Summary: clm: harden processing node down events and agents during failover 
[#1120]
Review request for Trac Ticket(s): #1120
Peer Reviewer(s): <<LIST THE TECH REVIEWER(S) / MAINTAINER(S) HERE>>
Pull request to: <<LIST THE PERSON WITH PUSH ACCESS HERE>>
Affected branch(es): 4.3 and above
Development branch: <<IF ANY GIVE THE REPO URL>>

--------------------------------
Impacted area       Impact y/n
--------------------------------
 Docs                    n
 Build system            n
 RPM/packaging           n
 Configuration files     n
 Startup scripts         n
 SAF services            y
 OpenSAF services        n
 Core libraries          n
 Samples                 n
 Tests                   n
 Other                   n


Comments (indicate scope for each "y" above):
---------------------------------------------
This patch series touches 3 flows:
1) handling of stale node downs during controller failover
2) handling of agent downs first before node downs during failover
3) fixes a bug that sends trackcallback to agents on a node that just got 
rebooted and
came back again with the same address.

Thanks to HansN for pursing this topic and suggesting the theory and testing of 
the patches.
 
changeset 4243080696763d51a77048570b8275bbb6b8fff5
Author: Mathivanan N.P.<mathi.naic...@oracle.com>
Date:   Wed, 24 Sep 2014 15:05:16 -0400

        clm: avoid stale node down processing and unexpected track callback 
[#1120]
        There is a possiblity that the checkpointing message for a NODE_DOWN 
reaches
        the STANDBY first, i.e. before the MDS delivers the NODE_DOWN event to 
the
        standby. This can result in stale node_down record getting stored in the
        node_down list which is a designated list for processing of node downs 
that
        occur during role change from standby to active. The patch introduces a
        variable that checks whether the checkpoint event for node_down has 
arrived
        first, followed by a check during role change to ignore such stale 
events.

changeset 0859c122fc22c43e92703547d952abeb854b7edc
Author: Mathivanan N.P.<mathi.naic...@oracle.com>
Date:   Wed, 24 Sep 2014 15:11:14 -0400

        clm: during failover, process agent down before node downs [#1120] It is
        quite possible that the agent downs are for the agents that were 
running on
        the same node that went down. So, process agent downs first, before
        processing node downs.

changeset 9b4c11f1ade1d4633abccb3bedf0a6b6111b3e01
Author: Mathivanan N.P.<mathi.naic...@oracle.com>
Date:   Wed, 24 Sep 2014 15:16:02 -0400

        clm: do not send track for the node that left the cluster because of 
reboot
        [#1120] It is possible that when a payload that goes down during 
controller
        failover, can reboot and come back fast. As a part of failover 
processing,
        it is possible that the agent downs for these nodes reach the new ACTIVE
        before node down events. In this scenario, when sending a track callback
        with COMPLETED step, we need to check whether the track is for an agent 
that
        is on a node for which we have received node downevent. And if so, don't
        send track for any clm agent(subscriber) on that node.


Complete diffstat:
------------------
 osaf/services/saf/clmsv/clms/clms_cb.h  |   6 ++++++
 osaf/services/saf/clmsv/clms/clms_evt.c |  51 
+++++++++++++++++++++++++++++++++++++++++++++++++--
 osaf/services/saf/clmsv/clms/clms_imm.c |  25 +++++++++++++++++++++----
 3 files changed, 76 insertions(+), 6 deletions(-)


Testing Commands:
-----------------
1) Randomly reboot payload nodes
2) Trigger controller failover.

Testing, Expected Results:
--------------------------
There should not be any stale node downs for AMFND or other CLM agents running
on the node that just got rebooted and came back up and running.

Conditions of Submission:
-------------------------
Ack from HansN  and Hans or Ramesh.

Arch      Built     Started    Linux distro
-------------------------------------------
mips        n          n
mips64      n          n
x86         n          n
x86_64      y          y
powerpc     n          n
powerpc64   n          n


Reviewer Checklist:
-------------------
[Submitters: make sure that your review doesn't trigger any checkmarks!]


Your checkin has not passed review because (see checked entries):

___ Your RR template is generally incomplete; it has too many blank entries
    that need proper data filled in.

___ You have failed to nominate the proper persons for review and push.

___ Your patches do not have proper short+long header

___ You have grammar/spelling in your header that is unacceptable.

___ You have exceeded a sensible line length in your headers/comments/text.

___ You have failed to put in a proper Trac Ticket # into your commits.

___ You have incorrectly put/left internal data in your comments/files
    (i.e. internal bug tracking tool IDs, product names etc)

___ You have not given any evidence of testing beyond basic build tests.
    Demonstrate some level of runtime or other sanity testing.

___ You have ^M present in some of your files. These have to be removed.

___ You have needlessly changed whitespace or added whitespace crimes
    like trailing spaces, or spaces before tabs.

___ You have mixed real technical changes with whitespace and other
    cosmetic code cleanup changes. These have to be separate commits.

___ You need to refactor your submission into logical chunks; there is
    too much content into a single commit.

___ You have extraneous garbage in your review (merge commits etc)

___ You have giant attachments which should never have been sent;
    Instead you should place your content in a public tree to be pulled.

___ You have too many commits attached to an e-mail; resend as threaded
    commits, or place in a public tree for a pull.

___ You have resent this content multiple times without a clear indication
    of what has changed between each re-send.

___ You have failed to adequately and individually address all of the
    comments and change requests that were proposed in the initial review.

___ You have a misconfigured ~/.hgrc file (i.e. username, email etc)

___ Your computer have a badly configured date and time; confusing the
    the threaded patch review.

___ Your changes affect IPC mechanism, and you don't present any results
    for in-service upgradability test.

___ Your changes affect user manual and documentation, your patch series
    do not contain the patch that updates the Doxygen manual.


------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Opensaf-devel mailing list
Opensaf-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/opensaf-devel

Reply via email to