s')
|
|
|
|
while this_node.router_state != 'secondary':
|
2020-04-08 21:58:19 -04:00
|
|
|
time.sleep(0.5)
|
2020-02-19 13:18:38 -05:00
|
|
|
except:
|
|
|
|
pass
|
2018-10-22 20:20:27 -04:00
|
|
|
|
2020-04-12 03:49:29 -04:00
|
|
|
# Stop keepalive thread
|
|
|
|
try:
|
|
|
|
stopKeepaliveTimer()
|
|
|
|
except NameError:
|
|
|
|
pass
|
|
|
|
except AttributeError:
|
|
|
|
pass
|
|
|
|
|
|
|
|
logger.out('Performing final keepalive update', state='s')
|
|
|
|
update_zookeeper()
|
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Set stop state in Zookeeper
|
|
|
|
zkhandler.writedata(zk_conn, { '/nodes/{}/daemonstate'.format(myhostname): 'stop' })
|
|
|
|
|
|
|
|
# Forcibly terminate dnsmasq because it gets stuck sometimes
|
|
|
|
common.run_os_command('killall dnsmasq')
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Close the Zookeeper connection
|
|
|
|
try:
|
|
|
|
zk_conn.stop()
|
|
|
|
zk_conn.close()
|
|
|
|
except:
|
|
|
|
pass
|
|
|
|
|
2018-10-25 22:21:40 -04:00
|
|
|
logger.out('Terminated pvc daemon', state='s')
|
2019-04-11 19:06:06 -04:00
|
|
|
sys.exit(0)
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Termination function
|
|
|
|
def term(signum='', frame=''):
|
2019-04-11 19:06:06 -04:00
|
|
|
cleanup()
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2019-07-10 22:20:24 -04:00
|
|
|
# Hangup (logrotate) function
|
|
|
|
def hup(signum='', frame=''):
|
|
|
|
if config['file_logging']:
|
|
|
|
logger.hup()
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
# Handle signals gracefully
|
|
|
|
signal.signal(signal.SIGTERM, term)
|
|
|
|
signal.signal(signal.SIGINT, term)
|
|
|
|
signal.signal(signal.SIGQUIT, term)
|
2019-07-10 22:20:24 -04:00
|
|
|
signal.signal(signal.SIGHUP, hup)
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
###############################################################################
|
2019-03-17 00:53:11 -04:00
|
|
|
# PHASE 6 - Prepare host in Zookeeper
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
# Check if our node exists in Zookeeper, and create it if not
|
|
|
|
if zk_conn.exists('/nodes/{}'.format(myhostname)):
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out("Node is " + fmt_green + "present" + fmt_end + " in Zookeeper", state='i')
|
2019-07-12 09:49:30 -04:00
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
init_routerstate = 'secondary'
|
|
|
|
else:
|
|
|
|
init_routerstate = 'client'
|
2018-10-14 02:01:35 -04:00
|
|
|
# Update static data just in case it's changed
|
2019-07-09 13:58:57 -04:00
|
|
|
zkhandler.writedata(zk_conn, {
|
2019-07-12 09:49:30 -04:00
|
|
|
'/nodes/{}/daemonmode'.format(myhostname): config['daemon_mode'],
|
2019-07-09 13:58:57 -04:00
|
|
|
'/nodes/{}/daemonstate'.format(myhostname): 'init',
|
2019-07-12 09:49:30 -04:00
|
|
|
'/nodes/{}/routerstate'.format(myhostname): init_routerstate,
|
2019-07-09 13:58:57 -04:00
|
|
|
'/nodes/{}/staticdata'.format(myhostname): ' '.join(staticdata),
|
|
|
|
# Keepalives and fencing information (always load and set from config on boot)
|
|
|
|
'/nodes/{}/ipmihostname'.format(myhostname): config['ipmi_hostname'],
|
|
|
|
'/nodes/{}/ipmiusername'.format(myhostname): config['ipmi_username'],
|
|
|
|
'/nodes/{}/ipmipassword'.format(myhostname): config['ipmi_password']
|
|
|
|
})
|
2018-10-14 02:01:35 -04:00
|
|
|
else:
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out("Node is " + fmt_red + "absent" + fmt_end + " in Zookeeper; adding new node", state='i')
|
2018-10-14 02:01:35 -04:00
|
|
|
keepalive_time = int(time.time())
|
2019-06-16 19:27:20 -04:00
|
|
|
zkhandler.writedata(zk_conn, {
|
2019-06-17 23:53:16 -04:00
|
|
|
'/nodes/{}'.format(myhostname): config['daemon_mode'],
|
2018-10-14 02:01:35 -04:00
|
|
|
# Basic state information
|
2019-06-17 23:53:16 -04:00
|
|
|
'/nodes/{}/daemonmode'.format(myhostname): config['daemon_mode'],
|
|
|
|
'/nodes/{}/daemonstate'.format(myhostname): 'init',
|
|
|
|
'/nodes/{}/routerstate'.format(myhostname): 'client',
|
|
|
|
'/nodes/{}/domainstate'.format(myhostname): 'flushed',
|
|
|
|
'/nodes/{}/staticdata'.format(myhostname): ' '.join(staticdata),
|
|
|
|
'/nodes/{}/memtotal'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/memfree'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/memused'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/memalloc'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/vcpualloc'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/cpuload'.format(myhostname): '0.0',
|
|
|
|
'/nodes/{}/networkscount'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/domainscount'.format(myhostname): '0',
|
|
|
|
'/nodes/{}/runningdomains'.format(myhostname): '',
|
2018-10-14 02:01:35 -04:00
|
|
|
# Keepalives and fencing information
|
2019-06-17 23:53:16 -04:00
|
|
|
'/nodes/{}/keepalive'.format(myhostname): str(keepalive_time),
|
|
|
|
'/nodes/{}/ipmihostname'.format(myhostname): config['ipmi_hostname'],
|
|
|
|
'/nodes/{}/ipmiusername'.format(myhostname): config['ipmi_username'],
|
|
|
|
'/nodes/{}/ipmipassword'.format(myhostname): config['ipmi_password']
|
2019-04-15 18:24:00 -04:00
|
|
|
})
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Check that the primary key exists, and create it with us as master if not
|
2019-03-11 01:44:26 -04:00
|
|
|
try:
|
|
|
|
current_primary = zkhandler.readdata(zk_conn, '/primary_node')
|
|
|
|
except kazoo.exceptions.NoNodeError:
|
|
|
|
current_primary = 'none'
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
if current_primary and current_primary != 'none':
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('Current primary node is {}{}{}.'.format(fmt_blue, current_primary, fmt_end), state='i')
|
2018-10-14 02:01:35 -04:00
|
|
|
else:
|
2018-10-27 18:04:55 -04:00
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
logger.out('No primary node found; creating with us as primary.', state='i')
|
|
|
|
zkhandler.writedata(zk_conn, { '/primary_node': myhostname })
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
###############################################################################
|
2019-03-17 01:45:17 -04:00
|
|
|
# PHASE 7 - Ensure Libvirt is working
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_hypervisor:
|
|
|
|
