XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    XCP-ng 8.3 betas and RCs feedback πŸš€

    Scheduled Pinned Locked Moved News
    792 Posts 89 Posters 1.3m Views 69 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • W Offline
      wilsonqanda @stormi
      last edited by wilsonqanda

      @stormi I believe this reply is for me as well. Just finish moving the copy of a VM over to a new XCP-ng system and fresh installed 8.3b with latest patch updates. Still fail. Right afterward i added the suggested code below and the countdown work instantly. Thanks!!!

      yum downgrade edk2
      

      Note: The "edk2" package is related to the UEFI firmware used by the virtualization platform.

      This work great for now. Once official release 8.3 non-beta hopefully it will be resolved. A happy early Christmas present for me thanks!

      1 Reply Last reply Reply Quote 0
      • stormiS Offline
        stormi Vates πŸͺ XCP-ng Team
        last edited by

        So despite dissimilar symptoms, this worked for both of you. We'll investigate this in January then!

        exeticoE W 2 Replies Last reply Reply Quote 2
        • exeticoE Offline
          exetico @stormi
          last edited by exetico

          @stormi I've hold back my fingers, and didn't press the "reboot button".

          But, if I need to, will downgrading edk2 make anything break? I guess my pfSense instance will fail after a reboot (like described), so... Hopefully I don't need to reboot my host in the next weeks πŸ˜…? Maybe it's a good idea to note, to not push a update like this, so close to Christmas.

          Happy Christmas, and Merry New Year πŸ¦†πŸŽ†.

          stormiS W 2 Replies Last reply Reply Quote 0
          • stormiS Offline
            stormi Vates πŸͺ XCP-ng Team @exetico
            last edited by

            @exetico edk2 was initially updated by XenServer to fix a VNC console corruption when vGPU was in use. As we don't support vgpu at the moment (it requires proprietary components), I doubt going back to the previous known to work version will cause any regressions. But there's always some risk.

            1 Reply Last reply Reply Quote 1
            • W Offline
              wilsonqanda @stormi
              last edited by wilsonqanda

              FYI for anyone doing this the snippet of code on a 1 host 1 pool configuration no issue. If you run this code on a multiple hosts in 1 pool configuration make sure to run it all on each host that is affected by the update.

              1 Reply Last reply Reply Quote 0
              • W Offline
                wilsonqanda @exetico
                last edited by

                @exetico it didnt break for me lol and all 4 of my xcp-ng and multiple pfsense VMs

                1 Reply Last reply Reply Quote 1
                • W Offline
                  wilsonqanda
                  last edited by wilsonqanda

                  Though as an FYI it is annoying but it show that single upgrade needed in the pool lol πŸ™‚ that you just downgrade lol. So best not to upgrade until it is resolved in the 1st place. FYI cant move the vm even to another version of 8.3b (original iso version) that doesn't have the updated 12/21 patches as it's not same version.

                  Obviously after the HOSTs in the pool are updated (patch 12/21) VMs can be migrated but they all need to be on same version.

                  I thought 8.3b can migrate between all 8.3b of various updates but definitely not the case here. Which I think is a pretty big issues but oh well.

                  1 Reply Last reply Reply Quote 0
                  • A Offline
                    archw @wilsonqanda
                    last edited by

                    @wilsonqanda Stormi found the issue with edk2 and got me running!

                    W 1 Reply Last reply Reply Quote 0
                    • W Offline
                      wilsonqanda @archw
                      last edited by

                      @archw Thanks for the update yep he got me working as well. It works like a charm πŸ™‚

                      1 Reply Last reply Reply Quote 0
                      • stormiS Offline
                        stormi Vates πŸͺ XCP-ng Team
                        last edited by stormi

                        New batch of updates for XCP-ng 8.3 beta

                        So, as several already found out, I pushed many updated packages to XCP-ng 8.3's RPM repositories at the same time. This is the result of the last six months of work on XCP-ng 8.3.

                        Changes coming from XenServer

                        This update includes everything published by XenServer between the release of XCP-ng 8.3 Beta1 and October 2023. Newer changes will be brought in after Beta2.

                        I am a bit late and sadly don't have time now to detail all their changes, but the most important one is maybe completion of vTPM support (and thus compatibility with Windows 11). Previously, it would work, but many features were still missing. Now, snapshots, VM export/import and live migration all are supported for UEFI VMs with a vTPM. A Windows 11 template is available, which will transparently create the required vTPM when you create a new VM.

