Skip to content

Commit 6bd2ad5

Browse files
committed
Merge remote-tracking branch 'apache/main' into edit-feature-ext
2 parents f1b1b76 + 23d353f commit 6bd2ad5

File tree

9 files changed

+103
-8
lines changed

9 files changed

+103
-8
lines changed
-26.3 KB
Loading

source/adminguide/extensions.rst

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -92,6 +92,8 @@ CloudStack provides sample in-built orchestrator extensions for demonstration an
9292

9393
.. include:: extensions/builtin_extensions.rst
9494

95+
.. include:: extensions/limitations.rst
96+
9597
.. include:: extensions/troubleshooting.rst
9698

9799
.. include:: extensions/developer.rst

source/adminguide/extensions/inbuilt_extensions.rst

Lines changed: 13 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -37,11 +37,20 @@ Get the Api Token-Secret from Proxmox
3737
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
3838

3939
If not already set up, create a new API Token in the Proxmox UI by navigating to `Datacenter > Permissions > API Tokens`.
40-
Uncheck the `Privilege Separation` checkbox in the `Add: Token` dialog or give permission to the API Token
41-
by navigating to `Datacenter > Permissions > Add > API Tokens Permission` and setting Role = `PVEAdmin` and Path = `/vms`.
42-
Note down the **user**, **token**, and **secret**.
40+
41+
Uncheck the `Privilege Separation` checkbox in the `Add: Token` dialog
4342

4443
|proxmox-add-token.png|
44+
45+
Note down the **user**, **token**, and **secret**.
46+
47+
Alternatively, check the `Privilege Separation` checkbox in the `Add: Token` dialog, and give permissions to the API Token
48+
by navigating to `Datacenter > Permissions > Add > API Tokens Permission`
49+
50+
- Set Role = `PVEAdmin` and Path = `/vms`
51+
- Set Role = `PVEAdmin` and Path = `/storage`
52+
- Set Role = `PVEAdmin` and Path = `/sdn`
53+
4554
|proxmox-api-token-permission.png|
4655

4756
To check whether the **token** and **secret** are working fine, you can check the following from the CloudStack Management Server:
@@ -186,6 +195,7 @@ Adding Hyper-V to CloudStack
186195
#. **Add Host.** Add a host to the newly created cluster with the following details:
187196

188197
|hyperv-add-host.png|
198+
**Note**: Add the detail **verify_tls_certificate** set to **false** to skip TLS certificate verification for self-signed certificates.
189199

190200
#. **Create Template.** A Template in CloudStack can map to either a `Template` or an `ISO` in Hyper-V.
191201
Provide a dummy `url` and template name. Select `External` as the hypervisor and `HyperV` as the extension. Under `External Details`, specify:
Lines changed: 55 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,55 @@
1+
.. Licensed to the Apache Software Foundation (ASF) under one
2+
or more contributor license agreements. See the NOTICE file
3+
distributed with this work for additional information#
4+
regarding copyright ownership. The ASF licenses this file
5+
to you under the Apache License, Version 2.0 (the
6+
"License"); you may not use this file except in compliance
7+
with the License. You may obtain a copy of the License at
8+
http://www.apache.org/licenses/LICENSE-2.0
9+
Unless required by applicable law or agreed to in writing,
10+
software distributed under the License is distributed on an
11+
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
12+
KIND, either express or implied. See the License for the
13+
specific language governing permissions and limitations
14+
under the License.
15+
16+
17+
Limitations
18+
===========
19+
20+
Although the external Instances behave a lot like CloudStack managed
21+
Instances in many ways, there are some limitations. Some of these
22+
limitations are due to the framework itself, while others can be addressed
23+
by adding custom actions in the scripts written for the built-in extensions.
24+
25+
**Some general features/actions not supported at the framework level:**
26+
27+
- Console access to the external Instances.
28+
29+
- Data volumes.
30+
31+
- User Data and Metadata services.
32+
33+
- SSH key injection.
34+
35+
- Affinity Groups.
36+
37+
- Migrate Instance.
38+
39+
- Host Capacity and Utilization Stats.
40+
41+
- Add Nics to Instance post deployment.
42+
43+
**Actions which can be implemented using Custom Actions in built-in extensions:**
44+
45+
- Reinstall Instance.
46+
47+
- Backup and Restore.
48+
49+
- Recurring Snapshots.
50+
51+
- Change Service Offering.
52+
53+
- Resize Volume.
54+
55+
- Attach ISO.

