From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: <pve-devel-bounces@lists.proxmox.com>
Received: from firstgate.proxmox.com (firstgate.proxmox.com [IPv6:2a01:7e0:0:424::9])
	by lore.proxmox.com (Postfix) with ESMTPS id D24D21FF15D
	for <inbox@lore.proxmox.com>; Thu, 19 Sep 2024 10:50:09 +0200 (CEST)
Received: from firstgate.proxmox.com (localhost [127.0.0.1])
	by firstgate.proxmox.com (Proxmox) with ESMTP id 0552D104FC;
	Thu, 19 Sep 2024 10:50:16 +0200 (CEST)
To: Dominik Csapak <d.csapak@proxmox.com>, Proxmox VE development discussion
 <pve-devel@lists.proxmox.com>, Pavel Tide <Pavel.TIde@veeam.com>
Date: Thu, 19 Sep 2024 08:40:19 +0000
References: <mailman.275.1726558174.414.pve-devel@lists.proxmox.com>
 <39504c85-1fbb-44a3-850c-0d8132c01c09@proxmox.com>
In-Reply-To: <39504c85-1fbb-44a3-850c-0d8132c01c09@proxmox.com>
MIME-Version: 1.0
Message-ID: <mailman.11.1726735814.332.pve-devel@lists.proxmox.com>
List-Id: Proxmox VE development discussion <pve-devel.lists.proxmox.com>
List-Post: <mailto:pve-devel@lists.proxmox.com>
From: Andreas Neufert via pve-devel <pve-devel@lists.proxmox.com>
Precedence: list
Cc: Andreas Neufert <Andreas.Neufert@veeam.com>
X-Mailman-Version: 2.1.29
X-BeenThere: pve-devel@lists.proxmox.com
List-Subscribe: <https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel>, 
 <mailto:pve-devel-request@lists.proxmox.com?subject=subscribe>
List-Unsubscribe: <https://lists.proxmox.com/cgi-bin/mailman/options/pve-devel>, 
 <mailto:pve-devel-request@lists.proxmox.com?subject=unsubscribe>
List-Archive: <http://lists.proxmox.com/pipermail/pve-devel/>
Reply-To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>
List-Help: <mailto:pve-devel-request@lists.proxmox.com?subject=help>
Subject: Re: [pve-devel] [Veeam] Veeam change requests?
Content-Type: multipart/mixed; boundary="===============4045919054326042386=="
Errors-To: pve-devel-bounces@lists.proxmox.com
Sender: "pve-devel" <pve-devel-bounces@lists.proxmox.com>

--===============4045919054326042386==
Content-Type: message/rfc822
Content-Disposition: inline

