XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.2 updates announcements and testing

    Scheduled Pinned Locked Moved News
    708 Posts 67 Posters 1.1m Views 86 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stormiS Offline
      stormi Vates 🪐 XCP-ng Team
      last edited by stormi

      Update: a new revision of the xcp-ng-pv-tools package now also adds tentative support for:

      • CloudLinux
      • Alpine Linux
      • FreePBX (Sangoma Linux)

      I don't use those myself so I'm counting on community feedback 🙂

      1 Reply Last reply Reply Quote 0
      • stormiS Offline
        stormi Vates 🪐 XCP-ng Team
        last edited by

        November 2019 security update for XCP-ng

        New security update candidates are available (XCP-ng 7.6 and 8.0). As usual, I will only release them to everyone after enough testing, so if you can please install the update candidates.

        Instructions there: https://github.com/xcp-ng/xcp/issues/302

        Please use the github issues to provide feedback so this thread here remains clean.

        But also...

        I'm also still interested in feedback regarding the added support in the guest tools ISO for:

        • CloudLinux
        • Alpine Linux
        • FreePBX (Sangoma Linux)

        ... and the added Debian 10 template. See my post about that https://xcp-ng.org/forum/post/18268 above.

        I'd like to release all updates at the same time if possible.

        stormi created this issue in xcp-ng/xcp

        closed November 2019 security update #302

        stormiS 1 Reply Last reply Reply Quote 1
        • revtelR Offline
          revtel
          last edited by

          Hi Stormi - any chance you could add support for Gentoo Linux?

          1 Reply Last reply Reply Quote 0
          • stormiS Offline
            stormi Vates 🪐 XCP-ng Team
            last edited by

            It's not on my priority list but I'd probably accept a well tested pull request to https://github.com/xcp-ng/xe-guest-utilities/

            1 Reply Last reply Reply Quote 0
            • stormiS Offline
              stormi Vates 🪐 XCP-ng Team @stormi
              last edited by stormi

              @stormi said in Updates announcements and testing:

              November 2019 security update for XCP-ng

              New security update candidates are available (XCP-ng 7.6 and 8.0). As usual, I will only release them to everyone after enough testing, so if you can please install the update candidates.

              Instructions there: https://github.com/xcp-ng/xcp/issues/302

              Please use the github issues to provide feedback so this thread here remains clean.

              The security issues are serious and public, and I haven't had any feedback about the update candidates yet, so I'm doubling my call.

              1 Reply Last reply Reply Quote 0
              • stormiS Offline
                stormi Vates 🪐 XCP-ng Team
                last edited by

                Last chance to test before I release them based only on our internal testing.

                1 Reply Last reply Reply Quote 0
                • stormiS Offline
                  stormi Vates 🪐 XCP-ng Team
                  last edited by

                  Updates published: https://xcp-ng.org/blog/2019/11/08/xcp-ng-security-bulletin-november-2019/

                  1 Reply Last reply Reply Quote 0
                  • ruskofdR Offline
                    ruskofd
                    last edited by ruskofd

                    No problem here, RHEL 8 support for guest tools works as expected (tested on the last RHEL 8.1 release), good job 👌

                    1 Reply Last reply Reply Quote 1
                    • gskgerG Offline
                      gskger Top contributor
                      last edited by

                      Updated a two node XCP-ng 8.0 homelab without any issues 👍

                      1 Reply Last reply Reply Quote 1
                      • marcusrushyM Offline
                        marcusrushy
                        last edited by

                        updates ran with no problems

                        1 Reply Last reply Reply Quote 1
                        • D Offline
                          DreDay
                          last edited by

                          I did the November 2019 updates for XCP-ng 8 on a standalone host as well as a 3 node cluster. No problems so far. 👍

                          1 Reply Last reply Reply Quote 0
                          • stormiS Offline
                            stormi Vates 🪐 XCP-ng Team
                            last edited by

                            Get ready for testing. New (previously unforeseen) security updates are coming soon for testing. You can thank hardware bugs in CPUs (and it's only starting) 🙂

                            1 Reply Last reply Reply Quote 0
                            • stormiS Offline
                              stormi Vates 🪐 XCP-ng Team
                              last edited by

                              Testing: November 2019 security update for XCP-ng, 2nd Impact

                              New security update candidates are available (XCP-ng 7.6 and 8.0). As usual, I will only release them to everyone after enough testing, so if you can please install the update candidates.

                              Instructions there: https://github.com/xcp-ng/xcp/issues/308

                              Please use the github issues to provide feedback so this thread here remains clean.

                              stormi created this issue in xcp-ng/xcp

                              closed Nov 2019 security updates, 2nd impact #308

                              1 Reply Last reply Reply Quote 0
                              • stormiS Offline
                                stormi Vates 🪐 XCP-ng Team
                                last edited by

                                End of WE soon, still interested in feedback for release tomorrow.

                                nmymN 1 Reply Last reply Reply Quote 0
                                • nmymN Offline
                                  nmym @stormi
                                  last edited by

                                  @stormi intel only it seems?

                                  1 Reply Last reply Reply Quote 0
                                  • stormiS Offline
                                    stormi Vates 🪐 XCP-ng Team
                                    last edited by

                                    There's a misunderdstanding when I ask for tests. What hardware you have doesn't really matter. Even if you don't have Intel CPUs, your hosts will receive the updates. So they are impacted. If there are regressions in the updates, you'll be impacted.

                                    That's why what's the most important with all the updates I ask feedback for is not what they fix, it's what they don't break. A large number of "I installed them, things seem to still function normally" is what we really need.

                                    Testing the actual changes the updates bring is a plus, but not a requirement to be able to contribute.

                                    1 Reply Last reply Reply Quote 0
                                    • stormiS Offline
                                      stormi Vates 🪐 XCP-ng Team
                                      last edited by

                                      Security Updates released. Intel hardware again. You'll need to choose between safety and performance regarding one of the flaws if you are running untrusted guests. https://xcp-ng.org/blog/2019/11/18/security-updates-for-intel-hardware/

                                      1 Reply Last reply Reply Quote 0
                                      • stormiS Offline
                                        stormi Vates 🪐 XCP-ng Team
                                        last edited by stormi

                                        I just pushed a bugfix update for XCP-ng 8.0: sm-2.2.3-1.0.3.xcpng8.0.

                                        If fixes a never-ending coalesce issues described at https://github.com/xcp-ng/xcp/issues/298 and https://bugs.xenserver.org/browse/XSO-966

                                        If you had alread applied all the security updates, there's no hurry. You can wait for the next batch of security updates if you don't strictly require the fix. If you apply it alone, no reboot is required. xe-toolstack-restart is enough.

                                        stormi created this issue in xcp-ng/xcp

                                        closed XCP-ng 8.0 / CH 8.0 coalesce issues #298

                                        _danielgurgel_ 1 Reply Last reply Reply Quote 0
                                        • _danielgurgel_ Offline
                                          _danielgurgel @stormi
                                          last edited by

                                          @stormi Thank you!
                                          I'll be applying and validating the patch.

                                          1 Reply Last reply Reply Quote 0
                                          • _danielgurgel_ Offline
                                            _danielgurgel
                                            last edited by

                                            @stormi the update actually solves the problem of zombies process, but the coalesce, all disks after backup/snapshot (removal) still continue with a 1 disk stuck in the leaf chain.

                                            I am also testing the update made available in https://support.citrix.com/article/CTX265619 in an XS 7.1 pool.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post