# Check that libvirtd is listening TCP
|
2019-06-25 22:09:32 -04:00
|
|
|
libvirt_check_name = "qemu+tcp://{}:16509/system".format(myhostname)
|
2019-03-11 01:44:26 -04:00
|
|
|
logger.out('Connecting to Libvirt daemon at {}'.format(libvirt_check_name), state='i')
|
|
|
|
try:
|
|
|
|
lv_conn = libvirt.open(libvirt_check_name)
|
|
|
|
lv_conn.close()
|
|
|
|
except Exception as e:
|
|
|
|
logger.out('ERROR: Failed to connect to Libvirt daemon: {}'.format(e), state='e')
|
|
|
|
exit(1)
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
###############################################################################
|
|
|
|
# PHASE 7c - Ensure NFT is running on the local host
|
|
|
|
###############################################################################
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_networking:
|
|
|
|
logger.out("Creating NFT firewall configuration", state='i')
|
|
|
|
|
|
|
|
# Create our config dirs
|
|
|
|
common.run_os_command(
|
|
|
|
'/bin/mkdir --parents {}/networks'.format(
|
|
|
|
config['nft_dynamic_directory']
|
|
|
|
)
|
|
|
|
)
|
|
|
|
common.run_os_command(
|
|
|
|
'/bin/mkdir --parents {}/static'.format(
|
|
|
|
config['nft_dynamic_directory']
|
|
|
|
)
|
|
|
|
)
|
|
|
|
common.run_os_command(
|
|
|
|
'/bin/mkdir --parents {}'.format(
|
|
|
|
config['nft_dynamic_directory']
|
|
|
|
)
|
|
|
|
)
|
|
|
|
|
|
|
|
# Set up the basic features of the nftables firewall
|
|
|
|
nftables_base_rules = """# Base rules
|
|
|
|
flush ruleset
|
|
|
|
# Add the filter table and chains
|
|
|
|
add table inet filter
|
|
|
|
add chain inet filter forward {{ type filter hook forward priority 0; }}
|
|
|
|
add chain inet filter input {{ type filter hook input priority 0; }}
|
|
|
|
# Include static rules and network rules
|
|
|
|
include "{rulesdir}/static/*"
|
|
|
|
include "{rulesdir}/networks/*"
|
|
|
|
""".format(
|
|
|
|
rulesdir=config['nft_dynamic_directory']
|
|
|
|
)
|
|
|
|
|
|
|
|
# Write the basic firewall config
|
|
|
|
nftables_base_filename = '{}/base.nft'.format(config['nft_dynamic_directory'])
|
|
|
|
with open(nftables_base_filename, 'w') as nfbasefile:
|
|
|
|
nfbasefile.write(nftables_base_rules)
|
|
|
|
common.reload_firewall_rules(logger, nftables_base_filename)
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2018-10-14 18:37:34 -04:00
|
|
|
###############################################################################
|
|
|
|
# PHASE 7d - Ensure DNSMASQ is not running
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
common.run_os_command('systemctl stop dnsmasq.service')
|
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
# PHASE 8 - Set up our objects
|
|
|
|
###############################################################################
|
|
|
|
|
|
|
|
logger.out('Setting up objects', state='i')
|
|
|
|
|
|
|
|
d_node = dict()
|
|
|
|
d_network = dict()
|
|
|
|
d_domain = dict()
|
2018-10-29 17:51:08 -04:00
|
|
|
d_osd = dict()
|
2018-10-31 23:38:17 -04:00
|
|
|
d_pool = dict()
|
2019-06-19 10:25:22 -04:00
|
|
|
d_volume = dict() # Dict of Dicts
|
2018-10-14 02:01:35 -04:00
|
|
|
node_list = []
|
|
|
|
network_list = []
|
|
|
|
domain_list = []
|
2018-10-29 17:51:08 -04:00
|
|
|
osd_list = []
|
2018-10-31 23:38:17 -04:00
|
|
|
pool_list = []
|
2019-06-19 10:25:22 -04:00
|
|
|
volume_list = dict() # Dict of Lists
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_networking:
|
2019-12-14 15:55:30 -05:00
|
|
|
# Create an instance of the DNS Aggregator and Metadata API if we're a coordinator
|
2019-03-11 01:44:26 -04:00
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
dns_aggregator = DNSAggregatorInstance.DNSAggregatorInstance(zk_conn, config, logger)
|
2019-12-14 15:55:30 -05:00
|
|
|
metadata_api = MetadataAPIInstance.MetadataAPIInstance(zk_conn, config, logger)
|
2019-03-11 01:44:26 -04:00
|
|
|
else:
|
|
|
|
dns_aggregator = None
|
2019-12-14 15:55:30 -05:00
|
|
|
metadata_api = None
|
2018-10-15 21:09:40 -04:00
|
|
|
else:
|
|
|
|
dns_aggregator = None
|
2019-12-14 15:55:30 -05:00
|
|
|
metadata_api = None
|
2018-10-15 21:09:40 -04:00
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
# Node objects
|
|
|
|
@zk_conn.ChildrenWatch('/nodes')
|
|
|
|
def update_nodes(new_node_list):
|
|
|
|
global node_list, d_node
|
|
|
|
|
|
|
|
# Add any missing nodes to the list
|
|
|
|
for node in new_node_list:
|
|
|
|
if not node in node_list:
|
2019-12-14 15:55:30 -05:00
|
|
|
d_node[node] = NodeInstance.NodeInstance(node, myhostname, zk_conn, config, logger, d_node, d_network, d_domain, dns_aggregator, metadata_api)
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Remove any deleted nodes from the list
|
|
|
|
for node in node_list:
|
|
|
|
if not node in new_node_list:
|
|
|
|
# Delete the object
|
|
|
|
del(d_node[node])
|
|
|
|
|
|
|
|
# Update and print new list
|
|
|
|
node_list = new_node_list
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('{}Node list:{} {}'.format(fmt_blue, fmt_end, ' '.join(node_list)), state='i')
|
2018-10-14 02:01:35 -04:00
|
|
|
|
|
|
|
# Update node objects' list
|
|
|
|
for node in d_node:
|
|
|
|
d_node[node].update_node_list(d_node)
|
|
|
|
|
|
|
|
# Alias for our local node (passed to network and domain objects)
|
|
|
|
this_node = d_node[myhostname]
|
|
|
|
|
2020-01-09 10:53:27 -05:00
|
|
|
# Maintenance mode
|
|
|
|
@zk_conn.DataWatch('/maintenance')
|
|
|
|
def set_maintenance(_maintenance, stat, event=''):
|
|
|
|
global maintenance
|
|
|
|
try:
|
|
|
|
maintenance = bool(strtobool(_maintenance.decode('ascii')))
|
|
|
|
except:
|
|
|
|
maintenance = False
|
|
|
|
|
2018-10-21 22:08:23 -04:00
|
|
|
# Primary node
|
|
|
|
@zk_conn.DataWatch('/primary_node')
|
2018-10-29 17:51:08 -04:00
|
|
|
def update_primary(new_primary, stat, event=''):
|
2018-10-21 22:08:23 -04:00
|
|
|
try:
|
|
|
|
new_primary = new_primary.decode('ascii')
|
|
|
|
except AttributeError:
|
|
|
|
new_primary = 'none'
|
Improve handling of primary contention
Previously, contention could occasionally cause a flap/dual primary
contention state due to the lack of checking within this function. This
could cause a state where a node transitions to primary than is almost
immediately shifted away, which could cause undefined behaviour in the
cluster.