Return-Path: <Andreas.Neufert@veeam.com>
X-Original-To: pve-devel@lists.proxmox.com
Delivered-To: pve-devel@lists.proxmox.com
Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
	 key-exchange X25519 server-signature RSA-PSS (2048 bits))
	(No client certificate requested)
	by lists.proxmox.com (Postfix) with ESMTPS id 812E4C03E6
	for <pve-devel@lists.proxmox.com>; Thu, 19 Sep 2024 10:50:14 +0200 (CEST)
Received: from firstgate.proxmox.com (localhost [127.0.0.1])
	by firstgate.proxmox.com (Proxmox) with ESMTP id 5F0ED104CC
	for <pve-devel@lists.proxmox.com>; Thu, 19 Sep 2024 10:50:14 +0200 (CEST)
Received: from mx1.veeam.com (mx1.veeam.com [216.253.77.21])
	(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)
	 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
	(No client certificate requested)
	by firstgate.proxmox.com (Proxmox) with ESMTPS
	for <pve-devel@lists.proxmox.com>; Thu, 19 Sep 2024 10:50:13 +0200 (CEST)
Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12lp2045.outbound.protection.outlook.com [104.47.66.45])
	(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by mx1.veeam.com (Postfix) with ESMTPS id 3FC86802D5;
	Thu, 19 Sep 2024 04:40:40 -0400 (EDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veeam.com; s=mx24;
	t=1726735242;
	h=from:from:reply-to:subject:subject:date:date:message-id:message-id:
	 to:to:cc:mime-version:mime-version:content-type:content-type:
	 in-reply-to:in-reply-to:references:references;
	bh=LkkQ6GTXZ7z8BBJMescXpHxQHguIz88BRTa17XC1+gM=;
	b=agQh7lerl07B8xhuHHdjqofbdXgrMrp0oPrf7kKnaFp0Tq4p4nqGp9OzbOs9mVy6tlniww
	TIqMgszRn2RebQGHxIkiBV6JRLseMZD+/D/zA59h7md+mQbj9OV1238FrrBn2s11MnH1Be
	XME9Cuc3wtu5MO6gdsq5o8O5IbmCguR9aT1mJUOdlAvoleoXmr4MFIYrnvtoZPxL0HYzgx
	fEnSgKMXrYsB54g/N/ZelVBUMCsCfELCcF/W4TXEEm0qv5ePFQiTXg79QW05tLTveLGTno
	J21BvBAE9FMyPQVQmwtW3pYwj+2Al58vdN1Axk63vjDRJ87wkPglR7zkV1UFOw==
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none;
 b=V+PM8scvhU8092sdR++k8lcE0FgCv5yCtkXx+kF9hU+MSxiLcCIL8WeelGgNxaPmcg6xwhWUl8f5K/tE6sbTWd6EYZtl619Ls7zSYQ2DRLTdGEstOrX5RBU1Yv9tOL9E32AlVhYeTY5hXLRR8hpido9aEq7JfANI2hvSzMIvVvhGki8WYdcDbp9eSuSUdtMemfxLfCeg1ze5iqU+zPZZ7OKuJA3bWUMG9SVyUB3czP8qdSW8vUCPE6dnkSQ5JWK3cKOYVuWK09czP+mMcMgn3P90bhOj1peg3z/d2fN55r8ny30gEnIWd3vDvaJyRuBMhYmYryMrzJryIFUu5ldDfQ==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com;
 s=arcselector10001;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1;
 bh=LkkQ6GTXZ7z8BBJMescXpHxQHguIz88BRTa17XC1+gM=;
 b=XIAC2qx/hfcIFtE41q5fjGqq/B43nom0719+d5Ja7qHbDT0CTcnj7OIQGRzCJ9iJgd0ZxmO3PQRGufuB1p0yVAaBPWNGVcKIYjxOAswFLRr3mQBCMgSsYj/z5UT1tEYUFpOSxS68qG/KTHc7Y/CJT07MbfPkOEngl0Fsy59uleTRdA+/0eJna2RIK3EjtqhqwXMahTVKjeJ+HzfBTH4sZr+drTzP3hOMK3iFMWMnPd8Pmhlz3uoO2EKF9WDlm0gRAkpID8S6ooRpOJd/Wsn7m42AkCyy53uw3upquqscNvR2SZX8wLZAAHrgPsJnSAHF6ho8cgBMU/qS+njWxLJkfA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass
 smtp.mailfrom=veeam.com; dmarc=pass action=none header.from=veeam.com;
 dkim=pass header.d=veeam.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=veeam.com;
