XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 updates announcements and testing

    Scheduled Pinned Locked Moved News
    337 Posts 37 Posters 118.0k Views 54 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • G Offline
      Greg_E
      last edited by

      Working on my production system today and I noticed something new.

      Three hosts in a pool, doing a Rolling Pool Update.

      I'm seeing VMs migrate to both available hosts to speed things up, this is not the actions I've seen in the past. Just an interesting thing to see all three host go yellow while it is migrating.

      OK, only happened to evac the third host, evac second host was back to the normal move everything to the same host (#3).

      And not sure why, but the process start to finish on host 1 was faster than the other two, host 1 is coordinator.

      Also of note, there seems to be no place to do a RPU from within XO6.

      1 Reply Last reply Reply Quote 0
      • stormiS Offline
        stormi Vates 🪐 XCP-ng Team
        last edited by

        Thank you everyone for your tests and your feedback!

        The updates are live now: https://xcp-ng.org/blog/2025/12/18/december-2025-security-and-maintenance-updates-for-xcp-ng-8-3-lts/

        A 1 Reply Last reply Reply Quote 3
        • marcoiM Offline
          marcoi
          last edited by

          updates done on my two main servers and one dev box i happen to power on today. so far so good.

          PS: Any way to get the following included on the next update for networking? I need it to run a scenario with opnsense vm. right now i have a script i run manually after rebooting the server.

          ovs-ofctl add-flow xenbr3 "table=0, dl_dst=01:80:c2:00:00:03, actions=flood"

          thanks

          stormiS 1 Reply Last reply Reply Quote 0
          • A Online
            acebmxer @stormi
            last edited by

            @stormi

            In regards to UEFI Secure boot in recent update.

            from pool master host.

            [19:09 xcp-ng-qhfpcnmb ~]# rpm -q varstored
            varstored-1.2.0-3.4.xcpng8.3.x86_64
            
            8.3 with varstored >= 1.2.0-3.4
            Secure Boot is ready to use on new VMs without extra configuration. Simply activate Secure Boot on your VMs, and they will be provided with an appropriate set of default Secure Boot variables.
            
            We will keep updating the default Secure Boot variables with future updates from Microsoft. If you don't want this behavior, you can lock in these variables by using the Manually Install the Default UEFI Certificates procedure.
            

            So new vms nothing is needed to be done. But what about existing vms windows or linux? It it was stated I apologize if i missed it.

            D 1 Reply Last reply Reply Quote 0
            • D Offline
              dinhngtu Vates 🪐 XCP-ng Team @acebmxer
              last edited by

              @acebmxer The Recommended actions section of the guest Secure Boot docs has been updated with our latest recommendations. In short, VMs existing prior to the varstored update will need to have their Secure Boot certificates updated with the Propagate certificates button.

              A 1 Reply Last reply Reply Quote 0
              • A Online
                acebmxer @dinhngtu
                last edited by

                @dinhngtu thank must have read that part with my eyes closed or something. 🤦

                1 Reply Last reply Reply Quote 0
                • stormiS Offline
                  stormi Vates 🪐 XCP-ng Team @marcoi
                  last edited by

                  @marcoi I don't have enough context to reply. You should open a new thread to discuss it, with details about your needs (always better to explain the needs before the technical solution).

                  marcoiM 1 Reply Last reply Reply Quote 0
                  • S Online
                    shorian
                    last edited by

                    Is there any intent to publish the latest xcp-ng 'release' with an XOSTOR iso ? There's an iso for the non-XOSTOR version (xcp-ng-8.3.0-20250606.2.iso) released on 18 Dec 2025, but the latest iso with xostor comparability is xcp-ng-8.3.0-20250616-linstor-upgradeonly.iso released in 16 June 2025.

                    Reason for asking is the last incremental upgrade on 18th Dec partially failed on our pool master and so we need to do a 'clean' upgrade, however there are XOSTOR disks on that machine, and doing a network upgrade after a partial failure and regardless with xostor - is not advised / achievable.

                    Thank you!

                    stormiS 1 Reply Last reply Reply Quote 1
                    • stormiS Offline
                      stormi Vates 🪐 XCP-ng Team @shorian
                      last edited by

                      @shorian Do you mean that you have hosts with XOSTOR that can't boot the installer due to broadcom drivers crashing? That's the only issue the updated ISO addresses.

                      S 1 Reply Last reply Reply Quote 0
                      • S Online
                        shorian @stormi
                        last edited by

                        @stormi All our hosts were fully patched. We then went through the upgrade of Dec 19th. Two (single server) pools updated fine, the master for the primary pool then failed after patching but on reboot - this machine happens to have XOSTOR so doing the upgrade manually and recovering via the ISO is not an option as the ISO is not XOSTOR compatible and the other options available to us (network update etc) are not permitted by the installer due to XOSTOR. We're not using the Broadcom drivers.

                        Installer recognises the old installation, that install was patched and it was the reboot after that caused the problem (no idea why or how) so reluctant to 'upgrade' to the previous install given the patch had completed except for the final reboot.

                        It might be that we can 'refresh' the install using the older version but was nervous of doing so given we'd end up with (potentially) a mash-up of versions of drivers versus data.

                        1 Reply Last reply Reply Quote 0
                        • marcoiM Offline
                          marcoi @stormi
                          last edited by

                          @stormi The original thread is here
                          https://xcp-ng.org/forum/topic/10374/xcp-with-opnsense-vm-running-att-bypass-is-vlan-0-network-possible/14?_=1766094991961

                          1 Reply Last reply Reply Quote 0
                          • marcoiM Offline
                            marcoi
                            last edited by

                            also noticed a new issue- seems like changes i had in the /etc/xensource/usb-policy.conf file for usb was lost during the upgrade.

                            I have some usb comm devices i use with a home assistant VM and they were gone post the upgrade.

                            anyway to make those change last post upgrade? Maybe make then options in gui so a config file can always be reflective of gui settings?

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post