From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Authentication-Results: lists.ozlabs.org; spf=none (mailfrom) smtp.mailfrom=linux.vnet.ibm.com (client-ip=148.163.156.1; helo=mx0a-001b2d01.pphosted.com; envelope-from=vishwa@linux.vnet.ibm.com; receiver=) Authentication-Results: lists.ozlabs.org; dmarc=none (p=none dis=none) header.from=linux.vnet.ibm.com Received: from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com [148.163.156.1]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by lists.ozlabs.org (Postfix) with ESMTPS id 45504X4PTxzDqRK for ; Fri, 17 May 2019 17:18:03 +1000 (AEST) Received: from pps.filterd (m0098393.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x4H7HfIa080234 for ; Fri, 17 May 2019 03:18:00 -0400 Received: from e06smtp07.uk.ibm.com (e06smtp07.uk.ibm.com [195.75.94.103]) by mx0a-001b2d01.pphosted.com with ESMTP id 2shqhd28yw-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Fri, 17 May 2019 03:17:59 -0400 Received: from localhost by e06smtp07.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Fri, 17 May 2019 08:17:56 +0100 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp07.uk.ibm.com (192.168.101.137) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Fri, 17 May 2019 08:17:54 +0100 Received: from d06av23.portsmouth.uk.ibm.com (d06av23.portsmouth.uk.ibm.com [9.149.105.59]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x4H7HrUs50331798 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Fri, 17 May 2019 07:17:53 GMT Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 28E76A4057; Fri, 17 May 2019 07:17:53 +0000 (GMT) Received: from d06av23.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 601EDA404D; Fri, 17 May 2019 07:17:52 +0000 (GMT) Received: from [9.122.210.251] (unknown [9.122.210.251]) by d06av23.portsmouth.uk.ibm.com (Postfix) with ESMTP; Fri, 17 May 2019 07:17:52 +0000 (GMT) Subject: Re: BMC health metrics (again!) To: Neeraj Ladkani , Kun Yi , OpenBMC Maillist References: From: vishwa Date: Fri, 17 May 2019 12:47:51 +0530 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: multipart/alternative; boundary="------------5B1483F5AE95B8D828285942" Content-Language: en-US X-TM-AS-GCONF: 00 x-cbid: 19051707-0028-0000-0000-0000036EA440 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19051707-0029-0000-0000-0000242E41E6 Message-Id: <83b3990a-19c0-a0af-a28a-cedf8401bffb@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:, , definitions=2019-05-17_04:, , signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1905170049 X-BeenThere: openbmc@lists.ozlabs.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Development list for OpenBMC List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 17 May 2019 07:18:05 -0000 This is a multi-part message in MIME format. --------------5B1483F5AE95B8D828285942 Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 8bit Neeraj, Thanks for the inputs. It's nice to see us having a similar thought. AFAIK, we don't have any work-group that is driving “Platform telemetry and health monitoring”. Also, do we want to see this as 2 different entities ?. In the past, there were thoughts about using websockets to channel some of the thermal parameters as telemetry data. But then it was not implemented. We can discuss here I think. !! Vishwa !! On 5/17/19 12:00 PM, Neeraj Ladkani wrote: > > At cloud scale, telemetry and health monitoring is very critical. We > should define a framework that allows platform owners to add their own > telemetry hooks. Telemetry service should be designed to make this > data accessible and store in resilient way (like blackbox during plane > crash). > > Is there any workgroup that drives this feature “Platform telemetry > and health monitoring” ? > > Wishlist > > BMC telemetry : > > 1. Linux subsystem > 1. Uptime > 2. CPU Load average > 3. Memory info > 4. Storage usage ( RW ) > 5. Dmesg > 6. Syslog > 7. FDs of critical processes > 8. Alignment traps > 9. WDT excursions > 2. IPMI subsystem > 1. Request and Response logging par interface with timestamps ( > KCS, LAN, USB) > 2. Request and Response of IPMB > > i.Request , Response, No of Retries > > 3. Misc > > 1. Critical Temperature Excursions > > i.Minimum Reading of Sensor > > ii.Max Reading of a sensor > > iii.Count of state transition > > iv.Retry Count > > 2. Count of assertions/deassertions of GPIO and ability to capture > the state > 3. timestamp of last assertion/deassertion of GPIO > > Thanks > > ~Neeraj > > *From:*openbmc > *On Behalf Of *vishwa > *Sent:* Wednesday, May 8, 2019 1:11 AM > *To:* Kun Yi ; OpenBMC Maillist > > *Subject:* Re: BMC health metrics (again!) > > Hello Kun, > > Thanks for initiating it. I liked the /proc parsing. On the IPMI > thing, is it only targeted to IPMI -or- a generic BMC-Host > communication kink ? > > Some of the things in my wish-list are: > > 1/. Flash wear and tear detection and the threshold to be a config option > 2/. Any SoC specific health checks ( If that is exposed ) > 3/. Mechanism to detect spurious interrupts on any HW link > 4/. Some kind of check to see if there will be any I2C lock to a given > end device > 5/. Ability to detect errors on HW links > > On the watchdog(8) area, I was just thinking these: > > How about having some kind of BMC_health D-Bus properties -or- a > compile time feed, whose values can be fed into a configuration file > than watchdog using the default /etc/watchdog.conf always. If the > properties are coming from a D-Bus, then we could either append to > /etc/watchdog.conf -or- treat those values only as the config file > that can be given to watchdog. > The systemd service files to be setup accordingly. > > > We have seen instances where we get an error that is indicating no > resources available. Those could be file descriptors / socket > descriptors etc. A way to plug this into watchdog as part of test > binary that checks for this ? We could hook a repair-binary to take > the action. > > > Another thing that I was looking at hooking into watchdog is the test > to see the file system usage as defined by the policy. > Policy could mention the file system mounts and also the threshold. > > For example, /tmp , /root etc.. We could again hook a repair binary to > do some cleanup if needed > > If we see the list is growing with these custom requirements, then > probably does not make sense to pollute the watchdog(2) but > have these consumed into the app instead ? > > !! Vishwa !! > > On 4/9/19 9:55 PM, Kun Yi wrote: > > Hello there, > > This topic has been brought up several times on the mailing list > and offline, but in general seems we as a community didn't reach a > consensus on what things would be the most valuable to monitor, > and how to monitor them. While it seems a general purposed > monitoring infrastructure for OpenBMC is a hard problem, I have > some simple ideas that I hope can provide immediate and direct > benefits. > > 1. Monitoring host IPMI link reliability (host side) > > The essentials I want are "IPMI commands sent" and "IPMI commands > succeeded" counts over time. More metrics like response time would > be helpful as well. The issue to address here: when some IPMI > sensor readings are flaky, it would be really helpful to tell from > IPMI command stats to determine whether it is a hardware issue, or > IPMI issue. Moreover, it would be a very useful regression test > metric for rolling out new BMC software. > > Looking at the host IPMI side, there is some metrics exposed > through /proc/ipmi/0/si_stats if ipmi_si driver is used, but I > haven't dug into whether it contains information mapping to the > interrupts. Time to read the source code I guess. > > Another idea would be to instrument caller libraries like the > interfaces in ipmitool, though I feel that approach is harder due > to fragmentation of IPMI libraries. > > 2. Read and expose core BMC performance metrics from procfs > > This is straightforward: have a smallish daemon (or > bmc-state-manager) read,parse, and process procfs and put values > on D-Bus. Core metrics I'm interested in getting through this way: > load average, memory, disk used/available, net stats... The values > can then simply be exported as IPMI sensors or Redfish resource > properties. > > A nice byproduct of this effort would be a procfs parsing library. > Since different platforms would probably have different monitoring > requirements and procfs output format has no standard, I'm > thinking the user would just provide a configuration file > containing list of (procfs path, property regex, D-Bus property > name), and the compile-time generated code to provide an object > for each property. > > All of this is merely thoughts and nothing concrete. With that > said, it would be really great if you could provide some feedback > such as "I want this, but I really need that feature", or let me > know it's all implemented already :) > > If this seems valuable, after gathering more feedback of feature > requirements, I'm going to turn them into design docs and upload > for review. > > -- > > Regards, > > Kun > --------------5B1483F5AE95B8D828285942 Content-Type: text/html; charset=utf-8 Content-Transfer-Encoding: 8bit

