Last weekend I had tested my new pool with XCP-NG 8.2.1 with apcupsd and the scripts I have found and later modified to my needs. (We use vAPPs groups to manage the start and stop order and timing of most VMs.)
We have a two node pool with the HA-Lizard extention.
(DELL R6515 / AMD EPYC 7313P 16-Core Processor)
We use a APC Smart-UPS RT 8000 RM XL online ups.
We communicate via NIC /snmp.
The shutdown script will shutdown first the vAPP group, second allremaining VMs third the slave host and finally the master host.
The test was performed twice and finally with the expected result.
However, as I have disovered some missing point in the test preparation, (daemon was not enabled, server BIOS no restart after AC loss selected), I have to repeat the test once again in the next two weeks.
I am sure that this will not change anything on the success of this solution and as Alexander has also confirmed that apcupsd is the most straightforward way I vote also for it.
I setup a Windows 10 VM, changed the passthrough and installed plex server and it's able to do a hardware transcoding. So it looks like the passthrough of the gpu is working but for some reason debian through a docker isn't seeing it properly.
Citrix Hypervisor supports Intel’s virtual GPU (GVT-g), a graphics acceleration solution that requires no additional hardware. It uses the Intel Iris Pro feature embedded in certain Intel processors, and a standard Intel GPU driver installed within the VM.
However, they don't actually offer a guide on HOW to set this up besides offering some tips on how to setup BAR in the UEFI settings to change how many vGPU's it will support. I've enabled Above 4G Decoding, Re-size BAR Support and set the Aperture Size to 512MB but that doesn't seem to enable the vGPU options XCP-ng Center or XO. I'm assuming I need to enable it manually on the underlying OS before XCP-ng can see it.
Note that the Intel GPU pass through is GVT-d NOT GVT-g. If you use GVT-d (AKA, just your regular PCIe pass through) obviously then I wouldn't be able to use the GPU for the the XCP-ng console on the machine itself. I'm comfortable on how to set that up but I really need the console available on the hypervisor for my use case.
This video (in German) demonstrates setting it up in XCP-ng center.
According to your message, we revised the documentation about the tools, especially for Ubuntu.
We advise you to ask the Ubuntu packagers to update the package since they are responsible for doing so.
Perhaps they need more specific details about how crucial these tools are for XCP-ng users as well as Xen users.
New tools will be created on our end to make packaging easier, but it will take some time before they show up in a repository.
It is a long-term improvement among others.
Secure Boot was not enabled in the VM. I enabled Secure Boot in the VM and was able to install KB5012170 without any problem.
I tested further to see if there were any issues related to enabling then disabling Secure Boot in the VM. I did not experience any problems booting the VM after disabling Secure Boot. There were no problems booting the VM after moving it to a pool where the default UEFI Certificates had not been installed.
For anyone wanting to resolve the KB5012170 update error, here are the steps I took:
On the pool/host for the VM, install the UEFI Certificates with secureboot-certs install
Shut down the problem VM
Enable Secure Boot on the VM. I do this via Xen Orchestra but it can also be done with xe vm-param-set uuid=[uuid of VM] platform:secureboot=true
Boot the VM
Apply the KB5012170 update
Shut down the VM
Disable Secure Boot on the VM via XO or xe vm-param-set uuid=[uuid of VM] platform:secureboot=false
Boot the VM