Hi,

Just by browsing the code, I can think of one issue in[1], as a result
of[2] where we only considered iscsi and rbd drivers, I suspect your
driver will go into this branch, based on the issue in the 4.3 logs I
went over:
backend/manager/modules/vdsbroker/src/main/java/org/ovirt/engine/core/vdsbroker/builder/vminfo/LibvirtVmXmlBuilder.java

            } else if (managedBlockStorageDisk.getCinderVolumeDriver()
== CinderVolumeDriver.BLOCK) {
                Map<String, Object> attachment =
                        (Map<String, Object>)
managedBlockStorageDisk.getDevice().get(DeviceInfoReturn.ATTACHMENT);
                metadata = Map.of(
                        "GUID",
(String)attachment.get(DeviceInfoReturn.SCSI_WWN),
                        "managed", "true"

Which will make it go into the wrong branch in clientIF.py, appending
the empty GUID to /dev/mapper. Perhaps it is possible workaround it in
clientIF if you just want to try and get the VM started for now, by
checking if GUID is empty and deferring to:
   volPath = drive['path']

But as discussed in this thread, our attempt at constructing the
stable paths ourselves doesn't really scale. After further discussion
with Nir I started working on creating a link in vdsm in
managevolume.py#attach_volume to the path returned by the driver, and
engine will use our link to run the VMs.
This should simplify the code and resolve the live VM migration issue.
I had some preliminary success with this so I'll try to post the
patches soon


[1] 
https://github.com/oVirt/vdsm/blob/d957a06a4d988489c83da171fcd9cfd254b12ca4/lib/vdsm/clientIF.py#L462
[2] 
https://github.com/oVirt/ovirt-engine/blob/24530d17874e20581deee4b0e319146cdcacb8f5/backend/manager/modules/vdsbroker/src/main/java/org/ovirt/engine/core/vdsbroker/builder/vminfo/LibvirtVmXmlBuilder.java#L2424