The solution includes several elements:
* Implement an exclusive lock operation in zkhandler
* Switch the become_primary function to use this exclusive lock
* Implement exclusive locking during the contention process
* As a failsafe, check stat versions before setting the node as the
primary node, in case another node already has
* Delay the start of takeover/relinquish operations by slightly
longer than the lock timeout
* Make the current router_state conditions more explicit (positive
conditionals rather than negative conditionals)
The new scenario ensures that during contention, only one secondary will
ever succeed at acquiring the lock. Ideally, the other would then grab
the lock and pass, but in testing this does not seem to be the case -
the lock always times out, so the failsafe check is technically not
needed but has been left as an added safety mechanism. With this setup,
the node that fails the contention will never block the switchover nor
will it try to force itself onto the cluster after another node has
successfully won contention.
Timeouts may need to be adjusted in the future, but the base timeout of
0.4 seconds (and transition delay of 0.5 seconds) seems to work reliably
during preliminary tests.
2020-04-12 03:40:17 -04:00
|
|
|
key_version = stat.version
|
2018-10-21 22:08:23 -04:00
|
|
|
|
|
|
|
if new_primary != this_node.primary_node:
|
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
# We're a coordinator and there is no primary
|
|
|
|
if new_primary == 'none':
|
2020-04-22 09:45:23 -04:00
|
|
|
if this_node.daemon_state == 'run' and this_node.router_state not in ['primary', 'takeover', 'relinquish']:
|
2019-07-09 14:03:48 -04:00
|
|
|
logger.out('Contending for primary coordinator state', state='i')
|
Improve handling of primary contention
Previously, contention could occasionally cause a flap/dual primary
contention state due to the lack of checking within this function. This
could cause a state where a node transitions to primary than is almost
immediately shifted away, which could cause undefined behaviour in the
cluster.
The solution includes several elements:
* Implement an exclusive lock operation in zkhandler
* Switch the become_primary function to use this exclusive lock
* Implement exclusive locking during the contention process
* As a failsafe, check stat versions before setting the node as the
primary node, in case another node already has
* Delay the start of takeover/relinquish operations by slightly
longer than the lock timeout
* Make the current router_state conditions more explicit (positive
conditionals rather than negative conditionals)
The new scenario ensures that during contention, only one secondary will
ever succeed at acquiring the lock. Ideally, the other would then grab
the lock and pass, but in testing this does not seem to be the case -
the lock always times out, so the failsafe check is technically not
needed but has been left as an added safety mechanism. With this setup,
the node that fails the contention will never block the switchover nor
will it try to force itself onto the cluster after another node has
successfully won contention.
Timeouts may need to be adjusted in the future, but the base timeout of
0.4 seconds (and transition delay of 0.5 seconds) seems to work reliably
during preliminary tests.
2020-04-12 03:40:17 -04:00
|
|
|
# Acquire an exclusive lock on the primary_node key
|
|
|
|
primary_lock = zkhandler.exclusivelock(zk_conn, '/primary_node')
|
|
|
|
try:
|
|
|
|
# This lock times out after 0.4s, which is 0.1s less than the pre-takeover
|
|
|
|
# timeout below, thus ensuring that a primary takeover will not deadlock
|
|
|
|
# against a node that failed the contention
|
|
|
|
primary_lock.acquire(timeout=0.4)
|
|
|
|
# Ensure when we get the lock that the versions are still consistent and that
|
|
|
|
# another node hasn't already acquired primary state
|
|
|
|
if key_version == zk_conn.get('/primary_node')[1].version:
|
|
|
|
zkhandler.writedata(zk_conn, {'/primary_node': myhostname})
|
|
|
|
# Cleanly release the lock
|
|
|
|
primary_lock.release()
|
|
|
|
# We timed out acquiring a lock, which means we failed contention, so just pass
|
|
|
|
except kazoo.exceptions.LockTimeout:
|
|
|
|
pass
|
2018-10-21 22:08:23 -04:00
|
|
|
elif new_primary == myhostname:
|
2020-04-22 09:45:23 -04:00
|
|
|
if this_node.router_state == 'secondary':
|
|
|
|
time.sleep(0.5)
|
|
|
|
zkhandler.writedata(zk_conn, {'/nodes/{}/routerstate'.format(myhostname): 'takeover'})
|
2018-10-21 22:08:23 -04:00
|
|
|
else:
|
Improve handling of primary contention
Previously, contention could occasionally cause a flap/dual primary
contention state due to the lack of checking within this function. This
could cause a state where a node transitions to primary than is almost
immediately shifted away, which could cause undefined behaviour in the
cluster.
The solution includes several elements:
* Implement an exclusive lock operation in zkhandler
* Switch the become_primary function to use this exclusive lock
* Implement exclusive locking during the contention process
* As a failsafe, check stat versions before setting the node as the
primary node, in case another node already has
* Delay the start of takeover/relinquish operations by slightly
longer than the lock timeout
* Make the current router_state conditions more explicit (positive
conditionals rather than negative conditionals)
The new scenario ensures that during contention, only one secondary will
ever succeed at acquiring the lock. Ideally, the other would then grab
the lock and pass, but in testing this does not seem to be the case -
the lock always times out, so the failsafe check is technically not
needed but has been left as an added safety mechanism. With this setup,
the node that fails the contention will never block the switchover nor
will it try to force itself onto the cluster after another node has
successfully won contention.
Timeouts may need to be adjusted in the future, but the base timeout of
0.4 seconds (and transition delay of 0.5 seconds) seems to work reliably
during preliminary tests.
