XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Permissions Make No Sense

    Scheduled Pinned Locked Moved Management
    permissionsmatrixaclgroups
    16 Posts 5 Posters 785 Views 5 Watching
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • D Offline
      DustinB
      last edited by

      I think that Granular Delegated Admin Permissions should be applicable to an environment.

      Starting with the least permissive, being no permission at all
      Then View Only at the pool level
      Then Operator at the pool or host level
      Then Administrator access at the pool or Host level

      The way permissions appear to work today, are the inverse, with requiring administrative permissions on the Pool, even if you only actually have access to a singular host in the pool.

      nikadeN 1 Reply Last reply Reply Quote 0
      • nikadeN Offline
        nikade Top contributor @DustinB
        last edited by

        I think the problem is that as soon as a host is a member of the pool everything created "belongs" to the pool and not the host.
        You'd have to setup a standalone host to be able to achieve what you want since that "single" host would create its own "pool" where itself is the only member.

        D 1 Reply Last reply Reply Quote 0
        • D Offline
          DustinB @nikade
          last edited by

          @nikade said in Permissions Make No Sense:

          I think the problem is that as soon as a host is a member of the pool everything created "belongs" to the pool and not the host.
          You'd have to setup a standalone host to be able to achieve what you want since that "single" host would create its own "pool" where itself is the only member.

          No company of any scale is going to have a standalone host for this though. It arguably only makes sense to get GDAP style permissions created, where you have the ability to limit what can happen within the entire pool, this way you don't have separate sets of permissions on differing workloads.

          nikadeN J 2 Replies Last reply Reply Quote 0
          • nikadeN Offline
            nikade Top contributor @DustinB
            last edited by

            @DustinB said in Permissions Make No Sense:

            @nikade said in Permissions Make No Sense:

            I think the problem is that as soon as a host is a member of the pool everything created "belongs" to the pool and not the host.
            You'd have to setup a standalone host to be able to achieve what you want since that "single" host would create its own "pool" where itself is the only member.

            No company of any scale is going to have a standalone host for this though. It arguably only makes sense to get GDAP style permissions created, where you have the ability to limit what can happen within the entire pool, this way you don't have separate sets of permissions on differing workloads.

            Yeah thats correct, you wont be able to pin permissions to a specific host.
            So far we havent had the need to do so, we just delegate X cores, Y Gb RAM, Z Gb disk and thats about it. For us it doesnt matter what hosts in the pool that our dev's runs their VM's.

            1 Reply Last reply Reply Quote 0
            • J Offline
              jimmymiller @DustinB
              last edited by

              @DustinB
              Does the Self Service resource sets not cover your needs? I understand wanting to limit resources so they don't impact others, but pinning down to a specific host that may be a part of a larger pool can make ACLs ugly. Especially when you enable HA or Plans/DRS. If you aren't planning to enable those features, why not leave the host as an independent pool and give them access that way?

              D 1 Reply Last reply Reply Quote 0
              • D Offline
                DustinB @jimmymiller
                last edited by

                @jimmymiller said in Permissions Make No Sense:

                @DustinB
                Does the Self Service resource sets not cover your needs? I understand wanting to limit resources so they don't impact others, but pinning down to a specific host that may be a part of a larger pool can make ACLs ugly. Especially when you enable HA or Plans/DRS. If you aren't planning to enable those features, why not leave the host as an independent pool and give them access that way?

                No, SS doesn't address the ask.

                J 1 Reply Last reply Reply Quote 0
                • J Offline
                  jimmymiller @DustinB
                  last edited by

                  @DustinB So what features about the pool are you wanting to use that you can't just give them access to the individual host (i.e. as a single host pool)?

                  1 Reply Last reply Reply Quote 0
                  • Tristis OrisT Offline
                    Tristis Oris Top contributor
                    last edited by Tristis Oris

                    I agree, got a similar dilemma now.
                    Required to grant permissions to single host (gpu computing) and ability to create\remove VMs.

                    But it looks it no ACL for VM creation, it available only for global admin\pool admin accounts. So only way is setup standalone XO for each single host? This way i lose the pool storage and VM migration.

                    D 1 Reply Last reply Reply Quote 1
                    • D Offline
                      DustinB @Tristis Oris
                      last edited by

                      @Tristis-Oris said in Permissions Make No Sense:

                      I agree, got a similar dilemma now.
                      Required to grant permissions to single host (gpu computing) and ability to create\remove VMs.

                      But it looks it no ACL for VM creation, it available only for global admin\pool admin accounts. So only way is setup standalone XO for each single host? This way i lose the pool storage and VM migration.

                      I'm glad someone else came across the same issue I was encountering (still don't have a solution) but maybe the vates team is working on it.

                      1 Reply Last reply Reply Quote 0
                      • olivierlambertO Offline
                        olivierlambert Vates 🪐 Co-Founder CEO
                        last edited by

                        If you want to get more than permission on existing objects, you need to use the self service, it's made exactly for that.

                        Tristis OrisT 1 Reply Last reply Reply Quote 0
                        • Tristis OrisT Offline
                          Tristis Oris Top contributor @olivierlambert
                          last edited by Tristis Oris

                          @olivierlambert but, what is this?) i see nothing at docs.
                          ah. this self service, not a build-in acl group.

                          That mean i need to create some VM templates and share them to user, but even devs don't know what they will need.
                          This more a bout resource limitation, which is not my task. Or i'm wrong?

                          D 1 Reply Last reply Reply Quote 0
                          • D Offline
                            DustinB @Tristis Oris
                            last edited by

                            @Tristis-Oris you can read up on it here, https://xen-orchestra.com/docs/users.html#self-service-portal

                            While Self-Service might "scratch the itch" I've been able to talk my team off the edge and just let me manage the environment and grant them access to the VM's through other means.

                            Tristis OrisT 1 Reply Last reply Reply Quote 0
                            • Tristis OrisT Offline
                              Tristis Oris Top contributor @DustinB
                              last edited by

                              @DustinB yeah i already remember about that button. Still not sure is it suitiable for me. Need to check it again.

                              1 Reply Last reply Reply Quote 0
                              • Tristis OrisT Offline
                                Tristis Oris Top contributor
                                last edited by

                                yes, it almost what i need, really great. But you can't setup host affinity via self-service VM creation. Since i have different GPU on hosts, some persons required only 1 host from the whole pool.

                                self
                                e6af7800-6ecc-4ece-9b4f-b17965b02ef4-image.png

                                basic admin
                                0a86dffb-6419-4d13-95b6-1215d5ad977e-image.png

                                Tristis OrisT 1 Reply Last reply Reply Quote 0
                                • Tristis OrisT Offline
                                  Tristis Oris Top contributor @Tristis Oris
                                  last edited by

                                  you can't configure vGPU limitation at self-service rule, but user can select vGPU at VM creation based on that rule. So it would be unlimited. But i can't really check it with my nvidia cards.

                                  and what is Share this VM?

                                  1 Reply Last reply Reply Quote 0
                                  • First post
                                    Last post