On Tue, Mar 1, 2022 at 6:12 PM Muli Ben-Yehuda <m...@lightbitslabs.com> wrote:
>
> Will this support require changes in ovirt-engine or just in vdsm? I have 
> started to look into vdsm's managedvolume.py and its tests and it seems like 
> adding support for LightOS there should be pretty simple (famous last 
> words...). Should this be enough or do you think it will require changes in 
> other parts of ovirt as well?
>
> Cheers,
> Muli
>
> On Mon, Feb 28, 2022 at 9:09 AM Nir Soffer <nsof...@redhat.com> wrote:
>>
>> On Fri, Feb 25, 2022 at 12:04 PM Gorka Eguileor <gegui...@redhat.com> wrote:
>> >
>> > On 24/02, Nir Soffer wrote:
>> > > On Thu, Feb 24, 2022 at 8:46 PM Gorka Eguileor <gegui...@redhat.com> 
>> > > wrote:
>> > > >
>> > > > On 24/02, Nir Soffer wrote:
>> > > > > On Thu, Feb 24, 2022 at 6:35 PM Muli Ben-Yehuda 
>> > > > > <m...@lightbitslabs.com> wrote:
>> > > > > >
>> > > > > > On Thu, Feb 24, 2022 at 6:28 PM Nir Soffer <nsof...@redhat.com> 
>> > > > > > wrote:
>> > > > > >>
>> > > > > >> On Thu, Feb 24, 2022 at 6:10 PM Muli Ben-Yehuda 
>> > > > > >> <m...@lightbitslabs.com> wrote:
>> > > > > >> >
>> > > > > >> > On Thu, Feb 24, 2022 at 3:58 PM Nir Soffer <nsof...@redhat.com> 
>> > > > > >> > wrote:
>> > > > > >> >>
>> > > > > >> >> On Wed, Feb 23, 2022 at 6:24 PM Muli Ben-Yehuda 
>> > > > > >> >> <m...@lightbitslabs.com> wrote:
>> > > > > >> >> >
>> > > > > >> >> > Thanks for the detailed instructions, Nir. I'm going to 
>> > > > > >> >> > scrounge up some hardware.
>> > > > > >> >> > By the way, if anyone else would like to work on NVMe/TCP 
>> > > > > >> >> > support, for NVMe/TCP target you can either use Lightbits 
>> > > > > >> >> > (talk to me offline for details) or use the upstream Linux 
>> > > > > >> >> > NVMe/TCP target. Lightbits is a clustered storage system 
>> > > > > >> >> > while upstream is a single target, but the client side 
>> > > > > >> >> > should be close enough for vdsm/ovirt purposes.
>> > > > > >> >>
>> > > > > >> >> I played with NVMe/TCP a little bit, using qemu to create a 
>> > > > > >> >> virtual
>> > > > > >> >> NVMe disk, and export
>> > > > > >> >> it using the kernel on one VM, and consume it on another VM.
>> > > > > >> >> https://futurewei-cloud.github.io/ARM-Datacenter/qemu/nvme-of-tcp-vms/
>> > > > > >> >>
>> > > > > >> >> One question about device naming - do we always get the same 
>> > > > > >> >> name of the
>> > > > > >> >> device in all hosts?
>> > > > > >> >
>> > > > > >> >
>> > > > > >> > No, we do not, see below how we handle migration in os_brick.
>> > > > > >> >
>> > > > > >> >> To support VM migration, every device must have unique name in 
>> > > > > >> >> the cluster.
>> > > > > >> >> With multipath we always have unique name, since we disable 
>> > > > > >> >> "friendly names",
>> > > > > >> >> so we always have:
>> > > > > >> >>
>> > > > > >> >>     /dev/mapper/{wwid}
>> > > > > >> >>
>> > > > > >> >> With rbd we also do not use /dev/rbdN but a unique path:
>> > > > > >> >>
>> > > > > >> >>     /dev/rbd/poolname/volume-vol-id
>> > > > > >> >>
>> > > > > >> >> How do we ensure cluster-unique device path? If os_brick does 
>> > > > > >> >> not handle it, we
>> > > > > >> >> can to do in ovirt, for example:
>> > > > > >> >>
>> > > > > >> >>     /run/vdsm/mangedvolumes/{uuid} -> /dev/nvme7n42
>> > > > > >> >>
>> > > > > >> >> but I think this should be handled in cinderlib, since 
>> > > > > >> >> openstack have
>> > > > > >> >> the same problem with migration.
>> > > > > >> >
>> > > > > >> >
>> > > > > >> > Indeed. Both the Lightbits LightOS connector and the nvmeof 
>> > > > > >> > connector do this through the target provided namespace (LUN) 
>> > > > > >> > UUID. After connecting to the target, the connectors wait for 
>> > > > > >> > the local friendly-named device file that has the right UUID to 
>> > > > > >> > show up, and then return the friendly name. So different hosts 
>> > > > > >> > will have different friendly names, but the VMs will be 
>> > > > > >> > attached to the right namespace since we return the friendly 
>> > > > > >> > name on the current host that has the right UUID. Does this 
>> > > > > >> > also work for you?
>> > > > > >>
>> > > > > >> It will not work for oVirt.
>> > > > > >>
>> > > > > >> Migration in oVirt works like this:
>> > > > > >>
>> > > > > >> 1. Attach disks to destination host
>> > > > > >> 2. Send VM XML from source host to destination host, and start the
