On 04/06/2010 12:11 AM, Alexander Graf wrote:
Howdy,
I've been thinking a bit further on the whole issue around libvirt and why the
situation as is isn't satisfying. I came to the following points that currently
hurt building ease of use for KVM:
1) Brand
This is one of the major issues we have ourselves when it comes to appliances.
We can ship appliances built for VMware. We can ship appliances built for Xen.
But we can't ship appliances built for KVM, because there is no single
management app we could target.
There are already at least three management apps for kvm: virt-manager,
proxmox, and RHEV-M (my personal favorite). If we define our own format
then we need those management apps to understand it. That means we
either include only simple features, or we wait until the management
apps catch up to all the features we provide. Otherwise those
appliances aren't universal.
An additional problem is that our format will exclude metadata that the
management app may want to add.
That destroys the KVM brand IMHO.
That's because kvm is infrastructure instead of a complete stack. I
agree it's a problem but I see no way around it.
2) Machine description
If we build an appliance, we also create a configuration file that describes
the VM. We can create .vmx files, we can create xen config files. We can not
create KVM config files. There are none. We could create shell scripts, but
would that help?
It's not enough for qemu to be able to read the configuration file. The
management app needs to read it as well, to understand how much memory
and cpu the guest needs (so it can schedule it on the cluster), what
kind of network connectivity it needs (how many interfaces, what
networks those interfaces connect to, does it need firewall ports
open). An appliance configuration is more than a vm configuration, and
again, the management app needs to be able to understand all of it.
3) Configuration conversion
Party due to qemu not having a configuration format, partly due to libvirt's
ambivalent approach, there is always conversion in configuration formats
involved. I think this is the main reason for the feature lag. If there wasn't
a conversion step, there wouldn't be lag. You could just hand edit the config
file and be good.
There will always be a lag, since management apps (at least the
non-trivial ones) want to display the configuration in a GUI, allow
users to edit it, and want to understand it. It's not just conversion,
it's plumbing down the whole stack.
Point 2 needs to be solved anyways. We need a machine config format for qemu.
For general -M description as well as for specific VM description. The command
line options just become too complicated and too hard to reproduce and save.
Just think of live migration with hot-plugged devices. Or safe savevm + loadvm.
The current logic ends there.
I don't think the management apps will want to use it. They will need
to parse it (currently they only need to write it, which is simpler).
Things like 'query all smp guests with >4GB memory' become complicated
instead just a database query.
For managed guests, I think we want to get rid of the command line at
all. Start the guest with just a case and cold-plug the motherboard,
processors, memory, cards. Migration starts with a replay of these
(including any hotplugged cards added while the guest is running).
Hotplugs during migration are relayed to the other side over the wire.
I can imagine 1) going away if we would set libvirt + virt-manager as _the_
front-end and have everyone focus on it. I suppose it would also help to
rebrand it by then, but I'm not 100% sure about that. Either way, there would
have to be a definite statement that libvirt is the solution to use. And
_everyone_ would have to agree on that. Sounds like a hard task. And by then we
still don't really have a branded product stack.
Point 3 is the really tough one. It's the very basis of libvirt. And it's plain
wrong IMHO. I hate XML. I hate duplicated efforts. The current conversion
involves both. Every option added to qemu needs to be added to libvirt.
Not just libvirt, virt-manager as well. And that is typically more
difficult technically (though probably takes a lot less time).
In XML. Bleks.
Yeah.
Reading on IRC I seem to not be the only person thinking that, just the first
one mentioning this aloud I suppose. But that whole XML mess really hurts us
too. Nobody wants to edit XML files. Nobody wants to have two separate syntaxes
to describe the same thing. It complicates everything without a clear benefit.
And it puts me in a position where I can't help people because I don't know the
XML format. That should never happen.
Sure, for libvirt it makes sense to be hypervisor-agnostic. For qemu it
doesn't. We want to be _the_ hypervisor. Setting our default front-end to
something that is agnostic weakens our point. And it slows down development.
And it hurts integration. And thus usability, thus adoption. It hurts us.
It doesn't make sense for libvirt to be hypervisor agnostic. If it is,
people who want to use one hypervisor's advanced features are forced to
work around it. Anthony wants multiple monitors for this, but that's a
bad workaround. libvirt is placing developers using it in an impossible
situation - the developers want to use kvm-specific features and libvirt
is in the way.
That's what I've concluded so far on the whole situation as is. I find it sad
to be the one speaking it out, but IMHO going with libvirt as default
management front-end is a dead end. It will hurt us more than it will help us.
Well, I did suggest (and then withdraw) qemud. The problem is that to
get something working we'd duplicate all the work that's gone into
libvirt - storage pools, svirt, network setup, etc.
That said I don't think it'd be bad to cooperate or encourage people to use
libvirt. In fact I believe the opposite - it's great if you want to be
agnostic. It just isn't when you're not. And we should differentiate there.
Much of the problem is the hypervisor compatibility thing, yes.
--
Do not meddle in the internals of kernels, for they are subtle and quick to
panic.