Nice work Thomas!
Seems the Cargo.toml file changed a bit between 2.3.1 and 2.3.3, sections updated a bit for deps/workspace.dependencies etc.
Are you still updating your repo?
Hi!
For some reason the guest VMs stopped accepting hot plug. First I thought it was because of all PCI slots being full but it doesn't look that way.
Long-shot but the VMs without issues haven't been rebooted with +pcid cpu flag yet.
Anyone solved this one?
Mar 8 11:20:09 xxxxxx kernel...
I'm not affiliated with proxmox, but pulling stuff in from testing repo to a production server should be avoided.
We might have to wait for upstream fixes which should be available on monday then wait a day or so for Proxmox to pull it in and test...
No, PCID is a CPU feature from 2010 that hasn't really been used until linux kernel 4.14.
Now with meltdown it's actually useable to counteract some of the performance loss.
However, I haven't done any benchmarking but if you're going to reboot your Guests anyway, then make sure to add PCID...
There's a spectre variant 1 PoC around that lets you read the RAM of the host from a KVM guest. You should at least grab the latest PVE kernel with the fix for that PoC.
Also, there's microcode available already from intel for spectre, but we still need to wait for the kernel updates as well...
Well - I wouldn't recommend running with cpu type: host if you are running a cluster of several proxmox servers since they might differ in CPU architecture. That might lead to live migration difficulty (when migrating from a node with flags not available in newer node).
The way we do it is that...
Did you log in to a proxmox host webgui with an updated pve-manager?If you log on to one with old pve-manager you wont see it anywhere (had the same issue where i just updated one host, but logged in through another and didnt see it)
Oh, intel just updated their site today with microcode updates:
https://downloadcenter.intel.com/download/27431/Linux-Processor-Microcode-Data-File?v=t
You should at the very least patch Meltdown, as it is the easiest one to "use". So that means patching guest, rebooting it.
Spectre needs microcode update, intel has release some already to certain companies like HP, Dell, Supermicro and they've created bios updates for some cpus / servers. It...
I'd say it depends on what you're running on those KVM guests. Unpatched meltdown might mean that they can read VM guest RAM on the machine they're on, so if you're running several users or applications that might have vulnerabilities they might be exploited to run meltdown code and read the...
Hi!
We're running Proxmox 3.2-2 and we'd like to upgrade it to 3.4. Is it possible to keep ceph packages (both librados and osd/mon packages) on the version they're at now but still update the rest of pve?
Can we just hold those packages through apt/dpkg or will there be dependency issues?
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.