Bug 855018

Summary: Add "Disabled" state to "Memory Sharing: " in host information
Product: Red Hat Enterprise Virtualization Manager Reporter: David Jaša <djasa>
Component: ovirt-engine-webadmin-portalAssignee: Einav Cohen <ecohen>
Status: CLOSED WONTFIX QA Contact: Pavel Stehlik <pstehlik>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 3.1.0CC: anande, danken, dfediuck, dyasny, ecohen, iheim, Rhev-m-bugs, ykaul
Target Milestone: ---Keywords: FutureFeature
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard: sla
Fixed In Version: Doc Type: Enhancement
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-01-03 11:42:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: SLA RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description David Jaša 2012-09-06 14:12:48 UTC
Description of problem:
Add "Disabled" state to "Memory Sharing: " in host information.

current RHEV-M doesn't distinguish between two effective states: ksm-based memory-sharing:
a) enabled but not active on the host
b) disabled so it won't kick in even in case of memory crunch

Version-Release number of selected component (if applicable):
RHEV-M 3.0.5

How reproducible:
always

Steps to Reproduce:
0. have a host with low RAM usage (under 80 %)
1. enable/disable "ksm" and "ksmtuned" services on the host: https://access.redhat.com/knowledge/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Virtualization_Administration_Guide/chap-KSM.html
2. watch Hosts - Host - General - Memory Page Sharing value
3.
  
Actual results:
in both cases, "Inactive" is reported

Expected results:
if the ksm* host services are disabled, RHEV-M should report value as "Disabled"

Additional info:
this makes some ksm-related debugging harder than necessary.

Comment 1 David Jaša 2012-09-06 14:13:25 UTC
see also bug 854018 and bug 854027 for background info.

Comment 2 Yaniv Kaul 2012-09-06 14:23:42 UTC
Added 'futurefeature'. Currently, we don't have such state.
It might be a good idea to have such a state - where we don't let KSM kick in at all (probably like 100% over-commit, but more explicit).
The relate bugs are bugs indeed, and should be handled regardless.

Comment 3 David Jaša 2012-09-06 17:23:45 UTC
Related documentation bug: bug 855103.

Comment 5 Dan Kenigsberg 2012-09-06 22:24:10 UTC
David, would you explain why we should expose this subtlety to the end user? In my opinion it should be written in vdsm logs to make bugs like bug 854027 a bit clearer.

Comment 6 David Jaša 2012-09-10 09:09:22 UTC
(In reply to comment #5)
> David, would you explain why we should expose this subtlety to the end user?

Because current set of indications does not give administrator any reliable clue in the webadmin that KSM will kick in should it be needed.

You could actually remove this field altogether without any loss of information because it's duplicate with zero/non-zero number in "Shared Memory". Changing this field meaning to just Disabled/Enabled would mean a tremendous boost in information value.

Comment 8 Doron Fediuck 2013-01-03 11:42:53 UTC
David,
currently indeed we have no indication for ksm state.
Going forward ksm will be controlled by mom along with other
tools, such as the memory balloon device.

So this is going to be completely changed, as mom will get
its policy from the engine which will complete these gaps
and more.

Baring in mind that the default ksm behavior is now enabled
(as Bug 854027 is fixed), and in light of the coming changes,
I see no reason to change VDSM API for something which will
become unusable soon.

Comment 9 Anand Nande 2013-01-21 09:28:53 UTC
Doron,

Any time-frame for M.O.M to be available in RHEV?