 s=selector1;
 h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck;
 bh=LkkQ6GTXZ7z8BBJMescXpHxQHguIz88BRTa17XC1+gM=;
 b=mBZLn4gp8dAxNxV7yNe0AYtu3H1X3ZaDQ7nQsHBzdEiUTix3mThG6+nbSgzUnk/1UzHnD5kelOXiCUAqZd/K4EeP41KgEgDyJ53XM0pNawXxM/s60WBrvJpMwPQo5KUunkztjNVJEGPVr7EiV0HpUu9MjyuLTONAoQq9LVVad50R6yT11E/egb8StjsD+35FbugRmESVpY4h6D+t+Bat/VFtV6E+2586RShw9s2j5f/coQiC0lrntDITueqToB7zWf6uPQA+n6BHy7bp/QI7dcxVvCmCPZs4fVc5B3Fjf0ZCGofL6m/SJNTp3RzZT19etau128HaNVi2Y2+pgcnIMA==
Received: from PH0PR14MB4264.namprd14.prod.outlook.com (2603:10b6:510:49::17)
 by SA1PR14MB7461.namprd14.prod.outlook.com (2603:10b6:806:2b7::9) with
 Microsoft SMTP Server (version=TLS1_2,
 cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7962.23; Thu, 19 Sep
 2024 08:40:37 +0000
Received: from PH0PR14MB4264.namprd14.prod.outlook.com
 ([fe80::67e1:2e46:a464:9114]) by PH0PR14MB4264.namprd14.prod.outlook.com
 ([fe80::67e1:2e46:a464:9114%4]) with mapi id 15.20.7982.012; Thu, 19 Sep 2024
 08:40:37 +0000
From: Andreas Neufert <Andreas.Neufert@veeam.com>
To: Dominik Csapak <d.csapak@proxmox.com>, Proxmox VE development discussion
	<pve-devel@lists.proxmox.com>, Pavel Tide <Pavel.TIde@veeam.com>
Subject: Re: [pve-devel] [Veeam] Veeam change requests?
Thread-Topic: [pve-devel] [Veeam] Veeam change requests?
Thread-Index: AQHbCmnbXu0tPpvWk0ePb+ryEJ4qrrJex4Gx
Date: Thu, 19 Sep 2024 08:40:19 +0000
Message-ID:  <PH0PR14MB42646286C0090066DDDB9EFCF4632@PH0PR14MB4264.namprd14.prod.outlook.com>
References: <mailman.275.1726558174.414.pve-devel@lists.proxmox.com>
 <39504c85-1fbb-44a3-850c-0d8132c01c09@proxmox.com>
In-Reply-To: <39504c85-1fbb-44a3-850c-0d8132c01c09@proxmox.com>
Accept-Language: en-US, de-DE
Content-Language: en-US
X-Mentions: Pavel.TIde@veeam.com
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: dkim=none (message not signed)
 header.d=none;dmarc=none action=none header.from=veeam.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: PH0PR14MB4264:EE_|SA1PR14MB7461:EE_
x-ms-office365-filtering-correlation-id: 76e3c874-36be-4476-3b2b-08dcd886bc12
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|1800799024|366016|38070700018;
x-microsoft-antispam-message-info:  =?Windows-1252?Q?7y+BDIBsQOg/LXONftwZC4gNXkLd1WtgYfOsqbea/e49UhdH1ti0Q2Sm?=
 =?Windows-1252?Q?UPyke8LcAS7uFr0HPOoTFDRkpdN/fhzJ+WTB7KCSIIvMQ7kAhugRYiCx?=
 =?Windows-1252?Q?68kJLRIFBBNmnSucWjOkU14ebJsV/Pxm0Vb/FLljxelLouNTmyQmFssW?=
 =?Windows-1252?Q?qJCXd7WNXRP1CWCtJn2oPVGYd0dNUa0jvKSTBMnu7Tqi3NagJ6H3tuKI?=
 =?Windows-1252?Q?2gpohQRRlCddsfoxv14MtnG8v3n+rC7WDrXbIVM4UatQ40GvQOx8G9qr?=
 =?Windows-1252?Q?xCvDY8B1OQkqM/GxM5LagtRtFjYiJYSJyH5CFcAQojK5xnB09zTLMIDU?=
 =?Windows-1252?Q?MhS8kInKiKi9fKwwcsQcymErogwAUBZkL+ifl/Wo0R6u2Kg+FcqRbJUW?=
 =?Windows-1252?Q?3e1t/zOJjRQACrfaGWJm25h0gUtOwhOv4nn3JSiEUxFriVZGV5pGD/H7?=
 =?Windows-1252?Q?J51k9f5pNneN0CjwjRV1nqBnESADIKIFy7UclMxtsfuqTu/FLvD1KqoT?=
 =?Windows-1252?Q?ALDpugKMw3ek1dhM3CqID7XWlCR+NkX72ID6uPyfy4qDy8bwjyHQeZq2?=
 =?Windows-1252?Q?qPXzUa9lyWgigA3WKH0bGIu8IbtS2Dz1Um/dBaInlMSl13n+jIt/Sp39?=
 =?Windows-1252?Q?Y8qQWDRiha6haSRSKauET4ho6378Fv2MS5wAsx2D0+zU38S6/9byhKzt?=
 =?Windows-1252?Q?bvYbXcvt5DmJrPvhiZaIWMYvFhOQRqhc2ihjb0wJHVcCCggH/+eEbgVV?=
 =?Windows-1252?Q?8JSdwcuwHABkTQqUiyPXBJnHiCRjzKOEUsb9GjFWnuanJvGl7sjyeg8W?=
 =?Windows-1252?Q?//yHC/ePj2sc09hgxG4Zwef9Bfp8Dd4lq1DqaTOqaTjimbmN2eohUaox?=
 =?Windows-1252?Q?1O56y/02zG56Y+lf7X0OpFQ8eCcrQzrT4+35/HD7IJ9dhhj0pTsJSUQ5?=
 =?Windows-1252?Q?YGh4fKXubkc7oG+rsWgb2RpaL8Wrp8b2t5sqy5e2dPWkaBbBqmXGyHJk?=
 =?Windows-1252?Q?qJhCITOr15kPeTY9LJP87HKOOKgr5/rx0VPn+COCA0QwuQYQ1PTkJm1k?=
 =?Windows-1252?Q?BtAyo4ysmFENUAmVOUWbyFuQ9vCJjXIxCgPv7gUsI3sPSjbpsajYrK+g?=
 =?Windows-1252?Q?/cukyY2Nzdr+0REkujmvJ1kxbLnanwy2n1GqzDRKQdSJOnYn/NbKF7Tt?=
 =?Windows-1252?Q?NYqzA/gaDDt64E3CjdoVKyic2KfCTajKbIH8papd/waFPDqhm6pPQX4K?=
 =?Windows-1252?Q?UpNZEbPVdsVmFf18uS36W3jwXYiLmPBTXm1zlYgqRw80leKdW+Op9l7x?=
 =?Windows-1252?Q?YGjKWcGbUY0ABl017upZkZJZ9/ONsGMub0oX3sK3LFj4FRdmO2BnmXF1?=
 =?Windows-1252?Q?S9KP6PuRBkAYllbrsZKLkLVaZJzvsom33Bzmp2On5CW2QfPI0tAPSjeq?=
 =?Windows-1252?Q?ywdrurGXiatN2m8oW1NGHg=3D=3D?=
x-forefront-antispam-report:  CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:PH0PR14MB4264.namprd14.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(1800799024)(366016)(38070700018);DIR:OUT;SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0:  =?Windows-1252?Q?vVOZQ6WNKo06uwSj5GNXEq0CS2QWuPBrLWrrVK1bINcqK3wrWCl0dnfm?=
 =?Windows-1252?Q?bj/T9uF7QhqerLS2pZZPWuIX/O7+CPHKdcBrC6eeXz9oaSklu58reX/S?=
 =?Windows-1252?Q?gUzlB/rfZwDKyjP+Hv+FEH0fA+oDV1nC1uTMnEDwWEmnqeViAkSxgEXv?=
 =?Windows-1252?Q?mRL2jzc+wFunqJBk24rVJ8X5dlzfnzqlAq1yGvifEkLOTU9vHjGm5uLQ?=
 =?Windows-1252?Q?3DwjmS1+x1/4nIVQI3s9D/CILy3cjIS+ZG4/smXGY55De/TdkBXQt1uh?=
 =?Windows-1252?Q?45Nsol/HPKXHMlcYJGFnlcSWDTA/Ff+hm+dUBUeBe41+74xsc2Mg3mdf?=
 =?Windows-1252?Q?pz7Bx9ipKM2tT7vhDltBofqq53lP508Hb2HLhibeZvp1zK0DNSyKOyt2?=
 =?Windows-1252?Q?Bg/DO5L+1Lj27DgOlfqPJhFVeMC8+F8M4L97pRviI25GcJBnLsjfdRAf?=
 =?Windows-1252?Q?cCntWaazSVLzS2SdZWVqcXeL6SyALz5UbXHElPiWnT2fFpXf4NfpAkCl?=
 =?Windows-1252?Q?LoZbRgpCRpGOM6hx5P0vhAxLP89iI1ok+EgEZ32PKGYBi8vSk39tZN8A?=
 =?Windows-1252?Q?nBCHJ4B+JNz8M/2jEkPvcvIKrVOyZwzkswlnUPgsL7EIkqDNzUzWT+xF?=
 =?Windows-1252?Q?zOKxjspaBmcz3m2ooN0XGcb5KxCqaQMk92tM5nisgmZz1dQn9CfFTRlj?=
 =?Windows-1252?Q?6xg931P2o3nNz/irYNhp6XZOkU+4NsP8BqeTDA5PXIzKzQL+Ck1gMaQZ?=
 =?Windows-1252?Q?wN7dQje4lFz4SrTTvmPwIBymh24FyIlHhKcT3eb73Csq353c1RSMh8uL?=
 =?Windows-1252?Q?YlHz5CsuXnXajecBRRtleAeQwn4kVqPwvBVF2kFRl87S+Y30+ifWAYvz?=
 =?Windows-1252?Q?uLZzDQulEizkxhMfjZjIozV/2s2/kOWbaBN4qUtqw8142F1II5U6XjVN?=
 =?Windows-1252?Q?hvkZNLzYINahrvbdro8aHO3DteJXD0CSVWQ8dh0nxWwkbaPOSN5zgZPv?=
 =?Windows-1252?Q?VLUnLsROdpR3MKaR3yHizxMV9Hlcfmh8wTI0uR7KyTbn0Nd3VTjs0A/q?=
 =?Windows-1252?Q?fyBvLfI6mf5RiTimGrdWasn1CQ4JZbHy9DH9NcclGEmSF6qCu4MFoe3y?=
 =?Windows-1252?Q?jnEijAB7isuS7HaewwmRpRGzNMUJLCRJKZoQepuY3mob6Xj6wCi52D1M?=
 =?Windows-1252?Q?KvtU61FUcYUpqjAeFmx5cs21lqlrYwl6Q1vCnXTaMJIefQofaDX87S6Z?=
