-
Notifications
You must be signed in to change notification settings - Fork 932
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Store changed config keys as pending when they are immutable on running instances #14813
Comments
@vosdev is this feature request mostly/only due to the limitation around live updating the We have hot CPU plugging/unplugging so it would make sense to be a tad more flexible with RAM as well. |
lmits.memory was just an example, there are several other options not changable for running VMs. I tried to find a list on the documentation but it's not specified what options are only limited to stopped instances. hot swappable RAM would of course also be a very interesting feature! I didn't know if it would be possible! |
I just tried to set deletion protection on a VM and that also got rejected.
|
This is a recent change made in #14532. It's not clear to me why |
I think this may be an unintended consequence of the way live-updateable keys are checked in the qemu driver (allowlist as opposed to a denylist). Unfortunately, I introduced a dependency on this behavior in #14532; setting In general any check against the running state of an instance is prone to races because LXD queries the running state from qemu/lxc any time it is requested; a user could set |
Is this something that could be fixed so those keys can be set live? Thanks |
I often run into errors changing configuration that can only be changed when the instance is stopped.
I would like to request a feature that allows us to change these options regardless of the state of the instance.
After making a configuration change that is currently not allowed, the configuration can be temporarily stored in a
volatile.pending.*
key, to be automatically applied when the instance stops.(In the case of my memory example, this would be
volatile.pending.limits.memory: 12GiB
)Of course this is just a quick suggestion of a possible solution.
What does this fix?
The current way of work is to poweroff my instance, wait for it to power down, make the config change, power on instance. This is slow and gives you quite some downtime.
This strength of this feature would allow you to make a change to the instance and either reboot it for minimal downtime, or schedule a reboot at 03:00 in the morning so no one will notice the downtime.
The text was updated successfully, but these errors were encountered: