XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    vm import hangs, and does not complete

    Scheduled Pinned Locked Moved Management
    16 Posts 4 Posters 1.4k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • DanpD Offline
      Danp Pro Support Team
      last edited by

      Hi... It appears that you are using XO built from the sources. When did you last update?

      J 1 Reply Last reply Reply Quote 0
      • J Offline
        Jonathon @Danp
        last edited by

        @Danp

        Recently
        f4c40f74-ea73-4808-909d-a1fbd2843a7c-image.png

        1 Reply Last reply Reply Quote 0
        • olivierlambertO Offline
          olivierlambert Vates 🪐 Co-Founder CEO
          last edited by

          You need to get the latest commit on master in any case, even if you are "only" 6 commits behind, it's still needed to be on HEAD to help you 🙂

          J 1 Reply Last reply Reply Quote 0
          • J Offline
            Jonathon @olivierlambert
            last edited by

            @olivierlambert Done, no change in behaviour. Still nothing in Tasks or Logs pages.
            b75e0321-5cd5-430c-a1fa-a0c215012d95-image.png

            1 Reply Last reply Reply Quote 0
            • olivierlambertO Offline
              olivierlambert Vates 🪐 Co-Founder CEO
              last edited by

              What's your node version?

              J 1 Reply Last reply Reply Quote 0
              • J Offline
                Jonathon @olivierlambert
                last edited by

                @olivierlambert

                $ node --version
                v18.17.1
                
                1 Reply Last reply Reply Quote 0
                • J Offline
                  Jonathon
                  last edited by

                  OMG, it is somehow Cloudflare zero trust access.

                  We have our XOA behind ZT, so on a whim I tried importing the vm export directly in our internal network, and it works.

                  Sorry for the goose chase, maybe this will help someone in the future. May update this when we have some better idea of what the problem actually is.

                  1 Reply Last reply Reply Quote 0
                  • olivierlambertO Offline
                    olivierlambert Vates 🪐 Co-Founder CEO
                    last edited by

                    So Cloudflare cut the HTTP connection? Oo

                    J 1 Reply Last reply Reply Quote 0
                    • J Offline
                      john.c @olivierlambert
                      last edited by john.c

                      @olivierlambert @Jonathon It must be that your system's connection to the instance (from Internet over Cloudflare's Zero Trust service) violates one of the principals of Zero Trust (ZT). It likely be the workloads part of "Automate Context Collection And Response".

                      Especially given that you were accessing XOA and importing a VM. If the VM being imported is too great a risk, under ZT then disconnect (cut the connection), to stop the risky operation from proceeding and spreading across the rest of the network.

                      Especially if the VM is an unknown quantity, such as a bespoke VM specific to your business, or home lab.

                      It may be worth bringing Cloudflare into this conversation, as given the size of Vates so that XOA and XCP-ng can be prepped for ZT. As likely operations for VM Importing violates a principle of ZT and/or Cloudflare's implementation of such.

                      There maybe other places where XOA violates ZT principals, so maybe worth having the code audited and validated for vulnerabilities and certified for ZT readiness.

                      https://www.cloudflare.com/en-gb/zero-trust/
                      https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

                      1 Reply Last reply Reply Quote 0
                      • olivierlambertO Offline
                        olivierlambert Vates 🪐 Co-Founder CEO
                        last edited by

                        I'm pretty much certain that CloudFlare has no idea whatsoever about what's happening (VM import).

                        J 1 Reply Last reply Reply Quote 0
                        • J Offline
                          john.c @olivierlambert
                          last edited by john.c

                          @olivierlambert No they most likely would have an idea, due to the cut off! As the workloads and principles and implementation of Zero Trust requires a real-time visibility into 100s of user and application identity attributes, as well as workloads.

                          Then to implement the appropriate response (cut the connection or another response) if the risk is too high, requires enough data and also records to maintain compliance with regulatory security standards.

                          @Jonathon Checkout and gather the logs on the Cloudflare account dashboard for that instance of the ZT service. It may contain further information about the cut connection, if you can't interpret it then Cloudflare support may be able to help.

                          1 Reply Last reply Reply Quote 0
                          • olivierlambertO Offline
                            olivierlambert Vates 🪐 Co-Founder CEO
                            last edited by

                            Do you have any proof on that? VM import is XO is very specific and still a niche product, I'll be surprised that CF has any idea on what's going on except a surge of traffic.

                            J 1 Reply Last reply Reply Quote 0
                            • J Offline
                              john.c @olivierlambert
                              last edited by john.c

                              @olivierlambert I have asked Jonathon to gather logs for his instance of that Cloudflare ZT service. As it will highly likely contain the evidence, due to the cut off event.

                              Cause if XOA can be used without doing that action, then it was that action which caused this via CloudFlare ZT.

                              Then there's the situation that XOA is a niche product (your words), as thus in this case it may be relatively unknown. So something unknown is likely considered highly risky, especially if the operation (process) is highly risky. Importing a new VM and if it is of something unknown then it's also highly risky.

                              This is re-enforced by the fact that they were able to import the VM internally without going over Cloudflare's ZT service.

                              So if the risk factor reaches a certain limit (specific to the service and account) then cut off (drop) the connection, to secure the network.

                              1 Reply Last reply Reply Quote 0
                              • J Offline
                                Jonathon
                                last edited by

                                I do not see any logs or admin panel that insinuates that it is actively being blocked.

                                J 1 Reply Last reply Reply Quote 0
                                • J Offline
                                  john.c @Jonathon
                                  last edited by john.c

                                  @Jonathon @olivierlambert If it is not being blocked, then it may be their efforts to prevent node saturation by moving from node to node. What plan are you on, is it the free one?

                                  If so then this movement will occur more frequently as they move from node to node roughly around every 5-10 minutes. So will experience this loss (timeout) of connection on a regular basis! With a paid plan its much less frequently, also the Cloudflare ZT support team with detailed logs may be able to aid in stabilising connectivity.

                                  https://community.cloudflare.com/t/my-remote-users-drop-at-least-5-times-a-day-randomly/474817
                                  https://community.cloudflare.com/t/cloudflare-ssh-proxy-dropping-connections/397306

                                  Their minimum paid plan with 100% uptime and SLA is the "Pay-as-you-go" plan. So if your going to be carrying out actions in XOA regularly over a remote connection, which need to have a long timeout then a paid plan would pay for itself.

                                  1 Reply Last reply Reply Quote 0
                                  • olivierlambertO olivierlambert moved this topic from Xen Orchestra on
                                  • First post
                                    Last post