control your cluster of virtual machines
Go to file
Jeff Carr 8a2502c61b cleanup old code
Signed-off-by: Jeff Carr <jcarr@wit.com>
2024-10-18 14:46:44 -05:00
resources xml file does virsh create 2024-10-18 14:36:40 -05:00
.gitignore initial something. doesn't do anything yet. 2024-10-11 13:55:13 -05:00
LICENSE initial something. doesn't do anything yet. 2024-10-11 13:55:13 -05:00
Makefile start simple xml handling 2024-10-18 07:40:06 -05:00
README clean up logging of initial scan of droplets 2024-10-17 15:29:47 -05:00
argv.go start simple xml handling 2024-10-18 07:40:06 -05:00
configfiles.go make STDOUT output easier to read 2024-10-17 15:54:39 -05:00
event.go clean up logging of initial scan of droplets 2024-10-17 15:29:47 -05:00
http.go make STDOUT output easier to read 2024-10-17 15:54:39 -05:00
main.go xml file does virsh create 2024-10-18 14:36:40 -05:00
poll.go start simple xml handling 2024-10-18 07:40:06 -05:00
structs.go make STDOUT output easier to read 2024-10-17 15:54:39 -05:00
watchdog.go cleanup old code 2024-10-18 14:46:44 -05:00
xml.go xml file does virsh create 2024-10-18 14:36:40 -05:00

README

virtigo: a control panel for your virtual machine cluster

This is an attempt to make something that should:

* Maintain the master list of virtual machines that should be running at all times
* Work with a cluster of dom0 hypervisiors via libvirt and/or qemu
* Understand the cluster and autostart droplets that have failed
* Initiate and Handle all droplet events: start, stop, clone, migrate, etc
* Verify consistancy on the hypervisors
* Initiate and handle live migrations between hypervisors
* Talk to the hypervisors using only the virtigo daemon via protobuf
* Work in GUI mode (GTK/QT/etc) but ALSO the console (ncurses)
* GPL'd with the intent for use with homelab and personal hobbyists

Notes & Goals:

* Be super easy to use.
* Automatically map access to serial and graphical consoles
* Only temporarily generate libvirt XML files for virsh create
* This is intended for managing Virtual Machines, not for containers
* This often uses the DO nomenclature 'droplets' instead of 'virtual machines' or 'domU'
* Every droplet is considered hostile
* When possible, use protobuf
* Let security be handled externally at the socket layer with other tools
* Put network, cpu, etc stats in external tools
* Automatic live migration to decommission nodes
* Implement iptable rules via the virtigo daemon

Inspired by:

* kvm
* virt-manager
* golang
* the simplicity of the DO droplet control panel