>> > > > > >>    VM is paused mode
>> > > > > >> 3. Start the migration on the source host
>> > > > > >> 4. When migration is done, start the CPU on the destination host
>> > > > > >> 5. Detach the disks from the source
>> > > > > >>
>> > > > > >> This will break in step 2, since the source xml refer to nvme 
>> > > > > >> device
>> > > > > >> that does not exist or already used by another VM.
>> > > > > >
>> > > > > >
>> > > > > > Indeed.
>> > > > > >
>> > > > > >> To make this work, the VM XML must use the same path, existing on
>> > > > > >> both hosts.
>> > > > > >>
>> > > > > >> The issue can be solved by libvirt hook updating the paths before 
>> > > > > >> qemu
>> > > > > >> is started on the destination, but I think the right way to 
>> > > > > >> handle this is to
>> > > > > >> have the same path.
>> > > > > >
>> > > > > >
>> > > > > >  You mentioned above that it can be handled in ovirt (c.f., 
>> > > > > > /run/vdsm/mangedvolumes/{uuid} -> /dev/nvme7n42), which seems like 
>> > > > > > a reasonable approach given the constraint imposed by the oVirt 
>> > > > > > migration flow you outlined above. What information does vdsm need 
>> > > > > > to create and use the /var/run/vdsm/managedvolumes/{uuid} link? 
>> > > > > > Today the connector does (trimmed for brevity):
>> > > > > >
>> > > > > >     def connect_volume(self, connection_properties):
>> > > > > >         device_info = {'type': 'block'}
>> > > > > >         uuid = connection_properties['uuid']
>> > > > > >         device_path = self._get_device_by_uuid(uuid)
>> > > > > >         device_info['path'] = device_path
>> > > > > >         return device_info
>> > > > >
>> > > > > I think we have 2 options:
>> > > > >
>> > > > > 1. unique path created by os_brick using the underlying uuid
>> > > > >
>> > > > > In this case the connector will return the uuid, and ovirt will use
>> > > > > it to resolve the unique path that will be stored and used on engine
>> > > > > side to create the vm xml.
>> > > > >
>> > > > > I'm not sure how the connector should return this uuid. Looking in 
>> > > > > current
>> > > > > vdsm code:
>> > > > >
>> > > > >     if vol_type in ("iscsi", "fibre_channel"):
>> > > > >         if "multipath_id" not in attachment:
>> > > > >             raise se.ManagedVolumeUnsupportedDevice(vol_id, 
>> > > > > attachment)
>> > > > >         # /dev/mapper/xxxyyy
>> > > > >         return os.path.join(DEV_MAPPER, attachment["multipath_id"])
>> > > > >     elif vol_type == "rbd":
>> > > > >         # /dev/rbd/poolname/volume-vol-id
>> > > > >         return os.path.join(DEV_RBD, connection_info['data']['name'])
>> > > > >
>> > > > > os_brick does not have a uniform way to address different devices.
>> > > > >
>> > > > > Maybe Gorka can help with this.
>> > > >
>> > > > Hi,
>> > > >
>> > > > That is true, because in OpenStack we haven't had the need to have the
>> > > > same path on every host or even on the same host during different
>> > > > connections.
>> > > >
>> > > > For nvme a new `elif` clause could be added there, though it will be a
>> > > > bit trickier, because the nvme connection properties format are a bit 
>> > > > of
>> > > > a mess...
>> > > >
>> > > > We have 2 different formats for the nvme properties, and the wwid that
>> > > > appears in symlink /dev/disk/by-id/nvme-<wwid> may or may not be the
>> > > > volume id, may be the uuid in the connection info if present or the
>> > > > nguid if the nvme device doesn't have uuid.
>> > > >
>> > > > For these reasons I would recommend not relying on the connection
>> > > > information and relying on the path from the attachment instead.
>> > > >
>> > > > Something like this should be probably fine:
>> > > >
>> > > >   elif vol_type == 'nvme':
>> > > >       device_name = os.path.basename(attachment['path'])
>> > > >       controller = device_name.rsplit('n', 1)[0]
>> > > >       wwid_filename = 
>> > > > f'/sys/class/nvme/{controller}/{device_name}/wwid'
>> > > >       with open(wwid_filename, 'r') as f:
>> > > >           uuid = f.read().strip()
>> > > >       return os.path.join('/dev/disk/by-id/nvme-', uuid)
>> > >
>> > > Thanks Gorka!
>> > >
>> > > but isn't this duplicating logic already in os brick?
>> > > https://github.com/openstack/os-brick/blob/56bf0272b55dcbbc7f5b03150973a80af1407f4f/os_brick/initiator/connectors/lightos.py#L193
>> > >
>> >