 =?Windows-1252?Q?Svtl9uR40zbpEQ3Mq/X073a/MvF/bnVKKZEtykjj/MS+G2NhhyyIdMYP?=
 =?Windows-1252?Q?RbxrBZ/VKb/sqx04KTG7mqqFbZqIu96SajpHSvE4PCMSdcChLA/u3WxM?=
 =?Windows-1252?Q?bNDjotMMzU2GxSJDJal6G1NEMlCL39nLw23/cEkRRd/LPidj4R72Kftr?=
 =?Windows-1252?Q?hgs/h6K2SacOuR5oMHrask/WJOuJH07A0zygke1cp5Ggh77SR5mD5YRq?=
 =?Windows-1252?Q?7AFT3/ArlY8984hzgvENCgNgW4B7+HYcxAHrkseWo4jxOEhb48Dx13GR?=
 =?Windows-1252?Q?fkh7incVdYFejm9im8XE2+NHJZD/y0Ny4tf3l78WaZMsemxkM8VxYCap?=
 =?Windows-1252?Q?wnaEfOiI0pc+rznVNKOGhTkOzjkhh1yMHVud+UO+HAZjmv/A4CkSjmuU?=
 =?Windows-1252?Q?1/ljLGK6Cma4AKE3HxekCjZPHucw2zeW?=
MIME-Version: 1.0
X-OriginatorOrg: veeam.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: PH0PR14MB4264.namprd14.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 76e3c874-36be-4476-3b2b-08dcd886bc12
X-MS-Exchange-CrossTenant-originalarrivaltime: 19 Sep 2024 08:40:37.1677
 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: ba07baab-431b-49ed-add7-cbc3542f5140
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: NbX2fX5d++nA+PeYNU3dZHV5jYD7A7hxGJTnWPJIxSmTDED899rQWOR9OsiYPurHKENhQH+6HHlB8HuBWS5V/A==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA1PR14MB7461
X-SPAM-LEVEL: Spam detection results:  0
	ARC_SIGNED              0.001 Message has a ARC signature
	ARC_VALID               0.001 Message has a valid ARC signature
	AWL                     1.439 Adjusted score from AWL reputation of From: address
	BAYES_00                 -1.9 Bayes spam probability is 0 to 1%
	DKIMWL_WL_HIGH         -0.001 DKIMwl.org - High trust sender
	DKIM_SIGNED               0.1 Message has a DKIM or DK signature, not necessarily valid
	DKIM_VALID               -0.1 Message has at least one valid DKIM or DK signature
	DKIM_VALID_AU            -0.1 Message has a valid DKIM or DK signature from author's domain
	DKIM_VALID_EF            -0.1 Message has a valid DKIM or DK signature from envelope-from domain
	DMARC_PASS               -0.1 DMARC pass policy
	GB_GEN_REDIR_URL          0.5 Redirector found in href link
	HTML_MESSAGE            0.001 HTML included in message
	RCVD_IN_HOSTKARMA_W      -2.5 Sender listed in HOSTKARMA-WHITE
	RCVD_IN_MSPIKE_H3       0.001 Good reputation (+3)
	RCVD_IN_MSPIKE_WL       0.001 Mailspike good senders
	RCVD_IN_VALIDITY_CERTIFIED_BLOCKED  0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked.  See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information.
	RCVD_IN_VALIDITY_RPBL_BLOCKED  0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked.  See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information.
	RCVD_IN_VALIDITY_SAFE_BLOCKED  0.001 ADMINISTRATOR NOTICE: The query to Validity was blocked.  See https://knowledge.validity.com/hc/en-us/articles/20961730681243 for more information.
	SPF_HELO_NONE           0.001 SPF: HELO does not publish an SPF Record
	SPF_PASS               -0.001 SPF: sender matches SPF record
Content-Type: text/plain; charset="Windows-1252"
Content-Transfer-Encoding: quoted-printable
X-Content-Filtered-By: Mailman/MimeDel 2.1.29

