configure. manage. monitor russell doty - home | dmtf · 2017-12-28 · 20 red hat confidential...

23
July 2013 Configure. Manage. Monitor Configure. Manage. Monitor Russell Doty Presented at the Management Developers Conference

Upload: others

Post on 04-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

July 2013

Configure. Manage. MonitorConfigure. Manage. Monitor

Russell Doty

Presented at the

Management Developers Conference

Page 2: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

2 Red Hat Confidential

A Story...

Big Bag'O

Scripts& ssh

Powered by Fred

Page 3: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

3 Red Hat Confidential

Goal

● Build a complete infrastructure to Configure, Manage and Monitor Linux Systems

● Based on DMTF/CIM technology● Across multiple Linux distributions● As an Open Source project

Page 4: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

4 Red Hat Confidential

Strategy

Provide a standardized remote interface to configure, manage, and monitor bare metal production Linux servers.

Page 5: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

5 Red Hat Confidential

● Low level functions to remotely configure and

manage bare metal production Linux servers (and virtual machine guests)

● Configuration, Management & Monitoring infrastructure

● Standards based● Open and extensible● Open, upstream project: www.openlmi.org● Delivered as part of OS

A Platform for Manageability

Page 6: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

6 Red Hat Confidential

Manageability Technology Choice● Evaluated many alternatives● Chose DMTF/CIM

● Architecture, infrastructure, object models, existing uses● OpenPegasus CIMOM● WBEM client interface

● Scripting & CLI friendly● Multiple language bindings

● Development toolchain – CMPI based● CIM Models: SMASH & SMI-S

● Subset, with extensions and modifications...● Based on our understanding● Modified to support Linux implementation

Page 7: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

7 Red Hat Confidential

OpenLMI System Manageability Infrastructure

• Local agents installed on managed systems• Agents and Object Broker supplied as part of OS

• Open project• Initial delivery on

Fedora• Remote API

• Can also be used locally

• Agents and tools can be developed by Red Hat, community, 3rd parties, customers

Page 8: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

8 Red Hat Confidential

Agents • Agents are Functional Modules• Get/Put attributes• Methods & relations

• Standard Interfaces• Introspection• Agents do all the work• Toolchain for developing Agents

• UML schema compiled to produce code skeleton

• Agents can be written in C/C++ or Python

• Agents can be call/response or asynchronous event driven

Page 9: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

9 Red Hat Confidential

OpenLMI ClientInterfaces

• LMI Shell• Enhanced CLI & scripting

environment• Admin Friendly

• Python API• Use from Python modules• Good interface for

OpenLMI Apps

• C/C++ API• Powerful interface for

writing Apps or integrating with existing Apps

• Java• Write Java Apps• Easy interface with JBoss

• CLICan be used directly or from

shell script

Page 10: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

10 Red Hat Confidential

OpenLMI in Fedora 19• Implementation:

• DMTF/CIM technology stack• Https transport (no general

Web server)

• Included Agents:• Storage• Network• System Services• Power Management• Local User Management (basic)• Software Management• System Monitoring (basic)• System Information &

Configuration

Page 11: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

11 Red Hat Confidential

What can you do with OpenLMI?

●Storage●Networks●Users●Software●Power●System Services●System configuration●Active Directory

Page 12: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

12 Red Hat Confidential

● Enumerate local drives (block devices).● Obtain information on drives and luns including I/O

statistics.● Partition, including support for GPT partitions.● Format – EXT2, EXT3, EXT4, XFS and btrfs.● Build RAID sets with mdraid.● Perform logical volume management with lvm.● Mount/unmount file systems.● Manipulate block devices: iscsi, Fibre Channel,

and FCoE.

Storage

Page 13: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

13 Red Hat Confidential

● Enumerate NICs.● Get information on NICs (MAC address, link status,

etc.)● Bring up/bring down NICs.● Set IPv4 address and netmask.● Set IPv6 address.● Set default gateway.● Set dns servers.● Manage static routes.● Configure network bridging and bonding.● Notifications (events) for changes in network

devices and settings.

Network

Page 14: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

14 Red Hat Confidential

● Enumerate system services and their status.● Service name.● Service description.● Service status.

● Start/Stop/Restart/Reload a service.● Enable/Disable a service.● Configure a service to start at boot.● Event based monitoring of service status.● Installation/Update/Removal of a service (using

Software Management)

Services

Page 15: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

15 Red Hat Confidential

● List all rpm based software installed on a system (including version).

● List available repositories.● List available packages per repository.● Search repositories.● List files owned by a package.● Perform a package integrity check.● Install/Update/Uninstall software.

Software Management

Page 16: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

16 Red Hat Confidential

● Manage local accounts.● List user accounts and settings.● Create/Update/Remove user accounts and groups.● Query and Change user account settings.● Notifications (events) for account changes.

User Accounts

Page 17: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

17 Red Hat Confidential

Future

● Extend existing Providers● More capabilities● Indicator support

● New Providers● Community

● Client Support

Page 18: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

18 Red Hat Confidential

●More Productive Sysadmins● Familiar environment● Standard API● Scripting friendly environment● Manage remote systems without logging in locally

●Shorter learning curve for Linux System Administration

● Common framework across disparate subsystems

●Foundation for Automation●Can be used by management platforms

Benefits

Page 19: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

19 Red Hat Confidential

● Building Providers● Largely based on SMASH & SMI-S● Difficult to understand and apply CIM models● Need help

● Working with Upstream Projects● Bug fixes & enhancements, including OpenPegasus

● Founding an Upstream Community● www.openlmi.org● Participation welcome!

● Building Client Tools

What is Red Hat doing?

Page 20: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

20 Red Hat Confidential

● Building Providers that change the system● Configure storage & networks● Manage system services, install software, create users● Plus monitor and query● Previous efforts focused on query & monitor (e.g. sblim)

● Including Providers in the OS● Greater customer acceptance

● Founding an Upstream Community● Full Open Source implementation

● Building Client Tools

What is Red Hat Doing Different?

Page 21: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

21 Red Hat Confidential

● Understanding the CIM models● Tremendously steep learning curve

● Implementing the CIM models● Models are not “implementation friendly”

● Integration of 3rd Party Providers● HW RAID configuration, SAN Array & Switch Configuration● Closed source Providers

● Security● Username/password in each command

● Building a vibrant open source community

OpenLMI Challenges

Page 22: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

22 Red Hat Confidential

The Opportunity

●Give us requirements and feedback●Evaluate OpenLMI in Fedora 19●Get involved at OpenLMI.org

● Testing● Use cases● Scripts● Agents● Tools

Page 23: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system

23 Red Hat Confidential

Key Information

● Russell Doty: [email protected]● www.openlmi.org● TechPonder.wordpress.com● lists.fedorahosted.org/mailman/listinfo/openlmi-

devel● #openlmi on freenode