Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential...
Transcript of Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential...
![Page 1: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/1.jpg)
July 2013
Configure. Manage. MonitorConfigure. Manage. Monitor
Russell Doty
Presented at the
Management Developers Conference
![Page 2: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/2.jpg)
2 Red Hat Confidential
A Story...
Big Bag'O
Scripts& ssh
Powered by Fred
![Page 3: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/3.jpg)
3 Red Hat Confidential
Goal
● Build a complete infrastructure to Configure, Manage and Monitor Linux Systems
● Based on DMTF/CIM technology● Across multiple Linux distributions● As an Open Source project
![Page 4: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/4.jpg)
4 Red Hat Confidential
Strategy
Provide a standardized remote interface to configure, manage, and monitor bare metal production Linux servers.
![Page 5: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/5.jpg)
5 Red Hat Confidential
● Low level functions to remotely configure and
manage bare metal production Linux servers (and virtual machine guests)
● Configuration, Management & Monitoring infrastructure
● Standards based● Open and extensible● Open, upstream project: www.openlmi.org● Delivered as part of OS
A Platform for Manageability
![Page 6: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/6.jpg)
6 Red Hat Confidential
Manageability Technology Choice● Evaluated many alternatives● Chose DMTF/CIM
● Architecture, infrastructure, object models, existing uses● OpenPegasus CIMOM● WBEM client interface
● Scripting & CLI friendly● Multiple language bindings
● Development toolchain – CMPI based● CIM Models: SMASH & SMI-S
● Subset, with extensions and modifications...● Based on our understanding● Modified to support Linux implementation
![Page 7: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/7.jpg)
7 Red Hat Confidential
OpenLMI System Manageability Infrastructure
• Local agents installed on managed systems• Agents and Object Broker supplied as part of OS
• Open project• Initial delivery on
Fedora• Remote API
• Can also be used locally
• Agents and tools can be developed by Red Hat, community, 3rd parties, customers
![Page 8: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/8.jpg)
8 Red Hat Confidential
Agents • Agents are Functional Modules• Get/Put attributes• Methods & relations
• Standard Interfaces• Introspection• Agents do all the work• Toolchain for developing Agents
• UML schema compiled to produce code skeleton
• Agents can be written in C/C++ or Python
• Agents can be call/response or asynchronous event driven
![Page 9: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/9.jpg)
9 Red Hat Confidential
OpenLMI ClientInterfaces
• LMI Shell• Enhanced CLI & scripting
environment• Admin Friendly
• Python API• Use from Python modules• Good interface for
OpenLMI Apps
• C/C++ API• Powerful interface for
writing Apps or integrating with existing Apps
• Java• Write Java Apps• Easy interface with JBoss
• CLICan be used directly or from
shell script
![Page 10: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/10.jpg)
10 Red Hat Confidential
OpenLMI in Fedora 19• Implementation:
• DMTF/CIM technology stack• Https transport (no general
Web server)
• Included Agents:• Storage• Network• System Services• Power Management• Local User Management (basic)• Software Management• System Monitoring (basic)• System Information &
Configuration
![Page 11: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/11.jpg)
11 Red Hat Confidential
What can you do with OpenLMI?
●Storage●Networks●Users●Software●Power●System Services●System configuration●Active Directory
![Page 12: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/12.jpg)
12 Red Hat Confidential
● Enumerate local drives (block devices).● Obtain information on drives and luns including I/O
statistics.● Partition, including support for GPT partitions.● Format – EXT2, EXT3, EXT4, XFS and btrfs.● Build RAID sets with mdraid.● Perform logical volume management with lvm.● Mount/unmount file systems.● Manipulate block devices: iscsi, Fibre Channel,
and FCoE.
Storage
![Page 13: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/13.jpg)
13 Red Hat Confidential
● Enumerate NICs.● Get information on NICs (MAC address, link status,
etc.)● Bring up/bring down NICs.● Set IPv4 address and netmask.● Set IPv6 address.● Set default gateway.● Set dns servers.● Manage static routes.● Configure network bridging and bonding.● Notifications (events) for changes in network
devices and settings.
Network
![Page 14: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/14.jpg)
14 Red Hat Confidential
● Enumerate system services and their status.● Service name.● Service description.● Service status.
● Start/Stop/Restart/Reload a service.● Enable/Disable a service.● Configure a service to start at boot.● Event based monitoring of service status.● Installation/Update/Removal of a service (using
Software Management)
Services
![Page 15: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/15.jpg)
15 Red Hat Confidential
● List all rpm based software installed on a system (including version).
● List available repositories.● List available packages per repository.● Search repositories.● List files owned by a package.● Perform a package integrity check.● Install/Update/Uninstall software.
Software Management
![Page 16: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/16.jpg)
16 Red Hat Confidential
● Manage local accounts.● List user accounts and settings.● Create/Update/Remove user accounts and groups.● Query and Change user account settings.● Notifications (events) for account changes.
User Accounts
![Page 17: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/17.jpg)
17 Red Hat Confidential
Future
● Extend existing Providers● More capabilities● Indicator support
● New Providers● Community
● Client Support
![Page 18: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/18.jpg)
18 Red Hat Confidential
●More Productive Sysadmins● Familiar environment● Standard API● Scripting friendly environment● Manage remote systems without logging in locally
●Shorter learning curve for Linux System Administration
● Common framework across disparate subsystems
●Foundation for Automation●Can be used by management platforms
Benefits
![Page 19: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/19.jpg)
19 Red Hat Confidential
● Building Providers● Largely based on SMASH & SMI-S● Difficult to understand and apply CIM models● Need help
● Working with Upstream Projects● Bug fixes & enhancements, including OpenPegasus
● Founding an Upstream Community● www.openlmi.org● Participation welcome!
● Building Client Tools
What is Red Hat doing?
![Page 20: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/20.jpg)
20 Red Hat Confidential
● Building Providers that change the system● Configure storage & networks● Manage system services, install software, create users● Plus monitor and query● Previous efforts focused on query & monitor (e.g. sblim)
● Including Providers in the OS● Greater customer acceptance
● Founding an Upstream Community● Full Open Source implementation
● Building Client Tools
What is Red Hat Doing Different?
![Page 21: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/21.jpg)
21 Red Hat Confidential
● Understanding the CIM models● Tremendously steep learning curve
● Implementing the CIM models● Models are not “implementation friendly”
● Integration of 3rd Party Providers● HW RAID configuration, SAN Array & Switch Configuration● Closed source Providers
● Security● Username/password in each command
● Building a vibrant open source community
OpenLMI Challenges
![Page 22: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/22.jpg)
22 Red Hat Confidential
The Opportunity
●Give us requirements and feedback●Evaluate OpenLMI in Fedora 19●Get involved at OpenLMI.org
● Testing● Use cases● Scripts● Agents● Tools
![Page 23: Configure. Manage. Monitor Russell Doty - Home | DMTF · 2017-12-28 · 20 Red Hat Confidential Building Providers that change the system Configure storage & networks Manage system](https://reader035.fdocuments.net/reader035/viewer/2022081522/5f01f5d87e708231d401e24f/html5/thumbnails/23.jpg)
23 Red Hat Confidential
Key Information
● Russell Doty: [email protected]● www.openlmi.org● TechPonder.wordpress.com● lists.fedorahosted.org/mailman/listinfo/openlmi-
devel● #openlmi on freenode