Hi Dominik, thanks for your input and feedback.

I CC @Pavel Tide<mailto:Pavel.TIde@veeam.com>, who can answer the code ques=
tions.

For the support. Veeam customers can open a support case at https://support=
.veeam.com<https://support.veeam.com/>

I would like to ask the PVE group to do the same when you identify a bug an=
d select the evaluation product choice from the dropdown.
Then please send me or Pavel the support ticket number so that we can route=
 the ticket differently (out of evaluation support).
The advantage of using the Veeam support portal is that you can upload logs=
, and we can share fixes with you for testing or similar things.
To start the support ticket with the evaluation product selection, you need=
 to create a free account on veeam.com

If nothing works, Pavel and I can help directly (send mail). We also monito=
r this list for Veeam issues and questions.

Best regards=85 Andreas

From: Dominik Csapak <d.csapak@proxmox.com>
Date: Thursday, 19. September 2024 at 09:59
To: Proxmox VE development discussion <pve-devel@lists.proxmox.com>
Cc: Andreas Neufert <Andreas.Neufert@veeam.com>
Subject: Re: [pve-devel] [Veeam] Veeam change requests?
This is the first time you've received an email from this sender d.csapak @=
 proxmox.com, please exercise caution when clicking on links or opening att=
achments.

On 9/17/24 09:20, Andreas Neufert via pve-devel wrote:
>
> Hi Proxmox Dev team,
>

Hi,

> Tim Marx mentioned that you have some insights and change wishes for the =
Veeam backup processing and that we should reach out to this list. We would=
 be happy to get this feedback here to be able to address it in our code or=
 join a call if this helps.

Thanks for reaching out!

During (very basic & short) testing, i discovered a few things that are pro=
blematic from our point
of view:

* During backup, there is often a longer running connection open to our QMP=
 socket of running VMs
(/var/run/qemu-server/XXXX.qmp, where XXXX is the vmid). This blocks our ma=
nagement stack from
doing certain tasks, like start/stop (probably does not matter during backu=
p) but also
things like the VNC console, etc.

a better way would be to close the connections as soon as possible instead =
of keeping them
open. (Alternatively using our API/CLI could also be done, but I don't know=
 what
exact QMP commands you're running)

if you absolutely need a longer running socket, please open a bug report on
https://nam10.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fbugzill=
a.proxmox.com%2F&data=3D05%7C02%7CAndreas.Neufert%40veeam.com%7C32edd9e9d40=
34ac3e8f308dcd880fbd1%7Cba07baab431b49edadd7cbc3542f5140%7C1%7C0%7C63862329=
5714596487%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJB=
TiI6Ik1haWwiLCJXVCI6Mn0%3D%7C0%7C%7C%7C&sdata=3DSF75C1yogf8n9EPMYzwv%2BSFRD=
x2Y0%2BSruqkgF%2FuDcQU%3D&reserved=3D0 so we can discuss and track that the=
re, how we could make
a socket available that is not used by our stack

* Another thing that I noticed was that it's not really visible if a backup=
 is running
for a particular VM, so users might accidentally them down (or pause, etc.)=
. Especially
i think it's bad if the VM is placed under a HA policy that has 'stopped' a=
s target, as
that will try to stop the VM by itself. (Though this might be a configurati=
on error in itself?)

A quick way to fix this would be to have a (custom) lock in our VMs. For lo=
nger running tasks
that block a guest, we have a line 'lock: XXXX' in the config that prevents=
 our stack
from doing most operations.

Putting that in would be a very short call to our perl code that locks the =
config locally
( `PVE::QemuConfig->lock_config($vmid, $updatefn) ), checks for existing lo=
cks,
updates the config with a new (custom) lock and writes it again.

Though i must admit, I'm not sure if custom locks outside of our defined on=
es would work,
but I'm sure we could add a 'custom' lock that you could use, should my men=
tioned
approach not work properly.

* Also, I noticed that when a guest is started from your stack, you modify =
the QEMU command line a
bit, namely removing some options that would be necessary to start the VM d=
uring the backup.
Is there a specific reason why you do it this way, instead of starting the =
VM through
our API/CLI?


A more general question last: What is the process for our/your users and us=
 if they/we
find a bug? Where can they be reported to you?

I hope this helps

Best regards
Dominik

--===============4045919054326042386==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
pve-devel mailing list
pve-devel@lists.proxmox.com
https://lists.proxmox.com/cgi-bin/mailman/listinfo/pve-devel

--===============4045919054326042386==--