XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Home
    2. bleader
    3. Posts
    Offline
    • Profile
    • Following 0
    • Followers 1
    • Topics 0
    • Posts 66
    • Groups 4

    Posts

    Recent Best Controversial
    • RE: AMD EPYC 9xx5 CPU Support in XCP-ng 8.3?

      @dmz0001 In theory, XCP-ng 8.3 is mostly on par with XenServer 8.4, it's only a naming thing that they did as their previous naming was confusing some of their customers. Long story short, XCP-ng ~= XenServer 8.4. So what you see in the compatibility list of XenServer 8.4 is the right reference for XCP-ng 8.3.

      Unfortunately we do not have much feedback on Zen 5 at this time on our side.

      posted in Hardware
      bleaderB
      bleader
    • RE: transfer vlan networks from one pool to another

      I don't think there is such a thing (if I understood your question properly), I have a simple script to create a network, add a vlan to it, create a vif and add it to a given VM. That's using xe commands directly on a single host.

      From my understanding here you'll need to parse the networks and vlans, and recreate them on another pool, but that will need to be done outside of a host/pool as you need to recreate them on another pool.

      I guess you could go the ssh + key way, that would be my first instinct. But it may also be doable, and maybe easier through XO's API or xo-cli if you do not want to mess with an API directly and prefer a shell script 🙂

      posted in Management
      bleaderB
      bleader
    • RE: Created a new bond interface and lost management connectivity to hosts

      The original problem could be a known issue when creating bond including the management interface that we have to investigate. Although the emergency network reset should have fixed that, so maybe it is a mix of the bond creation issue and MTU issue.

      In the reinstalled pool, did you create the bonds already? If so I would think changing the MTU should be fine, especially as it worked on other PIF, but with MTU issue it is often quite sneaky, so I would not make any promises either.

      posted in Management
      bleaderB
      bleader
    • RE: XCP-ng 8.3 updates announcements and testing

      Update published: https://xcp-ng.org/blog/2025/05/14/may-2025-security-update-for-xcp-ng-8-2-8-3/

      Thank your for the tests.

      posted in News
      bleaderB
      bleader
    • RE: XCP-ng 8.2 updates announcements and testing

      Update published: https://xcp-ng.org/blog/2025/05/14/may-2025-security-update-for-xcp-ng-8-2-8-3/

      Thank your for the tests.

      posted in News
      bleaderB
      bleader
    • RE: cant create a private cross pool network

      Sorry for the delay, I'm a bit swamped. That does not ring a bell to me right now.

      What is you setup like? How many pools, how many host per pool, is there bond on some of them?

      Then, more to debug what was actually created as you stated there network does exist but there is no traffic:

      On your hosts:

      • xe network-list to get the uuid of one of these private networks you created
      • xe network-param-list uuid=<netwok-uuid> should tell you in which bridge they are
      • ovs-vsctl show shows all bridges and their ports, in there you should be seeing the bridge you found in previous step. This bridge should have:
        • a port with type vxlan and options in which you have a remote_ip to the network center
        • the VIFs for the VMs

      On your VM:

      • is that network assigned to the VMs?
      • do the VM have new devices created in ip link or similar when you attached the network?
      • is there any error in VMs dmesg on device creation?

      We'll see from there if we can get an idea of what is happening.

      posted in Xen Orchestra
      bleaderB
      bleader
    • RE: XCP-ng 8.3 updates announcements and testing

      Home host updated successfully, no issue.

      posted in News
      bleaderB
      bleader
    • RE: XCP-ng 8.2 updates announcements and testing

      Home host, no XOSTOR, updated fine, no issue with my usual VMs.

      posted in News
      bleaderB
      bleader
    • RE: Security Assessments and Hardening of XCP-ng

      @nick.lloyd As mentionned by Olivier the documentation has a mail to contact us, which will create a ticket internally, unrelated to support, that will reach the security team directly.

      posted in XCP-ng
      bleaderB
      bleader
    • RE: Security Assessments and Hardening of XCP-ng

      The question that I'm asking here is how does the Vates Team evaluate these vulnerabilities, Qualys, Greenbone, something else?