                        Changes coming from XCP-ng

                        On XCP-ng's side, in no particular order:

                        • We rebased all packages on XenServer 8 preview + all updates up to early October.
                        • Installer
                          • rebased on latest upstream release.
                          • better granularity in error messages displayed to users when install fails due to wrong system date, signature issues, etc.
                          • re-allow interactive installation of driver disks on host during installation.
                          • Avoid failed services in the installer (there were benign "failed" messages for services the installer doesn't actually use)
                        • IPv6 support continued
                          • IPv6 testing / automated tests. Not run automatically on our internal CI yet due to setup difficulties.
                          • Fixed live migration failure due to upstream bug in ocaml-uri. Fix contributed upstream to ocaml-uri.
                          • Allow to use a CIDR for VIFs IPv4 and IPv6 allowed IPs. Feature contributed upstream to XAPI project.
                          • xsconsole : allow to configure IPv6 via autoconf for the management interface. Feature contributed upstream to XAPI project.
                        • Making XOSTOR available in XCP-ng 8.3. Another update is pending, so better wait for it.
                        • Installer image generation: fixes and improvements.
                        • VLAN display in xsconsole. Feature contributed upstream to XAPI project.
                        • smartmontools updated to version 7.
                        • Plugin added to use the data from smartmontools 7 in JSON format (initially contributed by CΓ©cile, then improved by one of our developers)
                        • Debian 12 template added.
                        • Security fixes. However, no security fix was made to XCP-ng 8.3 in the last weeks, while we were busy testing and stabilizing.
                        • Added new tests to our test suite. For example this new test which exercises the vTPM features. Windows 11 is now also tested in our CI/CD.
                        • Deleted the old, unsupported since XCP-ng 8.1, experimental EXT4 driver. We're talking about an old experimental driver that you never used unless you installed the experimental packages in the XCP-ng 7.x era.
                        • As in 8.2.1, lsscsi added to our repositories.
                        • As in 8.2.1, more alternate drivers packaged.
                        • As in 8.2.1, drivers updated and added to default installation: mpi3mr, igc, r8125 (+firmware)
                        • xo-lite RPM added and installed by default.
                        • UEFI and SecureBoot support:
                          • The version of XAPI included in XCP-ng 8.3 after Beta1 provides a new way to handle UEFI certificates at the pool level, implemented by XenServer developers while trying to take both their and our needs into account.
                          • We then adapted the automated tests for XCP-ng 8.3, based on new XAPI behaviour.
                          • Running the adapted tests revealed issues (one bug, but also more importantly that we did not fully understand each other regarding XCP-ng's needs). So we proposed a new design to the XAPI project, then implemented it. This hopefully concludes more than a year of intermittent work on this very topic.
                          • From a user standpoint, despite all the work behind the scene, there aren't many changes. Mostly retaining the ability we had in XCP-ng 8.2.1 for users to download and install the default certificates from Microsoft (must run secureboot-certs install at least once on the pool after this update), or install their own.
                        • Various diagnoses and fixes.

                        Known issues

                        Several users reported issues with UEFI support. UEFI, again! Just when we thought we were done with it. According to what we found out together, the issue is not related to the changes I was mentioning above, which are limited to certificate management. Here, it's apparently a piece of software emulating a UEFI firmware for VMs, edk2, which regressed in some situations.

                        So, the current situation, as I know it today:

                        • For various users, it works, but it looks like pfSense (and maybe FreeBSD) in a UEFI VM has trouble starting.
                        • In our internal tests, UEFI works for all the OSes we tested. But currently FreeBSD is only tested in BIOS mode, so we wouldn't have seen it. We'll improve our test coverage.
                        • For one user, it manifested in a way that no UEFI VM would ever start, whatever the OS.

                        For now, the workaround is to downgrade the component which seems faulty, on every host: yum downgrade edk2-20180522git4b8552d-1.5.1.xcpng8.3. Note that Xen Orchestra, or yum update, will attempt to reinstall the more recent version of the package, so better avoid updating again until we've solved these issues.

                        Updated installer (XCP-ng 8.3 Beta2)

                        As soon as any remaining blockers are lifted, this batch of updates will also be released in a XCP-ng 8.3 Beta2 installation ISO image.

                        You may download a test build of the installation ISOs: https://mirrors.xcp-ng.org/tmp/xcp-ng-8.3.0-beta2-test2.iso

                        SHA256SUM: 11ed1ca5d757177e0edab6c7a7a371306e3ddcdfab7df62b6f076e527a7a5015

                        /!\ The netinstall repository won't be updated until Beta2 is released, so any network installation using the main mirrors will actually install XCP-ng Beta1, not Beta2.

                        J 0nelight0 2 Replies Last reply Reply Quote 4
                        • J Offline
                          john.c @stormi
                          last edited by john.c

                          @stormi Is it possible to pull the bad edk2 package or at least for problematic systems send a package update which excludes in yum the bad update package of edk2?

                          Any way I have suggested to the developers of dnf to implement some kind of compatibility hold system, or possibility of a bad packages list file for repository meta-data. This info would be used by default (though overridable) when using dnf install and dnf update, so bad packages are automatically excluded from installation and/or system updates.

