New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

System Health Monitoring Deamon #2134

Open
rootkovska opened this Issue Jun 30, 2016 · 5 comments

Comments

Projects
None yet
4 participants
@rootkovska
Member

rootkovska commented Jun 30, 2016

As part of the effort to "hide as much Qubes infrastructure from the user as possible" that we would like to embrace for the upcoming Qubes 4.x, we will need a global system health monitoring daemon. This is necessary because system VMs, such as e.g. net/USB-holding VMs do crash from time to time. If we don't want the user to be concerned with such system VMs, we need to automatically be able to detect their crash (easy via qrexec service from Dom0) and restart automatically (currently not so easy due to difficulties with reconnecting Xen net front/backend).

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Jun 30, 2016

Member

This should include the (backend) functionality of what is described in #6.

Member

rootkovska commented Jun 30, 2016

This should include the (backend) functionality of what is described in #6.

@ideologysec

This comment has been minimized.

Show comment
Hide comment
@ideologysec

ideologysec Nov 11, 2016

Are there any plans to simply the existing sys-net/firewall/etc domains with unikernels?

I know it was discussed briefly a few months back and might be a bit off-topic, but unikernels boot in far less time than a whole Linux system, and might mesh with a System Health Monitor (what Minix refers to as a "resurrection server") rather well.

Are there any plans to simply the existing sys-net/firewall/etc domains with unikernels?

I know it was discussed briefly a few months back and might be a bit off-topic, but unikernels boot in far less time than a whole Linux system, and might mesh with a System Health Monitor (what Minix refers to as a "resurrection server") rather well.

@ideologysec

This comment has been minimized.

Show comment
Hide comment
@ideologysec

ideologysec Apr 1, 2017

Looks like the Mirage net/fw-vm was adopted for the GSoC, which is awesome.

Would something like Monit be adaptable or work as a System Monitoring Daemon?

ideologysec commented Apr 1, 2017

Looks like the Mirage net/fw-vm was adopted for the GSoC, which is awesome.

Would something like Monit be adaptable or work as a System Monitoring Daemon?

@rootkovska

This comment has been minimized.

Show comment
Hide comment
@rootkovska

rootkovska Apr 2, 2017

Member

Most likely not. We don't want to introduce a centralized daemon which exposes large attack surface for any VM to attack it in a dozen of ways, and then attack other VMs from it.

Member

rootkovska commented Apr 2, 2017

Most likely not. We don't want to introduce a centralized daemon which exposes large attack surface for any VM to attack it in a dozen of ways, and then attack other VMs from it.

@Rudd-O

This comment has been minimized.

Show comment
Hide comment
@Rudd-O

Rudd-O Mar 28, 2018

I'm imagining something like a Prometheus exporter running on the VM, listening on a local UNIX socket, and made accessible from the Manager VM via a qrexec service. Then a Prometheus master can be made to collect this info (with minimal retention) and queries against it can then be used to act upon. This would also mesh quite well with, say, running the node exporter on the VMs as well.

Exporters can be written that use minimal amounts of RAM, so they would be virtually cost-free.

Rudd-O commented Mar 28, 2018

I'm imagining something like a Prometheus exporter running on the VM, listening on a local UNIX socket, and made accessible from the Manager VM via a qrexec service. Then a Prometheus master can be made to collect this info (with minimal retention) and queries against it can then be used to act upon. This would also mesh quite well with, say, running the node exporter on the VMs as well.

Exporters can be written that use minimal amounts of RAM, so they would be virtually cost-free.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment