Citrix Hypervisor 8.1 released





  • Interesting news ā˜ŗ

    But the improvements in export/import should be more amazing with the zstd from XCP-ng :
    The reduction in the time it takes to import or export a VM depends on the specific hardware of the machine. Reductions of 30% to 40% are common. Reductions of 30% to 40% are common šŸ˜



  • Can their improvements be combined with the ones made by XCP-ng for even better performance?


  • XCP-ng Team

    @marekm we'll do test to see if it doesn't interfere with compression, but I suppose it's not, so yes šŸ™‚



  • How strange ... I didn't see any official announcements and they seem to have removed the documentation page for 8.1. I also couldn't find the links to download inside my Citrix account.


  • XCP-ng Team

    @_danielgurgel the documentation was posted online by mistake. It's not released yet.



  • I was able to download the PDF with the documentation of 8.1. Happy for Xen 4.13 and WLB integrated with XenCenter...

    But I was sad that they didn't evolve with GFS2 and removed DMC.


  • XCP-ng Team

    1. Xen 4.13 in a RC version because it's not yet released šŸ˜›
    2. You have a WLB-like in Xen Orchestra since a while now šŸ˜‰
    3. DMC removed? As a feature in some edition or everywhere?


  • @olivierlambert
    Notes:
    ā€¢ Dynamic Memory Control is deprecated in Citrix Hypervisor 8.1 and will be removed in a
    future release.

    See file.. https://gofile.io/?c=xRuFy8 (citrix-hypervisor-8.1.pdf)



  • Interesting... I wanted to post it as news, but it popped up as existing (similar...) - so it seems it's officially out now!
    I don't see what Xen 4.13 brings to us. We're still on the LTSR track and wait for Vates to get official support by HPE. šŸ˜œ

    They say things about storage performance improvements:
    Multipage support is now available in non-GFS2 SRs for better storage performance.

    I'm curious about what people will report back - and when XCP 8.1 comes out. šŸ˜œ


  • XCP-ng Team

    @cg Yeah I'll reping HPE again.



  • @_danielgurgel

    I'm honestly looking forward to the removal of DMC. It has caused more issues for me than it offers benefits šŸ¤·
    I can see how this can cause problems for those who relied on it to over subscribe memory resources though.

    Also noticed they are deprecating the vSwitch Controller. šŸ˜–

    @olivierlambert do you and the team have any plans to offer a solution that may fulfill some of the missing functions from the vSwitch Controller like VM Access Control List (ACL) rules or any other types of ACLs for network traffic as part of the SDN plug-in or some other plug-in?


  • XCP-ng Team

    @GHW We don't have plan because we don't know what people want more than what we released in our SDN controller plugin. Feel free to share specs on what you need so we can review how long it could take to make it real.



  • Do you mean that Dynamic Memory (balooning) won't be available in XCP-ng 8.1?



  • @GHW I agree ... they failed to apply the same level of reliability during live migration as VMWare has ...



  • I saw, they announced that it will become obsolete, but they did not announce whether there will be a replacement or not.
    We will have to wait for the next chapters.

    They might well say what the possible future plans are.



  • @olivierlambert at this time the only feature that I was interested in is the VM level access control list function

    I was working on a plan to build a pool with an internal network and an external network connected directly to the Internet. I wanted a central solution for controlling IP and port access for VMs on the external network and after much research and planning I ended with the vSwitch controller despite its annoying dependency on IE.

    The main reason I was planning to settle with the vSwitch controller was because of its ability to enforce the access control list policy. The other ideas I entertained were:

    • Set iptable rules within the VM....but if a user changes the rule set or disables the firewall then it no longer matches the approved/required policy

    • Use and automation tool like Ansible....but it also faces an issue if the user changes the rule set or disables the firewall within the VM

    • Searched for paid solutions(software and/or SaaS) that could achieve this task....I did find one solution that claimed to offer just that but it seems the company behind it is no longer active. I also found other solutions that offer it as part of a bigger $100K type solution that is currently out of scope budget wise

    In the end I was planning to settle with the vSwitch controller because I found no other viable solution and it can enforce the rule set/policy outside of the VM's control space....until I saw the plans to deprecate the feature šŸ˜ž



  • I'm not happy to see DMC dropping, but even more removal of "VSS and quiesced snapshots" is sad.
    It's probably one more step from general Hypervisor solution to VDI, as it's not really important there, but if you have DB servers etc...


  • XCP-ng Team

    @GHW It's far from the DVSC idea (iptables for the VM, Ansible etc.). Can you be more specific on exact features you liked in DVSC? (how it worked and ideally the process)

    @cg we have a solution coming for that (backup and restore with RAM)



  • @olivierlambert the idea of iptables for the VM, Ansible etc. were just other options I looked into as alternatives because DVSC was not my first choice option due to its limitations of only supporting IE and the "heavy" DVSC appliance

    The specific feature that I wanted to use is the "Access Control policies" to achieve something similar to AWS security groups. https://docs.citrix.com/en-us/citrix-hypervisor/vswitch-controller/virtual-network-visibility.html#set-up-access-control-policies



  • @GHW @olivierlambert The Access Control lists in the DVSC instance was easily one of its most powerful and useful features. It essentially turned the DVS into an actual port-level security capable virtual switch. If it had full-featured routing, it would have been a very nifty solution to layer 3 in the virtual network space without having to run an entirely different appliance to achieve that capability. Perhaps that is something that the SDN could do at some point? (become a layer 3 capable switch with security access control)


Log in to reply
 

XCP-ng Pro Support

XCP-ng Pro Support