XCP-ng

    • Register
    • Login
    • Search
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups

    CH 8.2

    News
    ch 8.2
    11
    23
    1687
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • _danielgurgel
      _danielgurgel last edited by

      https://www.citrix.com/blogs/2020/06/25/citrix-hypervisor-8-2-ltsr-is-here/

      1 Reply Last reply Reply Quote 0
      • olivierlambert
        olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

        Yep, likely our next LTS too ๐Ÿ™‚

        1 Reply Last reply Reply Quote 1
        • J
          JeffBerntsen last edited by

          Hopefully, you'll be able to keep some of the features they're deprecating like the vswitch controller.

          olivierlambert 1 Reply Last reply Reply Quote 0
          • olivierlambert
            olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ @JeffBerntsen last edited by

            @JeffBerntsen said in CH 8.2:

            Hopefully, you'll be able to keep some of the features they're deprecating like the vswitch controller.

            Now there's XOA SDN controller ๐Ÿ™‚

            1 Reply Last reply Reply Quote 0
            • S
              saviodsouza last edited by

              What is the average release schedule of xcp-ng ?

              Like how offen there is a new version out major or minor?

              1 Reply Last reply Reply Quote 0
              • olivierlambert
                olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

                For now, it's following CH releases after few months. Time to integrates our changes on top (and remove some bits), and to do so QA on it.

                1 Reply Last reply Reply Quote 1
                • M
                  maxcuttins last edited by

                  I see that CH8.2 will not support anymore Windows7.
                  This seems a wrong move.

                  I guess that XCP-ng will lose Windows7 support too
                  Can you please confirm?

                  Danp 1 Reply Last reply Reply Quote 0
                  • Danp
                    Danp Top contributor ๐Ÿ’ช @maxcuttins last edited by

                    @maxcuttins I could be wrong, but I imagine that existing Windows 7 VMs will continue to function just fine after upgrading to CH 8.2 or XCP-ng 8.2.

                    1 Reply Last reply Reply Quote 0
                    • stormi
                      stormi Vates ๐Ÿช XCP-ng Team ๐Ÿš€ last edited by

                      This will need to be confirmed through testing, but I expect those to keep working. However, if a future update requires windows drivers compatibility-breaking changes, then Windows 7 guest tools might not work anymore. So the days of Windows 7 are counted.

                      M 1 Reply Last reply Reply Quote 0
                      • M
                        maxcuttins @stormi last edited by

                        @stormi Is it impossible to run it with old guest tools?
                        I see many VMs that run old guest tools without issues.

                        1 Reply Last reply Reply Quote 0
                        • stormi
                          stormi Vates ๐Ÿช XCP-ng Team ๐Ÿš€ last edited by

                          What I'm saying is that it will probably still run with older tools... Until someday, I don't know when, where those old tools won't be compatible anymore, like what happened, AFAIK, to Windows XP.

                          1 Reply Last reply Reply Quote 0
                          • M
                            maxcuttins last edited by

                            What about the kernel version?
                            Is it new? ๐Ÿ™‚

                            1 Reply Last reply Reply Quote 0
                            • olivierlambert
                              olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

                              Xen is 4.13.1-9.1 and Dom0 kernel is 4.19.0+1. Not surprising for a Citrix LTS ๐Ÿ™‚

                              1 Reply Last reply Reply Quote 0
                              • M
                                mathsq4 last edited by

                                Since Xen Project released brand new 4.14 version just recent, is it too late to include it in 8.2 XCP-ng release?

                                1 Reply Last reply Reply Quote 0
                                • olivierlambert
                                  olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

                                  @mathsq4 we don't do that. Including a new Xen version is often requiring a lot of work to be sure the API/ABI doesn't break anything, and probably modify stuff around it.

                                  We could always try somehow at some point in testing repo, but it's far harder than you might think in the first place ๐Ÿ™‚

                                  C 1 Reply Last reply Reply Quote 1
                                  • A
                                    adriangabura last edited by

                                    Do you think Ivy Bridge will not work with XCP NG 8.2? ๐Ÿ˜ž I have a homelab and have little desire to retire my xeon ๐Ÿ˜ž

                                    1 Reply Last reply Reply Quote 0
                                    • olivierlambert
                                      olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

                                      Again, nothing will be "blocked". It's just you won't have sec updates on those CPU because Intel stopped to ship fixed microcodes. So Citrix (and us) can't tell you are secure with those anymore (because of Intel)

                                      1 Reply Last reply Reply Quote 0
                                      • M
                                        marekm last edited by

                                        What about future support for old AMD CPUs? I see Opteron 61xx and older support was removed in CH 8.0, are there any known issues with 62xx/63xx/P series that might cause them to become unsupported in the near future?
                                        I rely on used servers mainly for cost reasons, recently moved from Intel to AMD in the hope they will be less insecure (not perfect either, but what is), current 6338P CPUs from 2014 seem to be good enough for now, until shiny new EPYC become cheaper in a few years...

                                        1 Reply Last reply Reply Quote 0
                                        • olivierlambert
                                          olivierlambert Vates ๐Ÿช Co-Founder๐Ÿฆธ CEO ๐Ÿง‘โ€๐Ÿ’ผ last edited by

                                          I have no idea. In general, "Unsupported" means no security patches possible for those old CPUs.

                                          Does those CPUs got NPT? (Nested Page Tables)

                                          1 Reply Last reply Reply Quote 0
                                          • M
                                            marekm last edited by

                                            According to wikipedia: "AMD Opteron CPUs beginning with the Family 0x10 Barcelona line, and Phenom II CPUs, support a second generation hardware virtualization technology called Rapid Virtualization Indexing (formerly known as Nested Page Tables during its development), later adopted by Intel as Extended Page Tables (EPT). " - so that would be since about 2008 or so.

                                            Later there have been some critical microcode updates, 63xx series got one in 2016 (unprivileged guest could crash the host), not sure which older CPUs have this update and which don't.

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post