Write journal to persistent storage

Currently the journal is written to a RAM based
filesystem which is lost on BMC reboots. This commit
will move the journal to a persistent filesystem location
so it will be available after BMC reboots for debug.
This change is only being done by default on
witherspoon systems with this commit. Other systems
may use this as a reference if they wish to move.

By default, journald uses 10% of the filesystem
(default is /var/log/journal/) and it will ensure 15%
of the filesystem space is left free. Specific machine
configs in openbmc can override these defaults if
they wish. For witherspoon, we will use 3MB max and use
the 15% left free default.

Due to the way openbmc mounts its filesytems, a
systemd-journald.service file override is required to
ensure journald does not start until the /etc/ filesystem
is fully mounted.

journald uses /etc/machine-id to create a directory
in which it stores its journal data. journalctl uses
/etc/machine-id to know which directory to look into
when a user requests the data. Without this override,
journald will end up making a random machine-id
and using that because /etc/machine-id is not available
when systemd-journald.service is started. journalctl
looks up the /etc/machine-id when its run, so it will
use the correct one (but not the one journald is using).

Witherspoon uses the new UBI filesystem, and only
has a total of 4MB available within /var. Ensure the
journal only ever uses 3MB of that space to leave room
for other applications.

In testing it was found that the persistence of journald
had minor impacts to overall flash erase blocks. With
persistence enabled or disabled, it was noted that the
UBI maximum erase count value incremented by 1 for every
10-20 boots of the host. Our CI system, which gets a
lot of activity (new image flashing, REST api testing,
and host boots) average 10-12 erase counts a day. A worst
case of 15 erase blocks a day would mean 18.2 years before
hitting the 100,000 erase block limit.

Resolves openbmc/openbmc#1627

Change-Id: I30211108f26bd9cd758800f457c17ed03d13e802
Signed-off-by: Andrew Geissler <andrewg@us.ibm.com>
4 files changed
tree: 42195ab57dbac3ba941196c07d07f47aac4eb3b9
  1. import-layers/
  2. meta-openbmc-bsp/
  3. meta-openbmc-machines/
  4. meta-phosphor/
  5. .gitignore
  6. .gitreview
  7. .templateconf
  8. openbmc-env
  9. README.md
README.md

OpenBMC

Build Status

The OpenBMC project can be described as a Linux distribution for embedded devices that have a BMC; typically, but not limited to, things like servers, top of rack switches or RAID appliances. The OpenBMC stack uses technologies such as Yocto, Open-Embedded, Systemd and DBus to allow easy customization for your server platform.

Setting up your OpenBMC project

1) Prerequisite

  • Ubuntu 14.04
sudo apt-get install -y git build-essential libsdl1.2-dev texinfo gawk chrpath diffstat
  • Fedora 23
sudo dnf install -y git patch diffstat texinfo chrpath SDL-devel bitbake
sudo dnf groupinstall "C Development Tools and Libraries"

2) Download the source

git clone git@github.com:openbmc/openbmc.git
cd openbmc

3) Target your hardware

Any build requires an environment variable known as TEMPLATECONF to be set to a hardware target. OpenBMC has placed all known hardware targets in a standard directory structure meta-openbmc-machines/meta-openpower/[company]/[target]. You can see all of the known targets with find meta-openbmc-machines -type d -name conf. Choose the hardware target and then move to the next step. Additional examples can be found in the OpenBMC Cheatsheet

MachineTEMPLATECONF
Palmettometa-openbmc-machines/meta-openpower/meta-ibm/meta-palmetto/conf
Barreleyemeta-openbmc-machines/meta-openpower/meta-rackspace/meta-barreleye/conf
Zaiusmeta-openbmc-machines/meta-openpower/meta-ingrasys/meta-zaius/conf
Witherspoonmeta-openbmc-machines/meta-openpower/meta-ibm/meta-witherspoon/conf

As an example target Palmetto

export TEMPLATECONF=meta-openbmc-machines/meta-openpower/meta-ibm/meta-palmetto/conf

3) Build

. openbmc-env
bitbake obmc-phosphor-image

Additional details can be found in the docs repository.

Build Validation and Testing

Commits submitted by members of the OpenBMC Github community are compiled and tested via our Jenkins server. Commits are run through two levels of testing. At the repository level the makefile make check directive is run. At the system level, the commit is built into a firmware image and run with a arm-softmmu QEMU model against a barrage of CI tests.

Commits submitted by non-members do not automatically proceed through CI testing. After visual inspection of the commit, a CI run can be manually performed by the reviewer.

Automated testing against the QEMU model along with supported systems are performed. The OpenBMC project uses the Robot Framework for all automation. Our complete test repository can be found here.

Submitting Patches

Support of additional hardware and software packages is always welcome. Please follow the contributing guidelines when making a submission. It is expected that contributions contain test cases.

Bug Reporting

Issues are managed on Github. It is recommended you search through the issues before opening a new one.

Features of OpenBMC

Feature List

  • REST Management
  • IPMI
  • SSH based SOL
  • Power and Cooling Management
  • Event Logs
  • Zeroconf discoverable
  • Sensors
  • Inventory
  • LED Management
  • Host Watchdog
  • Simulation

Features In Progress

  • Code Update Support for multiple BMC/BIOS images
  • POWER On Chip Controller (OCC) Support
  • Full IPMI 2.0 Compliance with DCMI
  • Verified Boot
  • HTML5 Java Script Web User Interface
  • BMC RAS

Features Requested but need help

  • OpenCompute Redfish Compliance
  • OpenBMC performance monitoring
  • cgroup user management and policies
  • Remote KVM
  • Remote USB
  • OpenStack Ironic Integration
  • QEMU enhancements

Finding out more

Dive deeper in to OpenBMC by opening the docs repository

Contact