source/adminguide/templates.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -447,7 +447,7 @@ can also attach ISO images to Guest Instances. For example, this enables
447447
installing PV drivers into Windows. ISO images are not
448448
hypervisor-specific.
449449

450-
450+
.. _adding-an-iso:
451451
Adding an ISO
452452
-------------
453453

source/adminguide/templates/_create_linux.rst

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -29,8 +29,7 @@ An overview of the procedure is as follow:
2929

3030
#. Upload your Linux ISO.
3131

32-
For more information, see `“Adding an
33-
ISO” <templates.html#adding-an-iso>`_.
32+
For more information, see :ref:`adding-an-iso`.
3433

3534
#. Create an Instance with this ISO.
3635

source/adminguide/templates/_create_windows.rst

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,7 @@ An overview of the procedure is as follows:
3232

3333
#. Upload your Windows ISO.
3434

35-
For more information, see `“Adding an
36-
ISO” <../templates.html#adding-an-iso>`_.
35+
For more information, see :ref:`adding-an-iso`.
3736

3837
#. Create an instance with this ISO.
3938

source/adminguide/virtual_machines.rst

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1265,6 +1265,19 @@ When the snapshotting is complete, the Instance is thawed.
12651265

12661266
You can use this functionality on Instances with raw block storages (E.g. Ceph/SolidFire/Linstor).
12671267

1268+
Disk-only File-based Storage Instance Snapshot on KVM
1269+
-----------------------------------------------------
1270+
1271+
Since version 4.21, CloudStack supports incremental disk-only instance snapshots for VMs on KVM that are running on file-based storages (NFS, local, shared mount point).
1272+
Different from :ref:`Storage-based-Instance-Snapshots-on-KVM`, the VM is not frozen by default; only if the ``quiescevm`` parameter is provided. Furthermore, if ``quiescevm`` is true
1273+
the VM is only frozen during the operation of creating the deltas on the volumes of the VM, thus the downtime is minimal.
1274+
1275+
When using this snapshot strategy, you will not be able to create volume snapshots, as these two features are not compatible. If you want to use both volume snapshots and instance snapshots
1276+
at the same time, you may inform the value ``KvmFileBasedStorageVmSnapshotStrategy`` on the ``vmSnapshot.strategies.exclude`` configuration, so that
1277+
this strategy is not used and the :ref:`Storage-based-Instance-Snapshots-on-KVM` feature is used instead.
1278+
1279+
More information on this feature may be found in the `specification <https://github.com/apache/cloudstack/issues/9524>`_.
1280+
12681281
Limitations on Instance Snapshots
12691282
---------------------------------
12701283

source/installguide/hypervisor/kvm.rst

Lines changed: 17 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -330,6 +330,23 @@ sudoers file:
330330
cloudstack ALL=NOPASSWD: /usr/bin/cloudstack-setup-agent
331331
Defaults:cloudstack !requiretty
332332
333+
Please note that when adding the KVM host to your Cloudstack Management server,
334+
the setup commands will be run with sudo, even with root account.
335+
You should make sure that you are allowed to run binaries and sudo binaries.
336+
337+
On security hardened machines, make sure that the following line is
338+
commented-out in your sudoers file if it exists:
339+
340+
.. parsed-literal::
341+
342+
#Defaults noexec
343+
344+
You may also want to make sure that sudo works by executing the following as
345+
the user you want to register the KVM host with:
346+
347+
.. parsed-literal::
348+
349+
sudo /usr/in/cloudstack-setup-agent --help
333350
334351
Configure CPU model for KVM guests (Optional)
335352
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

0 commit comments

Comments
 (0)