Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign upSystem Health Monitoring Deamon #2134
Comments
rootkovska
added
C: core
C: xen
P: major
C: mgmt
labels
Jun 30, 2016
rootkovska
added this to the Release 4.0 milestone
Jun 30, 2016
This was referenced Jun 30, 2016
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rootkovska
Jun 30, 2016
Member
This should include the (backend) functionality of what is described in #6.
|
This should include the (backend) functionality of what is described in #6. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ideologysec
Nov 11, 2016
Are there any plans to simply the existing sys-net/firewall/etc domains with unikernels?
I know it was discussed briefly a few months back and might be a bit off-topic, but unikernels boot in far less time than a whole Linux system, and might mesh with a System Health Monitor (what Minix refers to as a "resurrection server") rather well.
ideologysec
commented
Nov 11, 2016
|
Are there any plans to simply the existing sys-net/firewall/etc domains with unikernels? I know it was discussed briefly a few months back and might be a bit off-topic, but unikernels boot in far less time than a whole Linux system, and might mesh with a System Health Monitor (what Minix refers to as a "resurrection server") rather well. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
ideologysec
Apr 1, 2017
Looks like the Mirage net/fw-vm was adopted for the GSoC, which is awesome.
Would something like Monit be adaptable or work as a System Monitoring Daemon?
ideologysec
commented
Apr 1, 2017
•
|
Looks like the Mirage net/fw-vm was adopted for the GSoC, which is awesome. Would something like Monit be adaptable or work as a System Monitoring Daemon? |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
rootkovska
Apr 2, 2017
Member
Most likely not. We don't want to introduce a centralized daemon which exposes large attack surface for any VM to attack it in a dozen of ways, and then attack other VMs from it.
|
Most likely not. We don't want to introduce a centralized daemon which exposes large attack surface for any VM to attack it in a dozen of ways, and then attack other VMs from it. |
ideologysec
referenced this issue
Apr 3, 2017
Open
Static GPU pass-through on Xen for Intel GPU #2618
GeoffMaciolek
referenced this issue
in QubesOS/qubes-doc
Aug 1, 2017
Merged
Fixed incorrect ticket number for "Qubes Manager Decomposition" #451
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
Rudd-O
Mar 28, 2018
I'm imagining something like a Prometheus exporter running on the VM, listening on a local UNIX socket, and made accessible from the Manager VM via a qrexec service. Then a Prometheus master can be made to collect this info (with minimal retention) and queries against it can then be used to act upon. This would also mesh quite well with, say, running the node exporter on the VMs as well.
Exporters can be written that use minimal amounts of RAM, so they would be virtually cost-free.
Rudd-O
commented
Mar 28, 2018
|
I'm imagining something like a Prometheus exporter running on the VM, listening on a local UNIX socket, and made accessible from the Manager VM via a qrexec service. Then a Prometheus master can be made to collect this info (with minimal retention) and queries against it can then be used to act upon. This would also mesh quite well with, say, running the node exporter on the VMs as well. Exporters can be written that use minimal amounts of RAM, so they would be virtually cost-free. |
rootkovska commentedJun 30, 2016
As part of the effort to "hide as much Qubes infrastructure from the user as possible" that we would like to embrace for the upcoming Qubes 4.x, we will need a global system health monitoring daemon. This is necessary because system VMs, such as e.g. net/USB-holding VMs do crash from time to time. If we don't want the user to be concerned with such system VMs, we need to automatically be able to detect their crash (easy via qrexec service from Dom0) and restart automatically (currently not so easy due to difficulties with reconnecting Xen net front/backend).