watchdog for each hypervisor

Signed-off-by: Jeff Carr <jcarr@wit.com>
This commit is contained in:
Jeff Carr 2024-10-12 11:21:45 -05:00
parent d08d9f99be
commit a6b385e216
2 changed files with 6 additions and 6 deletions

1
README
View File

@ -18,6 +18,7 @@ Notes & Goals:
* Automatically map access to serial and graphical consoles
* This is intended for managing Virtual Machines, not for containers
* This often uses the DO nomenclature 'droplets' instead of 'virtual machines' or 'domU'
* Every droplet is considered hostile
* When possible, use protobuf
* Let security be handled externally at the socket layer with other tools
* Put network, cpu, etc stats in external tools

11
main.go
View File

@ -32,22 +32,21 @@ func main() {
var h HyperT
h.Hostname = s
h.Autoscan = true
h.Delay = 3 * time.Second
h.Delay = 5 * time.Second
h.Scan = func() {
log.Info("scanned farm03?")
h.pollHypervisor()
}
me.hypers = append(me.hypers, h)
}
go startHTTP()
log.Info("me.names =", me.names)
for _, h := range me.hypers {
log.Info("me hostname =", h.Hostname)
if h.Hostname == "farm03" {
log.Info("should start watchdog here for hostname =", h.Hostname)
h.NewWatchdog()
}
log.Info("should start watchdog here for hostname =", h.Hostname)
go h.NewWatchdog()
}
// sit here
startHTTP()
}