2020-04-12 03:40:17 -04:00
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
time.sleep(0.5)
|
2020-02-19 13:18:38 -05:00
|
|
|
zkhandler.writedata(zk_conn, {'/nodes/{}/routerstate'.format(myhostname): 'relinquish'})
|
2018-10-27 16:31:54 -04:00
|
|
|
else:
|
|
|
|
zkhandler.writedata(zk_conn, {'/nodes/{}/routerstate'.format(myhostname): 'client'})
|
|
|
|
|
2018-10-21 22:08:23 -04:00
|
|
|
for node in d_node:
|
|
|
|
d_node[node].primary_node = new_primary
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_networking:
|
|
|
|
# Network objects
|
|
|
|
@zk_conn.ChildrenWatch('/networks')
|
|
|
|
def update_networks(new_network_list):
|
|
|
|
global network_list, d_network
|
|
|
|
|
|
|
|
# Add any missing networks to the list
|
|
|
|
for network in new_network_list:
|
|
|
|
if not network in network_list:
|
2019-12-13 00:00:37 -05:00
|
|
|
d_network[network] = VXNetworkInstance.VXNetworkInstance(network, zk_conn, config, logger, this_node, dns_aggregator)
|
2019-03-15 11:28:49 -04:00
|
|
|
if config['daemon_mode'] == 'coordinator' and d_network[network].nettype == 'managed':
|
2019-08-07 11:46:58 -04:00
|
|
|
try:
|
|
|
|
dns_aggregator.add_network(d_network[network])
|
|
|
|
except Exception as e:
|
|
|
|
logger.out('Failed to create DNS Aggregator for network {}'.format(network), 'w')
|
2019-03-11 01:44:26 -04:00
|
|
|
# Start primary functionality
|
2019-03-15 11:28:49 -04:00
|
|
|
if this_node.router_state == 'primary' and d_network[network].nettype == 'managed':
|
2019-03-11 01:44:26 -04:00
|
|
|
d_network[network].createGateways()
|
|
|
|
d_network[network].startDHCPServer()
|
|
|
|
|
|
|
|
# Remove any deleted networks from the list
|
|
|
|
for network in network_list:
|
|
|
|
if not network in new_network_list:
|
2019-03-15 11:28:49 -04:00
|
|
|
if d_network[network].nettype == 'managed':
|
|
|
|
# Stop primary functionality
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
d_network[network].stopDHCPServer()
|
|
|
|
d_network[network].removeGateways()
|
|
|
|
dns_aggregator.remove_network(d_network[network])
|
|
|
|
# Stop general functionality
|
|
|
|
d_network[network].removeFirewall()
|
2019-03-11 01:44:26 -04:00
|
|
|
d_network[network].removeNetwork()
|
|
|
|
# Delete the object
|
|
|
|
del(d_network[network])
|
|
|
|
|
|
|
|
# Update and print new list
|
|
|
|
network_list = new_network_list
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('{}Network list:{} {}'.format(fmt_blue, fmt_end, ' '.join(network_list)), state='i')
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Update node objects' list
|
|
|
|
for node in d_node:
|
|
|
|
d_node[node].update_network_list(d_network)
|
|
|
|
|
|
|
|
if enable_hypervisor:
|
2019-08-07 13:49:33 -04:00
|
|
|
# VM command pipeline key
|
|
|
|
@zk_conn.DataWatch('/cmd/domains')
|
|
|
|
def cmd(data, stat, event=''):
|
|
|
|
if data:
|
|
|
|
VMInstance.run_command(zk_conn, logger, this_node, data.decode('ascii'))
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# VM domain objects
|
|
|
|
@zk_conn.ChildrenWatch('/domains')
|
|
|
|
def update_domains(new_domain_list):
|
|
|
|
global domain_list, d_domain
|
|
|
|
|
|
|
|
# Add any missing domains to the list
|
|
|
|
for domain in new_domain_list:
|
|
|
|
if not domain in domain_list:
|
2019-07-07 15:20:37 -04:00
|
|
|
d_domain[domain] = VMInstance.VMInstance(domain, zk_conn, config, logger, this_node)
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Remove any deleted domains from the list
|
|
|
|
for domain in domain_list:
|
|
|
|
if not domain in new_domain_list:
|
|
|
|
# Delete the object
|
|
|
|
del(d_domain[domain])
|
|
|
|
|
|
|
|
# Update and print new list
|
|
|
|
domain_list = new_domain_list
|
2019-07-10 22:24:03 -04:00
|
|
|
logger.out('{}VM list:{} {}'.format(fmt_blue, fmt_end, ' '.join(domain_list)), state='i')
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Update node objects' list
|
|
|
|
for node in d_node:
|
|
|
|
d_node[node].update_domain_list(d_domain)
|
|
|
|
|
|
|
|
if enable_storage:
|
2019-08-07 13:49:33 -04:00
|
|
|
# Ceph command pipeline key
|
2019-08-07 14:47:27 -04:00
|
|
|
@zk_conn.DataWatch('/cmd/ceph')
|
2019-03-11 01:44:26 -04:00
|
|
|
def cmd(data, stat, event=''):
|
|
|
|
if data:
|
2019-06-18 13:45:59 -04:00
|
|
|
CephInstance.run_command(zk_conn, logger, this_node, data.decode('ascii'), d_osd)
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# OSD objects
|
|
|
|
@zk_conn.ChildrenWatch('/ceph/osds')
|
|
|
|
def update_osds(new_osd_list):
|
|
|
|
global osd_list, d_osd
|
|
|
|
|
|
|
|
# Add any missing OSDs to the list
|
|
|
|
for osd in new_osd_list:
|
|
|
|
if not osd in osd_list:
|
|
|
|
d_osd[osd] = CephInstance.CephOSDInstance(zk_conn, this_node, osd)
|
|
|
|
|
|
|
|
# Remove any deleted OSDs from the list
|
|
|
|
for osd in osd_list:
|
|
|
|
if not osd in new_osd_list:
|
|
|
|
# Delete the object
|
|
|
|
del(d_osd[osd])
|
|
|
|
|
|
|
|
# Update and print new list
|
|
|
|
osd_list = new_osd_list
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('{}OSD list:{} {}'.format(fmt_blue, fmt_end, ' '.join(osd_list)), state='i')
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Pool objects
|
|
|
|
@zk_conn.ChildrenWatch('/ceph/pools')
|
|
|
|
def update_pools(new_pool_list):
|
|
|
|
global pool_list, d_pool
|
|
|
|
|
|
|
|
# Add any missing Pools to the list
|
|
|
|
for pool in new_pool_list:
|
|
|
|
if not pool in pool_list:
|
|
|
|
d_pool[pool] = CephInstance.CephPoolInstance(zk_conn, this_node, pool)
|
2019-06-19 10:25:22 -04:00
|
|
|
d_volume[pool] = dict()
|
|
|
|
volume_list[pool] = []
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Remove any deleted Pools from the list
|
|
|
|
for pool in pool_list:
|
|
|
|
if not pool in new_pool_list:
|
|
|
|
# Delete the object
|
|
|
|
del(d_pool[pool])
|
2018-10-31 23:38:17 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Update and print new list
|
|
|
|
pool_list = new_pool_list