      I'm not sure what you mean by evaluate vulnerability, especially the list about Qualys, Greenbone…

      If you mean how do we track and process them, I cannot talk about XO side, but I can shed some light on XCP-ng side:

      • we have an internal dependency-track (DT) with various projects (8.2 default install, 8.2 available packages, same split for 8.3), with a custom SBOM generation, to feed DT
        • this is based on CVEs and their Common Platform Enumeration (CPE)
        • the main issue here is that not all CVEs fill the CPEs the same way, so there may be some misses
        • we're trying to improve the SBOM generation to minimize this
      • we also monitor the oss-security mailing list, and some other sources
      • DT reports the CVEs that matched, and we can keep them in or mark them internally as not impacted, fixed, etc
      • we evaluate the priority for us based on their general criticality, but modulate this depending on if it is in base install or not, if it is a part of the software that is meant to be used as a server, if it related to remote acces, and more
      • the one we're impacted by and feel are important, we either update to the latest package version, but now that CentOS 7 is end of life, that's less likely to happen, or try to backport the fix ourselves when possible.

      That's for the dom0 side, on the hypervisor side, we're part of the security list of the Xen Project, so we receive the XSAs and integrate them as fast as we can in following our release process, sometime integrating the patches ourselves, sometime going with the XenServer fixes. If we integrate them ourselves we most of the time remove our own integration and move to the one from XenServer as the people working on these fixes are mostly the ones working on the XSAs in the first place so they have a better knowledge and insigts than us.

      I hope this answers this question.

      Is the Vates team open to the community reporting these vulnerabilities openly or would a ticket be best?

      On XCP-ng side, everything that are packages from open source would be reports of publicly disclosed CVEs, so you can openly report them. If people were to find new vulnerabilities it would depend, but should follow a classic private disclosure in the first place:

      • if it's in an open source package, the upstream would be the best place to do so
      • On the same idea if it's regarding Xen, XAPI, or other Xen Project software, reporting them upstream through the security process is the best way, and it could be nice to drop us a ticket for a heads up too, but that's not mandatory
      • if it is for some of the packages directly coming from us, creating a ticket for us to be able to work on it before a public disclosure would be best.

      Sorry, you asked about the whole ecosystem, but I'm only able to answer from the XCP-ng side of things.

      posted in XCP-ng
      bleaderB
      bleader
    • RE: All NICs on XCP-NG Node Running in Promiscuous Mode

      Running tcpdump switches the interface to promiscuous to allow all traffic that reaches the NIC to be dumped. So I assume the issue you had on your switches allowed traffic to reach the host, that was forwarding it to the VMs, and wasn't dropped because tcpdump switched the VIF into promiscuous mode.

      If it seems resolved, that's good, otherwise let us know if we need to investigate further on this 🙂

      posted in XCP-ng
      bleaderB
      bleader
    • RE: All NICs on XCP-NG Node Running in Promiscuous Mode

      @carldotcliff if you are 100% positive you see traffic on the VM that should not reach them, it is worth opening a ticket as this is not an intended behavior. If you do, tell in the ticket that this was discussed in the forum with David (me), so our support team can assign it to me if they want to.

      For the dropped packets, I do not see any on my home setup, which is a pretty "small" network, in our lab, we do have some on our hosts. On bigger network, that could be pretty much anything, broadcast or multicast reaching the host that the NIC is chosing to drop itself, some NIC will also drop some discovery protocol frames, it would be hard to identify unfortunately, but that would not worry me as long as it is not a high count and not impacting performances.

      posted in XCP-ng
      bleaderB
      bleader
    • RE: All NICs on XCP-NG Node Running in Promiscuous Mode

      I think the promisc mode is due to the fact the interfaces end up in OVS bridges, without that, the traffic coming from the outside to the VMs MAC addresses would be dropped.

