From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id E38EC73FF5 for ; Thu, 8 Jul 2021 09:55:42 +0200 (CEST) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id C75C21510D for ; Thu, 8 Jul 2021 09:55:12 +0200 (CEST) Received: from mail-vs1-xe2b.google.com (mail-vs1-xe2b.google.com [IPv6:2607:f8b0:4864:20::e2b]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id D3CB5150F9 for ; Thu, 8 Jul 2021 09:55:11 +0200 (CEST) Received: by mail-vs1-xe2b.google.com with SMTP id r24so3109953vsg.4 for ; Thu, 08 Jul 2021 00:55:11 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to; bh=wIGgwFnfarcIZ42ADQ5byithPxL+1yLKIS54GNbQtJA=; b=dhNG7INYnuXmbhePEgat6WdXtIBt8AIpta+ojvt9Q0r3SYLspfFFECX2ThVXKZPOVX Y1fJ56Nc8VrSC6kEBHHTewvTfMt/gZj6lyNfBEpfARCVKcILUa9D8XwjMJ/7gsfJYFwV fRx0Cs7ekOMm1AKRuNX11asGlxx1o7VREFvf9UeHAZ8LBfuziucDbxuCwHQqkSsUAxbh lh2fhpOkkY8Lqv/HlgsGKnfYJO6HQs6dc+AEhE4w6uBMU7bddFeKx+ytS+AYM+XJdSTL F77WvZd8zQF+K6PbXqLvC8mBEqUn2G/1AN3c2LIzNFiLb5EvnCdTjeny6H3+aROsI62d HXdQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=wIGgwFnfarcIZ42ADQ5byithPxL+1yLKIS54GNbQtJA=; b=OLJdlXikii6hi0w0JVvMEcE4EiAU4vN7G8UAFNESJxAGtjzBr/a1pMwFSYhHt/OxSq WLDP8M7y1txRC4gpN3yKbQ/8BbRFv1Ec8oZb4xxbqNiqIlYG4zh+UeKUg4vXb3PBc1tu 3VQu6XxxDQxl6thTdEDXv6V41M+vL9li6NhlmXEUP/4pErYnXoz+wIW4yok1B+J23wSE itQ1kvXBj3YHCMuAjlCFn4Yorm2nUlU9F93u2s81LIk1r1YQrbmMQj5NQZAOqq/wBsSy hYybU7mZRcHtnHWXbFHC1WpXOMGn3Yt9JlgURUO1iZShmOIvzFR1G9Y2ZCyDrWp5tJn8 nAjw== X-Gm-Message-State: AOAM532FIfW5Z6fVZlVBamNsvSaJP7fwzIZEWopSceCwYmt0dYSG4CZa Zgju0EYOfb0JQvjxTsRYxyTESXUT8eDpkihVtptHBe+SNQ== X-Google-Smtp-Source: ABdhPJzq24ShkEcZjS8G/jrpNGMTSbo++GwqdjviLn4XQX/O86dY0VzDMxncwqwjQTs+nEr3WjEhbFrA6qtEFFJIRqc= X-Received: by 2002:a05:6102:34c7:: with SMTP id a7mr25913378vst.18.1625730904573; Thu, 08 Jul 2021 00:55:04 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: Alex K Date: Thu, 8 Jul 2021 10:54:53 +0300 Message-ID: To: Proxmox VE user list X-SPAM-LEVEL: Spam detection results: 0 AWL 0.020 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DKIM_SIGNED 0.1 Message has a DKIM or DK signature, not necessarily valid DKIM_VALID -0.1 Message has at least one valid DKIM or DK signature DKIM_VALID_AU -0.1 Message has a valid DKIM or DK signature from author's domain DKIM_VALID_EF -0.1 Message has a valid DKIM or DK signature from envelope-from domain FREEMAIL_FROM 0.001 Sender email is commonly abused enduser mail provider HTML_FONT_FACE_BAD 0.001 HTML font face is not a word HTML_MESSAGE 0.001 HTML included in message RCVD_IN_DNSWL_NONE -0.0001 Sender listed at https://www.dnswl.org/, no trust SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [100.pid] Content-Type: text/plain; charset="UTF-8" X-Content-Filtered-By: Mailman/MimeDel 2.1.29 Subject: Re: [PVE-User] Proxmox questions/features X-BeenThere: pve-user@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE user list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Jul 2021 07:55:42 -0000 Checking the qemu process for the specific VM I get the following: /usr/bin/kvm -id 100 -name Debian -no-shutdown -chardev socket,id=qmp,path=/var/run/qemu-server/100.qmp,server,nowait -mon chardev=qmp,mode=control -chardev socket,id=qmp-event,path=/var/run/qmeventd.sock,reconnect=5 -mon chardev=qmp-event,mode=control -pidfile /var/run/qemu-server/100.pid -daemonize -smbios type=1,uuid=667352ae-6b86-49fc-a892-89b96e97ab8d -smp 1,sockets=1,cores=1,maxcpus=1 -nodefaults -boot menu=on,strict=on,reboot-timeout=1000,splash=/usr/share/qemu-server/bootsplash.jpg -vnc unix:/var/run/qemu-server/100.vnc,password -cpu kvm64,enforce,+kvm_pv_eoi,+kvm_pv_unhalt,+lahf_lm,+sep -m 2048 -device pci-bridge,id=pci.1,chassis_nr=1,bus=pci.0,addr=0x1e -device pci-bridge,id=pci.2,chassis_nr=2,bus=pci.0,addr=0x1f -device vmgenid,guid=3ce34c1d-ed4f-457d-a569-65f7755f47f1 -device piix3-usb-uhci,id=uhci,bus=pci.0,addr=0x1.0x2 -device usb-tablet,id=tablet,bus=uhci.0,port=1 -device VGA,id=vga,bus=pci.0,addr=0x2 -chardev socket,path=/var/run/qemu-server/100.qga,server,nowait,id=qga0 -device virtio-serial,id=qga0,bus=pci.0,addr=0x8 -device virtserialport,chardev=qga0,name=org.qemu.guest_agent.0 -object rng-random,filename=/dev/urandom,id=rng0 -device virtio-rng-pci,rng=rng0,max-bytes=1024,period=1000,bus=pci.1,addr=0x1d -device virtio-balloon-pci,id=balloon0,bus=pci.0,addr=0x3 -iscsi initiator-name=iqn.1993-08.org.debian:01:094fb2bbde3 -drive file=/mnt/pve/share/template/iso/debian-10.5.0-amd64-netinst.iso,if=none,id=drive-ide2,media=cdrom,aio=threads -device ide-cd,bus=ide.1,unit=0,drive=drive-ide2,id=ide2,bootindex=101 -device virtio-scsi-pci,id=scsihw0,bus=pci.0,addr=0x5 *-drive file=gluster://node0/vms/images/100/vm-100-disk-1.qcow2*,if=none,id=drive-scsi0,format=qcow2,cache=none,aio=native,detect-zeroes=on -device scsi-hd,bus=scsihw0.0,channel=0,scsi-id=0,lun=0,drive=drive-scsi0,id=scsi0,bootindex=100 -netdev type=tap,id=net0,ifname=tap100i0,script=/var/lib/qemu-server/pve-bridge,downscript=/var/lib/qemu-server/pve-bridgedown,vhost=on -device virtio-net-pci,mac=D2:83:A3:B9:77:2C,netdev=net0,bus=pci.0,addr=0x12,id=net0,bootindex=102 -machine type=pc+pve0 How one can confirm that *libgfapi* is being used to access the VM disk or if not used how libgfapi can be enabled? Thanx, Alex On Thu, Jul 8, 2021 at 10:40 AM Alex K wrote: > Hi all, > > Anyone has any info to share for the below? > Many thanx > > On Tue, Jul 6, 2021 at 12:00 PM Alex K wrote: > >> Hi all, >> >> I've been assessing Proxmox for the last couple of days, coming from a >> previous experience with oVirt. The intent is to switch to this solution if >> most of the features are covered. >> >> The below questions might have been put again, though searching the forum >> or online I was not able to find any specific reference or not sure if the >> feedback is still relevant. >> >> - When adding a gluster volume I see that the UI provides an option for a >> secondary server. In case I have a 3 replica glusterfs setup where I need >> to add two backup servers as below, how can this be defined? >> >> backup-volfile-servers=node1,node2 >> >> >> - I've read that qemu does use *libgfapi* when accessing VM disks on >> glusterfs volumes. Can someone confirm this? I tried to find out the VM >> configs that may reference this detail but was not able to do so. >> >> - I have not seen any *load balancing/scheduling* feature being provided >> and looking through the forum it seems that this is still missing. Is there >> any future plan to provide such a feature. By load balancing I mean to >> automatically balance VMs through the available hosts/nodes depending on a >> set policy (CPU load, memory load or other). >> >> >> Thanx for reading and appreciate any feedback, >> >> Alex >> >> >> >>