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('{}Pool list:{} {}'.format(fmt_blue, fmt_end, ' '.join(pool_list)), state='i')
|
2018-10-31 23:38:17 -04:00
|
|
|
|
2019-06-19 10:25:22 -04:00
|
|
|
# Volume objects in each pool
|
|
|
|
for pool in pool_list:
|
|
|
|
@zk_conn.ChildrenWatch('/ceph/volumes/{}'.format(pool))
|
|
|
|
def update_volumes(new_volume_list):
|
|
|
|
global volume_list, d_volume
|
2019-06-25 22:31:04 -04:00
|
|
|
|
2019-06-19 10:25:22 -04:00
|
|
|
# Add any missing Volumes to the list
|
|
|
|
for volume in new_volume_list:
|
|
|
|
if not volume in volume_list[pool]:
|
|
|
|
d_volume[pool][volume] = CephInstance.CephVolumeInstance(zk_conn, this_node, pool, volume)
|
2019-06-25 22:31:04 -04:00
|
|
|
|
2019-06-19 10:25:22 -04:00
|
|
|
# Remove any deleted Volumes from the list
|
|
|
|
for volume in volume_list[pool]:
|
|
|
|
if not volume in new_volume_list:
|
|
|
|
# Delete the object
|
|
|
|
del(d_volume[pool][volume])
|
|
|
|
|
|
|
|
# Update and print new list
|
|
|
|
volume_list[pool] = new_volume_list
|
2019-07-10 21:39:25 -04:00
|
|
|
logger.out('{}Volume list [{pool}]:{} {plist}'.format(fmt_blue, fmt_end, pool=pool, plist=' '.join(volume_list[pool])), state='i')
|
2019-06-19 09:40:20 -04:00
|
|
|
|
2018-10-14 02:01:35 -04:00
|
|
|
###############################################################################
|
|
|
|
# PHASE 9 - Run the daemon
|
|
|
|
###############################################################################
|
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Zookeeper keepalive update function
|
|
|
|
def update_zookeeper():
|
2019-10-21 16:46:32 -04:00
|
|
|
# Set the upstream IP in Zookeeper for clients to read
|
|
|
|
if config['enable_networking']:
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
try:
|
|
|
|
if zkhandler.readdata(zk_conn, '/upstream_ip') != config['upstream_floating_ip']:
|
|
|
|
raise
|
|
|
|
except:
|
|
|
|
zkhandler.writedata(zk_conn, {'/upstream_ip': config['upstream_floating_ip']})
|
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Get past state and update if needed
|
2018-11-27 22:15:19 -05:00
|
|
|
if debug:
|
|
|
|
print("Get past state and update if needed")
|
2018-10-22 20:20:27 -04:00
|
|
|
past_state = zkhandler.readdata(zk_conn, '/nodes/{}/daemonstate'.format(this_node.name))
|
|
|
|
if past_state != 'run':
|
|
|
|
this_node.daemon_state = 'run'
|
|
|
|
zkhandler.writedata(zk_conn, { '/nodes/{}/daemonstate'.format(this_node.name): 'run' })
|
|
|
|
else:
|
|
|
|
this_node.daemon_state = 'run'
|
|
|
|
|
|
|
|
# Ensure the primary key is properly set
|
2018-11-27 22:15:19 -05:00
|
|
|
if debug:
|
|
|
|
print("Ensure the primary key is properly set")
|
2018-10-22 20:20:27 -04:00
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
if zkhandler.readdata(zk_conn, '/primary_node') != this_node.name:
|
|
|
|
zkhandler.writedata(zk_conn, {'/primary_node': this_node.name})
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_storage:
|
|
|
|
# Get Ceph cluster health (for local printing)
|
2018-11-27 22:15:19 -05:00
|
|
|
if debug:
|
2019-03-11 01:44:26 -04:00
|
|
|
print("Get Ceph cluster health (for local printing)")
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph health', timeout=1)
|
2019-03-11 01:44:26 -04:00
|
|
|
ceph_health = stdout.rstrip()
|
|
|
|
if 'HEALTH_OK' in ceph_health:
|
2019-07-10 21:39:25 -04:00
|
|
|
ceph_health_colour = fmt_green
|
2019-03-11 01:44:26 -04:00
|
|
|
elif 'HEALTH_WARN' in ceph_health:
|
2019-07-10 21:39:25 -04:00
|
|
|
ceph_health_colour = fmt_yellow
|
2019-03-11 01:44:26 -04:00
|
|
|
else:
|
2019-07-10 21:39:25 -04:00
|
|
|
ceph_health_colour = fmt_red
|
2019-03-11 01:44:26 -04:00
|
|
|
|
|
|
|
# Set ceph health information in zookeeper (primary only)
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
if debug:
|
|
|
|
print("Set ceph health information in zookeeper (primary only)")
|
|
|
|
# Get status info
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph status', timeout=1)
|
2019-03-11 01:44:26 -04:00
|
|
|
ceph_status = stdout
|
|
|
|
try:
|
|
|
|
zkhandler.writedata(zk_conn, {
|
|
|
|
'/ceph': str(ceph_status)
|
|
|
|
})
|
|
|
|
except:
|
|
|
|
logger.out('Failed to set Ceph status data', state='e')
|
|
|
|
return
|
|
|
|
|
2019-07-08 10:19:41 -04:00
|
|
|
# Set ceph rados df information in zookeeper (primary only)
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
if debug:
|
|
|
|
print("Set ceph rados df information in zookeeper (primary only)")
|
|
|
|
# Get rados df info
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('rados df', timeout=1)
|
2019-07-08 10:19:41 -04:00
|
|
|
rados_df = stdout
|
|
|
|
try:
|
|
|
|
zkhandler.writedata(zk_conn, {
|
|
|
|
'/ceph/radosdf': str(rados_df)
|
|
|
|
})
|
|
|
|
except:
|
|
|
|
logger.out('Failed to set Rados space data', state='e')
|
|
|
|
return
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Set pool information in zookeeper (primary only)
|
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
if debug:
|
|
|
|
print("Set pool information in zookeeper (primary only)")
|
2019-12-06 00:06:21 -05:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Get pool info
|
2019-12-06 00:06:21 -05:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph df --format json', timeout=1)
|
|
|
|
try:
|
|
|
|
ceph_pool_df_raw = json.loads(stdout)['pools']
|
|
|
|
except json.decoder.JSONDecodeError:
|
|
|
|
logger.out('Failed to obtain Pool data (ceph df)', state='w')
|
|
|
|
ceph_pool_df_raw = []
|
|
|
|
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('rados df --format json', timeout=1)
|
2019-07-09 16:20:56 -04:00
|
|
|
try:
|
2019-12-06 00:06:21 -05:00
|
|
|
rados_pool_df_raw = json.loads(stdout)['pools']
|
2019-07-09 16:20:56 -04:00
|
|
|
except json.decoder.JSONDecodeError:
|
2019-12-06 00:06:21 -05:00
|
|
|
logger.out('Failed to obtain Pool data (rados df)', state='w')
|
|
|
|
rados_pool_df_raw = []
|
2019-07-09 16:20:56 -04:00
|
|
|
|
2019-12-06 00:06:21 -05:00
|
|
|
pool_count = len(ceph_pool_df_raw)