      Once it reach the OVS bridge the interface is in, it is up to OVS to act as a switch and only forward packets to the MAC he knows on its ports so all the traffic should not be forwarded to all the VIFs.

      I just tested on 8.2 and 8.3:

      • tcpdumpping icmp on 2 VMs, pinging VM1 does not show traffic on VM2, pinging VM2 does not show traffic on VM1, pinging the host show no traffic on the VMs
      • tcpdumpping everything, only ignoring ssh (as I was logged in on both VM in ssh), the only traffic I see is the multicast traffic on the network.

      So to answer your question, yes it is normal the NICs are in promiscuous, but that should not lead to all traffic going to all the VMs.

      posted in XCP-ng
      bleaderB
      bleader
    • RE: DC topology info

      @irtaza9 Xen Orchestra premium (and from sources) has an SDN Controller plugin, it allows to create private networks and relies on GRE or VXLAN to create private networks, so as long as there are IP connectivity this can do the trick.

      There are 2 blog posts on the subject:
      https://xen-orchestra.com/blog/xo-sdn-controller/
      https://xen-orchestra.com/blog/devblog-3-extending-the-sdn-controller/

      And the documentation:
      https://docs.xen-orchestra.com/sdn_controller

      There are 2 main issues:

      • being the star topology with an elected center that will be a bottleneck as all the traffic on this network will go through it
      • there is (for now) no automated way to have a network management (dhcp, dns, gateway…), that should be part of our microsegmentation solution later on, but no ETA at this time 🙂

      Is that answering your question?

      posted in XCP-ng
      bleaderB
      bleader
    • RE: XCP-ng 8.2 updates announcements and testing

      To be honnest, I'm unsure, generally the XSAs have pretty clear impact description, here it just states:

      resulting in e.g. guest user processes
      being able to read data they ought not have access to.

      No detail here if that's only inside the guest or if it could maybe reach data outside its domain scope. So I would not be able to say, but generally it is pretty clear in XSAs when there is a risk of accessing other guests data, my assumption would be that this is only inside the guest domain.

      posted in News
      bleaderB
      bleader
    • RE: XCP-ng 8.2 updates announcements and testing

      Hello @NielsH, no, that XSA is on the guest side, the fixes will be in the kernel used by the guest, unless we missed something, there is currently nothing to be done on the host kernel side.

      posted in News
      bleaderB
      bleader
    • RE: XCP-ng v8.3 Host Crashing Upon Console Login and Performing Any Action

      Thanks for letting us know, and I'm happy you have thing working nicely now.
      I think to mark this as resolved you need to convert your original post as a question, and it can then be marked as resolved. I actually cannot do it myself, I think only a few people have the permission to do it for others at Vates.

      posted in XCP-ng
      bleaderB
      bleader
    • RE: XCP-ng v8.3 Host Crashing Upon Console Login and Performing Any Action

      Wow, that's not great indeed.

      The console too small, is pretty odd, as this should be at least the standard 80x24 for any kind of VGA.

      Have you tried, from the idrac to login on the third terminal (alt+F3) ? It would be good to see if you can login or if the update + failing disk really broke everything. On the 2nd terminal (alt+F2) you should have system messages too, which in the ideal case should be empty…

      posted in XCP-ng
      bleaderB
      bleader
    • RE: SMB share write performance issue windows server 2019

      Can you clarify a few points:

      • is the SMB server always the same and the windows server, 11 and debian 12 are just client?
      • Is the server a physical host outside of your pool or a VM?
      • what is the server a windows, linux, freenas or a physical NAS?

      It's just to get a better understanding of the setup.

      On the guest tools and PV drivers side I'm not familiar with them myself on windows, maybe @dinhngtu could have some more insight?

      posted in XCP-ng
      bleaderB
      bleader
    • RE: XCP-ng 8.2 updates announcements and testing

      Updated my machine at home, no issue so far.

      posted in News
      bleaderB
      bleader