>> > Hi Nir,
>> >
>> > Oh! I thought we were talking about the generic NVMe-oF connector,
>> > didn't know this was specific about the LightOS one.
>> >
>> > The link is used as an easy way to locate the volume, it doesn't mean
>> > that it is returned to the caller of the `connect_volume` method.  In
>> > fact, we can see how that method actually returns the real path and not
>> > the link's path:
>> >
>> >     def _check_device_exists_using_dev_lnk(self, uuid):
>> >         lnk_path = f"/dev/disk/by-id/nvme-uuid.{uuid}"
>> > -->     if os.path.exists(lnk_path):
>> >    ^^^ Check link exists
>> >
>> > -->         devname = os.path.realpath(lnk_path)
>> >    ^^^ Get the real path for the symlink
>> >
>> > -->         if devname.startswith("/dev/nvme"):
>> >    ^^^ Make extra sure it's not pointing to something crazy
>> >
>> >                 LOG.info("LIGHTOS: devpath %s detected for uuid %s",
>> >                          devname, uuid)
>> >
>> > -->             return devname
>> >    ^^^ Return it
>> >
>> >         return None
>> >
>> > > Another interesting detail is this wait:
>> > > https://github.com/openstack/os-brick/blob/56bf0272b55dcbbc7f5b03150973a80af1407f4f/os_brick/initiator/connectors/lightos.py#L228
>> > >
>> > >     def _get_device_by_uuid(self, uuid):
>> > >         endtime = time.time() + self.WAIT_DEVICE_TIMEOUT
>> > >         while time.time() < endtime:
>> > >             try:
>> > >                 device = self._check_device_exists_using_dev_lnk(uuid)
>> > >                 if device:
>> > >                     return device
>> > >             except Exception as e:
>> > >                 LOG.debug(f'LIGHTOS: {e}')
>> > >             device = self._check_device_exists_reading_block_class(uuid)
>> > >             if device:
>> > >                 return device
>> > >
>> > >             time.sleep(1)
>> > >         return None
>> > >
>> > > The code does not explain why it tries to use the /dev/disk/by-id link
>> > > and fallback to sysfs on errors. Based on our experience with udev,
>> > > I guess that the author does not trust udev. I wonder if we can trust
>> > > it as the stable device path.
>> > >
>> >
>> > In my experience udev rules (which is different from udev itself) are
>> > less that reliable as a way of finding devices when working "in the
>> > wild".  They are only reliable if you have full control over the host
>> > system and are sure nobody (admin or distro) can break things.
>> >
>> > For reference, at Red Hat we have an RFE to improve os-brick [1] and
>> > stop using symlinks at all.
>> >
>> > While they are not 100% reliable in the wild, they are quite reliable
>> > once they are working on a specific system, which means that if we
>> > confirm they are working on a system we can rely on them if no changes
>> > are made on the system (and if CPU is not 100% during attachment).
>> >
>> >
>> > [1]: https://bugzilla.redhat.com/show_bug.cgi?id=1697319
>> >
>> >
>> > > If we can trust this path, maybe os_brick can return the stable path
>> > > in a uniform way for all kind of devices?
>> >
>> > I don't think this is likely to happen, because it has no real value for
>> > OpenStack so it's unlikely to get prioritized (for coding and reviews).
>>
>> Since we cannot get a stable path from os-brick, and stable path is a oVirt
>> specific requirement, we need to handle this in oVirt, similar to the way we
>> handle multipath and rbd and traditional storage.
>>
>> Nir
>>
>
> Lightbits Labs
> Lead the cloud-native data center transformation by delivering scalable and 
> efficient software defined storage that is easy to consume.
>
> This message is sent in confidence for the addressee only.  It may contain 
> legally privileged information. The contents are not to be disclosed to 
> anyone other than the addressee. Unauthorized recipients are requested to 
> preserve this confidentiality, advise the sender immediately of any error in 
> transmission and delete the email from their systems.
>
>
_______________________________________________
Devel mailing list -- devel@ovirt.org
To unsubscribe send an email to devel-le...@ovirt.org
Privacy Statement: https://www.ovirt.org/privacy-policy.html
oVirt Code of Conduct: 
https://www.ovirt.org/community/about/community-guidelines/
List Archives: 
https://lists.ovirt.org/archives/list/devel@ovirt.org/message/ZUHXH2LWYR3SGQROQGR62O6F3WKOBJDX/

Reply via email to