|
2020-01-06 11:31:22 -05:00
|
|
|
if debug:
|
|
|
|
print("Getting info for {} pools".format(pool_count))
|
|
|
|
for pool_idx in range(0, pool_count):
|
2019-12-06 00:06:21 -05:00
|
|
|
try:
|
|
|
|
# Combine all the data for this pool
|
|
|
|
ceph_pool_df = ceph_pool_df_raw[pool_idx]
|
|
|
|
rados_pool_df = rados_pool_df_raw[pool_idx]
|
|
|
|
pool = ceph_pool_df
|
|
|
|
pool.update(rados_pool_df)
|
|
|
|
|
|
|
|
# Ignore any pools that aren't in our pool list
|
|
|
|
if pool['name'] not in pool_list:
|
2020-01-06 11:31:22 -05:00
|
|
|
if debug:
|
|
|
|
print("Pool {} not in pool list {}".format(pool['name'], pool_list))
|
2019-12-06 00:06:21 -05:00
|
|
|
continue
|
2020-01-06 11:31:22 -05:00
|
|
|
else:
|
|
|
|
if debug:
|
|
|
|
print("Parsing data for pool {}".format(pool['name']))
|
2019-12-06 00:06:21 -05:00
|
|
|
|
|
|
|
# Assemble a useful data structure
|
|
|
|
pool_df = {
|
2019-03-11 01:44:26 -04:00
|
|
|
'id': pool['id'],
|
2019-12-06 00:06:21 -05:00
|
|
|
'free_bytes': pool['stats']['max_avail'],
|
|
|
|
'used_bytes': pool['stats']['bytes_used'],
|
|
|
|
'used_percent': pool['stats']['percent_used'],
|
|
|
|
'num_objects': pool['stats']['objects'],
|
2019-03-11 01:44:26 -04:00
|
|
|
'num_object_clones': pool['num_object_clones'],
|
|
|
|
'num_object_copies': pool['num_object_copies'],
|
|
|
|
'num_objects_missing_on_primary': pool['num_objects_missing_on_primary'],
|
|
|
|
'num_objects_unfound': pool['num_objects_unfound'],
|
|
|
|
'num_objects_degraded': pool['num_objects_degraded'],
|
|
|
|
'read_ops': pool['read_ops'],
|
|
|
|
'read_bytes': pool['read_bytes'],
|
|
|
|
'write_ops': pool['write_ops'],
|
|
|
|
'write_bytes': pool['write_bytes']
|
|
|
|
}
|
2019-12-06 00:06:21 -05:00
|
|
|
|
|
|
|
# Write the pool data to Zookeeper
|
2019-07-09 16:20:56 -04:00
|
|
|
zkhandler.writedata(zk_conn, {
|
2019-12-06 00:06:21 -05:00
|
|
|
'/ceph/pools/{}/stats'.format(pool['name']): str(json.dumps(pool_df))
|
2019-07-09 16:20:56 -04:00
|
|
|
})
|
2019-12-06 00:06:21 -05:00
|
|
|
except Exception as e:
|
2019-07-09 16:20:56 -04:00
|
|
|
# One or more of the status commands timed out, just continue
|
2019-12-06 00:06:21 -05:00
|
|
|
logger.out('Failed to format and send pool data', state='w')
|
2019-07-09 16:20:56 -04:00
|
|
|
pass
|
2019-03-11 01:44:26 -04:00
|
|
|
|
2019-06-18 12:36:53 -04:00
|
|
|
# Only grab OSD stats if there are OSDs to grab (otherwise `ceph osd df` hangs)
|
|
|
|
osds_this_node = 0
|
|
|
|
if len(osd_list) > 0:
|
|
|
|
# Get data from Ceph OSDs
|
|
|
|
if debug:
|
|
|
|
print("Get data from Ceph OSDs")
|
|
|
|
# Parse the dump data
|
|
|
|
osd_dump = dict()
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph osd dump --format json', timeout=1)
|
2019-07-09 16:20:56 -04:00
|
|
|
try:
|
|
|
|
osd_dump_raw = json.loads(stdout)['osds']
|
|
|
|
except json.decoder.JSONDecodeError:
|
|
|
|
logger.out('Failed to obtain OSD data', state='w')
|
|
|
|
osd_dump_raw = []
|
|
|
|
|
2019-06-18 12:36:53 -04:00
|
|
|
if debug:
|
|
|
|
print("Loop through OSD dump")
|
|
|
|
for osd in osd_dump_raw:
|
|
|
|
osd_dump.update({
|
|
|
|
str(osd['osd']): {
|
|
|
|
'uuid': osd['uuid'],
|
|
|
|
'up': osd['up'],
|
|
|
|
'in': osd['in'],
|
|
|
|
'primary_affinity': osd['primary_affinity']
|
2019-03-11 01:44:26 -04:00
|
|
|
}
|
|
|
|
})
|
2018-10-29 17:51:08 -04:00
|
|
|
|
2019-06-18 12:36:53 -04:00
|
|
|
# Parse the df data
|
|
|
|
if debug:
|
|
|
|
print("Parse the OSD df data")
|
|
|
|
osd_df = dict()
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph osd df --format json', timeout=1)
|
2019-06-18 12:36:53 -04:00
|
|
|
try:
|
|
|
|
osd_df_raw = json.loads(stdout)['nodes']
|
2020-05-09 13:56:13 -04:00
|
|
|
except Exception as e:
|
|
|
|
logger.out('Failed to parse OSD list: {}'.format(e), state='w')
|
2019-07-09 16:20:56 -04:00
|
|
|
osd_df_raw = []
|
2019-06-18 12:36:53 -04:00
|
|
|
|
|
|
|
if debug:
|
|
|
|
print("Loop through OSD df")
|
|
|
|
for osd in osd_df_raw:
|
|
|
|
osd_df.update({
|
|
|
|
str(osd['id']): {
|
|
|
|
'utilization': osd['utilization'],
|
|
|
|
'var': osd['var'],
|
|
|
|
'pgs': osd['pgs'],
|
|
|
|
'kb': osd['kb'],
|
|
|
|
'weight': osd['crush_weight'],
|
|
|
|
'reweight': osd['reweight'],
|
|
|
|
}
|
2019-03-11 01:44:26 -04:00
|
|
|
})
|
2019-06-18 12:36:53 -04:00
|
|
|
# Parse the status data
|
|
|
|
if debug:
|
|
|
|
print("Parse the OSD status data")
|
|
|
|
osd_status = dict()
|
2019-07-09 15:03:14 -04:00
|
|
|
retcode, stdout, stderr = common.run_os_command('ceph osd status', timeout=1)
|
2019-06-18 12:36:53 -04:00
|
|
|
if debug:
|
|
|
|
print("Loop through OSD status data")
|
2020-01-06 12:34:35 -05:00
|
|
|
for line in stdout.split('\n'):
|
2019-06-18 12:36:53 -04:00
|
|
|
# Strip off colour
|
|
|
|
line = re.sub(r'\x1b(\[.*?[@-~]|\].*?(\x07|\x1b\\))', '', line)
|
|
|
|
# Split it for parsing
|
|
|
|
line = line.split()
|
|
|
|
if len(line) > 1 and line[1].isdigit():
|
|
|
|
# This is an OSD line so parse it
|
|
|
|
osd_id = line[1]
|
|
|
|
node = line[3].split('.')[0]
|
|
|
|
used = line[5]
|
|
|
|
avail = line[7]
|
|
|
|
wr_ops = line[9]
|
|
|
|
wr_data = line[11]
|
|
|
|
rd_ops = line[13]
|
|
|
|
rd_data = line[15]
|
|
|
|
state = line[17]
|
|
|
|
osd_status.update({
|
|
|
|
str(osd_id): {
|
|
|
|
'node': node,
|
|
|
|
'used': used,
|
|
|
|
'avail': avail,
|
|
|
|
'wr_ops': wr_ops,
|
|
|
|
'wr_data': wr_data,
|
|
|
|
'rd_ops': rd_ops,
|
|
|
|
'rd_data': rd_data,
|
|
|
|
'state': state
|
|
|
|
}
|
|
|
|
})
|
|
|
|
# Merge them together into a single meaningful dict
|
|
|
|
if debug:
|
|
|
|
print("Merge OSD data together")
|
|
|
|
osd_stats = dict()
|
|
|
|
for osd in osd_list:
|
2019-07-09 16:20:56 -04:00
|
|
|
try:
|
|
|
|
this_dump = osd_dump[osd]
|
|
|
|
this_dump.update(osd_df[osd])
|
|
|
|
this_dump.update(osd_status[osd])
|
|
|
|
osd_stats[osd] = this_dump
|
2020-01-06 12:34:35 -05:00
|
|
|
except KeyError as e:
|
2019-07-09 16:20:56 -04:00
|
|
|
# One or more of the status commands timed out, just continue
|
