Re: host in alert mode

2024-03-11 Thread Jithin Raju
Hi Francisco, Is there any other error message besides this for the host start-up? -Jithin From: Francisco Arencibia Quesada Date: Monday, 11 March 2024 at 8:44 PM To: users@cloudstack.apache.org Subject: host in alert mode Good morning guys, I'm having the following issue : Cannot transit

Re: GPU discovery in the hypervisor

2024-03-11 Thread Pierre-Luc Dion
The way we've been delivering GPU offering with Cloudstack is by using host tags. So each host with a specific GPU has the host tags, example: a16, and the compute offering with the GPU definition also use the hosttag a16. We've been using this with XenServer Enterprise and so far , no issue for

Re: Experience on GPU Support?

2024-03-11 Thread Pierre-Luc Dion
There is no issue delivering VM with passthrough GPU with CloudStack, We've been doing this using XenServer as hypervisor. It requires an enterprise license from Citrix to enable the GPU and vGPU support features. As we don't use KVM , I can't say much about it. there is some limitation

snapshot remains destroying state

2024-03-11 Thread Levin Ng
Hi, Overtime, there are many volume snapshot are failed to remove from UI or API, the snapshot entries are changed to “Destroying” states from snapshot_store_ref but never cleanup by storage GC, and the snapshot entries remains in UI, do you know any safety way to clear them properly.

Re: CPU topology

2024-03-11 Thread Wei ZHOU
Stop the vm Add a vm setting cpucorespersocket Start the vm -Wei On Monday, March 11, 2024, Gary Dixon wrote: > > > Meant to have stated here that our ACS version is 4.15.2 > Hi > > ACS 4.1.2 > KVM on Ubuntu 20.04 > Hosts are Dell R7525 AMD EPYC dual socket 32 core CPU’s > > Is there a VM

RE: CPU topology

2024-03-11 Thread Gary Dixon
Meant to have stated here that our ACS version is 4.15.2 Hi ACS 4.1.2 KVM on Ubuntu 20.04 Hosts are Dell R7525 AMD EPYC dual socket 32 core CPU’s Is there a VM setting that can over-ride the CPU topology? It seems that when we have a VM with less than 8 vCPU – the domain xml of a VM shows

CPU topology

2024-03-11 Thread Gary Dixon
Hi ACS 4.1.2 KVM on Ubuntu 20.04 Hosts are Dell R7525 AMD EPYC dual socket 32 core CPU's Is there a VM setting that can over-ride the CPU topology? It seems that when we have a VM with less than 8 vCPU - the domain xml of a VM shows the CPU topology as a single socket. However between 8 and 16

Re: Advice about advanced zone with security groups

2024-03-11 Thread Wei ZHOU
For the shared networks with SG, the IPs should have public access. similar as Public IPs in the advanced zone (without SG). -Wei On Mon, Mar 11, 2024 at 5:10 PM Tomas Leypold wrote: > > Hi, > > I am new to CloudStack and am trying to create a POC. I am having a problem > with Core/Advanced

Advice about advanced zone with security groups

2024-03-11 Thread Tomas Leypold
Hi, I am new to CloudStack and am trying to create a POC. I am having a problem with Core/Advanced with security groups enabled. With security groups enabled, it seems that the system VM can't connect to the internet. I am getting a "No route to host (Host unreachable)" message in the default

host in alert mode

2024-03-11 Thread Francisco Arencibia Quesada
Good morning guys, I'm having the following issue : Cannot transit agent status with event AgentDisconnected for host 154, management server id is 117266040518341,Unable to transition to a new state from Creating via AgentDisconnected The host appears in Alert mode and I can't start any machine.

Re: Always getting Expired Token on Vm Console

2024-03-11 Thread Nicolas Vazquez
Hi Ricardo, Can you share the /var/log/cloud.log file on your CPVM when you try to connect to a VM’s console? Regards, Nicolas Vazquez From: Ricardo Pertuz Date: Thursday, 15 February 2024 at 14:35 To: users@cloudstack.apache.org Subject: Always getting Expired Token on Vm Console Hi all,

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Wei ZHOU
oh, the first two rules should not exist -Wei On Mon, Mar 11, 2024 at 2:04 PM Wei ZHOU wrote: > Hi, > > The port 53 should be allowed for only the guest network > > root@r-4-VM:~# iptables-save |grep "port 53" > -A INPUT -d 10.111.17.4/32 -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT > -A INPUT

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Wei ZHOU
Hi, The port 53 should be allowed for only the guest network root@r-4-VM:~# iptables-save |grep "port 53" -A INPUT -d 10.111.17.4/32 -i eth0 -p tcp -m tcp --dport 53 -j ACCEPT -A INPUT -d 10.111.17.4/32 -i eth0 -p udp -m udp --dport 53 -j ACCEPT -A INPUT -s 10.111.16.0/20 -i eth0 -p udp -m udp

