I too would love this.
They'll probably ask you to submit via the feedback website. But let me know when you've done that, and I'll vote on it as well.
Posts
-
RE: OIDC group to XO(CE) Admin, is it possible?
-
RE: Rust-based guest-tools... How are things going?
@olivierlambert said in Rust-based guest-tools... How are things going?:
The thing is that it works very well and doesn't need fixes…
I know, not usual right? It was so stable that we left it like that waiting for people coming for bugs and nothing happened… We'll cut a 1.0 in the next weeks/months.I have indeed seen the stability of it myself. But the lack of updates made me worry anyway. But I'm really looking forward to the promotion to 1.0 as well.
Thanks!
-
Rust-based guest-tools... How are things going?
I'm just curious
Looking at the commit history for the Rust-based guest-tools, from the Xen-project. https://gitlab.com/xen-project/xen-guest-agent
Shows the last commit being done october 2024.. What is the status of this project? Is it dead, in hibernation, or should the xenserver-tools be used instead?
Thanks
-
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
Also..
Thank you for taking a look at it and solving it so quickly, @florentIt is a quite nice interaction when reporting bugs that they are looked at and triaged. Not saying everything needs to be a priority 1. But I do appreciate being close to the process. And if I can help make things better by reporting bugs, in a hopefully constructive way. Then I'll continue to contribute my way.
-
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
@florent said in Setting "Protect from accidental deletion" breaks with backups and healtchecks:
the fix is merged into master
I can confirm that the problem has now been solved. And will mark the raised github-issue as closed as well.
-
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
@Greg_E
or just uncheck the "protection"-flag. But that get tedious very quickly. And I only had to do it on 6 VMs. -
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
@greg_e & @florent
I have gone back through the commits, and I believe it is0a042d2f54a74ecc11a377809272337cb5c880d9that introduces the bugg.
https://github.com/vatesfr/xen-orchestra/commit/0a042d2f54a74ecc11a377809272337cb5c880d9My last known good and working commit is the one just prior to it,
a831ac7b213eb6fc7f05fbd466407d5cf379cfe9.Tried with the latest commit (as the time of writing).
91c5d98489b5981917ca0aabc28ac37acd448396. But this didn't fix it, unfortunately.Filed a issue/bugg-report on github for this
https://github.com/vatesfr/xen-orchestra/issues/9472
@pilow
A lot of updates can, and do, happen in a month or two
-
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
I didn't have this before yesterday, which is when I updated. And I update from source regularly. So the regression has happened since the last few (<1w) days.
I'll step backwards and see which commit introduced the bug.
-
RE: Setting "Protect from accidental deletion" breaks with backups and healtchecks
Manually unchecking makes the problem go away..
And I can also delete manually (after unchecking the HC-vms) -
Setting "Protect from accidental deletion" breaks with backups and healtchecks
Having the flag "Protect from accidental deletion" has since yesterday left me with plenty of restored VMs. In the backup logs, it indicates that this happens during the healthcheck.
This has happened on 3 out of 6 VMs
Update: The other 3 VMs were opt-out from Healthchecks. So that is why this didn't affect them.
commit: dd5f0cdaa9993fae25469bd1cb1d01d4f2123f44
transfer Start: 2026-02-04 12:16 End: 2026-02-04 12:16 Duration: a few seconds Size: 2.01 GiB Speed: 81.14 MiB/s health check transfer Start: 2026-02-04 12:16 End: 2026-02-04 12:35 Duration: 19 minutes vmstart Start: 2026-02-04 12:35 End: 2026-02-04 12:35 Start: 2026-02-04 12:16 End: 2026-02-04 12:35 Error: forbidden operation: destroy is blocked: protected from accidental deletion Start: 2026-02-04 12:15 End: 2026-02-04 12:35 Duration: 20 minutes Error: forbidden operation: destroy is blocked: protected from accidental deletion Clean VM directory cleanVm: incorrect backup size in metadata merge Start: 2026-02-04 12:40 End: 2026-02-04 12:41 Duration: a minute Start: 2026-02-04 12:40 End: 2026-02-04 12:41 Snapshot Start: 2026-02-04 12:41 End: 2026-02-04 12:41 -
RE: 🛰️ XO 6: dedicated thread for all your feedback!
said in
️ XO 6: dedicated thread for all your feedback!:Windows guests Console - Reloads every 5-10s.
