Global Moderators

Forum wide moderators

Posts

  • RE: XCP-ng 8.3 updates announcements and testing

    @Andrew Does restarting the toolstack bring the stats back?

    CC @Team-XAPI-Network

    Regarding coretemp, @r1's module doesn't work anymore with Xen 4.17. See https://github.com/xcp-ng/xcp/issues/669. A possible workaround is using IPMI readings, when available. For a better solution, there's work needed in Xen.

    (CC @Team-Hypervisor-Kernel, FYI)

  • RE: vm.restart - meaning of various options

    @archw Since the jobs settings give you an automatic direct access to the API methods, the parameters are not documented, unfortunately. Regarding vm.restart, force will hard-reboot the VM instead of going through the guest tools and bypassBlockedOperation will restart the VM even if you enabled "Protect against accidental shutdown" in the VM's advanced tab.

  • RE: XCP-ng 8.3 updates announcements and testing

    said in XCP-ng 8.3 updates announcements and testing:

    here are the pre-release ISO images for a refreshed XCP-ng 8.3 installer

    Last call 🙂

  • RE: XCP-ng 8.3 updates announcements and testing

    A few days late because internal tests led to a few fixes, here are the pre-release ISO images for a refreshed XCP-ng 8.3 installer:

    https://repo.vates.tech/tmp/

    $ cat SHA256SUMS
    22deae59e7c5cff7d4691c447af9dbf27b29a372748c1844c280bdc212ef2a5f  xcp-ng-8.3-20250606-linstor-upgradeonly.pre3.iso
    9a5dcc8d98949ee207d28307b8b94320d1ffd24841e34ca74e1c0f0422e5ecab  xcp-ng-8.3-20250606-netinstall.pre3.iso
    4d6f5a99da0d70920bc313470ad2b14decab66038f0863ca68a2b81126ee2977  xcp-ng-8.3-20250606.pre3.iso
    
    1. No need to upgrade XCP-ng 8.3 with these. It is not a new release. It's refreshed installation images, with all updates included.
    2. When we release them, at the same time, XCP-ng 8.3 will be officially labeled LTS. Again, the existing XCP-ng 8.3 that you already use. Not a new XCP-ng release.
    3. This is also when XOSTOR becomes officially supported in XCP-ng 8.3 🎉.
    4. 8.2 to 8.3 upgrade with XOSTOR required a specific treatment, to get a compatible LINSTOR version installed on upgrade. This constraint we had to handle was caused by Linstor not supporting rolling upgrade. For this, we provide a dedicated upgrade ISO (-linstor-upgradeonly). After the upgrade, if there are available updates in 8.3 for linstor, then you can follow the usual update process (which also contains specific steps for XOSTOR such as updating linstor-satellite first on all hosts and restarting the services on all of them, still due to linstor not supporting rolling update. That's something that XOA's RPU handles automatically since a few releases, by the way).
    5. Some packages are slightly newer in the ISOs than in 8.3's update repositories. The only reason is because I didn't want to push updates so soon right after the previous batch, so that XOA doesn't tell you that you are outdated and need to update. But of course these updates will also come to existing XCP-ng 8.3 hosts soon. They're not just for the ISOs.
    6. The netinstall ISO image will pull the original 8.3.0 packages at the moment, so if you want to use it you first need to create a netinstall reposistory somewhere by extracting the full installation ISO, and point at it.

    Regarding testing we are interested on all kind of feedback. Installations, upgrades with and without XOSTOR, and everything you want to test that seems pertinent to ensure there are no regressions when compared to the original 8.3.0 installation ISOs.

  • RE: XSA-468: multiple Windows PV driver vulnerabilities - update now!

    said in XSA-468: multiple Windows PV driver vulnerabilities - update now!:

    @Tristis-Oris

    1. We do plan a way to remove the warning for VMs that you would choose.

    That's now done and will be included in the next update to the latest update channel for XOA. VMs with the HIDE_XSA468 tag will not be included in the vulnerability detection.

  • RE: Email to Sales Team Bouncing Back as SPAM

    Thanks for letting us know. I've passed the information on to our IT staff. In the interim, you should be able to respond to that ticket by accessing the support portal at https://xen-orchestra.com/#!/member/support

  • RE: XSA-468: multiple Windows PV driver vulnerabilities - update now!

    @Andrew I've thought about it and I agree on the principle as there's already a section about guest tools there, but we have put enough pressure on the XO team to make them release the helpful features in time to help users detect vulnerable VMs, on XOA's stable update channel, so it might be wiser to wait for XO6 for such alert to be in a centralized place about guest tools.

    CC @lsouai-vates