[Blueprint servercloud-r-kdump-tool] Enable kdump mechanism from kdump-tool instead of kexec-tools

Chris J Arges chris.j.arges at canonical.com
Thu Nov 1 13:33:41 UTC 2012


Blueprint changed by Chris J Arges:

Whiteboard changed:
  User Stories:
  
  Risks:
  
  Test Plans:
  
  Release Note:
  
+ ----------
  
- [louis_bouchard] - kdump-tools needs to be MIR / file a bug: TODO
- [smb] - discuss linuxcrashdump changes on ubuntu-devel / ubuntu-kernel: TODO
- [smb] - linuxcrashdump changed to install kdump-tool (after discussion): BLOCKED
- [christopherarges] - write better documentation for kdump-tool: TODO
- [dannf] - validate/invalidate with kdump-tools / mkdumpfile on ARM: TODO
- [louis_bouchard] - Integrate netdump support: POSTPONED
- [med] - netdump charm to aggregate dumps in a cloud: TODO
+ The kdump mechanism from the kdump-tool package is more flexible than
+ its kexec-tool equivalent. It allows for multiple dumps to be collected,
+ is the mechanism used in upstream Debian and has a configuration file
+ that let the sysadmin controls some parameters.
+ 
+ It is currently functional on Ubuntu but the documented way of gathering
+ a kernel dump is to use the 0_kdump initscript delivered by kexec-tools
+ which package the kernel dump file as an Apport bundle. While this
+ solution is sufficient on Desktops, it becomes restrictive on
+ server/cloud installs.
+ 
+ Rationale: Current kexec-tool kernel dump capture mechanism is too
+ limitative in a server/cloud environment. Because you only capture last
+ crash; people want to change mkdumpfile options, have to hack scripts
+ vs. conf files.
+ 
+ We might need to consider different use cases for desktop/server if
+ using kdump-tool. But this might not be bad since we can have a similar
+ setup as kexec-tool.
+ 
+ linux-crashdump
+     - needs to be changed to install kdump-tool
+     - does it need to install 'crash'? we might not do analysis on same machine
+ 
+ Goal: Decide on the feasibility of using kdump-tool as default for server/cloud installs
+  
+ Issues :
+ what is the current story around kdump with UEFI ?
+     - currently disabled if using secure boot
+     - but will be re-enabled when we can use signed kexec kernels
+ Is the "server only" requirement valid or should we use kdump accross the board ?
+ Is usage of apport hooks for kernel dumps useful and/or valid ?
+ 
+ Need to be considerate of
+     - whoopise integration (how is this turned on for servers?)
+     - private data reporting (private daisy instance?)
+ 
+ Can server/cloud users upload large amounts of crash data?; need to
+ consider sensitive environments, etc.
+ 
+ Discussion points:
+ Right now start with x86, long term ensure it works on ARM.
+ consider how we can reproduce apport behavor with kdump-tools during discussion.
+ need to determine use cases for desktop/server for kdump-tool configurations

-- 
Enable kdump mechanism from kdump-tool instead of kexec-tools
https://blueprints.launchpad.net/ubuntu/+spec/servercloud-r-kdump-tool



More information about the Ubuntu-server-bugs mailing list