When trying to use the console for both my Windows 11 and Server 2025. The console reloads every 5-10s. This makes it borderline unusable. Since it resets the viewport/window scroll placement as well. Also the console seems to loose focus when this happens as well. Leading to have to click the console-section to get it in focus, to receive I am not seeing this behaviour in XO5 at all.
.
.
.
.
Unfortunately this is still present in commit 0a0ae5dc7ea6608612d105f6338ffe72d8bd9ed1 as well..Update: I recorded the behaviour, for better clarification:
https://www.youtube.com/watch?v=PXpBFgSl31U -
RE: Ansible Role - Install XO from source - Now available
I've updated and added a node.js-installation to the role. Targeting the LTS-24 version.
I hope you find it to your liking. -
RE: 🛰️ XO 6: dedicated thread for all your feedback!
Windows guests Console - Reloads every 5-10s.
When trying to use the console for both my Windows 11 and Server 2025. The console reloads every 5-10s. This makes it borderline unusable. Since it resets the viewport/window scroll placement as well. Also the console seems to loose focus when this happens as well. Leading to have to click the console-section to get it in focus, to receive I am not seeing this behaviour in XO5 at all.
I do not see the same behaviour on Linux (Ubuntu 24.04) guests. But they are cli-only. No X/Wayland
Commit: b89c26459cfd301bb92adf0a98a0b2dbab57e487
node: 24.12.0
Management agent 9.1.100-59 on both VMsWindows 11 has GPU passthrough & bios
Windows Server 2025 - no GPU passthrough , uses uefi -
RE: 🛰️ XO 6: dedicated thread for all your feedback!
@Mathieu said in
️ XO 6: dedicated thread for all your feedback!:Has anyone tried to access XO 6 via a reverse proxy?
I'm using nginx proxy manager in a docker container to access my XO instance.
Everything is working fine with XO5 (both XOCE and XOA).
But when trying to access XO6 through the reverse proxy, it shows only a few info, with a circle loading on the top and nothing on the left bar:

If I access XOCE and XOA v6 by their IP address, it's working as expected.
Websocket support and cache is activated on the reverse proxy, nothing else fancy on that side.
Thanks.
I haven't tried ngnix. But I access my though haproxy:443 - > xo:8443. And that works just fine. But there needed to be a couple of fixes upstream in master to iron out the quirks with non-443 ports and such.
-
RE: 2FA doesn't load graphics properly after XO6 went default (XO from source)
Replying back, that with commit
5fcb6db32e884e7d7d4cc2bb7430532201a45699the graphics for 2FA look as they should
-
RE: 2FA doesn't load graphics properly after XO6 went default (XO from source)
@olivierlambert said in 2FA doesn't load graphics properly after XO6 went default (XO from source):
Does it work OK without the proxy?
Testing on my secondary lab, and the results are the same. Secondary lab runs privileged service, 443 without proxy.
-
2FA doesn't load graphics properly after XO6 went default (XO from source)
Since XO6 went default. The 2FA has been a bit wonky. See screenshot from chrome console.
Logins work as they should though. So there is no problem there.
My setup runs on port 8443, behind a haproxy.

-
RE: Ansible Role - Install XO from source - Now available
Thanks for your feedback. I'll look into it over the christmas hollidays
-
RE: XO5 breaks after defaulting to XO6 (from source)
@MathieuRA said in XO5 breaks after defaulting to XO6 (from source):
@probain branch
mra-fix-secure-port
Success!! Amazing. Thank you so much
-
RE: XO5 breaks after defaulting to XO6 (from source)
@MathieuRA said in XO5 breaks after defaulting to XO6 (from source):
@probain I will prepare a branch for a potential fix, so you can still use the 8443 port
Absolutely fantastic. I will test it as soon as possible to help out however I can.
Cheers!