XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    vm import hangs, and does not complete

    Scheduled Pinned Locked Moved Management
    16 Posts 4 Posters 1.4k Views 4 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • J Offline
      Jonathon @olivierlambert
      last edited by

      @olivierlambert

      $ node --version
      v18.17.1
      
      1 Reply Last reply Reply Quote 0
      • J Offline
        Jonathon
        last edited by

        OMG, it is somehow Cloudflare zero trust access.

        We have our XOA behind ZT, so on a whim I tried importing the vm export directly in our internal network, and it works.

        Sorry for the goose chase, maybe this will help someone in the future. May update this when we have some better idea of what the problem actually is.

        1 Reply Last reply Reply Quote 0
        • olivierlambertO Offline
          olivierlambert Vates 🪐 Co-Founder CEO
          last edited by

          So Cloudflare cut the HTTP connection? Oo

          J 1 Reply Last reply Reply Quote 0
          • J Offline
            john.c @olivierlambert
            last edited by john.c

            @olivierlambert @Jonathon It must be that your system's connection to the instance (from Internet over Cloudflare's Zero Trust service) violates one of the principals of Zero Trust (ZT). It likely be the workloads part of "Automate Context Collection And Response".

            Especially given that you were accessing XOA and importing a VM. If the VM being imported is too great a risk, under ZT then disconnect (cut the connection), to stop the risky operation from proceeding and spreading across the rest of the network.

            Especially if the VM is an unknown quantity, such as a bespoke VM specific to your business, or home lab.

            It may be worth bringing Cloudflare into this conversation, as given the size of Vates so that XOA and XCP-ng can be prepped for ZT. As likely operations for VM Importing violates a principle of ZT and/or Cloudflare's implementation of such.

            There maybe other places where XOA violates ZT principals, so maybe worth having the code audited and validated for vulnerabilities and certified for ZT readiness.

            https://www.cloudflare.com/en-gb/zero-trust/
            https://www.crowdstrike.com/cybersecurity-101/zero-trust-security/

            1 Reply Last reply Reply Quote 0
            • olivierlambertO Offline
              olivierlambert Vates 🪐 Co-Founder CEO
              last edited by

              I'm pretty much certain that CloudFlare has no idea whatsoever about what's happening (VM import).

              J 1 Reply Last reply Reply Quote 0
              • J Offline
                john.c @olivierlambert
                last edited by john.c

                @olivierlambert No they most likely would have an idea, due to the cut off! As the workloads and principles and implementation of Zero Trust requires a real-time visibility into 100s of user and application identity attributes, as well as workloads.

                Then to implement the appropriate response (cut the connection or another response) if the risk is too high, requires enough data and also records to maintain compliance with regulatory security standards.

                @Jonathon Checkout and gather the logs on the Cloudflare account dashboard for that instance of the ZT service. It may contain further information about the cut connection, if you can't interpret it then Cloudflare support may be able to help.

                1 Reply Last reply Reply Quote 0
                • olivierlambertO Offline
                  olivierlambert Vates 🪐 Co-Founder CEO
                  last edited by

                  Do you have any proof on that? VM import is XO is very specific and still a niche product, I'll be surprised that CF has any idea on what's going on except a surge of traffic.

                  J 1 Reply Last reply Reply Quote 0
                  • J Offline
                    john.c @olivierlambert
                    last edited by john.c

                    @olivierlambert I have asked Jonathon to gather logs for his instance of that Cloudflare ZT service. As it will highly likely contain the evidence, due to the cut off event.

                    Cause if XOA can be used without doing that action, then it was that action which caused this via CloudFlare ZT.

                    Then there's the situation that XOA is a niche product (your words), as thus in this case it may be relatively unknown. So something unknown is likely considered highly risky, especially if the operation (process) is highly risky. Importing a new VM and if it is of something unknown then it's also highly risky.

                    This is re-enforced by the fact that they were able to import the VM internally without going over Cloudflare's ZT service.

                    So if the risk factor reaches a certain limit (specific to the service and account) then cut off (drop) the connection, to secure the network.

                    1 Reply Last reply Reply Quote 0
                    • J Offline
                      Jonathon
                      last edited by

                      I do not see any logs or admin panel that insinuates that it is actively being blocked.

                      J 1 Reply Last reply Reply Quote 0
                      • J Offline
                        john.c @Jonathon
                        last edited by john.c

                        @Jonathon @olivierlambert If it is not being blocked, then it may be their efforts to prevent node saturation by moving from node to node. What plan are you on, is it the free one?

                        If so then this movement will occur more frequently as they move from node to node roughly around every 5-10 minutes. So will experience this loss (timeout) of connection on a regular basis! With a paid plan its much less frequently, also the Cloudflare ZT support team with detailed logs may be able to aid in stabilising connectivity.

                        https://community.cloudflare.com/t/my-remote-users-drop-at-least-5-times-a-day-randomly/474817
                        https://community.cloudflare.com/t/cloudflare-ssh-proxy-dropping-connections/397306

                        Their minimum paid plan with 100% uptime and SLA is the "Pay-as-you-go" plan. So if your going to be carrying out actions in XOA regularly over a remote connection, which need to have a long timeout then a paid plan would pay for itself.

                        1 Reply Last reply Reply Quote 0
                        • olivierlambertO olivierlambert moved this topic from Xen Orchestra on
                        • First post
                          Last post