Neeraj,

Thanks for the inputs. It's nice to see us having a similar thought.

AFAIK, we don't have any work-group that is driving “Platform telemetry and health monitoring”. Also, do we want to see this as 2 different entities ?. In the past, there were thoughts about using websockets to channel some of the thermal parameters as telemetry data. But then it was not implemented.

We can discuss here I think.

!! Vishwa !!

On 5/17/19 12:00 PM, Neeraj Ladkani wrote:

At cloud scale, telemetry and health monitoring is very critical. We should define a framework that allows platform owners to add their own telemetry hooks. Telemetry service should be designed to make this data accessible and store in resilient way (like blackbox during plane crash).  

 

Is there any workgroup that drives this feature “Platform telemetry and health monitoring” ?

 

Wishlist

 

BMC telemetry :

  1. Linux subsystem
    1. Uptime
    2. CPU Load average
    3. Memory info
    4. Storage usage ( RW )  
    5. Dmesg
    6. Syslog
    7. FDs of critical processes
    8. Alignment traps
    9. WDT excursions
  2. IPMI subsystem
    1. Request and Response logging par interface with timestamps ( KCS, LAN, USB)
    2. Request and Response of IPMB

                                                               i.      Request , Response, No of Retries

  1. Misc
  1. Critical Temperature Excursions

                                                               i.      Minimum Reading of Sensor

                                                             ii.      Max Reading of a sensor

                                                           iii.      Count of state transition

                                                           iv.      Retry Count

  1. Count of assertions/deassertions of GPIO and ability to capture the state
  2. timestamp of last assertion/deassertion of GPIO

 

Thanks

~Neeraj

 

From: openbmc <openbmc-bounces+neladk=microsoft.com@lists.ozlabs.org> On Behalf Of vishwa
Sent: Wednesday, May 8, 2019 1:11 AM
To: Kun Yi <kunyi@google.com>; OpenBMC Maillist <openbmc@lists.ozlabs.org>
Subject: Re: BMC health metrics (again!)

 

Hello Kun,

Thanks for initiating it. I liked the /proc parsing. On the IPMI thing, is it only targeted to IPMI -or- a generic BMC-Host communication kink ?

Some of the things in my wish-list are:

1/. Flash wear and tear detection and the threshold to be a config option
2/. Any SoC specific health checks ( If that is exposed )
3/. Mechanism to detect spurious interrupts on any HW link
4/. Some kind of check to see if there will be any I2C lock to a given end device
5/. Ability to detect errors on HW links

On the watchdog(8) area, I was just thinking these:

How about having some kind of BMC_health D-Bus properties -or- a compile time feed, whose values can be fed into a configuration file than watchdog using the default /etc/watchdog.conf always. If the properties are coming from a D-Bus, then we could either append to /etc/watchdog.conf -or- treat those values only as the config file that can be given to watchdog.
The systemd service files to be setup accordingly.


We have seen instances where we get an error that is indicating no resources available. Those could be file descriptors / socket descriptors etc. A way to plug this into watchdog as part of test binary that checks for this ? We could hook a repair-binary to take the action.


Another thing that I was looking at hooking into watchdog is the test to see the file system usage as defined by the policy.
Policy could mention the file system mounts and also the threshold.

For example, /tmp , /root etc.. We could again hook a repair binary to do some cleanup if needed

If we see the list is growing with these custom requirements, then probably does not make sense to pollute the watchdog(2) but
have these consumed into the app instead ?

!! Vishwa !!

On 4/9/19 9:55 PM, Kun Yi wrote:

Hello there,

 

This topic has been brought up several times on the mailing list and offline, but in general seems we as a community didn't reach a consensus on what things would be the most valuable to monitor, and how to monitor them. While it seems a general purposed monitoring infrastructure for OpenBMC is a hard problem, I have some simple ideas that I hope can provide immediate and direct benefits.

 

1. Monitoring host IPMI link reliability (host side)

 

The essentials I want are "IPMI commands sent" and "IPMI commands succeeded" counts over time. More metrics like response time would be helpful as well. The issue to address here: when some IPMI sensor readings are flaky, it would be really helpful to tell from IPMI command stats to determine whether it is a hardware issue, or IPMI issue. Moreover, it would be a very useful regression test metric for rolling out new BMC software.

 

Looking at the host IPMI side, there is some metrics exposed through /proc/ipmi/0/si_stats if ipmi_si driver is used, but I haven't dug into whether it contains information mapping to the interrupts. Time to read the source code I guess.

 

Another idea would be to instrument caller libraries like the interfaces in ipmitool, though I feel that approach is harder due to fragmentation of IPMI libraries.

 

2. Read and expose core BMC performance metrics from procfs

 

This is straightforward: have a smallish daemon (or bmc-state-manager) read,parse, and process procfs and put values on D-Bus. Core metrics I'm interested in getting through this way: load average, memory, disk used/available, net stats... The values can then simply be exported as IPMI sensors or Redfish resource properties.

 

A nice byproduct of this effort would be a procfs parsing library. Since different platforms would probably have different monitoring requirements and procfs output format has no standard, I'm thinking the user would just provide a configuration file containing list of (procfs path, property regex, D-Bus property name), and the compile-time generated code to provide an object for each property. 

 

All of this is merely thoughts and nothing concrete. With that said, it would be really great if you could provide some feedback such as "I want this, but I really need that feature", or let me know it's all implemented already :)

 

If this seems valuable, after gathering more feedback of feature requirements, I'm going to turn them into design docs and upload for review.

 

--

Regards,

Kun

--------------5B1483F5AE95B8D828285942--