Troubleshooting

Stuff can go wrong. This document tries to make them right with some useful tips

Section under construction.

While building a derivative, or on a running system things can go really wrong, the guide is aimed to give tips while building derivatives and also debugging running systems.

Don’t forget tocheck the known issues for the release you’re using.

Before booting, several kernel parameters can be used to help during debugging (also when booting an ISO). Those are meant to be used only while debugging, and they might defeat the concept of immutability.

Disable Immutability

By adding rd.cos.debugrw to the boot parameters read only mode will be disabled. See Immutable setup for more options.

The derivative will boot into RW mode, that means any change made during runtime will persist across reboots. Use this feature with caution as defeats the concept of immutability.

rd.cos.debugrw applies only to active and passive partitions. The recovery image can’t be mutated.

Debug initramfs issues

As derivative can ship and build their own initrd, the official debug docs contains valid information that can be used for troubleshooting.

For example:

  • rd.break=pre-mount rd.shell: Drop a shell before setting up mount points
  • rd.break=pre-pivot rd.shell: Drop a shell before switch-root

Recovery partition

If you can boot into the system, the recovery partition can be used to reset the state of the active/passive, but can also be used to upgrade to specific images. Be sure to read the Recovery section in the docs.

Mutating derivative images

It can be useful to mutate derivative images and commit a container’s file changes or settings into a new image. This allows you to debug a container by running an interactive shell, and re-use the mutated image in Elemental systems. Generally, it is better to use Dockerfiles to manage your images in a documented and maintainable way. Read more about creating bootable images.

Let’s suppose we have the derivative original image at $IMAGE and we want to mutate it. We will push it later with another name $NEW_IMAGE and use it to our node downstream.

Run the derivative image locally, and perform any necessary change (e.g. add additional software):

$> docker run --entrypoint /bin/bash -ti --name updated-image $IMAGE

Commit any changes to a new image $NEW_IMAGE:

$> docker commit updated-image $NEW_IMAGE

And push the image to the container registry:

$> docker push $NEW_IMAGE

In the derivative then it’s sufficient to upgrade to that image with elemental upgrade:

$> elemental upgrade --docker-image $NEW_IMAGE

Adding login keys at boot

To add users key from the GRUB menu prompt, edit the boot cmdline and add the following kernel parameters:

stages.boot[0].authorized_keys.root[0]=github:suse


Last modified September 13, 2024: Implement state subcommand (#2182) (fa2306d63)