XCP-ng
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login
    1. Home
    2. dfrizon
    3. Topics
    Offline
    • Profile
    • Following 2
    • Followers 0
    • Topics 2
    • Posts 7
    • Groups 0

    Topics

    • dfrizonD

      How to protect a VM and Disks from accidental exclusion

      Watching Ignoring Scheduled Pinned Locked Moved XCP-ng
      7
      0 Votes
      7 Posts
      186 Views
      D
      @dfrizon said in How to protect a VM and Disks from accidental exclusion: @olivierlambert The idea is to block the VM and exclusion disks even by root itself, and make it possible only via command line in the console. That's why I started the post by mentioning the command... We dream of the day when MFA authentication will be required to delete a VM... How would you prevent the root account from taking action..... that is the absolute opposite permission set of root, as if there is an account with even more permissions than root. You can use permission sets and move your team who are deleting powered off VM's that are protected from accidental deletion into a group that doesn't have the permission to delete VMs, at the same time, remove their permissions from deleting items from your SR. I think that would solve your problem, and doesn't cause any logical permission issues like above.
    • dfrizonD

      Error importing a VM exported from XCP 8.3 to XCP 8.3

      Watching Ignoring Scheduled Pinned Locked Moved Compute
      9
      0 Votes
      9 Posts
      849 Views
      olivierlambertO
      That's the reason, then. The update will update files on the disk, not on what's running in memory, so after updates you must reboot to actually use those updates