                          In principal it would operate in a similar fashion to how dandelions hold onto bad seeds, to keep them from spreading. So a bad packages list would be used by rpm repositories and dnf to keep from spreading the bad packages to more systems, thus improving system stability, reliability and/or preventing regressions.

                          If you wish to give update or assistance on implementing this request upstream you can find the issue here (https://github.com/rpm-software-management/dnf/issues/2029). Also may be worth considering and/or working on transitioning to dnf for XCP-ng as well as updating the appropriate parts of the software stack in the hypervisor, and Xen Orchestra.

                          MrGrymReaper created this issue in rpm-software-management/dnf

                          closed Feature Request - Compatibility safe guard holds or bad package meta data list as file. #2029

                          1 Reply Last reply Reply Quote 1
                          • A Andrew referenced this topic on
                          • stormiS Offline
                            stormi Vates πŸͺ XCP-ng Team
                            last edited by

                            We already retain a lot of packages until they pass our internal tests successfully, but at some point we need to get feedback from users, and that's what happened here, revealing at the same time that we need to add pfSense to the OSes we test internally. Better find issues now than after the final release, and retaining packages would limit the amount of testing they receive. There's a known workaround for people who are really stuck, so I didn't pull the package back.

                            1 Reply Last reply Reply Quote 0
                            • stormiS Offline
                              stormi Vates πŸͺ XCP-ng Team
                              last edited by stormi

                              There is a new build of edk2 available for testing. We don't know yet if it fixes all the issues users met, so we need your feedback.

                              Install with:

                              yum update edk2 --enablerepo=xcp-ng-testing,xcp-ng-ci
                              

                              If you need to rollback:

                              yum downgrade edk2-20180522git4b8552d-1.5.1.xcpng8.3
                              

                              I'm especially interested in @archw's feedback, since their issue was not just with pfSense but with any UEFI VM instead. But I'm also interested in feedback from UEFI pfSense users.

                              A A 2 Replies Last reply Reply Quote 2
                              • A Offline
                                Andrew Top contributor @stormi
                                last edited by

                                @stormi New update version edk2-20220801-1.7.3.xcpng8.3.x86_64 fixed my FreeBSD UEFI boot problem (stuck on boot countdown). XCP reboot NOT required after install. Windows 10 and Ubuntu boot correctly also (but did before too). I did not test secure boot or bitlocker.

                                1 Reply Last reply Reply Quote 3
                                • olivierlambertO Offline
                                  olivierlambert Vates πŸͺ Co-Founder CEO
                                  last edited by

                                  Great news πŸ™‚

                                  1 Reply Last reply Reply Quote 0
                                  • M Offline
                                    matt-plan8
                                    last edited by

                                    Hey gents,

                                    Has anyone else noticed that if you have a Win 11 guest (pro or enterprise) with the vtpm, that's Entra (Azure) joined, that when migrating to a diff host it breaks the Azure AD membership?

                                    I'll try to dig up some more specifics and run a more thorough test, but I've run into it twice now on a VM I've been running on my test lab with 8.3 beta. Relatively simple solution, leave Azure domain, rejoin, but I suspect that that the token gets saved in vtpm and is either lost or invalidated by migrating hosts.

                                    1 Reply Last reply Reply Quote 0
                                    • olivierlambertO Offline
                                      olivierlambert Vates πŸͺ Co-Founder CEO
                                      last edited by

                                      That's a good question πŸ€” Are you migrating in the same pool or to a different pool?

                                      M 1 Reply Last reply Reply Quote 0
                                      • M Offline
                                        matt-plan8 @olivierlambert
                                        last edited by

                                        @olivierlambert

                                        Same pool, I have 3 minisforum pc's I've been messing around with to learn XCP-NG, they aren't in a cluster because I got lazy after installation, but are connected via truenas iscsi as central iscsi storage.

                                        Loving the system overall, I could never go back to hyper-v...

                                        I was patching manually by moving machines and then using the gui single host patch button. I had an issue with rolling patches, and didn't really want to bug you guys over it, it's likely user error. Setup is installed from sources.

                                        stormiS 1 Reply Last reply Reply Quote 0
                                        • stormiS Offline
                                          stormi Vates πŸͺ XCP-ng Team @matt-plan8
                                          last edited by stormi

                                          @matt-plan8 I don't understand. Pool and cluster are the same thing. Pool for XCP-ng is what VMWare calls cluster.

                                          M 1 Reply Last reply Reply Quote 0
                                          • M Offline
                                            matt-plan8 @stormi
                                            last edited by

                                            @stormi sorry I consider HA a cluster, pool I consider just a group of machines in the same management domain.

                                            They are in a single pool, they aren't HA

                                            1 Reply Last reply Reply Quote 1
                                            • First post
                                              Last post