From a6b385e21628989b9c14958fdaaca00fbf1f4663 Mon Sep 17 00:00:00 2001 From: Jeff Carr Date: Sat, 12 Oct 2024 11:21:45 -0500 Subject: [PATCH] watchdog for each hypervisor Signed-off-by: Jeff Carr --- README | 1 + main.go | 11 +++++------ 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/README b/README index 4810076..d56d2af 100644 --- a/README +++ b/README @@ -18,6 +18,7 @@ Notes & Goals: * Automatically map access to serial and graphical consoles * This is intended for managing Virtual Machines, not for containers * This often uses the DO nomenclature 'droplets' instead of 'virtual machines' or 'domU' +* Every droplet is considered hostile * When possible, use protobuf * Let security be handled externally at the socket layer with other tools * Put network, cpu, etc stats in external tools diff --git a/main.go b/main.go index 2ba5dda..cf6456d 100644 --- a/main.go +++ b/main.go @@ -32,22 +32,21 @@ func main() { var h HyperT h.Hostname = s h.Autoscan = true - h.Delay = 3 * time.Second + h.Delay = 5 * time.Second h.Scan = func() { log.Info("scanned farm03?") h.pollHypervisor() } me.hypers = append(me.hypers, h) } - go startHTTP() log.Info("me.names =", me.names) for _, h := range me.hypers { log.Info("me hostname =", h.Hostname) - if h.Hostname == "farm03" { - log.Info("should start watchdog here for hostname =", h.Hostname) - h.NewWatchdog() - } + log.Info("should start watchdog here for hostname =", h.Hostname) + go h.NewWatchdog() } + // sit here + startHTTP() }