a bit unclear, but you seems you are running a 2-node Cluster ?
Question : for a 2-node cluster some additional config needed to be made ...
=> Could it be that when you upgraded the definition of having a 2-node cluster got erased, so its now killing the other node while working with the other ?
The mechanism for making backups is already there, make em as always, then for the one day he wants an offsite backup ( or better said copy of it offsite) use rsync to just send the already made backup to where he wants it to
I admire all offered options, but ... are we not we over-complicating things ?
Why not use RSync ?
its easy
works on linux and windows
can be scheduelled
works over secure connection
For what its worth, i experienced the same error-code on my cluster (1006) but looking in the error on the webUI mentions of
LC_PVE_TICKET not set, VNC proxy without password is forbidden
Examining nodes i found that known_hosts were on their own ( /root/.ssh/known_hosts...
It has been a long time sice i posted in this thread,
Alot has changed over the time which has passed.
we have a PVE 7 release ( yes i upgraded to it)
i am still working on ansible as alternative of puppet, and i think i am quite close to getting it finalised.
Just a peek on the playbook i am...
Also what i have noticed in testing it with my IDP is that it chokes on the sent request:
<amLogEntry> 2021-07-09T13:56:58Z SEVERE NIDS OAuth: Illegal character """ at position 645 is not allowed as a start of a name in a path template...
FYI:
I have scanned the mentioned thread and i see that its on the roadmap of the next release of CheckMK : https://checkmk.com/werk/12307
so its a matter of waiting for that release.
As far as i remember, and i must admit its been a long time since i had migrated a VM, its never been this low, however exact fugures i do not have.
I mean the cluster nodes are all connected to 1Gb ethernet ( no separate net for cluster comms) and all have double ( failover config) net
Proxmox 7 has introduced OpenID-Connect authentication which enables us to go on the path of federated login.
However for all the different Identity provider solutions the option will have to get ALOT more flexible.
Options at the moment are soo limited they are constricting to a single IDP...
Just my experience in this :
Running a mixed cluster of both (latest) 6.4.x and 7.0.x nodes, the cluster functions for as far as i have been able to determine.
Noticable :
An online migration of a VM from a 6.4.x node to a 7.0.x node ( with shared storage) opens a tunnel to the target-node and...
Hi,
Since the upgrade of my setup to v7.x i am unable to gather the cpu utilisation parameter of LXC containers with mij monitoring server (based on CheckMK / latest version 2.0.0.p6).
I am assuming this has to do with the move to cgroupv2.
Since the upgrade the message 'item not found in...
Hi Yes, i got my answers very helpfull list-contributors, but still running into issues which require me to do more research .. will take some time to fiddle it all together, and over the holidays ( with no time off) its all on a low burner.
Most likely my issues are because implementing this...
Just a bit of an update.
I started out with adding visibility of the authentication method in Data center -> Permissions -> Authentication.
The (to be further implemented) method now has an entry under the 'Add'-button.
Clicking the method will spawn a form that allows entries according to the...
No, any Oauth-/OpenID-connect IdP will do, but i happen to have the mentioned product.
For example Okta would also work.
In essence any IdP which has a configuration endpoint ( where i will interact with to retrieve all other endpoints )is usable ( well thats my wish to implement it that way...
Small update ...
Did Some backend work , i have created groups in my eDirectory representing the PVE (builtin) roles, which for future purposes will be exposed as a dedicated scope for OAuth.
As AccessManager allows me to assign roles based on group membership this can be transported with a...
Ok, first up.
i have a box which (was production, but got replaced/decommissioned like a year ago, but was still lying around) and its a DL380Gen5, and since revival has been updated to latest ( as current) 6.3 PVE kernel ( an old box i had which was updates sucessfully ( Debian Buster))
- No...
Hi all,
As i am in need of an option for authentication for OpenID-connect / OAuth or SAML(2), and the implementation from Proxmox itself as supplier has been postponed since 2017 ( first req seen in that year)
i have decided to take on this project and start development of such.
Now don't...
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.