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Granwille Strauss
Update: I ran a tcpdump in my vRouter as before, the hits are very minimal and happen once every hour or so but here's one: --- root@r-205-VM:~# tcpdump -i eth0 port 53 -vvv tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes 12:19:32.245883 IP (tos 0x0,

send keyboard commands via websocket

2024-03-11 Thread me
Hello, did somebody sucssefully send keyboard commands via websocket to noVNC? I create websocket connection data via api createConsoleEndpoint and I am also able to connect via websocket client (Firefox Weasel) to it. I also see via tcpdump on the console proxy system vm incoming traffic. But

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Wei ZHOU
I remember it as well. The issue should have been fixed many years ago. see https://github.com/apache/cloudstack/pull/1663 -Wei On Mon, Mar 11, 2024 at 11:09 AM Nux wrote: > > I have seen this in the past where port 53 was open on these public IPs > on the VR and was indeed leading to

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Nux
I have seen this in the past where port 53 was open on these public IPs on the VR and was indeed leading to amplification attack. It's super easy to verify, from some 3rd party IP that you know is not whitelisted anywhere in your firewall or cloudstack, run a host or dig command that

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Granwille Strauss
Hi Wei Thank you for the provided script, the stats it shows, is it from initial VM creation date or from the time the server was rebooted? On 3/11/24 09:57, Wei ZHOU wrote: In my opinion, one of your VMs is compromised. If you are able to access the hosts, you can check the statistics of

Re: Anybody visiting CloudFest?

2024-03-11 Thread Ivet Petrova
Lovely, definitely ensure you come to the booth. Also al posts on social media promoting the project at the event are appreciated! Best regards, On 11 Mar 2024, at 12:05, Ishan Talathi wrote: Hi Ivet, I am attending Cloudfest. See you at the booth! On Mon, Mar 11, 2024 at 7:58 PM Ivet

Re: Anybody visiting CloudFest?

2024-03-11 Thread Ishan Talathi
Hi Ivet, I am attending Cloudfest. See you at the booth! On Mon, Mar 11, 2024 at 7:58 PM Ivet Petrova wrote: > Hi all, > > Do we have any community members, who are going to visit CloudFest next > week? > I would like to remind that the CloudStack project has a booth there and > will be awesome

Anybody visiting CloudFest?

2024-03-11 Thread Ivet Petrova
Hi all, Do we have any community members, who are going to visit CloudFest next week? I would like to remind that the CloudStack project has a booth there and will be awesome if you can join us at the booth. Best regards,

Re: CKS with K8s Offering N/w

2024-03-11 Thread Wei ZHOU
Hi, If you access port 443 from other hosts (not controller), you need to specify the listen address. for example "--address 0.0.0.0" -Wei On Mon, Mar 11, 2024 at 10:35 AM Bharat Bhushan Saini wrote: > > Hi Wei, > > > > I fired below command, > > kubectl --kubeconfig kube.conf port-forward

Re: CKS with K8s Offering N/w

2024-03-11 Thread Bharat Bhushan Saini
Hi Wei, I fired below command, kubectl --kubeconfig kube.conf port-forward deployment/cloud 443:31009 Just FYI, application uses a tls and it is also configured. Thanks and Regards, Bharat Saini [signature_262096839] From: Wei ZHOU Date: Monday, 11 March 2024 at 1:18 PM To:

AW: DDOS Attacks from my virtual Router

2024-03-11 Thread me
I also think that a VM has been compromised in your cs installation. This VM is behind your virtual router and is using the default IP address of it. I would take a look at every VM in the network of this VR. Regards, Swen -Ursprüngliche Nachricht- Von: Wei ZHOU Gesendet: Montag, 11.

Re: Enable uefi on Ubuntu 22.04 KVM

2024-03-11 Thread Nux
Sorry Jimmy, I'm not up to date with the subject and need more context. Can you link to this documentation, to the bit that is incorrect? And what is the "4ms piece"? On 2024-03-08 13:12, Jimmy Huybrechts wrote: Hi, It misses a lot of things and the documentation doesn’t mention the 4ms

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Wei ZHOU
In my opinion, one of your VMs is compromised. If you are able to access the hosts, you can check the statistics of the virtual nics of the VMs in the network. vmname=i-xx-yyy-VM nics=$(virsh domiflist $vmname |awk '{print $1}' |grep vnet) for nic in $nics;do virsh domifstat $vmname $nic |grep

Re: CKS with K8s Offering N/w

2024-03-11 Thread Wei ZHOU
Hi, Can you please share the command you run ? -Wei On Mon, Mar 11, 2024 at 8:43 AM Bharat Bhushan Saini wrote: > Hi Community, > > > > I understand that if I want to use CKS service then I have to pass VLAN in > my network. I am trying to achieve that. > > > > But in meanwhile time I expose

Re: DDOS Attacks from my virtual Router

2024-03-11 Thread Granwille Strauss
Hi Guys I ended updating to 4.19 and updated all SystemVMs and routers accordingly. DC has just informed me again that there is amplified DDOS attacks originating from my virtual router and from an IP address that's assigned to no instance or systemvm but shows via UI its assigned. Any

Re: CKS with K8s Offering N/w

2024-03-11 Thread Bharat Bhushan Saini
Hi Community, I understand that if I want to use CKS service then I have to pass VLAN in my network. I am trying to achieve that. But in meanwhile time I expose the service as a nodeport to access the dashboard of my application on shared network. It is accessible over the IP(http) of control