2020-01-06 12:34:35 -05:00
|
|
|
logger.out('Failed to parse OSD stats into dictionary: {}'.format(e), state='w')
|
2019-06-18 12:36:53 -04:00
|
|
|
|
|
|
|
# Trigger updates for each OSD on this node
|
|
|
|
if debug:
|
|
|
|
print("Trigger updates for each OSD on this node")
|
|
|
|
for osd in osd_list:
|
|
|
|
if d_osd[osd].node == myhostname:
|
2019-07-09 16:20:56 -04:00
|
|
|
try:
|
|
|
|
stats = json.dumps(osd_stats[osd])
|
|
|
|
zkhandler.writedata(zk_conn, {
|
|
|
|
'/ceph/osds/{}/stats'.format(osd): str(stats)
|
|
|
|
})
|
2020-01-06 12:34:35 -05:00
|
|
|
except KeyError as e:
|
2019-07-09 16:20:56 -04:00
|
|
|
# One or more of the status commands timed out, just continue
|
2020-01-06 12:34:35 -05:00
|
|
|
logger.out('Failed to upload OSD stats from dictionary: {}'.format(e), state='w')
|
2019-06-18 12:36:53 -04:00
|
|
|
osds_this_node += 1
|
2018-10-29 17:51:08 -04:00
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
memalloc = 0
|
|
|
|
vcpualloc = 0
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_hypervisor:
|
|
|
|
# Toggle state management of dead VMs to restart them
|
|
|
|
if debug:
|
|
|
|
print("Toggle state management of dead VMs to restart them")
|
|
|
|
for domain, instance in this_node.d_domain.items():
|
|
|
|
if domain in this_node.domain_list:
|
|
|
|
# Add the allocated memory to our memalloc value
|
|
|
|
memalloc += instance.getmemory()
|
|
|
|
vcpualloc += instance.getvcpus()
|
|
|
|
if instance.getstate() == 'start' and instance.getnode() == this_node.name:
|
|
|
|
if instance.getdom() != None:
|
|
|
|
try:
|
|
|
|
if instance.getdom().state()[0] != libvirt.VIR_DOMAIN_RUNNING:
|
|
|
|
raise
|
|
|
|
except Exception as e:
|
|
|
|
# Toggle a state "change"
|
|
|
|
zkhandler.writedata(zk_conn, { '/domains/{}/state'.format(domain): instance.getstate() })
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Connect to libvirt
|
|
|
|
if debug:
|
|
|
|
print("Connect to libvirt")
|
|
|
|
libvirt_name = "qemu:///system"
|
|
|
|
lv_conn = libvirt.open(libvirt_name)
|
|
|
|
if lv_conn == None:
|
|
|
|
logger.out('Failed to open connection to "{}"'.format(libvirt_name), state='e')
|
|
|
|
return
|
2019-06-18 12:36:53 -04:00
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
# Ensure that any running VMs are readded to the domain_list
|
|
|
|
if debug:
|
|
|
|
print("Ensure that any running VMs are readded to the domain_list")
|
|
|
|
running_domains = lv_conn.listAllDomains(libvirt.VIR_CONNECT_LIST_DOMAINS_ACTIVE)
|
|
|
|
for domain in running_domains:
|
|
|
|
domain_uuid = domain.UUIDString()
|
|
|
|
if domain_uuid not in this_node.domain_list:
|
|
|
|
this_node.domain_list.append(domain_uuid)
|
2018-10-22 20:20:27 -04:00
|
|
|
|
|
|
|
# Set our information in zookeeper
|
2018-11-27 22:15:19 -05:00
|
|
|
if debug:
|
|
|
|
print("Set our information in zookeeper")
|
2018-10-22 20:20:27 -04:00
|
|
|
#this_node.name = lv_conn.getHostname()
|
2019-04-15 18:25:50 -04:00
|
|
|
this_node.memtotal = int(psutil.virtual_memory().total / 1024 / 1024)
|
2018-10-22 20:20:27 -04:00
|
|
|
this_node.memused = int(psutil.virtual_memory().used / 1024 / 1024)
|
|
|
|
this_node.memfree = int(psutil.virtual_memory().free / 1024 / 1024)
|
|
|
|
this_node.memalloc = memalloc
|
|
|
|
this_node.vcpualloc = vcpualloc
|
|
|
|
this_node.cpuload = os.getloadavg()[0]
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_hypervisor:
|
|
|
|
this_node.domains_count = len(lv_conn.listDomainsID())
|
|
|
|
else:
|
|
|
|
this_node.domains_count = 0
|
2018-10-22 20:20:27 -04:00
|
|
|
keepalive_time = int(time.time())
|
|
|
|
try:
|
|
|
|
zkhandler.writedata(zk_conn, {
|
2019-04-15 18:25:50 -04:00
|
|
|
'/nodes/{}/memtotal'.format(this_node.name): str(this_node.memtotal),
|
2018-10-22 20:20:27 -04:00
|
|
|
'/nodes/{}/memused'.format(this_node.name): str(this_node.memused),
|
|
|
|
'/nodes/{}/memfree'.format(this_node.name): str(this_node.memfree),
|
|
|
|
'/nodes/{}/memalloc'.format(this_node.name): str(this_node.memalloc),
|
|
|
|
'/nodes/{}/vcpualloc'.format(this_node.name): str(this_node.vcpualloc),
|
|
|
|
'/nodes/{}/cpuload'.format(this_node.name): str(this_node.cpuload),
|
|
|
|
'/nodes/{}/domainscount'.format(this_node.name): str(this_node.domains_count),
|
|
|
|
'/nodes/{}/runningdomains'.format(this_node.name): ' '.join(this_node.domain_list),
|
|
|
|
'/nodes/{}/keepalive'.format(this_node.name): str(keepalive_time)
|
|
|
|
})
|
|
|
|
except:
|
|
|
|
logger.out('Failed to set keepalive data', state='e')
|
|
|
|
return
|
|
|
|
|
2019-03-11 01:44:26 -04:00
|
|
|
if enable_hypervisor:
|
|
|
|
# Close the Libvirt connection
|
|
|
|
lv_conn.close()
|
2018-10-22 20:20:27 -04:00
|
|
|
|
2019-07-09 15:03:14 -04:00
|
|
|
# Look for dead nodes and fence them
|
2020-01-09 10:53:27 -05:00
|
|
|
if not maintenance:
|
|
|
|
if debug:
|
|
|
|
print("Look for dead nodes and fence them")
|
|
|
|
if config['daemon_mode'] == 'coordinator':
|
|
|
|
for node_name in d_node:
|
|
|
|
try:
|
|
|
|
node_daemon_state = zkhandler.readdata(zk_conn, '/nodes/{}/daemonstate'.format(node_name))
|
|
|
|
node_domain_state = zkhandler.readdata(zk_conn, '/nodes/{}/domainstate'.format(node_name))
|
|
|
|
node_keepalive = int(zkhandler.readdata(zk_conn, '/nodes/{}/keepalive'.format(node_name)))
|
|
|
|
except:
|
|
|
|
node_daemon_state = 'unknown'
|
|
|
|
node_domain_state = 'unknown'
|
|
|
|
node_keepalive = 0
|
|
|
|
|
|
|
|
# Handle deadtime and fencng if needed
|
|
|
|
# (A node is considered dead when its keepalive timer is >6*keepalive_interval seconds
|
|
|
|
# out-of-date while in 'start' state)
|
|
|
|
node_deadtime = int(time.time()) - ( int(config['keepalive_interval']) * int(config['fence_intervals']) )
|
|
|
|
if node_keepalive < node_deadtime and node_daemon_state == 'run':
|
|
|
|
logger.out('Node {} seems dead - starting monitor for fencing'.format(node_name), state='w')
|
|
|
|
zk_lock = zkhandler.writelock(zk_conn, '/nodes/{}/daemonstate'.format(node_name))
|
|
|
|
with zk_lock:
|
|
|
|
# Ensures that, if we lost the lock race and come out of waiting,
|
|
|
|
# we won't try to trigger our own fence thread.
|
|
|
|
if zkhandler.readdata(zk_conn, '/nodes/{}/daemonstate'.format(node_name)) != 'dead':
|
|
|
|
fence_thread = threading.Thread(target=fencing.fenceNode, args=(node_name, zk_conn, config, logger), kwargs={})
|
|
|
|
fence_thread.start()
|
|
|
|
# Write the updated data after we start the fence thread
|
|
|
|
zkhandler.writedata(zk_conn, { '/nodes/{}/daemonstate'.format(node_name): 'dead' })
|
2019-07-09 15:03:14 -04:00
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Display node information to the terminal
|
2019-06-18 12:44:07 -04:00
|
|
|
if config['log_keepalives']:
|
2019-07-12 09:31:42 -04:00
|
|
|
if this_node.router_state == 'primary':
|
|
|
|
cst_colour = fmt_green
|
|
|
|
elif this_node.router_state == 'secondary':
|
|
|
|
cst_colour = fmt_blue
|
|
|
|
else:
|
|
|
|
cst_colour = fmt_cyan
|
2019-06-18 12:44:07 -04:00
|
|
|
logger.out(
|
2019-07-11 20:11:05 -04:00
|
|
|
'{}{} keepalive{} [{}{}{}]'.format(
|
2019-07-10 21:39:25 -04:00
|
|
|
fmt_purple,
|
2019-06-18 12:44:07 -04:00
|
|
|
myhostname,
|
2019-07-11 20:11:05 -04:00
|
|
|
fmt_end,
|
2019-07-12 09:31:42 -04:00
|
|
|
fmt_bold + cst_colour,
|
2019-07-11 20:11:05 -04:00
|
|
|
this_node.router_state,
|
2019-07-10 21:39:25 -04:00
|
|
|
fmt_end
|
2019-06-18 12:44:07 -04:00
|
|
|
),
|
|
|
|
state='t'
|
|
|
|
)
|
2019-06-18 19:54:42 -04:00
|
|
|
if config['log_keepalive_cluster_details']:
|
|
|
|
logger.out(
|
2020-01-09 10:53:27 -05:00
|
|
|
'{bold}Maintenance:{nofmt} {maint} '
|
2019-07-10 22:24:03 -04:00
|
|
|
'{bold}Active VMs:{nofmt} {domcount} '
|
2019-06-18 19:54:42 -04:00
|
|
|
'{bold}Networks:{nofmt} {netcount} '
|
2019-07-10 22:24:03 -04:00
|
|
|
'{bold}Load:{nofmt} {load} '
|
|
|
|
'{bold}Memory [MiB]: VMs:{nofmt} {allocmem} '
|
|
|
|
'{bold}Used:{nofmt} {usedmem} '
|
|
|
|
'{bold}Free:{nofmt} {freemem}'.format(
|
2019-07-10 21:39:25 -04:00
|
|
|
bold=fmt_bold,
|
|
|
|
nofmt=fmt_end,
|
2020-01-09 10:53:27 -05:00
|
|
|
maint=maintenance,
|
2019-06-18 19:54:42 -04:00
|
|
|
domcount=this_node.domains_count,
|
2019-07-10 22:24:03 -04:00
|
|
|
netcount=len(network_list),
|
|
|
|
load=this_node.cpuload,
|
2019-06-18 19:54:42 -04:00
|
|
|
freemem=this_node.memfree,
|
|
|
|
usedmem=this_node.memused,
|
|
|
|
allocmem=this_node.memalloc,
|
|
|
|
),
|
2019-07-10 22:24:03 -04:00
|
|
|
state='t'
|
2019-06-18 19:54:42 -04:00
|
|
|
)
|
|
|
|
if enable_storage and config['log_keepalive_storage_details']:
|
2019-06-18 12:44:07 -04:00
|
|
|
logger.out(
|
|
|
|
'{bold}Ceph cluster status:{nofmt} {health_colour}{health}{nofmt} '
|
|
|
|
'{bold}Total OSDs:{nofmt} {total_osds} '
|
|
|
|
'{bold}Node OSDs:{nofmt} {node_osds} '
|
|
|
|
'{bold}Pools:{nofmt} {total_pools} '.format(
|
2019-07-10 21:39:25 -04:00
|
|
|
bold=fmt_bold,
|
2019-06-18 12:44:07 -04:00
|
|
|
health_colour=ceph_health_colour,
|
2019-07-10 21:39:25 -04:00
|
|
|
nofmt=fmt_end,
|
2019-06-18 12:44:07 -04:00
|
|
|
health=ceph_health,
|
|
|
|
total_osds=len(osd_list),
|
|
|
|
node_osds=osds_this_node,
|
|
|
|
total_pools=len(pool_list)
|
|
|
|
),
|
2019-07-10 22:24:03 -04:00
|
|
|
state='t'
|
2019-06-18 12:44:07 -04:00
|
|
|
)
|
2018-10-27 18:24:27 -04:00
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
|
2019-03-17 12:52:23 -04:00
|
|
|
# Start keepalive thread
|
2018-11-18 00:55:04 -05:00
|
|
|
update_timer = startKeepaliveTimer()
|
2018-10-14 02:01:35 -04:00
|
|
|
|
2018-10-22 20:20:27 -04:00
|
|
|
# Tick loop; does nothing since everything else is async
|
2018-10-14 02:01:35 -04:00
|
|
|
while True:
|
|
|
|
try:
|
|
|
|
time.sleep(1)
|
|
|
|
except:
|
|
|
|
break
|